text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
1
Analysis of Agent Expertise in Ms. Pac-Man using
Value-of-Information-based Policies
arXiv:1702.08628v3 [cs.LG] 4 Nov 2017
Isaac J. Sledge, Student Member, IEEE and José C. Príncipe, Life Fellow, IEEE
Abstract—Conventional reinforcement learning methods for Markov decision processes rely on
weakly-guided, stochastic searches to drive the learning process. It can therefore be difficult to predict
what agent behaviors might emerge. In this paper, we consider an information-theoretic cost function for
performing constrained stochastic searches that promote the formation of risk-averse to risk-favoring behaviors. This cost function is the value of information, which provides the optimal trade-off between the
expected return of a policy and the policy’s complexity; policy complexity is measured by number of bits
and controlled by a single hyperparameter on the cost function. As the policy complexity is reduced, the
agents will increasingly eschew risky actions. This reduces the potential for high accrued rewards. As the
policy complexity increases, the agents will take actions, regardless of the risk, that can raise the long-term
rewards. The obtainable reward depends on a single, tunable hyperparameter that regulates the degree of
policy complexity.
We evaluate the performance of value-of-information-based policies on a stochastic version of Ms.
Pac-Man. A major component of this paper is the demonstration that ranges of policy complexity values
yield different game-play styles and explaining why this occurs. We also show that our reinforcementlearning search mechanism is more efficient than the others we utilize. This result implies that the value
of information theory is appropriate for framing the exploitation-exploration trade-off in reinforcement
learning.
Index Terms—Value of information, constrained search, reinforcement learning, information theory
1 Introduction
Learning to successfully play a game is the process of discovering the correct actions to achieve both primary
and secondary goals. Players typically do this in a trial-and-error-based manner: by taking risks, in the form of trying
novel actions in particular game states, they begin to connect when to take certain actions. Eventually, given a diverse
range of scenarios, players can relate sequences of actions and game states with the ability to obtain a given score.
They can also refine the action sequences once this occurs.
There are a variety of machine-learning paradigms for mimicking this process. One example is reinforcement
learning [1]. Reinforcement learning can be applied to sequential decision-making problems, such as games, in which
the outcome of an action might not be immediately apparent. Reinforcement learning methods do this by assigning
credit to actions leading to an outcome, which provides feedback in the form of expected rewards obtained from
performing those actions. The expected rewards can then be manipulated to infer a mapping between environmental
states and actions.
A great amount of reinforcement learning research has been conducted since the field’s inception [2]. Despite
these efforts, there are some shortcomings with many conventional approaches. For instance, there are few direct
ways to guide the selection of risk-prone, -neutral, or -averse behaviors, as the learning process is typically driven
by stochastic search. This applies to exploration heuristics such as epsilon-greedy and soft-max selection. Engaging
in certain types of risky behaviors, at a certain frequency, may be necessary for agents to uncover high-performing
policies. Moreover, it can be troublesome to construct policies that switch between different strategies during an
episode when relying on many existing exploration heuristics, as we will show. This can occur because instances
where different strategies are viable may be brief and rarely happen. If the agent avoids taking seemingly non-optimal
actions in such instances, then it may seldom deviate from its current policy to determine if a new strategy would be
appropriate under the given circumstances.
Both of these issues can be illustrated with the arcade game Ms. Pac-Man [3]. Ms. Pac-Man is a predator-prey scenario set in a maze-like environment. The game requires the use of multiple strategies to maximize its score. Throughout a majority of the game, the agent, Ms. Pac-Man, is being chased by invulnerable entities, which are ghosts. The
Isaac J. Sledge is with the Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA (email:
[email protected]). He is also with the Computational NeuroEngineering Laboratory (CNEL) at the University of Florida.
José C. Príncipe is the Don D. and Ruth S. Eckis Chair and Distinguished Professor with both the Department of Electrical and Computer Engineering
and the Department of Biomedical Engineering, University of Florida, Gainesville, FL 32611, USA (email: [email protected]). He is the director
of the Computational NeuroEngineering Laboratory (CNEL) at the University of Florida.
The work of the authors was funded via grant N00014-15-1-2103 from the US Office of Naval Research. The first author was additionally funded by a
University of Florida Research Fellowship, a Robert C. Pittman Research Fellowship, and an ASEE Naval Research Enterprise Fellowship.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
2
objective of the agent is to clear the environment of pellets while navigating around the ghosts. However, after activating certain power-ups, the ghosts become vulnerable for a brief period of time. The agent can consume these ghosts
for a score boost.
The switch in ghost dynamics necessitates a change in the game-play strategy, since multiple distinct modes of
behavior are required under different conditions [4, 5]. Despite the need for multi-modal behaviors, conventional
reinforcement-learning approaches have focused on constructing monolithic policies. Such policies would implement
the same agent behaviors regardless of the vulnerability of the ghosts. Although it is possible to represent multimodal behavior with these policies, it can be difficult to learn such behavior. This is, in part, due to risk. For instance,
throughout the learning process, an agent may have learned to avoid colliding with the ghosts. Without straying from
this behavior, the agent will not learn that there are instances where it can safely chase the ghosts.
In this paper, we consider an information-theoretic learning [6] approach for performing constrained stochastic
searches that promote a continuum of risk-averse to risk-favoring agent behaviors during reinforcement learning. This,
in turn, leads to a principled exploration of the state-action space that aids in the promotion of multi-modal behaviors.
Other schemes, such as epsilon-greedy and soft-max selection, also implement action exploration. The novelty of our
approach is that we frame exploration as a tractable optimization problem and understand the source of optimality. As
well, existing theory shows that our approach leads to optimal decision making under uncertainty; similar guarantees
are not known for other exploration mechanisms.
Our approach is based upon Stratonovich’s value-of-information criterion [7–9], which provides an optimal
conversion between rewards and information. Here, the goal is to analyze the evolution of the agent expertise, for the
arcade game Ms. Pac-Man, when using the value of information.
The value of information possesses a single hyperparameter that specifies the policy complexity and influences
the agent’s game-playing expertise. This parameter arises automatically from optimization of the value of information. The policy complexity dictates the exploration granularity of the policy search space. If the complexity is low,
then the policy space will be searched coarsely. The agent will implement cautious action-selection behaviors. That
is, the agent will often avoid choosing actions that deviate from the policy. This can lead to low to modest long-term
rewards if the policy does not accurately capture the environment dynamics. The amount of computational effort
needed to learn in this case is low, however. When the policy complexity is high, the policy space is finely searched.
The agent is prone to taking risky actions in this case. In doing so, the policies typically produce action sequences
that lead to high long-term rewards. Such high-complexity policies are also likely to promote the formation of multimodal behaviors. In either case, optimal-reward policies are found, where the actual best rewards are pre-determined
by the policy complexity. This comes at the expense of computation, as many learning episodes may be needed for
this to occur.
We show that distinct policy types, for Ms. Pac-Man, materialize for three ranges of parameter values. The agent
merely clears the level of pellets and avoids the ghosts in the lowest-complexity case. It does not implement multimodal behaviors. As the policy complexity is increased, the agent exhibits improved game-play styles, which come
about from engaging in risky behaviors during training. For moderately low to moderately high policy complexities,
the policies compel the agent to clear the pellets in an expeditious manner. It also has the agents chase after fruit
power-ups. In the latter case, the agent switches between avoiding and sometimes chasing the ghosts whenever they
are invulnerable and vulnerable, respectively. High-complexity policies attempt to produce the best rewards. Agents
will continuously seek out power pellets, so as to remain invulnerable while clearing the level and pursuing nearby
ghosts. The agents will also lure one or more ghosts to power pellets.
The remainder of this paper is organized as follows. We begin, in section 2, with a survey of the research that
has been performed using Pac-Man and Ms. Pac-Man. Section 3 outlines our methodology. We first provide an
overview of reinforcement learning using Markov decision processes. We then introduce the value of information
from a Markov-decision-processes perspective. Risk-based interpretations of this criterion are provided. We also
discuss implementational aspects. Our reinforcement learning simulations of the Ms. Pac-Man game are given in section 4. We begin this section by covering our experimental protocols. We then transition to our simulation results and
corresponding analyses. These analyses include the qualitative and quantitative improvement in the agent’s behaviors
during training process. Performance comparisons against other reinforcement learning exploration strategies are
provided to demonstrate the potential of our approach. Lastly, we conclude in section 5 and list possible avenues of
future research.
2 Literature Review
Many approaches developed to play either Pac-Man or Ms. Pac-Man rely on computational intelligence principles [10–17]. The work of Lucas [10] is one of the earliest examples. He used evolutionary heuristics to train neural
networks to play Ms. Pac-Man. His approach relied on the calculation of features relevant for gameplay, such as the
distances to notable items and ghosts. A great deal of user intervention is needed for feature selection, though. Wittkamp et al. [11] also evolved neural networks, which were applied to learn ghost movement strategies for Pac-Man.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
3
Their approach was based on the neuro-evolution of augmenting topologies paradigm. Using a manually-coded agent,
they uncovered ghost strategies that can outperform those from the original game.
Evolutionary-inspired optimization tactics have also appeared in other works. Gallagher and Ryan [12] developed
a finite-state machine approach to encode simple movement strategies. The movement strategies were evolved according to a population-based incremental learning algorithm. In [16], Gallagher and Ledwich described an approach
to developing agents that learn the game from minimal on-screen information. The agents were created by evolving
neural network controllers using straightforward evolutionary algorithms. Their results showed that neuro-evolution
is able to produce agents that could play the game reasonably well, despite not having knowledge of the game rules.
As indicated by the results in [4, 5], neuro-evolution frameworks can lead to agents with much higher performance.
There is a complicated relationship, however, between the various hyperparameters and the expected agent behaviors
for these types of methods. This makes it difficult to a priori assess the expected performance.
Alhejali and Lucas [14] used genetic programming to construct a variety of Pac-Man agents. Their results demonstrated that the agent behaviors functioned well for the training environment and could generalize well to novel environments. Brandstetter and Ahmadi [15] also relied on genetic programming, which was used as a reactive control
mechanism for a Ms. Pac-Man agent. These evolutionary-inspired methods provide the ability to implement important game-playing behaviors. Nevertheless, there is currently little understanding about the connection between
hyperparameter values and expected behaviors. Such methods also often do not leverage all of the agent’s experiences when stochastically updating the policy during the crossover and mutation procedures. A great many training
episodes may therefore be required before the stochastic search process uncovers a reasonable policy.
There have been a variety of non-computational-intelligence-, heuristic-based approaches that have been developed [18–20]. For instance, Szita and Lorincz proposed simple rule-based policies for controlling a Ms. Pac-Man
agent. Their rules were organized into distinct action modules and the decision about which direction to move is based
on the priorities associated with each action module. Policies for choosing the best action modules were uncovered using cross-entropy optimization. However, there is substantial user involvement in initially specifying the rules. More
recently, Wirth and Gallagher [19] outlined how to utilize influence map models when playing Ms. Pac-Man. Their
models highlight desirable and undesirable locations for the agents to visit in the game. They do not provide a means
of learning influence maps from the agent’s experiences, though. Human intervention is hence needed to identify
parameter values for good maps.
Many of the above approaches can specify reasonably good agent behaviors. For some of them, though, it may
be difficult to update the agent’s response for a single situation or even a set of situations without also changing its
behaviors for other instances. Some of them also may not adequately use the agent-environment interactions. Both
issues complicate the efficient construction of good action-selection policies.
A means of resolving such issues is through the use of reinforcement learning. This style of learning has been
employed to create Pac-Man and Ms. Pac-Man agents [21–26]. Such approaches also have the appeal that the user
is out of the learning loop. The agent learns solely from its interactions with the environment, which mimics the
biological archetype.
In [21], Burrow and Lucas applied interpolation-based temporal-difference learning to the task of constructing
Ms. Pac-Man agents. Their experiments demonstrated that this style of learning led to more reliable performance than
neuro-evolution. They also showed that the chosen reward structure can have a dramatic effect on the agent behaviors.
In [23], Griffiths et al. addressed the problem of feedback integration with reinforcement learning. They showed
that their style of policy-shaping-based reinforcement learning can be highly competitive compared to conventional
learning approaches. Vezhnevets et al., in [24], applied deep neural networks for learning multi-step action strategies
in a reinforcement learning setting. They showed that their agents strongly outperformed those derived from feedforward neural networks and long short-term memory networks.
Another popular means of constructing agents has been through the use of Monte-Carlo tree search [27–31].
Robles and Lucas [27] applied a simple tree search heuristic on a Ms. Pac-Man agent to evaluate the danger of any
particular course of action. Ikehata and Ito [28] applied upper confidence bounds to Monte Carlo search trees, which
considers potential moves and formulates an average reward of action action sequence. Like the work of Robles
and Lucas, that of Ikehata and Ito evaluates dangerous routes for the agent to take, based upon its location in the
environment and any nearby ghosts. More recently, Samothrakis et al. [29] and Pepels et al. [31] applied Monte
Carlo tree search to create high-performing agents. Foderaro et al. [32, 33] relied on tree searches as well. They first
decompose the environment into a series of convex cells, which outlined locations where the agent could travel. The
set of decomposed cells is used to create a decision tree for selecting a path that minimizes the risk of colliding with
the ghosts.
Our approach for developing Ms. Pac-Man agents in this paper is related to those given in [21–26], as we also rely
on reinforcement learning. It is also related to Monte-Carlo tree search [27–29, 31–33], since it can be viewed as a
special case of reinforcement learning.
There are key differences, though. First, the action-selection scheme that we propose weights available infor-
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
4
mation in the policy versus pay-off, which implicitly controls the quantization of the state-action decision space.
That is, states are partitioned in accordance with the value function and a single action is assigned to each partition
group. The number of partitions is dictated by the amount of risk, which is controlled by a single hyperparameter in
the information-theoretic cost function. Provided that the amount of risk is properly chosen, this quantization functionality has the benefit of optimizing the efficiency of the learning process. We show that high-performing policies
therefore emerge early during training. In contrast, policies that rely on conventional exploration strategies, which
are used in some of the aforementioned works, lag in performance. This is because they must search over the original
action policy space without an appropriate metric for the goal. Such exploration strategies also often fail to implement
multi-modal behaviors, even when training over a great many episodes.
Another distinction is that we are combining information, which is a measure of uncertainty, with the rewards. As
indicated by our simulation results, this appears to be a good framework to understand the variables at play for intelligent behavior. Our approach should also outperform existing reinforcement-learning methods that do not account for
uncertainty in decision making, such as [10, 12, 14–16].
The reason why were able to obtain good performance is because the value of information combines the rigorous
theory of utility, in the sense of von Neumann and Morgenstern [34], with uncertainty, as quantified by entropy. That
is, the criterion is defined as a conditional extremum of expected utility under a relative entropy constraint. It therefore satisfies all of the axioms for expected utility and hence describes means of decision making under uncertainty
that is independent of any specific definition of information [35]. It also does not, as noted by Belavkin [36], suffer
from some of the perceived flaws of utility theory [37, 38]. This is because it includes a non-linear component that reflects the agent’s preferences about potential information. Agents will therefore reason about expected improvements
in the score differently than potential losses [39], which is necessary or optimal decision making.
Further advantages of our approach are provided in an associated online supplement. We also encourage readers
to consult [40, 41] for more comparisons of the value of information with existing reinforcement learning strategies.
There are other minor advantages to our approach compared to some of the others that are used to provide Ms.
Pac-Man agents. One example is that we have fewer parameter values that need to be chosen and tuned by the investigator. Two of the hyperparameters relate to the reinforcement learning updates, which are easy to specify based on
previous studies. The remaining hyperparameter, which controls the amount of risk, is more difficult to set. Thus far,
its influence appears to be application dependent. However, our simulation results provide insights into this hyperparameter, which will be useful in our future endeavors for understanding how it should be optimally chosen.
In our current work, we consider an annealing-based approach for setting the risk hyperparameter. This largely relieves the need for significant testing to a priori determine reasonably good values that are appropriate across all
episodes. Provided that the annealing occurs at a sufficiently slow pace during training, existing reinforcementlearning theory ensures that the policy iterates will converge to the globally optimal action-selection strategy in
the limit.
Convergence guarantees are another advantage of our approach. They indicate that the best-scoring agent will be
uncovered after a sufficiently large number of state-action transitions. The more heuristic-based approaches like the
ones in [18–20], in contrast, do not necessarily possess these guarantees. The same is largely true for Monte Carlo
tree search [27–29, 31–33]. Convergence for many of these tree-search procedures is, currently, only guaranteed for
simplified problem domains and for certain exploration strategies [30]. Their theoretical performance, in terms of a
criterion known as regret, is not optimal in these domains, unlike the value of information [40].
3 Methodology
3.1 Markov Decision Processes
The value of information can be used for decision making when the agent-environment interactions are described
by a general dynamical system. Here, we take this system to be a Markov decision process.
The Markov-decision-process framework is used heavily in the theory of stochastic decision-making for discretespace and discrete-time settings [42]. In a Markov decision process, the system being considered is assumed to be
driven by underlying Markov chains. That is, the system jumps randomly from one state st ∈ S to the next st+1 ∈ S for
discrete time steps t. The probability of transitioning from one state to another depends only on the current state
and not on the history of states. Moreover, in a Markov decision process, the agent is required to choose an action
at ∈ A from a set of available of actions. An immediate real-valued reward gt+1 ∈ R is earned during the transition
between states st and st+1 whenever an action at is taken.
A corresponding policy dictates the action that is selected at each state. A policy πst+1 (at , st ) characterizes the
probability distribution over actions given the state. We will sometimes use πat (st ) : S → A to denote the optimal
action at ∈ A that is chosen for st ∈ S according to the current probabilistic policy. Each policy has an associated
real-valued action-value function q(st , at ) : S ×A → R. The goal of a reinforcement-learning agent is to find a policy
that optimizes the value function for all state-action pairs: πa∗t (st ) = arg supπa (st ):S→A E[q(s, πat (st ))]. Here, the
t
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
5
value function is defined in terms of the discounted future rewards associated with a particular sequence of actions
!
∞
X
t
γ gt+t0 +1 (st+t0 , at+t0 ) st = s, at = a ,
(1)
q(s, a) = Eπat (st )
t0 =0
for some discount factor γ in the unit interval. The discounting factor ensures that the summation in (1) is finite.
The problem of finding the best policy can be written in terms of the reward function as
!
!
X X
X
sup
p(st )πst+1 (at , st )q(st , πat (st )) =
p(st ) sup πst+1 (at , st )q(st , at ) .
πat (st ):S→A
st ∈S at ∈A
st ∈S
(2)
at ∈A
Markov decision processes are considered to be solved whenever the policy maximizes the future expected rewards
from any starting state.
Markov decision processes are known to have an optimal policy. Finding this policy can be difficult, however.
Most investigators therefore consider the construction of near-optimal policies, which can come about through the
use of model-free, approximate dynamic programming approaches [43–45]. Model-free reinforcement learning
approaches operate by constructing stochastic approximations of the value function in an attempt to circumvent the
intractable nature of direct estimation. A mechanism behind this approximation is a selection of actions at each stage
of the learning process. Actions can be selected based upon the current policy, which introduces no new information
about the optimal value function. Novel actions, which deviate from the current policy, may also be chosen. This
latter option leads to an exploration of the policy space and, oftentimes, the formation of accurate value-function
approximations.
3.2 Value of Information
Our approach to the experience-based learning of policies for playing Ms. Pac-Man follows from the theory of
Stratonovich [7, 8]. Stratonovich proposed a mathematical framework for bounded, rational decision making under
information constraints. This took the form of an optimization criterion known as the value of information.
We show that the value of information can be used to determine when it is advantageous to deviate from the
current policy. It therefore defines a type of reinforcement-learning exploration scheme, which, apart from setting
a single hyperparameter, does not require user intervention. Our experiments will analyze the agent’s expertise at
playing Ms. Pac-Man when relying on different hyperparameter values.
The value of information is based on the premise that there is a trade-off between policy information and obtainable rewards. That is, the greater the amount of information, the better the long-term rewards should be. More time
may be needed to find the optimal policy, though. Here, information takes the form of the number of bits to codify
different policies. We sometimes refer to this as the policy complexity.
More specifically, we assume that an initial probabilistic action-selection policy is provided. The value of information is a constrained optimization problem that seeks a transformed version of this initial policy that yields the
highest rewards. The initial policy is not necessarily allowed to change arbitrarily, though. Rather, the transformation
is governed by a information-constraint term that assesses the divergence between the initial policy and the current
policy. The total divergence cannot exceed a specified bound. The lower the bound, the less that the initial policy can
be modified during learning. This will cause the agent to implement risk-adverse action-selection behaviors, which
can impact the obtainable rewards if the initial policy does not encode the environment dynamics well. Conversely,
the higher the information bound, the higher the diversity of policies and hence the greater the reward improvement.
The agent will therefore favor risky actions. The degree of policy transformation must be delicately balanced to obtain
the base possible rewards.
As we will show, the information bounds are dictated by a single parameter that emerges from converting this constrained optimization problem into an unconstrained optimization problem. This parameter simultaneously dictates
how frequently actions that differ from the current policy are taken and hence how risky the agent’s actions will be.
It is important to note that we are not the first to consider the application of information-theoretic concepts to
reinforcement learning. For example, Tishby et al. [46, 47] proposed a Markov decision process formulation in which
rewards are traded off against control information. In these papers, the authors noted that optimizing the amount
of information yields Bellman-like equations, which they utilized to provide a dynamic programming formulation
for solving the Markov decision processes. However, there is no attempt to couple information value, in the form of
Shannon entropy, with rewards. Only a simple information bottleneck is implemented.
Despite that we also utilize information in our cost function, our approach differs in a few ways. For example, in
the work of Tishby, they rely on control information, which corresponds to the amount of information gleaned by the
agent about the environment from sensory perception. In our approach, information is related to policy transformation costs, which dictates the amount action-state-space exploration. Moreover, in [46, 47], the control information
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
6
term becomes mixed with the action-value function, which complicates its estimation. Additionally, the value function no longer solely expresses discounted rewards, which makes its convergence analysis difficult. In our approach,
we are still able to obtain an action-value function, and hence a policy, that reflects reward optimization. This allows
us to easily apply existing convergence theory to value-of-information-based learning.
3.2.1 Quantifying Information Value
In the context of reinforcement learning, the value of information assumes that the agent’s initial game-play behavior is defined by a prior distribution π(at ). Here, at ∈ A represents the action that that is chosen in the tth iteration; a
single iteration, which we also refer to as an episode, is equivalent to taking a single action and transitioning from one
state to the next.
By accruing experiences through interacting with the environment, the agent changes its game-play behavior to a
posterior-like distribution πst+1 (at , st ), at ∈ A and st ∈ S, which is the probabilistic policy. This change occurs in a
way that optimally trades off the expected utility against the transformation costs for going from π(at ) to πst+1 (at , st ).
The trade-off is given by the following extremization problem, which is the value of information for the Shannon
information case,
!
!
X
X X
∗
(3)
sup
− sup
p(st )q(st , at ) +
p(st )πst+1 (at , st )q(st , πa0t (st )) ;
at ∈A
|
st ∈S
{z
supat ∈A Ep(st ) [q(st ,at )]
}
πst+1 (at ,st )
|
st ∈S at ∈A
sup
πs
t+1
(at ,st )
Ep(st ) [Eπs
{z
t+1
(at ,st ) [supat ∈A
q(st ,at )]]
}
here, we use πa∗0 (st ) to denote the optimal action a0t ∈ A that is taken in state st ∈ S according to the optimal policy.
t
The optimization of the probabilistic policy is subject to the constraint
!
X
X
πst+1 (at , st )
πst+1 (at , st ) such that :
p(st )
πst+1 (at , st )log
≤ ϕinf , ϕinf > 0,
(4)
π(at )
st ∈S
at ∈A
{z
}
|
DKL (πst+1 (at ,st )kπ(at ))
that measures the amount of information that the prior contains about the policy. This expressions in (3) and (4) can
be viewed as problem of finding a version πst+1 (at , st ) of the prior π(at ) that achieves maximal rewards in the case
where π(at ) can only diverge by a prescribed amount ϕinf .
The constrained criterion given by (3) and (4) can be converted into an unconstrained variational expression. This
unconstrained maximization problem follows from the theory of Lagrange multipliers. The expression is composed of
the expected utility of the agent under the posterior policy minus the information transformation cost that is required
for forming the posterior,
!
!
X
X X
πst+1 (at , st )
1 X
∗
p(st )
πst+1 (at , st )log
, ϑt > 0,
p(st )πst+1 (at , st )q(st , πa0t (st )) −
ϑt
π(at )
st ∈S at ∈A
st ∈S
at ∈A
|
{z
}
ϑ−1
t log
P
at ∈A
π(at )eϑt q(st ,at )
(5)
for some positive ϑt that is allowed to change across iterations. The parameter ϑt sets the relative importance between
the transformation cost and the reward maximization. Adjusting ϑt across each iteration modifies the amount of
policy-space exploration that is performed and hence the riskiness of the agent’s action-selection behaviors.
Criterion Explanation. The two terms in (3) define a difference in expected rewards. They can be described as
follows:
First Term: No-Information Returns. The first term captures the possible returns supat ∈A Ep(st ) [q(st , at )]
for a policy in which the divergence between the states and actions are zero. That is, the states carry no information about what action should be taken. This is used to establish the baseline agent performance.
If the states are not informative, then the optimal action is based solely on the state random-variable distribution and the action-value function. If, however, the actions are informative, then the returns for the simplest
policy will be offset by a second term.
Second Term: Informative Returns. This second term quantifies the returns associated with policies whose
transformation costs are non-zero. It is based on the expected return using a modified action-value function,
supπs (at ,st ) Ep(st ) [Eπst+1 (at ,st ) [supat ∈A q(st , at )]]. The optimal action-selection strategy πst+1 (at , st ) is
t+1
initially unknown. However, it is assumed to be related to the specified prior π(at ), in some manner, as described
by the information-constraint bound.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
7
For this term, the divergence between states and actions is assumed to be non-zero. States therefore carry
some information about what action should be chosen, which allows for the formation of a non-uniform policy.
As the number of training episodes becomes unbounded, the agent will have complete knowledge of the
environment, assuming that the information-constraint
bound DKL (πst+1 (at , st )kπ(at )) ≤ ϕinf is equal to the
P
state random variable entropy; that is, ϕinf = − st ∈S p(st )log(p(st )). This second term will eventually
produce returns that converge to those from the full-information case. Optimal pay-outs can also be achieved if
the information constraint bound is annealed at a sufficiently rapid pace. The agent’s action-selection behavior
becomes entirely deterministic in such situations, as only the best-performing action will be chosen. The optimal
policy becomes a delta function in the limit. Otherwise, the agent’s behavior will be semi-random. That is, the
policy will be described by a discrete distribution that is not quite uniform and not quite a delta function.
The constraint term in (4) can be described as follows:
Constraint Term: Transformation Cost. The constraint term, DKL (πst+1 (at , st )kπ(at )), a KullbackLeibler divergence, quantifies the amount of informational overlap between the posterior πst+1 (at , st ) and
the prior π(at ). This term is bounded above by some non-negative value ϕinf , which implies that the amount of
overlap will be artificially limited by the chosen ϕinf .
The value of ϕinf dictates by how much the prior π(at ) can change to become the posterior πst+1 (at , st ).
If ϕinf is zero, then the transformation costs are infinite. The posterior will therefore be equivalent to the prior
and no exploration will be performed; the agent’s action-selection behaviors will be extremely cautious. The
expected reward will not be maximized for non-optimal priors. If ϕinf is larger than the state random-variable
entropy, then the transformation costs are ignored. The prior is free to change to the optimal-reward policy, since
the exploration of actions dominates. The agent’s action-selection is therefore incredibly risky and hence may
differ from the current policy. For values of ϕinf between these two extremes, the agent weighs the expected
improvement in rewards against the transformation costs. A mixture of new-action exploration and exploitation
of the current best-scoring actions will take place. Some amount of risk-taking behaviors will emerge.
The constraint can also be viewed as describing the amount of information available to the agent about the
environment. That is, for small values of ϕinf , the agent has little knowledge about the problem domain. It is
unable to determine how to best adapt its action-selection strategy. As ϕinf increases, more information is made
available to the agent, which allows it to refine its behavior. In the limit, the agent has the potential for complete
knowledge about the environment, which means the action choice will be reward-optimal.
The value of information, as defined by either (3) and (4) or (5), therefore describes the best pay-out that can be
achieved for a specified policy transformation cost.
Criterion Risk Promotion. The expression in (3) defines
an upper frontier on utility. We can write this upper
P
ϑt q(st ,at )
frontier in the form shown in (5): κϑt (πat ) = ϑ−1
). We also define a lower frontier on
t log(
at ∈A π(at )e
utility, which corresponds to the worst-case scenario of minimal reward. In either case, the optimizations are subject
to an information bound (4). These two frontiers stem directly from the theory and are referred to as the abnormal and
normal branches. They represent the maximal gain and maximal reduction in reward over the prior, respectively.
Properties of these two branches give insights into the riskiness of the action-selection behaviors. Toward this
end, we note that action-state spaces with non-zero entropy have a non-zero information potential. This means that
after taking an action, the Shannon information may increase or decrease by the some amount, which corresponds to
changing the information bound by some amount:
Low Information Bound. If the constraint is decreased, then the value of information will shift toward the
normal branch. The normal branch implies risk-aversion in action choices [36]. This is because the potential
increase of κϑt +ϑ0t (πat ) − κϑt (πat ), associated with an increase in ϑt , is less than the potential decrease of
κϑt (πat ) − κϑt −ϑ0t (πat ), associated with a decrease in ϑt . Empirical and theoretical evidence indicates that
risk-aversion is related to a quantization of the state-action space in homogenous risk regions. That is, as the
information constraint parameter is decreased, many states will be grouped together. Visiting a particular state
group will elicit the same action response. Sub-groups of states may be uncoupled and assigned a different
action response during the learning process, but this rarely occurs. Consequently, there is little impetus for
an agent to undertake risky actions, as once a policy has been found that leads to a reasonably high score, it is
usually not modified much.
High Information Bound. If the information constraint parameter value is increased, then the value of information will shift away from the normal branch and toward the abnormal branch. The convexity of the abnormal branch promotes risk-taking behaviors when choosing actions [36]. This is because the potential increase
κϑt (πat ) − κϑt +ϑ0t (πat ) is greater than the potential decrease κϑt −ϑ0t (πat ) − κϑt (πat ). Our experiences indicate
that the action-state space is finely quantized when this occurs; ranges of the information constraint parameter
give rise to different policies. Every state therefore has the potential to be paired with a unique action. Groups
of states that are formed early in the learning process may be uncoupled in the later stages. Taking actions that
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
8
deviate from the current policy is naturally more probable, as they will alter the state-action mapping and lead to
potentially higher-reward policies.
As noted by Belavkin [36], risk is inherently asymmetric: rational agents should act differently when taking risks
versus when they are avoiding risks. The value of information naturally implements this behavior when weighting
action choices, as it produces an asymmetric value function mirroring the one found in prospect theory [39].
3.2.2 Finding Policies using Information Value
The preceding form of the value of information criterion has some practical difficulties. In particular, investigators
must have knowledge of the maximum expected reward associated with the globally optimal policy. Even just estimating this amount can be troublesome for many environments. We demonstrated, in [48], that the criterion could be
reformulated, in an equivalent manner, to sidestep this issue.
As a byproduct of this reformulation, we obtain a constrained convex criterion that can be converted into an
unconstrained one using the theory of Lagrange multipliers. This unconstrained criterion can be globally optimized
according to an expectation-maximization-like update, which define a weighted-random exploration scheme for
reinforcement learning.
This exploration strategy can be combined with a model-free reinforcement learning approaches. Here, we have
use tabular Q-learning, which relies on the estimation of action-value functions for each state-action combination.
The resulting discrete, probabilistic policy can be found from these value functions, in an iterative manner, as shown
in algorithm 1. We assume that all of the actions for a given state in the policy are initialized to have discrete uniform
probabilities.
The corresponding optimization
Algorithm 1: Value-of-Information-Based Q-Learning
steps for the value of information are
given in algorithm 1, steps 7 and 8.
1 Choose unit-interval values for the discount and step-size parameters
γt ∈ R0,1 , αt ∈ R0,1 .
Step 7 is the expected value of the
conditional action-selection probabil- 2 Choose non-negative values for the agent risk-taking parameters ϑt .
3 Initialize the action-value function q(a, s) and hence the policy π(a, s), s ∈ S,
ities over all states. It defines the avera ∈ A.
age action-selection probability. The
4 for t = 0, 1, 2, . . . do
update in step 8 leads to a process for
5
For all relevant st ∈ S and at ∈ A, update the state probabilities
t
X
Y
weighting action choices in each state
p(st ) ← p(s0 )
p(sj |aj−1 , sj−1 )πsj (aj−1 |sj−1 ).
according to a Boltzmann distribution
s0 a0 ,...,st−1 at−1 j=1
parameterized by the expected reward. 6
for k = 0, 1, 2, . . . do X
This resembles soft-max-based action 7
Update π (k) (at ) ←
πs(k)
(at , st )p(st ), at ∈ A.
t+1
selection. The difference is that an exst ∈S
8
For st ∈ S, at ∈ A, update
tra term, whose form is given in step
,
X (k)
7, has been included to account for
(k+1)
(k)
q(st ,at )/ϑt
π (at )eq(st ,at )/ϑt .
πst+1 (at , st ) ← π (at )e
the promotion or suppression of risky
at ∈A
actions. This term, along with an
9
Choose an action, in a weighted random fashion, according to the policy
associated parameter, weights the ex(k+1)
πst+1 (at , st ); perform a state transition st → st+1 ∈ S. Obtain a reward
pected rewards according to the level
gt+1 ∈ R.
of risk that an investigator wishes an
10
Update the action-value function estimates q(at , st ) ←
!
agent to possess. It is straightforward
q(st , at )+αt gt+1 (st , at )+γt supa q(st+1 , a)−q(st , at ) .
to show that this action weighting is
greedy in the limit, under some relatively mild conditions. Therefore, it
will produce optimal-reward policies [49].
The inner loop of algorithm 1, given from steps 7 to 8, covers the expectation-maximization-like update of the
policy according to the value of information. We have shown that the policy approximation error for this loop is
proportional to one over the number of updates; here, we consider only ten updates. The outer loop of algorithm 1,
given from steps 5 to 10, defines the main reinforcement-learning process. In our experiments, we iterate over this
loop for only a few thousand episodes. Note that alternate stopping criteria for both of these loops can be defined
based upon reaching some steady-state solution.
The parameter ϑt that arises upon minimization of the unconstrained value of information dictates the rate of
change the reward difference with respect to the Shannon information constraint. As the value of the parameter goes
to infinity, the policy complexity constraints are ignored. As the value of the parameter goes to zero, the relative
entropy between the actions and states is minimized. This implies that all states elicit the same response, since the
transformation costs are so high that the agent cannot change its behavior. Despite this limitation, though, the agent
will still select actions that attempt to optimize the expected policy returns. For values of the rationality parameter
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
9
between these two extremes, there is a trade-off that occurs. As the parameter value increases, the agent may favor
state-specific actions that yield a better expected return for particular states. As the parameter value decreases, the
agent will favor actions that yield high rewards for many observations, which produces a lower relative entropy.
Choosing good parameter values can be challenging, as their influence over agent risk is application dependent.
There are a few strategies that can be used for this purpose, though. The option that we espouse is to apply an annealing proces to iteratively adjust the amount of agent risk. Under this scheme, an initial value for ϑ0 could be selected
for the parameter. This value can be chosen using expert knowledge so that there is potential for reward improvement.
After each episode, the value of ϑt would then be decreased. This forces the agent to take less risks as the learning
progresses. This adjustment process repeats until the parameter reaches some minimal value. By this time, assuming
that the annealing rate was not too quick, the agent should choose high-reward actions in a deterministic manner.
4 Simulations and Discussions
We now assess our reinforcement learning strategy for a Ms. Pac-Man agent, which is a sufficiently challenging
problem. Foremost, it is a dynamic environment in which there are moving obstacles, which are the ghosts. The
ghosts’ movements are random, which makes the entire problem stochastic. As well, the game requires switching
between different play styles, upon consuming power pellets, so as to maximize the total rewards. This shift in play
styles is predominantly risk driven. Without an ability to promote risky agent behaviors, the development of multimodal strategies may not occur.
The aims of our reinforcement learning simulations are multi-fold. First, we would like to quantify the influence
of the information constraint parameter on the agent’s game-playing expertise. Secondly, we want to determine how
much risk is needed for multi-modal behaviors to emerge. Both of these aims help in understanding the role of the risk
hyperparameter. Lastly, we want to see how the behaviors obtained through use of the value of information compare
with those from other reinforcement-learning exploration strategies.
4.1 Simulation Preliminaries
4.1.1 Agent Rewards
We utilize a dual scoring system for our simulations. The first score that we report is directly from the Ms PacMan game environment. We refer to this as the original score in our plots. For this score, the agent earns +10 and +50
points for consuming a pill and power pill, respectively. The values of bonus items range from +100 to +5000 points,
depending on the level. The points obtained for consuming ghosts increases exponentially, +200, +400, +800, +1600,
according to the number of ghosts eaten during the effects of a single power pellet.
For the purposes of reinforcement learning, we rely on a modification of the above scoring scheme. We refer to
this as the modified score in our plots. In particular, a negative reward is incurred whenever Ms. Pac-Man moves in
one of four cardinal directions to a new location (−1). Remaining within the same location across a state transition
is also penalized (−1). Both of these penalties spur the agent to avoid unnecessary backtracking and wandering.
Colliding with a ghost, without having recently eaten a power pellet, results in a high penalty (−500). This is done
to ensure that the agent implements ghost avoidance behaviors early during training. All of the other rewards are the
same, except those for eating vulnerable ghosts. We quadruple the points to better promote the formation of multimodal strategies.
4.1.2 State Spaces
There are a variety of features that can be used to codify the decision-process state space. Here, we compute a series of holistic features. Such features include the distance to the nearest pellet, power pellet, fruit, nearest ghost, and
second nearest ghost, all of which are in relation to the agent. These distances are measured by the number of steps the
agent would need to reach those locations in the most direct fashion. We quantize the distances into two categories:
near and far. We also include the cardinal direction in which the agent would need to travel to reach those locations,
assuming no obstacles are present in the level. Directional ties are broken randomly. We also have binary features that
determine if the two nearest ghosts are in the same tunnel as the agent, if the fruit has spawned, if a power pellet is
active, if the nearest and second nearest ghosts are vulnerable, and if the agent is in a tunnel or a junction. Lastly, we
have a feature that quantifies the remaining steps before the power pellet wears off. In total, there are eighteen features.
We chose these holistic features, as they encode important details about the game-play mechanics. They can also
be quantized significantly without much loss in the agent’s decision-making capability. Such global features therefore
facilitate the formation of good-performing policies in relatively few training episodes. Comparatively, features that
rely on more local information tend to require significantly more training episodes to reach the same performance
levels. As well, the holistic features are not dependent on the level configuration. Policies obtained from them should
hence generalize well to a variety of situations.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
Ms. Pac-Man Level Configuration
Training Episode: 100, Step: 11
Orig. Score: 60, Mod. Score: 49
Ms. Pac-Man Level Configuration
Training Episode: 100, Step: 23
Orig. Score: 110, Mod. Score: 89
Ms. Pac-Man Level Configuration
Training Episode: 100, Step: 54
Orig. Score: 150, Mod. Score: 77
Ms. Pac-Man Level Configuration
Training Episode: 100, Step: 75
Orig. Score: 270, Mod. Score: 166
Ms. Pac-Man Level Configuration
Training Episode: 100, Step: 78
Orig. Score: 300, Mod. Score: 193
(a)
Ms. Pac-Man Level Configuration
Training Episode: 500, Step: 14
Orig. Score: 140, Mod. Score: 126
Ms. Pac-Man Level Configuration
Training Episode: 500, Step: 37
Orig. Score: 310, Mod. Score: 273
(b)
Ms. Pac-Man Level Configuration
Training Episode: 500, Step: 50
Orig. Score: 360, Mod. Score: 310
Ms. Pac-Man Level Configuration
Training Episode: 500, Step: 63
Orig. Score: 470, Mod. Score: 407
Ms. Pac-Man Level Configuration
Training Episode: 500, Step: 71
Orig. Score: 520, Mod. Score: 449
10
Feature
Weights
Feature
Weights
Feature
Weights
0.13 0.04
0.12 0.03
0.09 0.02
0.10 0.05
0.09 0.04
0.06 0.03
0.04 0.04
0.03 0.03
0.02 0.02
0.04 0.01
0.03 0.01
0.02 0.01
0.02 0.02
0.01 0.01
0.01 0.01
0.02 0.02
0.01 0.01
0.01 0.01
0.07 0.01
0.06 0.01
0.04 0.01
0.06 0.14
0.05 0.11
0.03 0.09
0.05 0.01
0.04 0.01
0.02 0.01
Feature
Weights
Feature
Weights
Feature
Weights
0.19 0.08
0.16 0.06
0.12 0.04
0.15 0.08
0.11 0.06
0.09 0.04
0.18 0.06
0.06 0.05
0.03 0.03
0.05 0.01
0.04 0.01
0.03 0.01
0.04 0.03
0.02 0.03
0.02 0.03
0.04 0.04
0.03 0.04
0.03 0.04
0.15 0.03
0.13 0.03
0.08 0.03
0.14 0.19
0.12 0.17
0.07 0.11
0.09 0.03
0.07 0.03
0.05 0.02
Figure 1: An overview of the agent’s ghost avoidance behavior improvements over multiple training episodes. In row (a), the agent does not yet
possess knowledge of the dynamics of the environment. It therefore moves about seemingly at random and often collides with ghosts after only a few
steps. In row (b), the agent has learned to move around the level less haphazardly so as to consume more pellets. It still sometimes collides with
ghosts, however.
The images in rows (a) and (b) on the left-hand side of the figure highlight the environment state over multiple actions for a given training episode.
These images were obtained from the moderate-complexity case. In each of these images, the colored lines indicate the paths that the agent (yellow
line) and the ghosts (red, pink, cyan, and orange lines) took through the environment across a number of action choices. At the end of each row, we
provide a table of the normalized feature weights for each of the eighteen holistic features. These tables are the features for the low-, moderate-, and
high-complexity policies, respectively. Darker colors indicate greater feature importance. The features are presented in the same order as they were
introduced from the discussions, where the numbering is from top to bottom then left to right. A policy complexity of 3760 bits was used for the
results given in rows (a) and (b).
4.2 Simulation Results
The simulation results that we present are obtained from Microsoft’s Revenge of the Arcade software package,
which is identical to the original arcade version of Ms. Pac-Man. We use the color- and pattern-based screen capture
methodology described in [32] to interact with this application.
We assume that each episode provides the agent with five lives, instead of the usual three. A new life can be gained
once per episode in accordance with the game’s natural scoring system. A life is lost if the agent collides with an
invulnerable ghost. A training episode ends if the agent has no lives.
We have three free parameters that need to be set during the learning process. The first parameter determines the
amount of policy-space search granularity. Based upon initial simulations, we have found that a reasonable value for
this is 3760 bits. This value is the halfway point between a minimal policy complexity, 1880 bits, and the maximal
policy complexity that we consider, 5640 bits. The minimal policy complexity describes the least number of control
bits needed to clear the given level, assuming a minimal amount of backtracking is performed. The maximal policy
complexity was obtained assuming that the agent may have to visit each location in the entire level three times. A
parameter value of 3760 bits should therefore allow the agent to evade ghosts and still complete the level. It should
also strike a good risk balance.
For all of our experiments, we anneal the policy complexity from its initial value toward zero. We do this by
reducing the policy complexity by anywhere from 0.01 to 0.05% of its current value across each episode.
The remaining two parameters are the learning rate and the discount factor, which dictate the action-value update
behavior when using Q-learning. We set the learning rate to 0.3 so that more weight is given to previously acquired
action-value magnitudes than those that were more recently acquired. We temporarily increase the learning rate to
0.7 for a single episode if that episode has the highest reward compared to all previous episodes. This ensures that
the policy quickly implements new agent behaviors to better play the game. A discount factor to 0.9 was used so that
the agent would seek action sequences with high long-term rewards. Each of these values was chosen based upon
previous applications of Q-learning to stochastic game environments.
4.2.1 Emergent Agent Behaviors
The first aspect of the value of information that we consider is the relationship between risk, as dictated by the
policy complexity, and the emergent agent behaviors. That is, we look to see what strategies are implemented by the
policies when the number of bits used to represent them changes. We also assess how these behaviors are altered for
different risk amounts.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
Ms. Pac-Man Level Configuration
Training Episode: 1000, Step: 38
Orig. Score: 5380, Mod. Score: 4737
Ms. Pac-Man Level Configuration
Training Episode: 1000, Step: 68
Orig. Score: 5660, Mod. Score: 4987
Ms. Pac-Man Level Configuration
Training Episode: 1000, Step: 103
Orig. Score: 5870, Mod. Score: 5162
Ms. Pac-Man Level Configuration
Training Episode: 1000, Step: 124
Orig. Score: 6100, Mod. Score: 5371
Ms. Pac-Man Level Configuration
Training Episode: 1000, Step: 144
Orig. Score: 6160, Mod. Score: 5411
(a)
Ms. Pac-Man Level Configuration
Training Episode: 3000, Step: 28
Orig. Score: 5280, Mod. Score: 4657
(b)
Ms. Pac-Man Level Configuration
Training Episode: 3000, Step: 67
Orig. Score: 5560, Mod. Score: 4898
Ms. Pac-Man Level Configuration
Training Episode: 3000, Step: 90
Orig. Score: 5760, Mod. Score: 5075
Ms. Pac-Man Level Configuration
Training Episode: 3000, Step: 111
Orig. Score: 5970, Mod. Score: 5264
Ms. Pac-Man Level Configuration
Training Episode: 3000, Step: 125
Orig. Score: 6850, Mod. Score: 6130
11
Feature
Weights
Feature
Weights
Feature
Weights
0.24 0.17
0.21 0.15
0.17 0.11
0.23 0.11
0.20 0.11
0.16 0.07
0.06 0.10
0.09 0.10
0.08 0.07
0.06 0.01
0.07 0.01
0.07 0.01
0.04 0.04
0.05 0.04
0.04 0.04
0.05 0.04
0.05 0.04
0.04 0.04
0.19 0.03
0.17 0.04
0.13 0.04
0.19 0.24
0.16 0.22
0.12 0.19
0.18 0.03
0.16 0.04
0.11 0.03
Feature
Weights
Feature
Weights
Feature
Weights
0.26 0.17
0.26 0.19
0.22 0.14
0.24 0.11
0.25 0.16
0.20 0.12
0.06 0.10
0.11 0.15
0.09 0.12
0.06 0.01
0.09 0.01
0.08 0.01
0.12 0.04
0.16 0.06
0.09 0.05
0.11 0.04
0.16 0.05
0.09 0.05
0.19 0.03
0.20 0.06
0.17 0.05
0.19 0.24
0.19 0.25
0.15 0.19
0.18 0.03
0.19 0.05
0.15 0.04
Figure 2: An overview of the agent’s fruit chasing improvements over multiple training episodes. Before a few thousand episodes, the agent often
does not know that fruits are a source of extra points. It therefore ignores them, even when they are only one or two steps away. This is highlighted in
row (b). Through random chance, the agent will eventually consume fruits. If this occurs frequently enough, the agent will update its policy to
implement fruit-chasing behaviors. As shown in row (b), the policy will direct the agent to consume fruits even when they are somewhat far away.
We refer readers to the caption in the first figure for information about each of the plots.
Basic Game-Play Behaviors. We encountered three sets of behaviors at different stages of the learning process,
depending on the policy complexity. The first set of behaviors focused on the tasks of avoiding ghosts and seeking
pellets. This functionality emerged over 500 to 1000 episodes and was refined across another 1000 to 3000 episodes,
depending on the policy complexity.
Figures 1(a)–1(b) give a visual overview of the agent’s behavior at different points during the first 500 episodes.
As shown in figure 1(a), the agent’s initial performance is poor, regardless of the policy complexity. The agent often either remains stationary or executes unnecessary actions, increasing the agent’s chance to be eaten by ghosts.
Additionally, the agent has not yet learned that colliding with ghosts results in a large, negative response. The agent
therefore clears only small sections of the level. Such behaviors arise since many relevant value-function entries do
not yet have meaningful values.
As the agent accrues more experiences, the action-value function estimates become more accurate. The agent can
thus more effectively clear the level. This is highlighted in figure 1(b). The results in figure 1(b) demonstrate that the
agent spends less time uselessly backtracking through already cleared sections of the level. The agent also actively
avoids ghosts. However, the agent tends to not keep a conservative distance between itself and nearby ghosts, as indicated in tables A.1(a)–A.1(c) of an associated online supplement. This can lead to it being trapped when the ghosts
launch a two- or three-pronged pincer attack, as is the case in figure 1(b). As shown in tables A.1(a)–A.1(c), later in
the learning process, the agent increases the average distance between it and the ghosts. Many flanking strategies that
the ghosts employ are no longer effective at this point, since the agent typically leaves enough of a gap to escape.
These behaviors emerged due to an increased utilization of the state-space features. We have included plots of the
normalized feature weights as found using the approach of Emigh et al. [50]. The weights indicate the importance of
the features for decision-making, with higher values implying greater importance. The features are listed from top to
bottom, left to right in the order that they were introduced in the previous subsection.
As shown in figure 1(a), the weights are mostly homogeneous for the three policy complexity cases by episode
100. This suggests that there is little preference, with some exceptions, for using various features to take certain actions. By episode 500, more emphasis is given to features related to the distance and position of the nearest pellet
and nearest ghosts, if the agent is in a tunnel, and if the ghosts are in the same tunnel as the agent. This is highlighted
in figure 1(b). Such changes correspond with the ability for the agent to clear larger portions of the level. Note that
lower-complexity policies have larger feature weights than policies of higher complexity by this time, implying that
they better account for the environment dynamics. After around 1500 to 3000 episodes, policies of higher complexity
will have larger weights and hence yield better scores.
The rate at which these basic game-playing skills are acquired is based on the policy complexity. Low complexities, which for this application are around 1500-2500 bits, often implement ghost-chasing and pellet-seeking behaviors more quickly than policies with a higher complexity. This is due to an inherent quantization of the action-state
space. Many states are grouped together, in this case, and actions can be chosen that work reasonably well for all of
the states in a given group. Only a moderate amount of agent experience over a few hundred to thousand episodes is
needed to determine which actions are appropriate. Higher-complexity policies, which range from 2600-6600 bits
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
Ms. Pac-Man Level Configuration
Training Episode: 5000, Step: 43
Orig. Score: 340, Mod. Score: 297
Ms. Pac-Man Level Configuration
Training Episode: 5000, Step: 74
Orig. Score: 630, Mod. Score: 556
Ms. Pac-Man Level Configuration
Training Episode: 5000, Step: 111
Orig. Score: 890, Mod. Score: 779
Ms. Pac-Man Level Configuration
Training Episode: 5000, Step: 139
Orig. Score: 1120, Mod. Score: 981
Ms. Pac-Man Level Configuration
Training Episode: 5000, Step: 152
Orig. Score: 1250, Mod. Score: 1098
(a)
Ms. Pac-Man Level Configuration
Training Episode: 8000, Step: 32
Orig. Score: 270, Mod. Score: 238
(b)
Ms. Pac-Man Level Configuration
Training Episode: 8000, Step: 67
Orig. Score: 790, Mod. Score: 1323
Ms. Pac-Man Level Configuration
Training Episode: 8000, Step: 98
Orig. Score: 1460, Mod. Score: 3162
Ms. Pac-Man Level Configuration
Training Episode: 8000, Step: 139
Orig. Score: 1790, Mod. Score: 3451
Ms. Pac-Man Level Configuration
Training Episode: 8000, Step: 160
Orig. Score: 2110, Mod. Score: 4350
12
Feature
Weights
Feature
Weights
Feature
Weights
0.28 0.20
0.36 0.29
0.30 0.25
0.27 0.15
0.36 0.26
0.29 0.22
0.07 0.14
0.18 0.24
0.16 0.20
0.06 0.01
0.18 0.01
0.16 0.01
0.13 0.04
0.27 0.17
0.24 0.15
0.12 0.04
0.27 0.15
0.24 0.12
0.22 0.03
0.32 0.14
0.27 0.10
0.21 0.24
0.32 0.31
0.26 0.28
0.21 0.03
0.30 0.13
0.25 0.09
Feature
Weights
Feature
Weights
Feature
Weights
0.30 0.21
0.36 0.29
0.39 0.35
0.30 0.19
0.36 0.26
0.39 0.29
0.09 0.15
0.19 0.24
0.25 0.28
0.08 0.01
0.18 0.02
0.25 0.01
0.15 0.05
0.27 0.25
0.29 0.30
0.15 0.04
0.27 0.26
0.29 0.30
0.23 0.03
0.32 0.23
0.38 0.27
0.23 0.24
0.32 0.31
0.38 0.38
0.22 0.03
0.30 0.19
0.35 0.25
Figure 3: An overview of the agent’s ghost-chasing behavior improvements over multiple training episodes. Initially, the agent does not know that
vulnerable ghosts can be eaten. It therefore avoids them, as shown in (a). After several thousand episodes, the agent will sometimes consume
vulnerable ghosts. This can happen, for instance, when the agent is stuck between two or more ghosts with no path for escape. If the agent consumes
enough ghosts, the policy will begin to associate such actions with increased rewards. It will then implement multi-modal behaviors that depend on
the ghost state. As shown in (b), the agent will eventually chase after vulnerable ghosts.
We refer readers to the caption in the first figure for information about each of the plots.
for this application, require many more agent-environment interactions to reach the same skill level. This is because
the state-action space quantization is much finer, which leads to more state groups with fewer states. The agent is also
more risky with its action-selection strategy, so poor choices may be made early in the learning process. However, as
we highlight in the next subsection, this greater amount of risk offers the opportunity to refine these behaviors.
Fruit-Chasing Behavior. The next set of behaviors focused on chasing spawned fruit. Consuming fruits provide
varying amounts of points: it starts from a reward of +100 and increases to +5000 as more levels are cleared before
the agent loses all of its lives.
During the first 2000-3000 episodes, the agent often ignores any spawned fruit that maneuver through the level,
regardless of the policy complexity. This is because the policy has not yet associated eating fruit with higher scores.
In fact, the agent will not pursue fruit, even if it is adjacent to the agent. This is highlighted in figure 2(a).
Eventually, by coincidence, the agent will be in the same corridors as fruits and consume them. By about episodes
3000 to 4500, this will have happened frequently enough for the agent to actively chase fruits from a few cells away,
assuming that there are no ghosts along that path. Supporting statistics are provided in tables A.2(a)–A.2(c). This
reliably occurs only for moderate- and high-complexity policies, though. The transformation costs for low-complexity
policies are too great to consistently implement this behavior; the scores for such policies tend to lag by this point as a
result, which we show in the next subsection.
After anywhere from 6000 to 9000 episodes, the agent will seek out fruits at a greater distance. It will even do so
if the chosen path has few pellets along it, since the score improvements offset the movement penalties. Supporting
statistics are given in tables A.2(a)–A.2(c), which show that high-complexity policies tend to chase fruits over longer
distances than moderate-complexity policies. Beyond a certain distance, the agent tends to overlook such bonus items,
especially if it is within the same corridor as a ghost. The feature weights in figures 2(a) and 2(b) signal that this
happens because ghost avoidance is a more prominent behavior. Eventually, knowing the location of both fruit and
ghosts become equally important for the purposes of maximizing the rewards.
The agent has three features it can use to determine when a fruit has spawned. The first two are related to the
distance and direction of the fruit in the environment, which has special values for non-existent fruit. The other is
a binary-valued feature that determines if a fruit has spawned or not. As shown in figures 1 to 3, this latter feature
consistently has a low weight, even after many episodes. It is therefore not important for decision making, as similar
information can be inferred from the other features. We found that the fruit-spawned binary feature could be removed
without adversely impacting the agent’s performance. In many cases, when re-starting the learning process using
this reduced feature set, a slight increase in the rate of skill acquisition was observed for the three different policy
complexities.
Ghost-Chasing Behavior. Another behavior that materializes is that of eating vulnerable ghosts. This adds anywhere from +200 to +1600 points to the original score and +800 to +6400 points to the modified score, depending
on the number of ghosts consumed per power pellet.
Initially, the agent does not know if vulnerable ghosts can be eaten while under the effects of a power pellet. It
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
Ms. Pac-Man Reinforcement Learning Policy Performance
Ms. Pac-Man Value of Information Policy Exploration
20 000.
15 000.
10 000.
5000.
0.
2500.
5000.
7500.
Training Episode
10 000.
0.
Exploration Amount
Original Score
Low Complexity: 1880 bits
Moderate Complexity: 3760 bits
High Complexity: 5160 bits
Epsilon Greedy Exploration: epsilon 1.0 to 0.3
Soft Max Exploration: tau 1.0 to 0.3
13
1.
0.8
0.6
0.4
Low Complexity: 1880 bits
Moderate Complexity: 3760 bits
High Complexity: 5160 bits
0.
2500.
0.2
5000.
7500.
Training Episode
10 000.
0.
(a)
(b)
Figure 4: Plots of the value-of-information learning process. (a) Plot of the smoothed average original game score versus the number of episodes for
different levels of complexity. This plot shows that lower complexity policies initially perform better than higher complexity ones due to a coarser
quantization of the joint state-action space. The original scores versus the number of episodes for the best tested epsilon-greedy and soft-max
exploration parameters are also shown in (a). (b) Plot of the smoothed, normalized average exploration amount versus the number of episodes for the
value of information. This plot shows where the value of information is on the abnormal branch throughout training. Lower-risk policies move
quickly away from the abnormal branch (one) toward the normal branch (zero). In both (a) and (b), results for the low-, moderate-, and
high-complexity policies are represented using blue, green and red curves, respectively. In (a), results for epsilon-greedy and soft-max exploration
and represented using yellow and purple curves, respectively. Darker lines show the average obtained over the independent trials. The lower and
upper boundaries of the shaded area represent the 10 percentile (z score: -1.25) and 90 percentile (z score: 1.25) of the various quantities,
respectively.
therefore defaults to evading the enemies whenever possible, which is illustrated in figure 3(a). It is not until those
situations where the agent becomes trapped between two or more vulnerable ghosts that the policy shifts to actively
eating ghosts. Being surrounded by ghosts is a somewhat rare occurrence, though, as the agent quickly learns to
outpace them. We found that short-term increases in the learning rate helped to increase the adoption rate of this
multi-modal behavior.
By around episode 7000 to 9500, the policies compel the agent to seek out ghosts whenever a power pellet is
activated. This is demonstrated in figure 3(b), where the agent goes after two ghosts in rapid succession. We observed
that only moderate- and high-complexity policies led the agents to chase vulnerable ghosts. High-complexity policies
took the longest to implement this behavior, as shown in tables A.3(a)–A.3(c). They tended to lead to far superior
strategies, though, after a sufficient number of episodes. This was due to a thorough investigation of the action space
brought about by the high amount of risk. Low-complexity policies, in comparison, were too risk-adverse to stray
from the initially learned behaviors. Moreover, the state-action space was too coarsely quantized to permit adequate
action specialization to the relevant states.
These capabilities arose due to increased weighting of certain features. When comparing the feature weights in
figures 1 and 2 to those in figure 3, it can be seen that the distance and direction to the nearest ghosts and power pellets
become more prominent. The agent is not only trying to determine if it should head to the nearest power pellet, but
also if there are any nearby ghosts for it to consume once it does. The feature associated with ghost vulnerability also
had a larger influence over the action choices.
We observed that that moderate-complexity searches led to larger initial increases of these feature values than
higher-complexity searches when this skill was implemented. Better scores are therefore produced during this time.
This was to be expected, since the action space could be more quickly explored for the latter case. Moreover, once the
agent found a state-action correspondence that led to good rewards, it would be more inclined to retain that correspondence versus choosing a different action. Repeatedly selecting different actions does offer some benefit, however. It
leads to a more thorough investigation of the joint space and, with enough experience, a better understanding of the
environment dynamics. High-complexity policies therefore will have higher feature weights than other types later in
the learning process; they hence will yield superior multi-modal behaviors.
Removing the power-pellet-steps-remaining feature and restarting the simulations led to a modest learning-rate
improvement for low-complexity policies. In fact, removing all of the power-pellet features allowed for the formation
of pellet-seeking and ghost-avoidance behaviors more quickly in the low-risk case. For the higher-complexity cases,
removing the former feature had a detrimental impact. The agent would chase after ghosts right until the effects of the
power pellet wore off. They would therefore often be trapped by two or more nearby ghosts.
Summary. In this subsection, we covered basic game-playing behaviors that emerge during the simulations:
seeking pellets and avoiding ghosts. We showed that this functionality arose due to an increased reliance on subsets
of features used to represent the state space. The rate at which these features rose to prominence depended on the risktaking parameter. Lower amounts of risk typically yielded faster feature-usage rates than higher amounts of risk. Only
around 1000 episodes were needed before such behaviors could reliably clear the pellets on the initial levels. This
was due to a coarse quantization of the action-state space, which could be thoroughly investigated in a relatively few
number of episodes. Higher amounts of risk required more training episodes, typically on the order of 1000 to 2000.
However, the behaviors could be refined to a greater degree for these cases, leading to better game-play performance.
We also covered two other behaviors could emerge: consuming fruit bonus items and chasing after vulnerable
ghosts after eating power pellets. Both behaviors reliably materialized after around 3000 and 7000 episodes, respectively, for moderate and high policy complexities. This was due to a fine quantization of the action-state space, which
permitted adequate specialization of action responses. It was also a byproduct of a high level of action-selection risk
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
14
and hence experimenting with different strategies. Low complexity policies, in contrast, rarely implemented these two
behaviors. This stemmed from an insufficient amount of action exploration.
4.2.2 Policy Performance
The next aspect of the value of information that we consider is the relationship between risk and the obtainable
score. We also analyze how such scores were obtained by looking at properties of the normal and abnormal branches,
along with game-play metrics.
Agent Score Analysis. Figure 4(a) highlights the policies’ original game scores across 12000 episodes for 25
independent trials. Figure 4(b) provides a plot of the normalized exploration amount on the abnormal branch across
12000 episodes for 25 independent trials. In figure 4(b), values close to one indicate a high amount of risk and hence
exploration. Values close to zero correspond with low amounts of risk in the action-selection process and an exploitation of learned behaviors.
Figure 4(a) shows a sharp increase in rewards for all three policy complexities at the beginning of the learning process. This is due to the implementation of beneficial early-game behaviors. Figure 4(b) captures that these behaviors
materialized due to a period of high exploration in the joint state-action space.
When considering an initial policy complexity of 5160 bits, the agent’s performance is worse than for either 1880
or 3760 bits over the first 6000-7000 episodes. This is to be expected, as the policy solution space is being finely
searched. The agent is therefore often attempting actions that deviate from the prescribed policy. Few behaviors are
retained across multiple episodes at this stage. Figure 4(b) corroborates this claim. It shows that the high-complexity
policy entries, and hence the action-value function estimates, are continuously revised. The search process is far into
the abnormal branch during this time.
During the first 3000 episodes, high-complexity policies tend to leave more islands of pellets than the lowercomplexity cases, as indicated in tables A.4(a)–A.4(c) of an associated online appendix. The agent also routinely out
paces the ghosts, which is highlighted in table A.1(c). However, this is a marked decrease from the balanced-search
case statistics given in table A.1(a) and A.1(b). Additionally, the agent also maneuvers to adjacent tunnels more
slowly than the balanced-search case if it detects that one or more ghosts are present in the current tunnel. This is
highlighted in tables A.5(a)–A.5(c). In short, high-complexity policies yield behaviors that lower the agent’s chances
of successfully completing the level early in the training process. This explains why the score is low for such policies
at this stage of learning.
Given enough time to explore the space, though, high-complexity policies will perform just as well if not better than those of lower complexity. This typically occurs after 7000 to 8000 episodes. During this period, the highcomplexity policies start to more aggressively chase after vulnerable ghosts over longer distances, as illustrated in
tables A.3(a)–A.3(c). More ghosts are eaten per power pellet too, which can be seen from tables A.6(a)–A.6(c). The
statistics in tables A.2(a)–A.2(c) indicate that the agents also pursue fruit bonus items over longer distances, thereby
further improving the chance for large score improvements. Lastly, due to a refinement of the basic game-playing
behaviors, the agents cleared more levels of pellets in a single episode. We refer to tables A.7(a)–A.7(c) for the details.
All of these improvements were possible due to a thorough exploration of the action space. They also came about
since the period of exploration was long enough to adjust to the multi-modal environment dynamics. Annealing the
policy complexity additionally helped enable the agent to retain the highest-performing actions for each state group.
When considering an initial policy complexity 1880 bits, the performance improved in the first 3000 episodes
compared to when 3760 or 5160 bits were used. The policy solution space is being coarsely searched in this case,
which can be inferred from figure 4(b). The agent will only possess the most basic behaviors for winning the game,
though, which include navigating to the nearest pellets and fleeing nearby ghosts. Rarely will these abilities be honed
so that the agent consistently clears many levels as training progresses. This is because the amount of exploration is
much lower in the later stages of learning, as indicated in figure 4(b), which prohibits the acquisition of new behaviors.
The cost to transform the policy across episodes is also greater, which causes a shift away from the abnormal branch
toward the normal branch.
During the first 3000 episodes, low-complexity policies outperform both moderate- and high-complexity policies.
For instance, such policies typically remain more grid cells away from ghosts, which is noted in tables A.1(a)–A.1(c).
It also takes, on average, fewer steps for the agent to evade ghosts by move to an empty tunnel. This is highlighted in
tables A.5(a)–A.5(c). Both these statistics indicate that the agent will not be as easily caught in coordinated attacks
from the ghosts. Lastly, such policies leave fewer islands of pellets than the moderate-complexity case, as shown in
tables A.4(a)–A.7(c). Backtracking through the level is thus less necessary, which reduces the agent’s risk of dying.
After about 3000 episodes, the performance of low-complexity policies lags behind the others. This is due to a
few factors. First, moderate- and high-complexity policies tend to visit more levels per episode, as noted in tables
A.7(a)–A.7(c). More pellets are consumed, which naturally improves the score. These higher-complexity policies
also implement fruit-chasing behaviors. Since fruits are worth more in later levels, there is a potential for large score
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
15
jumps. Secondly, low-complexity policies never capitalize on the relationship between power pellets and vulnerable
ghosts. These policies therefore miss out on another score-increasing opportunity.
Score Comparisons. As shown in figure 4(a), the agent is able to accrue an average of about 20000 points after
12000 episodes. This score is competitive with the contest-winning scores of some of the earliest IEEE CEC and CIG
Ms. Pac-Man competitions [3]. It is several thousand points away from the best scores obtained in later competitions,
though; many of the competitor’s approaches could reach scores in the 30000 point range.
It is important to note that such scores are not necessarily the best that can be obtained by our methodology. Figure 4(b) indicates that the highest-complexity policy is being adapted a fair amount once 12000 episodes is reached. It
is possible that additional refinements to the game-play behaviors can be made after this point in the learning process.
We tested this hypothesis by increasing the learning period duration from 12000 to 25000 episodes for the highestcomplexity policy. After 25000 episodes, the agent was achieving average scores of approximately 58000 points,
indicating that it had adjusted better to the game-play dynamics. The best score that we obtained from this policy, out
of ten independent games with three initial lives, was 69210. This score is competitive with other approaches that
rely on a similar simulation environment. For exmaple, the best sores obtained in the IEEE CIG 2009, 2010, and 2011
competitions were 30010 (H. Matsumoto, et al.), 21250 (M. Emilio, et al.), and 26280 points (N. Ikehata and T. Ito),
respectively. Ten Monte Carlo trials were run for each of the entries of these competitions, and only the highest score
from the trials was used as a basis for comparison. Our scores also exceed those of the recent entry by Foderaro, et al.
[32], who published an agent that could obtain 44630 points.
Summary. In this subsection, we assessed the scoring performance of the policies for different levels of risk. Our
results illustrate that low-risk policies tended to increase the accrued rewards at a much faster pace than higher-risk
policies during the first 1000 to 2500 episodes. This performance improvement rate was possible due to a coarse quantization of the action-state space, which could be explored quickly. We additionally showed that the score increases
were connected with leaving fewer islands of pellets and quickly darting into tunnels that are not occupied by ghosts.
After this time, such low risk policies lagged, which was caused by a lack of adequate action specialization to
different environment configurations. Both moderate- and high-risk policies dominated due the increased scores
from consuming fruit bonus items and vulnerable ghosts. Eventually, high-risk policies produced the best results,
as the agent’s behaviors were steadily refined across episodes 7000 to 12000. Large score improvements were seen
during this time. The improvement for moderate-risk policies, in contrast, slowed after around 10000 episodes. This
occurred because such searches eventually became too risk adverse to yield significant behavior improvements.
These results signal that the risk hyperparameter directly influences many factors of the learning process. We will
be using this knowledge in our future endeavors to determine how to automatically adjust the hyperparameter so as to
optimally improve the score across each episode.
4.2.3 Methodological Comparisons
In the two previous subsections, we have detailed the effects of risk on the agent’s performance. We now highlight
how this performance compares with existing reinforcement-learning search mechanisms. We utilize two prominent
stochastic schemes: epsilon-greedy exploration and soft-max-based exploration.
Epsilon-Greedy Exploration Comparisons. Epsilon-greedy exploration is based on the notion that random
actions should be taken at random times. The choice of when to take a random action is governed by single parameter.
It is well known that this type of approach can converge to optimal values, in certain situations, as the number of
episodes grows [51]. For our application, this did not occur. The average scores are reported in table A.8(a) of an
associated online appendix when annealing from an epsilon parameter value of 1.0 to 0.5. This corresponds to the
situation of selecting a random action after every two steps. Increasing the final value of the annealed parameter to
0.7, which encourages a high degree of exploration, led to worse results. These results are presented in table A.8(b).
Decreasing the final annealed parameter value to 0.3, which promotes exploitation, yielded a marginal improvement,
as we show in table A.8(c); comparisons are provided in figure 4(a). Learning over anywhere from two to four times
more episodes did little to enhance the agent’s performance. Adjusting the learning rate and discount factor had only a
marginal impact as well.
One of the changes that we found to work well involved a constant annealing of epsilon from 1.0 to 0.05 during
training. This case corresponds to initially choosing a random action at every step to only choosing a random action
every twenty steps. We found that this amount of exploration enabled the agent to implement basic game-play behaviors of pellet seeking and ghost avoidance at almost the same rate as policies using the value of information. This was
because the policies would often retain good behaviors.
Soft-Max Exploration Comparisons. Part of the reason why epsilon-greedy exploration performs poorly is that
there is no weighting of the actions being considered. The influence of the state-action pairs on the expected returns
should, at the very least, guide the selection of appropriate actions, as in soft-max-based exploration. In our application, implementing soft-max-based exploration yielded modest benefits. When annealing the exploration-parameter
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
16
value from 1.0 to 0.5, the average scores were higher than epsilon greedy across almost all of the episodes, as indicated in table A.9(a). This parameter value corresponds to an even mixture of exploration and exploitation. Biasing
toward the best-performing action, with a final annealed parameter value of 0.3, led to slightly better scores. This is
highlighted in table A.9(c); it is also presented in figure 4(a). Promoting near-equi-probable action selection, with a
final annealed parameter value of 0.7, led to the rewards reported in table A.9(b). While these policies outperform
those from epsilon-greedy exploration, they behaved worse than those produced by the value of information. Moreover, they did not implement any fruit-chasing capabilities.
Neither epsilon-greedy- nor soft-max-based policies implemented multi-modal agent behaviors well in the number of training episodes that we considered. The agents would often avoid vulnerable and invulnerable ghosts alike.
This was largely expected, as such exploration schemes tend to define monolithic policies. Without either substantially more training episodes or the use of learning heuristics like action replay, it would be difficult for these schemes
to promote the formation of multi-modal policies.
Comparison Explanations. For these simulations, value-of-information-based policies performed better because
they induce a non-linear quantization of the state-action space according to the action-value function. The magnitude
of the risk-taking parameter dictates the number of state clusters that are formed. The policy-complexity values that
we considered were less than the state random-variable entropy, which led to a partitioning of the space. Much less
effort was required to perform reinforcement learning over this partitioned space. Both epsilon-greedy and soft-max
selection, in contrast, correspond to the value of information with a policy complexity equal to the state randomvariable entropy. No quantization is performed in this case, and each state must be visited to be paired with an action.
A great deal of agent-environment interactions are required for the agent to arrive at meaningful action-value function
estimates.
Another reason why the value of information performed well is that it inherently accounts for the deviations in
expected utility, or risk, when choosing actions. The value of information also weights action choices differently in
risk-adverse situations compared to risk-favoring cases. Both of these properties ensure that the value of information
is maximizing the action-value function over the potential outcomes at an optimal rate.
Many previous works suggest that risk is also connected with high-order culmulants of the utility function. In
our case, we use a conditional Shannon entropy difference to model the risk, or uncertainty, associated with deviating from the supplied prior policy. It is well known that entropy accounts for all statistical moments [6]. Value-ofinformation-based agents hence operate with complete knowledge of the uncertainty associated with a particular
action choice. Other exploration approaches often account for risk using, at most, only a single statistical moment.
Some methods, such as epsilon-greedy, do not rely on any moments of the utility function. The rate at which such
methods converge to optimal value functions can lag significantly behind the value of information, which we surmise
is due to not accounting for uncertainty in the action-selection process.
Summary. We have shown that the value of information leads to the timely formation of high-performing policies.
Comparatively, two of the most popular exploration heuristics, epsilon-greedy and soft-max selection, return subpar policies. This is because they do not have the ability to quantize the state-action space and therefore must search
over the entirety of it. It is also because these methods are not entirely risk sensitive. Although some methods, like
soft-max selection, do weight action choices by their expected utility, they reason about risk in a symmetric manner.
Asymmetry in risk-based decision making is needed for optimal decision-making under uncertainty [36].
In our future endeavors, we will demonstrate that this performance improvement occurs because such heuristics
do not induce an aggregation of Markov chains underlying the Markov decision processes. The value of information,
in contrast, performs this type of dynamics reduction, which further explains why it is quicker at uncovering good
policies.
5 Conclusions
In this paper, we have considered an information-theoretic approach for either promoting or eschewing risky agent
behaviors during reinforcement learning. Our approach is based on a value-of-information criterion, which optimally
trades off between information and expected rewards.
The value of information can be utilized within a variety of dynamical-systems-based decision-making frameworks. When applied to Markov decision processes, the criterion quantifies the expected improvement in rewards that
can be achieved for probabilistic policies of a specified complexity.
The value of information possesses a free hyperparameter whose value must be selected. This parameter dictates
the amount of policy quantization. For the first form of this criterion, small parameter values correspond with lowcomplexity policies. It also corresponds with risk-avoiding agent behaviors. Higher parameter values lead to lower
policy compression levels. Agents are more likely to frequently take risks in these cases, which can promote the
formation of multi-modal strategies. What constitutes large and small values depends on the problem domain.
To gauge the performance of the value of information, we considered the creation of Ms. Pac-Man agents. We
showed that the risk hyperparameter had a profound influence on the policy return quality for this game. High levels
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
17
of risk yielded policies whose expected reward approached those for the optimal solution. They also facilitated the
switching of game-play strategies, which, for this environment, involved chasing vulnerable ghosts. A great many
learning episodes were needed to construct such multi-modal policies, though. Lower levels of risk allowed for the
quick generation of policies that performed reasonably well. As the number of episodes increased, the policies’ qualities lagged behind those found with higher levels of risk. They were also unable to reliably produce multi-modal
game-play strategies.
These findings indicate that the value of information offers a good framework to understand the variables at play.
We have only a single hyperparameter whose value must be chosen. This hyperparameter dictates a great deal of functionality, such as the amount of action-selection risk and hence the amount of exploration. Many other approaches for
producing Ms. Pac-Man agents have multiple parameters and hyperparameters whose values must be chosen. Such a
large number of parameters makes the connections between scores and variable values more difficult to understand. It
can also impede the construction of automated, principled parameter-tuning methods.
In our simulations, we additionally compared the results of value-of-information-based exploration with two other
reinforcement-learning search mechanisms: soft-max-based and epsilon-greedy action selection. Both schemes produced worse policies. They also did not implement multi-modal behaviors. This is because such selection procedures
assume that the policies can be unboundedly complex. A great many episodes would therefore be needed to explore
the joint state-action space. For many problems, value-of-information-based policies with finite complexity can approach the same levels of performance in fewer episodes. This is because not every state in a given problem may need
to be paired with a unique action. It may hence be possible to group several states and assign them the same action
without impacting performance.
These comparative results illustrate that the value-of-information criterion’s merger of prospect theory and utility
theory with uncertainty provides an excellent means of addressing the exploration dilemma. Neither epsilon-greedy
exploration nor soft-max selection, in contrast, let alone many other search mechanisms, adequately account for
uncertainty when choosing actions. They can therefore be ill equipped to understand the dynamics of highly complex,
stochastic environments like the Ms. Pac-Man game world in only a few episodes.
Our emphasis in this paper has been on demonstrating that the value of information provides a principled trade-off
between exploration and exploitation. Our future endeavors will involve extensions of this criterion to effectively
address many classes of problems. One extension will a more principled selection of the criterion’s free hyperparameter. Currently, we manually specified an initial value based upon the early simulation results. For certain domains,
however, such trial-and-error-based testing may be prohibitively time consuming.
To sidestep this issue, we will investigate information-theoretic approaches for adapting the parameter value.
A useful procedure may be to choose values that monotonically decrease the action-state entropy. By minimizing
entropy, we are forcing the policies to eventually become deterministic. No further risks will need to be taken by the
agent, as complete knowledge of that environment will have been obtained. Another possibility would be to utilize
the policy cross-entropy to tune the hyperparameter value. Policy cross-entropy can be viewed as a bounded measure
of how much the policy is changing across episodes. By adjusting the hyperparameter value so that the policy crossentropy does not stagnate early in the learning process, we can be assured that a thorough exploration of the joint
space will be being conducted. Moreover, high-performing policies should be found much more quickly than by a
naive annealing procedures, such as the one that we considered.
References
[1] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction. Cambridge, MA, USA: MIT Press,
1998.
[2] L. P. Kaelbling, M. L. Littman, and A. W. Moore, “Reinforcement learning: A survey,” Journal of Artificial
Intelligence Research, vol. 4, no. 1, pp. 237–285, 1996. Available: http://dx.doi.org/10.1613/jair.301
[3] P. Rohlfshagen, J. Liu, D. Perez-Liebana, and S. M. Lucas, “Pac-Man conquers academia: Two decades of
research using a classic arcade game,” IEEE Transactions on Computational Intelligence and AI in Games, pp.
1–25, 2017, (accepted, in press).
[4] J. Schrum and R. Miikkulainen, “Discovering multimodal behavior in Ms. Pac-Man through evolution of modular
neural networks,” IEEE Transactions on Computational Intelligence and AI in Games, vol. 8, no. 1, pp. 67–81,
2016. Available: http://dx.doi.org/10.1109/TCIAIG.2015.2390615
[5] ——, “Solving multiple isolated, interleaved, and blended tasks through modular neuroevolution,” Evolutionary
Computation, vol. 24, no. 3, pp. 459–490, 2016. Available: http://dx.doi.org/10.1162/EVCO_a_00181
[6] J. C. Príncipe, Information Theoretic Learning. New York City, NY, USA: Springer-Verlag, 2010.
[7] R. L. Stratonovich, “On value of information,” Izvestiya of USSR Academy of Sciences, Technical Cybernetics,
vol. 5, no. 1, pp. 3–12, 1965.
[8] R. L. Stratonovich and B. A. Grishanin, “Value of information when an estimated random variable is hidden,”
Izvestiya of USSR Academy of Sciences, Technical Cybernetics, vol. 6, no. 1, pp. 3–15, 1966.
[9] R. L. Stratonovich, Information Theory. Moscow, Soviet Union: Sovetskoe Radio, 1975.
[10] S. M. Lucas, “Evolving a neural network location evaluator to play Ms. Pac-Man,” in Proceedings of the IEEE
Symposium on Computational Intelligence and Games (CIG), Colchester, UK, April 4-6 2005, pp. 203–210.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
18
[11] M. Wittikamp, L. Barone, and P. Hingston, “Using NEAT for continuous adaptation and teamwork formation in
Pac-Man,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Perth,
Australia, December 15-18 2008, pp. 234–242. Available: http://dx.doi.org/10.1109/CIG.2008.5035645
[12] M. Gallagher and M. Ledwich, “Evolving Pac-Man players: Can we learn from raw input?” in Proceedings of the
IEEE Symposium on Computational Intelligence and Games (CIG), Honolulu, HI, USA, April 1-5 2007, pp.
282–287. Available: http://dx.doi.org/10.1109/CIG.2007.368110
[13] R. Thawonmas and T. Ashida, “Evolution strategy for optimizing parameters in Ms. Pac-Man controller ICE
Pambush 3,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG),
Copenhagen, Denmark, August 18-21 2010, pp. 235–240. Available:
http://dx.doi.org/10.1109/ITW.2010.5593350
[14] A. M. Alhejali and S. M. Lucas, “Using a training camp with genetic programming to Ms. Pac-Man agents,” in
Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Seoul, South Korea,
August 31-September 3 2011, pp. 118–125. Available: http://dx.doi.org/10.1109/CIG.2011.6031997
[15] M. F. Brandstetter and S. Ahmadi, “Reactive control of Ms. Pac-Man using information retrieval based on genetic
programming,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG),
Granada, Spain, September 11-14 2012, pp. 250–256. Available: http://dx.doi.org/10.1109/CIG.2012.6374163
[16] M. Gallagher and A. Ryan, “Learning to play Pac-Man: An evolutionary, rule-based approach,” in Proceedings of
the IEEE Congress on Evolutionary Computation (CEC), Canberra, Australia, December 8-12 2003, pp.
2462–2469. Available: http://dx.doi.org/10.1109/CEC.2003.1299397
[17] P. Rohlfshagen and S. M. Lucas, “Ms. Pac-Man versus Ghost Team CEC 2011 competition,” in Proceedings of the
IEEE Congress on Evolutionary Computation (CEC), New Orleans, LA, USA, June 5-8 2011, pp. 70–77.
Available: http://dx.doi.org/10.1109/CEC.2011.5949599
[18] A. Fitzgerald and C. B. Congdon, “RAMP: A rule-based agent for Ms. Pac-Man,” in Proceedings of the IEEE
Congress on Evolutionary Computation (CEC), Trondheim, Norway, May 18-21 2009, pp. 2646–2653. Available:
http://dx.doi.org/10.1109/CEC.2009.4983274
[19] N. Wirth and M. Gallagher, “An influence map model for playing Ms. Pac-Man,” in Proceedings of the IEEE
Symposium on Computational Intelligence and Games (CIG), Perth, Australia, December 15-18 2008, pp.
228–233. Available: http://dx.doi.org/10.1109/CIG.2008.5035644
[20] D. J. Gagne and C. B. Congdon, “FRIGHT: A flexible rule-based intelligent ghost team for Ms. Pac-Man,” in
Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Granada, Spain,
September 11-14 2012, pp. 273–280. Available: http://dx.doi.org/10.1109/CIG.2012.6374166
[21] P. Burrow and S. M. Lucas, “Evolution versus temporal difference learning for learning to play Ms. Pac-Man,” in
Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG), Milan, Italy, September
7-10 2009, pp. 53–60. Available: http://dx.doi.org/10.1109/CIG.2009.5286495
[22] L. L. DeLooze and W. R. Viner, “Fuzzy Q-learning in a nondeterministic environment: Developing an intelligent
Ms. Pac-Man agent,” in Proceedings of the IEEE Symposium on Computational Intelligence and Games (CIG),
Milan, Italy, September 7-10 2009, pp. 162–169. Available: http://dx.doi.org/10.1109/CIG.2009.5286478
[23] S. Griffith, K. Subramanian, J. Scholz, C. Isbell, and A. L. Thomaz, “Policy shaping: Integrating human feedback
with reinforcement learning,” in Advances in Neural Information Processing Systems (NIPS), C. J. C. Burges,
L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, Eds. Cambridge, MA, USA: MIT Press, 2013, pp.
2625–2633.
[24] A. Vezhnevets, V. Mnih, S. Osindero, A. Graves, O. Vinyals, J. Agapiou, and K. Kavukcuoglu, “Strategic attentive
writer for learning macro-actions,” in Advances in Neural Information Processing Systems (NIPS), D. D. Lee,
M. Sugiyama, U. V. Luxburg, I. Guyon, and R. Garnett, Eds. Cambridge, MA, USA: MIT Press, 2016, pp.
3486–3494.
[25] J. Oh, X. Guo, H. Lee, R. L. Lewis, and S. Singh, “Action-conditional video prediction using deep networks in
Atari games,” in Advances in Neural Information Processing Systems (NIPS), C. Cortes, N. D. Lawrence, D. D.
Lee, M. Sugiyama, and R. Garnett, Eds. Cambridge, MA, USA: MIT Press, 2015, pp. 2863–2871.
[26] H. P. van Hasselt, A. Guez, M. Hessel, V. Mnih, and D. Silver, “Learning values across many orders of
magnitude,” in Advances in Neural Information Processing Systems (NIPS), D. D. Lee, M. Sugiyama, U. V.
Luxburg, I. Guyon, and R. Garnett, Eds. Cambridge, MA, USA: MIT Press, 2016, pp. 4287–4295.
[27] D. Robles and S. M. Lucas, “A simple tree search method for playing Ms. Pac-Man,” in Proceedings of the IEEE
Symposium on Computational Intelligence and Games (CIG), Milan, Italy, September 7-10 2009, pp. 249–255.
Available: http://dx.doi.org/10.1109/CIG.2009.5286469
[28] N. Ikehata and T. Ito, “Monte Carlo tree search in Ms. Pac-Man,” in Proceedings of the IEEE Symposium on
Computational Intelligence and Games (CIG), Seoul, South Korea, August 31-September 3 2011, pp. 39–46.
Available: http://dx.doi.org/10.1109/CIG.2011.6031987
[29] S. Samothrakis, D. Robles, and S. M. Lucas, “Fast approximate Max-n Monte Carlo tree search for Ms. Pac-Man,”
IEEE Transactions on Computational Intelligence and AI in Games, vol. 3, no. 2, pp. 142–154, 2011. Available:
http://dx.doi.org/10.1109/TCIAIG.2011.2144597
[30] C. Browne, E. Powley, D. Whitehouse, S. Lucas, P. I. Cowling, P. Rohlfshagen, S. Tavener, D. Perez,
S. Samothrakis, and S. Colton, “A survey of Monte Carlo tree search methods,” IEEE Transactions on
Computational Intelligence and Artificial Intelligence in Games, vol. 4, no. 1, pp. 1–49, 2012. Available:
http://dx.doi.org/10.1109/TCIAIG.2012.2186810
[31] T. Pepels, M. H. M. Winands, and M. Lanctot, “Real-time Monte Caro tree search in Ms. Pac-Man,” IEEE
Transactions on Computational Intelligence and AI in Games, vol. 6, no. 3, pp. 245–257, 2014. Available:
http://dx.doi.org/10.1109/TCIAIG.2013.2291577
[32] G. Foderaro, A. Swingler, and S. Ferrari, “A model-based cell decomposition approach to on-line pursuit-evasion
path planning and the video game Ms. Pac-Man,” in Proceedings of the IEEE Symposium on Computational
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
19
Intelligence and Games (CIG), Granada, Spain, September 11-14 2012, pp. 281–287. Available:
http://dx.doi.org/10.1109/CIG.2012.6374167
——, “A model-based approach to optimizing Ms. Pac-Man game strategies in real time,” IEEE Transactions on
Computational Intelligence and AI in Games, 2016, (accepted, in press). Available:
http://dx.doi.org/10.1109/TCIAIG.2016.2523508
J. von Neumann and O. Morgenstern, Theory of Games and Economic Behavior. Princeton, NJ, USA: Princeton
University Press, 2007.
R. V. Belavkin, “Optimal measures and Markov transition kernels,” Journal of Global Optimization, vol. 55, no. 2,
pp. 387–416, 2013. Available: http://dx.doi.org/10.1007/s10898-012-9851-1
——, “Asymmetry of risk and value of information,” in Dynamics of Information Systems, C. Vogiatzis,
J. Walteros, and P. Pardalos, Eds. New York, NY, USA: Springer-Verlag, 2014, pp. 1–20.
M. Allais, “Le comportement de l’homme rationnel devant le risque: Critique des postulats et axiomes de l’Ecole
americaine,” Econometrica, vol. 21, no. 4, pp. 503–546, 1953. Available: http://dx.doi.org/10.2307/1907921
S. Huck and W. Müller, “Allais for all: Revisiting the paradox in a large representative sample,” Journal of Risk
and Uncertainty, vol. 44, no. 3, pp. 261–293, 2012. Available: http://dx.doi.org/10.1007/s11166-012-9142-8
D. Kahneman and A. Tversky, “Prospect theory: An analysis of decision under risk,” Econometrica, vol. 47, no. 2,
pp. 263–292, 1979. Available: http://dx.doi.org/10.2307/1914185
I. J. Sledge and J. C. Príncipe, “Using the value of information to explore stochastic, discrete multi-armed
bandits,” Entropy, 2017, (under review). Available: https://arxiv.org/abs/1710.02869
I. J. Sledge, M. S. Emigh, and J. C. Príncipe, “Guided policy exploration for Markov decision processes using an
uncertainty-based value-of-information criterion,” IEEE Transactions on Neural Networks and Learning Systems,
2017, (under review). Available:
https://www.dropbox.com/s/1v2wo4bn2szdcm4/Sledge-TNN-2017-1col-2.pdf?dl=0
R. E. Bellman, Dynamic Programming. Mineola, NY, USA: Dover Publications, 2003.
R. S. Sutton, “Learning to predict by the methods of temporal differences,” Machine Learning, vol. 3, no. 1, pp.
9–44, 1988. Available: http://dx.doi.org/10.1023/A:1022633531479
C. J. C. H. Watkins and P. Dayan, “Q-learning,” Machine Learning, vol. 8, no. 3, pp. 279–292, 1992. Available:
http://dx.doi.org/0.1023/A:1022676722315
M. Wiering and J. Schmidhuber, “Fast online Q(λ),” Machine Learning, vol. 33, no. 1, pp. 105–115, 1998.
Available: http://dx.doi.org/10.1023/A:1007562800292
N. Tishby and D. Polani, “Information theory of decisions and actions,” in Perception-Reason-Action Cycle:
Models, Algorithms and Systems, V. Cutsuridis, A. Hussain, and J. G. Taylor, Eds. New York City, NY, USA:
Springer, 2010, pp. 601–636. Available: http://dx.doi.org/10.1007/978-1-4419-1452-1
J. Rubin, O. Shamir, and N. Tishby, “Trading value and information in MDPs,” in Decision Making with Imperfect
Decision Makers, T. V. Guy, M. Kárný, and D. H. Wolpert, Eds. New York City, NY, USA: Springer, 2012, pp.
57–74. Available: http://dx.doi.org/10.1007/978-3-642-24647-0
I. J. Sledge and J. C. Príncipe, “Balancing exploration and exploitation in reinforcement learning using a value of
information criterion,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal
Processing (ICASSP), New Orleans, LA, USA, March 5-9 2017, pp. 1–5. Available:
http://dx.doi.org/10.1109/ICASSP.2017.7952670
S. P. Singh, T. Jaakkola, M. L. Littman, and C. Szepesvári, “Convergence results for single-step on-policy
reinforcement-learning algorithms,” Machine Learning, vol. 38, no. 3, pp. 287–308, 2000. Available:
http://dx.doi.org/10.1023/A:1007678930559
M. S. Emigh, E. G. Kriminger, A. J. Brockmeier, J. C. Príncipe, and P. M. Pardalos, “Reinforcement learning in
video games using nearest neighbor interpolation and metric learning,” IEEE Transactions on Computational
Intelligence and AI in Games, vol. 8, no. 1, pp. 56–66, 2014. Available:
http://dx.doi.org/10.1109/TCIAIG.2014.2369345
J. N. Tsitsiklis, “Asynchronous stochastic approximation and Q-learning,” Machine Learning, vol. 16, no. 3, pp.
185–202, 1994. Available: http://dx.doi.org/10.1023/A:1022689125041
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
20
Results Supplement
(a)
(a)
Agent-Ghost Distance,
Low-Complexity
Episode
Avg. Distance
0 to 1000
1001 to 2000
2001 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
7.72 ± 2.39 cells
7.91 ± 2.54 cells
8.23 ± 2.77 cells
9.75 ± 2.91 cells
10.13 ± 3.09 cells
10.28 ± 3.18 cells
(b)
Agent-Ghost Distance,
Moderate-Complexity
Episode
Avg. Distance
0 to 1000
1001 to 2000
2001 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
6.55 ± 2.23 cells
7.96 ± 2.56 cells
8.49 ± 3.08 cells
9.15 ± 3.57 cells
10.43 ± 3.85 cells
11.18 ± 4.20 cells
Agent-Ghost Distance,
(c)
High-Complexity
Episode
Avg. Distance
0 to 1000
1001 to 2000
2001 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
5.96 ± 2.62 cells
6.28 ± 2.84 cells
8.83 ± 2.92 cells
10.50 ± 3.23 cells
11.32 ± 4.38 cells
12.04 ± 4.81 cells
Table A.1: Episode-averaged agent-ghost
distance.
Fruit-Chasing Distance,
(a)
Low-Complexity
Episode
Avg. Distance
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.00 ± 0.00
0.00 ± 0.00
0.54 ± 0.27
0.87 ± 0.45
(b)
cells
cells
cells
cells
Fruit-Chasing Distance,
Moderate-Complexity
Episode
Avg. Distance
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.68 ± 0.17
2.75 ± 1.92
5.46 ± 2.23
8.09 ± 2.84
(c)
cells
cells
cells
cells
Fruit-Chasing Distance,
High-Complexity
Episode
Avg. Distance
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.43 ± 0.09 cells
1.54 ± 0.97 cells
6.08 ± 2.01 cells
10.61 ± 3.78 cells
Table A.2: Episode-averaged distance that
the agent will travel to seek out fruits.
Vulnerable Ghost-Chasing
Distance, Low-Complexity
Episode
Avg. Distance
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.00 ± 0.00
0.00 ± 0.00
0.15 ± 0.04
0.24 ± 0.09
cells
cells
cells
cells
Vulnerable Ghost-Chasing
(b) Distance, ModerateComplexity
Episode
Avg. Distance
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.35 ± 0.08
2.26 ± 1.55
6.81 ± 2.13
9.44 ± 2.86
(c)
cells
cells
cells
cells
Vulnerable Ghost-Chasing
Distance, High-Complexity
Episode
Avg. Distance
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.27 ± 0.11 cells
1.92 ± 0.74 cells
6.19 ± 2.15 cells
11.27 ± 3.87 cells
Table A.3: Episode-averaged distance that
the agent will travel to seek out the first
vulnerable ghost after consuming a power
pellet.
(a)
Max Number of Pellet
Islands, Low-Complexity
Episode
Max Avg. Islands
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
6.54 ± 2.65
5.63 ± 2.17
5.14 ± 2.06
4.42 ± 1.92
Max Number of Pel(b) let Islands, ModerateComplexity
Episode
Max Avg. Islands
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
7.24 ± 3.10
6.13 ± 2.85
5.91 ± 2.41
4.05 ± 1.73
(c)
Max Number of Pellet
Islands, High-Complexity
Episode
Max Avg. Islands
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
7.81 ± 3.58
7.29 ± 2.96
5.34 ± 2.25
3.79 ± 1.16
Table A.4: Episode-averaged maximum
number of pellet islands that the agent will
leave in an episode after losing a life. A
pellet island is defined as an isolated group
of pellets. Each level initially starts with a
single island of pellets.
(a)
Max Ghost-Avoidance
Time, Low-Complexity
Episode
Max Avg. Time
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
7.88 ± 2.92
6.41 ± 2.70
6.12 ± 2.49
5.93 ± 2.27
steps
steps
steps
steps
Max Ghost-Avoidance
(b) Time, ModerateComplexity
Episode
Max Avg.Time
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
8.60 ± 2.76
7.27 ± 2.53
6.51 ± 2.08
5.18 ± 1.81
(c)
steps
steps
steps
steps
Max Ghost-Avoidance
Time, High-Complexity
Episode
Max Avg. Time
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
8.91 ± 2.97
8.25 ± 2.74
7.32 ± 2.22
5.44 ± 1.69
steps
cells
steps
steps
Table A.5: Episode-averaged maximum
number of actions needed for the agent to
move to a tunnel that is not occupied by a
ghost.
(a)
Ghosts Eaten Per Power
Pellet, Low-Complexity
Episode
Avg. Num. Ghosts
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.00 ± 0.00
0.00 ± 0.00
0.00 ± 0.00
0.09 ± 0.02
(b)
Ghosts Eaten Per Power Pellet, Moderate-Complexity
Episode
Avg. Num. Ghosts
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.49 ± 0.10
0.87 ± 0.16
1.27 ± 0.24
1.42 ± 0.39
(c)
Ghosts Eaten Per Power
Pellet, High-Complexity
Episode
Avg. Num. Ghosts
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
0.38 ± 0.11
1.09 ± 0.20
1.36 ± 0.35
1.64 ± 0.48
Table A.6: Episode-averaged number of
ghosts eaten per power pellet.
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND ARTIFICIAL INTELLIGENCE (ACCEPTED)
(a)
Number of Cleared Levels,
Low-Complexity
Episode
Avg. Num. Levels
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2.17 ± 0.51
3.46 ± 0.91
4.85 ± 1.24
5.64 ± 1.18
(b)
Number of Cleared Levels,
Moderate-Complexity
Episode
Avg. Num. Levels
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
1.74 ± 0.62
4.58 ± 1.11
5.36 ± 1.44
6.41 ± 1.75
(c)
Number of Cleared Levels,
High-Complexity
Episode
Avg. Num. Levels
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
1.32 ± 0.33
3.04 ± 1.20
4.72 ± 1.76
6.87 ± 1.94
Table A.7: Episode-averaged number of
levels cleared before all lives run out.
Epsilon-Greedy Ex(a) ploration Performance,
0 = 1.0 to 12000 = 0.5
Episode
Avg. Score
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2134.10 ± 950.24
3391.53 ± 1234.09
4832.15 ± 1599.87
6061.58 ± 1821.46
Epsilon-Greedy Ex(b) ploration Performance,
0 = 1.0 to 12000 = 0.7
Episode
Avg. Score
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2078.06 ± 823.81
2400.48 ± 1162.98
3527.51 ± 1426.52
5417.72 ± 1313.65
Epsilon-Greedy Ex(c) ploration Performance,
0 = 1.0 to 12000 = 0.3
Episode
Avg. Score
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2274.92 ± 861.44
4689.47 ± 1595.15
6845.03 ± 2023.76
8327.89 ± 2818.82
Table A.8: Episode-averaged score for
epsilon-greedy exploration
Soft-Max Exploration
(a) Performance, τ0−1 = 1.0 to
−1
τ12000
= 0.5
Episode
Avg. Score
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2299.65 ± 835.89
4310.20 ± 1108.55
6548.37 ± 1583.00
8743.26 ± 1932.13
Soft-Max Exploration
(b) Performance, τ0−1 = 1.0 to
−1
τ12000
= 0.7
Episode
Avg. Score
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2346.87 ± 985.18
4340.65 ± 1344.04
5952.14 ± 1731.70
6238.92 ± 1986.54
Soft-Max Exploration
(c) Performance, τ0−1 = 1.0 to
−1
τ12000
= 0.3
Episode
Avg. Score
0 to 3000
3001 to 6000
6001 to 9000
9001 to 12000
2573.43 ± 821.67
4985.13 ± 1023.71
7232.78 ± 1585.32
10292.59 ± 2237.99
Table A.9: Episode-averaged score for
soft-max exploration
21
| 7cs.IT
|
Greedy Variance Estimation for the LASSO
arXiv:1803.10878v1 [math.ST] 28 Mar 2018
Christopher Kennedy∗ and Rachel Ward†
Department of Mathematics, University of Texas at Austin
March 30, 2018
Abstract
Recent results have proven the minimax optimality of LASSO and related algorithms for noisy linear
regression. However, these results tend to rely on variance estimators that are inefficient or optimizations
that are slower than LASSO itself. We propose an efficient estimator for the noise variance in high
dimensional linear regression that is significantly faster than LASSO, only requiring p matrix-vector
multiplications. We prove this estimator is consistent with a good rate of convergence, under the condition
that the design matrix satisfies the Restricted Isometry Property (RIP). In practice, our estimator vastly
outperforms state of the art methods in terms of speed while incurring only a modest bias.
1
Introduction
The LASSO [22] is a classical algorithm for doing noisy linear regression in the case when the number
of regression coefficients is larger than the number of response variables p > n. The analysis of LASSO
has recently surged with much work on establishing oracle inequalities for ℓ2 estimation over sparse
vectors, and corresponding minimax rates. Typically, such results rely on knowledge of the variance of
the noise, which is unknown in practice. The full extent of the literature on LASSO is immense and
beyond the scope of this paper, but we point to a few important references on the oracle inequalities and
corresponding minimax error rates (see [3], [15], [30], [23], [17], [31], [27], [13], [29], [26], [4]).
A good review of variance estimators for LASSO is given in [19], where variance estimation using
cross-validated LASSO is highlighted as particularly strong in many sparsity regimes. This method
typically uses 5 or 10-fold cross-validation to train the hyperparameters in LASSO and analysis relies
on the restricted eigenvalue condition on the design matrix. The above work was later complemented
by a theoretical analysis of a slightly modified variant of cross-validated LASSO in [6] (see also [8] [9],
e.g.). The main drawback of existing methods such as cross-validation for variance estimation is that
they take multiple LASSO estimators to compute. This is costly when the dimensionality of the data
is large. The method of moments (see [7]) is a fast alternative to cross-validated LASSO. It relies on
the assumption that the design matrix is Gaussian and exploits statistical properties to formulate an
estimator. It is consistent with a good rate of convergence [7], but the design matrix has to be Gaussian
which is restrictive. We should also mention a variant of the LASSO - the square-root LASSO (see [2])
- whose penalty level doesn’t depend on the variance of the noise. However, the resulting estimator is
formulated as a conic programming problem which can be inefficient in practice and is beyond the scope
of this work.
1.1
Our Contribution
The main contributions of our a paper are the following:
• We provide an efficient variance estimator. In fact, our variance estimator only requires p matrixvector multiplications. This is a significant improvement over more standard estimators that iterate
the LASSO multiple times with various penalty levels. Our method is faster than a single iteration
of LASSO.
∗ Email:
† Email:
[email protected].
[email protected].
1
• Our estimator is consistent in the sense that it converges in probability to the true variance. We
have a quantitative bound on the rate of convergence.
• We only require a deterministic assumption on the design matrix (the Restricted Isometry Property)
which holds with high probability over many standard matrix ensembles over appropriate parameter
regimes. In particular, the condition holds for any orthonormal design matrix.
Remark 1. Precisely, the term consistent means that for some ρ, c ≥ 0,
sup kb
σ 2 − σ 2 k = 0.
lim
n/p→ρ 0≤σ 2 ≤c
n,p→∞
Moreover, our estimator admits a surprisingly simple theoretical argument for convergence using
standard compressed sensing-type results and concentration of measure. We note that we assume the
design matrix satisfies the restricted isometry property, which is stronger than the restricted eigenvalue
condition typically considered in the literature (see [24] e.g.) but still admits a wide range of random
matrix ensembles.
In practice, although our estimator exhibits a higher bias than more standard estimators like crossvalidated LASSO, it does well in the high-dimensional regime where the cross-validated LASSO and even
the method of moments estimator become prohibitive to compute.
1.2
Notation
For a matrix X ∈ Rn×p , and a subset Ω ⊂ {1, .., p}, XΩ ∈ Rn×|Ω| will denote the restriction of X to its
columns indexed by Ω.
For a vector v ∈ Rp , Ωv is defined to be the support of v.
For each j = 1, ..., p/L, we use Ωj := {(j − 1)L + 1, ..., jL} to denote the jth “window” of the signal.
2
Problem Statement
Suppose β ∈ Rp is s-sparse, and that we are given a noisy, transformed version of this signal:
y = Xβ + η,
where η ∈ Rn has i.i.d. Gaussian entries ηj ∼ N (0, σ 2 ) and X ∈ Rn×p is a known design matrix. For
the purpose of analysis, we define a notion of a well-behaved design matrix X. We will assume that the
matrix X satisfies the Restricted Isometry Property (RIP), which was introduced in [5] and is a common
property used in Compressed Sensing. It guarantees that a matrix is a near-isometry on sparse vectors.
Specifically, we say X satisfies the RIP of order s and level δ > 0 if for all z such that kzk0 ≤ s,
(1 − δ)kzk22 ≤ kXzk22 ≤ (1 + δ)kzk22 .
With high probability, RIP is obtained with
s = s(m, N ) := O(n/ log(p/n))
(1)
on an n × p matrix X whose entries Xi,j are independent realizations of a subgaussian random variable,
such as a Gaussian or Bernoulli random variable [1]. The Restricted Isometry Property is obtained
with high probability on many classes of structured random matrices, such as random partial Fourier
matrices [18, 20], but with a slightly smaller (by factors of log(p)) constant s.
It is in general nontrivial to recover the true signal β. We consider here the standard LASSO algorithm
[22] to return a denoised version of β:
βb = arg min kXβ − yk22 + 2λkβk1 .
β
(2)
The magnitude of the parameter λ in the objective (2) controls the balance between the ℓ1 term which
b and a mean squared error term kXβ − yk22 which promotes
promotes sparsity in the recovered signal β,
consistency with the observed measurements. It is important to balance the two terms appropriately so
that one doesn’t overfit to the transformed signal y but also doesn’t over-enforce sparsity. The standard
analysis of the LASSO is conditioned on the event {λ : λ/4 ≥ kX T ηk∞ /n} (see [3]). In particular,
for the case that η is Gaussian with variance σ 2 and X is orthogonal, with high probability we have
2
kX T k∞ /n = Θ(σ 2 log(n)/n). Thus, with the choice λ = 4σ 2 log(n)/n, the LASSO will provably produce
a good estimate β.
However, in applications, the variance σ, and hence a proper choice of λ, is not known a priori. We
consider the case where σ is not known in advance, and needs to be estimated from the signal y. It should
be clear from the above observations that precision in estimating the parameter σ improves recovery of
the true signal.
3
Greedy Variance Estimation – The Orthonormal Case
For the moment we focus on the case where X ∈ Rp×p is an orthonormal matrix (p = n) and the problem
reduces to recovering the noisy signal y = β +η (by rotational invariance of the Gaussian). In this regime,
the LASSO has the closed form solution
βbi = sign(yi )(|yi | − λ)+ ,
where βbi = βbi (λ) implicitly depends on λ. A standard approach is to minimize the cross-validation error:
b
min ky − β(λ)k
2,
λ
which has nice practical and theoretical properties (see [11] e.g.). Moreover, given the optimal λ one can
infer a good estimate of the variance as kβb − yk2 /p. However, this approach still requires one to compute
the LASSO minimizer over a range of λ values, whereas one would like to perform a single computation
to estimate the variance (and thus optimal λ). We formulate a method to estimate the variance which
only needs a single pass over the input y.
Algorithm 1 Greedy Variance Estimator – Orthonormal Design Matrix
1 P
2
j ∈ {1, 2, . . . , p/L}.
1: Compute the window estimators Sj = L
i∈Ωj |yi | ,
P
p/(2L)
1
2L
c
2
2: Let σ = (1 + log(p) ) p
S(j) , where {S(j) }j is a non-decreasing arrangement of {Sj }j .
j=1
The basic idea behind the above algorithm is that we want to capture a noise estimator that avoids the
entries of y affected by signal (hence in the second step we take the average of the smaller 50% of the
1
window estimates). We multiply the resulting estimator by 1 + log(p)
to correct the downward bias that
results from averaging only over the smallest windows.
Remark 2. (Total variation denoising) Suppose we receive image-type data and instead of taking the
LASSO minimizer we want to instead want to regularize by the total variation seminorm:
βb = arg min kβ − yk22 + 2λTV(β),
β
(3)
P
where TV(β) := n kβn − βn−1 k. The typical assumption in this model is that the discrete derivative of
true signal is sparse, which is promoted by the above objective. In this case, we can apply our estimator
to the discrete derivative (which as observed is essentially a sparse signal plus noise) to get a reasonable
estimate of the variance of the noise in this setting. This approach originally appeared in [21] and
statistical guarantees on the resulting estimator βb have been developed in [14], [16], [28], culminating
most recently in [10]. These papers give a framework that allows one to generalize the estimator (3) to
when the signal is 2-D image data. We note that our estimators can also be easily adapted to 2-D image
data by replacing window estimates with box estimates.
c2 .
We have the following result which guarantees accuracy of the estimator σ
Theorem 3. Suppose y = Xβ + η where X ∈ Rp×p is orthonormal, ηj ∼ N (0, σ 2 ) are independent, and
p
β is s-sparse. Consider window size L ≥ log3 (p), and suppose that s ≤ 2L
. Then the Greedy Variance
Estimator produced by Algorithm 3 satisfies
with probability 1 − p2 .
c2 − σ 2 | ≤
|σ
3
6
σ2,
log p
4
Greedy Variance Estimation – RIP Design Matrix
We now turn to the more general case where the design matrix X ∈ Rn×p is possibly underdetermined
n ≤ p, but satisfies the Restricted Isometry Property with the appropriate constants (indeed this is a
more general case, as an orthonormal matrix satisfies the RIP with constant δ = 0). We define the
regularized design matrix as Z := [ZΩ1 , ..., ZΩp/L ] where each ZΩi ∈ Rn×L ,
ZΩi := Ui In×L Vi
such that
(4)
XΩi = Ui Σi Vi is the SVD of XΩi .
Then, we run a conditioning step based on the (block orthonormal) matrix Z and then run the algorithm
similar to the orthonormal case: In practice, we use the matrix X instead of Z, however using Z allows
Algorithm 2 Greedy Variance Estimator
1: Compute ỹ = Z T y.
1 P
2
j ∈ {1, 2, . . . , n/L}.
2: Compute the window estimators Sj = L
i∈Ωj |ỹi | ,
P
p/(2L)
c2 = (1 + 1 ) 2L
3: Let σ
S(j) , where {S(j) }j is a non-increasing arrangement of the window
j=1
log(p) p
estimators {Sj }j .
us to do a more streamlined theoretical analysis. To see why this should work intuitively, assume that we
precondition just on X that satisfies RIP for a large enough sparsity level s0 . Note that X T y = X T Xβ +
X T η, so the obstruction to estimating the noise is the X T X term. Then, kXβk2 = kXΩβ βk2 ≈ kβk2 ,
and if we assume our window set Ωj is disjoint from Ωβ , RIP implies the restricted matrices XΩTj , XΩβ
satisfy kXΩTj XΩβ k ≤ δ for δ > 0 small. Thus, for a “good” window estimator, we only see the noise X T η.
Theorem 4. Suppose y = Xβ + η where X ∈ Rn×p has the RIP of order s and level δ, ηj ∼ N (0, σ 2 )
n
are i.i.d., and β is s-sparse. Assume that L ≥ log3 (p), n ≥ L, s ≤ 2L
, and that X satisfies (RIP) with
order s = 2 max{L, s} and level δ > 0. Then, the variance estimator from the above algorithm satisfies
√
p
6σ 2
1
kβk2
1
+
+ max 4σ 2 log(p), 8 δσkβk2 log(p)
2δ
σ
b2 − σ 2 ≤ 1 +
log(p)
L
log(p)
L
with probability 1 − p4 .
Remark 5. The constants in Theorem 4 are chosen for neatness of presentation and are in no way
optimized.
Remark 6. Although the right hand side of Theorem 4 contains factors involving kβk2 (as opposed to
kβk1 which one finds in typical LASSO results), we do not expect this to be a problem in practice. In
particular, one can assume cσ ≤ |βj | ≤ Cσ for all j and some absolute constants C, c > 0. If the |βj |
are below this threshold, they are essentially noise and difficult to detect in general (this is called the
beta-min assumption). On the other hand, one can naturally expect the√entries of β to have a uniform
upper bound even as the problem size goes to infinity. Since kβk2 ≤ s Cσ, we just need that δ < 1s
which will hold for our sparsity regime and standard matrix models (i.i.d. normalized Gaussian entries,
for example) with high probability.
5
Experiments
Our experimental methodology is based off of the results in [19]. In particular, we generate a design
matrix X ∈ Rn×p with i.i.d. entries Xij ∼ N (0, n−1/2 ) so that X satisfies RIP with sufficiently small
constants with high probability. The sparsity level s = ⌈nα ⌉, with α < 1, and the non-zero entries of
β (chosen uniformly at random) are distributed according to a Laplace(1) distribution. The resulting β
is scaled to have the specified norm. The experiments are over the following grid of parameter values,
where n = 100 in all experiments.
• p = 100, 200, 500, 1000,
• kβk2 = 0.1, 1, 2, 5, 10,
• α = 0.1, 0.3, 0.5, 0.7, 0.9.
We use the following estimators in our analysis:
4
√
• oracle: the oracle estimator β̂ = kηk2 / n.
• window: the standard window estimator with the transformation ỹ = X T y.
• window-svd: the theoretical window estimator with the transformation ỹ = Z T y where Z is given
by (4).
• cv-lasso: 10-fold cross-validated LASSO.
• moment: method of moments estimator (see [7]).
We include the cross-validated LASSO because it was shown to be the most robust to changes in sparsity/dimension by [19] and the method of moments estimator because it is a fast alternative. The window
size is chosen based on an inflection point in the values of the estimator for a specific set of parameters
as the window size varies.
As we can see in Figure 1, the window and window-svd estimators have reasonable performance compared to the cv-LASSO with slightly larger biases. In particular, we do quite well for α = 0.1, β = 1,
performing similarly to cv-Lasso, and with a much smaller variance than the method of moments.
Remark 7. We only include results for α = 0.1 because the algorithm performs similarly for α ≤ 0.5.
Moreover our theory only covers up to roughly α = 0.5 for reasonable choices of window size. The
performance for dense signal α = 0.9 is covered in its own section below.
It is important to note that our estimators are significantly faster to compute than cv-LASSO. The
method of moments estimator is generally accurate but has unreasonably high variance for large p. We
now report computation times for each estimator averaged over 100 trials with n = 100, α = 0.9, β = 1,
p = 100, 1000, 10000, 100000. These experiments were run on an Intel i5 3.80 GHz, 4 core CPU with
16 GB of ram. As expected, the window and window-svd estimators scale incredibly well, whereas the
p
window
window-svd
moment
cv-lasso
100
0.0049
0.1559
0.0387
556.5134
1000
0.0048
1.3158
3.2771
186.1420
10000
0.0433
11.8787
1.1632e+03
N/A
100000
0.4227
135.1963
N/A
N/A
Table 1: Computation times for each estimator averaged over 100 trials.
method of moments estimator is fast for small scale problems but does not scale beyond p = 10000 and
the cv-lasso does not scale beyond p = 1000.
5.1
Optimal Window Size
It is notable to see how well our method can perform when the window size is optimized. Here, we give
some representative plots (Figure 2) to show what happens to performance when replacing the window
size with the optimal window size using prior knowledge of the variance. In all experiments, n=100 and
p=1000. For the low SNR regimes, we see a similar downward bias to the oblivious choice of window
size, although with a smaller bias. Similarly, for high SNR, the upward bias is also smaller than when
choosing an oblivious window size. In table 2 we report the optimal window size for various values of
α and kβk2 . The optimal window size was found by a grid search over all possible window sizes using
knowledge of the true variance.
5.2
High Dimension
In this section we highlight the regime in which our estimator is most useful - when p ≫ n is large. In
particular, we chose n = 100, p = 100000 in all experiments. In this setting all other estimators cannot
be computed efficiently. In this regime, it is inefficient to even compute an optimal box size based on an
inflection point in the value of the estimator, so instead the choice L = 25 was fixed for all experiments.
The results are shown in Figure 3. Although the bias remains, the estimator performs well, especially in
low SNR regimes. This is likely due to the strength of the compressed sensing properties for the design
matrix as the dimension grows.
5
1.6
1.6
1.4
1.4
1.2
1.2
1
1
0.8
0.8
0.6
0.6
0.4
0.4
oracle
window
window-svd
moment
cv-lasso
oracle
window
window-svd
moment
cv-lasso
oracle
window
window-svd
moment
cv-lasso
2.5
1.6
2
1.4
1.5
1.2
1
1
0.8
0.5
0.6
0
0.4
-0.5
oracle
window
window-svd
moment
cv-lasso
Figure 1: Window size chosen based on inflection point, p = 1000. Signal-less (kβk = 0), low SNR (α = 0.1,
kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively, left to right, top to
bottom.
6
1.5
1.4
2
1.3
1.2
1.5
1.1
1
1
0.9
0.8
0.5
0.7
0.6
0
0.5
oracle
window
window-svd
moment
cv-lasso
1.6
1.6
1.4
1.4
1.2
1.2
1
1
0.8
0.8
0.6
0.6
0.4
0.4
oracle
window
window-svd
moment
cv-lasso
oracle
window
window-svd
moment
cv-lasso
oracle
window
window-svd
moment
cv-lasso
Figure 2: Optimal window size, p = 1000. Left to right, top to bottom: Signal-less (kβk = 0), low SNR
(α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively.
7
1.6
1.6
1.4
1.4
1.2
1.2
1
1
0.8
0.8
0.6
0.6
0.4
0.4
oracle
window
window-svd
oracle
window
window-svd
oracle
window
window-svd
2
1.6
1.8
1.6
1.4
1.4
1.2
1.2
1
1
0.8
0.8
0.6
0.6
0.4
0.2
0.4
0
oracle
window
window-svd
Figure 3: High-dimensional regime, p = 100000 L = 25. Left to right, top to bottom: Signal-less (kβk = 0),
low SNR (α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively.
8
α
0.1
0.3
0.5
0.7
0.9
0.1
100
100
100
100
100
1
100
100
100
100
100
kβk2
2
100
100
100
100
100
5
20
22
18
18
14
10
4
4
4
4
3
Table 2: Optimal window sizes as a function of α and kβk2 for p = 200. We note that the optimal window
size is generally decreasing as a function of both the signal to noise ratio and the sparsity. Moreover, choosing
the maximal window size is optimal in modest regimes.
5.3
Orthogonal Design Matrix
We find our estimator performs quite well in the case where the design matrix is orthogonal, as shown in
Figure 4. In all experiments, p = n = 200 and the window size is chosen via inflection point in the value of
the estimator. The method of moments still performs reasonably well, but suffers a strong upwards bias
for large SNR. We note that in all regimes, our estimator performs better than cross-validated LASSO.
Moreover, it is more robust to changes in SNR than when the design matrix is RIP (but not necessarily
orthogonal).
5.4
Dense Signal
Our theory does not cover high sparsity levels (α ≥ 0.9), but nonetheless our estimator performs well.
Although more prone to high levels of SNR, we are still competitive with cv-LASSO in low SNR regimes
as seen in Figure 5.
6
Future Work
Our estimator has been shown to be a useful tool to use in high dimensional variance estimation, and
comes with nice theoretical properties that leverage results from the compressed sensing literature. Moreover, it is extremely fast and is competitive with cv-LASSO in most parameter regimes. Based on our
experimental/theoretical results there are some obvious directions to go in the future:
• Develop an efficient estimator that has theoretical guarantees for a more general design matrix, in
particular that satisfies the restricted eigenvalue condition.
• Find a choice of box size that is more robust to sparsity and SNR, which is still efficient to compute.
• Find an efficient estimator that has similar robustness to cross-validated LASSO but also scales
past p > 10000.
Although this estimator is by no means a replacement for existing estimators in typical regimes, it scales
extremely well into high dimensions and performs as well if not better when p ≫ n. This regime seems
the most interesting for developing more robust estimators.
Acknowledgments
We thank Abhinav Nellore for discussions on parameter selection in high dimensional problems which
motivated this work. R. Ward and C. Kennedy were partially supported during this work by NSF
CAREER grant #1255631.
References
[1] Richard Baraniuk, Mark Davenport, Ronald DeVore, and Michael Wakin. A simple proof of the
restricted isometry property for random matrices. Constructive Approximation, 28(3):253–263, 2008.
[2] Alexandre Belloni, Victor Chernozhukov, and Lie Wang. Square-root lasso: pivotal recovery of
sparse signals via conic programming. Biometrika, 98(4):791–806, 2011.
9
1.5
1.5
1
1
0.5
0.5
0
0
oracle
window
window-svd
moment
cv-lasso
1.5
1.5
1
1
0.5
0.5
0
oracle
window
window-svd
moment
cv-lasso
oracle
window
window-svd
moment
cv-lasso
0
oracle
window
window-svd
moment
cv-lasso
Figure 4: Orthogonal design matrix, p = 200. Left to right, top to bottom: Signal-less (kβk = 0), low
SNR (α = 0.1, kβk = 1), medium SNR (α = 0.1, kβk = 5), high SNR (α = 0.1, kβk = 10) respectively.
respectively.
10
1.6
1.4
1.2
1
0.8
0.6
0.4
oracle
window
window-svd
moment
cv-lasso
2.5
1.6
2
1.4
1.5
1.2
1
1
0.8
0.5
0.6
0
0.4
-0.5
oracle
window
window-svd
moment
cv-lasso
oracle
window
window-svd
moment
cv-lasso
Figure 5: Dense signal, p = 200. Left to right, top to bottom: Low SNR (α = 0.9, kβk = 1), medium SNR
(α = 0.9, kβk = 5), high SNR (α = 0.9, kβk = 10), respectively.
11
[3] Peter J Bickel, Ya’acov Ritov, and Alexandre B Tsybakov. Simultaneous analysis of lasso and
dantzig selector. The Annals of Statistics, pages 1705–1732, 2009.
[4] Emmanuel J Candes and Mark A Davenport. How well can we estimate a sparse vector? Applied
and Computational Harmonic Analysis, 34(2):317–323, 2013.
[5] Emmanuel J Candes and Terence Tao. Decoding by linear programming. IEEE transactions on
information theory, 51(12):4203–4215, 2005.
[6] Sourav Chatterjee and Jafar Jafarov. Prediction error of cross-validated lasso. arXiv preprint
arXiv:1502.06291, 2015.
[7] Lee H Dicker. Variance estimation in high-dimensional linear models. Biometrika, 101(2):269–284,
2014.
[8] Jianqing Fan, Shaojun Guo, and Ning Hao. Variance estimation using refitted cross-validation
in ultrahigh dimensional regression. Journal of the Royal Statistical Society: Series B (Statistical
Methodology), 74(1):37–65, 2012.
[9] Darren Homrighausen and Daniel McDonald. The lasso, persistence, and cross-validation. In International Conference on Machine Learning, pages 1031–1039, 2013.
[10] Jan-Christian Hütter and Philippe Rigollet. Optimal rates for total variation denoising. In Conference on Learning Theory, pages 1115–1146, 2016.
[11] Ron Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection.
In Ijcai, volume 14, pages 1137–1145, 1995.
[12] Beatrice Laurent and Pascal Massart. Adaptive estimation of a quadratic functional by model
selection. Annals of Statistics, pages 1302–1338, 2000.
[13] Karim Lounici, Massimiliano Pontil, Sara Van De Geer, Alexandre B Tsybakov, et al. Oracle
inequalities and optimal inference under group sparsity. The Annals of Statistics, 39(4):2164–2204,
2011.
[14] Enno Mammen, Sara van de Geer, et al. Locally adaptive regression splines. The Annals of Statistics,
25(1):387–413, 1997.
[15] Nicolai Meinshausen and Bin Yu. Lasso-type recovery of sparse representations for high-dimensional
data. The Annals of Statistics, pages 246–270, 2009.
[16] Deanna Needell and Rachel Ward. Near-optimal compressed sensing guarantees for total variation
minimization. IEEE transactions on image processing, 22(10):3941–3949, 2013.
[17] Garvesh Raskutti, Martin J Wainwright, and Bin Yu. Minimax rates of estimation for highdimensional linear regression over ℓq -balls. IEEE transactions on information theory, 57(10):6976–
6994, 2011.
[18] Holger Rauhut. Compressive sensing and structured random matrices. Theoretical foundations and
numerical methods for sparse recovery, 9:1–92, 2010.
[19] Stephen Reid, Robert Tibshirani, and Jerome Friedman. A study of error variance estimation in
lasso regression. Statistica Sinica, pages 35–67, 2016.
[20] Mark Rudelson and Roman Vershynin. On sparse reconstruction from fourier and gaussian measurements. Communications on Pure and Applied Mathematics, 61(8):1025–1045, 2008.
[21] Leonid I Rudin, Stanley Osher, and Emad Fatemi. Nonlinear total variation based noise removal
algorithms. Physica D: nonlinear phenomena, 60(1-4):259–268, 1992.
[22] Robert Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical
Society. Series B (Methodological), pages 267–288, 1996.
[23] Sara A Van de Geer. High-dimensional generalized linear models and the lasso. The Annals of
Statistics, pages 614–645, 2008.
[24] Sara A Van De Geer, Peter Bühlmann, et al. On the conditions used to prove oracle results for the
lasso. Electronic Journal of Statistics, 3:1360–1392, 2009.
[25] Roman Vershynin. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint
arXiv:1011.3027, 2010.
[26] Nicolas Verzelen et al. Minimax risks for sparse regressions: Ultra-high dimensional phenomenons.
Electronic Journal of Statistics, 6:38–90, 2012.
12
[27] Martin J Wainwright. Information-theoretic limits on sparsity recovery in the high-dimensional and
noisy setting. IEEE Transactions on Information Theory, 55(12):5728–5741, 2009.
[28] Yu-Xiang Wang, James Sharpnack, Alex Smola, and Ryan Tibshirani. Trend filtering on graphs. In
Artificial Intelligence and Statistics, pages 1042–1050, 2015.
[29] Fei Ye and Cun-Hui Zhang. Rate minimaxity of the lasso and dantzig selector for the lq loss in lr
balls. Journal of Machine Learning Research, 11(Dec):3519–3540, 2010.
[30] Cun-Hui Zhang and Jian Huang. The sparsity and bias of the lasso selection in high-dimensional
linear regression. The Annals of Statistics, pages 1567–1594, 2008.
[31] Tong Zhang et al. Some sharp performance bounds for least squares regression with l1 regularization.
The Annals of Statistics, 37(5A):2109–2144, 2009.
A
Proof Ingredients
Proposition 8. (Lemma 1 in [12]) Suppose Z has a chi-squared distribution with d degrees of freedom.
Then,
√
√
P[d − 2 dt ≤ Z ≤ d + 2 dt + 2t] ≥ 1 − 2e−t
∀t ≥ 0.
(5)
Proposition 9. (Proposition 2.5 in [18]) Suppose Ωu ∩ Ωv = ∅, and that X ∈ Rn×p satisfies RIP of
order s0 and level δ > 0 with s0 = |Ωu | + |Ωv |. Then,
√
(6)
kXΩTu XΩv k2→2 ≤ δ
Proposition 10. (Equation (5.5) in [25]) Let X be a Gaussian random variable with mean 0, variance
σ. Then,
2
2
P[|X| > t] ≤ 2e−t /2σ ,
t ≥ 1.
B
B.1
Proofs
Proof of Theorem 3
Consider the window estimators
Sj =
1 X
|yi |2
L i∈Ω
j
1 X
|βi + ηi |2
=
L i∈Ω
j
1 X
1 X
1 X
=
|βi |2 +
|ηi |2 + 2
βi ηi .
L i∈Ω
L i∈Ω
L i∈Ω
j
j
j
P
Set Ej := L1 i∈Ωj |ηi |2 . Ej is a sum of L independent squares of N (0, σ 2 ) random variables. Then Ej
concentrates strongly around its expected value,
E(Ej ) = σ 2 .
Note that Ej has a chi-squared distribution with L degrees of freedom, so by (5) with the choice t =
log(p)2 and after a union bound over all p/L windows, we get that with probability at least 1 − p2 ,
1−
5
log(p)
σ 2 ≤ Ej ≤
1+
5
log(p)
σ2,
holds uniformly for all j ∈ {1, 2, . . . , p/L}, assuming that L ≥ log 3 (p).
p
by assumption, the pigeon hole principle implies that at least
Since L ≤ 2s
Ωβ . On any such “good” window k we have kβk:k+L−1 k22 = 0 and hence
|Sk − σ 2 | ≤
13
5σ 2
.
log(p)
p
2L
windows do not overlap
(7)
2
5σ
Thus, if S is the average over a subset of the good windows, then also |S − σ 2 | ≤ log(p)
.
Now,
to
bound
the
estimator
above
on
any
window,
we
need
some
control
on
the cross term
P
i∈Ωj βi ηi . Note that this quantity is just a sum of i.i.d. Gaussians with mean zero and with vari-
ance kβΩj ∩Ωβ k22 σ 2 ; thus, by concentration, we have that with probability at least 1 − 2/p, the following
holds uniformly over all windows:
p
X
2σkβΩj ∩Ωβ k2 log(p)
βi ηi ≤
.
(8)
L
i∈Ω
j
Hence, for any any window,
2 X
1
kβΩj ∩Ωβ k22 + Ej −
βi ηi
L
L i∈Ω ∩Ω
j
β
√
kβΩj ∩Ωβ k2 2σ log p
1
5
√
√
≥ kβΩj ∩Ωβ k22 + 1 −
σ2 −
L
log(p)
L
L
5
σ 2 log(p)
2
≥ 1−
The minimal value of a quadratic x2 + b − ax is b − a2 /4
σ −
log(p)
L
6
σ2,
≥ 1−
log(p)
Sj ≥
where the final inequality holds because log2 (p)) ≤ L.
c2 = 2L Pp/(2L) S . By construction, σ
c2 ≤ S, where S is
Now, consider the surrogate estimator σ
(j)
S
S
j=1
p
the average over any p/(2L) “good” windows. From the above analysis, we have that with probability
exceeding 1 − p4 ,
c2 = (1 +
Thus, for our final estimator, σ
S
c2 − σ 2 | ≤
|σ
S
1
c2 ,
)σ
log(p)
c2 − σ 2 | ≤
|σ
B.2
6
σ2.
log(p)
we have
6
7
+
log(p)
(log(p))2
σ2
Proof of Theorem 4
Recall that ỹ := Z T y ∈ Rp . Consider the window estimate
1 X
Sj =
|ỹi |2
L i∈Ω
j
1 X T 2
2 X T
1 X
|(Z T Xβ)i |2 +
|Zi η| +
(Z Xβ)i (Z T η)i
=
L i∈Ω
L i∈Ω
L i∈Ω
j
j
j
1 T
2 X T
1
T
XΩβ βk22 + kZΩ
ηk22 +
(Z Xβ)i (Z T η)i
= kZΩ
j
j
L
L
L i∈Ω
(9)
j
The first term is small if Ωj and Ωβ have disjoint support, since X has the RIP, the center term gets
close to its expectation σ 2 due to standard concentration inequalities, and the third term is also small
due to standard concentration inequalities. More concretely, if we assume that Sj is a “good” window,
meaning that Ωj and Ωβ have disjoint support, by equation (6)
1
δkβk22
kXΩTj XΩβ βk22 ≤
.
L
L
√
√
All of the diagonal entries of Σj are in the range [ 1 − δ, 1 + δ], hence by (10)
1 T
1+δ
kZΩj XΩβ βk22 ≤
kXΩTj XΩβ βk22
L
L
δ(1 + δ)kβk22
≤
L
2δkβk22
≤
L
14
(10)
(11)
For the center term, note that kZΩj ηk22 = kPL ηk22 where PL is projection onto the first L coordinates.
Next, we know that kPL ηk22 has a chi-squared distribution with L degrees of freedom, so by (5) with
t = log(p2 ),
h
p
i
2
P |kPL ηk22 − Lσ 2 | ≤ 2σ 2
L log(p) + log(p) ≥ 1 − 2 .
p
Hence by a union bound, with probability at least 1 − p2 , the following holds uniformly over all windows:
T
|kZΩ
ηk22 /L − σ 2 | = |kPL ηk22 /L − σ 2 |
j
r
log(p)
log(p)
2
≤ 2σ
+ 2σ 2
L
L
5σ 2
≤
(12)
log(p)
P
For the final term in 9, note that L2 i∈Ωj (Z T Xβ)i (Z T η)i is a Gaussian random variable with variance
2σkZΩj Xβ βk2 /L. Thus, by Proposition 10 and (11), the following holds uniformly over all windows with
probability at least 1 − p1 :
p
4σkZΩj Xβ βk2 log(p)
2 X T
(Z Xβ)i (Z T η)i ≤
L i∈Ω
L
j
p
√
8 δσkβk2 log(p)
≤
,
L
(13)
(14)
Thus, averaging over any set of p/2L “good” windows, using (11) (12) and (14) we have
√
√
5σ 2
8 δσkβk2 log p
2L X
2δkβk22
2
+
+
Sj − σ ≤
p j
L
log p
L
c2 =
with probability at least 1 − p4 . Thus, by construction, the estimator σ
S
√
√
5σ 2
8 δσkβk2 log p
2δkβk22
2
c
2
+
+
σS ≤ σ +
L
log p
L
2L
p
P
(15)
j
S(j) also satisfies
c2 cannot be too small. The inequalities (13) and (12)
It remains to show that the window estimator σ
S
hold uniformly over all windows, not just good windows; hence, for any window Sj ,
1
1 T
2 T
T
kZΩ
XΩβ βk22 + kZΩ
ηk22 − kZΩ
XΩβ βk2 kXΩTj ηk2
j
j
j
L
L
L
√
8σkXΩTj XΩβ βk2 log p
1
5σ 2
≥ kXΩTj XΩβ βk22 + σ 2 −
−
L
log(p)
L
Sj ≥
≥ σ2 −
4σ 2 log(p)
5σ 2
−
log(p)
L
The minimal value of a quadratic x2 + b − ax is b − a2 /4
Combining the bounds,
−
√
√
4σ 2 log(p)
2L X
2δkβk22
5σ 2
8 δσkβk2 log p
5σ 2
−
≤
S(j) − σ 2 ≤
+
+
log(p)
L
p j
L
log p
L
c2 = (1 +
For our final estimator σ
c2 − σ 2 | ≤
|σ
1+
1
log(p)
1
c2 ,
)σ
S
log(p)
we have
p
√
kβk2
6σ 2
1
2δ
+
+ max 4σ 2 log(p), 8 δσkβk2 log(p)
L
log(p)
L
15
| 10math.ST
|
1
Memory-Based Data-Driven MRAC Architecture
Ensuring Parameter Convergence
arXiv:1602.00482v1 [cs.SY] 1 Feb 2016
Sayan Basu Roy, Shubhendu Bhasin, Indra Narayan Kar
Abstract—Convergence of controller parameters in standard
model reference adaptive control (MRAC) requires the system
states to be persistently exciting (PE), a restrictive condition to
be verified online. A recent data-driven approach, concurrent
learning, uses information-rich past data concurrently with
the standard parameter update laws to guarantee parameter
convergence without the need of the PE condition. This method
guarantees exponential convergence of both the tracking and
the controller parameter estimation errors to zero, whereas,
the classical MRAC merely ensures asymptotic convergence of
tracking error to zero. However, the method requires knowledge
of the state derivative, at least at the time instances when the
state values are stored in memory. The method further assumes
knowledge of the control allocation matrix. This paper addresses
these limitations by using a memory-based finite-time system
identifier in conjunction with a data-driven approach, leading to
convergence of both the tracking and the controller parameter
estimation errors without the PE condition and knowledge
of the system matrices and the state derivative. A Lyapunov
based stability proof is included to justify the validity of the
proposed data-driven approach. Simulation results demonstrate
the efficacy of the suggested method.
Index Terms—MRAC, CL, Data-Driven, Parameter Convergence, PE.
I. I NTRODUCTION
HE design objective of Model Reference Adaptive Control (MRAC) is to make the system imitate the response
of a chosen reference model. Classical and many recent
MRAC techniques that use merely instantaneous data for
adaptation (see [1]–[5] and references there in) require that
the system states be persistently exciting (PE) to ensure the
convergence of the parameter estimates to their true values
[3]. In [6], Boyd and Sastry proved that the PE condition on
the regressor translates to the reference input having as many
spectral lines as the number of unknown parameters, however,
the condition is rather restrictive. Enforcing the PE condition
through exogenous excitation of the input is not always
realizable and it is often impractical to monitor online whether
a signal will remain PE as the condition depends on the future
values of the signal. Since parameter convergence under the
PE condition is difficult to apply, various algorithms like emodification, σ-modification etc. are proposed in literature to
guarantee boundedness of the parameters [2], [7].
Similar to MRAC, other model-based control methods such
as model-based reinforcement learning (MBRL) [8]–[12], and
model-based predictive control (MPC) [13]–[16], require the
T
Sayan Basu Roy, Shubhendu Bhasin and Indra Narayan Kar are with
the Department of Electrical Engineering, Indian Institute of Technology
Delhi, New Delhi, India e-mail:([email protected], [email protected],
[email protected]).
controller to be developed based on the estimates of the
unknown parameters. Therefore, the stability of the closedloop system and the performance of the control law in all
these cases crucially rely on parameter convergence, which
requires restrictive PE condition.
Recent works [17]- [18] on learning and data-driven control
methods have shown promise in improving tracking performance as they use input-output data along the system trajectory which carries sufficient information about the unknown
system and the controller parameters. Girish et al. [18]–[21]
proposed a novel approach, coined as concurrent learning
(CL), where information-rich past data is stored and concurrently used along with gradient based parameter update laws.
Although the parameter estimation error is not directly measurable, the intelligent introduction of the concurrent learning
term computed from the past stored data is proportional to
parameter estimation error. A sufficient condition associated
with the rank of a matrix formed out of stored data is
required for parameter convergence. Unlike the PE condition,
the rank condition is more realistic and guarantees exponential
convergence of tracking and parameter estimation errors to
zero. Moreover, CL-based techniques are employed in the
context of adaptive optimal control in [11], [22], [23] and
experimental success have been found in [24], [25].
Although concurrent learning is a powerful online adaptive
control method, it requires the state derivative information at
the time points at which the state values are stored [19]. In
many practical situations, the state derivative is not measurable. In [19], an optimal fixed point smoothing technique is
used to estimate derivative at past values using a forward
and backward Kalman filter [26]. However, the estimation
method requires storing several forward and backward data
points in time leading to a high memory requirement. Further,
the state derivative estimation error degrades the exponential
convergence result to a weaker one of uniformly ultimately
bounded (UUB) stability. Moreover, both the classical MRAC
and the concurrent learning laws require knowledge of the B
matrix (in the standard state space realization).
In [27]–[30] the uncertainty in the control allocation matrix
(B in LTI framework) is dealt with in different ways, however,
few results in literature tackle the general case of controlling
dynamical systems when the knowledge of input matrix is
absent. Some recent results [31], [32] have attempted to
address the limitations in the concurrent learning framework.
In [31], the authors designed a control law without requiring
B, however, the knowledge of the A matrix and the state
derivative is required. The requirement of the state derivative
is avoided in [32] by the introduction of a dynamic state
2
derivative estimator, which leads to a UUB result, while
requiring knowledge of the B matrix.
The contribution of this paper is to achieve the MRAC goal
with parameter convergence, using only state and input data.
In this work, the system matrices A and B are considered
to be unknown and the state derivative information is also
not available. Two memory stacks to store effective past data
points are utilized to solve the data-driven MRAC problem,
relaxing the assumption of knowledge of the state derivative
and the input B matrix. Using sufficient rank conditions
on the matrices formed out of the stored data of memory
stacks, finite-time identification of the system parameters and
subsequent exponential convergence of tracking and controller
parameter estimation errors is obtained. The identification
method proposed in this work is inspired from [33], [34]. The
finite time identification of system parameters eliminates the
need of the computationally burdensome purging algorithm
[31]. By introducing an additional gain parameter in the
parameter update law, this work further avoids the singular
value maximisation algorithm [35], used to continuously update the history stack for accelerated convergence. Moreover,
it is proved that the aforementioned rank condition on the
respective matrices merely demands the corresponding signals
to be exciting for a finite time interval, which is less restrictive
than the PE condition. Unlike PE, the rank condition is
required for the matrices formed out of past stored signals
and therefore can be verified online.
Consider a continuous-time LTI system given by
(1)
where x(t) ∈ Rn denotes the state and u(t) ∈ Rd denotes
the control input to the system and A ∈ Rn×n , B ∈ Rn×d
are the system matrices. It is assumed that the pair (A, B) is
controllable and that B has full column rank. 1
A reference model is chosen as follows to characterise the
desired closed loop response of the system (1).
ẋm (t) = Am xm (t) + Bm r(t)
(2)
where Am ∈ Rn×n is Hurwitz, xm (t) ∈ Rn is the model
state and r(t) ∈ Rd denotes a bounded, piecewise continuous
reference input signal. An adaptive control law, comprising a
linear feedback term and a linear feedforward term, is defined
as [2]
u(t) = KxT (t)x(t) + KrT (t)r(t)
(3)
where Kx (t) ∈ Rn×d and Kr (t) ∈ Rd×d . Substituting (3) in
(1) yields
ẋ = (A + BKxT )x(t) + BKrT r(t)
A + BKx∗T = Am
BKr∗T
= Bm
(4)
To facilitate the design objective of making system (4) respond
as the chosen reference model of (2), the following matching
condition is introduced [2], [3].
1 Typically in physical systems d ≤ n and the above mentioned condition
is satisfied.
(5)
(6)
Using (5) and (6), the closed-loop system in (4) can be
written as
ẋ = Am x + Bm r + B K̃xT x + B K̃rT r
(7)
where K̃x , Kx − Kx∗ and K̃r , Kr − Kr∗ . The tracking
error is defined as
e(t) , x(t) − xm (t)
(8)
Using (2), (7) and (8), the error dynamics is obtained as
ė = Am e + B K̃xT x + B K̃rT r
(9)
The standard adaptive update laws for Kx (t) and Kr (t) are
given as [2]
K̇x = −Γx xeT P B
T
K̇r = −Γr re P B
(10)
(11)
where Γx > 0 and Γr > 0 denote positive definite learning
rate matrices of appropriate dimension and P ∈ Rn×n is a
positive definite matrix satisfying the Lyapunov equation
ATm P + P Am + Q = 0
II. C LASSICAL MRAC
ẋ(t) = Ax(t) + Bu(t)
Assumption 1. There exists Kx∗ ∈ Rn×d and Kr∗ ∈ Rd×d
such that
(12)
for any given positive definite Q ∈ Rn×n .
The equations (3) and (10)-(11) are the classical MRAC
laws, which guarantee the tracking error e(t) → 0 as t → ∞.
However, convergence of the controller parameters Kx (t) and
Kr (t) to their true values (Kx∗ and Kr∗ respectively) is only
guaranteed if a restrictive PE condition is satisfied [2], [4],
[36]. The persistence of excitation of a vector signal x(t) is
defined below [3].
Definition 1. A bounded vector signal x(t) is exciting over
an interval [t, t + T ] , T > 0 and t ≥ t0 if ∃ α > 0 such that
the following condition holds:
Z t+T
x(τ )xT (τ )dτ ≥ αI
t
where I denotes an identity matrix.
Definition 2. A bounded vector signal x(t) is persistently
exciting (PE) if ∀t ≥ t0 , ∃ T > 0 and α > 0 such that:
Z t+T
x(τ )xT (τ )dτ ≥ αI
t
According to [6], for the system states of (1) to be PE, the
reference signal r(t) must be sufficiently rich i.e. it must contain n distinct frequencies if there are 2n unknown parameters.
The PE condition is restrictive and difficult to verify online as
it relies on the future behaviour of the dynamical systems.
3
III. M EMORY-BASED DATA -D RIVEN MRAC
This section proposes a memory-based data-driven architecture for model reference adaptive control and identification of
unknown LTI systems with controller parameter convergence.
This architecture builds on the concurrent learning technique
[18], [19], [37], [38], [39] which utilizes past recorded data
concurrently with the current data for adaptation. The concurrent learning method fruitfully utilises a memory stack for
storing the state x(t) and the reference signal r(t) at different
time points. A full rank condition on the matrices formed
out of the memory stack guarantees exponential convergence
of both the tracking and the controller parameter estimation
errors. However, both classical MRAC and the concurrent
learning frameworks assume knowledge of the input B matrix.
Concurrent learning, additionally, requires the state derivative
information at least at the time instances when the state
information is stacked in memory. Although there have been
efforts to overcome these pitfalls, the solutions given by [31],
[32] are partial.
Motivated by the aforementioned limitations, this work
achieves the MRAC goal only from input and state data. The
system matrices (A and B) as well as the state derivative information is considered to be unknown in this framework. The
intelligent exploitation of multiple memory stacks results in
finite-time identification of system parameters and subsequent
exponential convergence of tracking and controller parameter
estimation errors to zero.
A. Finite Time Identification of System Parameters
The plant dynamics in (1) can be linearly parametrized as
ẋ = Y (x, u)θ
(13)
where Y (x, u) ∈ Rn×n(n+d) is the regressor matrix and θ ∈
Rn(n+d) is a column vector of all the elements of A and B
defined as
vec(AT )
θ,
vec(B T )
where vec(Z) ∈ Rab denotes the vectorization of a matrix Z ∈
Ra×b , obtained by stacking the columns of the matrix Z. The
set of equations required for system parameter identification
are described as [33]
˙
(14)
x̂˙ = Y θ̂ + km x̃ + mθ̂
˙
θ̂ = kθ mT (x̃ − γ)
(15)
ṁ = Y − km m,
m(t0 ) = 0
(16)
where m(t) ∈ Rn×n(n+d) and km , kθ are positive scalar gains
and x̃(t) and γ(t) ∈ Rn are defined as
x̃ , x − x̂
(17)
γ , x̃ − mθ̃
(18)
with γ(t0 ) = x̃(t0 ).
Although γ(t) in (18) is unmeasurable, the use of the initial
condition m(t0 ) = 0 in (16) ensures that γ(t) is available
online by solving (20) with known initial condition.
An auxiliary variable g(t) ∈ Rn is defined as
g , mθ̂ + x̃ − γ
(21)
Substituting γ from (18) in (21) leads to
g(t) = m(t)θ,
∀t ≥ t0
(22)
The strategic introduction of variables m(t) and γ(t) transforms the system in (13) to a standard linear regression form
of (22), where both m(t) and g(t) are known signals, obviating
the need of ẋ(t) information.
Consider a memory stack W = {(mj , gj )}pj=1 updated
online with the signals m(t) and g(t) respectively, where each
mi and gi are collected and stored in W at t = twi with
t0 ≥ tw1 > tw2 > ....twp = tc .2 Here, p is the memory stack
length, which satisfies the condition p ≥ n + d, where n is
the dimension of the state x(t) and d is the dimension of the
input u(t).
Assumption 2. The matrix M , [mT1 , mT2 , ...mTp ]T
Rnp×n(n+d) is full rank i.e. rank(M ) = n(n + d).
∈
This rank condition is analogous to those of CL-based
frameworks [19], [18] of adaptive control. The difference here
is that it is stated in terms of a newly introduced variable m(t)
required for system identification purpose. Unlike the dependency on future behaviour of signals in PE condition, this rank
condition relies on past data. Therefore, this condition can be
easily verified online making it more practical as compared
to the PE condition. The following Lemma establishes only
exciting condition (not PE) of relevant signals as a necessary
condition for the Assumption 2 to hold.
Lemma 1. The necessary condition for the matrix M to be
full rank is the state x(t) and the input u(t) be exciting over
the interval t ∈ [t0 , tc ] as per Definition 1.3
Theorem 1. The system parameter identification error kθ̃(t)k
is non-increasing during the interval [t0 , tc ] using the update
laws (14)-(16). Provided Assumption 2 holds, the stored data
in W can be used to achieve the finite time identification of
system parameters (θ) at t = tc .
Proof: Consider a Lyapunov candidate as
1 T
θ̃ θ̃
2
Differentiating (23) along (15) and using (18) yields
Vθ =
V̇θ = −kθ θ̃T mT mθ̃ ≤ 0
(23)
(24)
(19)
which implies kθ̃(t)k ≤ kθ̃(t0 )k, ∀t ≥ t0 .
For finite time identification of system parameters, define a
matrix G , [g1T , g2T , ...gpT ]T ∈ Rnp×1 .
Differentiating (18) and using (14)-(17), the following expression is obtained
γ̇ = −km γ
(20)
2 The data storing mechanism in this work is analogous to that of [32], [35]
and [38], hence, the details of this mechanism are omitted here.
3 For proof see Appendix
where θ̃(t) is given by
θ̃ , θ − θ̂
4
Since (22) is valid for ∀t ≥ t0 , the following equation is
satisfied.
Mθ = G
(25)
Lemma 3. The necessary condition for the matrix Z to be full
rank is the state x(t) and the reference input r(t) be exciting
over the interval t ∈ [t0 , ts ] as per Definition 1.
The Assumption 2 implies M T M is an invertible matrix and
hence the system parameter θ can be found from the following
least-square like expression.
The controller parameter φ(t) is updated as
T T
for t0 ≤ t ≤ tc
proj(−Γφ z B̂ P e)
T T
−Γ
z
B̂
P
e
for
tc < t <tm
φ̇ =
φ
Pq
T
T
−Γφ z B̂ P e + kφ j=1 zjT ǫKj
for t ≥ tm
θ̂F T (t) = (M T M )−1 M T G = θ,
t ≥ tc
(26)
Using (26),at t = tc , finite time convergence of θ is obtained.
The identification equations (14)-(16) and (21) are merely
required for t ∈ [t0 , tc ]. At t = tc , using (26) finite time
identification of system parameters is achieved using the
memory stack W . The finite-time (FT) identifier is given by
(
θ̂(t) if t < tc
θ̂F T (t) =
(27)
θ
if t ≥ tc
The FT identifier method requires instantaneous inversion of
M T M ∈ Rn(n+d)×n(n+d) at t = tc , which may be impractical
for large dimensional systems. However, the following Lemma
shows that the matrix M T M is significantly sparse and
sparsity increases with the state dimension n implying that
sophisticated techniques can be applied for fast computation
of the inverse.
T
Lemma 2. The fraction of non-zero elements in M M is
where n is the state dimension.
1
n,
B. Tracking Error and Controller Parameter Convergence
The control law in (3) can be linearly parametrized as
u = z(x, r)φ(t)
(28)
d×d(n+d)
d(n+d)
where z(x, r) ∈ R
and φ ∈ R
is a column
vector consisting of all the elements of Kx (t) and Kr (t)
defined as
vec(Kx )
φ,
vec(Kr )
Using (28), the error dynamics in (9) can be written as
ė = Am e + Bz φ̃
(29)
where φ̃ = φ − φ∗ and
φ ,
∗
vec(Kx∗ )
vec(Kr∗ )
For the convergence of tracking and controller parameter
estimation errors, another memory stack H = {xj , rj }qj=1 is
populated online by state and input signals, respectively where
each xj and rj is stored at t = thj with t0 ≥ th1 > th2 >
.. > tzq = ts . Each pair (xj , rj ) is referred to as a data point
and q is the length of the stack satisfying q ≥ n ≥ d.
(30)
where Γφ ∈ Rd(n+d)×d(n+d) is a positive definite learning
rate matrix, proj denotes projection operator [40] which
ensures parameter boundedness within a convex region in the
parameter space and tm = max(tc , ts ). Further, kφ is a scalar
gain introduced to alter the rate of convergence and B̂(t) is
extracted from θ̂F T (t) of (27). The error variable ǫKj (t) in
(30) is defined as
ǫKj (t) = ǫKxj (t) + ǫKrj (t)
(31)
with the following two expressions.
ˆj − Am xj − Bm rj − B̂ǫKr (t))
ǫKxj (t) , (B̂ T B̂)−1 B̂ T (ẋ
j
(32)
ǫKrj (t) , KrT (t)rj − (B̂ T B̂)−1 B̂ T Bm rj
(33)
ˆj = Yj θ̂F T .
where ẋ
Theorem 2. For the system (1), the control law in (28) and
the update laws in (30) along with the finite-time system
identifier θ̂F T (t) (27) ensure boundedness of the tracking and
the controller parameter estimation errors for t ∈ [t0 , tm ) and
the global exponential convergence of those errors to zero is
guaranteed for t ≥ tm , provided the Assumption 3 is satisfied.
Proof: Consider the following Lyapunov candidate
Vξ =
1 T
ξ Λξ
2
(34)
where ξ(t) , [eT (t), φT (t)]T and
P
0n×d(n+d)
Λ,
0d(n+d)×n
Γ−1
φ
Taking time derivative of (34) along the trajectories of (29) and
(30) the following expression is obtained during t ∈ [t0 , tc ]
1
V̇ξ ≤ − eT Qe + eT P BZ φ̃ − φ̃T z T B̂ T P e
2
(35)
Assumption 3. The matrix Z = [z1T , z2T , ..., zqT ]T is full rank
i.e. rank(Z) = d(n + d), where zj = z(xj , rj ) for j = 1(1)q.
The inequality occurs due to the use of projection operator
(For details see [41]). The above inequality can be further
modified as
1
(36)
V̇ξ ≤ − eT Qe + eT P B̃Z φ̃
2
This assumption is analogous to Assumption 2. Here it
is stated in terms of z(t), which is relevant to controller
parameter convergence. The following Lemma provides a
necessary condition for the Assumption 3 to hold.
where B̃ , B − B̂. Using the fact Z φ̃ = K̃x x + K̃r r,
yields
1
V̇ξ ≤ − β1 kek2 + β2 kek
(37)
2
T
T
5
where
β1 = λmin (Q) − 2kP kkB̃kkK̃x k
(38)
β2 = kP kkB̃k(kK̃x kkxm k + kK̃r kkrk)
(39)
λmin (.), in (38), denotes the minimum eigen value of the
corresponding argument matrix. In (39), kK̃x (t)k and kK̃r (t)k
are bounded by the use of projection operator [40] in (30) and
kB̃(t)k ∈ L∞ from Theorem 1. As r(t) ∈ L∞ and Am is
Hurwitz by definition, xm (t) ∈ L∞ , implying β1 (t) ∈ L∞
and β2 (t) ∈ L∞ with β2 > 0. However, the sign of β1 is
uncertain during t ∈ [t0 , tc ]. It can be inferred that once β1 (t)
becomes greater than zero, it will remain greater than zero as
kθ̃(t)k is non-increasing in the interval [t0 , tc ] as per Theorem
1. Moreover, β1 = λmin (Q) > 0 at t = tc as kθ̃(t)k = 0
at t = tc . Three cases are possible depending on the θ̃(t)
dynamics.
case 1: β1 (t) ≤ 0, ∀t ∈ [t0 , tc )
case 2: β1 (t) > 0, ∀t ∈ [t0 , tc ]
case 3: β1 (t) ≤ 0, ∀t ∈ [t0 , tf ] and β1 (t) > 0, ∀t ∈ (tf , tc ]
The three cases are analysed separately as follows.
case 1: As β1 (t) ≤ 0, it is hard to comment on the
exact bound of the tracking error. However, finite tracking
error can be claimed from (4), which can be expressed as
ẋ = Ā(t)x(t) + ḡ(t), where Ā(t) = A + BKxT (t) and
ḡ(t) = BKrT (t))r(t). As equation (4) is a linear equation
in x(t) with kĀ(t)k and kḡ(t)k are bounded i.e. Ā(t) ∈ L∞
and ḡ(t) ∈ L∞ in the finite time interval [t0 , tc ], using Global
Existence and Uniqueness theorem [42] it can be argued that
x(t) cannot have a finite escape time. Therefore x(t) ∈ L∞
in finite time (t ≤ tc ) if x(t0 ) is finite, leading to the tracking
error e(t) ∈ L∞ as xm (t) ∈ L∞ , implying ξ(t) ∈ L∞ .
case 2: As β1 (t) > 0, (37) can be further modified to
2
β2,max
1
V̇ξ ≤ − β11 kek2 +
2
4β12
(40)
where β11 + β12 = β1,min > 0 with β11 > 0, β12 > 0 and
β2,max can be found by upper bounding every time-varying
term in (39). Due to the use of proj in (30) during t ∈ [t0 , tc ],
Vξ in (34) can be upper bounded as
Vξ ≤
1
λmax (P )kek2 + D
2
β11
β11 D
2,max
where η1 = λmax
(P ) and η2 =
4β12 + λmax (P ) . Using
comparison Lemma [42], the above differential inequality
results in the following UUB condition.
η2
η2
exp (−η1 (t − t0 )) + , ∀t ∈ [t0 , tc ]
Vξ (t) ≤ Vξ (t0 ) −
η1
η1
(43)
The inequality in (43) implies ξ(t) ∈ L∞ during the same
interval via Theorem 4.18 of [42].
The analysis done in case 1 holds independent of the sign of
β1 (t). However, in case of β1 (t) > 0, it is possible to get an
4 kφk2
max
is defined by the convex region in the projection operator.
1
V̇ξ = − eT Qe ≤ 0
2
(45)
Thus Vξ (t) is non-increasing in this interval, implying
Vξ (tm ) ≤ Vξ (tc ). Again, using Theorem 4.18 of [42] it can be
inferred that ξ(t) ∈ L∞ during t ∈ (tc , tm ) as Vξ (t) ∈ L∞ .
For t ≥ tm , using θ̂F T = θ from Theorem 1, the time
derivative of (34) along (29) and (30) can be expressed as
1
V̇ξ = − eT Qe + eT P Bz φ̃
2
q
X
zjT zj φ̃
− φ̃T z T B T P e − φ̃T kφ
(46)
j=1
Using (6) and (33), ǫTKr (t) can be expressed as
j
ǫKrj (t) = K̃rT (t)rj
(47)
and using (7), (32) and (49) it can be shown that
ǫKxj (t) = K̃xT (t)xj
(48)
Further (31), (47) and (48) lead to
ǫKj (t) = zj φ̃(t)
(49)
The expression (49) is used to derive (46), which can be further
upper bounded as
1
V̇ξ ≤ − λmin (Q)kek2 − kφ λmin (Ωz )kφ̃k2
2
(41)
where D = 12 λmin (Γφ )kφk2max .4 Further upper bounding (40)
using (41) yields
V̇ξ ≤ −η1 Vξ + η2
(42)
β2
exact expression of bound for the Lyapunov function Vξ (t) as
shown in (43).
case 3: During t ∈ [t0 , tf + ǫ), following the arguments
similar to case 1, it can be established that ξ(t) ∈ L∞ , where
ǫ > 0 is infinitesimally small. Further, during t ∈ [tf + ǫ, tc ],
following the analysis similar to case 2, the following bound
can be derived.
η2
η2
exp (−η1 (t − tβ )) + , ∀t ∈ [tβ , tc ]
Vξ (t) ≤ Vξ (tβ ) −
η1
η1
(44)
with tβ = tf + ǫ, implying ξ(t) ∈ L∞ in the same interval.
In the interval t ∈ (tc , tm ) using B̃ = 0 from Theorem 1 in
the time derivative of (34) along (29) and (30)
where
Ωz =
q
X
zjT zj = Z T Z
(50)
(51)
j=1
Hence, based on Assumption 3, Ωz > 0 which implies V̇ξ ≤ 0.
Further from (50) the following bound can be obtained
V̇ξ ≤ −βVξ
(52)
where β is given by
β=
min(λmin (Q), 2kφ λmin (Ωz ))
max(λmax (P ), λmax (Γ−1
φ ))
The differential inequality in (52) leads to the subsequent
exponentially convergent bound
Vξ (t) ≤ Vξ (tm )e−β(t−tm ) , ∀t ∈ [tm , ∞)
(53)
6
Remark 2. To improve the rate of convergence, the memory
stack is continuously updated in [35] using an algorithm to
maximize the minimum singular value of a matrix analogous
to Z. To avoid computational burden associated with the
continuous stack update, the proposed algorithm updates the
stack until the sufficient rank condition is satisfied. The speed
of convergence is controlled by appropriately choosing Q, kφ
and Γφ . Moreover, since θ is obtained in finite time using (14)(22) and the memory stack W , the need for computationally
involved purging algorithm [31] is obviated.
Remark 3. The proposed memory-based data-driven technique for parameter convergence is similar to classical integral control in the following sense. It is well-known that
integral control, which captures the effect of entire past of
the relevant signal, reduces steady state error. The proposed
approach also stores information-rich past data (although not
the entire past) in the memory stack using a non-linear sampling technique and utilizes the stacked data in the parameter
update law, leading to exponential convergence of parameter
estimation error to zero. Future research can be carried out
to investigate the relation between the proposed method and
the classical integral control.
IV. S IMULATION R ESULTS
To demonstrate the effectiveness of the proposed data driven
technique, a second order linear plant is considered.
0 1
0
A=
B=
5 2
2
The reference model matrices are considered as
0
1
0
Am =
Bm =
−8 −10
1
Note that Am is a Hurwitz matrix but A is not. Using the
matching conditions (5) and (6) Kx∗ is equal to [−6.5, −6]T
and Kr∗ is 0.5. The reference signal r(t) is chosen as
r(t) = 20e−t/2
which is a non-PE signal. The matrix Q of Lyapunov equation
(12) is selected as
5 0
Q=
0 5
The adaptation gains Γx and Γr are chosen as Γx = I2 and
Γr = I1 . The gain parameters are chosen as kθ = 80, km = 10
and kφ = 40.
The plot of the error dynamics of system parameters is
shown in Fig 1. The tracking error plot is shown in Fig 2,
error
error
error
error
error
error
System parameter estimation error
3
2
in
in
in
in
in
in
A(1,1)
A(1,2)
A(2,1)
A(2,2)
B(1)
B(2)
1
0
−1
−2
0
0.01
0.02
0.03
time (sec.)
0.04
0.05
System parameter estimation error θ̃(t)
Fig. 1.
0.6
e1
e2
0.4
0.2
tracking error e(t)
Remark 1. As described by (30), the update law of φ(t)
follows time-dependent switching with at most 2 (finite) switching instances (tc and tm ). Therefore, the boundedness of ξ(t)
during t ∈ [t0 , tm ) and exponential convergence for t ≥ tm
suffices the analysis.
4
0
−0.2
−0.4
−0.6
−0.8
0
1
2
3
4
5
time (sec.)
Fig. 2.
tracking error e(t)
7
error in Kx1
6
controller parameter estimation error
implying ξ(t) → 0 exponentially fast as t → ∞. Further,
the Lyapunov function in (34) is radially unbounded and no
restriction is imposed on Vξ (tm ), implying global exponential
stability (GES).
error in Kx2
error in Kr
5
4
3
2
1
0
−1
−2
−3
0
0.2
0.4
0.6
0.8
1
time (sec.)
Fig. 3.
Controller parameter estimation error φ̃(t)
depicting the convergence of errors to zero within approximately 4.1 seconds. Fig 3. shows the evolution of estimation
error in controller parameters. At t = tm the transition of
parameter update law from one rule to another leads to nondifferentiability at that time point. After t = tm , the error
dynamics converge to zero exponentially.
V. C ONCLUSION
A memory-based data-driven approach is proposed to solve
the MRAC problem for unknown LTI systems, using only
input and state data. Past data along the system trajectory is
stored and used strategically to guarantee finite-time identification of system parameters (θ), convergence of controller
7
parameters (φ) and tracking error. Unlike the restrictive PE
condition in classical adaptive control, only a rank condition
on the recorded matrices is required to ensure parameter
convergence. Further, the work relaxes two vital assumptions
of CL-based frameworks of adaptive control-knowledge of the
state derivative and the input B matrix, without altering the
exponential convergence result.
A PPENDIX
Lemma 4. A memory stack X is populated with the values
of a continuous signal x(t) ∈ Rn×m at different time points
as described below
X = [x1 , x2 , ....xp ], where mp ≥ n and xi = x(ti ) ∈ Rn×m ,
i = 1(1)p with t1 > t2 > ...tp = te .
If the matrix X is full rank, i.e. rank(X) = n, the signal x(t)
is exciting over the interval [t0 , te ] as per Definition 1.
Rt
Proof: Define C , 0 e x(τ )xT (τ )dτ . Taking limit as
ǫ → 0+ and using the
corollary of fundamental theorem of
R a+ǫ
1
calculus limǫ→0+ 2ǫ
a−ǫ f (y)dy = f (a) for any continuous
function f , the following expression can be obtained
Z
1
1 t1 −ǫ
lim
C = lim
x(τ )xT (τ )dτ
ǫ→0+ 2ǫ
ǫ→0+ 2ǫ 0
p−1
X 1 Z tj+1 −ǫ
x(τ )xT (τ )dτ + XX T
(54)
+
2ǫ
tj +ǫ
j=1
where
Z
1 t1 −ǫ
x(τ )xT (τ )dτ
ǫ→0 2ǫ 0
Z
p−1
X
1 tj+1 −ǫ
+
x(τ )xT (τ )dτ ≥ 0
2ǫ
t
+ǫ
j
j=1
lim+
(55)
and XX T ≥ σmin (X)I where σmin (X) > 0 as X is full
1
C > 0, implying
rank. Thus, it can be inferred that limǫ→0+ 2ǫ
C > 0 as ǫ > 0. Therefore
Z te
x(τ )xT (τ )dτ ≥ αI
(56)
0
with α = λmin (C) > 0.
R EFERENCES
[1] K. S. Narendra and A. M. Annaswamy, “A new adaptive law for
robust adaptation without persistent excitation,” Automatic Control,
IEEE Transactions on, vol. 32, no. 2, pp. 134–145, 1987.
[2] K. S. Narendra and A. M. Annaswamy, Stable adaptive systems. Courier
Corporation, 2012.
[3] G. Tao, Adaptive control design and analysis, vol. 37. John Wiley &
Sons, 2003.
[4] K. J. Åström and B. Wittenmark, Adaptive control. Courier Corporation,
2013.
[5] C. Cao and N. Hovakimyan, “Design and analysis of a novel adaptive
control architecture with guaranteed transient performance,” Automatic
Control, IEEE Transactions on, vol. 53, no. 2, pp. 586–591, 2008.
[6] S. Boyd and S. S. Sastry, “Necessary and sufficient conditions for
parameter convergence in adaptive control,” Automatica, vol. 22, no. 6,
pp. 629–639, 1986.
[7] P. A. Ioannou and P. V. Kokotovic, “Instability analysis and improvement
of robustness of adaptive control,” Automatica, vol. 20, no. 5, pp. 583–
594, 1984.
[8] P. Abbeel, M. Quigley, and A. Y. Ng, “Using inaccurate models
in reinforcement learning,” in International Conference on Machine
Learning, pp. 1–8, ACM, 2006.
[9] D. Mitrovic, S. Klanke, and S. Vijayakumar, “Adaptive optimal feedback
control with learned internal dynamics models,” in From Motor Learning
to Interaction Learning in Robots, pp. 65–84, Springer, 2010.
[10] M. Deisenroth and C. E. Rasmussen, “Pilco: A model-based and dataefficient approach to policy search,” in International Conference on
Machine Learning, pp. 465–472, 2011.
[11] R. Kamalapurkar, P. Walters, and W. Dixon, “Concurrent learningbased approximate optimal regulation,” in Conference on Decision and
Control, pp. 6256–6261, IEEE, 2013.
[12] S. Bhasin, R. Kamalapurkar, M. Johnson, K. G. Vamvoudakis, F. L.
Lewis, and W. E. Dixon, “A novel actor–critic–identifier architecture
for approximate optimal control of uncertain nonlinear systems,” Automatica, vol. 49, no. 1, pp. 82–92, 2013.
[13] H. Fukushima, T.-H. Kim, and T. Sugie, “Adaptive model predictive
control for a class of constrained linear systems based on the comparison
model,” Automatica, vol. 43, no. 2, pp. 301–308, 2007.
[14] V. Adetola, D. DeHaan, and M. Guay, “Adaptive model predictive
control for constrained nonlinear systems,” Systems & Control Letters,
vol. 58, no. 5, pp. 320–326, 2009.
[15] G. Chowdhary, M. Mühlegg, J. P. How, and F. Holzapfel, “Concurrent
learning adaptive model predictive control,” in Advances in Aerospace
Guidance, Navigation and Control, pp. 29–47, Springer, 2013.
[16] A. Aswani, H. Gonzalez, S. S. Sastry, and C. Tomlin, “Provably safe
and robust learning-based model predictive control,” Automatica, vol. 49,
no. 5, pp. 1216–1226, 2013.
[17] F. L. Lewis and D. Vrabie, “Reinforcement learning and adaptive
dynamic programming for feedback control,” Circuits and Systems
Magazine, IEEE, vol. 9, no. 3, pp. 32–50, 2009.
[18] G. Chowdhary and E. Johnson, “Concurrent learning for convergence
in adaptive control without persistency of excitation,” in Conference on
Decision and Control, pp. 3674–3679, IEEE, 2010.
[19] G. Chowdhary, T. Yucelen, M. Mühlegg, and E. N. Johnson, “Concurrent
learning adaptive control of linear systems with exponentially convergent
bounds,” International Journal of Adaptive Control and Signal Processing, vol. 27, no. 4, pp. 280–301, 2013.
[20] G. Chowdhary, M. Mühlegg, and E. Johnson, “Exponential parameter
and tracking error convergence guarantees for adaptive controllers without persistency of excitation,” International Journal of Control, vol. 87,
no. 8, pp. 1583–1603, 2014.
[21] H. A. Kingravi, G. Chowdhary, P. A. Vela, and E. N. Johnson, “Reproducing kernel hilbert space approach for the online update of radial bases
in neuro-adaptive control,” Neural Networks and Learning Systems,
IEEE Transactions on, vol. 23, no. 7, pp. 1130–1141, 2012.
[22] R. Kamalapurkar, P. Walters, and W. E. Dixon, “Model-based reinforcement learning for approximate optimal regulation,” Automatica, vol. 64,
pp. 94–104, 2016.
[23] K. G. Vamvoudakis, M. F. Miranda, and J. P. Hespanha, “Asymptotically
stable adaptive-optimal control algorithm with saturating actuators and
relaxed persistence of excitation,” Neural Networks and Learning Systems, IEEE Transactions on, doi: 10.1109/TNNLS.2015.2487972, 2015.
[24] G. Chowdhary, T. Wu, M. Cutler, N. K. Ure, and J. How, “Experimental
results of concurrent learning adaptive controllers,” in AIAA Guidance,
Navigation, and Control Conference,(Minneapolis, MN), AIAA, 2012.
[25] W. E. Dixon, “Experiments using approximate optimal path following
with concurrent learning,” in American Control Conference, pp. 5083–
5083, IEEE, 2015.
[26] A. Gelb, Applied optimal estimation. MIT press, 1974.
[27] E. Lavretsky, “Combined/composite model reference adaptive control,”
Automatic Control, IEEE Transactions on, vol. 54, no. 11, p. 2692, 2009.
[28] G. Tao, S. M. Joshi, and X. Ma, “Adaptive state feedback and tracking
control of systems with actuator failures,” Automatic Control, IEEE
Transactions on, vol. 46, no. 1, pp. 78–95, 2001.
[29] Z. Han and K. S. Narendra, “New concepts in adaptive control using
multiple models,” Automatic Control, IEEE Transactions on, vol. 57,
no. 1, pp. 78–89, 2012.
[30] A. Somanath, Adaptive control of hypersonic vehicles in presence of actuation uncertainties. PhD thesis, Massachusetts Institute of Technology,
2010.
[31] B. Reish and G. Chowdhary, “Concurrent learning adaptive control for
systems with unknown sign of control effectiveness,” in Conference on
Decision and Control, pp. 4131–4136, IEEE, 2014.
[32] A. Kumar and S. Bhasin, “Data driven mrac with parameter convergence,” in Multi-Conference on Systems and Control, pp. 1662–1667,
IEEE, 2015.
8
[33] V. Adetola and M. Guay, “Finite-time parameter estimation in adaptive
control of nonlinear systems,” Automatic Control, IEEE Transactions
on, vol. 53, no. 3, pp. 807–811, 2008.
[34] V. Adetola and M. Guay, “Performance improvement in adaptive control
of linearly parameterized nonlinear systems,” Automatic Control, IEEE
Transactions on, vol. 55, no. 9, pp. 2182–2186, 2010.
[35] G. Chowdhary and E. Johnson, “A singular value maximizing data
recording algorithm for concurrent learning,” in American Control
Conference, pp. 3547–3552, IEEE, 2011.
[36] P. A. Ioannou and J. Sun, Robust adaptive control. Courier Corporation,
2012.
[37] G. V. Chowdhary and E. N. Johnson, “Theory and flight-test validation of
a concurrent-learning adaptive controller,” Journal of Guidance, Control,
and Dynamics, vol. 34, no. 2, pp. 592–607, 2011.
[38] G. Chowdhary, Concurrent learning for convergence in adaptive control
without persistency of excitation. PhD thesis, Georgia Institute of
Technology, 2010.
[39] S. Kersting and M. Buss, “Concurrent learning adaptive identification
of piecewise affine systems,” in Conference on Decision and Control,
pp. 3930–3935, IEEE, 2014.
[40] M. Krstic, P. V. Kokotovic, and I. Kanellakopoulos, Nonlinear and
adaptive control design. John Wiley & Sons, Inc., 1995.
[41] E. Lavretsky, T. E. Gibson, and A. M. Annaswamy, “Projection operator
in adaptive systems,” arXiv preprint arXiv:1112.4232, 2011.
[42] H. K. Khalil, “Nonlinear systems, 3rd,” New Jewsey, Prentice Hall,
vol. 9, 2002.
| 3cs.SY
|
arXiv:1407.4917v1 [cs.SE] 18 Jul 2014
Sliced Slices: Separating Data and Control Influences
Shrawan Kumar
Amitabha Sanyal
Uday P. Khedker
Tata Research Design
and Development Centre
Tata Consultancy Services Ltd,
Pune, India
Email: [email protected]
Department of Computer Science
and Engineering
Indian Institute of Technology Bombay,
India
Email: [email protected]
Department of Computer Science
and Engineering
Indian Institute of Technology Bombay,
India
Email: [email protected]
Abstract—Backward slicing has been used extensively in program understanding, debugging and scaling up of program analysis. For large programs, the size of the conventional backward
slice is about 25% of the program size. This may be too large to be
useful. Our investigations reveal that in general, the size of a slice
is influenced more by computations governing the control flow
reaching the slicing criterion than by the computations governing
the values relevant to the slicing criterion. We distinguish between
the two by defining data slices and control slices both of which
are smaller than the conventional slices which can be obtained by
combining the two. This is useful because for many applications,
the individual data or control slices are sufficient.
Our experiments show that for more than 50% of cases, the
data slice is smaller than 10% of the program in size. Besides,
the time to compute data or control slice is comparable to that
for computing the conventional slice.
I.
I NTRODUCTION
Program slicing, introduced in 1984 by Mark Weiser [?],
strips down a large program to a smaller version based on
the requirements of program observation. Many variants of
slices such as forward, backward, dynamic, and abstract slice
etc. have been devised [?]. They have been used for different purposes like program understanding, debugging, testing,
maintenance, software quality assurance and reverse engineering among others. A brief description of various applications
of program slices is given by Binkley et. al. [?].
Among static slicing techniques, backward slicing which
answers the question “which program statements can influence
the given variables at the given statement?” seems more natural
and is most common. It identifies the portion of program that
one would be interested in while understanding a computation
or debugging for an erroneous output. In safety property
checking, rather than verifying the property on whole program,
one can verify the property on the static backward slice with
respect to slicing criterion derived from the specific property
of interest. As a result, backward slice helps scaling up of
property checking techniques also.
While static slicing is efficient and scalable, the size of
the computed slice may remain a matter of concern. Empirical
studies [?] have shown that size of a static slice on an average
is about 30% of the program size. For large programs, this size
could be too large. Our investigations of the factors influencing
the size of a slices reveal that most statements are included in
a slice due to some conditions governing the reachability of
the statement involved in the slicing criteria rather than due to
the values of variables in the slicing criteria. These statements
are irrelevant for understanding the computations leading to
the values of the variables.
As a motivating example, assume that the program in
Figure 1(a) computes an erroneous value of u at line 17. It is
obvious that for slicing criterion h17, ui, no static slicing can
reduce the program anymore. Therefore using the conventional
backward slice is of no help in getting a reduced program for
debugging this program. A careful examination reveals that the
value of u does not depend on the values of variables i or t.
These variables are used in the conditions which decide the
reachability of line 17 in the execution. Since we know that a
wrong value is getting computed at line 17, reachability of line
17 is obvious and need not be established. Thus, computations
of i and t are irrelevant to our purpose.
Figure 1(b) shows a portion of the program which is
sufficient to understand the computation of u and to debug the
reason for its wrong value. Any erroneous statement responsible for an erroneous value has to be contained in this program
fragment. The statements that have been removed only alter
the reachability of line 17 and not the value computed for u.
Note that functions fn1 and fn2 have been sliced out as they
are not required any longer.
Observe that retaining the program structure requires that a
conditionally executed statement in the original program must
also be included as a conditionally executed statement in the
program slice. However, since the values of variables appearing
in the condition are irrelevant, we replace conditions by ‘*’
which stands for a random value chosen from {true, f alse}
when it is executed.
It is easy to see that the resulting slice is much smaller in
comparison to conventional backward slice (incidentally the
whole program in this case) and still sufficient to debug (or
understand) the computation of u at the slicing criterion. We
call such a slice as data slice.
Consider a contrasting requirement of debugging the program when line 17 is not getting executed a desired number
of times. For this purpose we only need to see how the
reachability of line 17 is getting influenced. How the value of
u is computed is irrelevant. Therefore we need to know how
values of i and t are getting computed as they appear in the
conditions that govern whether or not line 17 will be reached.
We show the portion of code in Figure 1(c). It is sufficient
to understand when line 17 in original program (mapped to
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
int main()
{
int i=0,j=0, k=0, st;
int l, t=0, u, v;
l=get_input();
while (fn1(l))
t+=2;
while (i<1000)
{
i= i+ fn2();
st = fn3();
if (st ==1)
{ j++; k++; }
else { j+=2; k+=1; }
u = j-k;
if (t>100)
v = u ;
}
return 0;
}
int fn1(); // a complex function
int fn2(); // a complex function
int fn3(); // some function
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
int main()
{
int j=0, k=0, st;
int u, v;
while (*)
{
st = fn3();
if (st ==1)
{ j++; k++; }
else { j+=2; k+=1; }
u = j-k;
if (*)
v = u ;
}
return 0;
}
int fn3(); // some function
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
int main()
{
int i=0;
int l, t=0, u, v;
l=get_input();
while (fn1(l))
t+=2;
while (i<1000)
{
i= i+ fn2();
if (t>100)
v = u ;
}
return 0;
}
int fn1(); // a complex function
int fn2(); // a complex function
(b) Data slice
(c) Control slice
(a) Backward slice
Fig. 1: Usual backward slice, data slice and control slice
line 12 in slice) is reachable. Functions fn1 and fn2 have
to be part of this program portion while function fn3 is not
required. We call such a slice as control slice.
In addition to debugging and program understanding, this
separation of concerns is helpful in property checking during
program verification because it reduces the size of the program
to be examined. First we derive a slicing criterion SC from
the property to be checked, compute the corresponding data
slice and check the property on the slice. If the property holds
then we are done as the property will hold in original program
also. If the property does not hold, we compute a control slice
with respect to program point related to property in question
and check the reachability of this point in the control slice. If
it is not reachable then property holds in original program.1
The contributions of this paper are: We define the concepts
of data and control slices, relate them to the conventional
slices, provide an algorithm to compute data and control
slices and show its soundness. We also provide empirical
measurements on real life programs that show that the data
slices are indeed much smaller than complete slices and are
computable in comparable time.
II.
BACKGROUND
A. Variants of Program Slices
The classical backward slicing tries to find the program
fragment that influences a slicing criterion. Forward slicing [?]
discovers the statements that are influenced by a given slicing
criterion. Chopping [?] discovers statements influenced by a
source criterion on paths to a target criterion. A dynamic
slice [?] computes a subset of program statements which affect
a slicing criterion in a particular run of the program. Assertion
slicing [?], [?], [?] is a technique which computes set of
statements which are sufficient to ensure a post condition or
1 However,
if it is found reachable then the answer is not straight forward.
the statements which will be executed starting from a given pre
condition. All these variants use control and data influences in
an integrated manner. To the best of our knowledge there is no
work which distinguishes between data and control influences.
B. Control flow graph and data dependence
Program model. We present our ideas in context of imperative programs modeled in terms of assignment statements,
conditional statements, while loops, and procedure calls. We
also allow break and continue statements in loops. Without any
loss of generality, we restrict ourselves to goto-less programs
with single-entry loops and two-way branching conditional
statements at the source level.
Control Flow Graph (CFG). We use the standard notion
of control flow graph (CFG) G = hN, Ei where N is the set
of nodes, E is a set of directed edges in N ×N [?]. ENTRY and
EXIT are distinguished nodes representing the entry and exit
l
of program. We use s t and s t to denote unconditional
and conditional edges respectively, where l ∈ {true, f alse}
indicates the branch outcome. We assume that two special
edges ENTRY EXIT and EXIT EXIT are added in CFG.
There is a one-to-one correspondence between nodes of CFG
and statements of the program, hence we will use the terms
statement and node interchangeably.
Data dependence. A definition d of a variable v in node
p is said to be reaching definition [?] for a node point q, if
there is a control flow path from p to q devoid of any other
definition of v. A variable x at location l is said to be data
dependent on a definition d of x, if d is reaching definition
for l. The set of definitions of variables in X reaching l is
denoted by DU (l, X) = {d | ∃v ∈ X.v at l is data dependent
on d}. We will use REF (t) to denote set of variables whose
value is referred in a statement t.
C. Program states and traces
Let V be set of all variables in program P and < be the
set of all values which the variables can take in P .
Definition 1: (Program state). A program state is a valuation of all variables in the program at a given instant during
program execution. It is represented by a map θ : V → < such
that θ(v) denotes the value of v ∈ V in the program state θ.
Definition 2: (Restricted program state). Given X ⊆ V , a
X-restriction of program state θ, denoted as bθcX , is a map
X → < such that ∀x ∈ X.bθcX (x) = θ(x).
Definition 3: (Execution state). An execution state is a pair
hn, θi where θ is a program state and n is a CFG node.
Execution of a program can be seen as a sequence of
execution states starting with execution state hENTRY, σ0 i
where σ0 0 is0 initial program state. The subsequent execution
state hn , σ i for a given execution state hn, σi is decided by
semantics of statement corresponding to node n and program
state σ. Let function T RAN (hn, σi) provide the subsequent
execution state of hn, σi.
Definition 4: (Trace). A (possibly infinite) sequence of
execution states [hni , σi i], i ≥ 0 is said to be a trace, provided
n0 = ENTRY and σ0 is given initial program state, and
∀i ≥ 0 : hni+1 , σi+1 i = T RAN (hni , σi i).
When the trace sequence is finite and ends with an execution
state hEXIT, θi then the trace is called a terminating trace.
Unless stated otherwise, a trace means a terminating trace in
the rest of this paper.
D. Post-dominance and control dependence
Backward slicing algorithms are implemented efficiently
using post-dominance and control dependence [?], [?].
Definition 5: (Post-dominance). A node n2 post-dominates
a node n1 if every path from n1 to EXIT contains n2 . If, in
addition n1 6= n2 then n2 is said to strictly post-dominate n1 .
Definition 6: (Control dependence). A node n3 is control
l
dependent on an edge n1 n2 if n3 post-dominates n2 , and
n3 does not strictly post-dominate n1 .
Later Podgurski and Clarke [?] introduced concept of strong
post-dominance and weak control dependence, to consider
execution of a statement being dependent on loop termination. The previous definition of post-dominance and control
dependence were termed as weak post-dominance and strong
control dependence respectively.
Definition 7: (Strong post-dominance). A node n2 strongly
post-dominates a node n1 if every infinite path starting at n1
contains n2 . If in addition, n1 6= n2 then n2 strictly strongly
post-dominates n1 .
Definition 8: (Weak control dependence). A node n3 is
l
weakly control dependent on an edge n1 n2 if n3 strongly
post-dominates n2 , and n3 does not strictly strongly postdominate n1 .
Only EXIT node strongly post-dominates a loop exit edge.
Therefore, all the nodes that weakly post-dominate a loop condition are weakly control dependent on loop exit edge. Bilardi
and Pingali [?] give efficient algorithms for computing strong
post-dominance and weak control dependence relationship.
For our purpose, we will need to know whether a statement
is controlled by a condition through a chain of weak/strong
control dependence. For this, we define a transitive closure of
weak/strong control dependence.
Definition 9: (Transitive control dependence). For given
statement s and condition c, if there is a path π in PDG from
c to s consisting of only (weakly/strongly) control dependent
edges then we say that s is transitive control dependent on c,
written as c
s. If π consists of only strong control dependent
edges then we say s is strongly transitive control dependent
on c, written as c −→ s.
If π starts with a control dependent edge labeled as e then
we qualify the transitive control dependence with edge e as
e
e
e
e
c
s or c −→ s. Obviously, c −→ s =⇒ c
s.
Following properties are obvious, for the programs under
our discourse.
SP1
SP2
e
e
1
2
(c −→
s ∧ c −→
s) =⇒ e1 = e2
e
c −→ s =⇒ no path to s from an edge ē 6= e of c
can bypass e.
E. Subprogram and backward slice
An important requirement of a slice is that the behaviour of
the slice must be a specified subset of the original program’s
behaviour. A subset of original program’s behaviour is specified through a pair Υ = hl, V i, known as slicing criterion,
where l is a statement location and V is set of variables. It
is interpreted as values of variables V just before executing
statement at l. We will use Υ and hl, V i interchangeably to
denote a slicing criterion. Where context is clear, we will use
l and V to denote the location and variables set components,
respectively. We will use LV (t) to denote the slicing criterion
ht, REF (t)i.
A subprogram of a program P is a program carved out
of P by deleting some statements such that program structure
remains intact in that for each statement n that appears in
subprogram, if n is enclosed by a condition in P , then n must
be enclosed by a condition in subprogram too.
An augmented program (P A ) is the result of transforming a
given program P for a slicing criterion Υ = hl, V i by inserting
a SKIP statement at location l. Obviously, an augmented
program is equivalent to the original program. To compute
a slice of program P with respect to Υ, we compute the
slice S of the augmented program with respect to Υ with the
restriction that the inserted SKIP statement is retained in S.
Now with l standing for SKIP statement, Υ can be seen
as specification for the desired subset of original program’s
behaviour for P , P A and S. Henceforth, we assume that
SKIP statement, inserted at location l, is part of every slice
with respect to Υ.
Henceforth, we will assume that each statement in P is
labeled uniquely and the nodes in CFG are labeled with
corresponding statement label. Statements in subprogram will
get their label from the ones given in P . As a result, in CFG,
Gs = hN s , E s i constructed for a sub program S of program
P , having CFG, G : hN, Ei, N s ⊆ N . To be more explicit,
given a node ns ∈ N s and n ∈ N , ns = n would mean that
they represent statement with same label. This also holds for
special nodes ENTRY and EXIT.
Definition 10: (SC execution state). Given a program P
and slicing criterion hl, V i, execution states of P having
statement location as l are called SC execution states.
Given a program P and slicing criterion Υ = hl, V i, let
τ : [(ni , σi )], 0 ≤ i ≤ k. be the trace for input I with m SCexecution states. Let τ s : [(nsi , σis )], 0 ≤ i ≤ k s , be trace for a
slice S of P , on same input I with ms SC-execution states. Let
[hnlj , σlj i], 1 ≤ j ≤ m and [hnslj , σlsj i], 1 ≤ j ≤ ms be the
sequence of SC-execution states in in τ and τ s respectively.
We say, hnlj , σlj i and hnslj , σlsj i for 0 < j < min(m, ms )
are corresponding SC-execution states. Now the window of
observation for Υ = hl, V i is the sequence of V-restricted
program states [bσlj cV ], 1 ≤ j ≤ m. We will call such a
sequence as the trace window of observation T W (P, I, Υ).
Definition 11: (SC-equivalent trace). A trace τ of P on an
input I is called SC-equivalent to trace τ s on slice S for same
input I, if T W (P, I, Υ) = T W (S, I, Υ).
We express the definition of a backward slice PΥB for a
program P and a slicing criterion Υ as follows.
1)
2)
PΥB is subprogram of P A .
For every input I on which original program terminates,
T W (P, I, Υ) = T W (PΥB , I, Υ).
Of all methods that use some form of data flow to compute
the backward slice, the methods of Ferrante et al. [?] and
Horwitz et al. [?] using program dependence graphs (PDG)
produce the minimal slice.
III.
Q2
We now formalize the notions of control and data slice.
A. Control slice
A control slice of a program P wrt. to the slicing criterion
Υ = hl, V i, denoted PΥC , is the backward slice of P with
respect to the slicing criterion hl, ∅i.
Thus, the sliced program P C contains those statements of
the original program which merely caused the program control
reach the program point l. We now show that the control slice
is contained in the backward slice.
Lemma 1: PΥC ⊆ PΥB
Proof: From the definition of control slice, we have
B
PΥC = Phl,∅i
. Further, backward slices have the property [?]
B
B
B
B
V1 ⊂ V2 implies Phl,V
⊂ Phl,V
and thus Phl,∅i
⊆ Phl,V
i.
1i
2i
B
C
Consequently PΥ ⊆ PΥ
Since computing backward slice is a well studied problem,
we can compute the control slice by computing the backward
slice with respect to the slicing criterion hl, ∅i following any
of the existing approaches.
DATA AND CONTROL SLICES
A backward slice is the answer to the question “Given a
slicing criterion Υ = hl, V i, which program statements can
affect the values of the variables V ?” This question can be
meaningfully split into two parts:
Q1
To obtain the data slice for P1 for the same slicing criterion,
we reason as follows. The value of y at line 13 is given by
assignment at 11 and the condition at line 12 has no impact
on this value. Therefore line 11 is included in the data slice
but line 12 is not. The value of x assigned to y at line 11 is
computed by lines 10 and 4. Of these, the value that reaches
line 11 during execution is decided by condition at line 9.
Therefore lines 4, 9 and 10 are also included in the data slice.
Further, line 6 is also included, as it computes the value to be
used in the condition at line 9. No other statement affects the
value of y at line 13. The resulting program P3 is the data
slice.
Which statements decide whether program control
will reach l?
Assuming that control reaches l, which program
statements decide the values of the variables V .
As mentioned in the motivating example of Figure1, often
we are interested in the separate answers to questions Q1
or Q2, even if we want to use them together. We call the
subprogram resulting from the answer to Q1 as a control slice
and that to Q2 as a data slice.
In Figure 2, P1 is the original program in which the codes
for the functions fn1 and fn2 are not shown. P2 is the control
slice for the slicing criterion h13, {y}i. The conditions c1 and
x < 10 at lines 7 and 12 decide whether program control
reaches line 13, and therefore they are part of the control slice.
Further, the value of the condition x < 10 may be decided by
the assignment at line 10, which, in turn, is controlled by the
condition at line 9. Therefore both line 12 and line 10 are in
the control slice. For similar reasons, lines 4, 5, and 6 also
have to be included.
B. Data slice
While P3 is an answer to the question Q2 posed for
the criterion h13, {y}i and can therefore be regarded as a
data slice, it is not suitable for applications like program
understanding and debugging. For example, the information
that the statement at line 13 may not be executed at all is
missing from P3. Thus apart from the statements that decide
on the values of variables at a slicing criterion, we also need
to include statements that explicate the paths along which the
computation of such values takes place.
Therefore, we also include conditions that impact the
reachability of l. This is shown in P4, and the included
conditions are shown as ‘*’ indicating a non-deterministic
branch. We make such conditions non-deterministic because
their values are inconsequential for our purpose. Further, if
these conditions were made concrete, then we would also have
to include additional statements affecting their values, increasing the size of the slice. We call such a non-deterministic
conditional as abstract conditional. During execution, such a
conditional can randomly evaluate to true or f alse.
The form of the slice as shown in P4 is good for program
understanding and debugging. However it falls short if used
for property verification. The reason is that while the abstract
conditional helps in keeping the size of the sliced program
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
proc (int z)
{
int w,x,y;
x = z;
c1 = fn1();
c2 = fn2();
if (c1)
{
if (c2)
x = z+5;
y = x;
if (x < 10)
w = y;
}
}
1
2
3
4
5
6
7
8
9
10
proc (int z)
{
int w,x,y;
x = z;
c1 = fn1();
c2 = fn2();
if (c1)
{
if (c2)
x = z+5;
11
2
3
4
proc (int z)
{
int w,x,y;
x = z;
1
2
3
4
5
13
}
14
c2 = fn2();
6
7
7
8
8
if (c2)
x = z+5;
9
10
(a) P1
13
15
(b) P2
9
10
11
y = x;
w = y;
12
12
13
14
}
15
1
2
3
4
5
c2 = fn2();
if (*)
{
if (c2)
x = z+5;
y = x;
if (*)
w = y;
}
6
14
}
proc (int z)
{
int w,x,y;
x = z;
5
11
if (x < 10)
w = y;
12
15
1
}
(c) P3
6
7
8
9
10
11
12
13
14
15
(d) P4
proc (int z)
{
int w,x,y;
x = z;
c1 = *;
c2 = fn2();
if (c1)
{
if (c2)
x = z+5;
y = x;
if (x < 10)
w = y;
}
}
(e) P5
Fig. 2: Various forms of data slices
small, it elides path conditions that are important for verification. As an example, suppose we want to check the property
y < 20 at line 13. This property holds in original program
but does not hold in P4. However, if we retain the included
conditionals in concrete form and abstract out instead those
assignment statements that assign to the variables involved in
the conditional, we get P5. The property y < 20 holds for this
program. Note that the assignments to x cannot be eliminated
since they also determine the value of the variables of the
slicing criterion.
An abstract assignment of the form x = * assigns to x
a random value from some domain. If x is an integer, for
example, then x is assigned an integer value between −231 to
231 − 1.2
Due to inclusion of abstract conditions and assignments,
there will be multiple execution paths on a given input. In
general, the slice produced by abstract assignments will have
less number of possible executions paths for same input in
comparison to the one produced by abstract conditionals. For
example, P4 may have 4 different execution paths on a given
input while P5 will have only two such paths on same input.
As a result, the slice produced through abstract assignments
is more useful in property checking. The flip side is that slice
produced by abstract assignments may be larger than the one
produced by abstract conditionals. Given a program P , we
shall call a subprogram of P in which some of the assignments
and conditionals have been replaced by their abstract versions
as an abstract subprogram.
Now we will formally define a data slice and identify the
statements which should be part of the data slice.
C. Data slice: Formalization
Given a slicing criterion hl, V i, a data slice is required
to retain the program’s behavior in computing the value set
of the variables in V , but is not required to visit l as many
times as the original program. However, whatever value sets
are computed by the slice should match those computed by the
original program in a sense that we shall make precise now.
2 Assuming
a 4 byte 2s complement representation.
Consider program P7 of Figure 3. Assume that the number
of times the outer loop iterates depends on the input and the
inner loop iterates a fixed number of times, say 3. If the outer
loop executes twice for an input I, the values of x at line 8
will be 3,6,9,3,6,9. However, if both the while conditions are
replaced by ‘*’ in a slice, then for the same input, 3,3 is one
of the sequence of values generated for x. This sequence does
not match the sequence generated by the concrete program. On
the other hand, if only the outer loop condition is replaced by
‘*’, then the output produced will be zero or more occurrences
of sequence 3,6,9. These sequences are considered to match
the sequence produced by the original program.
Based on these considerations, we identify the necessary
properties of a data slice P D for a given program P and slicing
criterion hl, V i.
1)
2)
3)
P D is an abstract subprogram of P
For every input I, on which augmented program
terminates with trace τ , there exists a trace τ d of P D
on same input I, such that τ and τ d are SC-equivalent.
Let τ d and τ be traces of P D and P A respectively on
an input I. Let k be the minimum of the numbers of
SC-execution states in τ and τ d . Then for all i ≤ k,
the V-restricted program states of ith SC-execution
states of τ and τ d are the same.
Clearly, a backward slice P B also satisfies the properties of
data slice mentioned above. Therefore, P D ⊆ P B
Given a slicing criterion hl, V i, we now identify statements
which are necessarily in the data slice. We call such statements value-impacting and define the term shortly. Informally
speaking, a chain of assignments that determine the value set
of V is value-impacting. Further, a condition that determines
which of the several values generated by value-impacting
statements reaches l during execution is also value-impacting.
In subsequent discussions, we shall often use “value-impacting
statements” to mean both value-impacting assignments and
conditionals.
Definition 12: (Value-impacting statement) A statement s
value-impacts Υ, if any of the following conditions hold:
1)
2)
s is the augmented SKIP statement.
s is an assignment, and s ∈ DU (Υ).
3)
4)
s is an assignment, and there exists a statement t such
that t value-impacts Υ and s ∈ DU (LV (t)).
s is a condition c, and the following holds: From c
there exist paths π1 , π2 to l starting from edges e1
and e2 respectively. Further, there exists a statement
t such that t value-impacts Υ and
a) t is the first value-impacting statement along
π1
b) t is not the first value-impacting statement
along π2 .
The triplet hπ1 , π2 , ti due to which a condition c satisfies
rule (4) will be called a witness for a value-impacting condition. Obviously, there can be more than one witnesses for a
condition to be value-impacting. The set of all such witnesses
will be referred as W V I(c, Υ).
In Figure 3 we show some examples of value-impacting
statements. The CFGs of these programs are shown in Figure 4.
In P6, lines 1 and 8 are value-impacting for h11, {x}i because
the values of x generated at these statements reach 11. In
addition, condition c2 is also value-impacting for the reason
that of the two paths from c2 to 11, only one has x = z + 5
as the first value-impacting statement. As a consequence c2
determines whether the value generated at line 1 or at line
8 reaches 11. However, notice that while line 8 is valueimpacting for h9, {x}i, condition c2 is not, because there is no
path to line 9 from the false edge of c2. Similarly, condition
c1 value-impacts h13, {x}i.
In P7 of Figure 3, the definition of x at lines 4 and 7
are value-impacting for h7, {x}i. Since line 7 is not reachable
along the false edge of c2 without passing through line 4, c2
also becomes value-impacting for h7, {x}i. In P8, we can see
that, c2 is value-impacting for h7, {x}i.
Obviously, if a statement s value-impacts a slicing criterion
Υ = hl, V i, then s can be the cause of an erroneous value of
some v ∈ V at l and should be examined while debugging.
Therefore, s must be part of P D .
Let V I(Υ) be the set of value-impacting statements of Υ.
Let AC(Υ) be conditional statements that are not by themselves value-impacting, but on which other value impacting
statements are strongly (and transitively) control dependent.
Formally:
[
AC(Υ) = (
{c | c −→ t}) \ V I(Υ)
t∈V I(Υ)
states in τ and τ 0 such that n0 = n00 = EN T RY and for
i > 0 and j > 0 ni , n0j ∈ V I(Υ). Let K be minimum of the
number of elements in τs and τs0 . Since l occurs at least once
in τ and in τ 0 , K > 0. We will prove by induction on i that for
all i ≤ K, ni = n0i and bσi cZ = bσi0 cZ , where Z = REF (ni ).
Base step : i=0. It holds trivially as n0 = n00 = EN T RY ∧
σ0 = σ00 = I.
Induction step: Let the hypothesis be true for i ≤ K and
assume that i + 1 ≤ K (else the proof holds vacuously). Since
bσi cZ = bσi0 cZ , the edge followed from ni and n0i in τ and
τ 0 have to be same. Assume that ni+1 6= n0i+1 . Let c be a
common condition, with edges e1 and e2 , occurring between
ni and ni+1 in τ and between n0i and n0i+1 in τ 0 . Clearly
there is such a c, otherwise ni+1 would have been the same
as n0i+1 . Since both traces have occurrence of l and ni+1 and
n0i+1 are the first value-impacting statements on paths from e1
and e2 , the condition c ∈ V I(Υ) according to the definition.
This is contrary to our assumption that ni+1 and n0i+1 are the
first value-impacting statements in τ and τ 0 after ni and n0i
respectively. Therefore, ni+1 = n0i+1 .
Now suppose that for some variable x ∈ Z, σi+1 (x) 6=
0
σi+1
(x). Let d be statement which provides value of x at ni+1 .
But then d ∈ V I(Υ). If d occurs before or at ni then it must
0
be there in τ 0 also and therefore, σi+1 (x) = σi+1
(x). If d
occurs after ni then hni+1 , σi+1 i can not be the first element
of τs after hni , σi i. This is contrary to our assumption and
0
therefore σi+1 (x) = σi+1
(x).
Now we prove our claim that P S is a data slice. We shall
show this by constructing a trace τ 0 for P S from a given trace
τ of P A on an input I. This will establish that P S satisfies
property (2) of data slice. Using lemma 2, we shall show that
P S satisfies property (3) as well.
Theorem 1: The abstract subprogram P S satisfies the
property for data slice.
Proof: Let τ be a trace for program P A on input I that
has K ≥ 0 execution states. Let τ 0 = [hni , σi i], 0 ≤ i ≤ K,
be the sub-sequence of τ such that ni , i ≥ 0 are nodes in
CFG of P S . We show by induction on i that for each i ≤ K,
[hni , σi i] is also the prefix of a trace for P S .
Base step: i = 0. The lemma holds trivially as n0 =
EN T RY .
We construct an abstract subprogram P S = V I(Υ) ∪ AC(Υ)
in which the conditionals in AC(Υ) appear in an abstract form.
Obviously, P S retains the structure of P A with respect to all
statements included in P S . We claim that P S is a data slice.
To show this, we shall first prove that the value sets of Υ
produced by execution of P S match those produced by P A .
Induction step: Assume that the hypothesis holds for some
i ≤ K. Let ni be a condition. If ni ∈ AC(Υ) then it is abstract
and can take either branch. If ni ∈ V I(Υ) then by lemma 2 it
will have the same value as in trace τ . So for any edge taken
out of ni in τ , there is a trace of P S which takes the same
edge.
Lemma 2: Let τ and τ 0 be traces of programs P A and P S
for an input I. Also assume that both the traces go through l
at least once. Then the corresponding SC-execution states of
τ and τ 0 will be the same when restricted to the variables in
V.
Now assume that for none of the traces of P S is the
(i + 1)th node same as ni+1 . This must be because of some
condition c before ni+1 , but after ni , in τ . But then c −→ ni+1
and therefore c ∈ P S . So hni+1 , σi+1 i can not be the first
execution state after hni , σi i in τ 0 , a contradiction.
Proof: Let τs
=
[hni , σi i],
i
≥
0 and
τs0 = [hn0j , σj0 i], j ≥ 0 be the sequence of execution
Thus, property (3) is satisfied. By lemma 2, it is obvious
that property (2) is also satisfied.
1
2
3
4
5
6
7
8
9
10
11
12
13
x = z;
c1 = fn1(z);
c2 = fn2(z);
if (c1)
{
if (c2)
{
x = z+5;
t = x;
}
y = x;
}
w = x;
1
2
3
4
5
6
7
8
9
10
11
c1=fn1(x);
while (c1)
{
x = 0;
while (c2)
{
x = x+3;
y = x;
}
c1=fn1();
}
1
2
3
4
5
6
7
8
9
10
11
x = 0;
c1 = fn1(x);
while (c1)
{
c2 = fn2(x);
if (c2)
y = x;
else
x = x+3;
c1 = fn1(x);
}
(b) P7
(c) P8
(a) P6
Fig. 3: Programs to explain value-impact
Fig. 5: Program dependence graphs
As seen from the examples, to capture value-impact we
need to consider both strong and weak control dependence.
For this we make use of transitive control dependence.
Fig. 4: Control flow graphs
D. Computing data slice using data and control flow
We now relate V I(Υ) to control and data dependence. In
Figure 5, we show PDG for programs of Fig. 3. Solid, normal and dotted arrows show data dependence, strong control
dependence and weak control dependence respectively. In P6
of Fig. 3, c2 is value-impacting for h11, {x}i. In terms of
control-dependence, line 11 is not control dependent on c2
while the value-impacting assignment at line 8 is. For exactly
similar reasons, condition c1 is value-impacting for h13, {x}i.
We generalize the identified condition for a slicing criterion
Υ = hl, V i as cond1 : l is not control dependent on condition
c and a value-impacting statement for Υ is transitively control
dependent on c.
In P7, c2 is value-impacting for h7, {x}i, a slicing criterion
whose program point (line 7) is strongly true-control dependent
on c2. The value-impacting assignment for this criterion at
line 4 is weakly false-transitively control dependent on c2.
Similarly, in the case of P8, condition c2 is value-impacting
for h7, {x}i and 7 is strongly true-control dependent on c2.
Moreover, the value-impacting assignment at line 9 is strongly
false-control dependent on c2. From these observations, we
identify a second condition cond2 : l is control dependent on
c and l is reachable from one edge and a value-impacting
statement is reachable from other edge. We show that the
disjunction of cond1 and cond2 is a necessary condition for
value-impact. Thus we can use the disjunction to compute an
over-approximation of value impacting conditions.
We now make the following connections between transitive
control dependence and weak post dominance.
Claim 1: Given a condition c and a statement s, assume
e
that c −→ s. If there is a statement t distinct from c such that
there is a path from c to s starting from the edge ē 6= e and
ē
going through t, then c
t.
Claim 2: Let c be a condition and u be a statement distinct
from c such that u is the immediate post-dominator of c. If
there is a statement t distinct from c and u such that there is
a path from c to u starting with edge e and passing through t,
e
then c −→ t.
We shall now establish that if a condition c is valueimpacting, then there must be another value-impacting statement which is transitively-control dependent on c.
Lemma 3: Assume that for a slicing criterion Υ = hl, V i,
c ∈ V I(Υ). Then one of the following holds:
∃hπ1 , π2 , ti ∈ W V I(c, Υ) : (¬(c −→ l) ∧ c −→ t), or
e
e2
e2
∃hπ1 , π2 , ti ∈ W V I(c, Υ) : (c −→
l ∧ ¬(c −→
t) ∧ c 1 t).
where e1 and e2 are starting edges of paths π1 and π2
respectively.
Proof: Let c ∈ V I(Υ). The proof is by case analysis:
Case 1: Assume ¬(c −→ l). Then there must exist u 6=
c such that u is immediate post dominator of c. Since c ∈
V I(Υ), by definition 12 there are paths π1 and π2 starting
from e1 and e2 and a value-impacting statement t such that at
least one of the π1 and π2 should have t before u. Without
loss of generality, assume that t is on π1 . Then by claim 2,
c −→ t. Thus we have proved that for the witness hπ1 , π2 , ti ∈
W V I(c, Υ), ¬(c −→ l) and c −→ t.
Case 2: Assume c−→l, and call the starting edge in the
e2
l.
chain of control dependence from c to l as e2 , i.e. c −→
From the definition of value-impacting condition, there is a
path from c to l that has a statement, say t, as the first valueimpacting statement and another that does not have t as the
first value-impacting statement. Now there are two cases:
1. Let the path that has t as the first value-impacting
statement leave c through the edge e1 . For the kind of programs
under consideration, no path from c to l can bypass e2 .
Therefore t on π1 must be between e1 and e2 . Thus we have
e
e2
t), and by claim 1, c 1 t. The witness in this case
¬(c −→
being hπ1 , π2 , ti.
Proof: Once again the proof is by induction on
M LP (s, l).
Base case: i = 0. s must be the augmented SKIP
statement and and therefore s ∈ P B
Induction step : Let the hypothesis be true for all s such
that M LP (s, l) ≤ i and consider a s for which M LP (s, l) =
i + 1 and s ∈ CVI (Υ ). By definition of CVI (Υ ), we have
the following cases:
1)
2)
2. Now let the path that has t as the first value-impacting
statement leave c through the edge e2 . Once again the path
that goes from c to l through e1 must go through e2 and there
must be a first value-impacting statement w between e1 and
e2
w),
e2 . Now we have a witness hπ1 , π2 , wi for which ¬(c −→
e1
w.
and by claim 1, c
3)
Based on lemma 3, we shall give criteria for computing a set of
statements CVI (Υ ), (computed value-impacting statements).
CVI uses data and control dependence and computes an overapproximation of VI .
s is an assignment and s ∈ DU (Υ). Clearly s ∈ P B .
s is assignment and ∃t ∈ CVI (Υ ) : s ∈
DU (LV (t)). Clearly M LP (t, l) ≤ i and therefore
t ∈ P B . By construction of backward slice, s ∈ P B .
s is a condition c, say with two edges e1 and e2 . By
definition of CVI (Υ ), ∃t : t ∈ CVI (Υ ), satisfying
one of the following:
Case a: c −→ t ∧ ¬(c −→ l). Obviously,
M LP (t, l) ≤ i and c −→ t. By the induction
hypothesis, t ∈ P B . Therefore c ∈ P B .
e
e1
e1
Case b: c −→
l ∧ ¬(c −→
t) ∧ c 2 t. In this case
c −→ l and therefore, by construction of backward
slice, c ∈ P B .
A statement s is in CVI (Υ ) if:
1)
2)
3)
4)
s is the augmented SKIP statement at l.
s is an assignment such that s ∈ DU (Υ).
s is an assignment, and there is a statement t such
that t ∈ CVI (Υ ) and s ∈ DU (LV (t)).
s is a condition c, with two outgoing edges, labeled
as e1 and e2 , and ∃t ∈ CVI (Υ ) satisfying one of the
following:
a) c −→ t ∧ ¬(c −→ l)
e
e1
e1
b) c −→
l ∧ ¬(c −→
t) ∧ c 2 t
Condition 4) of CVI is motivated by lemma 3.
We shall now show that CVI (Υ ) computes an over approximation of value-impacting statements V I(Υ). In subsequent
proofs, we use M LP (s1 , s2 ) to denote maximum length of
a loop free path in a CFG from s1 to s2 . In particular,
M LP (s, s) = 0.
Lemma 4: V I(Υ) ⊆ CVI (Υ )
Proof: Let s ∈ V I(Υ). We will prove the result by
induction on M LP (s, l).
Base step: M LP (s, l) = 0. s must be the augmented
SKIP statement and therefore in CVI (Υ ).
Induction step: Let the hypothesis be true for all s such that
M LP (s, l) ≤ i and consider a s for which M LP (s, l) = i + 1
and s ∈ V I(Υ). If s is an assignment, then s ∈ CVI (Υ ) from
definition. Let s be a condition c. Let hπ1 , π2 , ti ∈ W V I(c, Υ)
satisfy the criteria of lemma 3. Obviously M LP (t, l) ≤ i.
and t ∈ CVI (Υ ) by the induction hypothesis. By definition,
c ∈ CVI (Υ ).
We will now show that though CVI is an overapproximation of VI , it is contained within the backward slice
P B.
Lemma 5: CVI (Υ ) ⊂ PΥB .
IV.
DATA SLICE COMPUTATION
As stated earlier, CVI (Υ ) provides the core set of statements of the data slice. To make the slice executable, conditions are added using one of the methods of creating abstract
sub programs described before. We present an algorithm to
compute CVI only; adding the abstract conditions and assignments is straightforward. As an example, the conditions c
to be abstracted are given by {c | c −→ l}\CVI (Υ ).
Algorithm 1 Identifying CVI conditions
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
procedure getCVIConds(t, lconds)
begin
R=∅
tconds = tcntrls(t)
for all conditions c appearing in tconds do
lsttab[T ] = (hc, T, truei ∈ lconds)
lsttab[F ] = (hc, F, truei ∈ lconds)
tsttab[T ] = (hc, T, truei ∈ tconds)
tsttab[F ] = (hc, F, truei ∈ tconds)
tswtab[T ] = (hc, T, f alsei ∈ tconds)
tswtab[F ] = (hc, F, f alsei ∈ tconds)
if (¬lsttab[T ] ∧ ¬lsttab[F ] ∧ (tsttab[T ] ∨ tsttab[F ]))
then
add c to R
else
if ((lsttab[T ] ∧ ¬tsttab[T ] ∧ tswtab[F ])) ∨
(lsttab[F ] ∧ ¬tsttab[F ] ∧ tswtab[T ]) then
add c to R
end if
end if
end for
return R
end
A. Computing CVI (Υ )
In computing CVI (Υ ), the critical part is to identify
conditional expressions which satisfy criteria for being in CVI .
We assume that the P DG already exists with weak and strong
control dependences and data dependences. Such a P DG can
be computed efficiently by algorithm of Bilardi and Pingali
[?]. From the PDG, for a given statement s, we can find
e
the set conds(s) of pairs hc, e, bi, such that c
s when
e
b = f alse and c −→ s when b = true. Using conds(s), we
can compute the set of conditions on which s is transitively
control depdendent. We call this set as tcntrls(s). We do so by
traversing the PDG and taking a transitive closure of conds(s).
By the definition of CVI (Υ ), we need to examine only the
conditions c which appear in tcntrls(t) for a given statement t.
Algorithm 1 computes the set of conditions which satisfy the
criteria for CVI (Υ ) for a given statement t which is already
in CVI (Υ ). Lines 6 to 11 identify the kinds of transitive
control dependence that t has on the outgoing edges of c.
e
While tsttab[e] = true means c −→ t, tswtab[e] = true means
e
c
t. Algorithm 2 computes the complete set CVI (Υ ) using
a worklist based approach. A node comes on the worklist only
once. The final result is denoted by a boolean array inslice
having value true for every statement included in CVI (Υ ).
Algorithm 2 Computation of CVI (Υ )
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
procedure computeCVISet(l, V)
begin
initialize inslice, inwl with f alse
inslice[l] = true ; lconds = tcntrls(l)
wl = {}
duset = DU (l, V )
for all s ∈ duset do
add s to wl ; inwl[s] = true
end for
while wl is not empty do
remove next element w from wl
inslice[w] = true
duset = DU (LV (w))
cset = getCV ICond(w, lconds)
for all s ∈ (duset ∪ cset) do
if inwl[s] = f alse then
add s to wl ; inwl[s] = true
end if
end for
end while
end
B. Algorithm complexity
Assume there are N nodes, E d data dependent edges and
E c control dependent edges, giving a total of E = E d + E c
edges in the PDG. In getCV IConds, computing tcntrls for
the given node, will take O(E c ) time. The checks in lines 6 to
11 can be done in O(1) time with a space complexity of O(N ).
Since the checks have to be made for all conditions occurring
in tcntrls, the worst case complexity of getCV IConds would
be O(N +E c ). In algorithm, computeCV ISet, a node goes in
the worklist only once, therefore there would be maximum N
invocations of getCV IConds. The worst case complexity of
entire algorithm is O(E c ×N +N 2 +E d ). However in practice,
the loop at line 5 in getCV IConds will be executed much
fewer times than N and nodes going in worklist will also be of
the size of the data slice. As a result, the algorithm’s average
complexity will be O(N +E c +E d ). In contrast, the backward
slice is computed in O(E) time, in worst case. Note that in
both cases the time complexity is arrived at by assuming that
P DG have already been built. In practice, our results have
also shown that there is only a marginal increase in time in
computing data slice from that taken in backward slice when
compared to time taken in building the PDG itself.
V.
I MPLEMENTATION AND MEASUREMENTS
We implemented the algorithm to compute data slices
using our in-house data flow analysis framework called PRISM
which is based on the JAVA platform. It can construct PDGs
and can compute the conventional backward slices. It has been
used for developing static analysis tools [?], [?]. We have used
a context and flow sensitive points-to analysis. The backward
slicing algorithm is also context sensitive and field sensitive.
Thus it represents the state of the art in backward slicing.
We computed data slice using condition abstraction approach
which is suitable for debugging and program understanding.
Although we have described our algorithm at an intraprocedural level, our implementation performs interprocedural
analysis by summarising procedure calls by a sequence of
assignments simulating the use-def summary of called procedure. We trigger additional slicing criteria at call points based
upon the values needed at procedure entry point in a context
sensitive manner. We computed data slice for these additional
slicing criteria and at the end took a union of all of them. This
may introduce some imprecision but is sound.
Our experiments have been carried out on 3.0 GHz Intel Core2Duo processor with 2 GB RAM and 32 bit OS.
Measurements were peformed on 42 modules of varying sizes
of a proprietary code base of a large navigational system of
an automobile. Due to space constraints, we have presented
summary data of only 20 modules in Figure 6. Column (1)
gives anonymized program names. Column (2) lists the number
of CFG nodes. Column (3) gives number of slices computed
for the program. For this purpose we randomly selected the
return statements of functions returning some value as the
slicing criterion. For each program, we picked up maximum
ten such slicing criteria. In all, we created slices for total 391
such slicing criteria spread over 42 programs.
Columns (4), (5) and (6) provide the average sizes of slices
in terms of the number of nodes for backward slice (BS), data
slice (DS) and control slice (CS) respectively. Columns (7), (8)
and (9) provide the average sizes of slices as a percentage of
the program size (as given in column (3)) for BS, DS and CS
respectively. The average time taken (in seconds) in computing
these slices is shown in columns (10), (11) and (12) in same
order. This time includes the time taken for constructing PDGs.
Figure 7 shows the distribution of sizes of slices in terms of
percentage of program sizes through a graph. The X axis shows
the size of the slice and Y axis shows the percentage of slicing
criteria exhibiting that size. In the figure, BS, DS and CS stand
for backward slice, data slice and control slice respectively. It
is clear that in more than 60% of the cases, the size of a data
slice is smaller than 10% of the code size. Besides, the time
Program
(1)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Overall
Size
(nodes)
(2)
1063
1183
2944
881
1607
2246
2493
2635
2992
1625
3413
3105
4452
5236
2616
3883
802
8116
6746
11104
number of
slices
(3)
10
10
10
10
10
10
5
10
9
10
10
5
1
1
10
10
10
10
10
10
Avg. Size (in
BS
DS
(4)
(5)
229
60
266
123
360
257
148
62
226
137
447
348
167
81
842
257
437
149
190
94
733
341
571
412
369
70
982
25
948
761
1202 180
92
56
3489 1637
1928 1558
4096 1214
nodes)
CS
(6)
227
240
236
148
203
444
163
842
429
178
728
563
317
982
945
1202
90
3143
1923
4053
Avg Size as % of program
BS
DS
CS
(7)
(8)
(9)
21.63 5.65
21.37
22.49 10.43
20.36
12.26 8.75
8.03
16.89 7.12
16.81
14.08 8.55
12.65
19.93 15.49
19.79
6.70
3.26
6.54
31.98 9.79
31.97
14.63 5.01
14.34
11.70 5.84
10.98
21.50 10.01
21.35
18.41 13.29
18.13
8.29
1.57
7.12
18.75 0.48
18.75
36.27 29.12
36.15
30.97 4.64
30.96
11.48 7.01
11.28
42.99 20.18
38.73
28.58 23.10
28.51
36.89 10.94
36.50
24.89 10.66
24.04
time in seconds
BS
DS
CS
(10)
(11)
(12)
26.33
26.34
26.32
32.05
32.07
32.04
38.15
38.21
38.13
60.43
60.47
60.42
39.46
39.51
39.45
56.47
57.24
56.45
51.45
51.48
51.42
44.20
44.31
44.19
52.67
52.76
52.65
63.80
63.83
63.79
92.74
92.97
92.70
71.41
89.70
71.35
102.29 102.27 102.26
116.92 116.47 116.53
208.23 230.40 208.24
215.99 216.14 215.97
53.85
53.86
53.84
447.69 512.58 447.30
272.10 293.40 271.74
301.26 322.31 301.13
Fig. 6: Average slice sizes and computation time
the slicing criterion rather than the value computed. It is not
surprising then that the size of a control slice is comparable
to that of the corresponding backward slice in majority of the
cases. The average size of control slice turns out to be of 24.4%
of program size which is comparable to the size of backward
slice (24.89%).
VI.
C ONCLUSION
Different applications of program understanding require
different combinations of influences governing data computations and control flow. For example, in the case of debugging
for wrong output values, the influences governing the reachability of the statement of interest are irrelevant.
Fig. 7: Slice size distribution. X-axis shows slice size as
percentage of program size and Y-axis shows percentage of
slicing criteria for which this size was observed.
required to compute a data slice is comparable to the time
taken for computing a backward slice.
Note that the average size of backward slices is 25% of the
code size which matches the observation by Binkley et al. [?].
suggesting our slices are comparable in precision. Average size
of data slice is found to be 10% of the code size. Given
such a reduction, data slices may be very helpful in debugging, property checking and program understanding. This data
corroborates our intuition that most statement are included in
a backward slice because they influence the reachability of
It follows that separating the influences of data and control
in a backward slice by constructing separate data and control
slices is an effective way of producing smaller programs for
debugging, program understanding and property checking. In
the case of debugging for wrong output values, a data slice
provides a much smaller piece of code to investigate than that
provided by a backward slice for the same slicing criterion.
We have provided formal definitions of data and control
slices, defined algorithms to compute them, have shown the
soundness of the algorithms, and have presented the results of
our empirical experiments. Our measurements show that a data
slice is indeed much smaller than the corresponding backward
slice and is computable in comparable time.
In future, we would like to investigate the minimality of
data slices and efficient algorithms to compute them. We would
also like to explore the effectiveness of data slices for much
larger programs.
| 6cs.PL
|
OPTIMIZING SYNCHRONIZATION ALGORITHM FOR
AUTO-PARALLELIZING COMPILER
arXiv:1211.4101v3 [cs.DC] 1 Mar 2013
Gang Liao, Si-hui Qin, Long-fei Ma, Qi Sun
Department of Computer Science and Engineering, Sichuan University Jinjiang College, China, Pengshan, 620860.
[email protected], [email protected], [email protected], [email protected]
ABSTRACT
In this paper, we focus on the need for two approaches to
optimize producer and consumer synchronization for autoparallelizing compiler. Emphasis is placed on the construction of a criterion model by which the compiler reduce the
number of synchronization operations needed to synchronize the dependence in a loop and perform optimization reduces the overhead of enforcing all dependence. In accordance with our study, we transform to modify and eliminate
dependence on iteration space diagram (ISD), and carry out
the problems of acyclic and cyclic dependence in detail. we
eliminate partial dependence and optimize the synchronize
instructions. Some didactic examples are included to illustrate the optimize procedure.
KEY WORDS
auto-parallelizing, compiler, synchronization, dependence
analysis
1
Introduction
During the past decade, the field of compiling for parallel architecture has exploded with widespread commercial
availability of multicore processors [1][2]. Research has
focused on several goals, the major concern being support for auto-parallelizing. The goal of auto-parallelizing
is compiling an invariant and unannotated sequential program into a parallel program [3].
Although in recent years most attention has been
given to support for languages with parallel annotations
(i.e. OpenMP [4] allow programmer to manually hint
compiler about parallel regions.), the parallelization of
legacy code still has a profound historical significance.
The Parafrase system [5] is the first automatic parallelize
compiler based on dependence analysis, which was developed at the University of Illinois. The most ambitious for
parafrase was to find out how to develop architecture to exploit the latent parallelism in off-the-shelf dusty deck programs [6]. By using producer/consumer synchronization
(e.g. the Alliant F/X8 [8] [9] implemented synchronization
instructions), this ordering can be forced on the program
execution, allowing parallelism to be extracted from loops
with dependence.
In this paper, We focus on the parallelization of legacy
code and optimizing producer/consumer synchronization
via two approaches in auto-parallelizing compiler. We pro-
Source
Code
Parser and lexical
analysis
Dependence and
other analysis
Dependence
breaking
transformations
Intermediate representation
(symbol table, control flow, call graph, representation of statements)
Parallel
Program
Low level
optimization and
code generation
Other high level
optimizations
Parallelization
activities
Figure 1. High-level structure of a parallel compiler
ceed as follows. First, in section 2, we present the compiler
fundamentals and the target architecture. In order to understand the latter section, we introduce some concepts of
auto-parallelizing compiler so as to be acquainted with jargons. In additional, for clarity and brevity are served by
directing the discussion towards a single architecture. In
section 3, in order to understand how parallelism can be
extracted from cyclic loops using producer/consumer synchronization, we must discuss how to extract parallelism
when the dependence graph may be cyclic and loop freezing cannot be used to break the cycles. In section 4, we
show how to reduce and optimize the number of synchronization instructions used to synchronize a loop.
2
The Compiler Fundamentals and Target
Computer
In order to relieve programmers from the tedious and errorprone manual parallelize process, the compiler need automatic convert sequential code into multi-threaded or vectorization code to utilize multiple processors simultaneously in a shared-memory multiprocessors machine.
2.1
Automatic Parallelize Compiler Fundamentals
The high level flow of a compiler is shown in Figure.1. The
actual phases of the compiler are shown as the centre, as
well as inputs and intermediate files are shown as rounded
boxes.
In fact, the source program may be a binary file, used
in binary instruments and binary compilers [11]. In general, a Java or Python source-to-byte code compiler would
convert the binary file to the bytecode file which contains
analysis information for the compilation unit included,
to the further dependence analysis on a compilation unit.
A compilation unit is lexically analyzed and parsed by
the compiler. The lexical analysis and parsing are not
studied in this paper. A discussion of detailed techniques
for compiler can be found in [12] (e.g. regular expression, deterministic finite automata, non-deterministic finite
automata). The result of the parser is an intermediate
representation (IR), which is regarded as an abstract
syntax tree and a graphical representation of the parsed
program. We will modify this slightly and represent programs as a control f low graph (CFG). In a control flow
graph, each node bi ∈ B is basic block. There are, in most
presentations, two specially designated blocks: the entry
block, through which control enters into the flow graph,
and the exit block, through which all control flow leaves.
Where an edge bi → bj means that bi may execute directly
before bj . In additional, A CFG are sometimes converted
to static single assignment (SSA) form [13].
Dependence analysis determines whether or not it is
safe to reorder or parallel statements. In general, control
dependence (S1 δ c S2 ) is a situation in which a program’s
instruction executes if the previous instruction evaluates
in a way that allows its execution. A data dependence
(S1 δ f S2 , S1 δ a S2 , S1 δ o S2 , S1 δ i S2 ) arises from two statements which access or modify the same resource [7]. Loop
dependence analysis is mostly done to find ways to do
auto-parallelizing, which is the task of determining whether
statements within a loop body form a dependence, with respect to array access and modification, induction, reduction
and private variables, simplification of loop-independent
code and management of conditional branches inside the
loop body.
2.2
Shared Memory Multiprocessors Machine
In order to clarity and brevity, the target computer assumed
throughout this paper is a shared memory multiprocessor.
In these systems, the processing elements can access any
of the global memory modules through an interconnection
network and code executes serially on each processor, and
parallelism is realized by the simultaneous execution of different iterations of a loop on different processors. In the
shared memory version of the program, each thread executes a subset of the iteration space of a parallel loop. The
Cartesian space define slightly the boundary of the loop
for the loop’s iteration space. In Figure.2 an example of
scheduling and execution of a shared memory program is
shown. However, all large machines for high-performance
numerical computing have a physically distributed memory architecture. The distributed memory machines consist
of nodes connected to one another by using Ethernet or a
variety proprietary interfaces.
Here, We presented a short, informal discussion of
compiler fundamentals and shared memory multiprocessor machine. The interested reader will find a more complete discussion in [12][14]. In the latter section, the details
Work
Queue
Loop, a, n, 1, 25, ThreadID
Parallelism execute
with four threads
Loop, a, n, 26, 50, ThreadID
Loop, a, n, 51, 75, ThreadID
Loop, a, n, 76, 100, ThreadID
Queue empty
execute with one thread
Figure 2. Scheduling and execution of a shared memory
program
of producer/consumer synchronize optimizations would be
discussed in this paper.
3
Acyclic and Cyclic Dependence Analysis
Most of the transformations in this paper are based on the
concept of dependence between statements. In a sequential
program, the statement instance Sbj is f low dependence
on the statement instance Sai (Sai δ f Sbj ) if Sai assigns a
value to a variable that may later be read by Sbj . Sbj is
antidependence on Sai (Sai δ a Sbj ) if Sai fetches from a
variable that may be later written by Sbj . Sbj is output
dependence on Sai (Sai δ o Sbj ) if Sai modifies a variable that
may be later modified by Sbj . Sbj is control dependence
on Sai (Sai δ c Sbj ) if Sai is control construct, and whether Sbj
executes or not depends on the outcome of Sai . The more
detailed discussion can be found in [15] [16].
In order to parallel loops with acyclic and cyclic dependence graphs, Samuel P. Midkiff summarized the following steps will be performed [17]. A dependence graph
would be constructed for the loop nest; Find strongly connected components (SCC) formed by cycles of dependence
in the graph, contract the nodes in the SCC into a single large node; (Note: a directed graph is called components of strongly connected if there is a path from each
vertex in the graph to every other vertex.) Mark all nodes
in the graph containing a single statement as parallel; All
inter-node dependence are lexically forward via topologically sort; Group independent, unordered, nodes reading
the same data and marked as parallel into new nodes to
optimize data reuse; Carry out loop fission to constitute a
new loop for each node; Mark as parallel all loops resulting
from nodes whose statements are marked as parallel in the
sorted graph;
These steps will be explained in detail by means of an
example in the remainder of this section.
3.1
Parallelizing Loops with Acyclic
A program with the dependence graph for a loop, as shown
in Alg.1. The acyclic dependence graph for the program
is illustrated in Fig.3 (a). The ∆ defines the dependence
distance (e.g. given a dependence Sai δSbj between instances, ∆ = j−i). The node at the tail of a dependence arc
is the dependence source(Sa ), and at the head of the arc is
the dependence sink (Sb ). In order to topologically sorting
the dependence graph, all dependence must be lexically
f orward (∆ >= 0. i.e. in branchless code the sink of the
dependence is lexically forward of the source of the dependence). The canonical application of topological sorting is
in scheduling a sequence of jobs or tasks based on their dependencies. A topological ordering is possible if and only
if the graph has no directed cycles, that is, if it is a directed
acyclic graph (DAG). Any DAG has at least one topological ordering, and the algorithm are known for constructing
a topological ordering of any DAG in linear time. The more
detailed algorithm can be found in [18].
Algorithm 1 A program with dependence.
for i = 1; i < n; i + + do
S1 : a[i] ← b[i − 1] + ...;
S2 : b[i] ← c[i − 1] + ...;
S3 : ... ← a[i − 1] + b[i] ∗ d[i − 2];
S4 : d[i] ← b[i − 2] − ...;
end for
Simultaneously, since code executes serially on a
given processor, and therefore within an iteration of a loop,
only dependence with a distance greater than zero (∆ >=
0) need to be synchronized explicitly.
After the topological sorted, the dependence graph
Fig.3 (a) is transformed to the Fig.3 (b). There are several
possible ordering of the nodes resulting from a topological
sort, that’s one valid order. After that, the loop can be fully
parallelized by breaking up the loop with dependence into
multiple loops, none of which contain the source and sink
of a loop carried (cross-iteration) dependence. The loop
is transformed by reordering the statements to match the
topological sort order, just like Alg.2.
The program Alg.2 is a more efficient parallelization
that can be performed by a different partitioning of statements among loops that is still consistent with the ordering
implied by the topological sort. In additional, the more efficient partitioning keeps statements that are not related by
a loop-carried dependence together in the same loop. It
called loop f ission (also called loop distribution in the
literature [19]). Acyclic portions of the dependence graph
may be sorted so that dependence are lexically forward,
with a legal fission then being possible. In the program
Alg.2, S1 and S4 can remain in the same loop which is
no loop-carried dependence. That is, the program with a
statement ordering yielding slightly better locality, just like
Alg.3.
S1
S2
S2
S1
S3
S4
S4
S3
(a)
(b)
Figure 3. (a) The dependence graph for the program.
(b) The dependence graph after it has been topologically
sorted.
Algorithm 2 The program is transformed to reflect the order of the topologically sorted dependence graph
for parallel i = 1; i < n; i + + do
S2 : b[i] ← c[i − 1] + ...;
end for
for parallel i = 1; i < n; i + + do
S1 : a[i] ← b[i − 1] + ...;
end for
for parallel i = 1; i < n; i + + do
S4 : d[i] ← b[i − 2] − ...;
end for
for parallel i = 1; i < n; i + + do
S3 : ... ← a[i − 1] + b[i] ∗ d[i − 2];
end for
Algorithm 3 The program is transformed to reflect the order of the topologically sorted dependence graph and loop
fission
(invariant)...
for parallel i = 1; i < n; i + + do
S1 : a[i] ← b[i − 1] + ...;
S4 : d[i] ← b[i − 2] − ...;
end for
(invariant)...
i = 1
S1
2
S1
3
S1
4
S1
S2
S3
S2
S3
(a)
(b)
S2
Figure 4. (a) A dependence graph with SCC contracted into
nodes. (b) A pipelined execution of the SCC across three
threads.
S3
S2
S3
3.2
Parallelizing Loops with cyclic
Cyclic dependence graphs with at least one loop-carried dependence, and the statement will form a SCC in the dependence graph. The most straightforward way to deal with
the statement in each SCC is to place in a loop that is executed sequentially. Another way of extracting parallelism
from these loops is to execute the SCC in a pipelined fashion. An example of this is shown in Fig.4. This is called
decoupled sof tware pipelining, and is described in detail in [20].
In latter section 4, we show how parallelism can
sometimes be extracted from these loops using producer −
consumer synchronization, and optimizing producer −
consumer synchronization.
4
Optimizing Synchronization Algorithm
There is no guarantee the order that parallel program execute on the different threads will enforce the dependence.
However, by using producer/consumer synchronization,
this ordering can be forced on the program execution, allowing parallelism to be extracted from loops with dependence.
In the 1980s and early 1990s, several forms of producer/consumer synchronization were implemented (e.g.
full/empty synchronization, implemented in the Denelcor HEP [21]). The Alliant F/X 8 [8] [9] implemented
the advance(r, i) and await(r, i) synchronization instructions. In 1987, Samuel P. Midkiff discussed the compiler
algorithms for synchronization [22]. He explained with,
quit, test, testset, wait, and set instructions in detail.
In this section, compiler exploitation of both
of these synchronization instruction, and general producer/consumer synchronization, can be discussed in
terms of send and wait synchronization.
The
wait(regs, i, vars) waits until the value of regs is i. The
Figure 5. the iteration space of the loop of Alg.4.
send(regs, i, vars) writes the value i to regs, where i is
the loop index variable, regs is the synchronization register used for dependence δ, and vars contains the variables involved whose dependence is being synchronized.
The send and wait instructions also have a functionality equivalent to a f ence instruction, which would ensure
that result of all memory accesses before the send and
wait are visible before the send or wait competes, and
the hardware doesn’t move instructions past the synchronization operation at run time.
4.1
Insert Synchronize Instruction Set
Due to the dependence graph, a compiler can synchronize
a program directly. In order to a deep understanding, there
is an example of using producer/comsumer synchronization, and the program is simplified as Alg.4. If you observe
keenly, it’s easy to find out the dependence graph for the
program (i.e. δ f , ∆a = 1; δ f , ∆b = 2; δ f , ∆c = 1).
Algorithm 4 A loop with cross-iteration dependence.
for i = 1; i < n; i + + do
S1 : a[i] ← b[i − 1] + ...;
S2 : b[i] ← c[i − 1] + ...;
S3 : c[i] ← b[i − 2] + a[i − 1];
end for
When we know the dependence distance from the dependence graph, the iteration space of the loop of the program can be illustrated in Figure.5.
The iteration space can make ensure the location of
the synchronize instructions. As you see, the green dotted
line denotes the δ f , ∆a = 1, the brown dotted line denotes
the δ f , ∆b = 2, and the solid line denotes δ f , ∆c = 1.
After the source of dependence δ, it inserts the instruction
send(regsδ , i, vars). Before each dependence sink, the
compiler inserts the instruction wait(regsδ , i − dj , vars),
where di is the distance of the dependence on the i loop.
The loop of the program synchronized with send/wait
synchronization has be shown in Alg.5.
Algorithm 5 A loop of the program synchronized with
send/wait synchronization.
for i = 1; i < n; i + + do
S1 : a[i] ← b[i − 1] + ...;
send(0, i, a);
wait(2, i-1, c);
S2 : b[i] ← c[i − 1] + ...;
send(1, i, b);
wait(1, i-2, b);
wait(0, i-1, a);
S3 : c[i] ← b[i − 2] + a[i − 1];
send(2, i, c);
end for
The reasons that producer/consumer synchronization
instructions aren’t supported in hardware anymore shows
that impact that technology and economics dependent on
what is a desirable architectural [23]. Specialized synchronizing instructions fell out of favor because of the increased
latencies required when synchronizing across the system
bus between general purpose processors, and because the
RISC principles of instruction set design [24] favored simpler instructions from which send and wait instructions
could be built, albeit at a higher run time cost. Except for
questions of profitability, the compiler strategy for inserting
and optimizing synchronization is indifferent to whether it
is implement in software or hardware. These optimizes will
be explained in detail in the remainder of this section.
4.2
Two Approaches to Optimize Synchronization
Sometimes a compiler may reduce the number of synchronization operations needed to synchronize the dependence
in a loop. However, all dependence must be enforced, So
this optimization reduces the overhead of enforcing them
by allowing a single send/wait pair to synchronize more
than one dependence, or a combination of send/wait instructions to synchronize additional dependence. There is
a loop with dependence to be synchronized in Alg.6
Algorithm 6 A loop with dependence to be synchronized.
for i = 1; i < n; i + + do
S1 : a[i] ← ...;
S2 : b[i] ← c[i − 1] + ...;
S3 : c[i] ← a[i − 2];
end for
The loop with two dependence, include δ f , ∆a = 2
i = 1
S1
2
S1
3
S1
4
S1
S1
S2
S2
S2
S2
S2
S3
S3
S3
S3
S3
5
Figure 6. the ISD for the loop of Alg.6.
and δ f , ∆c = 1. The iterationspacediagram(ISD) of
Figure.6 shows the dependence to be enforced as the blue
solid lines or the green dashed lines, and execution orders
implied by the sequential execution of the program by the
brown dashed lines. The section outlined with dotted box
is representative of a section of the ISD that is examined
by the algorithm of [10] that eliminates dependence using
transitive reduction.
Let Sj (k) represent the instance of statement Sj in iteration i = k. Consider the dependence with distance two
from statement S1 in iteration i = 2 to statement S3 in iteration i = 4. There is a path S1 (2) → S2 (2) → S3 (2) →
S2 (3) → S3 (3) → S2 (4) → S3 (4) from S1 in iteration 2 to
S3 in iteration 4, just like the black lines in the dotted box.
If the dependence from S3 to S2 has been synchronized,
then the existence of this path of enforced orders implies
that the dependence from S1 (2) to S3 (4) is also enforced.
Due to the distances are constant, the iteration space can
be covered by shifting the region in the dashed lines, So
every instance of the dependence within the iteration space
is synchronized. Samuel P. Midkiff had already shown that
perform a transitive reduction on the ISD [10]. It’s possible for multiple dependence to work together to eliminate
another dependence. The transitive reduction is performed
on the ISD, which needs to only contain a subset of the
total iteration space (i.e. the case as shown by the dotted
box in Figure.6). For each loop in the loop nest over which
the synchronization elimination is taking place, the number
of iterations needed in the ISD for the loop is equal to the
least product of the unique prime factors of the dependence
distance, plus one.
Another synchronization elimination approach [25] is
based on pattern matching and works even if the dependence distance are not constant. The matched patterns identify dependence whose lexical relationship and distance are
such that synchronizing one dependence will synchronize
the order by forming a path as shown in Figure 6 (i.e. the
black lines in the dotted box). In the program of Alg.6, let
the forward dependence with a distance of two that is to be
eliminated be δe , and the backward dependence of distance
one be δ1 that is used to be eliminated the other dependence
be δr . There is one pattern as follows:
[4] L Dagum, R Menon. OpenMP: an industry standard
API for shared-memory programming. Computational
Science & Engineering, IEEE. Jan-Mar 1998.
i A path from the source of δe to the source of some δr .
ii The sink of δr reaches the sink of δe .
iii δr is lexically backward (i.e. the sink precedes the
source in the program flow).
iv The absolute value of the distance of δr is one.
v The signs of the distances of δe and δr are the same,
then δe can be eliminated.
The conditions of i and ii establish the proper flow of
δe and δr , the iii recognizes that δr can be repeatedly executed to reach all iterations that are multiple of the distance
away from the source. The iv and v show that because the
absolute value of the distance is one and the signs of the
two distances are equal the traversal enabled by the iii will
reach the source of δe .
5
Conclusion
We have studied the way of the send and wait instructions to synchronize loops. We have given general strategies for treating branches within a loop being synchronized, and present two approaches to reduce and optimize
the number of producer/consumer synchronization instructions in the shared-memory multiprocessors machine.
In general, when synchronized the version of parallel
program, there are four steps need to be enforced. First,
a dependence graph is illustrated with respect to the program. Second, depending on the structure of the dependence graph and the relative costs of the different synchronization methods on a target machine, Picking a synchronization method to synchronize the loop. Third, synchronize instructions are inserted, and it makes sure that the
cross-iteration dependence can be enforced. Finally, eliminating partial dependence and optimizing the synchronize
instructions.
Auto-parallelizing compiler can perform all of these
steps automatically, which relieve programmers from the
tedious and error-prone manual parallel process.
References
[1] J. M. Tendler, J. S. Dodson, J. S. Fields, Jr., H. Le,
and B. Sinharoy. POWER4 system microarchitecture.
IBM Journal of Research and Development 46 (1): 526. 2002.
[5] D. J. Kuck, R. H. Kuhn, D. A. Padua, B. Leasure, and
M.Wolfe. Dependence graphs and compiler optimizations. In ACM Conference on the Principles of Programming Languages, pages 207-218, 1981.
[6] David J. Kuck. A Survey of Parallel Machine Organization and Programming. ACM Computing Surveys CSUR, vol. 9, no. 1, pp. 29-59, 1977
[7] Randy Allen, Ken Kennedy. Optimizing Compilers for Modern Architectures: A Dependence-based
Approach. Morgan Kaufmann. ISBN 1-55860-286-0.
2001.
[8] J. Test, M. Myszewski, and R. Swift. The alliant
fx/series: A language driven architecture for parallel processing of dusty deck fortran. In J. de
Bakker,A.Nijman, and P.Treleaven, editors, PARLE
Parallel Architectures and Languages Europe, volume
258 of Lecture Notes in Computer Science, pages
345C-356. Springer Berlin / Heidelberg, 1987.
[9] W. A. Abu-Sufah and A. D. Malony. Vector processing on the Alliant FX/8 multiprocessor. In Proceedings
of the International Conference on Parallel Processing,
pages 559-566, 1986.
[10] S.P.Midkiff and D.A.Padua. Compiler generated synchronization for do loops. In Proceedings of the International Conference on Parallel Programming (ICPP),
pages 544-551, 1986.
[11] M. Bach, M. Charney, R. Cohn, T. Devor, E.
Demikovsky, K. Hazelwood, A. Jaleel, C.-K. Luk, G.
Lyons, H. Patil, and A.Tal. Analyzing parallel programs with pin. IEEE Computer, 43(3):34-41, March
2010.
[12] Alfred V.Aho, Monica S.Lam, Ravi Sethi, and Jeffrey
D.Ullman. Compilers Pricinples, Techniques, & Tools
2nd ed, ISBN 978-7-111-32674-8, 2006.
[13] R. Cytron, J. Ferrante, B.K. Rosen, M.N.Wegman,
and F. K.Zadeck. An efficient method of computing
static single assignment form. In ACM Conference on
the Principals of Programming Languages, pages 2535, 1989.
[2] Swinburne, Richard. Intel Core i7 - Nehalem Architecture Dive. 5 - Architecture Enhancements. 2008.
[14] John L. Hennessy, David A. Patterson. Computer Architecture: A Quantitative Approach 5th ed, ISBN 9787-111-36458-0, 2012.
[3] D. F. Bacon, S. L. Graham, and O. J. Sharp. Compiler transformations for high-performance computing.
ACM Comput. Surv., 26:345-420, December 1994.
[15] D. A. Padua, D. J. Wolfe. Advanced compiler optimizations for supercomputers, Commum. ACM, vol.
29, pp. 1184-1201, Dec. 1986.
[16] M.J.Wolfe. Optimizing supercompilers for supercomputers, Ph.D. dissertation, Univ. Illinois, UrbanaChampaign, DCS Rep. UIUCDCS-R-82-1105, Oct.
1982.
[17] Samuel P. Midkiff. Automatic Parallelization: An
Overview of Fundamental Compiler Techniques, Morgan & Claypool, Feb, 2012
[18] Thomas H. Cormen, Charles E. Leiserson, Ronald L.
Rivest, Clifford Stein. Introduction to Algorithms 3ed,
The MIT Press, pp. 612-615, ISBN 978-0-262-533058, 2009
[19] M. Wolfe. High performance compilers for parallel computing. Addison-Wesley Publishing Company,
1996.
[20] E. Raman, G. Ottoni, A. Raman, M. J. Bridges, and D.
I. August. Parallel-stage decoupled software pipelining. In Proceedings of the 6th annual IEEE/ACM International Symposium on Code generation and optimization, CGO 08, pages 114-123, New York, NY, USA,
2008.
[21] J. S. Kowalik. Parallel MIMD computation. The HEP
supercomputer and its applications. MIT Press, 1985.
[22] Samuel P. Midkiff: Compiler Algorithms for Synchronization. IEEE Transctions On Computers, Vol. C36, No.12, 1987
[23] E. B. III and K. Warren. The 1991 MPCI yearly report: The attack of the killer micros. Technical report,Lawrence LivermoreNational Laboratory, 1991.
[24] D. A. Patterson, C. H. Sequin. RISC I: a reduced instruction set VLSI computer. In 25 years of the International Symposia on Computer Architecture, ACM.,
pp. 216C230, New York, NY, USA, 1998.
[25] Z. Li and W. A. Abu-Sufah. A technique for reducing
synchronization overhead in large scale multiprocessors. In Proceedings of the International Symposia on
Computer Architecture, pages 284C291, 1985.
| 6cs.PL
|
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
PERFORMANCE ANALYSIS OF NEURAL NETWORK
MODELS FOR OXAZOLINES AND OXAZOLES
DERIVATIVES DESCRIPTOR DATASET
Doreswamy and Chanabasayya .M. Vastrad
Department of Computer Science Mangalore University , Mangalagangotri-574 199,
Karnataka, India
ABSTRACT
Neural networks have been used successfully to a broad range of areas such as business, data mining, drug
discovery and biology. In medicine, neural networks have been applied widely in medical diagnosis,
detection and evaluation of new drugs and treatment cost estimation. In addition, neural networks have
begin practice in data mining strategies for the aim of prediction, knowledge discovery. This paper will
present the application of neural networks for the prediction and analysis of antitubercular activity of
Oxazolines and Oxazoles derivatives. This study presents techniques based on the development of Single
hidden layer neural network (SHLFFNN), Gradient Descent Back propagation neural network (GDBPNN),
Gradient Descent Back propagation with momentum neural network (GDBPMNN), Back propagation with
Weight decay neural network (BPWDNN) and Quantile regression neural network (QRNN) of artificial
neural network (ANN) models Here, we comparatively evaluate the performance of five neural network
techniques. The evaluation of the efficiency of each model by ways of benchmark experiments is an
accepted application. Cross-validation and resampling techniques are commonly used to derive point
estimates of the performances which are compared to identify methods with good properties. Predictive
accuracy was evaluated using the root mean squared error (RMSE), Coefficient determination( ), mean
absolute error(MAE), mean percentage error(MPE) and relative square error(RSE). We found that all five
neural network models were able to produce feasible models. QRNN model is outperforms with all
statistical tests amongst other four models.
KEYWORDS
Artificial neural network, Quantitative structure activity relationship, Feed forward neural network, back
propagation neural network
1. INTRODUCTION
The use of artificial neural networks (ANNs) in the area of drug discovery and optimization of
the dosage forms has become a topic of analysis in the pharmaceutical literature [1-5]. Compared
with linear modelling techniques, such as Multi linear regression (MLR) and Partial least squares
(PLS) , ANNs show better as a modelling technique for molecular descriptor data sets showing
non-linear conjunction, and thus for both data fitting and prediction strengths [6]. Artificial
neural network (ANN) is a vastly simplified model of the form of a biological network[7] .The
fundamental processing element of ANN is an artificial neuron (or commonly a neuron). A
DOI : 10.5121/ijist.2013.3601
1
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
biological neuron accepts inputs from other sources, integrate them, carry out generally a
nonlinear process on the result, and then outputs the last result [8]. The fundamental benefit of
ANN is that it does not use any mathematical model because ANN learns from data sets and
identifies patterns in a sequence of input and output data without any previous assumptions about
their type and interrelations [7]. ANN eliminates the drawbacks of the classical ways by
extracting the wanted information using the input data. Executing ANN to a system uses enough
input and output data in place of a mathematical equation[9]. ANN is a good alternative to
common empirical modelling based on linear regressions [10].
ANNs are known to be a powerful methodology to simulate various non-linear systems and have
been applied to numerous applications of large complexity in many field including
pharmaceutical research, engineering and medicinal chemistry. The promising uses of ANN
approaches in the pharmaceutical sciences are widespread. ANNs were also widely used in drug
discovery, especially in QSAR studies. QSAR is a mathematical connection between the
chemical’s quantitative molecular descriptors and its inhibitory activities [11-12]
Five Different types of neural network models have been developed for the development of
efficient antitubercular activity predicting models. Those models are Single hidden layer feed
forward neural network (SHLFNN)[13],Gradient Descent Back propagation neural network
(GDBPNN)[14,24], Gradient Descent Back propagation with momentum neural network
(GDBPMNN)[15-16],Back
propagation
with
Weight
decay
neural
network
(BPWDNN)[17],Quantile regression neural network (QRNN) [18].
The purpose of this research work and research publication is to assign five distinct neural
network models to the prediction of antitubercular activities of Oxazolines and Oxazoles
derivatives descriptor dataset. Method and along with estimate and asses their performances with
regard to their predicting ability. One of the goals of this scientific research project is to show
how distinct neural network models can be used in predicting antitubercular activities of
Oxazolines and Oxazoles derivatives descriptor dataset. It again involves inducing the best model
in terms of the least errors produced in the graphical study describing the actual and predicted
antitubercular activities.
2. MATERIALS AND ALGORITHAMS
2.1 The Data Set
The molecular descriptors of 100 Oxazolines and Oxazoles derivatives [19-20] based H37Rv
inhibitors analyzed. These molecular descriptors are produced using Padel-Descriptor tool [21].
The dataset includes a different set of molecular descriptors with a broad range of inhibitory
activities versus H37Rv. This molecular descriptor data set includes 100 observations with 234
descriptors. Before modelling, the dataset is ranged.
2.2 Single hidden layer feed forward neural network (SHLFNN)
The clearest form of neural network is one among a single input layer and an output layer of
nodes. The network in Figure 1 represents this type of neural network. Strictly, this is mentioned
to as a one-layer feed forward network among two outputs on account of the output layer is the
alone layer with an activation computation.
2
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
Figure 1. A Single Hidden Layer Feed Forward Neural Network
In this single hidden layer feed forward neural network, the network's inputs are directly
connected to the output layer nodes, Z and Z . The output nodes use activation functions g and
g to yield the outputs Y1 and Y2 .
Because
=
,
= =
and
= =
+
,
,
+
=
,
+
+
1
2
When the activation functions g and g are similar activation functions, the single hidden layer
feed forward neural network is similar to a linear regression model. Likewise , if g and g are
logistic activation functions, then the single hidden layer feed forward neural network is similar
to logistic regression. Because of this comparison between single hidden layer feed forward
neural networks and linear and logistic regression, single hidden layer feed forward neural
networks are not often used in place of linear and logistic regression.
2.3 Gradient Descent Back Propagation Neural Network(GDBPNN)
Gradient Descent Back propagation neural network is one of the most engaged ANN algorithms
in pharmaceutical research. GDBPNN are the nearly general type of feed-forward networks.
Figure 2 displays an back propagation neural network which has three types of layers: an input
layer, an output layer and a hidden layers.
3
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
Figure 2. A Back propagation (BP) neural network
Nodes(neurons) in input layer only act as buffers for delivering the input data x i = 1,2 … . n)
to nodes in the hidden layer. Each processing node $ (Figure 3) in the hidden layer sums up its
input data after weighting them with the strengths of the particular connections %& from the
input layer and calculates its output '& as a function ( of the sum.
'& = ()∑+ %& ,
3
Activation function ( that is generally selected to be the sigmoid function.
Figure 3. Specification of the perceptron process
The output of nodes in the output layer is calculated similarly. The backpropagation gradient
descent algorithm, is the most generally approved Multi Layer Perciptron training algorithm. It
provides to alter ∆w0 the weight of a connection between nodes i and j as accordingly:
∆w0 = 12&
4
Where 1 is a parameter termed the learning rate and δ0 is a factor depending on whether node $
as an input node or a hidden node. For output nodes ,
2& = )5(⁄5 78& , 9'& − '& <
:
5
4
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
and for hidden nodes
2& = )5(⁄5 78& , >
?
%&? 2? @
6
In Eq. (5) , 78& is the aggregate weighted sum of input data to nodes $ and '& is the target
output for node $. As there are no target outputs for hidden nodes ,in Eq. (6) , the variation
between the target and measured output of a hidden nodes $ is put back by the weighted aggregate
of the 2? terms at present obtained for nodes B linked to the output of node $ The method starts
with the output layer , the 2 term is calculated for nodes in entire layers and weight updates
detected for all links, repetitively. The weight updating method can happen after the presentation
of each training observation (observation-based training) or after the presentation of the whole set
of training observations. Training epoch is achieved when all training patterns have been
introduced once to the Multilayer Perceptron.
:
2.4 Gradient Descent Back Propagation with Momentum Neural Network
(GDBPMNN)
Gradient descent back propagation with momentum neural network (GDBPMNN) algorithm is
widely used in neural network training, and its convergence is discussed. A momentum term is
often added to the GDBPNN algorithm in order to accelerate and stabilize the learning procedure
in which the present weight updating increment is a mixture of the current gradient of the error
function and the prior weight revising increment. Gradient decent back propagation with
momentum allows a neural network to respond not only to the local gradient, but also to recent
tendency in the error surface. Momentum allows the neural network to ignore small features in
the error surface. Without momentum a neural network may get stranded in a shallow local
minimum. With momentum a network can move through such a least.
Momentum can be combined to GDBPNN method learning by building weight alters balance to
the sum of a portion of the final weight modification and the new modification advised by the
GDBP rule. The importance of the response that the last weight modification is admitted to have
is negotiated by a momentum constant, , which can be any number between 0 and 1. When the
momentum constant is 0 a weight modification is based only on the gradient. When the
momentum constant is 1 the new weight modification is set to balance the last weight
modification and the gradient is plainly neglected.
∆% & C + 1 = 12& + ∆% & C
7
where ∆% & C + 1 and ∆% & C are weight alters in epochs C + 1and C, suitable way[24].
2.5 Back propagation with Weight Decay Neural Network (BPWDNN)
Back propagation of error gradients for back propagation neural networks has proven to be useful
in layered feed forward neural network training. Still, a wide number of repetitions is commonly
required for changing the weights. The problem becomes more critical especially when a high
level of accuracy is required. The complexity of a back propagation neural network can be
regulated by a hyper-parameter called “weight decay” to penalize the weights of hidden nodes.
5
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
The employ of weight decay can both assist the optimization deals with and prevent the over
fitting. This type of method to encourage the learning algorithm to find solutions which use as
few weights as possible. The simplest modified error function can be formed by summing to the
initial error function a term relative to the sum of squares of weights:
E =E +F
&
% &
8
where E is the initial error function (sum of the squared differences between actual and
predicted output values), λ is a minute positive constant which is employed to govern the
addition of the second term , and w0 is the weight of the link between node j and of a layer and
node i of the at once higher indexed layer. The above error function penalizes the use of more
% & ‘s than essential. In order to demonstrate that, lets see how the weight updating rule is
changed. Assuming that we apply the gradient descent algorithm to minimize the error, the
changed weight update method is shown by:
∆% & I = −η M
∂E
∂E
O C = −1 M
O I − 2λη% & I
∂% &
∂% &
9
where C denotes the C-th iteration and 1 denotes the learning rate . The above expression can be
composed as
% & I + 1 = −η M
∂E
O I + 1 − 2λη% & I
∂% &
10
It can be demonstrates that the importance of the weights decreases exponentially towards zero by
calculating the weight values after C weight adaptations:
% & I = 1
R
1 − 2ληRS − M
∂E
O + 1 − 2ληR % & 0
∂% &
11
(assuming |1 − 2λη| < 1) . The above method has the disadvantage that all the weights of the
neural network decrease at the same rate. Still , it is more attractive to allow large weights to
carry on while small weights tend toward zero. This can be carried out by modifying the error
function in a way that small weights are altered more considerably than large weights. The
following modified function:
E = E + λ
0
w0
1 + w0
12
The weight updating rule then becomes:
6
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
% & I + 1 = −F M
∂E
2λη
IY
O I + W1 −
%&
∂% &
I<
91 + w0
V
X
13
It can be demonstrates that in this case small weights decrease more swiftly than large ones.
2.6 Quantile Regression Neural Network (QRNN)
Artificial neural networks allow the estimation of in some way nonlinear models without the need
to define a accurate functional form. The most widely-used neural network for predicting is the
single hidden layer feed forward neural network [25]. It exists a set of n input nodes , which are
connected to each of m nodes in a single hidden layer, which, in turn, are connected to an output
node. The final model can be made as
(: , [, % = \
]
&^
[&
+
^
%& : _
14
where g · and g · are activation functions, which are commonly chosen as sigmoidal and
linear accordingly , w0 and v0 are the weights to be approximated.
Theoretical assist for the use of quantile regression within an artificial neural network for the
evaluation of probably nonlinear quantile models [26]. The only other work that we are
knowledgeable of, that considers quantile regression neural networks , is that of Burgess [27] who
briefly explains the proposal of the method. Alternative way of linear quantile function using the
equation in (14) , a quantile regression neural network model, (: , [, %,of the b8ℎ quantile can
be estimated using the following minimisation.
min >
d,e
:|fg hijg ,d,ek
b|': − (: , [, %| +
+ F
[ O
15
1 − b|': − (: , [, %| + F
:|fg hijg ,d,ek
&,
%&
where λ and λ are regularisation parameters which penalise the complicatedness of the neural
network and thus prevent over fitting [28].
2.7 Fitting and comparing models
The solutions for the SHLFFNN , GDBPNN, GDBPMNN, BPWDNN and QRNN models were
computed using open source CRAN R packages nnet ,neuralnet, RSSNS and qrnn. These five
neural network models are trained on a Oxazolines and Oxazoles derivatives descriptor dataset ,
it constructs a predictive model that returns a minimization in error when the neural network's
prediction (its output) is compared with a known or expected outcome. The comparison between
the five models were assessed using root mean square error (RMSE) and coefficient of
7
determination R . RMSE presents information on the short term efficiency which is a benchmark
of the difference of predicated values about the observed values. The lower the RMSE, the more
accurate is the evaluation and coefficient of determination (also called R square) measures the
variance that is interpreted by the model, which is the reduction of variance when using the
model. orders from 0 to 1 while the model has healthy predictive ability when it is near to 1
and is not analyzing whatever when it is near to 0. These performance metrics are a good
measures of the overall predictive accuracy.
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
MAE(mean absolute error) is an indication of the average deviation of the predicted values from
the corresponding observed values and can present information on long term performance of the
models; the lower MAE the better is the long term model prediction. Relative squared error
(RSE) is the aggregate squared error produce relative to what the error would have been if the
prediction had been the average of the absolute value. Lower RSE is the better model prediction.
The Mean Percent Error (MPE) is a well known measure that corrects the 'cancelling out' results
and also keeps into basis the different scales at which this measure can be calculated and thus can
be used to analyze different predictions. The expressions of all measures are given below.
1
mnE =
1
mpE =
rE =
+
+
|'o − ' |
' − 'o
∗ 100
'
∑+'o − '
∑+s7' − '
where ' and 'o are observed and predicted values.
16
17
18
2.9 Benchmark Experiments
Move in benchmark experiments for comparison of neural network models. The experimental
performance distributions of a set of neural network models are estimated, compared, and
ordered. The resampling process used in these experiments must be investigate in further detail to
determine which method produces the most accurate analysis of model influence. Resampling
methods to be compared include cross-validation [29-31]. We can use resampling results to make
orderly and in orderly comparisons between models [29-30]
Each model performs 25
independent runs on each sub sample and report minimum, median, maximum, mean of each
performance measure over the 25 runs.
3. RESULTS AND DISCUSSION
This part presents the numerical analysis conducted using numerous neural network methods.
RMSE and values were used to analyze model prediction accuracies for the
SHLFFNN,GDBPNN, GDBPMNN, BPWDNN and QRNN neural network models. Comparing
the resampling performance the effect of prediction of antituberculer activity using Oxazolines
and Oxazoles derivatives are demonstrated in Figure 4.
8
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
Figure 4. Box-and-whisker diagrams for the cross validation estimates of model precision
performance RMSE, or . The QRNN and GDBPMNN models gives the smallest prediction error and
smallest RMSE and error spread compared to BPWDNN, GDBPNN and SHLFFNN models have
largest RMSE and error spread
The RMSE and values for the five different neural network models for prediction of
antitubercular activity are comparable as shown in Figure 4. QRNN and GDBPMNN
models appear to have slightly smaller RMSE and spreads than BPWDNN model.
SHLFFNN and GDBPNN models appear to have larger RMSE and error spreads than
BPWDNN model. Pair-wise comparisons of model RMSE and values using Student’s
8-test reveal that there is statistical difference in the prediction accuracies of the five
neural network models. These results are shown in Table 1, which gives both the tvalues and the absolute differences in RMSE and for the model comparisons. None of
the t-values are smaller than the specified significance level α = 0.05. The null
hypothesis is not rejected; in the context of this data set, there is no statistically
significant difference in performance among these five neural network methods.
9
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
Table 1. Pair-wise comparisons of RMSE and differences and t-values
RMSE differences (upper diagonal) and u-values (lower diagonal)
GDBPNN
GDBPNN
SHLFFNN
GDBPMNN
BPWDNN
1.00000
0.49971
1.00000
0.08053
SHLFFNN
GDBPMNN
BPWDNN QRNN
-0.02361
0.14891
0.17252
0.08679
0.11040
-0.06212
0.01617
0.29577
0.01048
1.00000
1.00000
QRNN
0.19054
w
v differences (upper diagonal) and u-values (lower diagonal)
GDBPNN SHLFFNN GDBPMNN BPWDNN
GDBPNN
-0.10573
-0.23230
-0.15382
SHLFFNN
1.0000
-0.12657
-0.04809
GDBPMNN 0.5848
0.6052
0.07848
BPWDNN
1.0000
1.0000
1.0000
Ridge
0.3109
0.2511
1.0000
0.4586
0.20649
0.23011
0.05759
0.11971
QRNN
-0.26385
-0.15812
-0.03155
-0.11003
It should be observed that the t-value for this pair-wise comparison is 0.08053 and 0.3109 (Table
1) for RMSE and , which is not valid at α = 0.05, but it is still a much smaller t-value than
those obtained for the other four pair-wise comparisons. To test for pair-wise differences, we use
Tukey differences.
Figure 5. Asymptotic simultaneous confidence sets for Tukey all-pair neural network models comparisons
of the RMSE errors after alignment.
10
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
As a major advantage compared to the non-parametric methods, can calculate simultaneous
confidence intervals. Figure 5 shows the corresponding 99% model wise confidence intervals
where the bars of a given comparison are outside the 0 difference in RMSE line there is a
statistically meaningful difference at the 99% level present. The blue dot indicates the estimated
magnitude of this difference. The differences between (GDBPNN,SHLFFNN) and
(GDBPMNN,BPWDNN) are not significant, the corresponding confidence intervals intersect
zero and overlap each other.
Table 2. Accuracy of predictions of the five neural network models
In our study, neural network methods to predict antitubercular activity of Oxazolines and
Oxazoles derivatives. In this case descriptor dataset is splits into training set and test set. Training
set comprises seventy six observations and test set comprises twenty four observations.
Figure 6. Comparison of prediction performance of trained and tested models obtained by five neural
network methods for Oxazolines and Oxazoles derivatives descriptor dataset.
11
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
Predictive accuracy of all five neural network model evaluated as the coefficient determination
i.e. , root mean squared error (RMSE), mean absolute error(MAE), mean percentage error
(MPE) and relative squared error(RSE). RMSE and provides baseline measures of predictive
accuracy. All results reported are for the training set and test set. The predictive estimation results
are summarized in Table 2.
The obtained both RMSE and values of trained QRNN model are 3.710198e-06 and 1 are
highly significant as well as RMSE and values of tested QRNN models are 0.2080948 and
0.9287288 are outstanding. The RMSE and values of trained GDBPNN model is 0.07103242
and 0.9918216 comparatively better than GDBPMNN model i.e. 0.113598 and 0.9878081. The
RMSE and values of tested models are SHLFNN and BPWDNN are comparatively better
than GDBPNN and GDBPMNN models. Figure 6 shows the performance comparison of the five
methods for antitubercular activity prediction. In order to test and validate the five neural network
models, the rest of five statistical tests are (MAE, MPE and RSE). These statistical tests signifies
the QRNN model shows more significant than other four neural network models. These
statistical tests are summarized in Table 2. Figure 7 shows the deviation from actual data of the
five neural network models for trained and test datasets. Zero deviation shows that actual data
and predicted QRNN model is overlapped is shown in Figure 7a. It means that predicted data has
zero errors.
4. CONCLUSIONS
At first, important properties of neural network modelling methods and basic concepts of this
were introduced. This technique is historically based on the attempt to model the way a biological
brain processes the data. This study evaluated the ability of a five neural network models to
predict antitubercular activity of Oxazolines and Oxazoles derivatives. we presented exploratory
and inferential analyses of benchmark experiments. Benchmark experiments show that this
method is the primary choice to evaluate neural network models. . It should be observed that the
12
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
scheme can be utilized to compare a set of neural network techniques but does not offer a neural
network model selection. The results for the non linear neural network models suggest that we
may detect performance differences with fairly high power. We have compared the predictive
accuracies with all five neural network models among QRNN model is outperformed overall
predictive performance.
ACKNOLDGEMENTS
We thankful to the Department of Computer Science Mangalore University, Mangalore India for
technical support of this research.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Kesavan, J.G., Peck, G.E., 1996.,”Pharmaceutical granulation and tablet formulation using neural
networks.”,Pharm. Dev. Technol. 1, 391–404.
Takahara, J., Takayama, K., Nagai, T., 1997. ,“Multi-objective simultaneous optimization technique
based on an artificial neural network in sustained release formulations.”, J. Control. Release 49, 11–
20.
Takayama, K., Fujikawa, M., Nagai, T., 1999. ,“Artificial neural networks as a novel method to
optimize pharmaceutical formulations. “, Pharm. Res. 16, 1–6.
Chen, Y., McCall, T.W., Baichwal, A.R., Meyer, M.C., 1999. ,”The application of an artificial neural
network and
pharmacokinetic simulations in the design of controlled-release dosage forms. J.
Control. Release 59, 33–41.
Wu, T., Pan,W., Chen, J., Zhang, R., 2000. ,“Formulation optimization technique based on artificial
neural network in salbutamol sulfate osmotic pump tablets.”, Drug Dev. Ind. Pharm. 26, 211–215.
Bourquin, J., Schmidli, H., Hoogevest, P.V., Leuenberger, H., 1997b. ,“Basic concepts of artificial
neural networks (ANN) modeling in the application to pharmaceutical development. “,Pharm. Dev.
Tech. 2, 95–109.
Achanta, A.S., Kowalski, J.G., Rhodes, C.T., 1995. ,"Artificial neural networks: implications for
pharmaceutical sciences.", Drug Dev. Ind. Pharm. 21, 119–155
Cheng F, Vijaykumar S (2012) ,“Applications of Artificial Neural Network Modelling in Drug
Discovery. “, Clin Exp Pharmacol 2:e113. doi: 10.4172/2161-1459.1000e113
ALI AKCAYOL, M. and CINAR, Can.(20050 ,“Artificial neural network based modelling of heated
catalytic converter performance.”, Applied Thermal Engineering , vol. 25, no. 14-15, p. 2341-2350.
KOSE, Erdogan.(2008), “Modelling of colour perception of different age groups using artificial
neural networks.”, Expert Systems with Applications, vol. 34, no.3, p. 2129-2139.
C. ZOU and L. ZHOU,“QSAR study of oxazolidinone antibacterial agents using artificial neural
networks”, Molecular Simulation, Vol. 33, No. 6, –530
LiHong Hu , GuanHua Chen , Raymond Ming-Wah Chau (2006),“A neural networks-based drug
discovery approach and its application for designing aldose reductase inhibitors”, Journal of
Molecular Graphics and Modelling 24 244–253
Huang GB, Chen YQ, Babri HA (2000),”Classification ability of single hidden layer feedforward
neural networks”, IEEE Trans Neural Netw. ;11(3):799-801. doi: 10.1109/72.846750.
Udo Seiffert and Bernd Michaelis (2000),“On the Gradient Descent in BackPropagation and its
substitution by a genetic algorithm”, Proceedings of the IASTED International Conference Applied
Informatics
Ning Qian (1999) ,“On the momentum term in gradient descent learning algorithms”, Neural
Networks 12 145-151
M. Z. Rehman, N. M. Nawi (2011),“ Improving the Accuracy of Gradient Descent Back Propagation
Algorithm (GDAM) on Classification Problems”, International Journal on New Computer
Architectures and Their Applications ISSN: 2220-9085)1(4): 838-847
13
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
[17] Amit Gupta, Siuwa M. Lam (1998) ,“Weight decay backpropagation for noisy data”, Neural
Networks Pages 1127–1138
[18] Taylor, J.W., (2000).,” A quantile regression neural network approach to estimating the conditional
density of multiperiod returns.”, Journal of Forecasting, 19(4): 299-311.
[19] Andrew J. Phillips, Yoshikazu Uto, Peter Wipf, Michael J. Reno, and David R. Williams, (2000)
“Synthesis of Functionalized Oxazolines and Oxazoles with DAST and Deoxo-Fluor” Organic Letters
Vol 2 ,No.8 1165-1168
[20] Moraski GC, Chang M, Villegas-Estrada A, Franzblau SG, Möllmann U, Miller
MJ(2010).,”Structure-activity relationship of new anti-tuberculosis agents derived from oxazoline and
oxazole benzyl esters” ,Eur J Med Chem. 45(5):1703-16. doi: 10.1016/j.ejmech.2009.12.074. Epub
2010 Jan 14.
[21] Yap CW* (2011). PaDEL-Descriptor: An open source software to calculate molecular descriptors and
fingerprints. Journal of Computational Chemistry. 32 (7): 1466-1474.
[23] Smits, J. R. M., Melssen, W. J., Buydens, L. M. C., & Kateman, G. (1994). ,”Using artificial neural
networks for solving chemical problems. Part I. Multi-layer feed-forward networks. “,Chemom.
Intell. Lab., 22, 165-189.
[24] D.E. Rumelhart, G.E. Hinton, and R.J. Williams (1986), “Learning representations by backpropagating Errors”, Nature, 323 , 533-536.
[25] Zhang, G., Patuwo, B.E. and Hu, M.Y.(1998), "Forecasting with Artificial Neural Networks: The
State of the Art", International Journal of Forecasting, 14 , 35-62.
[26] White, H.A.R. Gallant et al.(1992),"Nonparametric Estimation of Conditional Quantiles Using Neural
Networks", Artificial Neural Networks: Approximation and Learning Theory, Cambridge and Oxford,
Blackwell , 191-205.
[27] Burgess, A.N.(1995), ‘Robust Financial Modelling by Combining Neural Network Estimators of
Mean and Median’, Proceedings of Applied Decision Technologies, UNICOM Seminars, Brunel
University, London, UK.
[28] Bishop, C.M.(1997), “Neural Networks for Pattern Recognition”, Oxford, Oxford University Press.
[29] Hothorn et al(2005)., “The design and analysis of benchmark experiments.”, Journal of
Computational and Graphical Statistics vol. 14 (3) pp. 675-699
[30] Olaf Mersmann, Heike Trautmann1, Boris Naujoks and Claus Weihs (2010), “Benchmarking
Evolutionary
Multiobjective
Optimization
Algorithms”,
http://www.statistik.tudortmund.de/fileadmin/user_uploaddortmund.de/fileadmin/user_upload/SFB_823/
discussion_papers/2010/DP_0310_SFB823_Mersmann_Trautmann_etal.pdf
[31] Eugster M. J. A. et al., (2008), “Exploratory and Inferential Analysis of Benchmark Experiments.”,
Technical Report Number 030, Dept. of Statistics, University of Munich.
14
International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.6, November 2013
Authors
Doreswamy received B.Sc degree in Computer Science and M.Sc Degree in
Computer Science from University of Mysore in 1993 and 1995 respectively.
Ph.D degree in Computer Science from Mangalore University in the year 2007.
After completion of his Post-Graduation Degree, he subsequently joined and
served as Lecturer in Computer Science at St. Joseph’s College, Bangalore from
1996-1999.Then he has elevated to the position Reader in Computer Science at
Mangalore University in year 2003. He was the Chairman of the Department of
Post-Graduate Studies and research in computer science from 2003-2005 and
from 2009-2008 and served at varies capacities in Mangalore University at present
he is the Chairman of Board of Studies and Professor in Computer Science of Mangalore University. His
areas of Research interests include Data Mining and Knowledge Discovery, Artificial Intelligence and
Expert Systems , Bioinformatics ,Molecular modelling and simulation ,Computational Intelligence
,Nanotechnology, Image Processing and Pattern recognition. He has been granted a Major Research
project entitled “Scientific Knowledge Discovery Systems (SKDS) for Advanced Engineering Materials
Design Applications” from the funding agency University Grant Commission, New Delhi , India. He
has been published about 30 contributed peer reviewed Papers at national/International Journal and
Conferences. He received SHIKSHA RATTAN PURASKAR for his outstanding achievements in the
year 2009 and RASTRIYA VIDYA SARASWATHI AWARD for outstanding achievement in chosen
field of activity in the year 2010.
Chanabasayya .M. Vastrad received B.E. degree and M.Tech. degree in the
year 2001 and 2006 respectively. Currently working towards his Ph.D Degree in
Computer Science and Technology under the guidance of Dr. Doreswamy in the
Department of Post-Graduate Studies and Research in Computer Science ,
Mangalore University
15
| 5cs.CE
|
1
Time-Division Transmission is Optimal for Covert
Communication over Broadcast Channels
arXiv:1710.09754v1 [cs.IT] 26 Oct 2017
Vincent Y. F. Tan† and Si-Hyeon Lee‡
Abstract—We consider a covert communication scenario where
a legitimate transmitter wishes to communicate simultaneously to
two legitimate receivers while ensuring that the communication
is not detected by an adversary, also called the warden. The
legitimate receivers and the adversary observe the transmission
from the legitimate transmitter via a three-user discrete or
Gaussian memoryless broadcast channel. We focus on the case
where the “no-input” symbol is not redundant, i.e., the output
distribution at the warden induced by the no-input symbol is
not a mixture of the output distributions induced by other input
symbols, so that the covert communication
is governed by the
√
square root law, i.e., at most Θ( n) bits can be transmitted
over n channel uses. We show that for such a setting of covert
communication over broadcast channels, a simple time-division
strategy achieves the optimal throughputs. Our result implies
that a code that uses two separate optimal point-to-point codes
each designed for the constituent channels and each used for a
fraction of the time is√ optimal in the sense that it achieves the
best constants of the n-scaling for the throughputs. Our proof
strategy combines several elements in the network information
theory literature, including concave envelope representations of
the capacity regions of broadcast channels and El Gamal’s outer
bound for more capable broadcast channels.
Index Terms—Covert communication, Low probability of detection, Broadcast channels, Time-division, Concave envelopes
I. I NTRODUCTION
There has been a recent surge of research interest in reliable
communications in the presence of an adversary, or a warden,
who must be kept incognizant of the presence of communication between the legitimate transmitters and receivers.
The lack of communication is modelled in discrete channels
by sending a specially-designed “no-input” symbol 0 ∈ X
(where X , a finite set, is the input alphabet of the discrete
channel); in Gaussian channels, it is also modelled as sending
0 ∈ R. This line of research, known synonymously as covert
communications, low probability or detection (LPD) [1]–
[3], deniability [4], [5], or undetectable communication [6],
seeks to establish fundamental limits on the throughputs to
communicate to the legitimate receiver(s) while ensuring that
the signals observed by the warden are statistically close
to the signals if communication were not present. It was
shown by Bash et al. [1] that in the point-to-point setting,
if the legitimate user’s channel and the adversary’s channel
are perfectly known, the number of bits that can be reliably
† Vincent Y. F. Tan is with the Department of Electrical and Computer
Engineering and the Department of Mathematics, National University of
Singapore, Singapore 117583 (Email: [email protected]).
‡ Si-Hyeon Lee (Corresponding author) is with the Department of Electrical
Engineering, Pohang University of Science and Technology (POSTECH),
Pohang, South Korea 37673 (Email: [email protected]).
and√covertly transmitted over n channel uses scales at most as
Θ( n) for additive white Gaussian noise (AWGN) channels.
This is colloquially known as the “square root law”. For
discrete memoryless channels, the covert communication is
also governed by the square root law if the no-input symbol
is not redundant, i.e., the output distribution at the warden
induced by the no-input symbol is not a mixture of the
output distributions induced by other√input symbols. Recently,
the optimal pre-constant in the Θ( n) term has also been
established in a couple of elegant papers by Bloch [7] and
Wang, Wornell and Zheng [8].
In this paper, we are interested in extending the above
model and results to a multi-user (or network) scenario [9]
in which there is one legitimate transmitter, two legitimate
receivers and, as usual, one warden. See Fig. 1. We are
interested in communicating reliably and simultaneously to
the two receivers over the same medium while ensuring that
the warden remains incognizant of the presence of any communication. We call our model a two-user discrete memoryless
broadcast channel (BC) with a warden. This communication
model mimics the scenario of a military general delivering
commands to her/his multiple subordinates while, at the same
time, ensuring that the probability of the communication being
detected by a furtive enemy, the warden, is vanishingly small.
Note that the enemy is not interested in the precise commands
per se but on whether or not communication between the
general and her/his subordinates is actually happening in order
to pre-empt a possible attack. We establish the fundamental
performance limits for communicating in this scenario when
the no-input symbol is not redundant. Somewhat surprisingly,
we show that the most basic multi-user communication scheme
of time-division [9, Sec. 5.2] is optimal. This implies that a
code designed for the BC that uses two separate point-to-point
codes, each designed for the constituent channels and each
used for a fraction of the time (blocklength) is √
optimal in the
sense that it achieves the best constants of the n-scaling of
the throughput.
A. Related Work
As mentioned, there has been a flurry of recent work
on covert communications. In particular, refined asymptotics
on the fundamental limits of covert communications over
memoryless channels from the second-order [10] and error
exponent [11] perspectives have been studied. In addition,
the fundamental limits of covert communications for channels
with random state known at the transmitter [12] and classicalquantum channels [13] have also been established. In contrast,
2
work on multi-user extensions of covert communications is
relatively sparse. Of note are the works by Arumugam and
Bloch [14], [15]. In [14], the authors derived the fundamental limits of covert communications over a multiple-access
channel (MAC). The authors showed that if the MAC to the
legitimate receiver is “better”, in a precise sense, than the
one to the adversary, then the legitimate
users can reliably
√
communicate on the order of Θ( n) bits per n channel uses
with arbitrarily LPD without using a secret key. The authors
also quantified the pre-constant terms exactly. In [15], the
authors considered a BC communication model. However, note
that the model in [15] is significantly different from that in the
present work. In [15], the authors were interested in transmitting two messages, one common and another covert, over a BC
where there are two receivers, one legitimate and the other the
warden. The common message is to be communicated to both
parties, while the covert message has LPD from the perspective
of the warden. This models the scenario of embedding covert
messages in an innocuous codebook and generalizes existing
works on covert communications in which innocent behavior
corresponds to lack of communication between the legitimate
receivers. In our work, there are three receivers, two legitimate
and the other denotes the warden. Both messages that are
communicated can be considered as covert message from the
perspective of the warden. See Fig. 1 for our model.
B. Main Contribution
Our main contribution is to establish the covert capacity
region (the set of all achievable
pre-constants of the through√
puts which scale as Θ( n)) of the two-user (discrete and
Gaussian) memoryless BC with a warden when the no-input
symbol is not redundant. While the (usual) capacity region of
the two-user discrete memoryless BC is a long-standing open
problem in network information theory, we show that under the
covert communications constraint, the covert capacity region
admits a particularly simple expression. This region implies
that time-division transmission is optimal for all two-user BCs.
We emphasize that no restriction on the BC is required. In
particular, the BC does not have to be degraded, less noisy
or more capable [9, Chapter 5]. Our main result is somewhat
analogous to that of Lapidoth, Telatar and Urbanke [16] who
showed that time-division is optimal for wide-band broadcast
communication over Gaussian, Poisson, “very noisy” channels,
and average-power limited fading channels. However, the
analysis in [16] is restricted to stochastically degraded BCs.
The first analytical tool that is used to prove our main
theorem is a converse bound derived by El Gamal [17] initially
designed for more capable BCs. However, it turns out to be
useful a starting point for our setting. We manipulate this
bound into a form that is reminiscent of an outer bound for
degraded BCs. Subsequently, we express the λ-sum throughput
of this outer bound, for appropriately chosen λ ≥ 1, in terms
of upper concave envelopes [18]. This circumvents the need
to identify the optimal auxiliary random variable for specific
BCs. The identification of optimal auxiliaries is typically
possible only if the BC possesses some special structure.
For example for the binary symmetric BC, Mrs. Gerber’s
lemma [19] is a key ingredient in simplifying the converse
bound. Similarly for the Gaussian BC, a highly non-trivial
result known as the entropy power inequality [20], [21] is
needed to obtain an explicit expression for the capacity region.
Note that both these channels are degraded. Our main results
applies to all two-user discrete memoryless BCs. We employ
concave envelopes and take into consideration that under the
covertness constraint, the weight of the input (codeword) is
necessarily vanishingly small [7], [8]. Augmenting some basic
analytical arguments (e.g., [7, Lemma 1]) to these existing
techniques allows us to simplify the outer bound to conclude
that the time-division inner bound [9, Sec. 5.2] is optimal.
C. Intuition Behind The Main Result
We now provide intuition as to why time-division transmission is optimal for BCs with covertness constraints. We
use the binary symmetric BC [9, Example 5.3], degraded in
favor of Y1 (say), as an example to illustrate this fact. It is
well known that in the absence of the covertness constraint,
superposition coding [9, Sec. 5.3] [22] is optimal. The coding
scheme is illustrated in Fig. 2 where un1 (w1 ), un2 (w2 ) ∈ Fn2
are generated independently, un2 (w2 ) denotes the cloud center
and xn (w1 , w2 ) = un1 (w1 ) ⊕ un2 (w2 ) denotes the satellite
codeword. Because in covert communications, xn (w1 , w2 ) is
required to have low (Hamming) weight [7], [8], either both
un1 (w1 ) and un2 (w2 ) have low weight or both have high weight.
Let us assume it is the former without loss of generality. Then,
the set of locations of the 1’s in the satellite codeword is likely
to be a disjoint union of the sets of 1’s in un1 (w1 ) and un2 (w2 ).
Thus the relative weight of xn (w1 , w2 ), denoted as αn , can be
decomposed into the relative weights of un1 (w1 ) and un2 (m2 ),
denoted as ραn and (1−ρ)αn respectively for some ρ ∈ [0, 1].
Thus, the superposition coding inner bound for the degraded
BC [9, Theorem 5.2] [22] with X = U1 ⊕ U2 reads
R1 ≤ I(X; Y1 |U2 ) = I(U1 ; Y1 ) ≈ ραn L∗1 ,
R2 ≤ I(U2 ; Y2 ) ≈ (1 − ρ)αn L∗2 ,
(1)
(2)
where L∗1 and L∗2 are the “covert capacities” [7], [8] of
the constituent point-to-point binary symmetric channels; see
Theorem 1. Thus, (1) and (2) suggest that time-division is
optimal, at least for degraded BCs but we show the same is
true for all BCs.
D. Paper Outline
This paper is structured as follows. In Section II, we
formulate the problem and define relevant quantities of interest
precisely. In Section III, we state our main result for the
general BC. We also provide some qualitative interpretations.
The main result, corollaries, and bounds on the required length
of the secret key are proved in Sections IV, V, and VI
respectively. We conclude our discussion in Section VII where
we also suggest avenues for future research.
E. Notation
We adopt standard information-theoretic notation, following the text by El Gamal and Kim [9] and on occasion,
3
(W1 , W2 )
✲
f
Xn
✲ P ×n
Y1 Y2 Z|X
Y1n
✲
ϕ1
Y2n
✲
ϕ2
Ŵ1
✲
Ŵ2
✲
✲ H0 : Q×n
Zn
0
✲ Warden
✲ H1 : Q̂Z n
Fig. 1. Illustration of two-user BC with a warden. The key which is accessible to f, ϕ1 , and ϕ2 is not shown here.
un1 (w1 )
⊕
⊕
||
||
un2 (w2 )
xn (w1 , w2 )
Fig. 2. Illustration of intuition of optimality of time-division. Shaded (resp. unshaded) boxes indicate that that coordinate equals 1 (resp. 0). Because un
1 (w1 )
n
n
n
and un
2 (w2 ) are very sparse, the set of locations of the 1’s in x (w1 , w2 ) is highly likely to be a disjoint union of those in u1 (w1 ) and u2 (w2 ).
the book by Csiszár and Körner [23]. We use hb (q) :=
−q log q − (1 − q) log(1 − q) to denote the binary entropy
P
P (z)
function and D(P kQ) :=
z P (z) log Q(z) is the relative
entropy. Throughout log is taken to an arbitrary base. We
also use h(·) to denote the differential entropy. The notation
a ∗ b := a(1 − b) + b(1 − a) denotes the binary convolution
operator. For two discrete distributions, P and Q defined on
the same alphabet X , we say that P is absolutely continuous
with respect to Q, denoted as P ≪ Q if for all x ∈ X ,
Q(x) = 0 implies that P (x) = 0. Other notation will be
introduced as needed in the sequel.
II. P ROBLEM F ORMULATION
A discrete memoryless1 two-user BC with a warden
(X , Y1 , Y2 , Z, PY1 ,Y2 ,Z|X ) consists of a channel input alphabet X , three channel output alphabets Y1 , Y2 , and Z,
and a transition matrix PY1 ,Y2 ,Z|X . The output alphabets Y1
and Y2 correspond to the two legitimate receivers and Z
corresponds to that of the warden. Without loss of generality,
we let X = {0, 1, . . . , K}. We let 0 ∈ X be the “no
input” symbol that is sent when no communication takes place
and define Qx = PZ|X (·|x) for each x ∈ X . The BC is
used n times in a memoryless manner. If no communication
takes place, the warden at receiver Z observes Z n , which is
distributed according to Q×n
0 , the n-fold product distribution
of Q0 . If communication occurs, the warden observes Q̂Z n ,
the output distribution induced by the code. For convenience,
in the sequel, we often denote the two marginal channels
corresponding to the two legitimate receivers as W = PY1 |X
and V = PY2 |X respectively.
1 We omit the qualifier “discrete memoryless” for brevity in the sequel.
We will mostly discuss discrete memoryless BCs in this paper. However, in
Corollary 2, we present results for the BC with a warden when the constituent
channels are Gaussian.
The transmitter and the receiver are assumed to share a
secret key S uniformly distributed over a set K. We will, for
the most part, assume that the key is sufficiently long, i.e., the
set K is sufficiently large. However, we will bound the length
of the key in Section III-D. The transmitter and the receiver
aim to construct a code that is both reliable and covert. Let
the messages to be sent be W1 and W2 . These messages are
assumed to be independent and also independent of S. Also
let their reconstructions at the receiver Yj be Ŵj for j = 1, 2.
As usual, a code is said to be ε-reliable if the probability of
error Pr(∪2j=1 {Ŵj 6= Wj }) is asymptotically upper bounded
by ε ∈ [0, 1) as n → ∞. The code is covert if it is difficult
for the warden to determine whether the transmitter is sending
a message (hypothesis H1 ) or not (hypothesis H0 ). Let π1|0
and π0|1 denote the probabilities of false alarm (accepting H1
when the transmitter is not sending a message) and missed
detection (accepting H0 when the transmitter is sending a
message), respectively. Note that a blind test (one with no side
information) satisfies π1|0 + π0|1 = 1. The warden’s optimal
hypothesis test satisfies
q
π1|0 + π0|1 ≥ 1 − D(Q̂Z n kQ×n
(3)
0 ).
See [7], [24] for details of this claim. Hence, covertness is
guaranteed if the relative entropy between the observed distribution Q̂Z n and the product of no communication distribution
Q×n
vanishes as the blocklength grows.
0
Note that if supp(PZ|X (·|x)) * supp(Q0 ) for some x ∈ X ,
such x should not be transmitted, otherwise it is not possible
for D(Q̂Z n kQ×n
0 ) to vanish [8]. Hence, by dropping all such
input symbols as well as all output symbols not included in
supp(Q0 ), we assume throughout that supp(Q0 ) = Z. In addition, we assume that the no-input symbol 0 is not redundant
i.e., PZ|X (·|0) ∈
/ conv{PZ|X (·|x′ ) : x′ ∈ X , x′ 6= 0} where
4
conv{·} denotes the convex hull. If the symbol 0 is redundant,
there exists a sequence of codes for which D(Q̂Z n kQ×n
0 )= 0
for all n [8] so π1|0 +π0|1 = 1 (i.e., the warden’s test is always
blind) and transmitting at positive rates is possible; this is a
regime we do not consider in this paper.
A code for the BC with a covertness constraint and the
covert capacity region are defined formally as follows.
Definition 1. An (n, M1n , M2n , Kn , ε, δ)-code for the BC
with a warden (X , Y1 , Y2 , Z, PY1 ,Y2 ,Z|X ) and with a covertness constraint consists of
• Two message sets Mj := {1, . . . , Mjn } for j = 1, 2;
• Two independent messages uniformly distributed over
their respective message sets, i.e., Wj ∼ Unif(Mj ) for
j = 1, 2;
• One secret key set K := {1, . . . , Kn };
n
• One encoder f : M1n × M2n × K → X ;
n
• Two decoders ϕj : Yj × K → Mj for j = 1, 2;
such that the following constraints hold:
Pr ∪2j=1 {Ŵj 6= Wj } ≤ ε,
(4)
D(Q̂Z n kQ×n
0 ) ≤ δ.
(5)
For most of our discussion, we ignore the secret key set
(i.e., we assume that the secret key is sufficiently long) for the
sake of simplicity and refer to the family of codes above with
secret key sets of arbitrary sizes as (n, M1n , M2n , ε, δ)-codes.
We will revisit the effect of the key size in Section III-D.
Definition 2. We say that the pair (L1 , L2 ) ∈ R2+ is (ε, δ)achievable for the BC with a warden and with a covertness
constraint if there exists a sequence of (n, M1n , M2n , εn , δ)codes such that
1
lim inf √ log Mjn ≥ Lj ,
n→∞
nδ
lim sup εn ≤ ε.
j ∈ {1, 2},
(6)
(7)
n→∞
Define the (ε, δ)-covert capacity region Lε,δ ⊂ R2+ to be
the closure of all (ε, δ)-achievable pairs of (L1 , L2 ). We are
interested in the δ-covert capacity region
\
Lε,δ = lim Lε,δ .
(8)
Lδ :=
ε∈(0,1)
ε→0
Note that L1 and L2 are measured in bits (or information
units) per square root channel use.
We will also need the notion of covert capacities for pointto-point discrete memoryless channels (DMCs) with a warden
(X , Y, Z, PY,Z|X ) [7], [8]. This scenario corresponds to the
above definitions with Y1 = Y and Y2 = ∅. Recall that the
chi-squared distance between two distributions Q0 and Q1
supported on the same alphabet Z is defined as
X (Q1 (z) − Q0 (z))2
.
χ2 (Q1 kQ0 ) :=
Q0 (z)
(9)
z∈Z
Theorem 1 (Bloch [7] and Wang, Wornell, Zheng [8]). Let
(X , Y, Z, PY,Z|X ) be a DMC with a warden in which W :=
PY |X and Qk := PZ|X (·|k) for k ∈ X . We assume that it
satisfies W (·|k) ≪ W (·|0) for all k ∈ X \{0}, supp(Q0 ) = Z
and 0 ∈ X is not redundant. Then its covert capacity is
v
u PK
2
u2
k=1 pk D(W (·|k)kW (·|0))
∗
L (PY,Z|X ) := max t
PK
p
χ2
k=1 pk Qk Q0
(10)
where the maximization extends over all length-K probability
vectors p (i.e., p = [p1 , . . . , pK ]T where pk ≥ 0 and
P
K
k=1 pk = 1). If X = {0, 1}, i.e., PY,Z|X has a binary input,
then the maximization over p in (10) is unnecessary and
s
2D(W (·|1)kW (·|0))2
.
(11)
L∗ (PY,Z|X ) :=
χ2 (Q1 kQ0 )
As previously mentioned, we assume P
that Q1 ≪ Q0 in
∗
the binary input case (or more generally, K
k=1 pk Qk ≪ Q0
∗
∗
∗ T
where p = [p1 , . . . , pK ] is any maximizer of (10)). Otherwise, covert communication is impossible [7, Appendix G].
With this assumption and the fact that 0 ∈ X is not redundant,
L∗ (PY,Z|X ) as defined in (10) and (11) is finite.
III. M AIN R ESULTS
In this section, we present our main results. In Section III-A,
we state our main result for the case where the BC is general
and the key is of sufficiently long length. We interpret our
result in Section III-B by placing it in context via several
remarks. In Section III-C, we specialize our result to two
degraded BCs and show that standard techniques apply for
such models. In Section III-D, we extend our main result to
the case where the key size is also a parameter of interest.
A. General Memoryless BCs
Our main result is a complete characterization of the δcovert capacity region for all BCs satisfying certain absolute
continuity conditions.
Theorem 2. Assume that a BC with a warden PY1 ,Y2 ,Z|X
is such that the constituent DMCs W := PY1 |X and V :=
PY2 |X satisfy W (·|k) ≪ W (·|0) and V (·|k) ≪ V (·|0) for all
k ∈ X \ {0}. Also assume that the length of the secret key
is sufficiently large. Denote the individual covert capacities of
the constituent DMCs with a warden PY1 ,Z|X and PY2 ,Z|X
as L∗1 := L∗ (PY1 ,Z|X ) and L∗2 := L∗ (PY2 ,Z|X ) respectively.
Then, for all δ > 0, the δ-covert capacity region is
L2
L1
2
(12)
Lδ = (L1 , L2 ) ∈ R+ : ∗ + ∗ ≤ 1 .
L1
L2
Theorem 2 is proved in Section IV.
B. Remarks on the Main Theorem
A few remarks are in order.
1) First, note that (12) implies that under the covert
communication constraints, time-division transmission
is optimal for all BCs. The achievability part simply
involves two optimal covert communication codes, one
for each DMC with a warden. The first code, designed
for PY1 ,Z|X , is employed over ⌊ρn⌋ channel uses where
5
ρ ∈ [0, 1]. The second code, designed for PY2 ,Z|X , is
employed over the remaining n − ⌊ρn⌋ channel uses.
This achieves the point (ρL∗1 , (1 − ρ)L∗2 ) which is on
the boundary of Lδ . By varying ρ ∈ [0, 1], we achieve
the whole boundary and hence the entire region in (12).
2) The converse of Theorem 2 thus constitutes the main
contribution of this paper. To obtain an explicit outer
bound for the capacity region for BCs that satisfy some
ordering—such as degraded, less noisy or more capable
BCs [9, Chapter 5]—one often has to resort to the
identification of the optimal auxiliary random variablechannel input pair (U, X) in the characterization of the
capacity region of these classes of BCs. However, this is
only possible for specific BCs; see Corollaries 1 and 2
to follow. For general (or even arbitrary degraded) BCs,
this is, in general, not possible. Our workaround involves
first starting with an outer bound of the capacity region
for general memoryless BCs by El Gamal [17]. We
combine the inequalities in the outer bounds and use this
to upper bound a linear combination of the throughputs
of the point-to-point channels in terms of the concave
envelope of a linear combination of mutual information
terms [18]. This allows us to circumvent the need to explicitly characterize (U, X) since U is no longer present
in this concave envelope characterization. We exploit
the fact that in covert communications, the input to
the channel is required to have low weight. Leveraging
this constraint and applying some approximations then
allows us to obtain the outer bound to (12) for all BCs.
The appeal of this approach is not only that we do not
need to find the optimal (U, X) as this is implicit in the
concave envelope representation.
3) Let us say that the absolute continuity condition holds
for a channel W if W (·|k) ≪ W (·|0) for all k ∈ X \{0}.
Then it was shown by Bloch [7, Appendix G] that if
W √does not satisfy the absolute continuity condition,
Θ( n log n) bits per n channel uses can be covertly
transmitted. In our setting, the same is true for the constituent channels; if W satisfies
√ the absolute continuity
condition but V does not Θ( n) bits
√ per n channel uses
can be transmitted to Y1 , while Θ( n log n) bits per n
channel uses can be transmitted to Y2 and vice versa.
An alternative (converse) proof of this result follows from
Mrs. Gerber’s lemma [19] and is presented in Section V-A.
This result generalizes [8, Example 3].
We now consider the scenario in which the BC PY1 ,Y2 ,Z|X
consists of three additive white Gaussian noise (AWGN)
channels [9, Sec. 5.5], i.e.,
Yj = X + Ψj ,
Z = X + Ψ3 ,
j ∈ {1, 2}
(14)
(15)
where Ψ1 , Ψ2 , and Ψ3 are independent zero-mean Gaussian
noises with variances N1 , N2 , and σ 2 respectively. There is
no (peak, average, or long-term) power constraint on the
codewords [8, Sec. V]. Let the “no communication” input
symbol be 0 ∈ R, so by (15), Q0 is distributed as a zeromean Gaussian with variance σ 2 .
Corollary 2. Suppose that W and V be AWGN channels as
in (14) with noise variances satisfying 0 ≤ N1 ≤ N2 (without
loss of generality). Then Lδ is as in (12) with
L∗j =
σ 2 log e
,
Nj
j ∈ {1, 2}.
(16)
An alternative (converse) proof of this result follows from
the entropy power inequality [20], [21] and is presented in
Section V-B. This result generalizes [7, Theorem 6] and [8,
Theorem 5]. This result is also analogous to [16, Prop. 1] in
which it was shown that time-division is optimal for Gaussian
BCs in the low-power limit.
We note that Corollaries 1 (for the binary symmetric BC)
and 2 (for the Gaussian BC) apply to an arbitrary but finite number of successively degraded legitimate receivers [9,
Sec. 5.7], say N ∈ N. This means that X ⊸−
− Y1 ⊸−
−
Y2 ⊸−
− . . . ⊸−
− YN . The corresponding δ-covert capacity
region is
N
X
Lj
N
Lδ = (L1 , . . . , LN ) ∈ R+ :
≤1 ,
(17)
L∗
j=1 j
where L∗j is given as in (13) or (16). We omit the proofs
as they are straightforward generalizations of the corollaries
above.
C. Degraded BCs
D. On the Length of the Secret Key
We now specialize Theorem 2 to two specific classes of
(degraded) BCs and show that slight modifications of standard
techniques are applicable in establishing the outer bound to
Lδ . To state the first corollary, we use the following notation:
W = BSC(q) if it is a binary-input, binary-output channel in
which Y = X ⊕ Ψ where Ψ ∼ Bern(q).
In the preceding derivations, we have assumed that the
secret key that the transmitter and legitimate receivers share is
arbitrarily long. In other words, the set K is sufficiently large.
In this section, we derive fundamental limits on the length of
the key so that covert communication remains successful.
To formalize this, we will need to augment Definition 2. We
say that (L1 , L2 , Lkey ) is δ-achievable or simply achievable
if in addition to (6) and (7) (with ε = 0),
Corollary 1. Suppose that W = BSC(p1 ) and V = BSC(p2 )
with 0 ≤ p1 ≤ p2 ≤ 1/2 (without loss of generality) [9,
Example 5.3]. Then Lδ is as in (12) with
s
1 − pj
2
∗
Lj = (log e)(1−2pj ) log
·
, j ∈ {1, 2}.
pj
χ2 (Q1 kQ0 )
(13)
1
lim sup √ log Kn ≤ Lkey .
n→∞
nδ
(18)
Finally, we set L∗Z := L∗ (PZ,Z|X ). The generalization of
Theorem 2 is as follows.
6
Theorem 3. The tuple (L1 , L2 , Lkey ) ∈ R3+ is achievable if
and only if
L1
L2
+ ∗ ≤1
∗
L1
L2
(19)
and
Lkey ≥
L2
L1
+ ∗
∗
L1
L2
L∗Z − L1 − L2 .
(20)
Note that if the throughputs of the code (log M1n , log M2n )
are such that we operate on the boundary of the covert capacity
region (i.e., that (19) holds with equality), the optimum
(minimum) key length
L∗key = L∗Z − L1 − L2 .
(21)
Then, it follows that
Also note that if Lkey is sufficiently large, then (20) is satisfied
so based on (19), Theorem 3 reverts to Theorem 2. The proof
of this enhanced theorem follows largely along the same lines
as that for Theorem 2. However, we need to carefully bound
the length of the secret key. The additional arguments to
complete the proof of Theorem 3 are provided in Section VI.
IV. P ROOF
OF
T HEOREM 2
A. Preliminaries for the Proof of Theorem 2
Before we commence, we recap some basic notions in convex analysis. The (upper) concave envelope of f : D → R, denoted as C[f ](x) := inf{g(x) : g ≥ f over D, g is concave},
is the smallest concave function lying above f . Clearly, if f is
concave, then C[f ] = f . Furthermore if D is a subset of Rd ,
then by Carathéodory’s theorem [18],
g = C[f ]
⇐⇒
g(x) =
sup
d+1
X
pi f (xi ),
(22)
{(xi ,pi )}d+1
i=1 i=1
where xi ∈ D and {pi }d+1
i=1 is a probability distribution such
P
that d+1
p
x
=
x.
Here,
we record a basic fact:
i
i
i=1
f1 ≥ f2 on D
=⇒
g1 ≥ g2 on D
(23)
where gj = C[fj ], j = 1, 2. This can be easily proved by
means of the representation of the concave envelope in (22).
Indeed,
g2 (x) ≥
d+1
X
i=1
pi f2 (xi ) ≥
d+1
X
pi f1 (xi )
(24)
i=1
where the first inequality holds for any {(xi , pi )}d+1
i=1 such that
Pd+1
p
x
=
x
and
the
second
inequality
because
f2 ≥ f1 on
i=1 i i
D. Since the inequality holds for all {(xi , pi )}d+1
i=1 such that
Pd+1
i=1 pi xi = x, we have
g2 (x) ≥
sup
d+1
X
{(xi ,pi )}d+1
i=1 i=1
which establishes (23).
B. Converse Proof of Theorem 2: Binary-Input BCs
We first prove the converse to Theorem 2 for the case
when X = {0, 1}. This is done for the sake of clarity and
simplicity. We subsequently show how to extend the analysis
to the multiple symbol case (i.e., |X | > 2) in Section IV-C. Fix
a sequence of (n, M1n , M2n , εn , δ)-codes for the BC with a
warden PY1 ,Y2 ,Z|X satisfying the 0-reliability constraint in (4)
and (7) and the covertness constraint in (5). In the proof, we
use the following result by Bloch [7, Lemma 1, Remark 1]:
P
Lemma 1. Let Qγ (z) :=
x∈X PZ|X (z|x)Pγ (x) for γ ∈
[0, 1] where Pγ is a Bernoulli distribution with parameter γ,
i.e.,
1−γ x=0
Pγ (x) :=
.
(26)
γ
x=1
pi f1 (xi ) = g1 (x),
(25)
I(Pγ , PZ|X ) = γD(Q1 kQ0 ) − D(Qγ kQ0 ).
(27)
Furthermore, for any sequence γn such that γn → 0 as n →
∞, for all n sufficiently large,
√
γn2
χ2 (Q1 kQ0 ) (1 − γn ) ≤ D(Qγn kQ0 )
2
γ2
√
≤ n χ2 (Q1 kQ0 ) (1 + γn ) .
(28)
2
1) Covertness Constraint: We first discuss the covertness
constraint in (5). Let Z n (resp. X n ) have distribution Q̂Z n
(resp. P̂X n ) and let Q̂Zi (resp. P̂Xi ) be the marginal of Q̂Z n
Q̄n be the
(resp. P̂X n ) on the i-th element. Additionally, let P
n
average output distribution on Z, i.e., Q̄n := n1 i=1 Q̂Zi .
Similarly wePdefine the average input distribution P̄n on X
as P̄n := n1 ni=1 P̂Xi . Then mimicking the steps in the proof
of [8, Theorem 1], we have
D(Q̂Z n kQ×n
0 ) ≥ nD(Q̄n kQ0 ).
(29)
Thus, by the covertness constraint in (5) and (29), we have
δ
(30)
D(Q̄n kQ0 ) ≤ .
n
Since limn→0 D(Q̄n kQ0 ) = 0 and symbol 0 ∈ X is not
redundant,2 it follows that
P̄n = Pαn for some αn → 0.
(31)
Because Q̄n (z) = Qαn (z) for all z ∈ Z, by Lemma 1,
√
α2n
χ2 (Q1 kQ0 ) (1 − αn ) ≤ D(Q̄n kQ0 )
2
√
α2
≤ n χ2 (Q1 kQ0 ) (1 + αn ) . (32)
2
From (30) and (32), we conclude that αn has to satisfy the
weight constraint
√
2δ
=: ᾱ2n .
(33)
α2n (1 − αn ) ≤
χ2 (Q1 kQ0 )n
From this relation, we see that αn ≤ ᾱn (1 + o(1)) = Θ( √1n ).
2 Indeed, if 0 were redundant (e.g., P
Z|X (·|0) = PZ|X (·|1) for binary X ),
there exists an input distribution
P P̃ such that P̃ (0) = 0 and its corresponding
output distribution Q̃ =
x P̃ (x)PZ|X (·|x) = Q0 [8, Eqn. (5)]. The
distribution Q̃ (taking the role of Q̄n ) satisfies D(Q̃kQ0 ) = 0 so (30)
is trivially satisfied. However, P̃ (taking the role of P̄n ) clearly does not
satisfy (31).
7
2) Upper Bound on Linear Combination of Code Sizes:
We now proceed to consider upper bounds on the code sizes
subject to the reliability and covertness constraints. Without
loss of generality, we assume L∗1 ≥ L∗2 . We start with a lemma
that is a direct consequence of the converse proof for more
capable BCs by El Gamal [17]. This lemma is stated in a
slightly different manner in [9, Theorem 8.5].
Lemma 2. Every (n, M1n , M2n , εn )-code for any BC satisfies
(log M1n )(1 − εn ) − 1 ≤
(log M2n )(1 − εn ) − 1 ≤
n
X
i=1
n
X
I(U1i ; Y1i ),
(34)
PX PU |X
= max max I(X; Y1 |U ) + λ[I(X; Y2 ) − I(X; Y2 |U )] (42)
PX PU |X
= max λI(X; Y2 ) + max I(X; Y1 |U ) − λI(X; Y2 |U ) (43)
PX
I(U2i ; Y2i ),
(35)
(36)
(37)
= max
PU |X
where U1i
:=
and U2i
:=
i−1
n
(W2 , Y1,i+1 , Y2 ) satisfies (U1i , U2i ) ⊸−
− Xi ⊸−
−
(Y1i , Y2i ). In addition, if a secret key S is available to the
encoders and decoder, then the auxiliary random variables
U1i and U2i also include S.
For completeness, the proof of Lemma 2, with the effect
of the secret key, is provided in Appendix A. Note that no
assumption (e.g., degradedness, less noisy or more capable
conditions) is made on the BC in Lemma 2.
Now fix a constant λ ≥ 1. By adding (λ − 1) copies
of (35) to one copy of (36) and writing Ui := U2i for all
i ∈ {1, . . . , n}, we obtain
(38)
i=1
By introducing the usual time-sharing random variable J ∈
Unif{1, . . . , n} which is independent of all the other random
variables (W1 , W2 , X n , Y1n , Y2n ) and defining U := (J, UJ ),
X := XJ , Y1 := Y1J and Y2 := Y2J , we obtain
≤ nI(X; Y1 |U ) + nλI(U ; Y2 ).
max I(X; Y1 |U ) − λI(X; Y2 |U )
X
PU (u)[I(X; Y1 |U = u)−λI(X; Y2 |U = u)]
= max
PU |X
n
(W1 , Y1i−1 , Y2,i+1
)
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
(44)
PU |X
i=1
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
n
X
I(Xi ; Y1i |Ui ) + λI(Ui ; Y2i ) .
≤
= max λI(X; Y2 ) + CPX [I(X; Y1 ) − λI(X; Y2 )].
− X ⊸−
− Y2
Here, (42) follows from the Markov chain U ⊸−
and (44) follows from the definition of the concave envelope.
Namely, for fixed PX ,
i=1
(log M1n + log M2n )(1 − εn ) − 2
n
X
I(U1i ; Y1i ) + I(Xi ; Y2i |U1i ) ,
≤
PU |X
PX
i=1
(log M1n + log M2n )(1 − εn ) − 2
n
X
I(Xi ; Y1i |U2i ) + I(U2i ; Y2i ) ,
≤
X
PU (u)[I(PX|U (·|u), W )−λI(PX|U (·|u), V )] (46)
u
= CPX [I(X; Y1 ) − λI(X; Y2 )],
(47)
−
where (46) follows from the Markov chain U ⊸−
X
⊸−
−
(Y
,
Y
)
and
(47)
follows
from
the
fact
that
1
2
P
u PU (u)PX|U (·|u) = PX and (22). Note that we employ
the subscript PX on C to emphasize that the concave envelope
operation is taken with respect to the distribution PX and it
is thus a function of PX .
3) Approximating the Maximization over Low-Weight Inputs: Due to the above considerations, it now suffices to
simplify (44). To obtain the outer bound to (12), we set
λ := L∗1 /L∗2 in the following. Note that since it is assumed
that L∗1 ≥ L∗2 , λ ≥ 1 as required to obtain (38). If instead
L∗2 > L∗1 , then we set λ := L∗2 /L∗1 and add (λ − 1) copies
of (34) to one copy of (37) to obtain the analogue of (38) with
Ui := U1i . In the rest of the proof, we also replace the index 1
by 2 and W by V and vice versa. The following argument goes
through verbatim with these minor amendments.
By expressing the mutual information quantities in (44) as
I(PX , W ) and I(PX , V ) [23] (for I(X; Y1 ) and I(X; Y2 )
respectively), we can write (44) as follows:
PX
(39)
(45)
u
max λI(PX , V ) + CPX [I(PX , W ) − λI(PX , V )].
Note that the above identification of (U, X) satisfies U ⊸−
−
X ⊸−
− (Y1 , Y2 ). Furthermore, since X is equal to Xi for each
i ∈ {1, . . . , n} with equal probability 1/n (because of X =
XJ ), it follows PX = P̄n = Pαn for some αn satisfying (33).
Hence, (39) can be bounded by taking a maximization over
all such distributions, i.e.,
1
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
n
≤ max max I(X; Y1 |U ) + λI(U ; Y2 ),
(40)
PX PU |X
where the maximization over PX is over distributions Pαn
where αn satisfies (33).
Now by using the concave envelope representation for the
capacity region of degraded BCs [18], we may write (39) as
follows:
1
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
n
≤ max max I(X; Y1 |U ) + λI(U ; Y2 )
(41)
(48)
Now we parametrize PX = Pαn = P̄n as the vector [1 −
αn , αn ]T where 0 ≤ αn ≤ ᾱn (1 + o(1)) [cf. (33)] such that
PX is linear in the parameter αn . By applying (27) and (28) to
both mutual information terms, we can approximate the terms
in the argument of the concave envelope in (48) as
I(PX , W ) − λI(PX , V )
= αn D(W (·|1)kW (·|0)) − λD(V (·|1)kV (·|0))
+ O(α2n ).
O(α2n )
(49)
Note that the implied constant in the term
depends only
on χW := χ2 (W (·|1)kW (·|0)) and χV := χ2 (V (·|1)kV (·|0))
8
and these are finite under the absolute continuity conditions
of the theorem, i.e., W (·|1) ≪ W (·|0) and V (·|1) ≪ V (·|0).
Consequently, for every η > 0, there exists an integer
N1 (η; χW , χV ) such that for n > N1 (η; χW , χV ), we have
I(PX , W ) − λI(PX , V )
≤ αn D(W (·|1)kW (·|0))−λD(V (·|1)kV (·|0))+η . (50)
This is because the quadratic term O(α2n ) can be upper
bounded by ηαn for all n sufficiently large (depending only
on (χW , χV )).
Equipped with the fact in (23) and the upper bound in (50),
we obtain that for all n > N1 (η; χW , χV ),
CPX [I(PX , W ) − λI(PX , V )]
h
≤ CPX αn D(W (·|1)kW (·|0))
i
− λD(V (·|1)kV (·|0)) + η .
CPX [I(PX , W ) − λI(PX , V )]
≤ αn D(W (·|1)kW (·|0))−λD(V (·|1)kV (·|0))+η . (52)
In addition, by the same reasoning involving Taylor approximations, there exists an integer N2 (η; χV ) such that for all
n > N2 (η; χV ), we can upper bound the first term in (48) as
follows:
(53)
Combining (52) and (53), we see that the terms
λαn D(V (·|1)kV (·|0)) cancel and the expression in (48) can
be upper bounded as
max I(PX , V ) + CPX [I(PX , W ) − λI(PX , V )]
PX
≤ αn D(W (·|1)kW (·|0)) + 2η
Since (57) holds for all η > 0 and η is arbitrary, we obtain
s
2D(W (·|1)kW (·|0))2
L∗1
L1 + ∗ L2 ≤
.
(58)
L2
χ2 (Q1 kQ0 )
Finally, by recalling the definition of the covert capacity of
PY1 ,Z|X according to (11) in Theorem 1, we notice that the
right-hand-side of (58) is exactly L∗1 . Hence we obtain the
desired outer bound corresponding to the region Lδ in (12) in
Theorem 2.
(51)
Now, observe that g(αn ) := αn [D(W (·|1)kW (·|0)) −
λD(V (·|1)kV (·|0)) + η] is linear in αn and PX is also a
linear function in αn so by expressing αn as a function of
(any one of the components of) PX , we know that g(·) is a
linear function of PX . Since a linear function is concave, we
can remove the concave envelope operation in (51) yielding
λI(PX , V ) ≤ λαn D(V (·|1)kV (·|0)) + ηαn .
pairs according to Definition 2, and the facts that εn → 0
and nδ → ∞, we obtain
s
2
L∗1
D(W (·|1)kW (·|0))+2η . (57)
L1 + ∗ L2 ≤
L2
χ2 (Q1 kQ0 )
(54)
for all n > max{N1 (η; χW , χV ), N2 (η; χV )}. Note that PX
in the maximization above is such that PX = Pαn with the
constraint 0 ≤ αn ≤ ᾱn (1 + o(1)). Now, combining (54) with
the upper bound in (44), we have
1
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
n
≤ ᾱn (1 + o(1)) D(W (·|1)kW (·|0)) + 2η .
(55)
4) Completing the Converse Proof Taking Limits: At this
point, we invoke the definition of ᾱn in (33) and normalize (55) to obtain
1
√
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
nδ
s
2δn
D(W (·|1)kW (·|0))+2η . (56)
≤ (1+o(1))
χ2 (Q1 kQ0 )δn
Taking the lim sup in n on both sides, recalling that (i)
λ = L∗1 /L∗2 and (ii) the definition of achievable (L1 , L2 )
C. Converse Proof of Theorem 2: General BCs
We generalize the converse proof for binary-input in Section IV-B to the multiple symbol case, i.e., |X | > 2. We use
the following lemma whose proof is in [7, Section VII-B].
Lemma 3. For γ ∈ [0, 1] and length-K
PK probability vector p =
T
[p
,
.
.
.
,
p
]
,
i.e.,
p
≥
0
and
1
K
k
k=1 pk = 1, let Qγ,p (z) :=
P
P
(z|x)P
(x)
where
γ,p
Z|X
x∈X
1−γ
x=0
Pγ,p (x) :=
.
(59)
γpk x = k ∈ X \ {0}
Then, it follows that
X
K
I(Pγ,p , PZ|X ) =
γpk D(Qk kQ0 ) −D(Qγ,pkQ0 ). (60)
k=1
Furthermore, for any sequence γn such that γn → 0 as n →
∞, for all n sufficiently large,
X
K
γn2
√
χ2
pk Qk Q0 (1 − γn ) ≤ D(Qγn ,p kQ0 )
2
k=1
X
K
γn2
√
≤
χ2
pk Qk Q0 (1 + γn ) (61)
2
k=1
1) Covertness Constraint: By a close inspection of the
steps in Section IV-B1 and by applying Lemma 3, we conclude
that the average input distribution P̄n is given by Pαn ,p for
some length-K probability vector p and αn such that
α2n (1 −
√
αn ) ≤
2δ
χ2
=: ᾱ2p,n .
p
Q
Q
0 n
k=1 k k
PK
(62)
2) Upper Bound on Linear Combination of Code Sizes:
Let us assume L∗1 ≥ L∗2 (without loss of generality), then
λ = L∗1 /L∗2 ≥ 1. It can be easily checked that the steps in
Section IV-B2 go through in the same manner for the multiple
symbol case except that PX = Pαn ,p for some length-K
probability vector p and αn ∈ [0, 1] satisfying (62). As such,
we have that (44) also holds where now the maximization
over PX is over those distributions Pαn ,p for some p and αn
satisfying (62).
9
3) Approximating the Maximization over Low-Weight Inputs: Now we approximate (48). We fix p throughout. By the
same arguments up to (50) and using (60) and (61), we have
for PX = Pαn ,p ,
I(PX , W ) − λI(PX , V )
" K
X
≤ αn
pk D(W (·|k)kW (·|0))
where the equality in (69) follows from the Markov chain
U ⊸−
− X ⊸−
− Y2 and (70) follows from the fact that the
entropy of Y2 = X ⊕Ψ1 ⊕ Ψ̃2 when E[X] = αn is hb (αn ∗p2 ).
As a result, from (70), there exists a τn ∈ [0, αn ] such that
H(Y2 |U ) = hb (τn ∗ p2 ).
(71)
hb (τn ∗ p2 ) = H(Y2 |U ) = H(Y1 ⊕ Ψ̃2 |U )
≥ hb h−1
b (H(Y1 |U )) ∗ p̃2
(72)
τn ∗ p1 ∗ p̃2 ≥ h−1
b (H(Y1 |U )) ∗ p̃2 .
(74)
Then, we have
k=1
#
− λD(V (·|k)kV (·|0))] + η .
(63)
for some fixed η > 0 and n sufficiently large.
Since the right-hand side of (63) is linear in PX , due to the
same reasoning up to (55), we have
1
(log M1n + λ log M2n )(1 − εn ) − (1 + λ)
n
" K
#
X
≤ ᾱp,n (1+o(1))
pk D(W (·|k)kW (·|0)) +2η (64)
where (73) follows from the conditional version of Mrs.
Gerber’s lemma [19]. By the monotonicity of hb (·) on [0, 1/2]
and the fact that p1 ∗ p̃2 = p2 , we have
As a result, we have
H(Y1 |U ) ≤ hb (τn ∗ p1 ).
(75)
I(X; Y1 |U ) = H(Y1 |U ) − H(Y1 |U, X)
= H(Y1 |U ) − hb (p1 )
(76)
(77)
k=1
for n sufficiently large.
4) Completing the Converse Proof Taking Limits: By substituting λ = L∗1 /L∗2 and ᾱp,n defined in (62) into (64), taking
limits as in Section IV-B4, and subsequently maximizing over
all probability vectors p on X \ {0}, we obtain
v
u PK
2
∗
u2
L1
k=1 pk D(W (·|k)kW (·|0))
t
L1 + ∗ L2 ≤ max
PK
p
L2
χ2
k=1 pk Qk Q0
= L∗1 .
(65)
This completes the proof for the multiple symbol case.
V. P ROOFS
OF
C OROLLARIES
IN
A. Proof of Corollary 1
As the the capacity region of the stochastically degraded
BC is the same as that of the physically degraded BC with the
same marginals [9, Sec. 5.4] even under the covertness constraint, we assume that the physically degradedness condition
holds, i.e., Y1 = X ⊕Ψ1, Y2 = Y1 ⊕ Ψ̃2 where Ψ̃2 ∼ Bern(p̃2 )
such that p1 ∗ p̃2 = p2 .
We follow the exposition in [9, Sec. 5.4.2] closely. By the
standard argument to establish the weak converse for degraded
BCs [25], we know that every (n, M1n , M2n , εn )-code for a
BC must satisfy
(66)
(67)
for some U ⊸−
− X ⊸−
− (Y1 , Y2 ) in which X satisfies the
weight constraint in (33), i.e., PX = Pαn or E[X] = αn . We
now evaluate the region in (66)–(67) explicitly in terms of the
channel parameters and the upper bound on the weight of X.
Now we have
hb (p2 ) = H(Y2 |X)
= H(Y2 |U, X) ≤ H(Y2 |U ) ≤ H(Y2 )
= hb (αn ∗ p2 ),
Now consider
≤ hb (τn ∗ p1 ) − hb (p1 ).
(78)
For the other rate bound in (67), we have
I(U ; Y2 ) = H(Y2 ) − H(Y2 |U )
≤ hb (αn ∗ p2 ) − hb (τn ∗ p2 ).
(79)
(80)
d
hb (q) = (log e) log 1−q
Now, note that for all q ∈ (0, 1/2), dq
q .
By Taylor expanding hb around q, we obtain
S ECTION III-C
(log M1n )(1 − εn ) − 1 ≤ nI(X; Y1 |U )
(log M2n )(1 − εn ) − 1 ≤ nI(U ; Y2 ),
(73)
(68)
(69)
(70)
hb (q ∗ ξ) = hb (q + (1 − 2q)ξ)
(81)
1−q
2
= hb (q) + (log e) log
· (1 − 2q)ξ + O(ξ ) (82)
q
as ξ → 0. Now we can simplify the bounds√on the righta/ n and τn :=
hand-sides
of (78) and (80). Write αn :=p
√
t/ n where t ∈ [0, a] and a := (1 + o(1)) 2δ/χ2 (Q1 kQ0 );
see (33) for the relation between αn and an upper bound on a
function of it given by ᾱn . By combining (66), (67), (78), (80),
and (82), we obtain the outer bound
1
(log M1n )(1 − εn ) − 1
n
t
1
1 − p1
√
·
+O
≤ (log e)(1 − 2p1 ) log
p1
n
n
1
(log M2n )(1 − εn ) − 1
n
1 − p2 a − t
1
≤ (log e)(1 − 2p2 ) log
.
· √ +O
p2
n
n
(83)
(84)
By dividing the first and second bounds by (log e)(1 −
1
2
2p1 ) log 1−p
and (log e)(1 − 2p2 ) log 1−p
respectively,
p1
p2
p
adding them, multiplying the resultant expression by n/δ,
and taking limits, we immediately recover the outer bound to
Lδ with L∗j defined in (13).
10
B. Proof of Corollary 2
The proof follows similarly to that of Corollary 1 but we
use the entropy power inequality [20], [21] in place of Mrs.
Gerber’s lemma. As in the proof of Corollary 1, we assume
physically degradedness, i.e., Y1 = X + Ψ1 , Y2 = Y1 + Ψ̃2
where Ψ̃2 is independent zero-mean Gaussian noise with
variance N2 − N1 . Let the second moment of the input
distribution be denoted as αn = E[X 2 ]; this plays the role
of the weight of X in the discrete case. The bounds (66)
and (67) clearly still hold so we only have to single-letterize
the two mutual information terms I(X; Y1 |U ) and I(U ; Y2 ).
We follow the exposition in [9, Sec. 5.5.2] closely.
First, we have
I(U ; Y2 ) = h(Y2 ) − h(Y2 |U )
(85)
1
(86)
≤ log(2πe(αn + N2 )) − h(Y2 |U )
2
where (86) follows from the fact that a Gaussian maximizes
differential entropy over all distributions with the same second
moment. Now note that
1
log(2πeN2 ) = h(Y2 |X)
(87)
2
= h(Y2 |U, X) ≤ h(Y2 |U ) ≤ h(Y2 )
(88)
1
≤ log(2πe(αn + N2 )).
(89)
2
As such there exists a τn ∈ [0, αn ] such that
1
log(2πe(τn + N2 )).
(90)
2
Then, by the conditional form of the entropy power inequality [20], [21],
h(Y2 |U ) =
h(Y2 |U ) = h(Y1 + Ψ̃2 |U )
(91)
1
(92)
≥ log 22h(Y1 |U) + 22h(Ψ̃2 |U)
2
1
= log 22h(Y1 |U) + 2πe(N2 − N1 ) .
(93)
2
Thus,
1
h(Y1 |U ) ≤ log(2πe(τn + N1 )).
(94)
2
Now, we are ready to upper bound the mutual information
terms using the above calculations. We have
I(X; Y1 |U ) = h(Y1 |U ) − h(Y1 |U, X)
(95)
1
1
≤ log(2πe(τn + N1 )) − log(2πeN1 ) (96)
2
2
1
τn log e
τn
= log 1 +
≤
,
(97)
2
N1
2N1
where the last inequality follows from the fact that log(1+t) ≤
t log e for t ≥ −1. Similarly,
I(U ; Y2 ) = h(Y2 ) − h(Y2 |U )
(αn − τn ) log e
αn + N2
1
≤
≤ log
2
τn + N2
2(τn + N2 )
(αn − τn ) log e
≤
.
2N2
(98)
(99)
(100)
Using the same calculations as those leading to [8, Eqn. (75)],
we conclude that the covert communication constraint in the
Gaussian case translates to
δ
α2n
+ o(α2n ) ≤ .
4σ 4
n
(101)
The proof is completed by uniting (97), (100), and (101) in a
way that is analogous to the conclusion of the proof for the
binary symmetric BC in Section V-A.
VI. P ROOF S KETCH
OF
T HEOREM 3
Proof: The achievability in (20) follows by augmenting
the standard time-division argument given in Remark 1 in
Section III-B. More specifically, we let ρ1 := L1 /L∗1 and
ρ2 := L2 /L∗2 . Then ρ1 + ρ2 ≤ 1. We use an optimal code for
the first receiver for ρ1 fraction of time, an optimal code for
the second receiver for ρ2 fraction of time, and stay idle for the
remaining fraction of time. Then the required secret key rate3
is ρ1 (L∗Z − L∗1 ) + ρ2 (L∗Z − L∗2 ) as a direct consequence of [7,
Theorem 3], which is equal to the right-hand side of (20).
For the converse, for simplicity, we only consider the
binary-input
Q1
PK case; the general case follows from replacing
PK
with
k=1 pk Qk everywhere and P̄n (1) with
k=1 P̄n (k)
everywhere. We show that there is a tradeoff between the
√ message rates and the secret key rate (with normalizations nδ); if
the message rates are in the interior of (12), a strictly smaller
secret key rate is required. To elucidate this tradeoff, let us
consider a rate tuple (L1 , L2 ) such that L1 /L∗1 + L2 /L∗2 = κ
for some κ ∈ [0, 1]. Note that κ strictly less than one means
that the message rates are in the interior of (12).
By applying similar steps as in [7, Eqns. (91)–(94)], we
obtain
log M1n + log M2n + log Kn = H(W1 , W2 , S)
≥ I(W1 , W2 , S; Z n )
≥ I(X n ; Z n )
≥ nI(X; Z) − δ,
(102)
(103)
(104)
(105)
where (105) follows from similar steps presented in [26,
Sec. 5.2.3]. Here X = XJ and Z = ZJ where J is the
time-sharing random variable defined in Section IV-B2. Then,
1
√ (log M1n + log M2n + log Kn )
nδ
1
≥ √ (nI(X; Z) − δ)
(106)
nδ
δ
D(Qαn kQ0 )
nαn
, (107)
−
D(Q1 kQ0 ) −
= √
αn
nαn
nδ
where (107) follows from Lemma 1. Note that the lower
bound (107) depends on the “weight” αn = P̄n (1). Hence,
substituting the smallest “weight” αn = P̄n (1) that attains
L1 /L∗1 + L2 /L∗2 = κ into (107) results in a lower bound
on the required secret key rate to attain the message rate
pair (L1 , L2 ).
3 With a slight abuse of terminology, we will refer to L , L , and L
1
2
key as
rates even though they are not communication rates in the usual sense [9].
11
Now let us denote the smallest αn = P̄n (1) that attains
L1 /L∗1 + L2 /L∗2 = κ by ν ᾱn .4 By a close inspection of the
proof of Theorem 2, we can check that under the constraint
αn = ν ᾱn , the message pairs are bounded by L1 /L∗1 +
L2 /L∗2 ≤ ν. Hence, to achieve L1 /L∗1 + L2 /L∗2 = κ, it should
follow that ν ≥ κ. Indeed, we can see that L1 /L∗1 +L2 /L∗2 = κ
is achievable with weight κᾱn from the direct part above, by
communicating κ fraction of the time and staying idle for the
remaining 1 − κ fraction.
Note that when αn = κᾱn , it follows from (28) that
D(Qαn kQ0 )
δ
= 0 and lim
= 0.
n→∞
n→∞ nαn
αn
Then, by combining (107)–(108), we have
lim
1
lim inf √ (log M1n + log M2n + log Kn )
n→∞
nδ
s
2D(Q1 kQ0 )2
= κL∗Z .
≥κ
χ2 (Q1 kQ0 )
(108)
AND
A PPENDIX A
P ROOF OF L EMMA 2
Proof: We will only prove (34) and (36) as the other two
bounds follow by swapping indices 1 with 2 and vice versa.
In addition, in this proof, we include the effect of the secret
key S. By Fano’s inequality,
H(Wj |Yjn , S) ≤ εn log Mjn + 1,
j ∈ {1, 2}.
(110)
Because W1 and W2 are uniform and independent of each
other and of S, we have
(log M1n )(1 − εn ) − 1 ≤ I(W1 ; Y1n |S)
(109)
Since κ = L1 /L∗1 + L2 /L∗2 , (109) immediately implies a
matching converse to (20).
VII. C ONCLUSION
BCs with feedback [31] but it does for other classes of
BCs. The natural question is whether feedback enlarges
the covert capacity region for various classes of BCs.
F UTURE W ORK
In this paper, we established the covert capacity region for
all two-user discrete and Gaussian memoryless BCs. Somewhat surprisingly, the most basic multi-user communication
strategy—time-division transmission—turns out to be optimal.
Our proof strategy provides further evidence that the concave
envelope characterization of bounds on capacity regions in
network information theory [18] is convenient and useful.
There are at least three promising avenues for future work.
1) Can we establish the strong converse property for BCs
under a covert communication requirement? We conjecture that Lε,δ (Definition 2) for all ε ∈ [0, 1) is
given by the time-division region given by (12) in Theorem 2. However, existing strong converse techniques for
BCs [23], [27]–[30] are not directly applicable. This is
because throughputs
in covert communications typically
√
scale as Θ( n) instead of being √
linear in n, so the
remainder terms (which scale as O( n) in state-of-theart results [29], [30]) resulting from the usual strong
converse techniques are not negligible. Note though
that the remainder terms in existing results are derived
without the covert communication requirement so it is
likely that they can be strengthened under this scenario.
2) What is the covert capacity region for BCs where
there are more than two legitimate receivers? While
Corollaries 1 and 2 hold for an arbitrary number of
legitimate receivers (see (17)), Theorem 2 does not seem
to generalize easily. At the very least, can we do the
same for all successively degraded BCs [9, Sec. 5.7]?
3) What is the covert capacity region for two-user BCs with
feedback? Unfortunately, the bound in Lemma 2 does
not hold for BCs with feedback. We note that feedback
does not enlarge the usual capacity region for degraded
4 We omit mulitplying ᾱ by the factor 1 + o(1) as this is inconsequential
n
in the (asymptotic) arguments that follows.
(log M1n + log M2n )(1 − εn ) − 2
(111)
≤ I(W1 ; Y1n |W2 , S)
+ I(W2 ; Y2n |S). (112)
We start by single letterizing (111) as follows:
(log M1n )(1 − εn ) − 1
n
X
I(W1 ; Y1i |Y1i−1 , S)
≤
≤
=
i=1
n
X
i=1
n
X
(113)
n
I(W1 , S, Y1i−1 , Y2,i+1
; Y1i )
(114)
I(U1i ; Y1i ),
(115)
i=1
where (115) follows from the identification U1i :=
n
(W1 , S, Y1i−1 , Y2,i+1
). This proves (34).
Next we single letterize (112) using the steps at the top
of the next page, where (120) follows from the Csiszár-sumn
identity [9] and the identification U2i := (W2 , S, Y1,i+1
, Y2i−1 )
and (121) follows from the fact that Xi is a function of
(W1 , W2 , S). This proves (36).
Acknowledgements
The authors thank Dr. Ligong Wang (ETIS—Université
Paris Seine, Université de Cergy-Pontoise, ENSEA, CNRS)
for helpful discussions in the initial phase of this work and
for pointing us to [16]. The first author also thanks Dr. Lei Yu
(NUS) for fruitful discussions on the relation of the present
work to stealth [26].
R EFERENCES
[1] B. A. Bash, D. Goekel, and D. Towsley. Limits of reliable communication with low probability of detection on AWGN channels. IEEE
Journal on Selected Areas in Communications, 31(9):1921–1930, Sep
2013.
[2] B. A. Bash, A. H. Gheorghe, M. Patel, J. L. Habif, D. Goeckel,
D. Towsley, and S. Guha. Quantum-secure covert communication on
bosonic channels. Nature Commun., 6:8626, Oct 2015.
[3] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha. Hiding information
in noise: Fundamental limits of covert wireless communication. IEEE
Communications Magazine, 53(12):26–31, Dec 2015.
[4] P. H. Che, M. Bakshi, and S. Jaggi. Reliable deniable communication:
Hiding messages in noise. In Proc. of the Intl. Symp. on Inform. Th.,
pages 2945–2949, Istanbul, Turkey, Jul 2013.
12
(log M1n + log M2n )(1 − εn ) − 2
n
X
n
, S) + I(W2 ; Y2i |Y2i−1 , S)
I(W1 ; Y1i |W2 , Y1,i+1
≤
≤
=
=
i=1
n
X
i=1
n
X
i=1
n
X
i=1
n
I(W1 , Y2i−1 ; Y1i |W2 , S, Y1,i+1
) + I(W2 , S, Y2i−1 ; Y2i )
(117)
n
n
n
I(W1 , Y2i−1 ; Y1i |W2 , S, Y1,i+1
) + I(W2 , S, Y1,i+1
, Y2i−1 ; Y2i ) − I(Y1,i+1
; Y2i |W2 , S, Y2i−1 )
(118)
n
n
I(W1 ; Y1i |W2 , S, Y1,i+1
, Y2i−1 ) + I(Y2i−1 ; Y1i |W2 , S, Y1,i+1
)
n
n
+ I(W2 , S, Y1,i+1
, Y2i−1 ; Y2i ) − I(Y1,i+1
; Y2i |W2 , S, Y2i−1 )
n
X
I(W1 ; Y1i |U2i ) + I(U2i ; Y2i )
=
≤
i=1
n
X
i=1
(116)
I(Xi ; Y1i |U2i ) + I(U2i ; Y2i ),
[5] P. H. Che, M. Bakshi, C. Chan, and S. Jaggi. Reliable deniable
communication with channel uncertainty. In Proc. of the Inform. Th.
Workshop, pages 30–34, Hobart, Australia, Nov 2014.
[6] S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walkenhorst. Achieving
undetectable communication. IEEE Journal of Selected Topics in Signal
Processing, 9(7):1195–1205, Oct 2015.
[7] M. R. Bloch. Covert communication over noisy channels: A resolvability
perspective. IEEE Trans. on Inform. Th., 62(5):2334–2354, 2016.
[8] L. Wang, G. W. Wornell, and L. Zheng. Fundamental limits of
communication with low probability of detection. IEEE Trans. on
Inform. Th., 62(6):3493–3503, 2016.
[9] A. El Gamal and Y.-H. Kim. Network Information Theory. Cambridge
University Press, Cambridge, U.K., 2012.
[10] M. Tahmasbi and M. R. Bloch. Second-order asymptotics of covert
communications over noisy channels. In Proc. of the Intl. Symp. on
Inform. Th., pages 2224–2228, Barcelona, Spain, Jul 2016.
[11] M. Tahmasbi, M. R. Bloch, and V. Y. F. Tan. Error exponent for covert
communications over discrete memoryless channels. In Proc. of the
Inform. Th. Workshop, Kaohsiung, Taiwan, Nov 2017.
[12] S.-H. Lee, L. Wang, A. Khisti, and G. W. Wornell. Covert communication with noncausal channel-state information at the transmitter. In Proc.
of the Intl. Symp. on Inform. Th., pages 2830–2834, Aachen, Germany,
Jun 2017.
[13] L. Wang. Optimal throughput for covert communication over a classicalquantum channel. In Proc. of the Inform. Th. Workshop, pages 364–368,
Cambridge, UK, Sep 2016.
[14] K. S. K. Arumugam and M. R. Bloch. Keyless covert communication
over multiple-access channels. In Proc. of the Intl. Symp. on Inform.
Th., pages 2229–2233, Barcelona, Spain, Jul 2016.
[15] K. S. K. Arumugam and M. R. Bloch. Covert communication over
broadcast channels. In Proc. of the Inform. Th. Workshop, Kaohsiung,
Taiwan, Nov 2017.
[16] A. Lapidoth, E. Telatar, and R. Urbanke. On wide-band broadcast
channels. IEEE Trans. on Inform. Th., 49(12):3250–3258, Dec 2003.
[17] A. El Gamal. The capacity of a class of broadcast channels. IEEE
Trans. on Inform. Th., 25(2):166–169, 1979.
[18] C. Nair. Upper concave envelopes and auxiliary random variables.
International Journal of Advances in Engineering Sciences and Applied
Mathematics, 5(1):12–20, 2013.
[19] A. Wyner and J. Ziv. A theorem on the entropy of certain binary
sequences and applications–I. IEEE Trans. on Inform. Th., 19(6):769–
772, 1973.
[20] C. E. Shannon. A mathematical theory of communication. The Bell
Systems Technical Journal, 27:379–423, 1948.
[21] A. J. Stam. Some inequalities satisfied by the quantities of information
of Fisher and Shannon. Information and Control, 2:101–112, Jun 1959.
(119)
(120)
(121)
[22] T. Cover. Broadcast channels. IEEE Trans. on Inform. Th., 18(1):2–14,
1972.
[23] I. Csiszár and J. Körner. Information Theory: Coding Theorems for
Discrete Memoryless Systems. Cambridge University Press, 2011.
[24] E. L. Lehmann and J. P. Romano. Testing Statistical Hypotheses.
Springer-Verlag, New York, NY, 2005.
[25] R. G. Gallager. Capacity and coding for degraded broadcast channels.
Problems of Information Transmission, 10(3):3–14, 1974.
[26] J. Hou. Coding for relay networks and effective secrecy for wiretap
channels. PhD thesis, Technische Univ. München, Munich, Germany,
2014.
[27] M. Raginsky and I. Sason. Concentration of measure inequalities
in information theory, communications and coding. Foundations and
Trends ® in Communications and Information Theory, 10(1–2):1–247,
2013.
[28] Y. Oohama. New strong converse for asymmetric broadcast channels.
arXiv, 2016. arXiv:1604.02901.
[29] S. L. Fong and V. Y. F. Tan. A proof of the strong converse theorem
for Gaussian broadcast channels via the Gaussian Poincaré inequality.
IEEE Trans. on Inform. Th., 63(12), Dec 2017.
[30] J. Liu, R. van Handel, and S. Verdú. Beyond the blowing-up lemma:
Sharp converses via reverse hypercontractivity. In Proc. of the Intl.
Symp. on Inform. Th., pages 943–947, Aachen, Germany, Jun 2017.
[31] A. El Gamal. The feedback capacity of degraded broadcast channels
(corresp.). IEEE Trans. on Inform. Th., 24(3):379–381, 1978.
| 7cs.IT
|
This is a post-print of the original paper published in Pattern Recognition Letters DOI:10.1016/j.patrec.2017.10.024.
Facial Attributes: Accuracy and Adversarial Robustness
Andras Rozsa∗∗, Manuel Günther, Ethan M. Rudd, Terrance E. Boult
arXiv:1801.02480v1 [cs.CV] 4 Jan 2018
University of Colorado Colorado Springs, Vision and Security Technology (VAST) Lab, 1420 Austin Bluffs Parkway, Colorado Springs, CO 80918, USA
ABSTRACT
Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images
in order to be usable in stand-alone systems. While recent methods extract facial attributes using
deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute
representations has not been evaluated. In this paper, we examine the representational stability of
several approaches that recently advanced the state of the art on the CelebA benchmark by generating adversarial examples formed by adding small, non-random perturbations to inputs yielding altered
classifications. We show that our fast flipping attribute (FFA) technique generates more adversarial examples than traditional algorithms, and that the adversarial robustness of DNNs varies highly between
facial attributes. We also test the correlation of facial attributes and find that only for related attributes
do the formed adversarial perturbations change the classification of others. Finally, we introduce the
concept of natural adversarial samples, i.e., misclassified images where predictions can be corrected
via small perturbations. We demonstrate that natural adversarial samples commonly occur and show
that many of these images remain misclassified even with additional training epochs, even though their
correct classification may require only a small adjustment to network parameters.
c 2018 Elsevier Ltd. All rights reserved.
1. Introduction
Recent approaches to facial attribute classification have
yielded impressive performance gains by leveraging powerful
deep learning models. These approaches generally fall into two
categories. While researchers like Liu et al. (2015) attempt
to extract a generic face representation across large amounts
of face data and then train shallower classifiers for attribute
prediction, Rudd et al. (2016) optimize over attribute data directly. Rudd et al. (2016) demonstrated that the latter approach
achieves superior performance, despite using smaller quantities
of data. Thus, we examine the latter approach in this paper as it
is more readily applicable to real-world tasks.
While optimizing an end-to-end network for attribute classification yields exceptional performance, recent research
(Szegedy et al., 2014; Goodfellow et al., 2015) raises the question: Does using pure end-to-end deep networks – i.e., not simply as feature extractors but as attribute classifiers themselves
– induce a risk of non-robust attribute representations for realworld applications? Specifically, Szegedy et al. (2014) discovered that deep neural networks are susceptible to carefully chosen perturbations of even a few pixels. By adding such perturbations – that can be imperceptible to humans – to the original
images, the resulting adversarial images become misclassified,
Facial attributes have several interesting properties from a
recognition perspective. First, they are semantically meaningful to humans which offers a level of interpretation beyond that
achieved by most conventional recognition algorithms. This allows for novel applications, including descriptive searches, e.g.,
“Caucasian female with blond hair” (Kumar et al., 2008, 2011;
Scheirer et al., 2012), verification systems (Kumar et al., 2009),
facial ordering (Parikh and Grauman, 2011), and social sentiment analysis (Zhang et al., 2015). Second, they provide information that is more or less independent of that distilled by conventional recognition algorithms, potentially allowing for the
creation of more accurate and robust systems, narrowing down
the search space, and increasing efficiency at match time. Finally, facial attributes are interesting due to their ability to convey meaningful identity information about a previously unseen
face, e.g., not enrolled in a gallery or used to train a classifier.
∗∗ Corresponding
author
e-mail: [email protected] (Andras Rozsa)
1
2
+
=
=
(a) Natural Adversarial: female → male via line-search FFA (0.999)
+
=
=
(c) Natural Adversarial: female → male via iterative FFA (0.999)
+
=
(b) Adversarial: wearing lipstick → no lipstick via line-search FFA (0.997)
+
=
(d) Adversarial: wearing lipstick → no lipstick via iterative FFA (0.998)
Fig. 1: A DVERSARIAL E XAMPLES BY ATTRIBUTE F LIPPING. This paper demonstrates the problem of natural adversarial samples and how to
generate adversarial examples for binary attributes by the novel fast flipping attribute (FFA) technique. Adversarial examples are formed by adding
small, non-random perturbations to original inputs; while the modifications can remain imperceptible to human observers, vulnerable machine
learning models classify the original and adversarial examples differently. In (a), we display a natural adversarial man (misclassified as a woman)
that is “corrected” by an imperceptible perturbation formed via line-search on our separate attribute network. In (b), we show a correctly classified
young person flipped to “old” using FFA with line-search on the mixed objective optimization network (MOON) (Rudd et al., 2016). With the
computationally more expensive iterative FFA, in general, we can further improve the quality of the formed adversarial examples as shown in
(c) and (d), where the higher perceptual adversarial similarity scores (PASS) (Rozsa et al., 2016b) displayed in sub-captions indicate increased
structural similarities between the original and perturbed image pairs. Due to attribute correlations learned by MOON, the perturbations formed
by the two versions of FFA that alter the classification of “wearing lipstick” also change the classifications of “attractive” and “heavy makeup”
attributes to be absent. Perturbations in the middle are magnified by a factor of 10 to enhance visibility, where gray pixels indicate no change.
even with high confidence.
Research on adversarial images has been conducted since,
and these images can be easily generated independently from
the dataset, network topology, training regime, hyperparameter
choice, and activation type. In our experiments, we attempt to
generate adversarial images over a random subset of the CelebA
dataset (Liu et al., 2015) using the fast gradient sign (FGS)
method (Goodfellow et al., 2015) and our novel fast flipping
attribute (FFA) algorithm that efficiently leverages the backpropagation of a Euclidean loss defined on classification scorevectors of input images without requiring ground-truth labels.
We find that classifications for some attributes are difficult to
change with both FGS and FFA, and that the number of adversarial images does not decrease during training.
To date, adversarial images have been presented as inputs
with the presence of slight artificial perturbations where the
original input is correctly classified and the adversarial input
is misclassified. In this paper, we pose the reverse question: Do
there exist misclassified inputs on which we can induce small
artificial perturbations to correct the classification? or Do adversarial images naturally occur? We find that the answer is
yes, there are images in the training set which, even after they
were used for training, are misclassified by a given facial attribute network but can be flipped to the proper classification
via an imperceptible perturbation. Further, we find that even
with additional training, many of these natural adversarial samples are not learned by the networks. One might think correctly
learning these natural adversarial samples requires only a minor
adjustment to the network parameters, but it seems that proximity in image space does not mean proximity in feature space.
In Fig. 1, we show adversarial images that occurred in our
experiments conducted on the separate attribute networks and
the mixed objective optimization network (MOON) (Rudd et al.,
2016). As shown in Figs. 1(a) and (c), a natural adversarial image of a man (left) is misclassified as a woman on our separate
attribute network, and a small perturbation (center) applied to
the image (right) would correct the classification. Figs. 1(b)
and (d) contain a woman correctly classified as wearing lipstick (left) that is turned into a person with no lipstick (right)
on MOON by adding a small perturbation (center). Interestingly, the same perturbations also change the classification of
the person to non-attractive and to not wearing heavy makeup,
indicating that those attributes might be learned by MOON as
correlated. Note that the real perturbations are much smaller
than shown in Fig. 1, and we magnified the pixel changes by a
factor of 10 for better visualization. Since perturbations can be
positive and negative, gray pixels correspond to no change.
The contributions of this paper are as follows:
• We show that end-to-end DNNs provide excellent performance in facial attribute classification.
3
• We generate adversarial images on our separate facial attribute networks at two training epochs and after they converged. We find that these networks attain no additional
robustness to adversarial images with longer training.
• We introduce the notion of natural adversarial images and
analyze their prevalence using our data and networks. We
find that the frequency of naturally occurring adversarial
images is quite large, accounting for nearly 73 % of the
training set images that are incorrectly classified by our
separate facial attribute networks.
• We present two variants of the fast flipping attribute (FFA)
algorithm for adversarial image generation and demonstrate their capabilities of flipping attribute classifications.
• We analyze a multi-objective attribute representation and
examine the correlations between facial attributes by generating adversarial examples.
2. Attribute Classification
The automatic classification of facial attributes was pioneered by Kumar et al. (2009). Their classifiers depended heavily on face alignment, and each attribute used combinations of
features from hand-picked facial regions, e.g., cheeks, mouth,
etc. The feature spaces consisted of various normalizations and
aggregations of color spaces and image gradients. Different
features were selected for each attribute, and one RBF-SVM
per attribute was independently trained for classification.
More recent approaches leverage deep neural networks
(DNNs) to extract features. Many use a generic deep feature
space representation obtained by training for other face processing tasks. For example, Liu et al. (2015) utilized three DNNs –
a combination of two localization networks (LNets) and an attribute recognition network (ANet) – to first localize faces and
then extract facial attributes. The ANet is initially trained on
external data to identify people and then fine-tuned using all
attributes to extract features that are fed into independent linear SVMs for the final attribute classification. Similarly, Wang
et al. (2016) used an external dataset that they collected inside
different areas of New York City. Using weather and estimated
ethnicity information to automatically predict attributes, such
as skin color or the presence of sunglasses or scarfs, they pretrained a DNN to extract features. Again, attribute classification
was performed using one linear SVM per attribute.
Both Rozsa et al. (2016a) and Rudd et al. (2016) found that
optimizing directly over facial attribute data yields superior performance, even when using a much smaller training set. Recently, Kalayeh et al. (2017) showed that semantic segmentation further improves attribute classification accuracy. Their
8.20 % overall classification error presents the current state of
the art on the CelebA dataset. In this paper, we analyze two approaches that leverage attribute data directly: one in which we
train a separate deep network for each attribute (Rozsa et al.,
2016a), and another in which we optimize across all attribute
labels in a multi-objective loss function (Rudd et al., 2016).
2.1. Network Classification
For our separate attribute classifiers (Rozsa et al., 2016a), we
adopted the 16-layer VGG network topology of Parkhi et al.
(2015), with two modifications. First, we altered the dimension of the RGB image input layer from 224 × 224 pixels to
178 × 218 pixels which is the resolution of the aligned CelebA
images. Second, we replaced the final softmax loss with Euclidean loss on the label. We chose Euclidean loss – opposed to
softmax, sigmoid, or hinge loss – because attributes lie along a
continuous range while sigmoids tend to enforce saturation and
hinge-loss enforces a large margin, neither of which is consistent with our intuition.
To disambiguate between tensors/matrices, vectors, and
scalars, let v denote a tensor or matrix, ~v denote a vector and
v denote a scalar for an arbitrary variable v. For an image x
with label y ∈ {−1, +1} indicating the absence or presence of an
attribute, respectively, let f (x) be the DNN classification decision. Then the Euclidean loss J is:
2
J(θθ , x, y) = f (x) − y ,
(1)
where θ represents the parameters of the DNN model.
To maintain comparability with other research reporting on
the same dataset, and since the dataset only contains binary attribute labels, we decided to apply a classification function to
the network output that was trained with Euclidean loss. For an
input x, the classification result c(x) and its corresponding error
e(x, y) are obtained by thresholding f (x) at 0:
+1 if f (x) > 0
0 if y · c(x) > 0
c(x) =
e(x,
y)
=
(2)
−1 otherwise,
1 otherwise.
The classification error over the whole dataset X of N images
with attribute labels Y is then given by:
E(X, Y) =
N
1 X
e(Xn , Yn ) .
N n=1
(3)
A more pragmatic approach in terms of storage and processing costs can be obtained by optimizing over all labels simultaneously, under one mixed objective optimization network
(MOON) (Rudd et al., 2016). Given an image x, with a vector
of M attribute labels, ~y, the per-sample loss is given by:
J(θθ , x, ~y) =
M
X
2
fi (x) − ~yi .
(4)
i=1
By close analogy to (3), the classification error across the
dataset with matrix Y of multi-attribute labels is given by:
E(X, Y) =
N M
1 XX
e(Xn , Yni ) .
N n=1 i=1
(5)
2.2. Dataset
For our experiments, we use the publicly available CelebA
dataset (Liu et al., 2015). CelebA consists of more than 200k
images showing faces in a variety of different facial expressions, occlusions and illuminations, and poses from frontal to
full profile. Approximately 160k images are used for training,
and the remaining 40k images are equally split up into validation and test sets. Each image is annotated with binary labels of
40 facial attributes. We conducted our evaluation using the set
of pre-cropped face images included in the dataset which are
aligned using hand-annotated facial landmarks.
60
Trivial
Face Tracer
LNets+ANet
MOON
Separate
50
40
30
20
10
Average
0
Big Lips
Oval Face
Pointy Nose
Wavy Hair
Attractive
Straight Hair
Arched Eyebrows
Big Nose
Bags Under Eyes
Wearing Necklace
High Cheekbones
Narrow Eyes
Young
Brown Hair
Black Hair
Wearing Earrings
Heavy Makeup
Bushy Eyebrows
Smiling
Wearing Lipstick
Receding Hairline
5 o Clock Shadow
Mouth Slightly Open
Rosy Cheeks
Chubby
No Beard
Bangs
Blond Hair
Blurry
Double Chin
Mustache
Wearing Necktie
Pale Skin
Goatee
Male
Sideburns
Gray Hair
Bald
Wearing Hat
Eyeglasses
Classification Error on CelebA in %
4
Fig. 2: ATTRIBUTE C LASSIFICATION E RROR ON C ELEBA. This figure shows the classification errors on the test set of the CelebA dataset for
our separate networks and MOON compared to three other algorithms, sorted based on the result of the separate networks. The Trivial approach
assigns each attribute to the majority class of the training set. The results of FaceTracer and LNets+ANet are taken from Liu et al. (2015) and
results of MOON from Rudd et al. (2016).
2.3. Experiments
We conducted a comparison of our separate per-attribute neural networks with other attribute algorithms on the previously
described CelebA dataset. Due to memory limitations, we set
the training batch size to 64 images per iteration. Thus, the
training requires approximately 2,500 iterations to run a full
epoch on the training set. In opposition to Parkhi et al. (2015),
we did not incorporate any dataset augmentation or mirroring;
we trained networks purely on the aligned images. We selected
a learning rate of 10−5 . During training, we updated DNN
weights using an RMSProp update rule with an inverse learning
rate decay policy. Using the GPU implementation of Caffe (Jia
et al., 2014), we trained all 40 networks until convergence on
the validation set which occurred between two and ten epochs
depending on the attribute.
A comparison of our results on the CelebA test set with the
original FaceTracer approach by Kumar et al. (2009) as well
as the LNets+ANet approach of Liu et al. (2015) is shown in
Fig. 2. Although Kalayeh et al. (2017) presented the current
state of the art in attribute classification on CelebA, they did
not provide detailed information about single attributes and are,
hence, left out of Fig. 2. Due to the highly biased distributions
of attribute labels in the CelebA dataset, we also included a
Trivial algorithm that simply predicts the class with the higher
occurrence in the training set. For some attributes, such as
Attractive or Male (which are approximately balanced in the
test set), the Trivial classifier obtains high errors, while for attributes like Narrow Eyes or Double Chin, the Trivial classifier even outperforms the generic feature space approaches, i.e.,
FaceTracer and LNets+ANet. Only our separate networks and
MOON outperform the Trivial approach for all attributes.
Our approach using separate DNNs yields a mean classification error of 9.20 %, a relative improvement of 27 % over
LNets+ANet (12.70 % classification error) and 51 % improvement over FaceTracer (18.88 % classification error). While our
result does not reach the 8.20 % error of Kalayeh et al. (2017), it
is statistically not significantly worse than the 9.06 % of MOON
(Rudd et al., 2016). Interestingly, we are “only” 54 % better in
terms of relative improvement than the Trivial system achieving
19.96 % mean classification error. For certain attributes, especially those not related to face identity, e.g., Wearing Necklace,
Wearing Earrings, or Blurry our approach yields dramatic gains
over the generic feature space approaches. LNets+ANet outperforms our separate networks on a few attributes but never by
more than a percentage point in classification error.
3. Adversarial Images for Attributes
An adversarial image is an image that looks very close to
(and is generally indistinguishable from) the original image
from the perspective of a human observer, but differs dramatically in classification by a machine-learned classifier. Multiple
techniques have been proposed to create adversarial examples.
The first reliable technique of Szegedy et al. (2014) used a boxconstrained optimization (L-BFGS) algorithm. Starting with a
randomly chosen modification, it aims to find the smallest perturbation in the input space that causes the perturbed image to
be classified as a predefined target label. Baluja et al. (2015)
proposed generating affine perturbations, applying them to input samples, and then observing how models respond to these
perturbed images. While, from an adversarial perspective, this
approach has the advantage of not requiring knowledge of internal network representations, it relies on “guess and check”, i.e.,
it creates random perturbations and determines if the results are
misclassified which can be prohibitively expensive.
Goodfellow et al. (2015) introduced a more efficient algorithm to form adversarial perturbations. Their fast gradient sign
(FGS) method creates perturbations by using the sign of the gradient of loss with respect to the input. FGS is computationally
5
efficient as it requires only one gradient being effectively calculated via backpropagation, while L-BFGS needs multiple. Experiments demonstrate that FGS reliably causes a wide variety
of learning models to misclassify their perturbed inputs, including shallow models, but deep networks are especially susceptible (Goodfellow et al., 2015). Note that FGS is based directly
upon network information, namely the gradient of loss.
Although the definition of adversarial example varies
(Szegedy et al., 2014; Goodfellow et al., 2015; Baluja et al.,
2015), at their core, adversarial examples are modified inputs
formed by imperceptible non-random perturbations that are
misclassified by machine learning models. Hence, humans
should not perceive differences between adversarial and original inputs. To formalize the definition, let x be an input image
correctly classified as y. An adversarial perturbation η is given
if the perturbed image x̃ = x + η is not classified as y:
f (x) = y
and
f (x̃) , y.
(6)
This is a necessary but not sufficient condition as the modification needs to be imperceptible. Various measures such as L1 ,
L2 , or L∞ distances have been used to show how close the perturbed images are to their originals. However, these measures
are not well matched to human perception (Sabour et al., 2016)
as they are very sensitive to even small geometric distortions
that may still result in plausible images. Instead, we seek a
measure of similarity in a psychophysical sense. The perceptual adversarial similarity score (PASS) (Rozsa et al., 2016b)
measures similarity S (x̃, x) based on structural photometricinvariant differences, by first performing a homography alignment to maximize the enhanced correlation coefficient (ECC)
(Evangelidis and Psarakis, 2008) between the perturbed image
and the original, then computing the structural similarity index (SSIM) (Flynn et al., 2013) between the aligned images.
The homography transform removes differences due to plausible translations and rotations, while SSIM measures structural differences not stemming from perturbations that appear
as plausible photometric differences. We believe that the resultant PASS is a suitable measure of the degree to which an image
is adversarial. Consistent with Flynn et al. (2013), we adopt the
PASS threshold τ = 0.95 as a cutoff for adversarial.
3.1. Adversarial Image Generation
We explore two approaches for generating the necessary perturbations η . Goodfellow et al. (2015) introduced FGS to find
adversarial perturbations. Given a DNN with parameters θ and
an image x, FGS searches for perturbations that cause mislabeling using the sign of the gradient of loss:
η fgs = sign ∇x J(θθ , x, y) .
(7)
FGS takes steps in the direction that is defined by the gradient
of loss in order to cause mislabeling. This requires knowledge
of the label y of the image x. We introduce a novel approach –
the fast flipping attribute (FFA) algorithm – that directly relies
on the classification scores. By defining a target score-vector
~ti (x) that zeros out the attribute in question and leaving others
unchanged (if any), a Euclidean loss can be employed to move
f (x) towards this target and, eventually, alter the classification
of the particular facial attribute. In general, ~ti (x) can be formalized as:
0
if j = i
~ti (x) =
(8)
f j (x) otherwise.
In order to form adversarial perturbations, we use a Euclidean
loss between ~ti (x) and the network prediction and apply its gradient with respect to the input image x. Formally:
!
2
1
~ti (x) − f (x)
(9)
η ffa = ∇x
2
can be obtained by using the gradient of the Euclidean loss calculated via backpropagation. For separate attribute networks
trained with Euclidean loss, f (x) consists of a single value and,
thus, the formed ~ti (x) has one element (which is zero). For
MOON, the formed score-vector ~ti (x) contains one zero element for the particular attribute that we aim to alter.
By using FGS or FFA, we can obtain directions that define
varying perturbations η with respect to a given input image x.
To effectively search for the smallest perturbations that cause
classification errors along those directions, we apply a linesearch technique with increasing step sizes to reach the weight
in (7) and (9) that causes mislabeling. By doubling the step
size after each step, those directions can be quickly discovered.
When the line-search oversteps and the classification of the perturbed example changes, we apply a binary search within the
latest section of the line-search to find the smallest possible adversarial perturbation. Due to these enhancements, adversarial
generation with FFA and FGS approaches achieve comparable
computational efficiency.
Alternatively, to form higher quality adversarial examples
both FGS (Kurakin et al., 2017) and FFA can be used iteratively – with an increased computational cost. Instead of calculating gradients once, iterative approaches take a small step
with L∞ = 1 to form a temporary image, recalculate the applicable loss and its gradient with respect to that image, and update it until the classification of the desired attribute is flipped.
While the generated adversarial images have rounded discrete
pixel values in range [0, 255], iterative FFA temporarily utilizes
non-discrete pixel values in order to obtain better adversarial
quality. Due to the nature of using the sign in (7), iterative FGS
only operates on discrete pixel values.
3.2. Natural Adversarial Images
As of today, adversarial images have been artificially generated via a computational process, but no one – to our knowledge – has yet addressed whether adversarial examples occur
among natural images: Are there misclassified images for which
imperceptible perturbations to inputs yield correct classifications? We seek to explore how often adversarial images naturally occur. Thus, we formalize the novel concept of natural
adversarial images. Let x0 be an incorrectly classified image
with ground-truth label y. Then x0 is a natural adversarial image if there exists a perturbation η0 such that perturbed image
x̃0 = x0 + η0 is correctly classified as y:
f (x0 ) , y
and
f (x̃0 ) = y,
(10)
Line-Search Flippability in %
6
100
80
60
40
20
0
FGS+
FFA+
MFFA+
FGS−
FFA−
MFFA−
FGS+
FFA+
MFFA+
FGS−
FFA−
MFFA−
80
60
40
20
Pointy Nose
Big Nose
Attractive
Bags Under Eyes
Straight Hair
Arched Eyebrows
Young
Oval Face
High Cheekbones
Heavy Makeup
Smiling
Big Lips
No Beard
5 o Clock Shadow
Mouth Slightly Open
Rosy Cheeks
Bangs
Narrow Eyes
Sideburns
Goatee
Blurry
Chubby
Bushy Eyebrows
Blond Hair
Mustache
Receding Hairline
Wearing Lipstick
Male
Double Chin
Brown Hair
Gray Hair
Black Hair
Bald
Eyeglasses
Pale Skin
Wearing Necktie
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Necklace
0
Average
Iterative Flippability in %
100
Fig. 3: A DVERSARIAL S UCCESS. This figure shows the success rates of adversarial example generation techniques for adversarial examples
(correctly classified images, + ) and natural adversarial samples (incorrectly classified images, − ) generated on the converged networks trained with
Euclidean loss using FGS and FFA, and on MOON using FFA (denoted as MFFA), using PASS threshold τ = 0.95. Results of these techniques
utilizing line-search (top) and the iterative approach (bottom) are sorted by the success rate of FGS+ examples formed via line-search, and are
based on 1,000 images randomly selected from the CelebA training set.
under the premise that S(x̃0 , x0 ) ≥ τ. Hence, a natural adversarial sample is a misclassified image whose prediction can be
corrected by an imperceptible modification. Interestingly, the
same processes used to generate adversarial images can be used
to analyze if a misclassified input is a natural adversarial.
3.3. Experiments
To test and compare adversarial example generation with
FGS and FFA, we randomly selected 1,000 images of the
CelebA training set and performed experiments trying to flip
facial attribute classifications. For the separate attribute networks, we used FGS and FFA both via line-search and iteratively. As FGS simply increases the loss until misclassification
occurs, it cannot be used to flip an arbitrarily selected attribute
on MOON. Therefore, we only utilized FFA on MOON.
For each attribute and for both the correctly and incorrectly
classified images, we counted the number of times in which an
adversarial image could be created, i.e., where an η exists for
which S(x, x + η ) ≥ τ with τ = 0.95, for an η generated by either of the two algorithms. The per-attribute results can be obtained in Fig. 3. Interestingly, for some attributes, such as Big
Nose or Young, most input images can be turned adversarial,
while for others like Wavy Hair or Wearing Necklace, adversarial samples cannot be formed at all on the separate attribute
networks. Even more astonishingly, incorrectly classified images can be corrected by small perturbations more frequently
than altering the predictions for correctly classified images via
adversarial perturbations. Also, the number of adversarial examples generated using FFA is generally higher than for FGS,
while almost all images that spawned FGS adversarial examples also spawned FFA adversarial examples.
Interestingly, on MOON we could generate adversarial images for almost all attributes, cf. MFFA in Fig. 3. Particularly,
the number of natural adversarial examples that we could form
on MOON – for both versions of FFA (line-search and iterative) – is generally high with an average rate of more than 90 %.
This indicates that for most of the misclassified training images,
adding an imperceptible perturbation will correct their classification. On the other hand, the number of adversarial examples
generated on the correctly classified images is lower.
To better compare the robustness of the separate attribute networks and MOON to FGS or FFA techniques, we also collected
the proportion of images we were able to generate on these networks that alter attribute classifications – adversarial examples
with S (x, x + η ) ≥ 0.95 as well as non-adversarial samples with
S (x, x + η ) < 0.95. The results with various adversarial qualities indicated by the different PASS thresholds τ are shown in
the top of Tab. 1. Considering only the separate attribute net-
7
Table 1: FACIAL ATTRIBUTE F LIPPABILITY BY PASS. This table contains the proportions of perturbed images yielding altered classifications
generated via FGS or FFA on the converged separate attribute models – trained with either Euclidean or softmax loss – and on the mixed objective
optimization network (MOON) via FFA (denoted as MFFA). The relative number of adversarial images formed with either the line-search or the
iterative approach, which could be flipped with different PASS thresholds τ, are presented. The last column contains the total number of correctly
classified (algorithms appended with + ) and incorrectly classified (algorithms appended with − ) attributes by the respective DNNs. Adversarial
examples were created for 1,000 original images randomly sampled from the CelebA training set and are identical across all experiments.
Loss
Euclidean
Softmax
Adv. Type
τ=0
Line-Search
τ = 0.9
τ = 0.95
FGS+
FFA+
MFFA+
FGS−
FFA−
MFFA−
FGS+
FFA+
FGS−
FFA−
41.8%
47.2%
55.3%
73.8%
75.0%
95.6%
58.5%
67.0%
91.1%
90.6%
26.5%
38.1%
46.2%
62.5%
73.3%
95.3%
40.6%
59.9%
87.3%
89.4%
23.0%
36.6%
44.0%
59.2%
72.6%
95.0%
32.5%
57.2%
84.1%
89.0%
works, we can see that FFA outperforms FGS in terms of the
sheer number of altered attribute classifications, and with increasing adversarial quality thresholds the difference between
the two techniques widens. For example, while overall 41.8 %
and 47.2 % of the correctly classified attributes can be flipped
using FGS and FFA via line-search, the proportions of adversarial examples (PASS threshold τ = 0.95) among those are
23.0 % and 36.6 %, respectively. Comparing the separate attribute networks with MOON, we can observe that more adversarial examples can be created on the slightly more accurate
MOON, which highlights that accuracy and adversarial robustness are not necessarily correlated. For example, with iterative FFA 59.7 % of the correctly classified facial attributes can
be altered, while on MOON this increases to 73.8 %. These
results also demonstrate that, in general, the computationally
more expensive iterative approach is capable of flipping facial
attribute classifications more frequently and with higher adversarial quality than the more traditional line-search technique.
On MOON, FFA via line-search yields 44.0 % of flipped classifications on the correctly classified facial attributes at τ = 0.95.
While using the iterative approach, we managed to form adversarial perturbations for 73.8 % of the same attributes.
To test how the number of adversarial images changes during
training, for the separate attribute networks we generated adversarial images for the same 1,000 examples on DNNs trained for
two epochs. Intuition would suggest that DNNs are able to learn
adversarial samples that exist at two epochs, and thus the total
number of adversarial images would decrease with additional
training iterations. Especially for natural adversarial images,
i.e., images that were misclassified by DNNs at two epochs for
which imperceptible modifications to those images would correct their predictions, one would assume that further training
would make the networks learn such examples.
The results of these experiments, which are listed in detail in
the top half of Tab. 2, are counter-intuitive. For FGS, the total
number of adversarial images over all attributes that we were
able to create slightly increased from 8,827 to 10,587, while
τ = 0.99
τ=0
Iterative
τ = 0.9
τ = 0.95
11.1%
30.0%
33.5%
45.5%
68.5%
92.0%
12.7%
43.9%
62.2%
84.9%
56.6%
65.7%
84.3%
78.3%
75.4%
94.9%
88.5%
80.5%
96.7%
91.1%
45.8%
63.6%
81.9%
74.2%
75.4%
94.9%
78.5%
80.4%
95.8%
91.0%
40.5%
59.7%
73.8%
70.1%
75.3%
94.6%
67.5%
78.4%
94.8%
90.7%
τ = 0.99
Total
18.3%
47.0%
49.9%
53.0%
73.5%
92.7%
21.9%
64.8%
73.1%
89.9%
36210
36210
37288
3790
3790
2712
37108
37108
2892
2892
more than half of the images (5,884) were in both sets (which
includes images that were misclassified before and now classified correctly and vice versa). For FFA, the numbers for DNNs
at two epochs and after convergence are similar, and for most
vulnerable input images we could create adversarial samples on
both the converged and unconverged networks.
In general, the total number of incorrectly classified images
for which adversarial samples could be created was consistent
between two epochs and convergence, although at least half of
the original input images differed. This also means that half
of the images for which an imperceptible modification would
have been sufficient to classify them correctly were not corrected with additional training. We found that of the 1,279 images that were natural FFA adversarial samples at two epochs
but are not natural adversarial on the converged networks, the
majority (1,048) were classified correctly by the converged networks. The numbers we obtained for FGS adversarial examples
are similar.
4. Adversarial Portability and Correlation
In this section, we evaluate the portability of adversarial examples generated on the separate attribute networks, and analyze the correlation of facial attributes on MOON.
4.1. Adversarial Portability
It is natural to ask: To what extent do adversarial images
generated on one facial attribute network affect classifications
of other networks? To answer this question, we took the previously generated adversarial examples formed on one of the
separate attribute networks and tested whether these perturbed
images influence the prediction of other attribute networks. The
results are shown in Fig. 4. For these experiments, we report the
average percentage of cross-model portability.
On the left, we present the portability of adversarial samples between the converged networks. Interestingly, most of the
8
Table 2: P ROGRESS OF A DVERSARIAL ROBUSTNESS.
This table
shows the total numbers of FGS and FFA adversarial images generated
with line-search on the separate attribute classification networks at two
epochs and after convergence, trained with either Euclidean or softmax
loss. We show numbers of adversarial examples (correctly classified
images, + ) and natural adversarial samples (incorrectly classified images, − ) over all attributes with τ = 0.95. The overlap represents the
number of images that are sources of adversarial instances both at two
epochs and after convergence. Adversarial examples were created for
1,000 original images randomly sampled from the CelebA training set
and are identical across all experiments.
Loss
Adv. Type
2 Epochs
Converged
Overlap
6393
13621
2434
2918
6833
16371
2385
2844
8345
13268
2242
2753
12047
21218
2431
2573
4616
9881
1268
1639
5896
15259
1315
1721
+
Euclidean
Softmax
FGS
FFA+
FGS−
FFA−
FGS+
FFA+
FGS−
FFA−
perturbations for one attribute do not influence other attributes.
However, for some attributes we can observe higher correlations. For example, 26 % of the adversarial samples for Goatee
also flip No Beard, and adversarial samples created for several
attributes like Chubby, Double Chin, Pale Skin, and Young influence the Attractive attribute. For certain attributes, like Wearing Earrings and Wearing Hat, we were not able to create adversarial samples and, hence, these columns are empty.
On the right of Fig. 4, we report the results of a similar experiment. We checked if the adversarial examples formed on
the two-epoch networks were still adversarial on the converged
networks. On the diagonal, we can see how many adversarial
inputs created on the two epoch networks remained adversarial
on the converged DNNs. Note that the Narrow Eyes network
had already converged after two epochs. On average, more
than 30 % of the adversarial images were not learned by the
networks, i.e., the same small perturbations still changed the
classifications. Notably, the cross-network portability of adversarial samples increased, e.g., around 50 % of the adversarial
images created on the Pale Skin network at two epochs flipped
the classification of the converged Heavy Makeup network.
4.2. Adversarial Correlation
A similar experiment can be conducted on the mixed objective optimization network (MOON). Since MOON is a single
network estimating all attributes simultaneously, this experiment does not test adversarial portability (across networks) but
adversarial correlation. We took adversarial images generated
via FFA for a certain attribute – assuming the PASS threshold
τ = 0.95 as before – and checked which other attributes were
classified differently.
In Fig. 5, we plot the adversarial correlation for MOON using adversarial images generated with FFA both via line-search
and iteratively. Although τ = 0.95 indicates small perturbations, we can observe that flipping one attribute changes the
classifications of other attributes more often than we observed
among separate attribute networks. Astonishingly, adversarial
images generated with iterative FFA, which forms adversarial
examples with much higher quality, flip related attributes more
frequently. For example, the No Beard attribute is flipped with
more than 70 % for adversarial images generated for Goatee,
Mustache, and Sideburns, while this is not true for the opposite direction. Also, when adversarial images are generated for
Blurry, Chubby, Double Chin, Receding Hairline, and Young,
in more than 50 % of the cases, the Attractive attribute changes
as well. Since noses continue to grow as we age or gain weight,
the Big Nose attribute often flips when we generate adversarial
examples for Bald, Chubby, Double Chin, Gray Hair, or Receding Hairline. On the other hand, attributes that do not relate
to other attributes, such as Bald, Blurry, Pale Skin, Wearing
Hat, or Wearing Necktie were not affected by adversarial images generated on any other attribute.
Apparently, due to the simultaneous training of all attributes by MOON, the correlations between attributes have
been learned much better than on separate attribute networks.
5. Euclidean versus Softmax Loss
In Sec. 2, we chose an uncommon loss function – Euclidean
loss – to train our separate facial attribute classification DNNs.
A key rationale for choosing this loss function is from Rudd
et al. (2016), i.e., that we expect that attributes extracted from
DNNs trained with Euclidean loss are better suited for face
recognition. Readers might ask which loss function leads to
better classification performance: Euclidean or softmax? To
answer this question, we trained separate attribute classification networks using softmax loss. Compared to Euclidean loss
networks, DNNs trained with softmax loss yielded a slightly
higher classification error of 9.30 %, which is not statistically
significant (p ≈ 0.09 in a two-sided paired T-test).
To form adversarial examples on the separate attribute networks trained with softmax loss, we apply FGS using (7) and
FFA using (9) via line-search. For FFA, we form the adjusted
score-vector ~ti (x) for (8) on the output of the penultimate layer,
also known as logits, where two scores are calculated for each
input image indicating the presence or absence of the given facial attribute. As the larger value indicates the classification
among the two, we form a score-vector ~ti (x) where we change
the higher score to zero and leave the other unchanged in order
to flip the classification of the input.
When forming adversarial examples, we found that DNNs
trained with softmax loss are more vulnerable. As detailed in
the lower part of Tab. 2, using the same 1,000 examples from
the CelebA training set (cf. Sec. 3) we can generate 16,021
adversarial samples (adversarial and natural adversarial examples over all 40 attributes) using FFA on the converged DNNs
trained with Euclidean loss, and 23,791 using FFA on softmax
loss DNNs. With FGS, these numbers are 10,587 and 14,478,
respectively. Similarly, as shown in the lower part of Tab. 1, we
can see that more adversarial images could be generated for all
PASS thresholds τ and for all adversarial generation techniques.
This is consistent with other research which demonstrates that
100%
5 o Clock Shadow
Adversarial sample created on attribute
100%
Arched Eyebrows
Attractive
Bags Under Eyes
90%
Bald
Bangs
Big Lips
Big Nose
80%
Black Hair
Blond Hair
Blurry
Hair
70%BushyBrown
Eyebrows
Chubby
Double Chin
Eyeglasses
60%
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
50%
Male
Mouth Slightly Open
Mustache
Narrow Eyes
40%
No Beard
Oval Face
Pale Skin
Pointy Nose
30%
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
20% Straight
Hair
Wavy Hair
Wearing Earrings
Wearing Hat
10%Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
0%
90%
80%
70%
60%
50%
40%
30%
20%
10%
5 o Clock Shadow
Arched Eyebrows
Attractive
Bags Under Eyes
Bald
Bangs
Big Lips
Big Nose
Black Hair
Blond Hair
Blurry
Brown Hair
Bushy Eyebrows
Chubby
Double Chin
Eyeglasses
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
Male
Mouth Slightly Open
Mustache
Narrow Eyes
No Beard
Oval Face
Pale Skin
Pointy Nose
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
Straight Hair
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
Adversarial to attribute
5 o Clock Shadow
Arched Eyebrows
Attractive
Bags Under Eyes
Bald
Bangs
Big Lips
Big Nose
Black Hair
Blond Hair
Blurry
Brown Hair
Bushy Eyebrows
Chubby
Double Chin
Eyeglasses
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
Male
Mouth Slightly Open
Mustache
Narrow Eyes
No Beard
Oval Face
Pale Skin
Pointy Nose
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
Straight Hair
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
5 o Clock Shadow
Arched Eyebrows
Attractive
Bags Under Eyes
Bald
Bangs
Big Lips
Big Nose
Black Hair
Blond Hair
Blurry
Brown Hair
Bushy Eyebrows
Chubby
Double Chin
Eyeglasses
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
Male
Mouth Slightly Open
Mustache
Narrow Eyes
No Beard
Oval Face
Pale Skin
Pointy Nose
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
Straight Hair
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
Adversarial to attribute
9
0%
Adversarial sample created on attribute
Fig. 4: A DVERSARIAL P ORTABILITY ACROSS S EPARATE N ETWORKS. This figure shows the portability of adversarial examples across separate
attribute networks. Adversarial examples were created for 1,000 original images randomly sampled from the CelebA training set, which are
identical across all experiments. On the left, FFA adversarial images created on the converged networks of a given attribute are tested on all
converged networks. On the right, FFA adversarial images created on networks after two epochs are tested on the fully converged networks. All
networks were trained using Euclidean loss and adversarial images were generated via FFA using line-search.
DNNs trained with softmax loss are generally vulnerable to adversarial examples.
6. Conclusion
In this paper, we employed a simple and effective method
to train deep neural networks (DNNs) to perform binary facial attribute classification. Experiments on the CelebA dataset
demonstrate a critical advantage in optimizing directly over attribute data. Even with our simple approach using separate attribute networks, we are able to obtain a 9.20 % average classification error, and outperform the generic facial features approach LNets+ANet (12.70 %). This performance gain is statistically significant, resulting in p < 10−28 in a paired T-test.
Added optimizations in terms of more tenable model size and a
statistically non-significant (p ≈ 0.05) performance gain can be
achieved by the multi-objective optimization of MOON (Rudd
et al., 2016), which obtains 9.06 % classification error on the
CelebA benchmark.
We conducted a robustness analysis and introduced the fast
flipping attribute (FFA) algorithm, a fast and effective method
to generate adversarial images by flipping the binary decision
of the DNN. We demonstrated that FFA can create more adversarial examples than the related fast gradient sign (FGS)
method. In comparison to Rozsa et al. (2016a), we extended
the FFA algorithm to be usable for multi-objective networks
such as MOON, and we implemented an iterative extension of
FFA. We showed empirically that iterative FFA generates better
quality adversarial examples and is able to flip attribute predictions more frequently. Nevertheless, there are some attributes
that cannot be flipped on the separately trained DNNs.
We demonstrated that further training epochs do not make
separate attribute DNNs more robust to adversarial images.
Furthermore, most of the natural adversarial images, which
only require small modifications to be correctly classified, are
not corrected with the higher number of training iterations. Particularly for the convolutional layers, this exhibits that highly
localized perturbations cannot easily be balanced by small modifications to convolutional kernels as this would influence the
convolution result globally. Finally, at two epochs DNNs obtained an average classification error of 9.78 % that is statistically significantly (p < 10−10 in a paired T-test) higher than the
9.20 % that we obtained with the converged DNNs.
In order to further improve the overall performance of our
networks, future work can also consider fine-tuning trained
DNN models with adversarial samples or hard positives (Rozsa
et al., 2016b), corrected natural adversarial samples, or even
augmented natural adversarial samples containing perturbations with lower magnitudes than otherwise needed for correcting misclassifications.
Acknowledgment
This research is based upon work funded in part by NSF IIS1320956 and in part by the Office of the Director of National
Intelligence (ODNI), Intelligence Advanced Research Projects
Activity (IARPA), via IARPA R&D Contract No. 201414071600012. The views and conclusions contained herein are
those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and
100%
5 o Clock Shadow
Adversarial sample created on attribute
100%
Arched Eyebrows
Attractive
Bags Under Eyes
90%
Bald
Bangs
Big Lips
Big Nose
80%
Black Hair
Blond Hair
Blurry
Hair
70%BushyBrown
Eyebrows
Chubby
Double Chin
Eyeglasses
60%
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
50%
Male
Mouth Slightly Open
Mustache
Narrow Eyes
40%
No Beard
Oval Face
Pale Skin
Pointy Nose
30%
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
20% Straight
Hair
Wavy Hair
Wearing Earrings
Wearing Hat
10%Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
0%
90%
80%
70%
60%
50%
40%
30%
20%
10%
5 o Clock Shadow
Arched Eyebrows
Attractive
Bags Under Eyes
Bald
Bangs
Big Lips
Big Nose
Black Hair
Blond Hair
Blurry
Brown Hair
Bushy Eyebrows
Chubby
Double Chin
Eyeglasses
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
Male
Mouth Slightly Open
Mustache
Narrow Eyes
No Beard
Oval Face
Pale Skin
Pointy Nose
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
Straight Hair
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
Adversarial to attribute
5 o Clock Shadow
Arched Eyebrows
Attractive
Bags Under Eyes
Bald
Bangs
Big Lips
Big Nose
Black Hair
Blond Hair
Blurry
Brown Hair
Bushy Eyebrows
Chubby
Double Chin
Eyeglasses
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
Male
Mouth Slightly Open
Mustache
Narrow Eyes
No Beard
Oval Face
Pale Skin
Pointy Nose
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
Straight Hair
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
5 o Clock Shadow
Arched Eyebrows
Attractive
Bags Under Eyes
Bald
Bangs
Big Lips
Big Nose
Black Hair
Blond Hair
Blurry
Brown Hair
Bushy Eyebrows
Chubby
Double Chin
Eyeglasses
Goatee
Gray Hair
Heavy Makeup
High Cheekbones
Male
Mouth Slightly Open
Mustache
Narrow Eyes
No Beard
Oval Face
Pale Skin
Pointy Nose
Receding Hairline
Rosy Cheeks
Sideburns
Smiling
Straight Hair
Wavy Hair
Wearing Earrings
Wearing Hat
Wearing Lipstick
Wearing Necklace
Wearing Necktie
Young
Adversarial to attribute
10
0%
Adversarial sample created on attribute
Fig. 5: ATTRIBUTE C ORRELATION ON MOON. This figure shows the correlation of facial attributes on MOON based on adversarial images
generated for single attributes. Adversarial examples were created for 1,000 original images randomly sampled from the CelebA training set,
which are identical across all experiments. On the left, FFA adversarial images were created via line-search. On the right, iterative FFA was used
for adversarial example generation.
distribute reprints for Governmental purposes notwithstanding
any copyright annotation thereon.
References
Baluja, S., Covell, M., Sukthankar, R., 2015. The Virtues of Peer Pressure: A
Simple Method for Discovering High-Value Mistakes, in: Computer Analysis of Images and Patterns, Springer. pp. 96–108.
Evangelidis, G.D., Psarakis, E.Z., 2008. Parametric Image Alignment Using
Enhanced Correlation Coefficient Maximization. IEEE Transactions on Pattern Analysis and Machine Intelligence 30, 1858–1865.
Flynn, J.R., Ward, S., Abich IV, J., Poole, D., 2013. Image Quality Assessment
Using the SSIM and the Just Noticeable Difference Paradigm, in: Engineering Psychology and Cognitive Ergonomics. Understanding Human Cognition. Springer, pp. 23–30.
Goodfellow, I.J., Shlens, J., Szegedy, C., 2015. Explaining and Harnessing
Adversarial Examples, in: International Conference on Learning Representation (ICLR).
Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T., 2014. Caffe: Convolutional Architecture for Fast Feature Embedding, in: Proceedings of the ACM International Conference on
Multimedia, ACM. pp. 675–678.
Kalayeh, M.M., Gong, B., Shah, M., 2017. Improving facial attribute prediction
using semantic segmentation, in: IEEE Conference on Computer Vision and
Pattern Recognition (CVPR).
Kumar, N., Belhumeur, P., Nayar, S., 2008. FaceTracer: A Search Engine
for Large Collections of Images with Faces, in: European Conference on
Computer Vision (ECCV). Springer, pp. 340–353.
Kumar, N., Berg, A.C., Belhumeur, P.N., Nayar, S.K., 2009. Attribute and Simile Classifiers for Face Verification, in: International Conference on Computer Vision (ICCV), IEEE. pp. 365–372.
Kumar, N., Berg, A.C., Belhumeur, P.N., Nayar, S.K., 2011. Describable Visual
Attributes for Face Verification and Image Search. IEEE Transactions on
Pattern Analysis and Machine Intelligence 33, 1962–1977.
Kurakin, A., Goodfellow, I., Bengio, S., 2017. Adversarial machine learning at
scale, in: International Conference on Learning Representation (ICLR).
Liu, Z., Luo, P., Wang, X., Tang, X., 2015. Deep Learning Face Attributes in
the Wild, in: International Conference on Computer Vision (ICCV), IEEE.
pp. 3730–3738.
Parikh, D., Grauman, K., 2011. Interactively Building a Discriminative Vocabulary of Nameable Attributes, in: IEEE Conference on Computer Vision and
Pattern Recognition (CVPR), IEEE. pp. 1681–1688.
Parkhi, O.M., Vedaldi, A., Zisserman, A., 2015. Deep Face Recognition.
British Machine Vision Conference (BMVC) 1, 6.
Rozsa, A., Günther, M., Rudd, E.M., Boult, T.E., 2016a. Are Facial Attributes
Adversarially Robust?, in: International Conference on Pattern Recognition
(ICPR).
Rozsa, A., Rudd, E.M., Boult, T.E., 2016b. Adversarial Diversity and Hard
Positive Generation, in: IEEE Conference on Computer Vision and Pattern
Recognition (CVPR) Workshops.
Rudd, E.M., Günther, M., Boult, T.E., 2016. MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes, in: European
Conference on Computer Vision (ECCV).
Sabour, S., Cao, Y., Faghri, F., Fleet, D.J., 2016. Adversarial Manipulation of
Deep Representations, in: International Conference on Learning Representation (ICLR).
Scheirer, W.J., Kumar, N., Belhumeur, P.N., Boult, T.E., 2012. Multi-Attribute
Spaces: Calibration for Attribute Fusion and Similarity Search, in: IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), pp.
2933–2940.
Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.,
Fergus, R., 2014. Intriguing Properties of Neural Networks, in: International
Conference on Learning Representation (ICLR).
Wang, J., Cheng, Y., Feris, R.S., 2016. Walk and learn: Facial attribute representation learning from egocentric video and contextual data, in: IEEE
Conference on Computer Vision and Pattern Recognition (CVPR).
Zhang, Z., Luo, P., Loy, C.C., Tang, X., 2015. Learning Social Relation
Traits from Face Images, in: International Conference on Computer Vision
(ICCV), IEEE. pp. 3631–3639.
| 1cs.CV
|
Logical Methods in Computer Science
Vol. 2 (3:3) 2006, pp. 1–22
www.lmcs-online.org
Submitted
Published
Dec. 16, 2005
Jul. 27, 2006
RELATIONAL PARAMETRICITY AND CONTROL
MASAHITO HASEGAWA
Research Institute for Mathematical Sciences, Kyoto University, Kyoto 606-8502 Japan, and
PRESTO, Japan Science and Technology Agency
e-mail address: [email protected]
Abstract. We study the equational theory of Parigot’s second-order λµ-calculus in connection with a call-by-name continuation-passing style (CPS) translation into a fragment
of the second-order λ-calculus. It is observed that the relational parametricity on the target calculus induces a natural notion of equivalence on the λµ-terms. On the other hand,
the unconstrained relational parametricity on the λµ-calculus turns out to be inconsistent. Following these facts, we propose to formulate the relational parametricity on the
λµ-calculus in a constrained way, which might be called “focal parametricity”.
Dedicated to Prof. Gordon Plotkin on the occasion of his sixtieth birthday
1. Introduction
The λµ-calculus, introduced by Parigot [26], has been one of the representative term
calculi for classical natural deduction, and widely studied from various aspects. Although
it still is an active research subject, it can be said that we have some reasonable understanding of the first-order propositional λµ-calculus: we have good reduction theories,
well-established CPS semantics and the corresponding operational semantics, and also some
canonical equational theories enjoying semantic completeness [16, 24, 25, 36, 39]. The last
point cannot be overlooked, as such complete axiomatizations provide deep understanding of equivalences between proofs and also of the semantic structure behind the syntactic
presentation.
The second-order λµ-calculus (λµ2), again due to Parigot [27], has been studied in depth
as a calculus for second-order classical natural deduction. In particular, strong normalization results of λµ2 [27, 23] and its extensions, e.g. with inductive types [21], have been a
central research topic, because of the proof-theoretical importance of strong normalization.
However, for λµ2, it seems that there are few attempts of giving an equational theory supported by some fine semantic structure. This situation is rather frustrating, since without
such equational and semantic accounts, we cannot discuss e.g. the correctness of the impredicative encoding of the datatypes in λµ2. For the second-order λ-calculus λ2 (system
2000 ACM Subject Classification: F.3.2.
Key words and phrases: polymorphism, parametricity, continuations.
l
LOGICAL METHODS
IN COMPUTER SCIENCE
c
DOI:10.2168/LMCS-2 (3:3) 2006
CC
Masahito Hasegawa
Creative Commons
2
MASAHITO HASEGAWA
F) [9, 33], a subsystem of λµ2, there are several beautiful results on the relational parametricity [34] and the universal properties of impredicative constructions [1, 15, 31, 40, 44],
e.g. that µX.σ = ∀X.(σ → X) → X (where σ covariant in X) gives an initial algebra of
the functor ΛX.σ in a suitable sense. We certainly wish to have such a story for λµ2 too.
This work is an attempt to identify such an equational theory which is backed up by
certain semantic structures. Specifically, we propose a relational parametricity principle
which is sound and sufficiently powerful for deriving such equivalences on the λµ-terms.
1.1. Parametric CPS semantics. We first consider the semantics of λµ2 given by a
CPS-translation into a fragment of λ2 — that of the second-order existential types ∃X.τ ,
conjunction types τ1 ∧ τ2 , and arrow types τ → R into a distinguished type R (this choice
of the target calculus is due to a recent work of Fujita [7]). The translation (−)◦ sends
a type variable X to X, arrow type σ1 → σ2 to (σ1◦ → R) ∧ σ2◦ , and the universal type
∀X.σ to ∃X.σ ◦ — while a term M : σ is sent to [[M ]] : σ ◦ → R. It can be considered as a
natural extension of Streicher’s call-by-name CPS translation [36, 39, 43]. It follows that
this translation already gives a reasonable equational theory on λµ2, in that it validates the
standard βη-equalities1 . In fact, this is a consequence of a fibred version of the ”category
of continuations” construction [16, 36, 39].
However, this is just a starting point; we observe that, if some of the impredicative
constructions in the target calculus satisfy certain universal properties (e.g. ∃X.X is a
terminal object) which follow from the relational parametricity, then so do the impredicative
constructions in the source λµ2-calculus — but not quite in the way that we first might
expect. For instance, the type ⊥ = ∀X.X does not give an initial object (cf. [37]) — instead
it plays the role of the falsity type (or the “answer type”); in fact, we have a double-negation
elimination from (σ → ⊥) → ⊥ to σ for any σ which actually is an algebra of the doublenegation monad ((−) → ⊥) → ⊥. As another major example, ∀X.(σ → X) → X does
not give an initial algebra of ΛX.σ; it gives an initial algebra of ΛX.(σ → ⊥) → ⊥ — not
with respect to all terms but to a certain class of terms (the “focal terms”, to be mentioned
below). In particular, if X is not free in σ, ∀X.(σ → X) → X is isomorphic not to σ but
to (σ → ⊥) → ⊥. In short, impredicative encodings in λµ2 get extra double negations,
and the relational parametricity of λ2 is not consistent with the equational theory of λµ2
induced by the CPS semantics. As a consequence, we cannot encode cartesian products in
λµ2, though they can be added easily. Also we cannot express the classical disjunctions
[36], though they can be added without changing the target of the CPS translation.
1.2. Focal parametricity. These results suggest that the CPS translation into parametric
target calculus gives a reasonable semantic foundation and equational theory for λµ2, which
is sufficient for obtaining various interesting results. However, here the parametricity is
used rather indirectly, via the CPS translation; we also wish to have a decent notion of
parametricity directly within λµ2. To figure out what sort of parametricity principle can be
expected for λµ2, recall the following fact on λ2 with parametricity: given a polymorphic
term M : ∀X.F [X] → G[X] (with X covariant in F and G) and types σ1 , σ2 , the instances
1We can say more – we can show that this CPS-semantics is sound and complete with respect to the
βη-theory of λµ2. This result, together with further syntactic analysis of this CPS translation, will appear
in a forthcoming paper with Ken-etsu Fujita.
RELATIONAL PARAMETRICITY AND CONTROL
3
M σ1 : F [σ1 ] → G[σ1 ] and M σ2 : F [σ2 ] → G[σ2 ] obey the naturality, in that the following
diagram
F [f ]
- F [σ2 ]
F [σ1 ]
M σ1
M σ2
?
G[σ1 ]
?
- G[σ2 ]
G[f ]
commutes for any f : σ1 → σ2 . This is no longer true for λµ2. For example, let F [σ] = (σ →
⊥) → ⊥, G[σ] = σ and M be the double-negation elimination (which does not exist in λ2);
then the naturality for arbitrary maps implies inconsistency — we get σ ≃ (σ → ⊥) → ⊥
for every σ by letting f be the obvious map from σ to (σ → ⊥) → ⊥, which is enough to
kill the theory [20]. Similar result can be observed for other “classical” proofs, e.g. of the
Peirce law.
To this end, we look at the focus [36] (centre [32, 42], C-maps [16]) of λµ2; a focal map
is no other than an algebra morphism between the the double-negation monad mentioned
above, i.e., a map making the naturality diagram for the double-negation elimination commute. It follows that a notion of relational parametricity on λµ2 in which the construction
of the graph relations is allowed only for focal maps is consistent, as there are nontrivial
models. Together with the definability (fullness) of the CPS translation, we see that it is at
least as powerful as the parametricity on the CPS target calculus which we have mentioned
above, thus gives a powerful principle for deriving the equivalences of terms in λµ2. (We
actually conjecture that these two notions of parametricity do agree, but it is open as of
writing this article.) This principle, which we shall call focal parametricity, should be a
natural notion of parametricity for λµ2. We will sketch some use of focal parametricity for
deriving “free theorems” for λµ2 syntactically.
1.3. Towards parametricity for computational effects. At the conceptual and abstract level, this story closely resembles to the study of linear parametricity and recursion
[4, 30]. In the case of linear parametricity, the graph relations are allowed to be constructed
only from the linear maps, and a linear map is an algebra map w.r.t. the lifting monad.
We claim that, just like the linear parametricity gives a solution of accommodating nontermination and recursion in the polymorphic setting (as advocated by Plotkin [30]), the
focal parametricity provides a way of accommodating control features in the polymorphic
setting. In short:
focal parametricity
linear parametricity
=
non-termination
first-class control
As future work, it would be an interesting challenge to find a unifying framework
of linear parametricity and focal parametricity; it should be useful to have parametric
polymorphism, recursion, and control at once, as in the realistic programming languages (cf.
[14, 18, 19]). More ambitiously, we are keen to see an adequate notion of parametricity for
fairly general “effectful” settings. Possible starting points for this direction might include
the “parametricity graphs” approach [5] which allows us to deal with parametricity at
a general level (including the linear parametricity as an instance), and the “category of
4
MASAHITO HASEGAWA
linear continuations construction” [12] which induces both the CPS translation and Girard
translation as special cases. See Section 7 for further discussions related to this issue.
1.4. Construction of this paper. The rest of this paper is organised as follows. In section
2 and 3 we introduce the calculi and CPS-translation which are the subject of this study.
In section 4 we consider the implications of the relational parametricity on the CPS-target
calculus. The focal parametricity is introduced in section 5, followed by examples in section
6, including focally initial algebras and the type of Church numerals. Section 7 gives an
alternative characterisation of focus, which suggests a generalisation of this work to a theory
of parametricity for general effects. We then give some concluding remarks in Section 8.
2. The calculi
2.1. The second-order λµcalculus. The second-order λµ-calculus, λµ2, is given as follows. We essentially follow Parigot’s formulation [27] (with some flavour from Selinger’s
[36]). The types are the same as those of the second-order λ-calculus λ2:
σ ::= X | σ → σ | ∀X.σ
In a typing judgement Γ ⊢ M : σ | ∆, Γ stands for the typing context of variables, while ∆
for the context of names (continuation variables).
Γ, x : σ, Γ′ ⊢ x : σ | ∆
Γ, x : σ1 ⊢ M : σ2 | ∆
Γ ⊢ λxσ1 .M : σ1 → σ2 | ∆
Γ ⊢ M : σ1 → σ2 | ∆ Γ ⊢ N : σ1 | ∆
Γ ⊢ M N : σ2 | ∆
Γ ⊢ M : σ | ∆ (X 6∈ F T V (Γ, ∆))
Γ ⊢ ΛX.M : ∀X.σ | ∆
Γ ⊢ M : ∀X.σ1 | ∆
Γ ⊢ M σ2 : σ1 [σ2 /X] | ∆
Γ ⊢ M : σ2 | α : σ1 , ∆ (β : σ2 ∈ α : σ1 , ∆)
Γ ⊢ µασ1 .[β]M : σ1 | ∆
RELATIONAL PARAMETRICITY AND CONTROL
5
The axioms for the equational theory are again the standard ones — note that we consider
the extensional theory, i.e. with the η-axioms.
(λxσ .M ) N
λxσ .M x
(ΛX.M ) σ
ΛX.M X
=
=
=
=
M [N/x]
M (x 6∈ F V (M ))
M [σ/X]
M (X 6∈ F T V (M ))
µα.[β](µγ.M )
µασ .[α]M
σ
→σ
1
2 .M ) N
(µα
∀X.σ
1 .M ) σ
(µα
2
=
=
=
=
µα.M [β/γ]
M (α 6∈ F N (M ))
µβ σ2 .M [[β](− N )/[α](−)]
µβ σ1 [σ2 /X] .M [[β](− σ2 )/[α](−)]
In the last two axioms, we make uses of so-called ”mixed substitution”; for instance,
M [[β](− N )/[α](−)] means replacing occurances of the form [α]L in M by [β](L N ) recursively.
In the sequel, we frequently use the following syntactic sugar. First, we let ⊥ be the
type ∀X.X — the type of falsity. We may also write ¬σ for σ → ⊥. Using ⊥, we define the
“named term”
[β]M ≡ µα⊥ .[β]M : ⊥
(where M : σ, β : σ, with α fresh) and the µ-abstraction
µασ .M : σ ≡ µασ .[α](M σ)
for M : ⊥. It follows that µασ .[β]M = µασ .[β]M holds.
With this ⊥, we can express the double-negation elimination in λµ2 by making use of
both the polymorphic and classical features:
Cσ = λm¬¬σ .µασ .m (λxσ .[α]x) : ¬¬σ → σ
As expected, we have Cσ (λk¬σ .k M ) = M . The properties of ⊥ and Cσ will be further
studied later under parametricity assumptions.
2.2. Target: the {∃, ∧, ¬}calculus. In tthe literature, the second-order λ-calculus (λ2)
is often taken as the target of the CPS translation for λµ2. Fujita observed that it actually
suffices to consider a fragment of λ2 with negations, conjunctions and existential types as
a target [7]. In this paper we follow this insight.
τ
::= X | R | ¬τ | τ ∧ τ | ∃X.τ
¬τ can be considered as a shorthand of τ → R. The type R can be replaced by ∃X.¬X ∧ X,
but for simplicity we keep R as a type constant. The syntax of terms is a fairly standard one,
though for conjunctions we employ a slightly less familiar elimination rule (with let-binding)
so that it parallels that of the existential types.
Γ, x : τ, Γ′ ⊢ x : τ
Γ, x : τ ⊢ M : R
Γ ⊢ λxτ .M : ¬τ
Γ ⊢ M : ¬τ Γ ⊢ N : τ
Γ⊢MN :R
6
MASAHITO HASEGAWA
Γ ⊢ M : τ1 Γ ⊢ N : τ2
Γ ⊢ hM, N i : τ1 ∧ τ2
Γ ⊢ M : τ1 ∧ τ2 Γ, x : τ1 , y : τ2 ⊢ N : τ3
Γ ⊢ let hxτ1 , y τ2 i be M in N : τ3
Γ ⊢ M : τ1 [τ2 /X]
Γ ⊢ hτ2 , M i : ∃X.τ1
Γ ⊢ M : ∃X.τ1 Γ, x : τ1 ⊢ N : τ2 X 6∈ F T V (Γ, τ2 )
Γ ⊢ let hX, xτ1 i be M in N : τ2
Again, we employ the standard βη-axioms.
(λxσ .M ) N
λxσ .M x
let hx, yi be hL, M i in N
let hx, yi be M in N [hx, yi/z]
let hX, xi be hτ, M i in N
let hX, xi be M in N [hX, xi/z]
=
=
=
=
=
=
M [N/x]
M (x 6∈ F V (M ))
N [L/x, M/y]
N [M/z]
N [τ /X, M/x]
N [M/z]
3. CPS translation
3.1. The CPS translation. We present a call-by-name CPS translation which can be
considered as an extension of that introduced by Streicher [16, 39, 36] (rather than the
translations by Plotkin [29], Parigot [27] or Fujita [7] which introduce extra negations and
do not respect extensionality).
X◦ = X
(σ1 → σ2 )◦ = ¬σ1◦ ∧ σ2◦
(∀X.σ)◦ = ∃X.σ ◦
[[xσ ]]
[[λxσ1 .M σ2 ]]
[[M σ1 →σ2 N σ1 ]]
[[ΛX.M σ ]]
[[M ∀X.σ1 σ2 ]]
σ
[[µα 1 .[β σ2 ]M σ2 ]]
where
λhxσ , y τ i.M
λhX, y τ i.M
=
=
=
=
=
=
◦
x¬σ
◦
◦
λhx¬σ1 , kσ2 i.[[M ]] k
◦
λkσ2 .[[M ]] h[[N ]], ki
◦
λhX, kσ i.[[M ]] k
◦
λkσ1 [σ2 /X] .[[M ]] hσ2◦ , ki
◦
λασ1 .[[M ]] β
≡ λz σ∧τ .let hxσ , y τ i be z in M
≡ λz ∃X.τ .let hX, y τ i be z in M
RELATIONAL PARAMETRICITY AND CONTROL
7
3.2. Soundness. The type soundness follows from a straightforward induction.
Proposition 3.1 (type soundness).
Γ ⊢ M : σ | ∆ =⇒ ¬Γ◦ , ∆◦ ⊢ [[M ]] : ¬σ ◦
◦ when Γ is x : σ , . . . , x
◦
where ¬Γ◦ is x1 : ¬σ1◦ , . . . , xm : ¬σm
1
1
m : σm , and ∆ = α1 :
◦
◦
σ1 , . . . , αn : σn for ∆ = α1 : σ1 , . . . , αn : σn .
Note that (σ[τ /X])◦ ≡ σ ◦ [τ ◦ /X], [[M [N/x]]] ≡ [[M ]][[[N ]]/x], and also [[M [σ/X]]] ≡
[[M ]][σ ◦ /X] hold. Then we have the equational soundness:
Proposition 3.2 (equational soundness).
Γ ⊢ M = N : σ |∆ =⇒ ¬Γ◦ , ∆◦ ⊢ [[M ]] = [[N ]] : ¬σ ◦
In addition, we have the definability result:
Proposition 3.3 (fullness).
¬Γ◦ , ∆◦ ⊢ N : ¬σ ◦ =⇒ N = [[M ]] for some Γ ⊢ M : σ | ∆
This can be proved by providing an inverse translation of the CPS translation, so that
¬Γ◦ , ∆◦ ⊢ P : ¬σ ◦ =⇒ Γ ⊢ P −1 : σ | ∆
¬Γ◦ , ∆◦ ⊢ C : σ ◦ =⇒ Γ ⊢ C −1 [−σ ] : ⊥ | ∆
¬Γ◦ , ∆◦ ⊢ A : R =⇒ Γ ⊢ A−1 : ⊥ | ∆
hold, where
Program : ¬σ ◦
P ::= x | λk.A
◦
Continuation : σ C ::= k | hP, Ci | hσ ◦ , Ci | let hx, ki be C in C | let hX, ki be C in C
Answer : R
A ::= P C | let hx, ki be C in A | let hX, ki be C in A
as follows.
x−1 = x
= µkσ .A−1
◦
(λkσ .A)−1
k−1
hP, Ci−1
hσ ◦ , Ci−1
(let hx, ki be C1 in C2 )−1
(let hX, ki be C1 in C2 )−1
=
=
=
=
=
[k][−]
C −1 [− P −1 ]
C −1 [− σ]
C1−1 [λx.µk.C2−1 [−]]
C1−1 [ΛX.µk.C2−1 [−]]
(P C)−1 = C −1 [P −1 ]
(let hx, ki be C in A)−1 = C −1 [λx.µk.A−1 ]
(let hX, ki be C in A)−1 = C −1 [ΛX.µk.A−1 ]
This can be considered as a “continuation-grabbing style transformation” in the sense of
Sabry [35]. It follows that for any ¬Γ◦ , ∆◦ ⊢ M : ¬σ ◦ there exists ¬Γ◦ , ∆◦ ⊢ P : ¬σ ◦
generated by this grammar such that P = M — it suffices to take the β-normal form [7].
Moreover we can routinely show that [[P −1 ]] = P . Thus the CPS translation enjoys fullness:
all terms are definable modulo the provable equality. This definability is important for
relating the parametricity principles for the source and target calculi.
8
MASAHITO HASEGAWA
3.3. A semantic explanation. Here is a short explanation of why this CPS translation
works, intended for readers with category theoretic background — on the “categories of
continuations” construction [16, 39, 36], and on fibrations for polymorphic type theories
[17]. As a response category C with a response object R induces a control category RC
with RC (X, Y ) = C(RX , RY ), a fibred response category with finite products and simple
coproducts (for existential quantifiers) induces a fibred control category with finite products
and simple products (for universal quantifiers). Let us write CΓ for the response category
over the type-context Γ. We assume that the weakening functor π ∗ : CΓ → CΓ×A has a left
adjoint ∃A : CΓ×A → CΓ subject to the Beck-Chevalley condition. Thus
CΓ×A (X, π ∗ (Y )) ≃ CΓ (∃A (X), Y )
We then have
RCΓ×A (π ∗ (X), Y ) =
≃
≃
≃
≃
=
∗
CΓ×A (Rπ (X) , RY )
π ∗ (X)
)
CΓ×A (Y, RR
X
∗
R
CΓ×A (Y, π (R ))
X
CΓ (∃A (Y ), RR )
CΓ (RX , R∃A (Y ) )
RCΓ (X, ∃A (Y ))
Hence π ∗ , regarded as the weakening functor from RCΓ to RCΓ×A , has a right adjoint given
by ∃A , which can be used for interpreting the universal quantifier. Our CPS transformation
is essentially a syntactic interpretation of this semantic construction.
4. CPS semantics with the parametric target calculus
4.1. Parametricity for the target calculus. As the target calculus can be seen as a
subset of λ2 (via the standard encoding of the conjunctions and existential types), we can
define the relational parametricity for the target calculus in the same way as for λ2, e.g.
logic for parametricity [31, 40], system R [1], or system P [5]. One may directly define the
parametricity principle (often called the simulation principle) for the existential type, see
for example [31].
In this paper we only consider the relations constructed from the graphs of termsin-context, identity, and σ ∗ ’s obtained by the following construction, which we shall call
“admissible relations”.
Among admissible relations, the most fundamental are the graph relations. Given a
term f (x) : τ2 with a free variable x : τ1 we define its graph relation hx ⊢ f (x)i : τ1 ↔ τ2
(hf i for short) by u hf i v iff f (u) = v.
Given a type τ whose free type variables are included in X1 , . . . , Xn and admissible
relations s1 : τ1 ↔ τ1′ , . . . , sn : τn ↔ τn′ , we define an admissible relation τ ∗ as follows.
• Xi∗ = si : τi ↔ τi′
• R∗ is the identity relation on the terms of type R
• (¬τ )∗ : ¬τ [τ1 /X1 , . . . ] ↔ ¬τ [τ1′ /X1 , . . . ] is the relation so that f (¬τ )∗ g iff x τ ∗ y
implies f x R∗ g y (hence f x = g y)
• (τ ∧τ ′ )∗ : (τ ∧τ ′ )[τ1 /X1 , . . . ] ↔ (τ ∧τ ′ )[τ1′ /X1 , . . . ] is the relation so that u (τ ∧τ ′ )∗ v
iff u = hx, x′ i, v = hy, y ′ i and x τ ∗ y, x′ τ ′∗ y ′
• (∃X.τ )∗ : ∃X.τ [τ1 /X1 , . . . ] ↔ ∃X.τ [τ1′ /X1 , . . . ] is the relation so that u (∃X.τ )∗ v iff
u = hτ ′ , xi, v = hτ ′′ , yi and x τ [r/X]∗ y for some admissible r : τ ′ ↔ τ ′′
RELATIONAL PARAMETRICITY AND CONTROL
9
In the last case, the relation τ [r/X]∗ : τ [τ ′ /X] ↔ τ [τ ′′ /X] is defined as τ ∗ with X ∗ = r.
One may further define admissible relations ¬r, r ∧ s and ∃X.r for admissible r, s, so that
(¬τ )∗ = ¬τ ∗ , (τ ∧ τ ′ )∗ = τ ∗ ∧ τ ′∗ and (∃X.τ )∗ = ∃X.τ ∗ hold.
Let idτ : τ ↔ τ be the identity relation on the terms of type τ . The relational parametricity asserts that, for any τ whose free type variables are included in X1 , . . . , Xn and
τ1 , . . . , τn , M : τ [τ1 /X1 , . . . , τn /Xn ] implies M τ ∗ M with si = idτi .
Its consistency follows immediately from that of the parametricity for λ2.
Proposition 4.1. As consequences of the parametricity, we can derive:
(1) ∃X.X gives a terminal object ⊤ with a unique inhabitant ∗, so that for any M : ⊤
we have M = ∗.
(2) ∃X.¬(τ ∧ X) ∧ X (which could be rewritten as ∃X.(X → ¬τ ) ∧ X) gives a final
coalgebra νX.¬τ of ΛX.¬τ where X only occurs negatively in τ .
(3) (as an instance of the last case) the isomorphism ∃X.¬(τ ∧ X) ∧ X ≃ ¬τ holds if X
does not occur freely in τ .
Their proofs are standard, cf. papers cited above [31, 1, 40, 5].
Below we will see the implications of these parametricity results on the target calculus.
We refer to the λµ2-theory induced by the CPS translation into this parametric target
calculus as λµ2P .
4.2. The falsity type. As a first example, let us consider the falsity type ⊥ = ∀X.X in
λµ2. We have
⊥◦ = (∀X.X)◦ = ∃X.X ≃ ⊤
and
(σ → ⊥)◦ = ¬(σ ◦ ∧ ⊥◦ ) ≃ ¬(σ ◦ ∧ ⊤) ≃ ¬σ ◦
Since ∃X.X is terminal (with a unique inhabitant ∗) in the parametric target calculus,
◦
we obtain [[µασ .M ]] = λασ .[[M ]]∗ and [[[β]M ]] = λu∃X.X .[[M ]]β, which coincide with Streicher’s translation. As a consequence, the following equations on the named terms and
µ-abstractions are all validated in λµ2P .
(µασ1 →σ2 .M ) N
(µα∀X.σ1 .M ) σ2
[α′ ](µασ .M )
[α⊥ ]M
=
=
=
=
µβ σ2 .M [[β](− N )/[α](−)]
µβ σ1 [σ2 /X] .M [[β](− σ2 )/[α](−)]
M [α′ /α]
M
Thus the type ⊥ serves as the falsity type as found in some formulation of the λµ-calculus.
In addition, we can show that (σ, Cσ : ((σ → ⊥) → ⊥) → σ) is an algebra of the doublenegation monad ((−) → ⊥) → ⊥ on the term model.
4.3. Initial algebra? A more substantial example is the “initial algebra” µX.F [X] =
∀X.(F [X] → X) → X, with X positive in F [X] (here we see an unfortunate clash of µ’s for
the name-binding and for the fixed-point on types, but this should not cause any serious
10
MASAHITO HASEGAWA
problem). We calculate:
(µX.F [X])◦ =
=
≃
≃
≃
=
≃
(∀X.(F [X] → X) → X)◦
∃X.¬(¬F [X]◦ ∧ X) ∧ X
νX.¬¬F [X]◦
¬¬F [X]◦ [νX.¬¬F [X]◦ /X]
¬¬F [X]◦ [(µX.F [X])◦ /X]
¬¬(F [µX.F [X]])◦
((F [µX.F [X]] → ⊥) → ⊥)◦
This suggests that µX.F [X] is isomorphic not to F [µX.F [X]] but to its double negation
(F [µX.F [X]] → ⊥) → ⊥. One might think that this contradicts the standard experience on
λ2 with parametricity, where we have an isomorphism in : F [µX.F [X]] → µX.F [X]. Since
λµ2 subsumes λ2, we have this in in λµ2 too; however, it should not be an isomorphism,
regarding the CPS interpretation above (otherwise it causes a degeneracy). The truth is
that, in λµ2P , the term
in♯ = λm.µα.m (λx.[α](in x)) : ((F [µX.F [X]] → ⊥) → ⊥) → µX.F [X]
is an isomorphism. It still is not an initial algebra of (F [−] → ⊥) → ⊥; we shall further
consider this issue later. For now, we shall emphasize that the parametricity principle for
λ2 should not be used for λµ2, at least without certain constraint — otherwise in would be
an isomorphism, hence a degeneracy follows (because we have (σ → ⊥) → ⊥ ≃ σ for every
σ).
4.4. Other impredicative encodings. Recall other impredicative encodings of logical
connectives:
⊤ = ∀X.X → X
σ1 ∧ σ2 = ∀X.(σ1 → σ2 → X) → X
σ1 ∨ σ2 = ∀X.(σ1 → X) → (σ2 → X) → X
∃X.σ = ∀Y.(∀X.(σ → Y )) → Y
Their CPS translations into the parametric target calculus satisfy:
⊤◦
(σ1 ∧ σ2 )◦
(σ1 ∨ σ2 )◦
(∃X.σ)◦
≃
≃
≃
≃
R
¬(¬σ1 ◦ ∧ ¬σ2◦ )
¬¬σ1◦ ∧ ¬¬σ2◦
¬∃X.¬σ ◦
As easily seen, these defined logical connectives in the source calculus do not obey the
standard universal properties as in the parametric models of λ2. In short, they are all
“double-negated”, hence amount to some classical encodings:
• σ1 ∧ σ2 is not a cartesian product of σ1 and σ2 , but isomorphic to (σ1 → σ2 → ⊥) →
⊥. It is possible to add cartesian product types σ1 ×σ2 to λµ2, but then we also need
to add coproduct types τ1 + τ2 to the target calculus, so that (σ1 × σ2 )◦ = σ1◦ + σ2◦
and σ1 ∧ σ2 ≃ ¬¬(σ1 × σ2 ).
• ⊤ is not a terminal object, but isomorphic to ⊥ → ⊥. We can add a terminal object
1 to λµ2 and an initial object 0 to the target, so that 1◦ = 0 and ⊤ ≃ ¬¬1.
• σ1 ∨ σ2 is not a coproduct of σ1 and σ2 , but isomorphic to (σ1 → ⊥) → (σ2 → ⊥) →
⊥. If there is a coproduct σ1 + σ2 , then it should follow that σ ∨ τ ≃ ¬¬(σ + τ ).
On the other hand, it is not possible to enrich λµ2 with an initial object without
a degeneracy, cf. Selinger’s note on control categories [37]. Alternatively we might
RELATIONAL PARAMETRICITY AND CONTROL
11
add the “classical disjunction types” σ1 ℘σ2 [36] with (σ1 ℘σ2 )◦ = σ1◦ ∧ σ2◦ — hence
σ1 → σ2 ≃ ¬σ1 ℘σ2 and σ1 ∨ σ2 ≃ ¬¬σ1 ℘¬¬σ2 . We note that ⊥ = ∀X.X serves as
the unit of this classical disjunction.
• ∃X.σ does not work as the existential type; it is isomorphic to ¬∀X.¬σ.
4.5. Answer-type polymorphism. Note that the answer type R has been considered
just as a constant with no specific property. In fact we could have used any type for R —
Everything is defined polymorphically regarding R. Thus we can apply the “answer-type
polymorphism” principle (cf. [43]): in particular, a closed term of type σ in λµ2 can be
considered to be sent to a λ2-term of type ∀R.¬σ ◦ . This way of reasoning goes behind the
parametricity principle for our target calculus, but it is justified by the parametricity of λ2.
For instance, consider the type ⊤ = ∀X.X → X of λµ2. We have
∀R.¬⊤◦ ≃ ∀R.¬R
≃ ∀R.R → R
≃ 1
in λ2 with parametricity. This means that, although ⊤ is not a terminal object in λµ2, it
has a unique closed inhabitant. Similarly, we have ∀R.¬⊥◦ ≃ ∀R.R ≃ 0, thus we see that
there is no closed inhabitant of ⊥ in λµ2.
However, such reasonings based on the answer-type polymorphism become much harder
for more complicated types. The force of answer-type polymorphism in this setting seems
still not very obvious.
5. Focal parametricity
We have seen that the CPS semantics with respect to the target calculus with relational parametricity induces a reasonable equational theory λµ2P . However, here the
parametricity is used rather indirectly, via the CPS translation. We now consider a notion
of parametricity which is directly available within λµ2.
5.1. CPS translating relations. The key of formulating the relational parametricity is
the use of graph relations of terms (considered as representing a functional relation): without
graph relations, relational parametricity reduces to just the basic lemma of the (secondorder) logical relations. On the other hand, it does not have to allow all terms to be used
for constructing relations. In fact, in linear parametricity [30] only linear (or strict) maps
are allowed to be used for constructing graph relations, and this choice allows a weaker
notion of parametricity which can accommodate recursion. Naturally, we are led to look
for a characterisation of λµ-terms which can be used for graph relations without breaking
the soundness with respect to the CPS semantics into the parametric target calculus.
Now suppose that we are allowed to use the graph relation hf i : σ1 ↔ σ2 of a term
x : σ1 ⊢ f (x) : σ2 . To ensure the soundness of the use of this graph relation, we shall consider
the CPS translation of such relations. For instance, we hope that hf i will be sent to a relation
between types σ2◦ and σ1◦ in the target calculus. However, since x : ¬σ1◦ ⊢ [[f (x)]] : ¬σ2◦ , we
have some relation σ2◦ ↔ σ1◦ only when [[f (x)]] = λk.x (g (k)) for some k : σ2◦ ⊢ g(k) : σ1◦ in
the target calculus. If there is such g, we can complete the translation of the relations and
reduce the parametricity principle on λµ2 to the parametricity on the target calculus.
12
MASAHITO HASEGAWA
Fortunately, there is a way to characterise such “translatable” f ’s in the λµ-calculus
without performing the CPS-translation (modulo a technical assumption on the CPS-target,
known as “equalising requirement” [22]). It is the notion of “focus”, which we now recall
below.
5.2. Focus.
Definition 5.1. A λµ2-term M : σ1 → σ2 is called focal if it is an algebra morphism from
(σ1 , Cσ1 ) to (σ2 , Cσ2 ), i.e. the following diagram commutes.
(σ1 → ⊥) → ⊥
Cσ1
(M →⊥)→⊥
-
Cσ2
?
σ1
(σ2 → ⊥) → ⊥
?
M
- σ2
That is:
M (µασ1 .k (λxσ1 .[α]x)) = µβ σ2 .k (λxσ1 .[β](M x)) : σ2
holds for any k : (σ1 → ⊥) → ⊥.2
In any λµ2-theory, focal terms compose, and the identity λxσ .x is obviously focal. So,
the (equivalence classes of) focal maps form a category. Hereafter we shall call it the focus
of the λµ2-theory.
While this characterisation of focal maps is concise and closely follows the semantic
considerations in [36, 19], there is a subtle problem; the βη-axioms of λµ2 are too weak to
establish the focality of some important terms. This is because we have used the polymorphic feature of λµ2 for expressing Cσ — it involves the falsity type ⊥ = ∀X.X, but the
axioms of λµ2 do not guarantee that ⊥ does work properly. If there were not sufficiently
many focal maps, the parametricity principle restricted on focal maps would be useless.
To see this issue more clearly, we shall look at another “classical” combinator (the
Peirce law)
Pσ1 ,σ2 = λm.µασ1 .[α](m (λxσ1 .µβ σ2 .[α]x)) : ((σ1 → σ2 ) → σ1 ) → σ1
which does not make use of polymorphism, and the “abort” map (Ex Falso Quodlibet)
Aσ = λx⊥ .x σ : ⊥ → σ
which is defined without the classical feature. It is well known that the double-negation
elimination is as expressible as the Peirce law together with Ex Falso Quodlibet, see e.g.
[2]. This is also the case at the level of (uniformity of) proofs. Let us say that M : σ1 → σ2
is repeatable if
(M →σ3 )→M
- (σ2 → σ3 ) → σ2
(σ1 → σ3 ) → σ1
Pσ1 ,σ3
Pσ2 ,σ3
?
σ1
?
M
- σ2
2In [16], a focal map from σ to ⊥ is called a “C-term of type σ ”. C-terms of type σ with a free name
1
1
1
of σ2 correspond to focal maps from σ1 to σ2 , thus these notions (and the associated constructions of the
CPS target categories via C-terms (C-maps) [16] and via focus [36]) are essentially the same.
RELATIONAL PARAMETRICITY AND CONTROL
13
commutes for each σ3 ; and discardable if
Aσ 1
σ1
⊥
M
Aσ
@ 2
R
@
- σ2
commutes.
Proposition 5.2. In a λµ2-theory, M : σ1 → σ2 is focal if and only if it is both repeatable
and discardable.
We note that the corresponding result in the call-by-value setting has been observed by
Führmann [8] as the characterisation of algebraic values as repeatable discardable expressions. Here we follow his terminology.
This reformulation allows us to see that only the second diagram of A’s involves the
polymorphically defined ⊥ and needs to be justified by additional conditions.3 On the other
hand, the first diagram of P ’s is not problematic, as it does not make use of polymorphism
at all.
5.3. Additional axioms. To this end, we add more axioms to λµ2 before thinking about
parametricity. They are
(1) λxσ1 →σ2 .x N : (σ1 → σ2 ) → σ2 is discardable for any N : σ1
(2) λx∀X.σ .x σ1 : ∀X.σ → σ[σ1 /X] is discardable for any σ and σ1
(3) λxσ .[α]x : σ → ⊥ is discardable for any α : σ
which are equivalent to asking
(1) M (σ1 → σ2 ) N = M σ2 for any M : ⊥ and N : σ1
(2) M (∀X.σ) σ1 = M (σ[σ1 /X]) for M : ⊥
(3) [α](M σ) = M for M : ⊥ and α : σ (α 6∈ F N (M ))
and also equivalent to
(1) (µασ1 →σ2 .M ) N = µβ σ2 .M [[β](− N )/[α](−)]
(2) (µα∀X.σ1 .M ) σ2 = µβ σ1 [σ2 /X] .M [[β](− σ2 )/[α](−)]
(3) [α′ ](µασ .M ) = M [α′ /α]
Note that λµ2P discussed in Section 4 satisfies these conditions. Also we shall note that
λxσ1 →σ2 .x N , λx∀X.σ .x σ1 , λx⊥ .[α](x σ) are all repeatable in λµ2. Together with these
additional axioms, they become focal. (Alternatively, we could have ⊥ as a type constant
and assume the standard axiomatization of λµ-calculus with the falsity type [16, 36] — in
that case C is defined without polymorphism, and this problem disappears.)
Below we develop the focal parametricity principle on top of λµ2 with these additional
axioms.
3This problem was overlooked in the preliminary version of this paper [13] where it was wrongly assumed
that repeatability alone would imply focality.
14
MASAHITO HASEGAWA
5.4. A parametricity principle for λµ2. Given a focal f : σ1 → σ2 we define its graph
relation hf i : σ1 ↔ σ2 by u hf i v iff f u = v. Also, let idσ : σ ↔ σ be the identity relation
on the terms of type σ. In this paper we only consider the relations given by the graphs
of focal maps, identity, and σ ∗ ’s obtained by the following construction, which we shall call
“focal relations”.
Given a type σ whose free type variables are included in X1 , . . . , Xn and focal relations
s1 : σ1 ↔ σ1′ , . . . , sn : σn ↔ σn′ , we define a focal relation σ ∗ as follows.
• Xi∗ = si : σi ↔ σi′
• (σ → σ ′ )∗ : (σ → σ ′ )[σ1 /X1 , . . . ] ↔ (σ → σ ′ )[σ1′ /X1 , . . . ] is the relation so that f (σ →
σ ′ )∗ g iff x σ ∗ y implies (f x) σ ′∗ (g y)
• (∀X.σ)∗ : ∀X.σ[σ1 /X1 , . . . ] ↔ ∀X.σ[σ1′ /X1 , . . . ] is the relation so that u (∀X.σ)∗ v
iff (u σ ′ ) σ[r/X]∗ (v σ ′′ ) holds for any focal relation r : σ ′ ↔ σ ′′
The focal relational parametricity asserts that, for any σ whose free type variables are
included in X1 , . . . , Xn , M : σ[σ1 /X1 , . . . , σn /Xn ] implies M σ ∗ M with si = idσi .
Thus the only departure from the standard parametricity principle is the condition that
the graph relation construction is allowed only on focal maps. Note that this restriction
is necessary; if we apply parametricity to polymorphic terms ΛX.CX or ΛX.PX,σ , we will
get the naturality diagrams above for any term which is allowed to be used for the graph
relation construction.
5.5. On consistency and soundness. The consistency of focal parametricity (in the sense
that the equational theory of λµ2 with focal parametricity is not trivial) follows from the
fact that there are non-trivial parametric models of λ2 in which there is an object R so
τ
that the continuation monad T τ = RR satisfies the “equalising requirement” [22], i.e. each
component ητ : τ → T τ of its unit is an equaliser of ηT τ and T ητ . (Here we employ the
syntax of the CPS target calculus as an internal language for such models, where the CPS
translation is considered to give a semantic interpretation.) In such models, for any focal
term f : σ1 → σ2 , there exists a unique y : σ2◦ ⊢ g(y) : σ1◦ such that [[f x]] = λy.x (g(y)) (cf.
[36]).
Using this fact, given a focal relation r : σ1 ↔ σ2 , we construct an admissible relation
r ◦ : σ2◦ ↔ σ1◦ as follows. For a graph relation hf i : σ1 ↔ σ2 , we let hf i◦ = hgi : σ2◦ ↔ σ1◦
where g is the unique map as given above. For σ ∗ , σ ∗◦ is defined by straightforward
induction: (σ → σ ′ )∗◦ = ¬σ ∗◦ ∧ σ ′∗◦ , (∀X.σ)∗◦ = ∃X.σ ∗◦ (where the parameter relations si
are replaced by s◦i ).
Theorem 5.3. In such a model, given a focal relation r : σ1 ↔ σ2 , M r N implies
[[N ]] ¬r ◦ [[M ]].
Theorem 5.4 (consistency). Focal parametricity is consistent.
We do not know if the term model of the parametric target calculus satisfies the equalising requirement — if so, by the definability result, the parametricity on the target and the
focal parametricity on λµ2 should agree. Alternatively we should consider a refined target
calculus with a construct ensuring the equalising requirement, as detailed in Taylor’s work
on sober space (“a lambda calculus for sobriety” [41]). For now, we only know that one
direction is true (thanks to the definability).
Theorem 5.5. An equality derivable in λµ2P is also derivable in λµ2 with focal parametricity.
RELATIONAL PARAMETRICITY AND CONTROL
15
6. Examples
We show that certain impredicative encodings in λµ2 satisfy universal properties with
respect to the focus using the focal parametricity principle.
6.1. Focal decomposition. We start with a remark on the following “focal decomposition”
[36] (analogous to the linear decomposition σ1 → σ2 =!σ1 ⊸ σ2 [10]): there is a bijective
correspondence between terms of σ1 → σ2 and focal terms of ¬¬σ1 → σ2 natural in σ1 and
focal σ2 .
f : ¬¬σ1 → σ2 focal
f ♭ = f ◦ ησ1 = λxσ1 .f (λk.k x) : σ1 → σ2
g♯
= Cσ2 ◦ ¬¬g =
g : σ1 → σ2
σ
λm.µβ 2 .m (λxσ1 .[β](g x))
: ¬¬σ1 → σ2 focal
♯
♭
Proposition 6.1. g♯ = g for any g : σ1 → σ2 , while f ♭ = f holds for f : ¬¬σ1 → σ2 if
and only if f is focal.
6.2. Falsity as a focally initial object. Now we shall proceed to reason about impredicative encodings in λµ2. The first example is the falsity ⊥ = ∀X.X.
First, we note that Aσ = λx⊥ .x σ : ⊥ → σ is focal. The parametricity on ⊥ says x ⊥∗ x
for any x : ⊥. Since hAσ i : ⊥ ↔ σ, we have x ⊥ hAσ i x σ, i.e. Aσ (x ⊥) = x ⊥ σ = x σ. By
extensionality we get x = x ⊥ for x : ⊥.
Now suppose that g : ⊥ → σ is focal. Again by the parametricity on ⊥ we know x ⊥∗ x
for any x : ⊥, hence x ⊥ hgi x σ. Thus g (x ⊥) = x σ; but x = x ⊥, so we have g x = x σ,
hence g = λx⊥ .x σ = Aσ .
So we conclude that Aσ is the unique focal map from ⊥ to σ. This means that ⊥ is
initial in the focus.
6.3. Focally initial algebra. As in λ2, there is a fairly standard encoding
µX.F [X] = ∀X.(F [X] → X) → X
foldσ = λaF [σ]→σ .λxµX.F [X] .x σ a : (F [σ] → σ) → µX.F [X] → σ
in = λy.ΛX.λkF [X]→X .k (F [foldX k] y) : F [µX.F [X]] → µX.F [X]
for which the following diagram commutes (just by β-axioms).
F [µX.F [X]]
in -
F [fold a]
µX.F [X]
fold a
?
F [σ]
a
?
- σ
Therefore in is a weak initial F -algebra. However, as we noted before, in is not an initial
F -algebra — in fact it is not even an isomorphism. By applying the focal decomposition
16
MASAHITO HASEGAWA
above, we obtain the commutative diagram
¬¬F [µX.F [X]]
¬¬F [fold a♭ ]
in♯-
µX.F [X]
fold a♭
?
¬¬F [σ]
?
- σ
a
for any focal a : ¬¬F [σ] → σ. We show that fold a♭ is the unique focal map making this
diagram commute, thus in♯ is an initial ¬¬F [−]-algebra in the focus.
We sketch a proof which is fairly analogous to that for the corresponding result in
parametric λ2 as given in [1]. First, from the parametricity on µX.F [X] we obtain that
F [σ1 ]
a-
F [h]
h
?
F [σ2 ]
b
µX.F [X]
σ1
?
- σ2
implies
folda
||
σ1
h
?
µX.F [X]
?
- σ2
fold b
whenever h is focal. We also have M (µX.F [X]) in = M for any M : µX.F [X] as a corollary
(thanks to extensionality). By combining these observations, now we have the desired result.
That is, if h : µX.F [X] → σ is focal and satisfies h ◦ in♯ = a ◦ ¬¬F [h], then
foldσ a♭ x = h (foldµX.F [X] in x)
= h (x (µX.F [X]) in)
= hx
so by extensionality we conclude foldσ a♭ = h. This also implies that in♯ is an isomorphism,
with the inverse given by fold¬¬µX.F [X] (¬¬F [in]).
As a special case, by letting F be a constant functor, we obtain isomorphisms between
(σ → ⊥) → ⊥ and ∀X.(σ → X) → X where X is not free in σ. With some further
calculation we see that in♯ = λm.ΛX.λkσ→X .µαX .m (λxσ .[α](k x)) is the inverse of λn.n ⊥ :
(∀X.(σ → X) → X) → (σ → ⊥) → ⊥. We will see more about this isomorphism in Section
7.
6.4. The type of Church numerals. We conclude this section by a remark on the type
of Church numerals N = ∀X.X → (X → X) → X. Recall that, in λ2 with parametricity,
N is an initial algebra of ∀X.X → (− → X) → X ≃ 1 + (−), i.e. a natural numbers object,
whose closed inhabitants are equal to the Church numerals Sn O which can be given by, as
usual,
O = ΛX.λxX f X→X .x
: N
S = λnN .ΛX.λxX f X→X .f (n X x f ) : N → N
It is no longer true in λµ2, as observed by Parigot, as there are closed inhabitants which
are not equal to Church numerals, e.g.
µαN .[α](S (µβ N .[α]O)) = ΛX.λxX f X→X .µαX .[α](f (µβ X .[α]x)) : N
In contrast, N in λµ2 with focal parametricity is a focally initial algebra of ∀X.X → (− →
X) → X ≃ ⊥ → (− → ⊥) → ⊥; this can be shown in the same way as the case of focally
RELATIONAL PARAMETRICITY AND CONTROL
17
initial algebras. Spelling this out, we have a focal map in : (⊥ → (N → ⊥) → ⊥) → N,
and for any focal g : (⊥ → (σ → ⊥) → ⊥) → σ there exists a unique focal foldσ g : N → σ
making the following diagram commute.
⊥ → (N → ⊥) → ⊥
in -
N
⊥→(foldσ g→⊥)→⊥
foldσ g
?
⊥ → (σ → ⊥) → ⊥
g
?
- σ
To see this, it is useful to observe the following bijective correspondence (a variant of the
focal decomposition): given focal g : (⊥ → (σ → ⊥) → ⊥) → σ we have
go = g (λx⊥ kσ→⊥ .x)
: σ
gs = λy σ .g (λx⊥ kσ→⊥ .k y) : σ → σ
and conversely, for a : σ and f : σ → σ we have a focal map
ϕa,f = λm⊥→(σ→⊥)→⊥ .µασ .m ([α]a) (λy σ .[α](f y)) : (⊥ → (σ → ⊥) → ⊥) → σ
It follows that (ϕa,f )o = a and (ϕa,f )s = f hold for any a and f , while ϕgo ,gs = g for any
focal g. Now we define
foldA g = λnN .n A go gs : N → A
in
= ϕO,S
: (⊥ → (N → ⊥) → ⊥) → N
It then follows that the diagram above commutes — and the focal parametricity implies
that foldA g is the unique such focal map.
7. A general characterisation
So far, we concentrated on the relational parametricity for λµ2. One may feel that
this story is very specific to the case of λµ2, or of the first-class continuations, and is not
immediately applicable to other computational effects.
In this section we describe an alternative characterisation of the focus, which makes
sense in any extension of λ2. Namely, we show that, any λ2-theory is equipped with a monad
L, such that each type is equipped with an algebra structure — and then see that, in the
case of λµ2 with focal parametricity, this monad L is isomorphic to the double-negation
(continuation) monad, and focal maps are precisely the algebra maps of the monad L.
This suggests a natural generalisation of this work to a theory of parametricity for general
computational effects.
7.1. A monad on λ2. Let Lσ = ∀X.(σ → X) → X (with no free X in σ), and define
ησ
= λxσ .ΛX.λkσ→X .k x
: σ → Lσ
2
µσ
= λz L σ .ΛX.λkσ→X .z X (λy Lσ .y X k) : L2 σ → Lσ
L(f ) = λy Lσ1 .ΛX.λhσ2 →X .y X (h ◦ f )
: Lσ1 → Lσ2 (f : σ1 → σ2 )
Proposition 7.1. On the term model of any λ2-theory, (L, η, µ) forms a monad.
18
MASAHITO HASEGAWA
One might think that this is trivial as Lσ is isomorphic to σ when we assume the
standard parametricity. This is not always the case however, as we have already seen,
Lσ ≃ (σ → ⊥) → ⊥ in the focally parametric λµ2.
Proposition 7.2. ασ = λy Lσ .y σ (λxσ .x) : Lσ → σ is an algebra of the monad (L, η, µ).
Thus each σ is canonically equipped with an algebra structure ασ . Again one may think
that this is trivial, as under the standard parametricity ασ is just an isomorphism with ησ
being an inverse. However, again it is not the case in a non-trivial λµ2-theory.
Now we define the notion of linear maps in terms of the monad L and the canonical
algebras ασ — this is close to what we do in (axiomatic) domain theory for characterising
the strict maps, and also in control categories for characterising the focal maps.
Definition 7.3. f : σ1 → σ2 is linear when it is an algebra morphism from ασ1 to ασ2 , i.e.
f ◦ ασ1 = ασ2 ◦ L(f ) holds.
Lσ1
L(f )
- Lσ2
ασ1
ασ2
?
σ1
That is, f is linear when
f
?
- σ2
f (M σ1 (λxσ1 .x)) = M σ2 f
holds for any M : Lσ1 . We may write f : σ1 ⊸ σ2 for a linear f : σ1 → σ2 . Under the
standard parametricity every f : σ1 → σ2 is linear, while for focal parametricity on λµ2
we have that linear maps are precisely the focal maps (see below). In passing, we note the
following interesting observation.
Proposition 7.4. In a λ2-theory, the following conditions are equivalent.
(1) algebras on σ1 → σ2 and ∀X.σ are determined in the pointwise manner, i.e.
ασ1 →σ2 = λf L(σ1 →σ2 ) .λxσ1 .ασ2 (L(λgσ1 →σ2 .g x) f )
α∀X.σ = λxL(∀X.σ) .ΛX.ασ (L(λy ∀X.σ .y X) x)
(2) λxσ1 →σ2 .x N is linear for any N : σ1 , and λx∀X.σ .x σ1 is linear for any σ and σ1 .
Note that they are very close to the “additional axioms” for λµ2 discussed in Section 5.
Also note that, if a λ2-theory satisfies one of these conditions, µσ and αLσ agree for every
σ. and we have a “linear decomposition” correspondence between the maps of σ1 → σ2 and
the linear maps of Lσ1 → σ2 .
7.2. Focal maps as algebra maps. Now we shall consider the double-negation monad
¬¬σ = (σ → ⊥) → ⊥ on λµ2 with focal parametricity.
Proposition 7.5. In a focally parametric λµ2-theory, Cσ : ¬¬σ → σ is an algebra of the
double-negation monad.
Corollary 7.6. f : σ1 → σ2 is focal if and only if it is an algebra map from Cσ1 to Cσ2 .
Proposition 7.7. The monad (L, η, µ) is isomorphic to the double negation monad in the
≃
focally parametric λµ2, with λxLσ .x ⊥ : Lσ → ¬¬σ.
RELATIONAL PARAMETRICITY AND CONTROL
19
Proposition 7.8. The following diagram commutes in a focally parametric λµ2-theory:
λxLσ .x ⊥-
Lσ
@
@
R
@
ασ
¬¬σ
Cσ
σ
Corollary 7.9. f : σ1 → σ2 is linear if and only if it is focal.
Thus a focal map in a focally parametric λµ2-theory can be characterised just in terms
of the monad L which is defined for arbitrary λ2-theory.
We believe that the monad L deserves much attention. It has been considered trivial,
but now we know that it does characterise an essential notion (focus) in the case of relational
parametricity under the presence of control feature. In fact, the story does not end here;
under the presence of non-termination or recursion, L behaves like a lifting monad — indeed
it is a lifting in the theory of linear parametricity, because
Lσ = ∀X.(σ → X) → X = ∀X.!(!σ ⊸ X) ⊸ X ≃ !σ
where the last isomorphism follows from the fact that ∀X.!(F [X] ⊸ X) ⊸ X gives an
initial algebra of F , cf. [4].
These observations suggest that there exists a general framework similar to (axiomatic
or synthetic) domain theory where the lifting monad can be replaced by any strong monad
— a continuation monad for example — on which a theory of parametricity for general
computational effects can be built. Recently, Alex Simpson has made a progress in this
direction, by developing a two-level polymorphic type theory (for interpreting types and
algebras of a monad) in a constructive universe [38]. His work fits very well with the case
of linear parametricity for recursion; it is plausible that it also explains the case of focal
parametricity for first-class control.
8. Conclusion and future work
We have studied the relational parametricity for λµ2, first by considering the CPS
translation into a parametric fragment of λ2, and then by directly giving a constrained
parametricity for λµ2. The later, which we call “focal parametricity”, seems to be a natural
parametricity principle under the presence of first-class controls — in the same sense that
linear parametricity works under the presence of recursion and non-termination.
There remain many things to be addressed in future. In the previous section, we already
discussed a research direction towards a relational parametricity for general effects. Below
we shall briefly mention some future work more closely related to the main development of
this paper.
Firstly, we are yet to complete the precise comparison between focal parametricity on
λµ2 and the parametricity on the CPS target calculus. This involves some subtle interaction
between parametricity and a technical condition (equalising requirement).
Secondly, we should study focal parametricity for extensions of λµ2. As we observed,
λµ2 with focal parametricity does not have many popular datatypes, e.g. cartesian products,
and classical disjunction types which however can be added with no problem. Adding
general initial algebras is problematic (having an initial object already means inconsistency),
but it might be safe to add certain carefully chosen instances. On the other hand, final
coalgebras seem less problematic, though a generic account for them in λµ2 is still missing.
20
MASAHITO HASEGAWA
Perhaps we also need to consider the CPS translation of such datatypes (cf. [3]) in a
systematic way.
An interesting topic we have not discussed in this paper is the Filinski-Selinger duality
[6, 36] between call-by-name and call-by-value calculi with control primitives. In fact it is
straightforward to consider its second-order extension: in short, universal quantifiers in callby-name (as studied in this paper) amount to existential quantifiers in call-by-value. We
are not sure if the call-by-value calculus with existential quantifiers itself is of some interest.
However, it can be a good starting point to understand the call-by-value parametric polymorphism (possibly with computational effects), from both syntactic and semantic aspects.
In particular, it should provide new insights on the famous difficulty of accommodating
first-class continuations in ML type system [11].
Finally, we also should consider if there is a better (ideally semantic) formulation of
focal relations. In this paper we only consider those coming from focal maps, but it seems
natural to regard a subalgebra (of the double-negation monad) of Cσ1 ×σ2 as a focal relation
between σ1 and σ2 , where we assume the presence of cartesian product σ1 × σ2 . This looks
very closely related to Pitts’ ⊤⊤-closed relations for λ2 with recursion [28].
Acknowledgement
I thank Ken-etsu Fujita for discussions and cooperations related to this work. I am also
grateful to Ryu Hasegawa, Paul-André Melliès and Alex Simpson for comments, discussions
and encouragements.
References
[1] M. Abadi, L. Cardelli, and P.-L. Curien. Formal parametric polymorphism. Theoret. Comput. Sci.
121:9–58, 1993.
[2] Z.M. Ariola and H. Herbelin. Minimal classical logic and control operators. In Proc. Automata, Languages and Programming, Springer Lecture Notes in Comput. Sci. 2719, pp.871–885, 2003.
[3] G. Barthe and T. Uustalu. CPS translating inductive and coinductive types. In Proc. Partial Evaluation
and Semantics-Based Program Manipulation, pp.131–142, 2002.
[4] G.M. Bierman, A.M. Pitts, and C.V. Russo. Operational properties of Lily, a polymorphic linear lambda
calculus with recursion. In Proc. Higher Order Operational Techniques in Semantics, Electronic Notes
in Theoretical Computer Science 41, 2000.
[5] B.P. Dunphy. Parametricity as a Notion of Uniformity in Reflexive Graphs. PhD thesis, University of
Illinois, 2002.
[6] A. Filinski. Declarative continuations: an investigation of duality in programming language semantics.
In Proc. Category Theory and Computer Science, Springer Lecture Notes in Comput. Sci. 389, pp.224–
249, 1989.
[7] K. Fujita. Galois embedding from polymorphic types into existential types. In Proc. Typed Lambda
Calculi and Applications, Springer Lecture Notes in Comput. Sci. 3461, pp.194–208, 2005.
[8] C. Führmann. Varieties of effects. In Proc. Foundations of Software Science and Computation Structures,
Springer Lecture Notes in Comput. Sci. 2303, pp.144–159, 2002.
[9] J.-Y. Girard. Interprétation fonctionnelle et élimination des coupures de l’arithmétique d’ordre
supérieur. Thèse d’Etat, Université Paris VII, 1972.
[10] J.-Y. Girard. Linear logic. Theoret. Comp. Sci. 50:1–102, 1987.
[11] B. Harper, B.F. Duba and D. MacQueen. Typing first-class continuations in ML. J. Funct. Programming
3(4):465–484.
[12] M. Hasegawa. Semantics of linear continuation-passing in call-by-name. In Proc. Functional and Logic
Programming, Springer Lecture Notes in Comput. Sci. 2998, pp.229–243, 2004.
RELATIONAL PARAMETRICITY AND CONTROL
21
[13] M. Hasegawa, Relational parametricity and control (extended abstract). In Proc. Logic in Computer
Science, pp.72–81, 2005.
[14] M. Hasegawa and Y. Kakutani. Axioms for recursion in call-by-value. Higher-Order and Symbolic Comput. 15(2/3):235–264, 2002.
[15] R. Hasegawa. Categorical data types in parametric polymorphism. Math. Struct. Comp. Sci. 4(1):71–
109, 1994.
[16] M. Hofmann and T. Streicher. Completeness of continuation models for λµ-calculus. Inf. Comput.
179(2):332–355, 2002.
[17] B. Jacobs. Categorical Logic and Type Theory. Elsevier, 1999.
[18] Y. Kakutani. Duality between call-by-name recursion and call-by-value iteration. In Proc. Computer
Science Logic, Springer Lecture Notes in Comput. Sci. 2471, pp.506–521, 2002.
[19] Y. Kakutani and M. Hasegawa. Parameterizations and fixed-point operators on control categories.
Fundam. Inform. 65(1/2):153–172, 2005.
[20] J. Lambek and P. Scott (1986) Introduction to Higher-order Categorical Logic. Cambridge University
Press.
[21] R. Matthes. Parigot’s second order λµ-calculus and inductive types. In Proc. Typed Lambda Calculi and
Applications, Springer Lecture Notes in Comput. Sci. 2044, pp.329–343, 2001.
[22] E. Moggi. Notions of computation and monads. Inf. Comput. 93(1):55–92, 1991.
[23] K. Nakazawa and M. Tatsuta. Strong normalization proof with CPS-translation for second order classical
natural deduction. J. Symb. Log. 68(3):851–859, 2003. Corrigendum: J. Symb. Log. 68(4):1415–1416,
2003.
[24] C.-H.L. Ong. A semantic view of classical proofs: type-theoretic, categorical, and denotational characterizations (preliminary extended abstract). In Proc. Logic in Computer Science, pp.230–241, 1996.
[25] C.-H.L. Ong and C.A. Stewart. A Curry-Howard foundation for functional computation with control.
In Proc. Principles of Programming Languages, pp.215–227, 1997.
[26] M. Parigot. λµ-calculus: an algorithmic interpretation of classical natural deduction. In Proc. Logic
Programming and Automated Reasoning, Springer Lecture Notes in Comput. Sci. 624, pp.190–201,
1992.
[27] M. Parigot. Proofs of strong normalisation for second order classical natural deduction. J. Symb. Log.
62(4):1461–1479, 1997.
[28] A. Pitts, Parametric polymorphism and operational equivalence. Math. Struct. Comp. Sci. 10:321–359,
2000.
[29] G.D. Plotkin. Call-by-name, call-by-value, and the λ-calculus. Theoret. Comput. Sci. 1(1):125–159,
1975.
[30] G.D. Plotkin. Type theory and recursion (extended abstract). In Proc. Logic in Computer Science,
pp.374, 1993.
[31] G.D. Plotkin and M. Abadi. A logic for parametric polymorphism. In Proc. Typed Lambda Calculi and
Applications, Springer Lecture Notes in Comput. Sci. 664, pp.361–375, 1993.
[32] A.J. Power and E. Robinson. Premonoidal categories and notions of computation. Math. Struct. Comp.
Sci. 7(5):453–468, 1997.
[33] J.C. Reynolds. Towards a theory of type structure. In Proc. Colloque sur la Programmation, Springer
Lecture Notes in Comput. Sci. 19, pp.408–425, 1974.
[34] J.C. Reynolds. Types, abstraction and parametric polymorphism. In Proc. IFIP 9th World Computer
Congress, Information Processing 83, pp.513–523, 1983.
[35] A. Sabry. Note on axiomatizing the semantics of control operators. Tech. Rep. CIS-TR-96-03, University
of Oregon, 1996.
[36] P. Selinger. Control categories and duality: on the categorical semantics of the lambda-mu calculus.
Math. Struct. Comp. Sci. 11(2):207–260, 2001.
[37] P. Selinger. Some remarks on control categories. Manuscript, 2003.
[38] A. Simpson. Relational parametricity for computational effects. Manuscript, 2006.
[39] T. Streicher and B. Reus. Classical logic, continuation semantics and abstract machines. J. Funct.
Program. 8(6):543–572, 1998.
[40] I. Takeuti. An axiomatic system of parametricity. Fundam. Inform. 33(4):397–432, 1998.
[41] P. Taylor. Sober spaces and continuations. Theory and Applications of Categories 10(12):248–300, 2002.
22
MASAHITO HASEGAWA
[42] H. Thielecke. Categorical Structure of Continuation Passing Style. PhD thesis, University of Edinburgh,
1997.
[43] H. Thielecke. Answer type polymorphism in call-by-name continuation passing. In Proc. European Symposium on Programming, Springer Lecture Notes in Comput. Sci. 2986, pp.279–293, 2004.
[44] P. Wadler. Theorems for free! In Proc. Functional Programming Languages and Computer Architecture,
pp.347–359, 1989.
This work is licensed under the Creative Commons Attribution-NoDerivs License. To view
a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a
letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
| 2cs.AI
|
AFIF4 : Deep Gender Classification based on
AdaBoost-based Fusion of Isolated Facial Features and
Foggy Faces
arXiv:1706.04277v5 [cs.CV] 18 Nov 2017
Mahmoud Afifia,b , Abdelrahman Abdelhameda,b,∗∗
a Department
of Electrical Engineering and Computer Science, Lassonde School of
Engineering, York University, Canada
b Faculty of Computers and Information, Assiut University, Egypt
Abstract
Gender classification aims at recognizing a person’s gender. Despite the high
accuracy achieved by state-of-the-art methods for this task, there is still room
for improvement in generalized and unrestricted datasets. In this paper, we advocate a new strategy inspired by the behavior of humans in gender recognition.
Instead of dealing with the face image as a sole feature, we rely on the combination of isolated facial features and a holistic feature which we call the foggy
face. Then, we use these features to train deep convolutional neural networks
followed by an AdaBoost-based score fusion to infer the final gender class. We
evaluate our method on four challenging datasets to demonstrate its efficacy in
achieving better or on-par accuracy with state-of-the-art methods. In addition,
we present a new face dataset that intensifies the challenges of occluded faces
and illumination changes, which we believe to be a much-needed resource for
gender classification research.
Keywords: gender classification, deep convolutional neural networks, face
image dataset
∗ Corresponding
author
author
Email addresses: [email protected] (Mahmoud Afifi), [email protected]
(Abdelrahman Abdelhamed)
∗∗ Corresponding
Preprint submitted to Elsevier
November 21, 2017
1. Introduction
Gender classification is undoubtedly a simple task for humans, however, it
is still an active research problem that draws the attention of many researchers
in various fields, including computer vision and machine learning, with many
applications [1, 2], such as visual surveillance, intelligent human-computer interaction, social media, demographic studies, and augmented reality.
Although human faces are a powerful visual biometric feature, some facial
features have semantic structures that may mislead the classification process
relying on facial images as we show later in Section 3. In this paper, we advocate
a different strategy to address the gender classification problem by mimicking
the human behavior in gender recognition. We started by conducting some
user studies to obtain a good grasp on how facial features can sometimes be
unreliable in gender recognition. Then, we show how the human behavior in
gender recognition can help us decide which facial features are more reliable. To
this end, instead of dealing with the raw face images, we extract a few reliable
facial features, then we input each of these features to a deep convolutional
neural network (CNN) that initially classifies each visual feature to be belonging
to either male or female. Finally, we use an AdaBoost-based score fusion to get
the final classification decision based on the prediction score of each separate
facial feature (Section 3). To evaluate the efficacy of our method, we apply it
to four widely-used gender classification datasets, what reveals that our method
achieves better, or at least on-par, results than many state-of-the-art methods
(Section 4).
With the state-of-the-art gender classification methods achieving compelling
accuracy on the existing benchmark datasets, we believe that there is a need for
more datasets focusing on more challenging scenarios for gender classification.
So, in addition to the proposed method, we also propose a new challenging
face dataset where we focus mainly on challenging cases such as occluded and
badly illuminated faces. We also evaluate our method on this proposed dataset,
revealing how it can be more challenging than other existing datasets. The rest
2
of the paper is as follows: in Section 2, we provide a quick review on key gender
classification methods and discuss some of the common shortcomings. In Section
3, we discuss in depth our proposed method. Then, we present our proposed
face image dataset and experimental evaluation of our method in Section 4,
followed by a brief conclusion in Section 5.
2. Related Work
Vision-based gender classification methods are usually based on extracting
features from the given face image then use these features to train a classifier
that outputs the predicted gender. Such methods, can be divided into two main
categories: 1) geometric-based, and 2) appearance-based methods.
The geometric-based techniques extract and utilize geometric features from
the given face image to predict the gender. Burton et al. [3] presented a gender
classification technique that relies on 73 facial points and uses discriminant
analysis of point-to-point distances to infer the gender. Hands were used as
biometric traits by Amayeh et al. [4] where the extracted geometric features
of different parts of the hand were used for gender discrimination. The main
issue with such methods is that they require highly precise extraction of the
geometric features to obtain good classification accuracy.
On the other hand, appearance-based methods rely on extracting features
from either or both of: i) the whole face image (holistic features) and ii) regions
of the face image (local features). Li et al. [5] introduced a method based on five
individual facial features in addition to the hair and clothing of the person then
used multiple support vector machine (SVM) classifiers to classify the gender
based on the individual features. By combining this elaborated visual information using different five fusion approaches, they improved the classification
accuracy even more. Nevertheless, the clothing and hair information may mislead the classifier, since the lack of context-based representation can be tricky
even for humans.
Combining both geometric-based and appearance-based features, Mozaf-
3
fari et al. [6] presented a technique that extracts both geometric-based and
appearance-based features using three alternative methods: discrete cosine transform, local binary pattern (LBP), and geometrical distance. Tapia et al. [7]
proposed a technique that uses fusion of local visual features where the feature
selection is based on the information theory. They used the mutual information
to measure the similarity of pixel intensities in order to reduce redundant features. They applied this measure on three different features: pixel intensities,
shape, and local image texture that was described using LBPs.
Rai et al. [8] presented a gender classification system that uses local visual
information extracted from the Region of Interest (ROI) which is determined
manually using three selected points. The ROI is divided into grid sub-images
that were used to generate Gabor space by applying 2D Gabor filter with six
orientations on each sub-image in order to reduce the sensitivity to light variations. The reduced feature vector is used as an input to SVM classifier that
distinguishes between male and female local features.
Hadid et al. [9] showed the efficiency of using LBPs in the gender and texture
classification. Recently, Castrillón-Santana et al. [10] presented a comparative
study among ten local feature (holistic and local) descriptors and three fusion
strategies for gender classification using two datasets, namely EGA [11] and
Groups [12]. They reported that local salient patterns (LSP) [13] and histogram
of oriented gradients (HOG) [14] achieve the best accuracy using holistic visual
features, while local phase quantization (LPQ) [15] with SVM attains the best
accuracy using local visual features. Moeini and Mozaffari [16] proposed to learn
separate dictionaries of male and female features, extracting 64 feature vectors
of the face image using LBP. Then, a sparse representation-based classifier is
used in the classification process, reporting state-of-the-art accuracy.
On the other end, deep neural networks are becoming increasingly ubiquitous in many classification problems, according to the achieved remarkable
improvements on accuracy. Levi and Hassner [17] classified both gender and
age via a simple Convolutional Neural Network (CNN) that was applied to the
Adience benchmark [18] for age and gender classification in a holistic manner.
4
A local CNN was used by Mansanet et al. [19] where they utilized Sobel filter
in order to extract the local patches while taking into account the location of
each patch. In order that the trained CNN obtains high accuracy with face
images under occlusions, Juefei-Xu et al. [20] utilized multiple levels of blurring
to train a deep CNN in a progressive way.
From the above quick review, we can see that most of the prior work in gender
classification was depending on extracting large number of local features per
image, hand-crafted features, or unreliable holistic features. On the contrary,
in our approach, we avoid such issues by using only four highly-discriminative
local features and one holistic feature, and we combine these features with the
classification power of deep CNNs to achieve state-of-the-art, or at least on-par,
gender classification accuracy. As we discussed in the introduction, our choice
of facial features is mainly based on the findings from the user studies we carried
out trying to understand how humans behave in the gender recognition process.
A detailed description of these user studies and our full approach follows in
Section 3.
3. Our Methodology
In this section, we will discuss in detail our approach to addressing the gender classification problem. First, we discuss the user studies carried out to help
us decide which facial features (local and holistic) are more discriminative for
gender classification. Then, we show how we prepare the face patches using a deformable part-based model as proposed by Yu et al. [21]. After that, we discuss
the training of CNNs to classify the facial patches and get initial classification
decisions. Finally, we present an adapted AdaBoost-based fusion mechanism of
initial classification labels leading to the final classification decision.
3.1. A quick study of human behavior in gender recognition
To study how the gender discrimination is performed by humans, we carried
out two experiments. For these experiments, we used 200 images from the
5
Labeled Faces in the Wild (LFW) dataset [22], containing both male and female
faces. The ground truth classes (male or female) was based on the attribute
classifiers presented by Kumar et al. [23].
In the first experiment, we wanted to see how a human decides on the gender
of a face image, especially when the facial features are not very discriminative.
To do that, we showed 100 images to 5 different volunteers (20 images per
volunteer) in two stages. In the first stage, each volunteer was asked to watch 10
different images and classify each one as male or female. Before doing the second
stage, the volunteers were asked to be ready to explain what they would do once
they are uncertain about the gender of the face. At the end of the experiment,
almost all of the volunteers reported that the first thing they did was to look at
the face region and facial features (eyes, nose, ears, etc.), if they cannot precisely
determine the gender, they look at the whole image and think about all of the
visual information (clothing, hair, accessories, etc.) surrounding the face in
order to make their final decision. It is worth noting that the classification
accuracy in this experiment was 96%.
From the first experiment, we notice that visual information surrounding the
face in an image are of high importance in classifying the gender of the face,
especially when the facial features are quite ambiguous. That led us to conduct
the second experiment, where we wanted to see which is more discriminative
in deciding the gender from a human perspective: the facial features or the
visual information surrounding the face? To achieve this, we used two types
of images: 1) cropped face images that contain only the facial features, and 2)
foggy face images that contain the whole visual information surrounding the
face while the face region being heavily blurred out, so that a volunteer will
depend only on the surrounding visual information to decide on the gender.
Figure 1 shows some examples of the two types of images. Then, we prepared
an on-line subjective test that asks volunteers to guess the image of a male
among a set of female images and vice versa, i.e., to guess the image of a female
among a set of male images. Each question contained either 5 or 10 images
from either the cropped or the foggy face images. There were 70 volunteers who
6
(a) There is a single image of a
FEMALE in these cropped-face
images, guess which one is it?
(b) There is a single image of a
MALE in these cropped-face
images, guess which one is it?
(c) There is a single image of
a FEMALE in these foggyface images, guess which one
is it?
(d) There is a single image
for a MALE in these foggyface images, guess which one
is it?
Figure 1: Sample questions from our user studies. (a) and (b) are asking the users to guess
a male/female image among a set of female/male images using cropped-face images. (c) and
(d) are the same questions using foggy-face images. All images are taken from the Labeled
Faces in the Wild (LFW) dataset [22].
accomplished this experiment using 100 images. Additionally, the volunteer
is asked to comment on which type of face images was easier to recognize its
gender. As a result, we got classification accuracy of 69.40% for the cropped
face images and a higher accuracy of 88.09% for the foggy face images. Also,
most of the volunteers reported that the foggy face images were easier to classify
than the cropped face images.
From the above experiments, we notice that, beside the high importance of
isolated facial features, the visual information from the general look of persons
also possesses an important role in the classification process regardless of the
visibility of facial features. That was also noticed in prior work by Lian and Lu
[24]. As a result, we decided to build our approach to gender classification by
combining both isolated facial features and general appearance of the subject
in the classification process, as we will discuss in Section 3.2.
7
3.2. Facial features preparation
Before extracting the facial features and to improve the face detection process involved in our approach, we preprocess the images by applying lightinginvariant enhancement techniques. This was inspired from the work by Han et
al. [25]. We apply the single scale retinex (SSR) presented by Jobson et al.
[26], in which the lighting-invariant enhanced image ISSR (the retinex image) is
generated by subtracting the estimated global illumination from the given face
image I in the log space, as in the following equation:
ISSR (x, y) = log(I(x, y)) − log(F (x, y) ∗ I(x, y)),
(1)
where (x, y) represents the spatial location of a pixel in the image, F is the
Gaussian low-pass filter given by
F (x, y) = K e−(x
in which K is determined such that
RR
2
+y 2 )/G2
,
(2)
F (x, y) dx dy = 1 and G is the Gaussian
surround contrast.
In the next step, we scan the input image I to fit the cascaded deformable
shape model (CDSM) proposed by Yu et al. [21] in order to detect and extract
the face regions. Fitting a CDSM requires the maximization of a scoring function
that is based on both local appearance and shape optimization. This score
function represents how well the estimated facial landmark positions are aligned
with the CDSM. In order to detect multiple faces in a single image (as in the
case of the Groups dataset), we repeat the following 2-step procedure: 1) we
apply the CDSM to detect a face; 2) we mask out the detected face region by
a single-color rectangle and repeat step 1 again on the same image until no
more faces are detected. In the case that applying the CDSM on the original
image I fails, we use the SSR image ISSR instead. Finally, we use the estimated
landmarks of eyes, nose, and mouth, to extract a separate patch for each visual
feature. Figure 2 shows an example of the process of extracting facial patches.
To generate the foggy face images, first, the face region is detected using the
above mentioned procedure, then the surrounding facial landmarks are used to
8
Left eye
(a) Input face image 𝐼𝐼
Nose
(b) Illumination invariant
image 𝐼𝐼𝑆𝑆𝑆𝑆𝑆𝑆
Right eye
Mouth
Foggy face
(c) Selected facial landmarks (d) Extracted patches of eyes,
nose, mouth, and foggy face
Figure 2: The process of extracting facial features including the foggy face. (a) is the input
image. (b) is the illumination-invariant image generated by the single scale retinex (SSR)
method [26]. (c) is the selected facial landmarks from the face detection process by fitting
the cascaded deformable shape model (CDSM) [21]. (d) is the extracted features: eyes,
nose, mouth, and foggy face which is generated by applying the Poisson image editing (PIE)
technique [27].
define an unknown region Ω which we feed into a Poisson image editing (PIE)
equation [27]:
ZZ
|∇f |2
arg min
f
with f |∂Ω = f ∗ |∂Ω ,
(3)
Ω
where ∇f is the first derivative of the unknown scalar function over Ω in the
given image I. By omitting the suggested guidance used by [27], the foggy face
image is generated by solving Equation 3. Figure 2d shows an example of a
generated foggy face image.
3.3. Facial feature classification using CNNs
Once we have all the facial features ready, we feed each patch as an independent input to a pre-trained CNN that is dedicated to classifying this biometric
trait. In other words, we train four separate CNNs for the four separate facial
features: foggy face, eyes, nose, and mouth. We adapted the Caffe reference
model, proposed by Jia et al. [28], to solve the binary classification problem of
each visual patch. Our adapted CNN architecture consists of five convolutional
layers and three fully-connected layers. The first convolutional layer contains
96 (11×11) convolutional filters and uses stride size equal to 4 to reduce the
computational complexity. The second layer uses one stride with 256 (5×5)
convolutional filters. The last three convolutional layers use one stride with 9
(3×3) filters. The final softmax layer responds with two possible output classes,
9
representing either male or female. The CNN is trained using stochastic gradient
descent and back-propagation [29] over 1000 iterations.
3.4. Classification score fusion
Up to now, we have four separate CNNs that give us four independent gender classification scores based on four separate facial features. To fuse the
four independent classification scores, we apply an AdaBoost-based score fusion mechanism as follows. Let NL be one of the five pre-trained CNNs that
gives a decision c, such that c ∈ {MALE = 1, FEMALE = −1}, and sL is
the corresponding prediction score given by the softmax function of NL , where
L ∈ {face, eyes, nose, mouth} and SL = c(sL ). We use the foggy face score Sf ace
that represents the prediction score of the foggy face multiplied by the estimated
class as a holistic score that is combined with all other possible feature scores.
Since we have four more scores (for left eye, right eye, nose, and mouth), we get
15 different combinations of scores, which is the summation given by
X |L|
, j ∈ {1, . . . , |L|},
j
j
(4)
where |L| is the cardinality of the set of features. Then, we train AdaBoost
classifiers [30] using the combination vectors to get the estimated class yˆi of each
combined ith vector, where i ∈ {1, . . . , 15}. For each vector v~i =< Sface , · · · >,
the predicted class yˆi is given by
T
X
yˆi = sign(
αt Ct (~
vi )),
(5)
t=1
where Ct (~
vi ) is the estimated class of the given score vector vi using the tth weak
classifier, αt is the output weight of the classifier, and T is the number of weak
classifiers. Eventually, the suggested labels are combined into a single vector
~
Ŷ =< yˆ1 , yˆ2 , . . . , yˆn > to train a linear discriminant classifier that determines
the final class of the face image. An overview of our whole approach is illustrated
in Figure 3.
In this section, we have discussed our approach to the gender classification problem, from deciding on the features we used to the final classification
10
Initial
classification scores
and labels
Intermediate
classification
scores
(e) Final
classification
decision
(a) Input image
(d) 𝑁 = 15
AdaBoost classifiers
(b) Facial
features
(c) Pre-trained
CNNs
Figure 3: An overview of our whole approach for gender classification. (a) the input image.
(b) the extracted facial features (foggy face, eyes, nose, and mouth patches). (c) initial classification scores from 4 pre-trained convolutional neural networks (CNNs). (d) intermediate
classification decisions based on 15 weak classifiers, one classifier for each combination from
the initial scores. (e) the final classification decision from a linear discriminant classifier.
decision. In section 4, we present some experimental results to evaluate our approach and compare it against other state-of-the-art methods, showing its high
performance and efficacy.
4. Experimental Results
In this section, we demonstrate the efficacy of our approach through extensive evaluation against four widely-used benchmark datasets. Additionally, we
evaluate our approach against our new challenging dataset, the Specs of Faces
dataset.
4.1. Evaluation Setup
In our evaluation procedure, we use five-fold cross validation on all datasets
and report the mean of the accuracy values. As the suggested folds of some
datasets contain unbalanced number of male and female images, random images
are picked from the excessive group in order to have the same number of images
11
for both genders. We train the deep CNNs using feature patches of size 227×227
pixels, extracted from 75% of the training set. The AdaBoost classifiers are
trained thereafter by 60% of the rest of the training set using the prediction
scores of the pre-trained CNNs. At the final stage of training, the fusion classifier
is trained using the estimated classes reported by the AdaBoost classifiers over
the rest of the training set. Eventually, we test the entire algorithm using the
testing fold.
As the CNNs are usually susceptible to the overfitting problem using a limited number of images, we enlarged the number of training images 10 times
by generating more images through applying a set of operations depicted in
Figure 4. For each training image, we apply translation by 5 pixels along the
four border sides, then horizontally flip each of the four translated images and
the original image. The empty pixels that have been produced by the previous
operations are filled by the mean of the original training image to maintain the
equilibrium of original means over the training set.
4.2. Datasets
We have evaluated our method against four challenging datasets: the Labeled Faces in the Wild (LFW) [22], the Images of Groups dataset [12], the
Adience benchmark for age and gender classification [18], and the Face Recognition Technology dataset (FERET) [31]. Furthermore, we present a new dataset
of challenging face images and use it to evaluate our method. The proposed
dataset is denoted as the Specs on Faces (SoF) dataset.
Labeled Faces in the Wild (LFW). The LFW dataset [22] consists of 13,233
unconstrained face (250×250 pixels) images for different 5,749 persons (4,272
males and 1,477 females). In order to label the images based on gender, we
used the attribute values presented by Kumar et al. [23]. Each descriptive visual attribute Z is represented as a real value az : az ∈ R, where the magnitude
of az represents the degree of Z and the sign of az represents the category. In
the gender attribute, a positive sign refers to a male image and a negative sign
represents a female image. It is worth noting that there is a reported error rate
12
Figure 4: An example on how we enlarge the number of training images by applying small
translation on the original image along the four sides, then horizontally flip the four translated
images and the original image. The shown image is an eye patch from the proposed Specs on
Faces dataset.
(approximately 8.62%) in this classification. A straightforward way was used
to assign each face image to its gender label by applying a threshold based on
the sign of the gender attribute. However, there are some images whose gender
attributes lie on the boundaries (e.g. ±0.3); that leads to incorrect labels. To
handle that, we added another layer of separation for images whose magnitude
values are less than a threshold (e.g. 0.5). Then, we used the genderize.io1
API to estimate the gender based on the first name of each face image in the
LFW. Eventually, we manually reviewed each category of male and female images three times to completely eliminate any incorrect labels. We made this
accurate labeling of the LFW dataset available online2 . In our experiments, we
used 2,948 images from the LFW dataset (590 images on average for each fold).
1 https://genderize.io/
2 http://bit.ly/lfw-gender
13
Images of Groups dataset. The Groups dataset [12] contains 28,231 face
images that were extracted from the original 5,080 group images collected from
Flickr images. The Groups dataset is considered, in the literature, the most
challenging and complex dataset for the gender classification problem [32, 33,
34]. The experiments were carried out using 12,682 face images (2,536 images
on average for each fold).
Adience benchmark for age and gender classification. The Adience
benchmark [18] comprises 26,580 unconstrained face images gathered from Flickr
albums for 2,284 persons. The images include people with different head poses
and ages under various illumination conditions. The folds which have been used
in the experiments were picked randomly, where each fold contains 970 images
on average.
Face Recognition Technology (FERET). The FERET dataset [31] is widely
used to evaluate and develop facial recognition techniques. The dataset consists
of 14,126 images for 1199 different persons captured between 1993 and 1996.
There is a variety in face poses, facial expressions, and lighting conditions. In
2003, the high resolution (512× 768 pixels) color FERET was released which
has been used in the presented experiments. The total number of frontal and
near-frontal face images, whose pose angle lies between −45◦ and +45◦ , is 5,786
images (3,816 male images and 1,970 female images). We evaluated our approach using 5 folds of the FERET dataset (700 images were randomly picked
for each fold).
The Specs on Faces (SoF) dataset. Since one of the main problems in
gender classification is the face occlusions and illumination changes [5, 8], we
present a new dataset, the Specs on Faces (SoF)3 , that is devoted to these two
problems. We made the proposed dataset more challenging for face detection,
recognition, and classification, through capturing the faces under harsh illumination environments and face occlusions. The SoF comprises 2,662 original
images of size 640 × 480 pixels for 112 persons (66 males and 46 females) from
3 http://bit.ly/sof_dataset
14
Figure 5: Samples of an image for the same person from the Specs on Faces (SoF) data set
captured under different lighting directions.
different ages. The glasses are the common natural occlusion in all images of
the dataset. However, we added two more synthetic occlusions, for nose and
mouth, to each image.
The original images in the proposed SoF dataset are divided into two parts.
The first part contains 757 unconstrained face images in the wild for 106 different
persons whose head orientations approximately fall in the range of ±35◦ in yaw,
pitch, and roll. The images were captured in an unstructured manner over a long
period in several locations under indoor and outdoor illumination environments.
The second part contains 1905 images which are dedicated to challenging harsh
illumination changes. In order to get arbitrary indoor lighting conditions, 12
subjects were captured using a wheel-whirled lamp as the only light source in
the laboratory. The lamp is located above and spun around each subject to emit
light rays in random directions, see Figure 5 for an example. This idea is inspired
by the primitive version of the Light Stage system presented by Debevec et al.
[35]. The SoF dataset involves a handcrafted metadata that contains subject
ID, view (frontal/near-frontal) label, 17 facial feature points, face and glasses
rectangle, gender and age labels, illumination quality, and facial emotion for
each subject, see Figure 6 for an example of the metadata.
Moreover, to generate more challenging synthetic images, we applied three
image filters (Gaussian noise, Gaussian smoothing, and image posterization using Fuzzy logic) to the original images. All the generated images are categorized into three levels of difficulty (easy, medium, and hard). That enlarges the
number of images to be 42,592 images (26,112 male images and 16,480 female
images). Furthermore, the dataset comes with a metadata that describes each
subject from different aspects. Figure 7 shows a sample image from the two
15
Figure 6: Samples of the Specs on Faces (SoF) dataset. The lower part shows a metadata
example for the shown image. The green circles represent the 17 facial landmarks, the white
rectangle is the glasses rectangle, and the yellow one is the face rectangle.
parts of the dataset, original images and synthetic images.
We carried out two groups of experiments using the SoF dataset. In the
first group, we randomly picked 5 folds, each contained 330 original images, i.e.,
without any filters or synthetic occlusions. In the second group, we randomly
picked the folds from the whole images of the dataset, original and synthetic
images, where each fold contained 750 images. In the following, we will briefly
discuss the results of our facial feature detection mechanism followed by a more
thorough discussion of gender classification results achieved by our method.
4.3. Facial feature detection
In spite of the non-frontal view of many images in the datasets, the facial
components are extracted in a desirable way. As our target is to extract the
facial patch instead of extracting the exact facial points, some error in the
alignment of the CDSM is tolerable. In addition, SSR helps improve the feature
detection by catching undetected faces, this is shown in Table 1. As the Face
16
Difficulty
Medium
Easy
Hard
Gaussian blur
Gaussian noise
SoF original
image
Posterization
Nose occlusion
Mouth occlusion
SoF generated images
Figure 7: The Specs on Faces (SoF) dataset contains two groups of images. The first part
includes the original images. The second part contains the original images besides the generated images. The last three columns show the three levels of difficulty (easy, medium, and
hard). The rows from the first to the fifth represent the generated images by applying Gaussian smoothing, Gaussian noise, posterization filter, nose occlusion, and mouth occlusion,
respectively.
Detection Data Set and Benchmark (FDDB) [36] is devoted to face detection
research, it was used to calculate the recall, precision, and F-Measure of the
CDSM with and without SSR. The FDDB contains 2845 images that captured
5171 faces. As shown in Table 1, the F-Measure is improved by about +2% for
the FDDB dataset after using SSR as an optional preprocessing step. Also, the
SSR improves the F-Measure using SoF (original) and SoF (full) datasets by
about +3% and +12%, respectively.
4.4. Gender classification accuracy
We have applied our proposed method (AFIF4 ) to unconstrained types of
face images, i.e., frontal images, near-frontal images, non-frontal images, and
17
Table 1: The recall (%), precision (%), and F-Measure (%) of the face detection process using
cascaded deformable shape model (CDSM) with and without single scale retinex (SSR).
CDSM w/o SSR
CDSM w SSR
Dataset
FRecall
Precision
FRecall
Precision
Measure
Measure
FDDB
73.40
99.15
84.35
77.99
97.07
86.49
SoF (original)
84.08
95.30
89.34
92.40
93.00
92.70
SoF (full)
58.86
95.24
72.76
79.66
90.21
84.61
images with large poses and occlusions. In literature, many gender classification
methods are applied only to frontal or near-frontal face images [37, 38, 7, 39,
40]. For the sake of fair comparison, we report only results of methods using
unconstrained types of images [16, 9, 41, 42, 43, 8, 18, 12] and we omit results of
methods using only frontal or near-frontal face images. From the work by Moeini
and Mozaffari [16], we report the results of two methods: dictionary learning
and separate dictionary learning for gender classification, denoted as DL-GC
and SDL-GC, respectively. Only for the case of the FERET dataset, because
we used frontal and near-frontal images with pose angles between −45◦ and
+45◦ , we report results of methods using frontal/near-frontal images. Table 2
shows that the accuracy of our method outperforms the state-of-the-art results
reported for unconstrained types of face images from the LFW, Groups, and
Adience datasets. Also, our method achieves comparable accuracy with the
state-of-the-art over the FERET dataset for frontal/near-frontal face images.
Cross-dataset Evaluation. To further assess the performance of our method,
we carried out cross-dataset evaluation as shown in Table 3. The attained
accuracy using the same dataset for both training and testing usually drops in an
obvious way when using different datasets for training and testing. From Table
3, we can see that the lowest cross-dataset classification accuracy is obtained
using the full SoF dataset (in 3 cases), the Adience dataset (in 2 cases), and
the Groups dataset (in 1 case). This points towards that our full SoF dataset
is the most challenging. The low accuracy obtained using the full SoF dataset,
18
Table 2: Comparison of our method (AFIF4 ) with state-of-the-art achieved accuracy over the
LFW, Groups, Adience, and FERET datasets. Note that the reported accuracy here are for
methods applied to unconstrained types of images (frontal, near-frontal, and images with large
poses and occlusions), results for only frontal and/or near-frontal images are omitted for the
sake of fair comparison. The cells marked with a ‘–’ represent unavailable results or results
from methods using only frontal/near-frontal images. Only for the case of FERET dataset,
we report results of methods using only frontal/near-frontal images because we followed the
same procedure.
Accuracy (%)
Method
LFW
Groups
Adience
FERET
DL-GC [16]
93.60
84.40
–
99.50
SDL-GC [16]
94.90
83.30
–
99.90
Hadid et al. [9]
–
89.85
–
–
Eidinger et al. [18]
–
86.80
76.10
–
Han et al. [43]
94.40
–
–
–
Rai and Khanna [8]
89.10
–
–
98.40
Gallagher and Chen [12]
–
74.10
–
–
Levi and Hassner [41]
–
–
86.80
–
Wolfshaar et al. [42]
–
–
87.20
–
Tapia and Pérez [7]
–
–
–
99.10
95.98
90.73
90.59
99.49
AFIF4 (Ours)
compared to the other datasets, is due to the challenging filters and synthetic
occlusions that have been added to the original images. Also, it is worth noting
that the highest cross-dataset accuracy is obtained by the FERET dataset, due
to the good quality of the images compared with the poor resolutions of many
images of other datasets.
To assess the performance for cross-dataset evaluation against the state-ofthe-art performance, we compare our results with the latest results reported by
Moeini and Mozaffari [16] for the LFW, Groups, and FERET datasets in Table
4. It is clear that our method gives higher accuracy for all cases except for
the FERET dataset. It is worth noting that cross-dataset evaluation usually
19
Table 3: Results of cross-dataset evaluation of our proposed method (AFIF4 ). The diagonal
represents the average accuracy obtained using the same dataset for both training and testing.
Rows represent datasets used for training while columns represent datasets used for testing.
The values in bold represents the dataset that yields the lowest accuracy when using a specific
dataset for training, for example, in first row, when using LFW for training, the full SoF
dataset yields the lowest accuracy, that means it is the most challenging in this case.
Testing Accuracy (%)
Training
LFW
SoF
SoF
(full)
(original)
Adience
Groups
FERET
LFW
95.98
79.19
65.76
78.36
76.67
92.71
Adience
84.55
90.59
74.15
79.97
85.07
86.86
SoF (full)
79.22
74.16
92.10
97.21
72.30
84.77
SoF (original)
83.31
71.09
84.05
98.48
73.60
89.12
Groups
91.74
83.06
69.80
82.20
90.73
92.20
FERET
85.78
69.19
75.15
83.27
85.67
99.49
yields lower accuracy than the case of using the same dataset for both training
and testing. This is mainly due to different conditions of collecting images in
different datasets, such as occlusions, illumination changes, backgrounds, etc.
5. Conclusion
In this paper, we addressed the gender classification problem by using a combination between local and holistic features extracted from face images. We used
four deep convolutional neural networks (CNNs) to separately classify the individual features, then we applied an AdaBoost-based score fusion mechanism
to aggregate the prediction scores obtained from the CNNs. Through extensive experiments, we showed that our method achieves better results than the
state-of-the-art methods in most cases on widely-used datasets. Also, and more
importantly, we showed that our method performs better than the state-of-theart when generalized to cross-dataset evaluation, which is much more challenging than in-dataset evaluation. Furthermore, we proposed a more challenging
20
Table 4: Comparison of cross-dataset evaluation of our proposed method (AFIF4 ) against
the state-of-the-art results reported by Moeini and Mozaffari [16]. The values represent the
classification accuracy (%).
Training
LFW
Groups
FERET
DL-GC
SDL-GC
AFIF4
[16]
[16]
(Ours)
LFW
93.60
94.90
95.98
Groups
69.70
72.40
76.67
FERET
88.80
89.70
92.71
LFW
80.60
83.10
91.74
Groups
83.30
84.40
90.73
FERET
85.20
87.10
92.20
LFW
71.70
73.50
85.78
Groups
59.50
61.90
85.67
FERET
99.50
99.90
99.49
Testing
dataset of 42,592 face images that mainly addresses the challenges of face occlusions and illumination variation. We accompanied our proposed dataset with
handcrafted annotations and gender labels for all images to facilitate further
research addressing the gender classification problem.
References
[1] C.-B. Ng, Y.-H. Tay, B.-M. Goi, A review of facial gender recognition,
Pattern Analysis and Applications 18 (4) (2015) 739–755.
[2] A. K. Jain, S. Z. Li, Handbook of face recognition, Springer, 2011.
[3] A. M. Burton, V. Bruce, N. Dench, What’s the difference between men
and women? evidence from facial measurement, Perception 22 (2) (1993)
153–176.
[4] G. Amayeh, G. Bebis, M. Nicolescu, Gender classification from hand shape,
in: IEEE Computer Society Conference on Computer Vision and Pattern
Recognition Workshops, IEEE, 2008, pp. 1–7.
21
[5] B. Li, X.-C. Lian, B.-L. Lu, Gender classification by combining clothing,
hair and facial component classifiers, Neurocomputing 76 (1) (2012) 18–27.
[6] S. Mozaffari, H. Behravan, R. Akbari, Gender classification using single
frontal image per person: combination of appearance and geometric based
features, in: International Conference on Pattern Recognition (ICPR),
IEEE, 2010, pp. 1192–1195.
[7] J. E. Tapia, C. A. Pérez, Gender classification based on fusion of different
spatial scale features selected by mutual information from histogram of
lbp, intensity, and shape, IEEE transactions on information forensics and
security 8 (3) (2013) 488–499.
[8] P. Rai, P. Khanna, A gender classification system robust to occlusion using
gabor features based (2d) 2 pca, Journal of Visual Communication and
Image Representation 25 (5) (2014) 1118–1129.
[9] A. Hadid, J. Ylioinas, M. Bengherabi, M. Ghahramani, A. Taleb-Ahmed,
Gender and texture classification: A comparative analysis using 13 variants
of local binary patterns, Pattern Recognition Letters 68 (2015) 231–238.
[10] M. Castrillón-Santana, M. De Marsico, M. Nappi, D. Riccio, Meg: Texture operators for multi-expert gender classification, Computer Vision and
Image Understanding.
[11] D. Riccio, G. Tortora, M. De Marsico, H. Wechsler, Egaethnicity, gender and age, a pre-annotated face database, in: IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications
(BIOMS), IEEE, 2012, pp. 1–8.
[12] A. C. Gallagher, T. Chen, Understanding images of groups of people, in:
IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
2009, pp. 256–263.
22
[13] Z. Chai, Z. Sun, T. Tan, H. Mendez-Vazquez, Local salient patternsa novel
local descriptor for face recognition, in: International Conference on Biometrics (ICB), IEEE, 2013, pp. 1–6.
[14] N. Dalal, B. Triggs, Histograms of oriented gradients for human detection,
in: IEEE Computer Society Conference on Computer Vision and Pattern
Recognition (CVPR), Vol. 1, IEEE, 2005, pp. 886–893.
[15] V. Ojansivu, J. Heikkilä, Blur insensitive texture classification using local phase quantization, in: International conference on image and signal
processing, Springer, 2008, pp. 236–243.
[16] H. Moeini, S. Mozaffari, Gender dictionary learning for gender classification, Journal of Visual Communication and Image Representation 42 (2017)
1 – 13. doi:http://dx.doi.org/10.1016/j.jvcir.2016.11.002.
[17] G. Levi, T. Hassner, Age and gender classification using convolutional neural networks, in: Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition Workshops, 2015, pp. 34–42.
[18] E. Eidinger, R. Enbar, T. Hassner, Age and gender estimation of unfiltered
faces, IEEE Transactions on Information Forensics and Security 9 (12)
(2014) 2170–2179.
[19] J. Mansanet, A. Albiol, R. Paredes, Local deep neural networks for gender
recognition, Pattern Recognition Letters 70 (2016) 80–86.
[20] F. Juefei-Xu, E. Verma, P. Goel, A. Cherodian, M. Savvides, Deepgender:
Occlusion and low resolution robust facial gender classification via progressively trained convolutional neural networks with attention, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
Workshops, 2016, pp. 68–77.
[21] X. Yu, J. Huang, S. Zhang, W. Yan, D. N. Metaxas, Pose-free facial landmark fitting via optimized part mixtures and cascaded deformable shape
23
model, in: Proceedings of the IEEE International Conference on Computer
Vision, 2013, pp. 1944–1951.
[22] G. B. Huang, M. Ramesh, T. Berg, E. Learned-Miller, Labeled faces in
the wild: A database for studying face recognition in unconstrained environments, Tech. rep., Technical Report 07-49, University of Massachusetts,
Amherst (2007).
[23] N. Kumar, A. Berg, P. N. Belhumeur, S. Nayar, Describable visual attributes for face verification and image search, IEEE Transactions on Pattern Analysis and Machine Intelligence 33 (10) (2011) 1962–1977.
[24] X.-C. Lian, B.-L. Lu, Gender classification by combining facial and hair information, in: International Conference on Neural Information Processing,
Springer, 2008, pp. 647–654.
[25] H. Han, S. Shan, X. Chen, W. Gao, A comparative study on illumination
preprocessing in face recognition, Pattern Recognition 46 (6) (2013) 1691–
1699.
[26] D. J. Jobson, Z.-u. Rahman, G. A. Woodell, Properties and performance
of a center/surround retinex, IEEE transactions on image processing 6 (3)
(1997) 451–462.
[27] P. Pérez, M. Gangnet, A. Blake, Poisson image editing, in: ACM Transactions on Graphics (TOG), Vol. 22, ACM, 2003, pp. 313–318.
[28] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick,
S. Guadarrama, T. Darrell, Caffe: Convolutional architecture for fast feature embedding, in: Proceedings of the 22nd ACM international conference
on Multimedia, ACM, 2014, pp. 675–678.
[29] D. E. Rumelhart, G. E. Hinton, R. J. Williams, Learning representations
by back-propagating errors, Cognitive modeling 5 (3) (1988) 1.
24
[30] Y. Freund, R. E. Schapire, et al., Experiments with a new boosting algorithm, in: Icml, Vol. 96, 1996, pp. 148–156.
[31] P. J. Phillips, H. Wechsler, J. Huang, P. J. Rauss, The feret database
and evaluation procedure for face-recognition algorithms, Image and vision
computing 16 (5) (1998) 295–306.
[32] M. S. Nixon, P. L. Correia, K. Nasrollahi, T. B. Moeslund, A. Hadid,
M. Tistarelli, On soft biometrics, Pattern Recognition Letters 68 (2015)
218–230.
[33] M. Ngan, P. Grother, Face recognition vendor test (frvt) performance of
automated gender classification algorithms, in: Technical Report NIST IR
8052, National Institute of Standards and Technology, 2015.
[34] M. Castrillón-Santana, J. Lorenzo-Navarro, E. Ramón-Balmaseda, Multiscale score level fusion of local descriptors for gender classification in the
wild, Multimedia Tools and Applications (2016) 1–17.
[35] P. Debevec, T. Hawkins, C. Tchou, H.-P. Duiker, W. Sarokin, M. Sagar,
Acquiring the reflectance field of a human face, in: Proceedings of the 27th
annual conference on Computer graphics and interactive techniques, ACM
Press/Addison-Wesley Publishing Co., 2000, pp. 145–156.
[36] V. Jain, E. Learned-Miller, Fddb: A benchmark for face detection in
unconstrained settings, Tech. Rep. UM-CS-2010-009, University of Massachusetts, Amherst (2010).
[37] A. Moeini, K. Faez, H. Moeini, Real-world gender classification via local
gabor binary pattern and three-dimensional face reconstruction by generic
elastic model, IET Image Processing 9 (8) (2015) 690–698.
[38] D. Mery, K. Bowyer, Automatic facial attribute analysis via adaptive sparse
representation of random patches, Pattern Recognition Letters 68 (2015)
260–269.
25
[39] C. Shan, Learning local binary patterns for gender classification on realworld face images, Pattern Recognition Letters 33 (4) (2012) 431–437.
[40] S. Baluja, H. A. Rowley, Boosting sex identification performance, International Journal of computer vision 71 (1) (2007) 111–119.
[41] G. Levi, T. Hassner, Age and gender classification using convolutional neural networks, in: The IEEE Conference on Computer Vision and Pattern
Recognition (CVPR) Workshops, 2015.
[42] J. van de Wolfshaar, M. F. Karaaba, M. A. Wiering, Deep convolutional
neural networks and support vector machines for gender recognition, in:
IEEE Symposium Series on Computational Intelligence, IEEE, 2015, pp.
188–195.
[43] H. Han, C. Otto, X. Liu, A. K. Jain, Demographic estimation from face
images: Human vs. machine performance, IEEE Transactions on Pattern
Analysis and Machine Intelligence 37 (6) (2015) 1148–1161.
26
| 1cs.CV
|
arXiv:1607.06641v3 [cs.NE] 12 Jun 2017
Optimal resampling for the noisy OneMax problem
Jialin Liu
Michael Fairbank
Diego Pérez-Liébana
Simon M. Lucas
University of Essex
Colchester CO4 3SQ
United Kingdom
[email protected]
University of Essex
Colchester CO4 3SQ
United Kingdom
[email protected]
University of Essex
Colchester CO4 3SQ
United Kingdom
[email protected]
University of Essex
Colchester CO4 3SQ
United Kingdom
[email protected]
Abstract—The OneMax problem is a standard benchmark
optimisation problem for a binary search space. Recent work
on applying a Bandit-Based Random Mutation Hill-Climbing
algorithm to the noisy OneMax problem showed that it is
important to choose a good value for the resampling number
to make a careful trade off between taking more samples in
order to reduce noise, and taking fewer samples to reduce the
total computational cost. This paper extends that observation by
deriving an analytical expression for the running time of the Random Mutation Hill-Climbing algorithm with resampling applied
to the noisy OneMax problem, and showing both theoretically
and empirically that the optimal resampling number increases
with the number of dimensions in the search space.
Index Terms—Noisy OneMax, resampling, Random Mutation
Hill-Climber (RMHC)
I. I NTRODUCTION
Evolutionary Algorithms (EA) have been widely used in
both continuous and discrete domains [1], [2], [3].
Resampling1 has proved to be a powerful tool in improving
the local performance of EAs in noisy optimisation [3], [4],
[5], and different resampling rules have been applied to a
variety of EAs in continuous noisy optimisation, as studied
in [6], [7]. Akimoto et al. [8] concluded that the running time
for an adapted algorithm using resampling to solve a problem
with additive Gaussian noise is similar to the runtime in the
noise-free case when multiplying by a factor log n, where n
is the problem dimension.
Previous work on solving the OneMax problem [9] has
concentrated on using a (1+1)-Evolution Algorithm (EA) [10],
[11]. The OneMax problem with One-bit noise (exactly one
uniformly selected bit changes with probability p ∈ (0, 1)
due to the noise) has been studied previously by Droste [10].
Qian et al. [11] claimed that resampling wasn’t beneficial in
optimising OneMax with additive Gaussian noise using (1+1)EA. Recently, Liu et al. [12], [13] applied a bandit-based
RMHC to the noisy OneMax problem, and showed that it was
important to choose an optimal resampling number, so as to
compromise the reduction in sampling noise against the cost
of doing so.
The main contribution of this work is the analysis of the
optimal resampling number in the OneMax problem, in the
presence of additive Gaussian noise. We show that the optimal
resampling number increases with the problem dimension.
1 In this paper, “resampling” refers to the multiple re-evalutions of a
solution.
The paper is structured as follows. Section II provides a
brief review of the related work and describes our noisy
OneMax problem. Section III explains the modified Random
Mutation Hill-Climbing algorithm used in the noisy context.
Section IV analyses the optimal resampling number in the
defined noisy OneMax problem. Experimental results are
presented and discussed in Section V. Finally, Section VI
concludes the work.
II. BACKGROUND
This section is organised as follows. Section II-A presents
the original Random Mutation Hill-Climbing algorithm and
its relation to (1+1)-EA. Section II-B recalls the OneMax
problem, then a noisy variant of OneMax problem is defined
in Section II-C. More related literatures in solving different
noisy variants of OneMax problems are discussed in Section
II-D
A. Random Mutation Hill-Climbing
The Random Mutation Hill-Climbing (RMHC), also called
Stochastic Hill Climbing, is a derivative-free optimisation
method mostly used in discrete domains [14], [15]. RMHC
can also be seen as an evolutionary algorithm in which
there is a population of just one individual, and at each
generation a child genome is formed from the current (best-sofar) individual by mutating exactly one gene, chosen uniformly
at random. After mutation, the mutated child genome replaces
its parent if its fitness value is improved or equivalent. In other
words, RMHC randomly selects a neighbour candidate in the
search space (where neighbour means it differs in exactly
one gene) and updates its current candidate using a fitnesscomparison-based method.
Borisovsky and Eremeev [16] proved that under some
conditions, RMHC outperforms other EAs in terms of the
probability of finding an anytime solution on several problems
including OneMax.
(1+1)-EA is a variant of RMHC, the only difference being
that every gene of the current individual’s genome mutates
with a certain probability at each generation.2 (1+1)-EA has
been widely used in both discrete and continuous optimisation
problems [16]. A variant of (1+1)-EA is the closely related
2 However note that some communities refer to RMHC as “(1+1)Evolutionary Algorithm (EA)”, but we will avoid that description.
“(1+1)-Evolutionary Strategy (ES)” [17], which uses a selfadaptive mutation step-size and is applicable to real-valued
search spaces.
Despite its simplicity, RMHC often competes surprisingly
well with more complex algorithms [18], especially when deployed with random restarts. For instance, Lucas and Reynolds
evolved Deterministic Finite Automata (DFA) [14], [15] using
a multi-start RMHC algorithm with very competitive results,
outperforming more complex evolutionary algorithms, and for
some classes of problems also outperforming the state of the
art Evidence-Driven State Merging (EDSM) [19] algorithms.
B. OneMax problem
The OneMax problem [9] is a standard benchmark optimisation problem for a binary search space and has been deeply
studied in the previous literatures [2], [20], [21]. The objective
is to maximise the number of 1s occurring in a binary string,
i.e., for a given n-bit string x, the fitness function to maximise
for that string is given by
f (x) =
n
X
xi ,
(1)
i=1
where xi denotes the ith bit in the string x, and is either 1 or
0.
C. Noisy OneMax
In this work, we study a noisy variant of the OneMax
problem, where the fitness function is corrupted by some
additive unbiased normally distributed noise with constant
variance, formalised in (2).
f 0 (x) = f (x) + N (0, σ 2 ),
(2)
with N (0, σ 2 ) denoting a Gaussian noise, with mean 0 and
variance σ 2 . From now on, we will use f 0(i) (x) to denote the
ith call to noisy fitness function on x. At each call, the noise
is independently sampled from N (0, σ 2 ) and takes effect after
the true fitness is evaluated.
There is a variety of noise models for the OneMax problem,
as described in the next section. To avoid confusion, the term
“noisy OneMax” refers to (2), the noisy variant used in this
paper. Also, the “noisy” refers to the noise in the fitness
function’s ability to read the true fitness of the genome; not
the mutations which are deliberately applied to the genome,
which could be interpreted as a second kind of “noise”.
D. Related work
Different noise models for the OneMax problem have been
studied before.
a) Proportionate selection is noise invariant: Our noise
model is the same as the one used in [22]. Miller and
Goldberg [22] used a GA with µ parents and λ offsprings, and
proved that increasing noise level did not affect selection pressure for Genetic Algorithms (GA) using fitness-proportionate
selection, in which each individual survives with a probability
proportional to its fitness divided by the average fitness in the
population [22], [23].
b) Resampling does not add benefit in low dimension:
Qian et al. [11] applied (1+1)-EA using mutation probability
1
and at most 100 resamplings to a 10-bit noisy OneMax
p = 10
problem corrupted by additive Gaussian noise with variance
100 ((2) with σ 2 = 100), and concluded that resampling
wasn’t beneficial for the (1+1)-EA in optimising the noisy
OneMax problem. In their model, resampling had the effect of
lowering the variance of the noise to 1, which is exactly as big
as the lower bound of the differences between distinct noisefree fitness values. With that level of resampling and problem
dimension, the problem is still difficult to solve. We present,
later in this paper, our application of RMHC using larger
resampling numbers in noisy OneMax, with noise variance
σ 2 = 1 and do observe that resampling adds a significant
benefit when the dimension is above 10 (Section V).
c) Solving high dimension noisy OneMax: Sastry et
al. [24] designed a fully parallelised, highly-efficient compact Genetic Algorithm (cGA) to solve very high dimension
problems, and compared it to RMHC on a noisy OneMax
problem using noise variance depending linearly on the length
of string, to allow for more difficult problems, for the reason
that a randomly initiated n-bit string has fitness variance
n
4 . RMHC without resampling performed poorly when the
problem dimension is higher than 10, 000.
d) Noise takes effect before the evaluation: Droste [10]
defined a One-bit noise model for the OneMax problem, in
which during every fitness evaluation of the bit-string x, there
was exactly one uniformly-chosen random bit mis-read with
probability p0 . Hence the measured noisy fitness values are
equivalent to replacing the Gaussian noise term in (2) by
an appropriate discrete random variable taking values from
{−1, 0, 1}. Under this scheme, Droste showed that (1+1)EA with mutation probability p = n1 could optimise a nbit OneMax problem corrupted by One-bit noise, with high
probability, in polynomial time if p0 is O( log(n)
n ).
III. R ANDOM M UTATION H ILL -C LIMBING IN NOISY
CONTEXT
When RMHC is applied to the noisy OneMax fitness function (2), a mutation of the k th gene refers to flipping the k th bit
of the string. The standard deviation of the second term in (2)
(the explicit noise term) is of the same order of magnitude
as the noise in the first term of (2) (the OneMax fitness
term) introduced by mutations from the RMHC algorithm.
This extremely poor signal-to-noise ratio would cause major
problems for hill-climbing strategies such as RMHC. Hence,
we use RMHC with resampling, applied to the noisy OneMax
problem, so as to try to reduce the unwanted variance, and to
allow the hill climber to work.
A. Noise-free case
Algorithm 1 recalls the generic RMHC, without any resampling. This is suitable for noise-free problems.
Here we have assumed the fitness value of the best-so-far
genome could be stored after each cycle. If, alternatively, no
space was allocated to store that fitness value, or if fitness
Algorithm 1 Random Mutation Hill-Climbing algorithm
(RMHC). No resampling is performed
.
Require: n ∈ N∗ : genome length (problem dimension)
Require: X : search space
Require: f : X 7→ R: fitness function
1: Randomly initialise a genome x ∈ X
2: bestF itSoF ar ← f (x)
3: N ← 1
. Total evaluation count so far
4: while time not elapsed do
5:
Uniformly randomly select k ∈ {1, . . . , n}
6:
y ← new genome by mutating the k th gene of x
7:
F ity ← f (y)
8:
N ←N +1
. Update evaluation count
9:
if F ity ≥ bestF itSoF ar then
10:
x←y
. Update the best-so-far genome
11:
bestF itSoF ar ← F ity
12:
end if
13: end while
14: return x
evaluations can only be made by directly comparing two individuals, then the best-so-far genome’s fitness would need to
be re-evaluated at each generation, thus raising the algorithm’s
“evaluation count”, N , by a factor of approximately 2.
B. Noisy case
The previous RMHC algorithm (Algorithm 1) was applicable to deterministic fitness functions. Algorithm 2 extends this
RMHC algorithm to be applicable to noisy fitness functions.
It achieves this extension by using resampling, so that each
genome is evaluated multiple times, so as to reduce the effect
of noise which might interfere with hill climbing.
Additionally, if the statistics of the best-so-far genome can
be stored, instead of comparing directly the fitness values
of the offspring to the fitness of the parent (the best-so-far
genome), the average fitness value of the best-so-far genome
in the history is compared at each generation (line 11 of
Algorithm 2).
IV. A NALYSIS OF OPTIMAL RESAMPLING NUMBER IN
NOISY O NE M AX PROBLEM
This section analyses the application of the modified RMHC
algorithm (Algorithm 2) to the noisy OneMax problem, with
fixed noise level, by describing it as a Markov process.
Several variants of Algorithm 2 are considered in Section
IV-B, including analysis of varying the resampling number,
and of the effect of storing a statistic of the best-so-far genome
versus not storing it. The benefit of storing the statistics of
the best-so-far genome is illustrated in Section IV-B. Section
IV-C derives an expression for the length of Markov chain
that represents the learning algorithm, and the optimal level
of resampling is calculated and displayed, in Section IV-D.
We restrict the analysis in this section to a fixed noise level
σ 2 = 1. This noise level is a significant challenge for RMHC,
as the difference between the parent’s fitness and the one of the
Algorithm 2 RMHC modified to include resampling, suitable
for the noisy case. f 0(i) (x) denotes the ith call to the noisy
fitness function on search point x.
Require: n ∈ N∗ : genome length (problem dimension)
Require: X : search space
Require: f : X 7→ R: fitness function
Require: r ∈ N∗ : Resampling number
1: Randomly initialise a genome x ∈ X
2: bestF itSoF ar ← 0
3: M ← 0
. Evaluation count for the latest best-so-far
genome
4: N ← 0
. Total evaluation count so far
5: while time not elapsed do
6:
Uniformly randomly select k ∈ {1, . . . , n}
7:
y ← new genome
by mutating the k th gene of x
Pr
1
0(i)
8:
F itx ← r Pi=1 f (x)
r
9:
F ity ← 1r i=1 f 0(i) (y)
10:
N ← N + 2r
. Update evaluation count
ar×M +F itx ×r
11:
averageF itnessx ← bestF itSoFM
+r
12:
if F ity ≥ averageF itnessx then
13:
x←y
. Update the best-so-far genome
14:
bestF itSoF ar ← F ity
15:
M ←r
16:
else
17:
bestF itSoF ar ← averageF itnessx
18:
M ←M +r
19:
end if
20: end while
21: return x
offspring is always 1 in our model. This motivates resampling,
since resampling a candidate solution r times can reduce the
variance of the noise by a factor of 1r . The extension of this
analysis to the general σ would be straightforward.
A. Markov chain description for noisy OneMax
We consider a n-bit OneMax problem with constant variance Gaussian noise, σ 2 = 1. Throughout this section, we
summarise the n-bit OneMax state vector by a single scalar
number, i, equal to the number of ones in the n-bit string. As
the RMHC algorithm makes mutations to the full bit string,
the compressed state-representation, i, will change by ±1. The
transition probabilities for the change in i are dependent only
on the scalar i. Hence the evolution of the variable i is modeled
by a Markov process.
After each mutation is initially made by the RMHC algorithm, the fitness of that mutated bit string is evaluated using
(2), and the RMHC algorithm will either accept or reject that
mutation.
Let pT A , pF A , pT R and pF R denote the probability of true
acceptance, false acceptance, true rejection and false rejection,
respectively, for the RMHC algorithm to accept or reject
any given mutation. These four probabilities depend on the
resampling strategy employed by the RMHC algorithm, and
are derived in Section IV-B. However, since complementary
probability pairs must sum to one, we do generally have that,
pF A
=
1 − pT A ,
(3)
pF R
=
1 − pT R .
(4)
Assuming these acceptance and rejection probabilities are
known, we can then derive the Markov state transition probabilities as follows:
For any state scalar i ∈ {0, 1, . . . , n − 1}, the corresponding
OneMax bit string has i ones and (n − i) zeros. Therefore the
probability of uniformly randomly choosing a zero bit is n−i
n .
Hence, for RMHC to make an improvement to the genome, it
must randomly choose one of these zero bits and that mutation
must be accepted. Therefore the transition probability from
state i to state i + 1 in one generation is:
n−i
pT A .
(5)
n
Similarly, for RMHC to make the genome worse, it must
choose a one bit (with probability ni ) and flip it to a zero, and
that mutation must be accepted, with probability pF A . Hence
we obtain
P[St+1 = i + 1|St = i] =
i
pF A .
(6)
n
For an RMHC mutation to make no progress in the genome,
the mutation must be rejected. This could mean a one bit
is chosen (with probability ni ) and rejected (with probability
pT R ), or it could be that a zero bit is chosen (with probability
n−i
n ) and rejected (with probability pF R ). Hence we obtain
P[St+1 = i − 1|St = i] =
i
n−i
pT R +
pF R .
(7)
n
n
The probabilities given by (5)-(7) appear on the three arrows
emanating from the central node “i” in the Markov chain
shown in Fig.1. The Markov chain’s absorption state is state
n, since the OneMax problem is solved and terminates as soon
as i = n is reached.
P[St+1 = i|St = i] =
B. Rejection and acceptance probabilities for noisy OneMax
problem with RMHC
The Markov Process described in the previous subsection
relied upon knowledge of the acceptance and rejection probabilities pT R and pT A , which are dependent on the RMHC
resampling method chosen.
We discuss three RMHC resampling cases here, and calculate the corresponding acceptance/rejection probabilities. We
consider three separate cases:
1) No resampling, no statistic of the best-so-far genome
is stored: If no statistic of the best-so-far genome is stored,
the best-so-far one needs to be re-evaluated once at each
generation in the case without resampling.
First we assume that the newly generated genome y is better
than the current genome x, i.e. f (y) > f (x), where this fitness
function is the noise-free version given by (1). Since f (x) is
the true fitness of string x, we have f (x) = i, the number
of ones in string x. Since the two genomes x and y are
evaluated using the noisy fitness function (2), and since we are
comparing x and y without resampling or storing the statistics
of the best-so-far genome, the probability of true acceptance
is
pT A
=
P(f 0 (y) > f 0 (x)|f (y) = i + 1, f (x) = i)
= P(ωy + 1 > ωx ) = P(ωy − ωx > −1).
where ωy and ωx are independent samples from N (0, 1), thus
ωy − ωx ∼ N (0, 2). Then,
pT A
= P(ωy − ωx > −1) = P(ωy − ωx ≤ 1)
1 1
1
= CDFGaussian(0,2) (1) = + erf ( ).
2 2
2
(8)
Respectively, if the newly generated genome y is worse than
the current genome x, i.e. f (y) < f (x), when comparing two
genomes without resampling or storing the statistics of the
best-so-far genome, the probability of true rejection is
pT R
= P(f 0 (y) < f 0 (x)|f (y) = i − 1, f (x) = i)
= P(ωy − 1 < ωx ) = P(ωy − ωx < 1) = pT A . (9)
Therefore, for this situation of RMHC with no resampling
and no storage of the best-so-far fitness, we can for example
find the probability of transferring from state i to state i + 1,
as follows:
n−i
pT A
(by (5))
n
n−i 1 1
1
=
+ erf ( )
(by (8)).
n
2 2
2
P[St+1 = i + 1|St = i] =
2) When comparing two genomes using r resamplings
without storing the statistics of the best-so-far genome: If each
genome can be re-evaluated r > 1 times, i.e., r resamplings
are used, but still no statistic of the best-so-far genome is
stored, F itx and F ity are compared at each generation (lines
8 and 9 of Algorithm 2). Therefore, the variance of F itx and
F ity , given x and y, are 1r . Then,
pT A
= P(F ity > F itx |f (y) = i + 1, f (x) = i)
= P(ωy0 + 1 > ωx0 ) = P(ωy0 − ωx0 > −1).
where ωy0 and ωx0 are independent samples from N (0, 1r ), thus
ωy − ωx ∼ N (0, 2r ). Then,
pT A
=
=
P(ωy0 − ωx0 > −1) = P(ωy0 − ωx0 ≤ 1)
√
1 1
r
CDFGaussian(0, r2 ) (1) = + erf (
). (10)
2 2
2
Similarly, pT R = pT A holds in this case.
The probability of transferring from √state i to state i + 1
r
1
1
in one generation is n−i
n ( 2 + 2 erf ( 2 )), larger than the
probability in the previous case without resampling (Section
IV-B1).
Therefore, the probability of true acceptance is improved
by resampling genomes.
i
n pT R
pF R
+
n−i+1
pT A
n
...
0
n−i
n pF R
n−i
n pT A
i-1
i+1
i
i
n pF A
...
n
i+1
n pF A
Fig. 1: Markov states and transitions in a noisy OneMax problem. Markov state “i” refers to a OneMax bit-string with i ones
and n − i zeros in the string.
3) When comparing two genomes using r > 1 resamplings
and the statistics of the best-so-far genome: Additionally, if
one has access to averageF itness, the average fitness value
of the best-so-far genome, and M , the number of times that
the best-so-far genome has been evaluated, by line 11 of
Algorithm 2
bestF itSoF ar × M + F itx × r
,
M +r
(11)
with r > 1. Therefore, the variance of averageF itnessx ,
given x, is M1+r . The variance of F ity , given y, is 1r .
The probability of true acceptance is
averageF itnessx ←
pT A = P(F ity > averageF itnessx |f (y) = i + 1, f (x) = i)
= P(ωy0 + 1 > ωx00 ) = P(ωy0 − ωx00 > −1).
where ωy0 and ωx00 are independent samples from N (0, 1r ) and
M +2r
N (0, M1+r ), respectively. Thus, ωy0 − ωx00 ∼ N (0, r(M
+r) ).
Then,
pT A
=
P(ωy0 − ωx00 > −1)
=
P(ωy0 − ωx00 ≤ 1)
=
CDFGaussian(0, M +2r ) (1)
r(M +r)
s
1 1
r(M + r)
+ erf (
)
2 2
2(M + 2r)
=
we consider the second case discussed previously in Section
IV-B2.
The Markov chain length can be found by defining the
notation T(l→m) to mean the expectation of the number of
generations required to get from a Markov state with value
i = l to a Markov state with value i = m.
By considering the three arrows that emanate from the
central i node in Fig.1, we can form an algebraic expression
for T(i→i+1) , as follows:
n−i
pT A
n
i
n−i
+
pT R +
pF R 1 + T(i→i+1)
n
n
i
(13)
+ pF A 1 + T(i−1→i+1) .
n
The three terms in (13) correspond to the three arrows from
node i in Fig.1, pointing to nodes i+1, i and i−1, respectively.
Since it is always necessary to go from state i − 1 to i + 1
via their middle state i, we can form the relationship
T(i→i+1) =
T(i−1→i+1) ≡ T(i−1→i) + T(i→i+1) .
(12)
Similarly, pT R = pT A holds in this case.
The probability of transferring q
from state i to state i + 1 in
r(M +r)
n−i 1
1
one generation is n ( 2 + 2 erf ( 2(M
+2r) )) with M ≥ r >
1, larger than the probabilities in the previous cases (Sections
IV-B1 and IV-B2).
Therefore, the probability of true acceptance is improved by
resampling genomes and storing the statistics of the best-so-far
genome. However, the trade-off between the total evaluations
and the accuracy needs to be considered.
C. Markov chain analysis
Now that we have described the Markov chain in Section
IV-A, and derived the acceptance and rejection probabilities
for the noisy OneMax problem in Section IV-B, we next
derive an analytical expectation for the full trajectory length
for solving the noisy OneMax problem, using RMHC with
resamplings, starting from a bit string full of zeros. To simplify
analysis, no stored statistic is considered (M = 0), thus
Furthermore, reusing (3) and (4), i.e. pF A = (1−pT A ), pF R =
(1 − pT R ), together with pT R = pT A from Section IV-B, we
get:
n−i
T(i→i+1) =
pT A
n
n−i
i
pT A +
(1 − pT A ) 1 + T(i→i+1)
+
n
n
i
+
(1 − pT A ) 1 + T(i−1→i) + T(i→i+1) .
(14)
n
Solving 14 for T(i→i+1) , which appears three times in that
equation, we get:
T(i→i+1) =
n
i(1 − pT A )
T(i−1→i) +
.
(n − i)pT A
(n − i)pT A
(15)
This is a recursive equation that defines the ith term in
terms of the (i − 1)th term. To terminate this recursion, an
explicit expression for T(0→1) can be found by considering
the number of generations required to get from i = 0 (i.e. a
string with all zeros in it) to i = 1 (i.e. a string with exactly
one 1 in it). This is given by
1
T(0→1) =
.
(16)
pT A
(15) and (16) form a recursion that easily can be unrolled
computationally, and it gives us the exact theoretical number of
transitions to traverse from one Markov state i to the adjacent
Markov state i + 1. Therefore to calculate the total number of
generations required to solve the noisy OneMax problem from
an initial Markov state i = 0, we need to calculate T(0→n) .
This can be expanded by adding all of the intermediate state
transitions to get
T(0→n) = T(0→1) + · · · + T(n−1→n)
(17)
(17) completes the theoretical analysis of the number of
steps required by RMHC to solve the noisy OneMax problem,
from an initial bit string of zeros. Note that each term of this
sum needs a solution to the recursive equations given by (15)
and (16), but with careful caching, the whole sum can be
evaluated in O(n) steps.
It’s notable that even though the above Markov chain analysis was aimed at Case 2 (Section IV-B2, i.e. with resampling
and no statistic stored), it also holds when there is no resampling, i.e., r = 1 (the first case detailed in Section IV-B1). In
both cases, pT A is deterministic given the resampling number
r. However, Case 3 (Section IV-B3) is not as straightforward
to analyse, because in that case that the average fitness value
(averageF itnessx ) depends on the evaluation number
(M ),
q
r(M +r)
1
1
and M is stochastic. Hence, pT A = 2 + 2 erf ( 2(M +2r) )
(12) changes at each generation of RMHC. Case 3 has not
been analysed in this paper, but it would be interesting to do
so in the future.
Fig. 2: Exact expectation of the number of fitness evaluations
required by RMHC to solve the noisy OneMax problem, using
different resampling numbers. The initial OneMax strings
were all zeros, and the RMHC algorithm did not store the
fitness of the best-so-far genome (case 2 described in Section
IV-B2). These curves were computed using (15)-(18), and pT A
defined by (10). The grey circle on each curve indicates the
optimal resampling number, which increases with the problem
dimension.
D. Analytical results of RMHC in noisy OneMax problem
At each generation of the actual RMHC algorithm, 2r
fitness-function evaluations are required, so that the total
number of fitness evaluations required to solve the noisy
OneMax problem is
2rT(0→n) .
(18)
This result is shown graphically in Fig.2, with various number
of resamplings (r) and problem dimension (n), under the
assumption that no statistic is stored for the fitness of the
best-so-far genome (case 2 described in Section IV-B2).
As can be seen from the location of the minima in Fig.2,
indicated by the small grey circles, the optimal resampling
number increases with the problem dimension. The exact optimal number of resamplings to make in different dimensions
is displayed in Fig.3.
V. E XPERIMENTAL RESULTS
To supplement the theoretical results of the previous and
to prove the benefit of storing statistics of the best-so-far
genome at each generation, we apply first RMHC on the
OneMax problem in a noise-free case (Fig.4), then evaluate
the performance of RMHC on the OneMax problem with the
presence of constant variance Gaussian noise (Fig.5). Each
experiment was repeated 100 times, initialised by an all zeros
string. The following may be observed from the figures:
Fig. 3: Exact theoretical optimal resampling number required
by RMHC, to solve the noisy OneMax problem, without
storing a statistic of the fitness of the best-so-far genome (case
2 described in Section IV-B2).
•
•
•
due to the noise, far more fitness evaluations are required
to find the optimum in the noisy case than in the noisefree context;
the higher dimension problem required more fitness evaluations to reach the optimum;
in dimensions ≤ 10, no resampling leads to a reduction
in the number of required fitness evaluations;
Fig. 4: Empirical number of evaluations consumed by RMHC
in the noise-free OneMax problem. No resampling is required
in the noise-free case. Each experiment is repeated 100 times
initialised by an all zeros string. The standard error is too tiny
to be seen.
(a) Empirical number of evaluations consumed by RMHC in the
noisy OneMax problem, across different resampling numbers, without
storing a statistic of the best-so-far genome. This empirically-obtained
data is equivalent to the theoretical results shown in Fig.2.
TABLE I: The expectation of fitness evaluation number required to reach the optimum ((15) and (16)) in the noisy
OneMax problem on dimension 10 and the empirical average
fitness evaluations consumed in 10, 000 trials.
r
1
2
3
4
5
10
•
•
Expected #evaluations
205.8283
238.5264
276.3340
317.9576
362.4065
612.2250
Empirical #evaluations
205.1998
239.7504
274.9920
317.8848
363.2520
611.0060
in higher dimensions (n > 10), the optimal amount of resampling required increases with the problem dimension;
in higher dimensions (n 10), the evaluation number is
significantly reduced by using the stored statistic.
Additionally, Fig.5 clearly shows the benefit of storing the
average fitness value and the current evaluation number of
the best-so-far genome at the end of each generation (case 3
described in Section IV-B3).
A. Validation of Theoretical results
To validate the theoretical results and equations of Section
IV, Table I demonstrates a very close match between the
theoretically obtained number of evaluations (derived from
(15)-(18)) and the equivalent empirically calculated numbers
(i.e. those found by actually running the RMHC algorithm
repeatedly and averaging). This table hopefully validates the
accuracy of our theoretical derivations and our numerical
implementation.
A further confirmation is shown by the equivalence of the
curves shown in Fig.5a to those shown in Fig.2.
(b) Empirical number of evaluations consumed by RMHC in the
noisy OneMax problem, across different resampling numbers, using
the stored statistic method. Fewer fitness evaluations are consumed
compared to the case without stored statistic (shown in the above
figure). Here the n = 1000 curve is truncated on the left, showing
missing data points, because in those cases an optimum was not
reached within 107 fitness evaluations, when using low resampling
numbers (r = 1, 2, 3, 4, 5).
Fig. 5: Performance of RMHC in the noisy OneMax problem
with different numbers of resamplings. The maximal budget
is 107 fitness evaluations. Note that the y-axis is the logarithm
of the evaluation number. Each experiment was repeated 100
times, initialised by an all-zeros string. The standard error is
too tiny to be seen. In the noisy case, the optimal resampling
number increases with the problem dimension.
VI. C ONCLUSION
This paper presents a noisy OneMax problem with additive
constant variance Gaussian noise and analyses the optimal
resampling number required by the Random Mutation Hill
Climber (RMHC) to handle the noise.
The number of fitness evaluations required by RMHC to
find the optimal solution in the noisy OneMax problem varies
with the resampling number. In a very low-dimensional noisy
OneMax problem (dimension 10, hence the string only has
1024 possible values), the optimal value may be found by
a random walk, and resampling can be counterproductive in
these cases (it leads to the remarkable growth of the number of
evaluations required to find the optimum as shown in Fig.5).
However, in higher dimensions, resampling to reduce the noise
is of critical importance, and makes the difference between
success and failure. The optimal level of resampling increases
with the dimension in the search space (as shown empirically
in Fig.2, and analytically in Fig.3). This is an interesting result,
which for this particular benchmark problem, is in conflict
with the observation by Qian et al. in [11] that resampling
was not beneficial.
RMHC is simple but efficient. The success of (µ-λ)-GA,
of which (1+1)-EA can be seen as a variant, depends on one
or more parameters, such as the size of the population, λ,
the number of parents, µ, and the crossover and mutation
operators. RMHC does not have such details to adjust and is
therefore simpler to apply. Due to its efficiency and simplicity
RMHC should be considered as a useful tool for expensive
optimisation tasks.
R EFERENCES
[1] H. Muhlenbein, “How genetic algorithms really work: I. mutation and
hill climbing. parallel problem solving from nature 2. b. manderick,”
1992.
[2] S. Droste, T. Jansen, and I. Wegener, “On the analysis of the (1+1)
evolutionary algorithm,” Theoretical Computer Science, vol. 276, no. 1,
pp. 51–81, 2002.
[3] D. V. Arnold and H.-G. Beyer, “A general noise model and its effects
on evolution strategy performance,” Evolutionary Computation, IEEE
Transactions on, vol. 10, no. 4, pp. 380–391, 2006.
[4] H.-G. Beyer, The Theory of Evolution Strategies. Springer Science &
Business Media, 2013.
[5] S. Astete-Morales, M.-L. Cauwet, J. Liu, and O. Teytaud, “Simple
and cumulative regret for continuous noisy optimization,” Theoretical
Computer Science, vol. 617, pp. 12–27, 2016.
[6] S. Astete-Morales, J. Liu, and O. Teytaud, “Log-log convergence for
noisy optimization,” in International Conference on Artificial Evolution
(Evolution Artificielle). Springer, 2013, pp. 16–28.
[7] J. Liu, “Portfolio methods in uncertain contexts,” Ph.D. dissertation,
INRIA, 12 2015.
[8] Y. Akimoto, S. Astete-Morales, and O. Teytaud, “Analysis of runtime
of optimization algorithms for noisy functions over discrete codomains,”
Theoretical Computer Science, vol. 605, pp. 42–50, 2015.
[9] J. D. Schaffer and L. J. Eshelman, “On crossover as an evolutionarily
viable strategy,” in ICGA, vol. 91, 1991, pp. 61–68.
[10] S. Droste, “Analysis of the (1+1) EA for a noisy OneMax,” in Genetic
and Evolutionary Computation–GECCO 2004. Springer, 2004, pp.
1088–1099.
[11] C. Qian, Y. Yu, Y. Jin, and Z.-H. Zhou, “On the Effectiveness of
Sampling for Evolutionary Optimization in Noisy Environments,” in
Parallel Problem Solving from Nature–PPSN XIII. Springer, 2014,
pp. 302–311.
[12] J. Liu, D. Peŕez-Liebana, and S. M. Lucas, “Bandit-based random
mutation hill-climbing,” arXiv preprint arXiv:1606.06041, 2016.
[Online]. Available: http://arxiv.org/abs/1606.06041
[13] ——, “Bandit-based random mutation hill-climbing,” 2017 IEEE
Congress on Evolutionary Computation (IEEE CEC), 2017.
[14] S. M. Lucas and T. J. Reynolds, “Learning DFA: Evolution versus
Evidence Driven State Merging,” in Evolutionary Computation, 2003.
CEC’03. The 2003 Congress on, vol. 1. IEEE, 2003, pp. 351–358.
[15] ——, “Learning deterministic finite automata with a smart state labeling
evolutionary algorithm,” Pattern Analysis and Machine Intelligence,
IEEE Transactions on, vol. 27, no. 7, pp. 1063–1074, 2005.
[16] P. A. Borisovsky and A. V. Eremeev, “Comparing evolutionary algorithms to the (1+1)-EA,” Theoretical Computer Science, vol. 403, no. 1,
pp. 33–41, 2008.
[17] H.-G. Beyer, “Toward a theory of evolution strategies: On the benefits of
sex—the (µ/µ, λ) theory,” Evol. Comput., vol. 3, no. 1, pp. 81–111, Mar.
1995. [Online]. Available: http://dx.doi.org/10.1162/evco.1995.3.1.81
[18] M. Mitchell and J. H. Holland, When will a Genetic Algorithm Outperform Hill-Climbing? Morgan Kaufmann, 1993.
[19] O. Cicchello and S. C. Kremer, “Beyond EDSM,” in International
Colloquium on Grammatical Inference. Springer, 2002, pp. 37–48.
[20] B. Doerr and C. Winzen, “Memory-restricted black-box complexity of
OneMax,” Information Processing Letters, vol. 112, no. 1, pp. 32–34,
2012.
[21] C. Doerr and J. Lengler, “OneMax in black-box models with
several restrictions,” Algorithmica, pp. 1–31, 2016. [Online]. Available:
http://dx.doi.org/10.1007/s00453-016-0168-1
[22] B. L. Miller and D. E. Goldberg, “Genetic algorithms, selection schemes,
and the varying effects of noise,” Evolutionary Computation, vol. 4,
no. 2, pp. 113–131, 1996.
[23] M. Mitchell, An introduction to genetic algorithms. MIT press, 1998.
[24] K. Sastry, D. E. Goldberg, and X. Llora, “Towards billion-bit optimization via a parallel estimation of distribution algorithm,” in Proceedings
of the 9th annual conference on Genetic and evolutionary computation.
ACM, 2007, pp. 577–584.
| 2cs.AI
|
A SHARP THRESHOLD FOR COLLAPSE
OF THE RANDOM TRIANGULAR GROUP
arXiv:1403.3516v2 [math.GR] 18 Nov 2016
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
Abstract. The random triangular group Γ(n, p) is the group
given by a random group presentation with n generators in which
every relator of length three is present independently with probability p. We show that in the evolution of Γ(n, p) the property of
collapsing to the trivial group admits a very sharp threshold.
1. Introduction
Let P = hS | Ri denote a group presentation, where S is the set
of generators and R is the set of relators. A group generated by a
presentation P is called a triangular group if R consists of cyclically
reduced words of length three over the alphabet S ∪ S −1 , that is if
R consists of words of the form abc such that a 6= b−1 , b 6= c−1 and
c 6= a−1 . Here we consider the random triangular group Γ(n, p) defined
as a group given by a random triangular group presentation with n
generators and such that each cyclically reduced word of length three
over the alphabet S∪S −1 is present in R independently with probability
p = p(n).
We study the asymptotic properties of the random triangular group
when the number of generators n goes to infinity. Thus, for a group
property P and a function p(n), we say that Γ(n, p(n)) has P asymptotically almost surely (a.a.s.), if the probability that Γ(n, p(n)) has
this property tends to 1 as n → ∞.
The notion of the random triangular group was introduced by Żuk
[11]. In particular, he showed that for every constant ǫ > 0, if p ≤
n−3/2−ǫ , then a.a.s. Γ(n, p) is an infinite, hyperbolic group, while for
p ≥ n−3/2+ǫ , a.a.s. Γ(n, p) collapses to the trivial group (his result
is stated for a somewhat different, yet equivalent, model of random
triangular group). Antoniuk, Luczak and Świa̧tkowski [2] improved
this result from one side and showed that there exists a constant C > 0
Date: March 13, 2014.
2010 Mathematics Subject Classification. Primary: 20P05; secondary: 05C80,
20F05.
Key words and phrases. random group, collapse, sharp threshold, torsion-free.
Sylwia Antoniuk is partially supported by NCN grant 2013/09/N/ST1/04251,
Ehud Friedgut is supported in part by I.S.F. grant 0398246, and BSF grant 2010247,
and Tomasz Luczak is partially supported by NCN grant 2012/06/A/ST1/00261.
1
2
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
such that for p ≥ Cn−3/2 a.a.s. Γ(n, p) collapses to the trivial group.
They also asked if there exists a constant c > 0 such that for p < cn−3/2
a.a.s. Γ(n, p) is infinite.
Note that the property that a group is trivial is monotone, i.e. if
hS | Ri is trivial then for any R′ ⊇ R the group hS | R′ i is trivial
as well. Hence, by a well known argument of Bollobás and Thomason [3], there exists a ‘coarse’ threshold function for collapsibility i.e.
there exists a function θ(n) such that if p(n)/θ(n) → 0, then a.a.s.
Γ(n, p) is non-trivial, whereas for p(n)/θ(n) → ∞ a.a.s. Γ(n, p) collapses to the trivial group. However, the result of Antoniuk, Luczak
and Świa̧tkowski [2] and their conjecture we have just mentioned suggest that Γ(n, p) collapses more rapidly, i.e. that the collapsibility has
a ‘sharp’ threshold. Our main result states that this is indeed the case.
Theorem 1. Let h(n, p) denote the probability that Γ(n, p) is trivial.
There exists a function c̃(n) such that for any ǫ > 0,
lim h(n, (1 − ǫ)c̃(n)n−3/2 ) = 0 and lim h(n, (1 + ǫ)c̃(n)n−3/2 ) = 1.
n→∞
n→∞
Unfortunately, the argument we use does not give any information
on the asymptotic behaviour of c̃(n). Nonetheless we strengthen the
conjecture from [2] and predict that c̃(n) tends to a limit.
Conjecture. There exists a constant c > 0 such that for every constant
ǫ > 0 the following holds.
(i) If p ≤ (c − ǫ)n−3/2 , then a.a.s. Γ(n, p) is infinite and hyperbolic.
(ii) If p ≥ (c + ǫ)n−3/2 , then a.a.s. Γ(n, p) is trivial.
As we have already remarked it was shown in [2] that
lim sup c̃(n) < ∞ .
Although we cannot verify the conjecture and prove that
lim inf c̃(n) > 0,
we show however that c̃(n) cannot tend to 0 too quickly.
Theorem 2. Let ω and p be functions of n such that ω(n) → ∞ as
n → ∞, and
1/3
p(n) = n−3/2−ω/ log n .
Then a.a.s. Γ(n, p) is infinite, torsion-free, and hyperbolic.
The structure of the paper is the following. In the next section
we prove Theorem 1. The argument is based on a result of the second
author [6] which, up to our knowledge, has never been used to show that
properties of random groups have sharp thresholds. It states, roughly,
that if a property does not admit a sharp threshold then it is ‘local’,
i.e. its probability can be significantly changed by a local modification
of the random structure (see Lemma 3 below). We show that it is not
the case with the collapsibility. In particular, we show that adding
COLLAPSE OF RANDOM TRIANGULAR GROUP
3
to R a few more specially selected relators affects the probability of
collapsing less than a tiny increase of the probability p, which in turn
corresponds to adding to R a small number of random relators. Hence,
a local modification of the random structure cannot have large impact
on the probability of the property in question.
Then we prove Theorem 2. We follow closely the argument of Ollivier
who in [8] showed that the assertion holds for some function p(n) =
n−3/2+o(1) . This result was initially stated by Gromov [5] however it
seems that Ollivier was the first one who gave a complete proof of this
statement. We basically rewrite Ollivier’s argument (who, following
Żuk, used a slightly different model of the random triangular group)
to replace o(1) in the power by some explicit function.
2. Proof of Theorem 1
As mentioned in the introduction, the tool we use in order to prove
the sharpness of the threshold, as expressed in Theorem 1, is a result
from Friedgut [6]. In [6] the author gives a general necessary condition
for a property to have a coarse threshold, namely that it can be well
approximated by a local property. Although the main theorem in that
paper refers to graphs, the proof extends to hypergraph-like settings
where the number of isomorphism types of bounded size is bounded.
This includes random hypergraphs, random SAT Boolean formulae,
and also the model of random groups that we are addressing in the
current paper. A different, but very similar tool that can be used
here is Bourgain’s theorem that appears in the appendix of [6], which
has a weaker conclusion, but does not assume the symmetry of the
property in question, such as we have in our current problem. To
make things simpler we will use the ”working-mathematicians-version”
of these theorems, as described in Friedgut [7]. We present below the
lemma we will use, stated in terms of the problem at hand, but first let
us introduce some notation. For each value of n we denote by S the set
Sn of generators, and assume that Sn ⊂ Sn+1 , so that any fixed relator
is meaningful for all sufficiently large values of n. Next, let Γ(n, p) be
given by a presentation P = hS | Ri, where R is random, and let R∗
be a set of relators. We use the notation
h(n, p|R∗ ) := Pr[hS | R ∪ R∗ i is trivial].
We will use this notation both for R∗ = Rfixed = {r1 , . . . , rk }, a fixed
set of cyclically reduced relators of length three, and for R∗ = Rǫp , a
random set of relators chosen from Sn with probability ǫp (in which case
the probability is over both the choice of R and of R∗ ). The following
is an adaptation of theorems 2.2, 2.3, and 2.4 from [7] to the current
setting.
Lemma 3. Assume that there exists a function p = p(n), and constants
0 < α, ǫ < 1, such that there exist infinitely many values of n for which
4
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
it holds that
α < h(n, p) < h(n, (1 + ǫ)p) < 1 − α.
Then there exists a fixed (finite, independent of n but possibly dependent
on α and ǫ) set Rfixed = {r1 , . . . , rk } of cyclically reduced relators of
length three, and a constant δ > 0 such that for all such n
(i) h(n, p|Rfixed ) > h(n, p) + 2δ
(ii) h(n, p|Rǫp ) < h(n, p) + δ
We will now see how this lemma, together with the fact that Γ(n, p)
collapses when p = n−3/2+o(1) (see either Olliver [8], or Antoniuk,
Luczak and Świa̧tkowski [2] and Theorem 2) implies Theorem 1.
Proof of Theorem 1. Assume, by way of contradiction, that Theorem 1
does not hold. Then the assumptions of Lemma 3 are met. Indeed,
let pc = pc (n) be defined so that h(n, pc ) = 1/2. Then specifically
Theorem 1 does not hold with the choice of c̃(n)n−3/2 = pc . Hence
there exists an ǫ0 > 0 and a positive constant α < 1/2 such that for
infinitely many values of n either one has h(n, (1 + ǫ0 )pc ) < 1 − α,
or h(n, (1 − ǫ0 )pc ) > α. In the first case p = pc , α, ǫ = ǫ0 meet the
assumptions of Lemma 3, in the latter one can take p = (1 − ǫ0 )pc , α,
and ǫ = ǫ0 /(1 − ǫ0 ).
Now, let Rfixed be the set of relators guaranteed by Lemma 3, and let
Z := {z1 , z2 , . . . , zℓ } be the set of all generators involved in Rfixed and
all of their inverses. Let Rstrong be the following relation: z1 = z2 =
. . . = zℓ = e, where e is the identity. Clearly
h(n, p|Rstrong ) ≥ h(n, p|Rfixed ).
Next, consider the graph G = (V, E), where V = (S ∪ S −1 ) \ Z, and E
consists of all pairs xy such that there is a relator in R which involves
x, y and an element of Z (implying x = y −1 , since all elements in Z
are set by Rstrong to be equal to the identity). The probability that
a given pair xy forms an edge is less than 6ℓp, and these events are
independent, so G can be coupled with the Erdős-Rényi random graph
G(2n−ℓ, q) with q = O(n−3/2+o(1) ). Elementary first moment estimates
imply that a.a.s. G has fewer than n0.6 non-trivial components each of
them consisting of at most two edges. Indeed, the expected number of
connected subgraphs with exactly 3 edges is bounded by
(2n)3 q 3 + 16(2n)4 q 3 = O(n−0.5),
hence by Markov’s inequality a.a.s. there are no such subgraphs and
isolated edges and paths of length two are the only non-trivial components. Moreover, the expected number of edges in G can be bounded
by
(2n)2 q = O(n0.5 ),
and again by Markov’s inequality a.a.s. there are at most n0.6 of them.
Let R′ be the set of relators in R that are disjoint from Z. Slightly
COLLAPSE OF RANDOM TRIANGULAR GROUP
5
abusing the notation we will also use E to denote the set of relators
{xy : {x, y} ∈ E}. We have
(1)
h(n, p|Rstrong ) = Pr[hS \ Z | R′ ∪ Ei is trivial] + o(n−0.4 ),
where the o(n−0.4 ) accounts for the case where there exists in R a relator
involving two elements of Z. Note that both E and R′ are random.
Now let us consider the effect of Rǫp . First let us choose arbitrarily a
set M, |M| = m = ⌊n1.9 ⌋, of pairs of generators {a, b}, a, b ∈ S ∪ S −1 .
Define a graph G′ = (V ′ , E ′ ) with V ′ = (S ∪ S −1 ) \ Z and E ′ consisting
of all pairs xy such that Rǫp includes two relators of the form abx and
aby −1 , where {a, b} ∈ M. Note that the existence of such two relators
clearly implies that x = y −1 . Let X denote the number of paths of
length two in G′ = (V ′ , E ′ ). It is easy to see that for the expectation
of X we have
EX ≥ 0.5(2n)3 m2 (ǫp)4 = 4n3 n3.8 n4(−3/2+o(1)) = 4n0.8−o(1) ≥ 4n0.75 .
It is also easy to check that the standard deviation of X is also of order
O(n3 m2 p4 ), so from Chebyshev’s inequality we infer that a.a.s. the
number of such paths is larger than 3n0.75 . On the other hand, let Y
be the number of pairs of paths which share at least one vertex. The
expectation of Y is dominated by the number of pairs which share one
edge and is bounded from above by
EY ≤ (2n)4 m3 (ǫp)6 = 16n4 n5.7 n6(−3/2+o(1)) = 16n0.7+o(1) .
Thus, from Markov’s inequality, a.a.s. the number of such pairs is of
order smaller than n0.75 . Consequently, a.a.s. G′ = (V ′ , E ′ ) contains
at least n0.75 ≫ n0.6 disjoint paths of length two.
Now
(2)
h(n, p|Rǫp ) = Pr[hS \ Z | R′ ∪ E ′ i is trivial] − o(n−0.4 ) ,
where the term o(n−0.4 ) accounts for the fact that even if the group
generated by S \ Z collapses there are the generators in Z to account
for. However, if all generators in S \ Z are set to be equal to the
identity it suffices that for each element z ∈ Z there will be in R a
relator involving z and two elements of S \ Z. The probability of this
event is at least as large as 1 − o(n−0.4 ) as n tends to infinity.
We have shown that G′ contains at least n0.1 edge-disjoint subgraphs
isomorphic to the graph spanned by the edges of G, i.e. there is a coupling which shows that E ′ ⊇ E. Thus, the equations (1) and (2)
contradict the items 1 and 2 in the conclusion of Lemma 3. Consequently, the hypothesis of the lemma cannot hold, and the property in
question must have a sharp threshold.
3. Proof of Theorem 2
In order to show Theorem 2 we need to introduce a number of somewhat technical definitions. Let P = hS | Ri be a group presentation.
6
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
A van Kampen diagram with respect to the presentation P is a finite
planar 2-cell complex D given with an embedding D ⊆ R2 and satisfying the following conditions.
• D is connected and simply connected,
• For each edge e and one of its orientations we assign a generator
s ∈ S. If we change the orientation of e to the opposite one, we
replace the generator s by s−1 .
• Each 2-cell c is assigned a relator r ∈ R, the number of edges
on the boundary of c is equal to the length of the relator r,
• For each 2-cell c there is a vertex v such that the word read
from v in some direction of the boundary of the cell is the
relator r ∈ R assigned to c.
For a van Kampen diagram D the size of the diagram, denoted by
|D|, is the number of faces (2-cells) of D. The boundary of D, denoted
by ∂D, is the boundary of the complement of D in R2 and |∂D| denotes
its size, that is the number of edges in ∂D. The boundary word is any
word read from some vertex in ∂D in one of the directions around the
boundary. In particular, the length of this word is precisely |∂D|.
A van Kampen diagram is said to be reduced if there is no pair of
cells c and c′ sharing at least one edge e, which are assigned the same
relator r, and are such that if we read the word r on the boundaries of c
and c′ the edge e has the same orientation and corresponds to the same
letter in the relator with respect to the starting point. A van Kampen
diagram is said to be minimal if it is reduced and no other reduced van
Kampen diagram with smaller number of faces has the same boundary
word.
Let Γ be the group given by a presentation P = hS | Ri. In order to
verify whether Γ is hyperbolic it is enough to consider minimal reduced
van Kampen diagrams with respect to the presentation P and to show
that they fulfill a certain geometric condition. In particular, it is known
that a group generated by a presentation P = hS | Ri is hyperbolic
if and only if there exists a coefficient δ > 0 such that every minimal
reduced van Kampen diagram D with respect to the presentation P
satisfies the linear isoperimetric inequality |D| ≤ δ|∂D| (cf. [1]).
However, verifying that every reduced van Kampen diagram satisfies
a certain isoperimetric inequality may turn out fairly hard since it
requires showing that this inequality holds for all of them. At this
point, the so called local to global principle for hyperbolic geometry
(or Cartan-Hadamard-Gromov-Papasoglu theorem) (cf.[9]) comes to an
aid. This principle states that it is enough to verify the isoperimetric
inequality for a finite family of van Kampen diagrams.
Theorem 4 (Cartan-Hadamard-Gromov-Papasoglu). Let P = hS | Ri
be a triangular group presentation. Assume that for some integer K >
0 every minimal reduced van Kampen diagram D w.r.t. P and of size
COLLAPSE OF RANDOM TRIANGULAR GROUP
7
K 2 /2 ≤ |D| ≤ 240K 2 satisfies the inequality
K
|∂D|.
200
Then for every minimal reduced van Kampen diagram w.r.t. P the following isoperimetric inequality is true
|D| ≤
|D| ≤ K 2 |∂D|.
Following Ollivier [8], in order to simplify the verification of the
isoperimetric condition for van Kampen diagrams, we introduce a klabeled decorated abstract van Kampen diagram (davKd). For simplicity, we do it only for groups with triangular presentations. A k-labeled
b given with an embedding
davKd is a finite planar 2-cell complex D
b ⊆ R2 and satisfying the following conditions:
D
b is connected and simply connected,
• D
• each 2-cell c is a triangle with a label i from {1, . . . , k}, with
a marked vertex on its boundary and an orientation at this
vertex,
• for all i ∈ {1, . . . , k} and for any 2-cell c labeled by i, starting
from the marked vertex and going around according to prescribed orientation at this vertex, the edges of c get abstract
labels i1 , i2 , i3 .
Now, let P = hS | Ri be a triangular presentation and consider a
b
one-to-one map φ : {1, . . . , k} → R which assigns relators to faces of D.
Let φ1 (i), φ2 (i), φ3 (i) be the generators appearing on the first, second
and third position of the relator φ(i) respectively. Then φ induces
a map φe : {ir }1≤i≤k,1≤r≤3 → S which assigns to each abstract label
e r ) = φr (i). The map φ is called
ir a generator from S, namely φ(i
a fulfillment map, if additionally whenever there is an edge with two
e r ) = φ(j
e s ). We say that a given davKd
abstract labels ir , js , then φ(i
b is fulfillable with respect to the presentation P = hS | Ri if there
D
b
exists a fulfillment map φ : {1, . . . , k} → R for D.
A davKd is said to be reduced if there is no pair of faces sharing at
least one edge, which are assigned the same label i and have opposite
orientations, and such that the common edge gets the same abstract
label ir from both faces. A davKd is said to be minimal if there is
no other davKd with smaller number of faces and having the same
boundary word (with respect to the abstract labels of edges).
Our aim is to show that for a function f = f (n) = ω/ log1/3 n, where
ω = ω(n) → ∞ and p = n−3/2−f , a.a.s. all minimal reduced van Kampen diagrams D with respect to the random presentation in Γ(n, p) satisfy the isoperimetric inequality with a coefficient δ = δ(n) = (200/f )2 .
But to do it, it is enough to verify this inequality for all minimal reduced
k-labeled davKd’s, so we show that the following statement holds.
8
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
Lemma 5. Let ω = ω(n) → ∞, ω < log log n, f = f (n) = ω/ log1/3 n,
and p = p(n) = n−3/2−f . Then a.a.s. for each minimal reduced kb fulfillable w.r.t. Γ(n, p), we have
labeled davKd D,
b ≤ 200/f 2 |∂ D|.
b
|D|
In particular, a.a.s. each minimal reduced van Kampen diagram D
w.r.t. Γ(n, p) satisfies the linear isoperimetric inequality
2
|D| ≤ 200/f |∂D|.
Proof. Let f = f (n) = ω/ log1/3 n. From Theorem 4 it is enough to
b of size at most |D|
b ≤ 240(200/f )2
show that a.a.s. each given davKd D
satisfies the linear isoperimetric inequality with the coefficient 1/f . We
b with size
do it in two steps. First, we show that for any davKd D
2
b
bounded by |D| ≤ 240(200/f ) one of the following two possibilities
holds:
b satisfies the isoperimetric inequality with the coefficient 1/f ;
(i) D
b is fulfillable by Γ(n, p) is bounded from
(ii) the probability that D
−f /2
above by n
.
Using this dichotomy, we then show that the probability that there is
b not satisfying the isoperimetric ina bounded size fulfillable davKd D
equality in question goes to 0 with n → ∞. Hence, a.a.s. all sufficiently
small fulfillable davKd’s satisfy this inequality.
b be a davKd with m = |D|
b faces having k distinct labels and
Let D
b boundary edges. If each face
with l1 internal edges and l2 = |∂ D|
b corresponds to a difis assigned a different label, i.e. each cell of D
b is fulfillable is bounded above
ferent relator, the probability that D
l1 +l2 m
by n
p . This is in fact a rather easy case and showing that for
all diagrams with different labels and fulfillable in Γ(n, p) a.a.s. an
isoperimetric inequality holds with a coefficient 1/f is rather straightb the isoperimetric inequalforward. Indeed, assume that for a given D
b > |∂ D|
b = l2 . Notice also that
ity does not hold, that is f m = f |D|
3m = 2l1 + l2 ≥ 2l1 + 1 as there is at least one edge in the boundb Then the probability that D
b is fulfillable is bounded by
ary of D.
l1 +l2 m
l1 +l2 (−3/2−f )m
−1/2
n
p =n
n
≤n
. Moreover, as we will show later,
b
b ≤ 240(200/f )2 is of order
the number of different davKd’s D with |D|
much smaller than n1/2 , hence a.a.s. there are no such diagrams which
are fulfillable and at the same time do not satisfy the isoperimetric
inequality.
The main challenge is to deal with diagrams where some of the labels
may appear more than once. On one hand, this reduces the number of
distinct relators used to fulfill the diagram. On the other hand, this also
imposes some restrictions on the generators used in this assignment.
To control the influence of these two factors we follow an approach of
COLLAPSE OF RANDOM TRIANGULAR GROUP
9
Ollivier from [8]. To this end let mi denote the number of faces labeled
with i. Without loss of generality we may assume that m1 ≥ m2 ≥
b is fulfillable with
. . . ≥ mk . We want to count the probability that D
respect to the random presentation given by Γ(n, p). We introduce an
b which captures all the constraints resulting
auxiliary graph G = G(D)
from the structure of the davKd. The vertices of the graph G are the
abstract labels {ir }1≤i≤k,1≤r≤3 and two vertices ir , js are adjacent if
b carrying labels ir and js . We also define a family
there is an edge in D
of induced subgraphs G1 ⊂ G2 ⊂ . . . ⊂ Gk of G, where Gl is a subgraph
of G induced by vertices {ir }1≤i≤l,1≤r≤3. Let us remark that the main
reason why this approach to davKd is so convenient is the fact that G
contains no loops if and only if davKd is reduced.
Now, the number of connected components in the graph G is the
total number of distinct generators which can appear in relators used
b In some sense, this gives us the number
in the fulfillment map φ for D.
of degrees of freedom we have while choosing relators for the fulfillment
map. Indeed, if two vertices are adjacent in G, then the corresponding
b are mapped by φe to the same generator. Therefore,
abstract labels in D
if we denote the number of connected components in the graph G by
C, then we obtain the estimate
b is fulfillable) ≤ nC pk .
Pr(D
A similar argument works for the graphs Gl , which correspond to a
partial assignment, namely we assign relators to faces bearing labels
1, . . . , l. Let Cl denote the number of connected components in Gl .
Then
b is fulfillable) ≤ nCl pl = nCl −l(3/2+f ) ,
Pr(D
therefore putting
dl = Cl − l(3/2 + f )
we get the estimate
b is fulfillable) ≤ nmin dl .
Pr(D
Thus, if for some l we have dl < −f /2, then
b is fulfillable) ≤ n−f /2 .
Pr(D
On the other hand, we claim that in the case of min dl ≥ −f /2, the
b satisfies the isoperimetric inequality with the coefficient
diagram D
1/f . Indeed, as was observed by Ollivier [8] (see p.613) one gets that
b ≥ 3|D|(1
b − 2d) + 2
|∂ D|
k
X
l=1
dl (ml − ml+1 ),
10
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
where the parameter d is the density of the random triangular group,
which in our notation is equal to 1/2 − f /3. Thus
b ≥ 2f |D|
b +2
|∂ D|
k
X
dl (ml − ml+1 ).
l=1
Next, observe that ml − ml+1 ≥ 0 for every l and
if min dl ≥ −f /2, then
b ≥ 2f |D|
b −f
|∂ D|
k
X
l=1
P
b Hence,
ml = |D|.
b
(ml − ml+1 ) ≥ f |D|,
and we arrive at the desired isoperimetric inequality
b ≤ 1 |∂ D|.
b
(3)
|D|
f
To complete our argument we use the local to global principle. In
our case the coefficient K from Theorem 4 is equal to 200/f . We
need to show that the probability that there exists a diagram of size
at most 240(200/f )2 violating the isoperimetric inequality (3) tends
to 0. If this is the case, then the random presentation in the Γ(n, p)
model a.a.s. meets the assumptions of the local to global principle,
hence a.a.s. each diagram satisfies the isoperimetric inequality with
the coefficient (200/f )2.
First, we need to count the number of all possible davKd’s with
precisely m faces. To do this we take the number of all possible triangulations of a polygon which consist of exactly m triangles, and then
for each triangle we choose the orientation in 2 ways, the starting point
in 3 ways and the label of this face in m ways.
A triangulation of a polygon with m triangles has at most m + 2
vertices. Thus, the number of such triangulations is bounded from
above by the number of distinct triangulations t(N) of a 2-dimensional
sphere with N vertices, where N ≤ m+3, which in turn we bound from
above by αm for some absolute constant α > 0 (see Tutte [10]). Hence,
the total number of davKd’s with exactly m faces can be bounded by
αm · 6m · mm /m! ≤ β m , where β > 0 is an appropriate constant. Therefore, the probability that a fulfillable davKd of size at most 240(200/f )2
violates the isoperimetric inequality (3) is at most
X
γ
β m n−f /2 ≤ β f 2 n−f /2 ,
m≤240(200/f )2
for some constant γ > 0. It is easy to verify that the right hand side of
this inequality tends to 0 as n → ∞ provided f = f (n) = ω/ log1/3 n.
b with |D|
b ≤ 240(200/f )2 fulfillable in
Hence, a.a.s. for every davKd D
Γ(n, p) the isoperimetric inequality holds with a coefficient 1/f and so
the assertion follows from Theorem 4.
COLLAPSE OF RANDOM TRIANGULAR GROUP
11
Proof of Theorem 2. As the group properties in question are monotone
1/3
decreasing, it is enough to consider p(n) = n−3/2−ω/ log n with ω <
log log n. Observe first that a.a.s. Γ(n, p) is aspherical, i.e. there exists
no reduced spherical van Kampen diagram with respect to the random
presentation Γ(n, p). Indeed, such a spherical reduced van Kampen
diagram has zero boundary, which violates the isoperimetric inequality
proved in Lemma 5. Since Γ(n, p) is aspherical, it is torsion-free (see,
for instance, Brown [4], p. 187). Consequently, a.a.s. Γ(n, p) is an
infinite, hyperbolic group.
Let us conclude with a remark that in order to show the conjecture
we have to prove Theorem 2 with τ (n) = O(1/ log n) instead of τ (n) =
ω/(log n)1/3 . Such an improvement seems to require a new approach
and, perhaps, a stronger version of Theorem 4.
References
[1] J. Alonso, T. Brady, D. Cooper, V. Ferlini, M. Lustig, M. Mihalik, M. Shapiro,
and H. Short et al., Notes on word hyperbolic groups, Group Theory from a Geometrical Viewpoint, (E. Ghys, A. Haefliger, and A. Verjovsky, eds.) World Scientific, Singapore, 1991, 3–63.
[2] S. Antoniuk, T. Luczak, and J. Świa̧tkowski, Collapse of random triangular
groups: a closer look , Bull. Lond. Math. Soc. 46,4 (2014), 761–764.
[3] B. Bollobás and A. Thomason, Threshold functions, Combinatorica 7 (1987),
35–38.
[4] K. Brown, ”Cohomology of groups”, Graduate Texts in Mathematics 87,
Springer, 1982.
[5] M. Gromov, Asymptotic invariants of infinite groups. Geometric Group Theory,
London Math. Soc. Lecture Note Ser. 182 (1993), 1–295.
[6] E. Friedgut, Sharp thresholds of graph properties, and the k-sat problem. With
an appendix by Jean Bourgain. Journal of the American Math. Soc. 12,4 (1999),
1017–1054.
[7] E. Friedgut, Hunting for sharp thresholds, Random Struct. Algorithms 26
(2005), 37–51.
[8] Y. Ollivier, Sharp phase transition theorems for hyperbolicity of random groups,
Geom. Funct. Anal. 14 (2004), 595–679.
[9] P. Papasoglu, An algorithm detecting hyperbolicity, (Minneapolis, MN and New
Brunswick, NJ, 1994) DIMACS Ser. Discrete Math. Theoret. Comput. Sci., vol.
25, Amer. Math. Soc., Providence, RI (1996), 193–200.
[10] W. T. Tutte, A census of planar triangulations, Canad. J. Math. 14 (1962),
21–38.
[11] A. Żuk, Property (T) and Kazhdan constants for discrete groups, Geom. Funct.
Anal. 13 (2003), 643–670.
12
SYLWIA ANTONIUK, EHUD FRIEDGUT, AND TOMASZ LUCZAK
Adam Mickiewicz University, Faculty of Mathematics and Computer
Science ul. Umultowska 87, 61-614 Poznań, Poland
E-mail address: [email protected]
Weizmann Institute of Science, Faculty of Mathematics and Computer Science 234 Herzl St. Rehovot 7610001, Israel
E-mail address: [email protected]
Adam Mickiewicz University, Faculty of Mathematics and Computer
Science ul. Umultowska 87, 61-614 Poznań, Poland
E-mail address: [email protected]
| 4math.GR
|
Improved Successive Cancellation Flip Decoding of
Polar Codes Based on Error Distribution
Carlo Condo, Furkan Ercan, Warren J. Gross
arXiv:1711.11096v2 [cs.IT] 23 Jan 2018
Department of Electrical and Computer Engineering, McGill University, Montréal, Québec, Canada
Email: [email protected], [email protected], [email protected]
Abstract—Polar codes are a class of linear block codes that
provably achieves channel capacity, and have been selected as
a coding scheme for 5th generation wireless communication
standards. Successive-cancellation (SC) decoding of polar codes
has mediocre error-correction performance on short to moderate
codeword lengths: the SC-Flip decoding algorithm is one of the
solutions that have been proposed to overcome this issue. On
the other hand, SC-Flip has a higher implementation complexity
compared to SC due to the required log-likelihood ratio (LLR)
selection and sorting process. Moreover, it requires a high number
of iterations to reach good error-correction performance. In this
work, we propose two techniques to improve the SC-Flip decoding algorithm for low-rate codes, based on the observation of
channel-induced error distributions. The first one is a fixed index
selection (FIS) scheme to avoid the substantial implementation
cost of LLR selection and sorting with no cost on error-correction
performance. The second is an enhanced index selection (EIS)
criterion to improve the error-correction performance of SCFlip decoding. A reduction of 24.6% in the implementation cost
of logic elements is estimated with the FIS approach, while
simulation results show that EIS leads to an improvement on
error-correction performance improvement up to 0.34 dB at a
target FER of 10−4 .
I. I NTRODUCTION
Polar codes [1] are error-correcting codes proven to achieve
channel capacity with infinite code length. They have been
selected as a coding scheme in the 5th generation wireless systems standards (5G), within the enhanced mobile broadband
communication scenario (eMBB), and are being considered
for both ultra-reliable low-latency communications (URLLC)
and massive machine-type communications (mMTC) [2]. The
variety of system parameters foreseen in 5G demand improved
decoding algorithms with a focus on reliable communications
and low power consumption.
In [1], the successive-cancellation (SC) decoding of polar
codes was proposed. It is able to achieve channel capacity
when the code length tends to infinite, but its error-correction
performance degrades at shorter lengths. To overcome this limitation, the SC-List decoding algorithm was introduced in [3].
The improved error-correction performance comes at the cost
of longer latency and higher complexity: various contributions
have improved speed and reduced implementation cost [4]–[6].
Successive-cancellation flip (SC-Flip) decoding [7] takes
a different approach to the improvement of SC, relying on
an implementation complexity lower than that of SC-List,
mainly sacrificing average decoding latency, and providing
error-correction performance comparable to that of SC-List
with a list size of 2. SC-Flip relies on multiple subsequent
applications of SC, and on the identification of the most likely
points in which the SC algorithm made a wrong decision. This
operation is based on the magnitude of logarithmic likelihood
ratios (LLRs) associated to the estimated codeword bits, and
it is costly to implement. Modifications proposed in [8], [9]
have shown that the error identification and correction process
of SC-Flip can be greatly improved. A decoding approach
similar to [5] has been recently proposed for SC-Flip in [10],
reducing latency at no cost in error-correction performance,
but substantially increasing the implementation complexity of
the decoder.
In this work, we propose two techniques to improve SCFlip decoding, based on the distribution of the first wrong
estimation incurred by SC. The first method simplifies the
wrong estimation identification process without degrading
the error-correction performance, leading to substantial complexity reduction, while the second method uses the error
distribution to restrict the search space to the bit indices most
likely to incur errors. Simulation results show the effectiveness
of the proposed techniques for low-rate polar codes, over a
wide range frame error rate (FER) intervals.
The remainder of this work is organized as follows: in
Section II polar codes and their decoding algorithms are
introduced. In Section III the proposed techniques are detailed,
and simulation results, together with comparison with the state
of the art, are presented in Section IV. Conclusions are drawn
in Section V.
II. P RELIMINARIES
A. Polar Codes
A polar code P C(N, K) of code length N and rate R =
K/N is a linear block code that divides N = 2n , n ∈ Z+
bit-channels in K reliable ones and N − K unreliable ones.
Information bits are transmitted through the reliable channels,
whereas unreliable channels are fixed to a value known by
both transmitter and receiver, and are thus called frozen bits.
Polar codes are encoded through the following matrix
multiplication:
−1
−1 ⊗n
xN
= uN
G ,
(1)
0
0
−1
where xN
= {x0 , x1 , . . . , xN −1 } represents the encoded
0
N −1
vector, u0
= {u0 , u1 , . . . , uN −1 } is the input vector, and
the generator matrix G⊗n is obtained as the n-th Kronecker
product of the polarization matrix G = [ 11 01 ]. Due to the
recursive nature of the encoding process, an N -length polar
S=3
α
β
S=2
αr
l
α
l
β
S=1
βr
S=0
û0
û1
û2
û3
û4
û5
û6
û7
Fig. 1. Successive-cancellation decoding tree for a P C(8, 5) code.
code can be interpreted as the concatenation of two polar codes
of length N/2.
The scheduling of operations required by the SC decoding
algorithm allows to see its process as a binary tree search,
where the tree is explored depth-first, with priority given to
the left branch. Fig. 1 portrays an example of SC decoding
tree, for P C(8, 5). Each node receives from its parent a vector
of LLRs α = {α0 , α1 , . . . , α2S −1 }. Each node at stage S
computes the left αl = {αl0 , αl1 , . . . , αl2S−1 −1 } and right αr =
{αr0 , αr1 , . . . , αr2S−1 −1 } LLR vectors sent to child nodes as
αli = sgn(αi ) sgn(αi+2S−1 ) min(|αi |, |αi+2S−1 |),
(2)
αri = αi+2S−1 + (1 − 2βil )αi .
(3)
The LLRs at the root node are initialized as the channel LLR
−1
yN
. Nodes receive the partial sums β from their left β l =
0
l
{β0 , β1l , . . . , β2l S−1 −1 } and right β r = {β0r , β1r , . . . , β2rS−1 −1 }
child node:
l
βi ⊕ βir , if i ≤ 2S−1
βi =
(4)
otherwise.
βir ,
where ⊕ is the bitwise XOR operation, and 0 ≤ i < 2S . At
−1
leaf nodes, the β value and the estimated bit vector ûN
are
0
computed as
0, when αi ≥ 0 or i ∈ Φ;
βi =
(5)
1, otherwise.
The SC-List decoding algorithm [3] improves the errorcorrection performance of SC by relying on L parallel SC
decoding paths. Each path is associated to a metric, that helps
deciding which of the L paths is more likely to be correct.
B. Successive-Cancellation Flip Decoding
To improve the error-correction performance of SC, in [7]
the SC-Flip decoding algorithm was proposed. It is based on
the observation that a failed SC decoding process is due to
either an incorrect bit estimation caused by noise introduced by
the channel or, due to the sequential nature of SC, to a previous
incorrect bit estimation. Thus, the first wrong estimation is
always caused by the channel noise. To evaluate the impact
of wrong estimations, a genie-like decoder called SC-Oracle
was created: using foreknowledge of the transmitted codeword,
it identifies the channel-induced errors and ensures that SC
estimates the bit correctly. SC-Oracle shows that avoiding all
wrong decisions caused by the channel noise results in significantly improved SC error-correction performance. Moreover,
simulations with SC-Oracle have shown that a failed SC
decoding is mostly due to a single wrong decision caused by
channel noise, an event that denote as E1 .
The SC-Flip algorithm attempts the identification and correction of E1 events. A cyclic redundancy check (CRC) code
with a C-bit remainder is used to encode the information
bits. If the CRC check passes at the end of SC decoding, the
estimated codeword is assumed correct. In case the CRC check
detects an error, the Tmax LLRs with the smallest magnitude,
representing the bit estimations with lowest reliability, are
stored and sorted. The bit associated to the smallest LLR
is flipped, and SC is is applied to the part of the decoding
tree that follows it. This process is repeated for all the Tmax
indices, or until the CRC passes.
In general, increasing Tmax improves the error-correction
performance of SC-Flip, bringing it ever closer to that of SCOracle. In fact, the performance gap between SC-Flip and
SC-Oracle is due to two possible cases: either the estimated
codeword with a correct CRC check still contains errors, or
the decoding stopped after reaching the maximum number of
iterations Tmax without being successful.
Further improvements for SC-Flip decoding algorithm have
been recently proposed in [8] and [9], where a generalized
SC-Flip algorithm uses nested flips to correct more than one
erroneous decision with a single CRC, with a simulationbased scaling metric also introduced to help the baseline SCFlip decoder detect the erroneous bit indices more accurately.
Simulation results show an improvement of 0.4 dB when
Tmax = 10 with respect to SC-Flip. The implementation of
this method requires parallel decoders similar to SC-List.
III. I MPROVED S UCCESSIVE -C ANCELLATION F LIP
D ECODING
We propose two new techniques to improve the errorcorrection performance of SC-flip decoding, and to reduce the
implementation complexity of SC-Flip decoders.
A. Fixed Index Selection
In [7], it was shown that the average number of iterations for
SC-Flip decoding converges to that of a single SC decoder at
moderate to high Eb /N0 . However, a single iteration of SCFlip requires additional operations with respect to SC. The
standard SC-Flip decoding algorithm decides which bits to flip
by identifying the Tmax least reliable bit estimations among
the non-frozen indices. Since the estimation reliability is
directly associated to the magnitude of its LLR value (5), they
correspond to the Tmax LLRs with the smallest magnitude.
The associated bits are flipped in ascending order starting from
the one with she smallest |α|: thus, the construction of the
list requires the Tmax LLRs to be not only selected, but also
sorted. This operation results in substantial implementation
cost, that is the main contributor to the additional hardware
complexity of SC-Flip decoders with respect to SC decoders.
Eb /N0 = 2.5 dB
Normalized E1 Occurrence
1
Eb /N0 = 3.0 dB
0.8
0.6
0.4
0.2
0
0
10
20
30
40
50
60
70
80
90
100
110
120
130
140
150
160
170
180
190
Non-frozen indices
In Fig. 2 it is shown the normalized distribution of E1
occurrence over the non-frozen bit indices for P C(1024, 170),
with C = 32, obtained simulating 5 × 105 frames, for
two Eb /N0 points. It can be noticed that bits have different
probability of E1 , with a select few having a higher probability
of E1 than the remaining ones, and the majority of them
not incurring any error. The height and position of the error
distribution spikes can be used to determine, off-line, which
bits to flip and in which order. In the provided example for
Eb /N0 = 3.0 dB, considering the non-frozen bits indexed
from 0 to K +C −1, the first flipped bit would be that at index
29, corresponding to the highest E1 occurrence, followed by
those at index 2, 35, 7, and so on, in descending probability of
E1 occurrence order, until Tmax attempts have been reached
or the CRC check passes. Determining which bits to flip
off-line allows to avoid the LLR selection and sorting logic.
Thus, the resulting SC-Flip decoder has an implementation
cost negligibly different from that of an SC decoder.
B. Enhanced Index Selection
It is possible to use the error distribution information to
increase the effectiveness of the standard LLR-based bit flipping selection scheme of SC-Flip. In its original formulation
[7], SC-Flip chooses which Tmax bits to flip among all the
K + C non-frozen bits in the code. However, from Fig. 2 we
can see that the majority of information bits have very low
error probability, that can be considered negligible depending
on the target FER. Consequently, it is possible to restrict the
LLR selection to the set of bit indices corresponding to high
enough probability of E1 .
This can improve the error-correction performance by increasing the chance of the wrong estimation to be included
within a limited number of Tmax indices, automatically excluding LLRs that have an averagely low magnitude, but
correspond to indices with low error probability. Let us in
fact observe Fig. 3, that shows the average LLR magnitude
for each information bit index for P C(1024, 170), C = 32,
Normalized average LLR magnitude
Fig. 2. Normalized distribution of E1 occurrence for P C(1024, 170), C = 32, 5 × 105 simulated frames.
1
0.8
0.6
0.4
0.2
0
0
20
40
60
80
100
120
140
160
180
Non-frozen indices
Fig. 3. Normalized average LLR magnitude at each non-frozen bit index for
P C(1024, 170) at Eb /N0 = 2.5 dB and C = 32. Indices highlighted in
red correspond to the non-zero occurrence of E1 shown in Fig. 2.
at Eb /N0 = 2.5 dB . It can be seen that the average LLR
magnitude |α| can vary quite a lot depending on the bit.
Highlighted in red are the LLRs whose indices correspond to
the non-zero occurrences of E1 shown in Fig. 2: many LLRs
of comparable or even smaller average magnitude are instead
associated to indices with very low probability of E1 . These
LLRs can feature among the Tmax with the smallest absolute
value and be selected by the standard SC-Flip algorithm, but
correspond to the erroneous bit in a negligible number of cases.
On the other hand, their being taken in account can force the
actual wrong estimation out of the Tmax flipped indices.
The error distribution as shown in Fig. 2 depends on the
number of simulated frames we are considering. With enough
frames, every information bit index is associated with a nonzero E1 occurrence: the zero error probability in Fig. 2 means
that no errors were encountered over the 5 × 105 simulated
2
b /N0
100
100
10−1
10−1
10−2
FER
FER
10−2
10−3
10−3
10−4
10−4
10−5
10−5
10−6
1
1.5
2
2.5
3
3.5
Eb /N0 [dB]
2.5
SC
SC-Flip - FIS
SC-List (L = 2)
SC-Oracle
3
SC-Flip
SC-Flip - EIS
SC-List (L = 4)
3.5
Fig. 4. FER curves for for P C(1024, 170), C = 32, Tmax = 10 with
different decoding approaches.
[dB]
frames. Given a target FER, it is possible to exclude from the
considered indices all those associated to error probabilities
lower than a certain threshold, in order to maximize the
chances of identifying the wrong estimation within Tmax
attempts. Moreover, to take in account the relative probability
of E1 occurrence, before sorting LLRs are scaled with respect
to the the associated E1 occurrence (see Fig. 2).
IV. S IMULATION R ESULTS
The error-correction performance of the proposed methods
has been evaluated and compared against the state of the
art. Fig. 4 and Fig. 5 show the FER for P C(1024, 170)
and P C(1024, 256) respectively, with C = 32. Both codes
have been constructed targeting a signal-to-noise ratio of
2.5 dB, and simulations have been run on AWGN channel
and BPSK modulation. Along with standard SC, curves are
plot for SC-Flip [7], SC-List [3], SC-Oracle, and SC-Flip with
the proposed fixed index selection (FIS) and enhanced index
selection (EIS). The maximum number of iterations has been
set to Tmax = 10 for all flip-based algorithms.
The FER of SC is the highest among all considered
algorithms, since all incarnations of SC-Flip substantially
improve on its error correction performance. On the other
hand, the SC-Oracle curve represents the case in which all
E1 occurrences are successfully corrected, and thus can be
interpreted as the lower bound of flip-based FER. The SC-Flip
decoding algorithm significantly improves the error-correction
performance of SC, but in both Fig. 4 and Fig. 5 a substantial
gap from the SC-Oracle bound can be observed, consisting of
0.38 dB for P C(1024, 170) and of 0.47 dB for P C(1024, 256)
at FER=10−4 .
SC-Flip with FIS is shown to perform slightly better than
standard SC-Flip for P C(1024, 170) in Fig. 4, with a gain of
1
1.5
2
2.5
3
3.5
Eb /N0 [dB]
SC
SC-Flip - FIS
SC-List (L = 2)
SC-Oracle
SC-Flip
SC-Flip - EIS
SC-List (L = 4)
Fig. 5. FER curves P C(1024, 256), C = 32, Tmax = 10 with different
decoding approaches.
0.08 dB at FER=10−4 . In case of P C(1024, 256), the FER
curves match. The Tmax = 10 indices considered by the
method are those corresponding to the highest probabilities
of E1 . This technique allows to substantially reduce the
implementation complexity of an SC-Flip decoder. The second
column of Table I reports the number and type of operations
required by a standard SC-Flip decoder, assuming a semiparallel structure similar to [11], and omitting the memory
requirements. The complexity is divided among the three main
operations that an SC-Flip decoder has to perform: F (2), G (3),
C (4), and the sorting and selection of the Tmax indices to flip.
Basic modules as comparators, XORs, multiplexers, adders
and registers are used to approximate the implementation
complexity; the number of parallel processing elements P e,
along with the LLR quantization bits Q, also affect the total
cost. It can be seen that FIS allows to completely avoid the
logic cost of the sorter function. To get a sense of its impact on
the total logic complexity, we consider the XOR block having
a cost of 1, the multiplexer a cost of 3, the adder and the
comparator a cost of 5 and the register a cost of 4. Supposing
an architecture with P e = 32, Q = 6 and Tmax = 10, the
sorter accounts for 24.6% of the total logic complexity.
Compared to SC-Flip, the EIS approach allows for 0.29 dB
and 0.34 dB gain for P C(1024, 170) and P C(1024, 256)
respectively. In Fig. 4, a total of 26 indices are considered,
while 45 are taken in account for the higher rate case portrayed
in Fig. 5. Compared to SC-List, for P C(1024, 170), the FER
of SC-Flip with EIS sits close to the curve obtained with list
size L = 4, outperforming the L = 2 curve of approximately
0.31 dB. For P C(1024, 256), the error-correction performance
of the EIS approach matches that of SC-List with L = 2. It
was shown in [12] that while an outer CRC code improves the
SC-Flip
Pe × Q × Comparator
2 × Pe × XOR
Pe × Q × MUX
Pe × Q × Sum
Pe × MUX
Pe × MUX
Tmax × Q × D-FF
Tmax × Q × Comparator
2 × Tmax × Q × MUX
F
G
C
Sorter
SC-Flip - FIS
Pe × Q × Comparator
2 × Pe × XOR
Pe × Q × MUX
Pe × Q × Sum
Pe × MUX
Pe × MUX
N/A
3
Average number of iterations
TABLE I
I MPLEMENTATION LOGIC COST BREAKDOWN FOR SC-F LIP AND
SC-F LIP - FIS.
2.5
2
1.5
1
1
100
1.5
2
2.5
3
3.5
Eb /N0 [dB]
SC
SC-Flip - FIS
SC-Flip - EIS 20 indices
10−1
FER
10−2
SC-Flip
SC-Flip - EIS 26 indices
SC-Flip - EIS 17 indices
Fig. 7. Average number of iterations for P C(1024, 256), C = 32, Tmax =
10 with different decoding approaches.
10−3
10−4
10−5
10−6
1
1.5
2
2.5
3
3.5
Eb /N0 [dB]
SC-Flip
SC-Flip - EIS 26 indices
SC-Flip - EIS 17 indices
2
2.5
3
SC-Flip - EIS 36 indices
SC-Flip - EIS 20 indices
SC-Oracle
3.5
Fig. 6. FER curves for P C(1024, 170), C = 32, Tmax = 10 with different
decoding approaches and number of indices considered by SC-Flip - EIS.
Eb /N0 [dB]
error-correction performance of SC-List decoding significantly
at medium to high code rates, at low code rates the CRC is
detrimental. Thus, for a fair comparison, we did not consider
any CRC in the SC-List curves. The indices used by EIS have
been found simulating a total of 1 × 106 frames, and selecting
those with the higher probability of E1 . The impact of different
number of considered indices in EIS is shown in Fig. 6 for
P C(1024, 170): it can be seen that decreasing it tends to
degrade the error-correction performance, while increasing it
does not bring substantial advantage. This remains true as long
as the number of indices considered by EIS is substantially
lower than K + C, at which point the FER will degrade to the
same obtained by standard SC-Flip.
As the code rate increases, the error correction performance
of both FIS and EIS starts degrading if Tmax is not increased.
This is due to the fact that as the number of information bits in
the code rises, the distribution of E1 occurrence spreads over
more bit indices. This results in a higher number of indices that
need to be considered by the proposed method: a higher Tmax
is thus needed to maintain the error-correction performance.
Fig. 7 depicts the average number of iterations for different
decoding approaches, where an iteration is defined as an
application of the SC algorithm over the N codeword bits.
It can be observed that at low Eb /N0 points, SC-Flip with the
FIS technique has up to 50% higher average iterations with
respect to standard SC-Flip [7], while the use of EIS entails an
increment of up to 25%. Both EIS and FIS reduce the number
of cases in which SC-Flip reaches the Tmax attempts, lowering
the average number of iterations. For example, the SC-Flip
decoding algorithm with P C(1024, 170) at Eb /N0 = 1 dB is
not able to find the correct codeword 40% of the time, with
Tmax = 10 and C = 32. With the FIS criterion, this failure
rate drops by 15%, while with EIS, it drops by 25%. However,
this positive contribution is offset by the position of the indices
with high probability of E1 occurrence, as shown in Fig. 23. The majority of these indices are in fact found towards
the beginning of the codeword: thus, each additional decoding
attempt requires almost a full iteration. On the contrary, in
standard SC-Flip there are no constraints on which indices to
consider, and at low Eb /N0 , the channel noise causes most
LLRs to have very low magnitude. Consequently, the Tmax
indices can be spread out over the whole codeword, leading to
standard SC-Flip having a lower average number of iterations.
At higher Eb /N0 , where the FER is of interest, the average
number of iterations quickly converges to 1 for all methods.
V. C ONCLUSION
In this work, we have proposed two techniques to reduce
the implementation complexity and reduce the FER of the
SC-Flip decoding algorithm. They are based on the identification of the bit indices where a channel-induced error is
most likely to occur. The proposed techniques have shown
significant improvement over SC-Flip when applied to low-
rate polar codes. The fixed index selection method has shown
an estimated 24.6% implementation complexity reduction at
no cost in error-correction performance, while the enhanced
index selection has been observed to bring up to 0.34 dB gain
in FER.
R EFERENCES
[1] E. Arıkan, “Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels,” IEEE
Transactions on Information Theory, vol. 55, no. 7, pp. 3051–3073, July
2009.
[2] “Final report of 3GPP TSG RAN WG1 #87 v1.0.0,”
http://www.3gpp.org/ftp/tsg ran/WG1 RL1/TSGR1 87/Report/Final \Minutes report RAN1%2387 v100.zip,
Reno, USA, November 2016.
[3] I. Tal and A. Vardy, “List decoding of polar codes,” IEEE Transactions
on Information Theory, vol. 61, no. 5, pp. 2213–2226, May 2015.
[4] A. Balatsoukas-Stimming, M. B. Parizi, and A. Burg, “LLR-based
successive cancellation list decoding of polar codes,” IEEE Transactions
on Signal Processing, vol. 63, no. 19, pp. 5165–5179, Oct 2015.
[5] S. A. Hashemi, C. Condo, and W. J. Gross, “Fast and flexible successivecancellation list decoders for polar codes,” CoRR, vol. abs/1703.08208,
2017. [Online]. Available: http://arxiv.org/abs/1703.08208
[6] S. A. Hashemi, C. Condo, F. Ercan, and W. J. Gross, “Memory-efficient
polar decoders,” IEEE Journal on Emerging and Selected Topics in
Circuits and Systems, vol. PP, no. 99, pp. 1–1, 2017.
[7] O. Afisiadis, A. Balatsoukas-Stimming, and A. Burg, “A low-complexity
improved successive cancellation decoder for polar codes,” in Asilomar
Conference on Signals, Systems and Computers, Nov 2014, pp. 2116–
2120.
[8] L. Chandesris, V. Savin, and D. Declercq, “An improved SCFlip decoder for polar codes,” in IEEE Global Communications Conference
(GLOBECOM), Dec 2016, pp. 1–6.
[9] L. Chandesris, V. Savin, and D. Declercq, “Dynamic-SCFlip decoding
of polar codes,” CoRR, vol. abs/1703.04414, 2017. [Online]. Available:
http://arxiv.org/abs/1703.04414
[10] P. Giard and A. Burg, “Fast-SSC-Flip Decoding of Polar Codes,” IEEE
Wireless Communications and Networking Conference, 2018, to appear.
[Online]. Available: http://arxiv.org/abs/1712.00256
[11] A. J. Raymond and W. J. Gross, “A scalable successive-cancellation
decoder for polar codes,” IEEE Transactions on Signal Processing,
vol. 62, no. 20, pp. 5339–5347, Oct 2014.
[12] S. A. Hashemi, C. Condo, F. Ercan, and W. Gross, “On the performance
of polar codes for 5G eMBB control channel,” in Asilomar Conference
on Signals, Systems and Computers, 2017, to appear.
| 7cs.IT
|
arXiv:1306.3617v6 [physics.gen-ph] 26 Dec 2015
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
Steve Gersten
Abstract. The Harari-Shupe model for fermions is extended to a topological model
which contains an explanation for the observed fact that there are only three generations of fermions. Topological explanations are given for β-decay and for proton
decay predicted in supersymmetry and string theories. An explanation is given for
the observed fact that the three generations of fermions have such similar properties.
The concept of “color” is incorporated into the model in a topologically meaningful
way. Conservation laws are defined and discussed in the context of the algebraic
topology of the model, and preon number is proved to be linearly determined by
charge, weak isospin, and color.
Preface to help non-grouptheorists get a start in reading this paper1
Since some readers may not be familiar with the term van Kampen diagrams,
I can refer them to an excellent article in Wikipedia2 ; I’ll give a brief explanation shortly. The model I propose for particles of SM (standard model of particle
physics) makes essential use of them, but the idea can be understood at a nontechnical level as follows.
The model for particles is like Buckminster Fuller’s geodesic dome. The particles
are the skin spanning the skeletal frame and the preons [Li] are the segments of
that frame. So particles are 2-dimensional and preons are 1-dimensional.
It makes no sense to say a particle (like a quark or electron) is composed of preons,
in the way a sack of gum drops is composed of pieces of candy. A particle is the
1991 Mathematics Subject Classification. 81P05, 20F06.
Key words and phrases. fermion, standard model, Harari-Shupe model, generation problem,
van Kampen diagram, universal covering.
Supported by Social Security and Medicare
c S. Gersten 2012
I wish to thank Domingo Toledo for discussions. I am very grateful to Yong-Shi Wu for
explaining the physics underlying “color”. Wikipedia articles on the standard model and related
topics were useful and my thanks go to their anonymous authors .
1 There is something new for grouptheorists here as well.
In the word problem all that
matters is the minimum number of 2-cells in a van Kampen diagram filling a relation R of a
presentation, called the area of R. The diagram itself is irrelevant for the word problem. What
is new in these articles is that the van Kampen diagrams are given an independent physical
meaning. Thus both the proton and the positron are fillings of the word aaa in the presentation
P to be defined shortly. But they have very different topological and physical properties.
2 http://en.wikipedia.org/wiki/Van Kampen diagram
1
2
STEVE GERSTEN
surface spanned by the 3 segments of Fuller’s frame that bound it. These segments
have names, a or b, and orientations, that is, arrows.3 It will turn out that, for
all particles in our theory, the arrows on one spanning triangle all point in the
same direction; this is a deep fact and the explanation will be delayed to the sequel
paper on bosons, but it is connected with the intrinsic spin of a particle. Particles
may be detected, albeit indirectly, as in the case of quarks, which are not directly
observable (each quark has a color and only “colorless” combinations of them (§4
below) are observable), but the segments of the skeleton may never be seen, but
only inferred by the characteristics of surfaces spanning them.4
I want to state from the beginning that I have only changed slightly the interpretation of the basic idea of [Ha] and [Sh], but not the idea itself. By interpreting
their preons5 as the framework (or skeleton) rather than the content of particles, I
can solve the problems that these papers pose concerning the standard model. It’s
the paper I would have expected either of these authors to write had they been
aware of the (admittedly arcane) field of combinatorial group theory. Thus my
goals in this article are only to go as far as these authors could have gone in 1979
with the reinterpretation of “preons”. In the sequel article, I shall take the idea a
step further by incorporating spin.
Now for a quick definition of van Kampen diagrams. It is the primary tool of
combinatorial group theory (also known as geometric group theory). This branch
of group theory is the study by geometry and topology of group presentations. A
group presentation consists of generators and defining relations. A van Kampen
diagram is a geometric way of representing relations. For more detail and for some
superb drawings of van Kampen diagrams, consult the Wikipedia article.
An example of a presentation is that whose generators are all the edges of Fuller’s
geodesic dome and whose defining relations are those determined by the set of
triangles of the dome. We could call the group presented Buckminster Fuller’s
group; it has not been studied to my knowledge. One van Kampen diagram is the
dome itself.6
The only presentation we are concerned with in these articles is P =<
a, b; aaa, bbb, aab, abb >. The group presented by P is the cyclic group of order 3.
Two van Kampen diagrams in P may be seen in Figures 1 and 2 of this article.
The second represents a proton and the three curvilinear triangles are, reading from
left to right, the up, down, and up quarks. These two diagrams are of particular
interest because they may be considered “spherical diagrams” by appending a face
at infinity. So, with the exterior of the diagram compactified by adding a point
at infinity, it becomes a sphere divided into four curvilinear triangles. These two
3 Figure
2 of this article is an example of a van Kampen diagram that represents a particle,
the proton in this case, with the labels a, b on the edges.
4 The usual interpretation of the Harari-Shupe model is like the skeleton of a fish, whereas
mine is like that of a lobster . Theirs has the skeleton on the inside, whereas I’ve moved it to the
outside.
5 The terminology “preon” is used in [Li] but does not occur in [Ha] nor in [Sh], which use the
terms “rishon” and “quip” respectively.
6 http://carlacapeto.files.wordpress.com/2010/11/buckminster-fuller-dome.jpg
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
3
spherical diagrams play a central role in characterizing SM in §5 below.7
I cannot emphasize strongly enough that what is not being attempted is to
calculate masses of particles nor to compute the fundamental constants of nature.
The topological approach cannot and does not attempt to do this.
All that topology can do is to establish limits of what is possible, but it cannot fill
in the details. For example my theory tells us that there is no fourth generation of
fermions, but it cannot fill in the details about the masses of the three generations
of fermions that exist. Only a metric theory can attempt to do this, and the mere
beginnings of a metric theory are sketched at the end of the second paper on bosons.
Do not expect me to calculate the value of “g” anytime soon.
Professor Wu suggested that I should emphasize also that the complex K and
its universal cover K̃, in which all my constructions take place, do not lie in 3-space
(or even 4-space), but should be considered in a larger dimensional space, possibly
in the fibre of a fibre bundle over Minkowski space. He also pointed out that the
discreteness of the complex K (as opposed to a continuous geometry) was a good
feature that might sweeten the pill of higher dimensions. Those physicists who
accept higher dimensional spaces as the venue of physics will appreciate this while
those who reject them will reject this article whatever I do to try to reach them.
Contents
Preface to help non-grouptheorists get a start in what is going on
§0. Introduction
§1. Review of Harari-Shupe model
§2. Conjugacy classes in a free group
§3. 2-cycles in the 2-complex K
§4. Color
§5. Standard Model
§6. Neutrino Oscillations
§7. Questions and comments
Appendix 1. Historical remark
Appendix 2. Color group M and A2
Appendix 3. Conservation laws in SM and quantum numbers
Appendix 4. β-decay revisited
Appendix 5. ∆++ baryon
Appendix 6. Quantum numbers and the first Chern class
Appendix 7. Colorings as conservation laws
Appendix 8. Preons are determined by charge, color, and weak isospin
Appendix 9. Dark Matter
Appendix 10. Nucleogenesis
Appendix 11. The dual picture and ∆++ test
Appendix 12. Entanglement
Disclaimer.
7 I have adopted Domingo Toledo’s suggestions to revise an earlier attempt at this preface in
order to make it less technical.
4
STEVE GERSTEN
§0. Introduction
In this article we propose a topological model for SM, the standard model of
particle physics. A particle will turn out to be represented by a class of colored
van Kampen diagrams in the universal cover K̃ of a complex K we construct in
§3 (diagrams related by diamond moves represent the same particle; the concept of
color is introduced in §4 below). The boundary label of a diagram is a conjugacy
class c of a single element in F = F (a, b), the free group with free basis {a, b}, and
is thus determined by the particle. Its antiparticle is represented by that diagram
with the opposite orientation, and hence its boundary label is c̄, the conjugacy class
of inverses of elements of c. If a particle is its own antiparticle (as is the case for
the photon, gluons, and the Z-boson), then c = c̄, which implies that c consists
only of the neutral element 1 of F . Not all diagrams represent observable particles;
the observability criterion is given in §4 below. At the end of §3 we illustrate the
notions with van Kampen diagrams representing the proton, neutron, and their
antiparticles without indicating the colors that must be attached to the faces.
The notions are unified in §5 to give a topological formulation for SM, including
predictions for all particles, observable or not, which can exist. The emphasis in this
paper is on fermions, which are the easiest to characterize, but the model applies
to bosons as well. The deduction of the various species of bosons will be left to a
future paper, but we have included a diagram for a Higgs boson, since people I have
spoken to about this article have requested to see it and it is in the news because
of its discovery by the LHC at CERN last year.
Finally, in §6, a purely topological explanation is given based on our model for
the neutrino deficit, the fact that the neutrino flux from the sun observed in the
laboratory is one third of the rate predicted by theory.
The correspondence between particles and van Kampen diagrams is the basic
idea of this article, which is an expansion of ideas in papers of Harari [Ha] and Shupe
[Sh] and which have been recently revived in an expository artice [Li]. Viewing
particles in this way leads to the complete model in §5, including answers to several
of the questions raised in these papers. Among these are why there are only three
generations of fermion, why the generations have such similar properties, and where
the prediction of new fundamental particles stops.
A general reference for the algebraic topology used is [AH] and a reference for
notions of combinatorial group theory is [BRS]. Other references to web articles
will be provided as needed in footnotes.
There are a number of appendices which examine finer point of the theory. Appendix 12 offers a geometrical explanation for the paradoxes of quantum entanglement. In fact geometry is the overall theme of the paper, that fundamental physical
facts can be explained by geometry even when the numbers themselves have to be
determined by experiment. Appendix 11 shows how to replace the notion of van
Kampen diagram, which offended at least one reader (see the letter quoted in the
Disclaimer), by a planar graph with additional labels. This is an equivalent formulation, but the van Kampen formulation is still needed because covering space
theory applies directly to it, whereas the graph formulation is more intuitive for
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
5
physicists.
§1. Review of Harari-Shupe model
Harari [Ha] and Shupe [Sh] have proposed a model wherein quarks and electrons
are composite particles, composed each of three fundamental particles called “preons” by Lincoln in a recent article [Li]. In my notation the fundamental particles
are a and b and their antiparticles are ā and b̄, respectively.8 The first generation
of fermions consists of the electron e, up quark u, down quark d, and electron neutrino νe ; these are āāā, aab, āb̄b̄ and bbb, and their antiparticles are aaa, āāb̄, abb,
and b̄b̄b̄, respectively. Then the proton p is consists of two up and one down quark,
or p = aab + aab + āb̄b̄, whereas the neutron n is two down and one up quark, or
n = āb̄b̄ + āb̄b̄ + aab. When one assigns an electric charge of + 31 to a and 0 to b
and negatives of these numbers to the antiparticles, then the charges add up to the
correct numbers 1 for the proton and 0 for the neutron.
There are two distinguished decay processes identified by Harari, d → u + e + ν̄e
and u + u → d¯ + e+ , where e+ is the positron, antiparticle to the electron, and
ν̄e is the electron antineutrino. In my notation these are āb̄b̄ → aab + āāā + b̄b̄b̄
and aab + aab → abb + aaa. The first of these processes underlies β-decay or
n → p + e + ν̄e and the second underlies the decay of a proton which is predicted
by supersymmetry and string theories. A hypothesis made is that the net number
of a’s and of b’s (that is, the number of a’s minus the number of ā’s and similarly
for the b’s) on one side of the reaction must equal the net number individually on
the other side. So there is conservation of the net preon number of a’s and of b’s.
It should be emphasized that [Ha] and [Sh] were published in 1979 and there has
been no confirmation of the prediction that these fermions are composite particles
to date. In addition, there are two further generations of fermions identified in the
laboratory, where the second generation is the muon, charm and strange quarks,
and muon neutrino, and the third generation is the tau particle, top and bottom
quarks, and tau neutrino. These appear to have similar properties to the first
generation except for significantly higher masses. One of the most important open
problems in particle physics to date has been to explain why there appear to be
only three generations of fermions and why the three generations so closely resemble
each other.
The reason this thirty year old puzzle is of interest today, and the reason [Li]
was written, is that the large hadron collider LHC has come into operation and
has discovered the existence of what appears to be a Higgs boson, the particle
predicted over 40 years ago which is necessary to complete the “standard model”
SM of particle physics. When the LHC is upgraded next year, it is hoped that
other puzzles will be similarly unraveled, among which is the composite nature of
fermions.
8 Both Shupe and Lincoln call a, ā, b, b̄ by +, −, 0, 0̄ respectively, whereas Harari calls them
T, T̄ , V, V̄ .
6
STEVE GERSTEN
§2. Conjugacy classes in a free group
There is a product among conjugacy classes c, d in a group whose result cd is
the set of products of elements of the two sets. The product is associative and
commutative. For each conjugacy class c there is the conjugacy class c̄ which
consists of inverses of elements of c.
We shall consider conjugacy classes of single elements in a free group F with free
basis {x1 , x2 , . . . , xn }. Each such conjugacy class has a representative which is a
cyclically reduced word in the free basis. Denote the conjugacy class of w ∈ F by
[w].
Given a set of conjugacy classes of words [w1 ], [w2 ], . . . , [wm ], we can form the
CW complex K whose 1-skeleton is a bouquet of circles corresponding to the generators xi of F and whose 2-cells e[wj ] have attaching maps the words wj in the
1-skeleton. We make the convention that we attach only one 2-cell for the pair
of conjugacy classes [w], [w̄] and that the 2-chain they determine satisfies thus
e[w] = −e[w̄] .9 Note that 2-cycles Z2 (K) (with integer coefficients) are integer
linear combinations of the e[wj ] such that the net algebraic sum of each of the xi
in the attaching maps is zero (occurrences of xi count as +1 and occurrences of
x̄i = xi −1 count as -1). Since each conjugacy class [c] determines a homology class
in H1 (K), this condition is equivalent to the assertion that the sum of the homology
classes determined by the [wi ] is zero.
§3. 2-cycles in the 2-complex K
A klepton is defined as a conjugacy class of one of the four words aaa, aab, abb, bbb
and their inverses in the free group F = F (a, b) with free basis {a, b}. From now
on let K be the 2-complex constructed in the preceding paragraph with 2-cells eκ
corresponding to the four conjugacy classes κ = [aaa], [aab], [abb], [bbb] in F . Note
that eκ̄ = −eκ in the chain group C2 (K) for each klepton κ.
P We require
P a reaction among kleptons κ1 , κ2 , . . . , κm and λ1 , . . . , λm , denoted by
κi P
→ λj ,P
to conserve algebraic sum of the number of a’s and of b’s. It follows
that i eκi + j eλ̄j is a 2-cycle in K. From now on we identify the 2-cell eκ with
the fermion corresponding to κ.
A key observation is the fact, proved by an easy computation, that K has fundamental group Z/3Z, the cyclic group of order 3. It follows that each of the 2-cells
eκ of K has 3 lifts to the universal cover K̃ of K.10 This gives the 12 fermions of
the standard model. The antiparticles arise from the observation that each 2-cell
eκ is a map of the disc into K. So the mapping with the opposite orientation, corresponding to the chain eκ̄ = −eκ corresponds to the antiparticle eκ̄ of the fermion
eκ .
9 This convention will play an important role in the sequel paper on bosons in the algorithm
for determining spin of composite particles.
10 Note that K̃ (1) is the regular covering space of K (1) associated to the kernel of the homomorphism F → Z/3Z given by a → 1, b → 1 (mod 3).
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
7
Scholium. There are exactly 3 generations of fermions in the model K̃ for the
standard model, corresponding to the lifts of the 2-cells of K. These are the 24
basic fermions of the standard model.
Proposition. Every 2-cycle of K is spherical.
This means that the Hurewicz map π2 (K) → H2 (K) = Z2 (K) is surjective.
Proof.
Let us assume that αe[abb] + βe[aab] + γe[aaa] + δe[bbb] is a 2-cycle, where α, β, γ, δ
are integers. It follows that we have linear equations α+2β+3γ = 0, 2α+β+3δ = 0.
From Gaussian elimination it follows that α = γ − 2δ, β = −2γ + δ, so the general
solution is a linear combination γv1 +δv2 with integer coefficients γ, δ of the integral
vectors v1 = [1, −2, 1, 0] and v2 = [−2, 1, 0, 1]. A second integral basis for the
solutions is v1 + v2 = [−1, −1, 1, 1] and −v1 = [−1, 2, −1, 0]. It follows that to prove
the theorem it suffices to show that the 2-cycles −e[abb] − e[aab] + e[aaa] + e[bbb] and
−e[abb] + 2e[aab] − e[aaa] are spherical (observe that these 2-cycles correspond to the
reactions of β-decay āb̄b̄ → aab + āāā + b̄b̄b̄ and aab + aab → abb + aaa identified
in [Ha]). This is accomplished by explicit construction with the following spherical
diagrams.
b
a
a
b
a
b
Figure 1
8
STEVE GERSTEN
a
b
b
a
a
a
Figure 2
In each of these figures there are four 2-cells, where the fourth 2-cell is at infinity. One reads the boundary labels for the finite cells counterclockwise and the
boundary label for the cells at infinity in the clockwise manner. Since each 2-cycle
is represented by a map of 2-sphere into K, it follows that the generators of Z2 (K)
are spherical and hence all 2-cycles of K are spherical. This completes the proof.11
Remark 1. We shall calculate the kernel of the homomorphism π2 (K̃) → H2 (K) in
§6. It turns out to have important physical significance.
The significance of the proposition is the following. A particle, like a proton or
neutron, is represented by a van Kampen diagram D (that is, a combinatorial map
of an oriented singular disc D into K) [BRS]. Given a spherical diagram, one can
cut it along one edge to obtain a van Kampen diagram with freely trivial boundary
label. This can then be combined with D along an edge with the same boundary
label in the same orientation to obtain a new disc diagram D′ . Then one can do
“diamond moves” ([BRS] page 115) on D′ and repeat the process any number of
times. The result of such a sequence of moves is a reaction among fermions, and
we can read off the result at the chain level C2 (K) to get the reaction in terms of
the Harari-Shupe model. The proposition says that all reactions among fermions,
that is, beginning with one collection of fermions and ending with another, after
projecting from K̃ to K, are obtained in this way.
Remark 2. The fact that processes affecting fermions are represented by spherical
diagrams means they lift to the universal cover K̃ of K. Thus the same processes
that affect the fermions of the first generation affect those of the second and third
11 This
result is a special case of the the result that every integral 2-cycle on a 2-complex with
finite cyclic fundamental group is spherical . The proof makes use of the edge-term exact sequence
of the Serre spectral sequence along with the fact that H2 (G, Z) = 0 for a finite cyclic group G.
Since we need the explicit form of the generators shown in Figures 1 and 2, we have given our
direct geometric argument.
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
9
generations. This explains why these particles resemble so closely their first generation counterparts.
To finish this section, we observe that Fig. 2 can be interpreted as a disc diagram
by ignoring the face at infinity. As such it is a van Kampen diagram for the proton.
A van Kampen diagram for the antineutron is obtained from it by interchanging a
and b. Those for the antiparticles are obtained by reversing all arrows.12
§4. Color
In this section we take the first steps toward incorporating color, the source of
the strong nuclear force, into our model. To begin, let [0], [1], [2] denote the residue
classes of 0, 1, 2 (mod 3). Let N = [0] + [1] + [2] in ZG, where G = Z/3Z and
let M = ZG/N ZG, where M is defined to be the color group. In the literature,
[0], [1], [2] correspond to the colors red (r), green (g), and blue (b). Their negatives
−r, −g, −b in M are called cyan, yellow, and magenta, respectively; they play no
role in the discussion below, but enter in the discussion of antiparticles and gluons,
which we shall not undertake here.13 The designation of colors is arbitrary and
has nothing to do with perceived vision. It is important to make the distiction
between the color red [0] and the neutral element 0 in M . In the literature, 0 is
called both “white” and “colorless”. The discussion below is given in detail for the
proton Fig. 2, but it can be extended to all the fermions (see the last paragraph of
§3). The gluons will be discussed in a future paper along with the other bosons of
the theory.
We lift the diagram Fig. 2 for the proton to K̃.14
This requires a choice of base point, which we take to be a lift P0 of the bottom
vertex. This determines the other vertices P1 , P2 and the lifts of the edges ai , bi ,
i = 0, 1, 2, where an edge is labelled by its initial vertex. The situation is shown
below in Fig. 3.15
12 The
other van Kampen diagram for the proton is obtained by doing a diamond move on the
two edges labelled “a” with origin the bottom vertex.
13 In Appendix 2 below I relate my color group M to the root system A . When I wrote this
2
section I was ignorant of the existing SU(3) theory and formulated the notions out of thin air.
After Professor Wu kindly explained the physicists’ theory, I saw that we were saying the same
thing, and the appendix gives the relation.
14 The lift here is a technical device to facilitate the definition of color. Technically this means
that color, for example on the quarks constituting a proton, is defined by the local coefficient
system M, or, what amounts to the same thing, a π1 (K)-module M [AH]. This is the same thing
as ordinary constant coefficients on the universal cover K̃. To define color on the other generations
of quarks, one pulls back the coefficient system to K̃ via the covering map K̃ → K.
15 We calculate the chain in C (K̃) associated to the lift of the disc diagram shown in Fig. 3 as
2
follows. In the free group on edges of K̃ we have, reading around the diagram once counterclockwise
from the base point P0 , (a0 a1 b2 )(b̄2 b̄1 ā0 )(a0 b1 a2 ). The first term may be identified with a lift ũ of
the up quark and we shall identify the second with a lift d˜ of the down quark. For the third term,
a0 b1 a2 = ā2 (a2 a0 b1 )a2 , so as conjugacy classes in the free group we have [a0 b1 a2 ] = g 2 [a0 a1 b2 ],
where g is the generator of G = Z/3Z given by a → [1], b → [1]. Thus the 2-cell corresponding to
[a0 b1 a2 ] maps onto the up quark, but this is different from the conjugacy class [a0 a1 b2 ]; so the
10
STEVE GERSTEN
P2
a1
b1
a2
P1
b2
P1
a0
a0
P0
Figure 3
The rules for coloring a diagram are the following, where a coloring is an assignment of elements of M to the faces, so that the face with the opposite orientation
is assigned the negative of the color of that face.
1. A lepton is always white, so has 0 for color.
2. The color of a quark is always one of r, g, b and the color of an antiquark is the
negative of the color of the corresponding quark.
3. For a particle to be observable, the sum of the colorings of the faces must be 0.
Thus one possible coloring of the diagram Fig. 3 is to assign the faces from
left to right the colors r, g, and b, whose sum is 0 (they lift to different faces in
K̃), and assign colors arbitrarily to the other 2-cells of K̃, subject to rule 1. Call
such a coloring f . Note that this van Kampen diagram in K̃ can be viewed as a
spherical diagram where the fourth face is at infinity and corresponds to the lift of
an electron. As such the coloring extends to one of the spherical diagram where
again the sum of the colors assigned to the faces is 0.
So we can reformulate the definition of a coloring of the diagram D for a fermion
in K̃ as the pull-back to D of a 2-cochain f ∈ C2 (K̃, M ) with values in M , where
all leptons are assigned 0, where all lifts of quarks in the diagram are assigned
colors from r, g, b, and where the sum of the values assigned to the faces of D is 0.
The rules for a spherical diagram are the same. So the cochain f in the previous
paragraph can be considered by pull-back as either defined on the disc or as a
cochain fˆ on the sphere containing the disc obtained, in this example, by extension
by 0.
The main point here is how to change colorings, that is, to change cochains in
2-cells are different. In C2 (K̃) we have the 2-chain determined by the lift of the diagram of Fig. 3
is ũ + d˜ + g 2 ũ. It would appear that there is a mixing of generations of the up quark in the lift.
If we take into account the face at infinity of Fig. 3, then we obtain the 2-cycle on K̃ given by
ũ + d˜ + g 2 ũ + ẽ, where ẽ is a lift of the electron.
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
11
such a way as to preserve rules 1–3 and in a topologically meaningful way. This
is done by means of coboundaries of 1-cochains. For example, in the coloring f
indicated above, we can interchange the colors of the first two faces by δh, where h
is the 1-cochain which is zero on all edges except on b1 , and where h(b1 ) = −r + g.
To interchange the colors of the second and third faces, we use δk, where k is zero
on all edges except on b2 , where k(b2 ) = g − b. That rule 3 is preserved is checked
directly or, more fundamentally, follows from the fact that < δc, z >= 0 for all
1-cochains c and all 2-cycles z (applied to the spherical diagram). In this way all
colorings consistent with the rules are obtained.
These 1-cochains correspond physically to gluons and are the source of the strong
nuclear force. We shall offer another interpretation of gluons in a subsequent article
on bosons, more in keeping with the ideas of §3 of processes applied to a fermion.
§5. Standard Model
In this section we propose our version of the standard model SM. There are
alternative versions of SM, some of which were proposed in order to cope with the
possibility that the Higgs boson might not exist. Now that the data confirm its existence with better than 99% probability, we shall eschew treating these alternative
theories from our point of view.
We define a fundamental domain to be one of the two spherical diagrams shown
in Figures 1 and 2 or one obtained from it by replacements a, b → b, a, a, b → ā, b̄, or
a, b → b̄, ā. Here replacing a, b by ā, b̄, etc., in a diagram means to reverse the arrows.
We also admit as fundamental domains completely reducible16 two-faced and fourfaced spherical diagrams consisting of cells eκ and their oppositely oriented cells
−eκ = eκ̄ (these degenerate17 examples have corresponding 2-chains 0 in C2 (K)).
So in a four-faced completely reducible fundamental domain one can order the four
2-cells α, β, γ, δ so that α and β form a reducible pair across a common edge , and
γ and δ form a reducible pair across a common edge.18
It should be remarked that not all 2-faced spherical diagrams are considered
fundamental domains. For example, one can take the electron neutrino eκ with
κ = [bbb], rotate it a third of a revolution, and glue the two together. This is a
perfectly acceptable spherical diagram, and indeed it plays a key role in §6 below.
However it is not considered a fundamental domain because it is not reducible. The
rotation prevents any edge from acting as a mirror.
16 A
diagram is called reducible if it contains a pair of faces with an edge in common so that
the faces are mapped mirror-wise across that edge. The faces themselves are called a reducible
pair. In a reducible diagram one can remove the reducible pair and the edge between them and
sew up to boundary of the hole created to obtain a new diagram with two fewer faces. A diagram
is called completely reducible if its faces can be paired off into reducible pairs.
17 These degenerate diagrams play an important role in the sequel article on bosons.
18 It is also possible for both α and β to be a reducible pair and for γ and δ to be reducible,
all at the same time, as happens in the case of the hypothetical graviton, to be considered in the
sequel article on bosons. In Appendix 5 below I consider completely reducible 6-faced diagrams
in order to treat the ∆++ baryon, as a result of a challenge from Professor Wu. Presumably this
could continue with completely reducible 2n-faced diagrams in order to handle higher resonances.
12
STEVE GERSTEN
A fundamental process for particle physics is the lift f˜ : S → K̃ of a spherical
diagram f : S → K, where S is a fundamental domain. A fundamental particle is
a triple (D, f˜, h), where f˜ : S → K̃ is a fundamental process lifting f : S → K,
where D ⊂ S is a van Kampen diagram, and where h ∈ C 2 (K̃, M ) is a coloring in
the color group M satisfying
1. the pull back f˜∗ (h) ∈ C 2 (S, M ) vanishes on leptons, and
2. the values of f˜∗ (h) on quarks are in {r, g, b} and the values on antiquarks are in
{−r, −g, −b}.
The fundamental particle is observable if in addition
3. the sum of the values of f˜∗ (h)) on the faces of S is 0; the invariant formulation19
of this is that < [S], f˜∗(h)) >= 0, where [S] here denotes the fundamental 2-cycle
of the sphere20
Furthermore, we demand that any diagram D′ obtained from D in the triple
(D, f˜, h) by diamond moves be observable if the original triple is observable (the
2-cells of D′ are mapped in the same way as those of D, so condition 3 is preserved).
Another way of formulating the last condition is to give a van Kampen diagram
f˜ : D′ → K̃ and 2-cochain h ∈ C 2 (K̃, M ) such that after a sequence of diamond
moves on D′ one obtains either a fundamental particle D or a spherical diagram
S → K̃ satisfing 1–3. In the latter case, if D = S, then the boundary label of D′
must have been freely trivial, so that S was obtained by sewing up the boundary
completely. In all cases, D′ has at most four 2-cells, where the case of four 2-cells is
the case of the freely trivial boundary label (this is also the case where the particle
is its own antiparticle).
Note that the invariant formulation of condition 3 above is automatically satisfied
for a coboundary h = δc, with c ∈ C 1 (K̃, M ); that is, < f˜∗ [S], δc >= 0, because
[S] is a cycle and < [S], f˜∗(h) >=< f˜∗ [S], δc >=< ∂ f˜∗ [S], c >=< f˜∗ (∂[S]), c >= 0
by adjointness. The main result of this section is a converse.
Theorem. If we let k = f˜∗ (h), with f˜ : S → K̃ and h ∈ C 2 (K̃, M ) as above, and
if 1–3 are satisfied, then k = δ f˜∗ (c) for some cochain c ∈ C 1 (K̃, M ).
Sketch of proof. We sketch the argument for the proton, namely, Figure 3. The
cases of the neutron and the antiparticles follow by applying the symmetries of
interchanging a and b and of reversing all arrows, as in §3.
Since we have to consider spherical diagrams, we consider Figure 3 together with
the face at infinity, which is a lepton. We pick a coloring of the finite faces, say
x, y, z where these are colors chosen without repetition from [0], [1] and [2], read
from left to right. The color of the face at infinity is white, namely 0. Then the
conditions on c restricted to f˜(S), the image of S under f˜, are four linear equations
in five unknowns c(a0 ), c(a1 ), c(a2 ), c(b1 ), c(b2 ) on the left side (referring to the
notation of Figure 3), with variables x, y, z on the right side. For example, the first
19 The
notation < x, y > means to result of evaluating a cochain y on the chain x.
∈ C2 (S, Z) is the sum of the oriented 2-cells in cell decomposition of the 2-sphere S. It
is readily checked that [S] is a 2-cycle.
20 [S]
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
13
of these equations, corresponding to the face at infinity, is c(a0 ) + c(a1 ) + c(a2 ) = 0.
When we row reduce the system, the last row of the row reduction corresponds to
the equation equation 0 = x + y + z. But this compatibility condition is satisfied
because x + y + z = [0] + [1] + [2] = 0, by the definition of M . So the equations are
solvable.
This determines c on f˜(S)(1) . Then we extend c in any way to all of K̃ (1) ,
thereby completing the argument.
Remark. Electric charge of a composite particle is given by the coboundary of a
1-cochain h on K. Namely define h to be 13 on an edge labeled a, − 13 on the
oppositely oriented edge, and h of an edge labeled b with any orientation is defined
to be 0. Then δh ∈ C 2 (K, R) calculates the net electric charge of any van Kampen
diagram. In observable particles the electric charge must be an integer. Note that
to calculate color, we must use cochains on K̃ (the two faces in Figure 2 that
represent up quarks have different colors in the proton because they lift to different
2-cells in K̃), whereas electric charge can be defined from the projection into K.
Remark. The weak isospin T3 of particle in SM21 governs how it interacts in the
weak interaction. It is analogous to electric charge and is given by the coboundary
of the 1-cochain w determined by w(a) = 16 , w(ā) = − 61 , w(b) = 61 , w(b̄) = − 16 .
In the higher generations, one projects first from K̃ to K and then applies w to
determine the weak isospin.
Consequently, three of the fundamental forces of nature, the strong and weak
nuclear forces and the electric charge, are determined by coboundaries
of 1-cochains with different value groups. This is a remarkable unifying property
and serves to strengthen our case that SM is the algebraic topology of the
covering map K̃ → K.22 There is no evidence at present that gravity fits into
this scheme, and indeed it would be most remarkable (and stretch the imagination
nearly to breaking point) if it too were determined by the coboundary of a 1-cochain.
As a last tidbit for this section in response to requests we draw an avatar of
Higgs boson below in Fig. 4. The argument that this is correct is deferred to the
sequel article on bosons.
21 http://en.wikipedia.org/wiki/Weak
22 See
interaction
the Appendix below for a historical perspective on this assertion.
14
STEVE GERSTEN
Figure 4
§6. Neutrino oscillations
This section gives a physical interpretation for the processes in Z2 (K̃) = π2 (K)
which are not lifts of processes from Z2 (K). For many years it was a mystery that
the observed neutrinos coming from the sun were a third of the predicted value.
The explanation finally provided was that a neutrino in free space oscillates between
the three types, electron neutrino νe , muon neutrino νµ , and tau neutrino ντ . Since
only νe was observed in the experiment, what we observe is only a third of the
actual production from nuclear reactions (due to β-decay) in the sun.
We begin by noting that, by an Euler characteristic computation, the rank of
Z2 (K̃) is 8. We can account for 6 free generators by lifts of the classes in π2 (K)
represented by the spherical diagrams in Figures 1 and 2. We shall now account
for the other two free generators.
Let ν̃ denote a lift of the 2-cell eκ in K, where κ = [bbb]. Let g be a generator for
the covering group G ∼
= Z/3Z of K̃. Then an easy calculation shows that gν̃ − ν̃ ∈
Z2 (K̃) = H2 (K̃). This class is in the kernel of the projection H2 (K̃) → H2 (K), so
it is undetectable in K. We also have the class g(gν̃ − ν̃) = g 2 ν̃ − gν̃ in the kernel.
A calculation shows that these two chains are linearly independent in C2 (K̃) and
hence in Z2 (K̃). It follows that we have accounted for the extra two free generators
of Z2 (K̃) that do not arise from lifts of cycles in K.23
Now recall our premise from §3 that processes involving fermions arise from 2cycles. Thus gν̃ − ν̃, g 2 ν̃ − gν̃, and ν̃ − g 2 ν̃ are processes; these processes exchange
the three neutrinos νe , νµ and ντ in cyclic fashion, accounting for the oscillation
of neutrinos. Of course we cannot deduce from the topology alone the rates of
23 Z (K̃) maps onto Z (K), as follows from the Proposition of §3, and Z (K) is free abelian,
2
2
2
so the kernel is a direct summand; it follows that it is of rank 2.
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
15
the processes, so this is all the information we can hope to gain from this type of
argument about neutrino oscillation.
Now we can replace b by a in the argument above and deduce that there exist
processes which exchange cyclically the electron, muon, and tau particle. Such
oscillations have not yet been detected in the laboratory.
There is fortunately a check for the correctness of these ideas, as follows. The
process by which the muon decays is24 µ− → νµ + e− + ν̄e . Now µ− = gẽ, where
ẽ is the lift of the electron to K̃ and g is as above a generator for the covering
group. Also νµ = gν̃e , where ν̃e is the lift of νe , the electron neutrino. Bringing
all terms to the left side, the decay process above is compatible with our theory if
gẽ−gν̃e − ẽ+ ν̃e is a 2-cycle in Z2 (K̃). But this last expression is (g −1)ẽ−(g −1)ν̃e ,
which is indeed a 2-cycle.
§7. Questions and comments
1. Shupe’s ”no mixing rule” ([Sh] p. 88), which states, on our terminology, that
aab̄,ab̄b̄, and their inverses do not occur in the construction of the complex K, is at
the heart of this paper. In the sequel paper on bosons, we offer a justification for
this rule.
2. There is an uncanny symmetry in this model. Namely the Klein four-group,
which appears as the subgroup of Aut(F ) consisting of the identity, {a, b} → {b, a},
{a, b} → {ā, b̄}, and {a, b} → {b̄, ā}, acts on the theory. This symmetry demands
further explanation.
3. The definition of the 2-complex K looks arbitrary although it arose naturally
from a reinterpretation of the work of [Ha] and [Sh]. I can prove the following result
which may serve to motivate it for mathematicians.
Theorem. There exists an infinite dimensional CW-complex L with finite nskeleton for all n ≥ 0 with the following properties.
(1) L is contractible; in particular it is simply connected.
(2) L is acted on freely and cellularly by the group G = Z/3Z; hence the
projection L → L/G is the universal covering.
(3) L(2) = K̃.
(4) L(2n+1) is homotopy equivalent to S 2n+1 for all n ≥ 1.
The argument makes use of the periodic resolution for Z over Z[G], which is modified
in low dimensions (≤ 3) to account for the unusual presentation P for G.
It follows from the theorem that L is homotopy equivalent to BG, the classifying
space of principal G = Z/3Z fibrations, which is a space of type K(G, 1).
Question. Can K̃ be equivariantly imbedded in S 5 for the G = Z/3Z-actions?
Here G acts on S 5 by the diagonal action of third roots of unity on the unit vectors
of C3 . In the sequel paper we show that K̃ imbeds equivariantly in S 2n+1 for n
sufficiently large (n ≥ 6).
24 See
http://en.wikipedia.org/wiki/Muon
16
STEVE GERSTEN
Appendix 1. Historical remark
C-N Yang [Ya] relates a conversation he had with Andre Weil in which the
latter suggested that the particles that were being discovered might be explained
by “geometry and topology”. Yang writes that he did not understand this, and no
one at the meeting thought to ask him what he meant. As far as Weil’s suggestion
about geometry, that has proved to be correct in the development of Yang-Mills
theory. But there is no precedent in the literature that what he had in mind may
also have included pure topology.
Appendix 2. Color group M and A2
This Appendix will relate the color group M to A2 , which is the root system for
SU(3); this lie group is known to physicists as the theory that describes the strong
nuclear force.
The notation follows §4 for the definition of M . As usual G denotes the cyclic
group of order 3 and g is a generator. We make the complex numbers C into a
G-module by letting g act by multiplication by ζ = e2πi/3 , a primitive third root
of unity. Geometrically this represents a rotation through 120 degrees.
Theorem. The map g → ζ extends to an homomorphism of G-modules φ : Z[G] →
C with the properties that
(1)
(2)
(3)
(4)
the image of φ is Z[ζ], the subring of C generated by ζ and the unit element,
the kernel of φ is N Z[G] = (1 + g + g 2 )Z[G], so
φ induces an isomorphism M → Z[ζ], and
the images of the colors ±[j], where j = 0, 1, 2, form the root system A2 ;
thus φ(±[j]) = ±ζ j comprise the set of sixth roots of unity in C.
For example let us prove that the kernel of φ is the ideal generated by N =
1 + g + g 2 in Z[G] and that φ induces an isomorphism M → Z[ζ]. The element N
is in the kernel since ζ is a primitive third root of unity, so satisfies the polynomial
3
−1
. The rank of Z[ζ] is 2, since it is the set of algebraic integers in
1 + z + z 2 = zz−1
an algebraic number field Q[ζ] of degree 2 over the rationals Q. So a rank count
shows that the induced map M → Z[ζ] is an isomorphism.
Appendix 3. Conservation laws in SM and quantum numbers
In §1 it was pointed out that the fundamental conservation law involving preons
is that the net numbers of a′ s and b′ s are individually conserved in a reaction
predicted by SM. From this followed the result that there are only three generations
of fundamental fermions of SM, etc.
In this appendix we shall define conservation laws and quantum numbers for
elementary particles and show that, if we consider lifts to the universal cover K̃,
then the preon number for a lift ai or bi of a preon is a quantum number. It follows
that there is no theoretical reason that one cannot detect the preon number directly.
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
17
Definition. A conservation law in A, where A is a ring with unit, is a 2-cochain c ∈
C 2 (K̃, A) = Hom(C2 (K̃, Z), A) such that < z, c >= 0 for all z ∈ Z2 (K̃, Z). Here
< z, c > is the result of evaluating c on the chain z to yield an element of A. A
quantum number for the conservation law c is the result of evaluating c on a particle
(that is, on a van Kampen diagram in K̃).
The reason this is called a conservation law is that a reaction is given by κ1 +
κ2 + · · · + κp → λ1 + · · · + λq , so it follows that c(κ1 ) + c(κ2 ) + · · · + c(κp ) =
c(λ1 ) + · · · + c(λq ).25 By adjointness, it follows that, if c = δh with h ∈ C 1 (K̃, A),
then c is a conservation law.26 Thus it follows from the remarks of §5 that electric
charge and weak isospin T3 are quantum numbers with values in R. The next result
says the converse is true.
Proposition. If c ∈ C 2 (K̃, A) is a conservation law, then c = δh for some h ∈
C 1 (K̃, A). Thus the set of conservation laws in A is B 2 (K̃, A).
Proof. We are given c ∈ C 2 (K̃, A) = Hom(C2 (K̃, Z), A) such that c vanishes on
Z2 (K̃, Z) ⊂ C2 (K̃, Z).
By the universal coefficient theorem27 , H 2 (K̃, A) = Hom(Z2 (K̃, Z), A), where
we have used the facts that H1 vanishes (since K̃ is simply connected) and
H2 (K̃, Z) = Z2 (K̃, Z) since there are no 3-cells. Also Z 2 (K̃, A) = C 2 (K̃, A)
since every 2-cochain is a 2-cocycle. Thus H 2 (K̃, A) = C 2 (K̃, A)/B 2(K̃, A) =
Hom(Z2 (K̃, Z), A). This may be expressed as the short exact sequence
0 → B 2 (K̃, A) → C 2 (K̃, A) → Hom(Z2 (K̃, Z), A) → 0.
Also we have the surjective map C 1 (K̃, A) ։ B 2 (K̃, A), which may be spliced with
the first map in the short exact sequence to yield the exact sequence
δ
C 1 (K̃, A) −
→ C 2 (K̃, A) → Hom(Z2 (K̃, Z), A) → 0.
Now c ∈ C 2 (K̃, A) = Hom(C2 (K̃, Z), A) and the map on the right in the last
exact sequence is obtained by restricting a homomorphism to Z2 (K̃, Z) and then
considering the image to lie in A via the map Z → A. It follows that the image of c
in Hom(Z2 (K̃, Z), A) is zero, and, by exactness, c = δh for some h ∈ C 1 (K̃, A).
Let us specialize now to the case A = R. Then C 2 (K̃, R) is of dimension 12 while
the rank of Z2 (K̃, Z) was calculated in §6 to be 8. It follows that the dimension
of B 2 (K̃, R) is 4, and hence there are 4 linearly independent conservation laws in
SM.28
Let us focus attention on one that has not been mentioned before. Let f ∈
1
C (K̃, R) be given by f (ai ) = 13 , f (bi ) = − 31 , f (āi ) = − 31 , f (b̄i ) = 13 , for i
25 κ
1 + κ2
26 If z is a
+ · · · + κp − λ1 − · · · − λq is a 2-cycle on K̃, whence c vanishes on it.
2-cycle on K̃, then < z, c >=< z, δh >=< ∂z, h >= 0.
27 http://en.wikipedia.org/wiki/Universal coefficient theorem
28 The same result holds for every field.
18
STEVE GERSTEN
(mod 3). If h and w are 1-cochains on K̃ determining charge and weak isospin T3
respectively (in the notation of §5), then f = 2(h − w). This identifies δf with the
weak hypercharge YW .29
We can calculate the vector space B 2 (K̃, R) of conservation laws over R as follows. We have B 2 = C 1 /Z 1 where Z 1 = B 1 . From these relations we see that
Z 1 (K̃, R) is the set of functions f on the 1-cells ai , bi of K̃ so that f (ai ) = f (bi ),
f (a0 ) + f (a1 ) + f (a2 ) = 0, for i (mod 3). This is a 2-dimensional subspace of
the 6-dimensional space C 1 , so the 4-dimensional quotient B 2 can be effectively
determined. Here is the result of this calculation.
If we let x be one of ai , bi , i (mod 3), we define ∆x ∈ C 1 (K̃, R) by ∆x (x) =
1, ∆x (x̄) = −1, and ∆x (y) = 0 for all other y. Then for each lift κ̃ of an elementary
fermion κ30 we have δ∆x (κ̃) = +1 if the boundary label of κ̃ contains x, ∆x (κ̃) = −1
if the boundary label contains x̄, and ∆x (κ̃) = 0 otherwise.
Proposition.
for each lift κ̃
collection of 4
independent.
For each x ∈ {ai , bi }, i (mod 3), δ∆x is a conservation law, and
of an elementary fermion δ∆x (κ̃) is a quantum number. For any
of the 6 lifts ai , bi the corresponding conservation laws are linearly
Remark. The proposition provides a test for the structure of the proton p proposed
in Figure 2. For any lift p̃ of p to K̃, we see that δ∆ai (p̃) = 1 for all i (mod 3).
This structure also has the consequence that the two lifts of u in p̃ must be of
different generations, as was pointed out in the footnote of §4. If we tried the
structure z = [a0 a1 b2 ] + [b̄2 b̄1 ā0 ] + [a0 a1 b2 ] instead (which projects to 2u + d but is
not the continuous lift given by covering space theory), we would find δ∆a0 (z) =
1, δ∆a1 (z) = 2, δ∆a2 (z) = 0. So these new quantum numbers may be useful tools
in determining the structure of composite particles as van Kampen diagrams.
Appendix 4. β-decay revisited
When I explained to a physicist how van Kampen diagrams gave a consistent
interpretation to the ideas of [Ha] and [Sh], which solved many of the open problems
these papers posed, he expressed interest in seeing in detail how β-decay works
from the topological point of view (the point of view of Feynman diagrams is wellknown31 d → u + e− + ν̄e but that leaves unexplained what is actually happening
at the vertices of the Feynman diagram).
Examine Figure 5 below.
29 http://en.wikipedia.org/wiki/Hypercharge. In the form Q = I + 1 Y the relation is attrib3
2
uted to Gell-Mann and Nishijima.
30 So κ is either an electron, neutrino, quark or an antiparticle of one of these.
31 http://en.wikipedia.org/wiki/Beta decay
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
19
Figure 5
The left half of the diagram is the down quark d whereas the right half is the
Higgs boson. The latter is obtained from the spherical diagram Figure 1 by making
two cuts along edges labeled a and b and splaying the result out as a van Kampen
diagram in the plane; so this yields is a 2-cycle and acts on the van Kampen diagram
for d in the manner described in §3 following Remark 1.32
The faces labeled d and d¯ are mapped mirror-wise across their common edge, so
we may do a reduction, removing the pair and that edge, and sew up the hole to
create the diagram Figure 6 below.
Figure 6
32 This description is purely topological and ignores entirely the question of magnitude of
energies involved. So the Higgs in question is of the nature of a virtual particle, arising from
the vacuum state only ephemerally and disappearing immediately after interacting with the down
quark.
20
STEVE GERSTEN
The two shaded faces are e and ν̄e which are now shed to leave the up quark u.
So the net result is the reaction d → u + e− + ν̄e . As a parenthetical remark,
we observe that the union of those two shaded faces constitute the W − boson, so
the reaction can be rewritten as the composite of two reactions, d → W − + u and
W − → e− + ν̄e .
Appendix 5. ∆++ baryon
Professor Wu challenged me to describe the ∆++ baryon33 in my terms. The
result is shown below in Figure 7.
Figure 7
33 en.wikipedia.org/wiki/Delta
baryon
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
21
It shows three u quarks with a single vertex in common (like the radiation hazard
sign). The spin of the resulting particle is 23 , while the remarks of §5 show how
to calculate that the electric charge is 2 and the weak isospin T3 is 23 . The second
diagram on the right shows how to imbed ∆++ in a diagram with 6 faces and freely
trivial boundary label, so the enlarged diagram folds up to a spherical diagram and
represents a 2-cycle. That 2-cycle is 0, for the diagram is completely reducible.
All other spherical diagrams previously considered here have 2 or 4 faces, so
this is the first where 6 faces are needed. That fact by itself makes Professor Wu’s
question interesting and motivated me to include it here.
Appendix 6. Quantum numbers and the first Chern class
In §5 electric charge was interpreted as the coboundary of a 1-cochain on K̃ which
is evaluated on particles (that is, on van Kampen diagrams). This is satisfactory
from the point of view of algebraic topology but it is desirable to have a direct
geometric interpretation. The answer given below is that charge, up to a factor of
1
, is the first Chern class of an explicitly constructed line bundle. This involves an
3
interpretation of the preons a and b as sections of a complex line bundle, which is
then pursued to deal with other quantum numbers.
Let D be the van Kampen diagram for a fundamental fermion of SM, so D
represents a positron, an up quark, an anti-down quark, or an electron neutrino,.
We view D as a map to K; as pointed out in §5, charge is defined on K and pulls
back to K̃ via the covering map K̃ → K. Thus the boundary label of D is either
aaa, aab, abb, or bbb. The cases of their antiparticles involve only a change of sign
in the construction. Thus the boundary of D is subdivided into 3 segments, each
of which is mapped onto an edge a or b of K, and the end points of the segments
are mapped to the unique vertex of K.
Consider the trivial U (1)-bundle D × S 1 over D. Here U (1) = S 1 is considered
as the unit interval I = [0, 1] in R with end points identified, S 1 = I/0 ∼ 1. Define
a section σ of the bundle over the boundary ∂D of D by the identity map of S 1
beginning at the base point 0 over each segment labeled a and by the constant
map 0 over the segment labeled b. Note that if we consider this section as a
map fσ : S 1 → S 1 , the degree of the map is 3, 2, 1 or 0 in the respective cases
aaa, aab, abb, or bbb.
Theorem 1. The electric charge of the fermion is 13 of the first Chern class in
H 2 (S 2 , Z) ∼
= Z of the complex line bundle over S 2 with clutching function fσ .34
Remark. Equivalently, the electric charge is the obstruction to extending σ to a
never-vanishing section of the trivial line bundle D × C over D, up to a factor of 13 ;
here S 1 is considered as the image of the exponential map t 7→ e2πit in C, 0 ≤ t ≤ 1.
34 For
the notion of clutching function, see en.wikipedia.org/wiki/Clutching construction or
Hatcher’s book on vector bundles http://www.math.cornell.edu/∼hatcher/VBKT/VBpage.html,
p. 22.
22
STEVE GERSTEN
Proof of Theorem. The first Chern class of the line bundle is the degree of the
clutching function fσ : S 1 → S 1 .
Next we generalize the construction just made to other quantum numbers. We
do the construction in K̃ rather than in K, as we did in the case of electric charge,
which is invariant under deck transformations of the covering map K̃ → K, since
we want to allow the possibility of quantum numbers that are not invariant under
deck transformations.
If αi and βi are integers, i mod 3, let F be the section of the trivial U (1) bundle
over K̃ (1) defined by maps of S 1 to itself of degree αi over edges ai and βi over
edges bi . The obstruction to extending F over all of K̃ (which depends only on the
integers αi , βi and not on representative maps) can be calculated as follows. Let
eκi be one of the 2-cells of K̃. Then the section F is defined over the boundary
∂eκi of eκi , which is a covering κi of one of the fundamental fermions κ (so κ is
one of [aaa], [aab], [abb] or [bbb] or their inverses). Let Sκi be the 2-sphere which
consists of two identical copies of eκi glued along their common boundary by the
identity map, and let Lκi be the complex line bundle over Sκi given by the clutching
function F . Then the obstruction to extending F over eκi is the first Chern class
c1 (Lκi ) ∈ H 2 (Sκi , Z) ∼
= Z.
Thus the obstruction to extending F over all of K̃ is the collection of first Chern
classes c1 (Lκi ) ∈ Z. This amounts to 24 integers, counting lifts of antiparticles of
the fundamental fermions. Call this 24-tuple of integers qF .
Theorem 2. For every conservation law c ∈ B 2 (K̃, Q) there is a section F of the
trivial U (1) bundle over K̃ (1) and a positive integer N so that N1 qF is the collection
of quantum numbers associated to c. The collection qF is given by the first Chern
classes of complex line bundles Lκi constructed above.
For the proof one takes h ∈ C 1 (K̃, Q) so that δh = c, where N is a number
that clears all denominators. Then one applies the construction of the preceding
paragraph to N h.
Example. If h(ai ) = 1, h(bi ) = 0 for all i (mod 3) and N = 3, then we obtain the
electric charge lifted to K̃.
Another way of stating the result is as follows. Let X denote the double of K̃
along K̃ (1) . So X consists of two disjoint copies of the 2-complex K̃ identified along
their common subcomplex K̃ (1) . Take two copies of the trivial complex line bundle
over K̃ and identify them over K̃ (1) by the isomorphism given by F . This produces
a line bundle L over X. Then c1 (L) ∈ H 2 (X, Z) contains all the information in the
collection qF . Namely, if we take the double of the 2-cell eκi lying inside X, this is
an imbedded copy of the 2-sphere Sκi . So we can restrict the bundle L to Sκi and
take its first Chern class, thereby recovering the quantum number up to the factor
of N .35
35 The construction of the bundle L from the data F mimics the clutching function construction
for bundles over spheres. It works because X \K̃ (1) is a disjoint union of cells each of whose closures
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
23
There is a formal way to incorporate the multiplicative factor N into the answer.
One considers the group Pic(X) ⊗ Q where Pic(X) is the Picard group of isomorphism classes of complex line bundles under the operation of tensor product and Q
is the rational numbers. The element L ⊗ N1 is then an invariant of the conservation
law c over Q and incorporates all the quantum numbers by the operation of taking
the first Chern class.
Example. Consider a lift ẽ of the electron to K̃, so ẽ is a 2-cell with boundary label
[ā2 ā1 ā0 ]. The 2-sphere Sẽ is the double of the closed cell ẽ over its boundary. If we
take the electric charge as the conservation law, then the map of the boundary ∂ẽ
to U (1) has degree −3 and N = 3. The element L ⊗ 13 of Pic(X) restricted to Sẽ
is the complex line bundle over Sẽ with clutching function a map of degree −1 of
the circle to U (1). This is the tautological line bundle over CP 1 whose associated
principal bundle with fibre U (1) = S 1 is the Hopf fibration over Sẽ . In terms of
algebraic geometry, this is the bundle O(−1) over CP 1 .
If instead of the electron we take a lift of the positron, the result is the hyperplane
bundle O(1) over CP 1 . In more colorful language, the charge of the electron is the
Hopf bundle and the charge of the positron is the hyperplane bundle over CP 1 .
Remark. The 2-complex X, constructed in this section as a formal device for relating conservation laws to complex line bundles, plays a fundamental role in the
sequel paper on bosons. It will be shown there that the Higgs mechanism for generating masses of particles in SM can be understood in terms of the geometry of X
and that the involution interchanging the two copies of K̃ and fixing K̃ (1) can be
understood as changing handedness of particles (left for right and right for left).
As pointed out in the lead paragraph of this section, we have given a direct
geometric interpretation for the preons a, b as maps of one circle to another (from
a closed 1-cell of K to U (1)), of degree 1 for a and degree 0 for b. Such an interpretation is lacking in [Ha] and [Sh], where the preons are merely labels.
An open problem is to explain why nature chose this strange mechanism K, K̃, X
for particle physics and why the number 3 as in 3-fold covering space.
Appendix 7. Colorings as conservation laws
In this appendix we give examples of conservation laws where the coefficient
ring A is the color group M . We shall use the isomorphic ring Z[ζ] (see Appendix 3)
where ζ = e2πi/3 .
Recall that in this model the color set A2 is the subset ±ζ j where j ranges over
the integers modulo 3.
Definition. A coloring of K̃ is an element c ∈ B 2 (K̃, Z[ζ]) such that
(1) c vanishes on every lepton, and
(2) c assumes all the elements of {1, ζ, ζ 2 } as values on the set of lifts of the up
quark aab and also on all the lifts of the down quark āb̄b̄.
in X is an imbedded disc. So the argument for characterizing bundles over spheres by clutching
functions works for characterizing bundles over X.
24
STEVE GERSTEN
Condition (1) is means physically that leptons do not feel the strong force. It follows
from (2) that c cannot assume the same value on two different 2-cells of K̃ which
lift the same quark of K. Since c is a coboundary, c vanishes on all 2-cycles. Since
c is a cochain, c(κ) = −c(κ̄), where κ̄ is the oppositely oriented 2-cell to κ.
It is not immediately clear that there are any colorings (the catch is to show
that a candidate cochain vanishes on all 2-cycles in Z2 (K̃, Z)). That is the content
of the next result.
Theorem. There are six colorings of K̃, which are hence conservation laws with
values in Z[ζ].
Proof of theorem. The crux of the argument consists of constructing a family of
elements of B 2 (K̃, Z[ζ]). This will be done by explicit construction of 2-cochains
which vanish on π2 (K̃) = Z2 (K̃, Z). We recall from §6 that Z2 (K̃) =: Z2 (K̃, Z) is
a free abelian group of rank 8. Two of the free generators are leptonic in the sense
that they are of the form gκ − κ, where κ is a lift of a lepton and g ∈ G ∼
= Z/3Z,
so any observable cochain will vanish on them. Thus there are six remaining linear
conditions of vanishing that must be satisfied.
The six vanishing conditions arise from the lifts of the spherical diagrams represented by Figures 1 and 2. It is easier to visualize these in terms of van Kampen
diagrams, so we make cuts along edges to obtain disc diagrams; for convenience
we have shown one lift each of the two disc diagrams below in Figure 8 (one can
check that these are obtained by cutting spherical diagrams along edges since the
boundary labels are freely trivial).
Figure 8
The left figure is a lift of the diagram for the Higgs boson that participates in
β-decay (see Figure 5 in Appendix 4). We make the convention that the bottom
triangle labeled d˜ represents the down quark. It follows that the top triangle labeled
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
25
˜ is the anti-particle to the up quark (since β-decay does not mix the generations
ū
of quarks). The two remaining triangles are leptons. So the vanishing condition on
˜ = c(ũ). Similar conditions must
the cochain c we are attempting to construct is c(d)
hold in the other generations, since the process of β-decay lifts to these generations
(see §3). Thus we obtain additional conditions c(g d̃) = c(g ũ) for all g ∈ G. This
gives three of the six linear conditions that c must satisfy to be an observable
cochain.
˜ ∈ {1, ζ, ζ 2 }, g ∈ G, may be chosen in any manner so as
The three colors c(g d)
to satisfy that they exhaust this set of colors. That means there are six choices of
potential cochains if we consider their values restricted to the lifts of the down quark.
But the conditions c(g d̃) = c(g ũ) of the previous paragraph determine completely
the cochain c, since the value of c on leptons is 0. It remains to establish that each
of these six cochains vanishes on cycles Z2 (K̃).
We pass to the diagram on the right in Figure 8. The bottom triangle is seen
˜ and a calculation shows that the left and right triangles are g 2 ũ and
to be d,
g ũ respectively.36 The top triangle is a lepton, so is assigned 0 by the cochain c
under construction. Thus the values of c on the quark 2-cells in the diagram are
˜ c(g ũ)} = {c(g 2 d),
˜ c(d̃), c(g d̃)} = {1, ζ, ζ 2 } The same result holds for
{c(g 2 ũ), c(d),
all translates of the diagram by g ∈ G. But 1 + ζ + ζ 2 = 0 in Z[ζ], so it follows that
the three remaining linear conditions are satisfied and that all six cochains c vanish
on Z2 (K̃). Hence, by the first proposition of Appendix 3, c ∈ B 2 (K̃, Z[ζ]).
Example. If we consider the coloring c given by d → 1, gd → ζ, g 2 d → ζ 2 , u →
1, gu → ζ, g 2 u → ζ 2 , then one can check that c = δL, for L ∈ C 1 (K̃, Z[ζ]), where
L is given by L(bi ) = 0, i (mod 3), L(a0 ) = 1 + ζ 2 , L(a1 ) = 1 + ζ, L(a2 ) = ζ + ζ 2 .
Other choices of H ′ with δH ′ = c differ from H by a 1-coboundary.
If we apply a permutation σ of the set {1, ζ, ζ 2 } to obtain the 1-cochain Hσ ,
then their coboundaries δHσ give all six of the colorings as σ ranges over the set of
permutations of the set S.
Question. What additional physically meaningful conservation laws are there in
other rings A? A banal example in Z/2Z is the number of particles modulo 2;
this is an invariant since, physically, creation and destruction of particles occurs in
pairs, or, mathematically, since all spherical diagrams in K̃ have an even number
of faces.
Appendix 8. Preons are determined by charge, color, and weak isospin
Here we tie together all notions of this paper and prove that the preon number
(net number of ai ’s and bi ’s) in the composition of elementary fermions of SM are
determined linearly by four of the conservation laws of SM, namely, electric charge,
weak isospin, and a color conservation law of Appendix 7 and its complex conjugate.
36 Recall g is the generator of the covering group G ∼ Z/3Z where g is given by a → 1, b → 1
=
(mod 3). The action of g on the lifts ai , bi is to raise the indices by 1 (mod 3).
26
STEVE GERSTEN
Recall from §5 that electric charge is determined as δh where h ∈ C 1 (K, Q)
is given by h(a) = 13 , h(b) = 0. We lift h to K̃ and multiply by 3 to get H ∈
C 2 (K̃, Z) given by H(ai ) = 1, H(bi ) = 0 for i (mod 3). The conservation law
δH ∈ B 2 (K̃, Z) ⊂ B 2 (K̃, C) will serve for our purposes the role of electric charge.
Recall also from §5 the weak isospin is determined by δw, where w ∈ C 1 (K, Q)
is given by w(a) = w(b) = 16 , We lift w to K̃ and multiply by 6 to get W ∈
C 2 (K̃, Z) given by W (ai ) = W (bi ) = 1 for all i (mod 3). The conservation law
δW ∈ B 2 (K̃, Z[ζ] ⊂ B 2 (K̃, C) will serve for our purposes the role of weak isospin.
Let L ∈ C 1 (K̃, Z[ζ]) be the element of C 1 (K̃, Z[ζ]) determined in the Example
of Appendix 7, so L(bi ) = 0, L(a0 ) = 1 + ζ 2 , L(a1 ) = 1 + ζ, L(a2 ) = ζ + ζ 2 . We
determined L there so that δL ∈ B 2 (K̃, Z[ζ]) ⊂ B 2 (K̃, C) is a color conservation
law.
If L̄ is the complex conjugate function, then, noting that ζ̄ = ζ 2 and ζ̄ 2 = ζ,
we have L̄(a0 ) = 1 + ζ, L̄(a1 ) = 1 + ζ 2 , L̄(a2 ) = ζ + ζ 2 , and L̄(bi ) = 0. Note
that L̄ is itself one of the color conservation laws; in fact L̄ = Lσ , where σ is the
permutation of the set {1, ζ, ζ 2 } that interchanges ζ and ζ 2 and leaves 1 fixed. Note
that L+L̄ = Re(L), where Re denotes the real part, so (L+L̄)(a0 ) = (L+L̄)(a1 ) = 1
and (L + L̄)(a2 ) = −2.
Remark. If σ is an even permutation of the set {1, ζ, ζ 2 }, then Lσ is of the form
ζ j L for some integer j, whereas L̄ is of the form Lσ for σ a transposition.37
We can now state the main result.
Theorem. The four conservation laws δH, δW, δL and δ(L + L̄) are linearly independent elements of B 2 (K̃, C).
Remark. We calculated in Appendix 3 the dimension of the vector space B 2 (K̃, R)
to be 4 and pointed out in the footnote that the same result holds over every field;
so it follows from the theorem that B 2 (K̃, C) has basis over C given by δH, δW, δL
and δ(L + L̄). The next result follows immediately from the theorem; recall the
definition of ∆x for x ∈ {ai , bi } from Appendix 3.
Corollary. For each x ∈ {ai , bi }, i (mod 3), the conservation law δ∆x is a linear
combination over C of the four conservation laws δH, δW, δL and δ(L + L̄).
Remark. The significance of the corollary is that the preon composition of all of
the elementary fermions considered in K̃ is completely determined by conservation
laws of charge, weak isospin, and color. Consequently the preon composition of all
composite particles (that is, the preons occurring in the boundary labels of their van
Kampen diagrams in K̃) is completely determined by these four conservation laws.
So one is able to check a hypothetical structure of a composite particle by calculating
the appropriate linear combination of conservation laws on the constituents.
37 The fact that the six color conservation laws are related in this way is a reflection of the fact
that S3 , the Weyl group of the root system A2 , is generated by a 3-cycle (multiplication by ζ)
and a 2-cycle (complex conjugation).
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
27
Proof of theorem. Assume that a linear combination κδH +λδW +µδL+νδ(L+L̄) =
0, where κ, λ, µ, ν ∈ C. Evaluate this relation on a lift of the positron [a0 a1 a2 ],
noting that δL and δ L̄ vanish on [a0 a1 a2 ], to get 3κ + 3λ = 0. Next evaluate the
relation on a lift of the electron neutrino [b0 b1 b2 ] to get 3λ = 0. It follows that
κ = λ = 0, so the linear combination simplifies to µδL + νδ(L + L̄) = 0.
˜¯ = [b b a ] and g d̄
˜ = [b b a ]. Evaluate the relation µδL+νδ(L+L̄) =
Note that d
0 1 2
1 2 0
˜
˜
¯
¯
0 on d and on g d to get the equations µL(ai ) + νReL(ai ) = 0 for i = 2, 0; that
is, µ(ζ + ζ 2 ) − 2ν = 0 and µ(1 + ζ 2 ) + ν = 0. These equations have the unique
solution µ = ν = 0, so the only linear relation among δH, δW, δL and δ(L + L̄) is
the trivial relation. It follows that they are linearly independent, and the theorem
is established.
The theorem of color conservation suggests that restrictions on particles (van
Kampen diagrams in K̃) can be directly related to K̃. With this in mind, we make
two definitions.
Definition. An admissible particle is a van Kampen diagram f : D → K̃ satisfying
(1) for each pair α, α′ of distinct 2-cells in D similarly oriented representing
quarks with f (α) = f (α′ ) there is a coloring c ∈ B 2 (K̃, Z[ζ]) so that
c(f (α)) 6= c(f (α′ )), and
(2) at most two leptons appear in D, and their images under f are not conjugate
under the covering group G; that is, if α and α′ distinct similarly oriented 2cells of D which represent leptons, then there is no g ∈ G so that g(f (α)) =
f (α′ ).
Condition (1) is independent of which conservation law c is chosen to apply in
the definition. This follows from the fact that all the 6 possible candidates for c
are related to each other by translation by ζ j or by complex conjugation, as we
remarked earlier.
The lepton condition (2) is more speculative; the justification is that it is difficult
to see how, for example, an electron neutrino νe and a muon neutrino νµ can
bind together inside a particle. However νe and ν̄µ together give one of the free
generators of π2 (K̃) which was used in §6 to give a topological explanation for
neutrino oscillations. On the other hand, the electron e− and electron anti-neutrino
ν̄e are similarly oriented in the van Kampen diagram for the Higgs particle; but
they have different preon representations which are not conjugate under the covering
group G.
Definition. An admissible particle f : D → K̃ is observable if the sum of the values
of any cochain c ∈ B 2 (K̃, Z[ζ]) on the faces f (α) is 0, where α ranges over the
2-cells of D.
By what was remarked, if the condition is satisfied for one color conservation
law, it is satisfied for all of them.
28
STEVE GERSTEN
Remark. The admissibility condition incorporates the Pauli exclusion principle,
that two bound fermions cannot have the same quantum numbers. The observability condition strengthens the color conservation laws; it says no color can leak out
of an observable particle. It is a way to formulate the experimental observation
that no isolated quark has ever been observed.38
Ansatz 39 . All particles of SM are admissible; thus even virtual particles that participate in reactions but are not observed are admissible. All particles that can be
detected in an experiment satisfy the observability condition.
Open problem. Give a consistent geometric model that explains the algebraic conditions in the definitions of admissibility and observability of particles. That is, the
appearance of the Eisenstein integers Z[ζ] suggests that there is a discrete geometry
underlying these conditions, but I do not yet know what this geometry is.
Appendix 9. Dark Matter
An open problem (contrary to one of the criticisms recalled in the Disclaimer in
the final section, that there are no open problems) is to determine the nature of
dark matter. Observations beginning with Zwicky in the 30’s have shown that there
is more matter in galaxies than can be accounted for by observed light sources. I
shall make a proposal here based on my model for what this dark matter is.
First I list properties that dark matter must possess.
(1) It must be stable over the life of a galaxy. Otherwise one could reconstruct
it from its decay products.
(2) It must not interact with photons, the carriers of electromagnetic force.
(3) The only long-range force it can interact with is that of gravity, to account
for those observations mentioned above.
Observe that there is no condition on colourings, since dark matter is by assumption not observable except for its gravitational effect.
In our model a van Kampen diagram in K̃ whose boundary label involves no a’s
satisfies 2 and 3 above. All the interior a’s cancel so are not visible to outside light
sources. Since such a diagram represents matter, it is subject to gravity. What is
not clear is that such matter can be stable.40
38 Color
can however have an indirect second order effect on distinct particles by exchange of
virtual particles, similar to the way van der Waal forces affect molecules even though the individual
atoms are electrically neutral.
39 An Ansatz is an educated guess that is verified later by its results.
Source:
http://en.wikipedia.org/wiki/Ansatz
40 The van Kampen diagram (or spherical diagram) has the same relation to a particle as
the program for a Jacquard loom has to the fabric design it creates. That is, the van Kampen
diagram is not the particle itself but is a program for creating the particle. So for example
one of the criticisms in the disclaimer was that the photon has no structure as far as anyone
has observed, yet the spherical diagram for it involves the diagrams for both the electron and
positron. The program has compound structure but the design it creates does not, as far as
anyone has determined. In analogy with DNA and the cell, by now DNA is well understood, but
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
29
It is unlikely that the neutrino is a candidate for dark matter. It has mass but
it is very small (and is as yet undetermined) and propagates at nearly the speed of
light. So it seems unlikely to be gravitationally bound to a galaxy.
The neutron is also unlikely to be a candidate, since free neutrons are unstable
via beta decay. It seems unlikely that such a weak force as gravity could stabilize
otherwise free neutrons in a galaxy.
However there is an algorithmic process for creating from the neutron an infinite
collection of particles satisfying 2 and 3. I do not know how to make calculations of
mass or half-lives, so I do not know whether any of these particles are stable over
the life of a galaxy. This was one of the basic criticisms of the Disclaimer for which
I lack the tools to answer, namely, to calculate masses.
Construction. Given a van Kampen diagram D and an interior vertex v, we may
form for each n ≥ 2 the branched cyclic cover. Recall this means we remove v
and form the cyclic covering of degree n of the punctured domain, then sew in a
subdivided disc to obtain a new van Kampen diagram D′ . Alternatively, one can
take the one-point compactification of the covering, and note it is a van Kampen
diagram.
If D has edge label only involving b’s, then the same is true for D′ . Hence if D
satisfies 2 and 3 above, then so does D′
Example. Let D be a van Kampen diagram for the neutron; for example, in Figure 2
interchange the letters a and b, to get D. There is a single interior vertex, so for
each n ≥ 2 there is a unique branched cyclic cover Dn of D, and this satisfies 2 and
3. I pose the open question whether any of these represent stable particles, which
is the same as asking whether all possible decay modes have higher energy.
Appendix 10. Nucleogenesis
I suggest here only the germ of a topological theory of origin of chemical elements.
The models resemble those of organic chemistry.
Consider the deuteron shown below in Figure 9.
the machinery by which this creates a new organism, or even that of cell division, is not presently
understood. Similarly in the Appendix 10 I create programs for chemical elements. This is not in
conflict with the liquid ball model consisting of floating protons and neutrons but rather indicates
a hidden structure, in effect a rigid crystal model that underlines this model.
30
STEVE GERSTEN
Fig. 9
The top part of the diagram is the proton while the bottom is the neutron;
the up and down quarks are labeled u and d respectively. In fact two diamond moves along the red lines produce a proton and a neutron, so this diagram can be achieved by interactions with photons and Z-bosons. As evidence for the correctness of this model, observe what happens when one takes
branch covers about the central vertex. The 2, 3, 5, 6, 7, 8, 10, 12, 14, 16, 18,
and 20-fold cyclic branched covers are respectively models for stable isotopes of
4
6
10
12
14
16
20
24
28
32
36
40
2 He, 3 Li, 5 B, 6 C, 7 N, 8 O, 10 Ne, 12 Mg, 14 Si, 16 S, 18 Ar, and 20 Ca; the last is
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
31
“the heaviest stable isotope made of the same number of protons and neutrons”.41
The upshot of this section is that stable isotopes of some of the chemical elements
can be created by diagrammatic methods for van Kampen diagrams. I am unable
to verify their stability myself for the lack of numerical methods for associating
energy to diagrams.42
There is one more point to be discussed here and that is the process of Cloaking. Consider the diagram D for the deuteron in Figure 9, whose boundary edges
labelled “a”, occur together as a group of three. Take two adjacent such edges and
connect the end points of the interval of length 2 by an edge labelled “b” pointing
the opposite direction. This has the effect of attaching (the projection from K̃ to
K of) an up quark to the diagram. Then take the remaining edge labelled “a” on
the boundary and attach to its endpoints two edges labelled “b”, that is, attach a
down quark (always referring to the projection in K) to the diagram. The resulting
diagram D′ , after attaching first the up then the down quark, is a new van Kampen diagram containing the original deuteron as a subdiagram, but all of whose
boundary edges are labelled “b”. Thus all the charges have been “cloaked” in the
interior and D′ is invisible to electromagnetic (EM) radiation.
Also observe that D′ has a single interior vertex. So we may form branched cyclic
coverings of D′ , each of which represents a particle. So all of the stable elements
constructed earlier by branched covers can be cloaked so as to be invisible to EM
radiation. As I admitted earlier I do not have the techniques to determine whether
any of these particles are stable and hence candidates for dark matter.
In fact the cloaking process can be carried out on any diagram, so any such can
be cloaked so as to be invisible to EM radiation. This suggests, although does not
prove, that dark matter should be as abundant as ordinary matter.
Appendix 11. The dual picture and ∆++ test
I have worked out the consequences of the Hattori-Shupe idea in terms of van
Kampen diagrams, for which I have received considerable criticism (see the Disclaimer), and for which I was encouraged to write an introduction showing that
this is a reasonable object to consider. In this section I want to point out a dual
way of considering these objects which has the advantage of being more intuitive
for physicists, and suggesting what computations must be done to test the theory.
However in its simplest form it works only for van Kampen diagrams which are
topological discs, and thus fails for singular van Kampen diagrams, such as that for
the ∆++ baryon shown in Figure 7. After presenting the basic idea, I’ll take up the
41 Source:
http://en.wikipedia.org/wiki/Magic number (physics)
note that the energy should consist of two, possibly three, parts. Namely, there is
the contribution from the 2 cells, which is the energy (or mass) associated to the 9 fermions,
which is known from experiment. Second, there is the contribution from the edges, which should
correspond to the contribution from the strong nuclear force, which holds the fermions together
along these edges. And third, there is the contribution from the vertices, which must be taken
into consideration in van Kampen diagrams for the Z and W bosons and for the ∆++ resonance
which are singular disc diagrams, not topological discs.
42 But
32
STEVE GERSTEN
modifications needed to handle singular diagrams. The advantage of van Kampen
diagrams, in addition to not being restricted to topological discs, is that they occur
in the category of CW 2-complexes, and thus are amenable to all the techniques
of algebraic topology. The dual pictures I shall now discuss however are a hybrid
object, belonging to graph theory with transversely oriented and labelled edges.
Thus convenience for mathematicians is sacrificed for intuition for physicists.
Now for the definition of the dual picture for a van Kampen diagram D. Begin
by taking the first barycentric subdivision D′ of D and throw away all of D′ except
only those edges D′ which join the barycenter of a face to the barycenter of an
edge which is common to two faces. The closure of their point set union is the
dual picture Γ. It is given the structure of a planar graph whose vertices are the
barycenters of faces and whose edges are the union of the closures of two edges
with a vertex (which must be the barycenter of an edge of D) in common. There is
additional structure on Γ in that each of its edges has a transverse orientation and
label given by the edge of D it intersects.
The fundamental fermions are represented in Γ by its vertices and the edges
connecting them represent the forces acting on them.
As an example, the dual picture for a proton (or neutron) is a planar circle
subdivided into two arcs with an edge connecting one of these vertices to a vertex
in the exterior. Specifically, take the unit circle in the plane centered at the origin
with vertices (±1, 0) together with the segment joining (1, 0) to (2, 0). The vertices
of the circle represent up and down quarks, and the vertex (2, 0) is an up quark in
the case of a proton and a down quark in the case of a neutron. The arcs and edge
represent the strong nuclear force.43
One can recover the original van Kampen diagram D from Γ if D is a topological
disc, but this is not the case if D is singular, as is the case for the ∆++ baryon
represented in Fig. 5. In addition one has lost the boundary label of D. To remedy
these defects one introduces the enhanced picture Γ0 .
As a graph Γ0 is the 1-skeleton of the first barycentric subdivision D′ of the van
Kampen diagram D, where one discards the original edges of D. The vertices of Γ0
are of three types, F, E and V , where F type are barycenters of faces of D, E type
are barycenters of edges and V type are just the vertices of D. The vertices of F
type correspond to fundamental fermions (leptons or quarks). Those of E type are
equipped with a transverse orientated label coming from the label of the edge of D.
In particular those vertices of E type which lie on the boundary of D enable one
to construct the boundary label of D; they are distinguished by being boundary
edges of exactly one edge of Γ0 . In fact the entire van Kampen diagram D can be
reconstructed from Γ0 as a planar graph with its transverse labels.
43 If
one knows the strength of the interaction and the distance over which it takes place, one
can estimate the energy associated with an edge. The mass of the quarks are determined from
the laboratory. One must recall from an earlier footnote that, in the case of the proton (resp.
neutron), the two up quarks (resp. down quarks) are of different generations. Here, to first order,
one should ignore the EM force since it is smaller than the strong nuclear force by a factor of
10−3 .
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
33
Example.44 ∆++ resonance (see Fig. 5). Here is a description of the enhanced
picture Γ0 for ∆++ . Let X1 be the disjoint union of 6 planar edges where one
vertex is distinguished on each edge and called of type F. Identify the distinguished
vertices to get a planar graph X and call the end vertices alternately in one cycle
of type V or E, where one V type vertex is distinguished. Take 3 copies of X and
identify the distinuished V type vertices to get the planar graph Y . The images of
the central F vertices of X1 in Y represent the three up quarks, and the images of
the E vertices of X in Y have transverse oriented labels a, a, b.
The other ∆-baryons have the same structure as in Fig. 5, but for the ∆+ ,
0
∆ , and ∆− baryons the individual quarks are changed appropriately. They all
have the same rest mass within the error of 0.1%, which is what one would expect
since the dominant force holding them together is the strong nuclear force and
the electromagnetic force is smaller by a factor of a thousand.45 So my model is
consistent with the data for these particles.
The point here is that if one knows the strengths of the strong interactions and
the distances between adjacent quarks (adjacent either through vertex or through
edge of the enhanced picture Γ0 ) then one knows the energy associated to the interaction. If one knows the rest energy of the quarks in addition, then one can calculate
the energy of the particle. There is a caution here that each edge path of length 2
in Γ0 between two F vertices represents an interaction between the corresponding
fundamental fermions. I do not yet know how to weight these interactions if there
are more than two such paths of length 2 joining the two F vertices. However in
the case of the ∆++ baryon there is precisely one such path of length 2 joining each
pair of vertices of F type. By symmetry, all the interactions they represent have
the same strength and the distances associated between the quarks are the same.
So if my correspondent who wrote “there are no open problems” (see Disclaimer
below) is correct, there is enough information available to calculate the rest energy
of the ∆++ baryon. This amounts to a test of of the theory I have presented.46
Appendix 12. Engtanglement
This section is independent of all that precedes and proposes a geometrical explanation for the phenomenon of entanglement. whereby a measurement of a particle
can affect another particle spatially separated from it (that is, the invariant metric
44 I
am grateful to Yong-Shi Wu for having suggested I should consider the ∆++ baryon. It
turned out to be crucial in formulating my ideas.
45 Source: https://en.wikipedia.org/wiki/Delta baryon
46 Caveat. Again I caution that, in attempting to do the calculation for a proton, one must
be careful to recall that the two up quarks are of different generations, as I showed in an earlier
footnote. In effect all calculations are done in K̃ and not in K itself. In the picture model
Γ for the proton, the two vertices on the circle are joined by two arcs on the circle, and one
should experiment with different ways of weighing the strengths of the corresponding interactions,
assuming that the theory has already survived the ∆++ test. An “open problem” for physicists
′ (1)
of the first barycentric subdivision of K̃ into a metric graph, so
is to make the 1-skelton (K̃)
that length of edges reflect strength of interactions. Then all enhanced pictures associated to van
Kampen diagrams will acquire pull-back lengths.
34
STEVE GERSTEN
−dt2 + dx2 + dy 2 + dz 2 (setting c = 1) is positive for the two points). I shall work
in Minkowski space R1,3 although there is an obvious generalization to the general
pseudo-Riemannian case. In the simplest example of the phenomenon a particle of
spin 0 located at point P spontaneously decays into two particles X1 , X2 of spin
1
2 which fly off in opposite directions. I shall assume in the discussion that both
particles have non-zero rest mass, so their paths are in the interior of the light cone
at P .
Conservation of angular momentum requires that the spin measured along any
axis for X1 be the opposite of that measured along the same axis for X2 , so if the
first is 12 along the z-axis, say, then the second must be − 12 . This is true whatever
the separation of X1 is from X2 , as long as the state of the pair remains coherent,
even if no information can pass between the particles in the usual understanding
of Minkowski space. This prediction of quantum mechanics has been confirmed by
experiment, so is not in dispute. In this example the spin of X1 is not determined
before the measurement and can be an arbitrary linear combination of “up” and
“down” along any axis. The measurement picks out one of up or down, and the
effect is immediate on X2 : if X1 is measured to be up along a given axis then X2
immediately becomes down along the same axis. The experiments performed on
Bell’s inequality show that it is not the case that X1 was secretly, say, up all the time
(as might be the case if there were some hidden variables), in which case it would
follow that X2 was down; that was Einstein’s explanation for the phenomenon, but
Bell’s inequality (or rather its failure in quantum mechanics) shows that Einstein
was, in this case, wrong.47
What has been lacking so far has been a convincing explanation in the common
language for this paradoxical behavior, outside of the formalism of quantum mechanics. I shall offer one here, which requires only a small modification of one’s
notion of space and time, and propose an experimental test for my explanation.
Parametrize the paths of X1 and X2 by proper time τ , say, xi (τ ), i = 1, 2 and
identify the points x1 (τ ) and x2 (τ ) in R1,3 for all τ for which the wave function of the
pair remains coherent. The result is a singular space S. No further identifications
are made if decoherence results (if, for example, a measurement is made on one
particle).
One can visualize S best when there is one spatial dimension x and one time
dimension t, in which case the invariant form is −dt2 + dx2 and the Minkowski
space is R1,1 . In this case S is topologically a plane with a nappe of a cone resting
tangent on it. The nappe of the cone is the image of P in the S and the cone opens
up in the positive t-direction.48
Let us continue the discussion in R1,1 . Let Q1 and Q2 be two points in the
interior of the light cone at P on opposite sides of the paths x1 and x2 so that Q2
is on the light cone from Q1 . In R1,1 there is a single path for light from Q1 to
reach Q2 . But in the identification space S there is a time-like path with shorter
47 Source:
en.wikipedia.org/wiki/Quantum entanglement
but
not
analytically,
this
is
the
en.wikipedia.org/wiki/Catastrophe theory#Swallowtail catastrophe
48 Topologically,
swallowtail
catastrophe,
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
35
proper time. Hence information can be conveyed in S between the image points by
a shorter route than that taken by light.
A more extreme example is the following. Let Q1 and Q2 be chosen on opposite
sides of the cone determined by x1 and x2 so that the line from Q1 to Q2 intersects
xi at Q′i , i = 1, 2. Assume that the interval from Q′1 to Q′2 is space-like but that the
intervals from Qi to Q′i are time-like, with the interval from Q′1 to Q′2 ≫ the sum
of the aboslute values of the intervals fro Qi to Q′i . Then no information can pass
from Q1 to Q2 in Minkowski space. However in S the images of Q′i are connected
along a common time-like line, so in S information can pass from Q1 to Q2 .
Remark. It should be possible to choose Q1 and Q2 so that slight movement of a
laser placed at Q1 produces interference fringes at Q2 .
In summary, the introduction of singularities of well-known type can provide a
geometric explanation for the paradoxical behavior of entanglement.
Disclaimer
I received the following in a letter from M. Gromov: “ . . . in order to publish
the article and not to be scorned at by the physicists community, Bogomolov, who
as much as myself finds your article interesting and provocative, asks, if you agree,
to do the following.
(1) To have author’s (yours) disclaimer on the relation of the article to “real
physics” and an emphasis on the mathematical contents in it.
(2) A one page appendix by a professional physicist commenting on the original
physical input of your article. The more critical it could be the better it
would fare in the face of the physicists community.”
To comply with their request, I wrote the following disclaimer:
“I have been requested to include a disclaimer on the relation of this article to
“real physics”. I am a mathematician, not a physicist, in my seventh year of retirement; prior to that I worked for 25 years in the field of combinatorial group theory,
and earlier than that I published articles in fields involving algebra and topology,
but not physics. Last November 2012 I read the Scientific American article [Li] and
understood quickly that the Harari-Shupe theory suitably interpreted implied the
solution to the generation problem, stated as an open problem in [Li]. I read all I
could find in Wikipedia, having had no prior background in the physics involved,
and asked questions of physicists, most of which were ignored and one of which
was rebuffed with the arrogant and sarcastic (and unhelpful) statement that “there
are no open problems; good luck with the math.” The accompanying letter from
D. Singleton shows that I was encouraged to do real physics, to calculate masses
of elementary particles and magnetic moments. One exception was Professor Wu,
who listened to me in a meeting arranged by my colleague Domingo Toledo and
made pertinent suggestions. He said I had solved the generation problem, but also
told me that my paper would never be accepted by a physics journal.
As a further irony, I submitted the article to arXiv in the category Group Theory.
The editorial board vetted the article and resubmitted it as General Physics. ”
36
STEVE GERSTEN
As for the point about criticism by a professional physicist, I received the following letter on 1 March 2013 from Douglas Singleton (unedited except for punctuation
and TeX formatting):
“ From: Douglas Singleton [email protected]
To: Steve Gersten [email protected]
Hi Professor Gersten,
Sorry for the delayed reply. I’m currently on sabbatical which in principle means
I should have more time, but also in expectation of this I have taken on extra
projects.
Anyway your general question and suggestion (that electrons, photons, gluons,
etc.) should have some sub-structure is interesting and in fact I tried to think of
such a model some time ago, but there are a lot of problems such models face.
First a non-important comment – you had said that you have had a hard time
getting physicists to look at your work. I think this is a combination of the fact
that composite models face many challenges (I’ll detail some below) but as well
the formalism/notation you use is not in the standard tool kit of physicists so
you would either need to “translate” your work for physicists or start a campaign
to educate physicists to the formalism you use. For example there is a book on
differential forms by H. Flanders from Purdue from the 1960s and in the foreword
he specifically says his intent (he is a mathematician) was to educate physicists and
engineers to the beauty of differential forms, wedge products, etc. In the 90s when I
was in grad school differentials forms were still not part of the standard curriculum.
I learned them (somewhat) on my own using Flanders book. In any case if you use
unfamiliar formalism/notation this will ex plain why most physicist will not take a
look at your work.
For example in the opening of your fermion paper you talk about “Kampen diagrams ”. I looked at your pictures and these look similar to Dynkin diagrams/root
diagrams/weight diagrams from group theory (have a look at Howard Georgi’s book
on Lie Groups for physicists and your Kampen diagrams look similar to some of
these other diagrams I mention, but then again not exactly th e same). In turn
I scanned both articles and did not find any obvious mention of SU(2), SU(3),
U(1) or even string theory groups like E(8) x E(8) or any of the other exceptional
Lie groups. It may be that these are discussed in a manner /formalism I do not
know, but in any case this would explain why physicists have ignored your work.
Also I checked the arXiv (both hep-th and math-ph) and there was no mention
of “Kampen diagrams” – I did a “full text” search for “Kampen” and found only
a guy named van Kampen and then three papers which referenced van Kampen’s
work – but no reference to Kampen diagrams. A google search turned up Kampen
diagrams but in looking through the first 2–3 pages I did not see any physicists
working with them. Again in some sense this is not really important since one can
attribute this to the “bad” math education of physicists, but as a practical matter
it will mean your work will have an uphill battle getting attention from the physics
community.
OK but let me move on to substantive comments. The first questions you should
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
37
be able to calculate an answer for if your model is correct is
(i) What is the mass of the electron, muon, tau in terms of the more fundamental
masses of your “preons” a, b? (By the way I very much liked Harari’s work and
this inspired me to try my hand at this type of model building but my attempt
foundered on exactly this and the following questions). Or at least you need to
calculate the mass ratio e/mu and mu/tau.
(ii) What are the values of the CKM (Cabibbo-Kobayashi-Maskawa) mixing
elements between the three generations?
If your model is correct and useful then you should be able to calculate the above
quantities in terms of the input parameters of your model (I guess the parameter
should be the masses and mixings of the a and b “preons”). If you could do this
then people would pay attention even if they did not at first understand your
notation/formalism.
Next I have some general comments which seem problematic .
(a) Electrons, muons, quarks, etc. seem to be made of three “preons” and these
a, b “preons” I assume are spin 1/2 so that the results electron, quarks etc. will
come out to be spin 1/2. However if electrons are composite in this way (rather
than being fundamental Dirac spinors) then their g-factor is no longer guaranteed
to be g ∼ 2 (up to QED corrections) but should be calculated from the underlying
theory. In other words you need to take your composite electron, calculate its gfactor and show that it is about 2. For example the proton and neutron are both
known to be spin 1/2 but they are composite spin 1/2 particles being made up
of (at least at the first le vel) quarks. Now if one assumes that the quarks are
fundamental Dirac particles with g ∼ 2 one can to a pretty good job at getting
the g-factors for the proton and neutron (∼ 5.59 and ∼ -3.83 respectively) in terms
of the more fundamental g-factors of the quarks taken at their Dirac value. Note
that the g-factors of the proton and neutron are *very* different from 2. Also the
calculation of these values from QCD models is only at the 5% level as compared
to the 0.000000001% level of QED calculations of the electron g-factor. This is said
to be due to the very large non-perturbative quantum corrections coming from the
strong interaction. If you could get your model to give the correct g-factor of the
electron, muon, tau, etc. to the 5% level this would good enough since that is what
is done in the case of protons and neutrons.
(b) Your photon seems to be composed of āa i.e. the photon is also a bound state.
But the photon is experimentally known to be massless to a very high degree and
theoretically this is said to come from gauge invariance (which can be broken via
the Higgs mechanism but the Higgs in our Universe does not do this for the photon
so gauge invariance means the photon is exactly massless and this agrees very well
with experiment).Now if your photon is a bound state of more fundamental spin
1/2 particles it is highly unlikely that it would be massless to such a high degree.
This would require an extremely unlikely cancellation of the binding energy of the
system against the masses of the a and ā. In any case you need to show that your
model gives the mass of the bound state āa (i.e. photon ) as zero to some fantastic
accuracy. To do this you will need to specify the energy scale of the interaction
38
STEVE GERSTEN
which binds your “preons” together. I also did not see mention of this and it is
important – what is the energy scale/interaction strength of the interaction which
binds your preons together? For example in the strong interaction the dimensionless
coupling constant at low energies is ∼ 1 – 5 (the range is large since QCD is poorly
understood in the low energy limit). For the E& M interaction the coupling strength
at low energies is ∼ 1/137 (which also explains why perturbation theory works at
low energy for QED but fails from QCD).
(c) Also if your photon is composed of a fermion-anti-fermion both of which are
charged then it will have in general some magnetic moment, electric dipole moment,
etc. It is well known experimentally that the photon does not have these thus in
your model you should explain why your composite photon has no moments to such
a high degree. The same comment applies to the W and Z bosons which in your
composite model would have – barring some cancellation – magnetic, electric dipole
moments in general. In fact the W from the SM has a spin and magnetic dipole
momentum that lead to a g-factor of 2 (same as for a fundamental Dirac particle).
Because of this some scattering processes involving the W boson have “gauge amplitude zeros” in the differential scattering cross section which been confirmed to
the 5% level. The original article on this is K.O. Mikaelian, M.A. Samuel, and D.
S ahdev,Phys. Rev. Lett. 43, 746-749(1979) . Thus your model would also need to
how a composite W would get a g-factor so close to 2.
Anyway the first task - if you haven’t done it or if I missed it in the two articles
- would be to calculate the electron, muon, tau masses (or at least their ratios) in
terms of the parameters of your model. Then next would be to calculate the values
of CKM elements. Another good place to test your model would be in predicting
the mass structure of the neutrinos. The oscillation data for neutrinos give two
possible mass structures – regular and inverted. If your model could predict which
is the correct mass structure for neutrinos this would be a good *prediction* of the
model (the other things I ask above are post-dictions).
Sorry for the delay and then long email. I was also going to explain a bit about
my idea for composite leptons and quarks but as I said for my model I got stuck
on exactly the above questions.
Best,
Doug ”
A final word from the author, your truly. Part of Singleton’s letter refers to part
II of the article, which is under revision. The preface to the present article is an
attempt to, at the very least, introduce the concept of van Kampen diagram, to
give a readable reference in Wikipedia, and to give a down-to-earth analogy with
Buckminster Fuller’s geodetic dome, so that the concept will not appear so strange.
References
[AH]
[Ha]
[Li]
Alan Hatcher, Algebraic topology, Cambridge Univ. Press 2001, ISBN-13: 978-0521795401,
.pdf file available on the web at http://www.math.cornell.edu/ hatcher/AT/AT.pdf.
H. Harari, A schematic model of quarks, Physics Letters B, vol. 86, 1979, pages 83–86.
D. Lincoln, The inner life of quarks, Scientific American, pages 36–43, November 2012.
TOPOLOGY OF THE STANDARD MODEL I: FERMIONS
39
[Sh]
M. Shupe, A composite model of leptons and quarks, Physics Letters B, vol. 86, 1979, pages
87–92.
[BRS] N. Brady, T. Riley, and H. Short, The geometry of the word problem for finitely generated
groups, Birkhäuser, 2007, ISBN 978-3-7643-7949-0.
[Ya] C-N Yang, Quantum numbers, Chern classes, and a bodhisattva, Physics Today, vol. 65,
Jan. 2012, page 33.
Mathematics Department, University of Utah, 155 S. 1400 E., Salt Lake City, UT
84112-0090, http://www.math.utah.edu/∼ sg
E-mail address: sg at math dot utah dot edu
| 4math.GR
|
Scalable Secure Computation of Statistical Functions with
Applications to k-Nearest Neighbors
Hayim Shaul, Dan Feldman, Daniela Rus
arXiv:1801.07301v1 [cs.DS] 22 Jan 2018
January 24, 2018
Abstract
Given a set S of n d-dimensional points, the k-nearest neighbors (KNN) is the problem of quickly
finding k points in S that are nearest to a query point q. The k-nearest neighbors problem has applications
in machine learning for classifications and regression and and also in searching. The secure version of
KNN where either q or S are encrypted, has applications such as providing services over sensitive (such
as medical or localization) data.
In this work we present the first scalable and efficient algorithm for solving KNN with Fully Homomorphic Encryption (FHE) that is realized by a polynomial whose degree is independent of n, the number
of points. We implemented our algorithm in an open source library based on HELib implementation for
the Brakerski-Gentry-Vaikuntanthans FHE scheme, and ran experiments on MIT’s OpenStack cloud.
Our experiments show that given a query point q, we can find the set of 20 nearest points out of more
than a thousand points in less than an hour.
Our result introduces a statistical coreset, which is a data summarization technique that allows
statistical functions, such as moments, to be efficiently and scalably computed. As a central tool, we
design a new coin toss technique which we use to build the coreset. This coin toss technique and
computation of statistical functions may be of independent interest.
1
Introduction
The use of cloud services is increasing dramatically. Indeed, using a service located in the cloud has its
advantages over downloading and installing the service locally. Consider, for example, (i) a map that can
be queried for a site (such as a restaurant or a hotel) near a certain location; (ii) a diagnostics tool for
skin cancer, where a user uploads an image of her skin; or (iii) a recommender system based on previous
activities of similar profiles. Even if the databases are small enough to be installed on the user’s device, a
cloud service can constantly updates its databases and algorithms to have more accurate and more relevant
results, something that is hard for a user to do. The latter two examples, being examples of machine learning
indeed require updates to the databases as more data is collected from willing users, and also updates to
the algorithms as they are improved. In the first example as well, updates are required to the database as
sites are added or removed. One big disadvantage of a cloud service is the loss of privacy for the user. The
user is expected to reveal its data to be able to use the service. In some cases this data may be something
the user does not wish to reveal. For example, the output of a recommender system can also be used to
perform differential pricing on the expense of the user. In other cases, it is the interest of the service not
to know user’s information as it may impose extra regulation on the service. For example, having access to
user medical data may require it to comply with HIPAA regulations.
Multi-party computation (MPC) is used to let two or more parties compute a certain output from their
inputs without disclosing any information (except maybe for the output) to the other party.
Fully Homomorphic Encryption (FHE) is a secret-key-public-key encryption scheme that also supports + and × operations on the ciphertext. To encrypt a message m, the public key is used m0 =
1
Encrypt(m, pub), and decryption is possible only with the secret key m = Decrypt(m0 , sec). In addition we have, Decrypt(Encrypt(x, pub) + Encrypt(y, pub), sec) = x + y and Decrypt(Encrypt(x, pub) ×
Encrypt(y, pub), sec) = x × y. This suggests that any polynomial P (and in fact any algorithm) can be
computed on encrypted messages (x1 , x2 , . . .) by applying + and × operations on encrypted values to get
P(x1 , x2 , . . .). In the context of multi-party computation (MPC), FHE can be used to construct a singleround protocol where one party (the cloud) applies a polynomial on user’s data, such that the cloud does
not learn anything on the user’s data. The result of applying a polynomial P on encrypted input Encrypt(x)
is an encrypted value Encrypt(P(x)) that can only be decrypted by the user with her secret key. Except for
P(x), the user does not learn anything about P.
The implementation of FHE schemes usually involves encoding the data m using some transformation
over a finite ring while adding some noise. Removing the noise and reversing the transformation is possible
only with the secret key. As operations are performed on ciphertexts the noise grows. The user needs to
make sure the generated secret key will be able to remove the maximal amount of noise accumulated during
the computation of P(x). There are two techniques to reduce noise: modulo switching and bootstrapping.
The latter is not CPU efficient, as it involves the processes of decrypting a ciphertext under FHE. Modulo
switching, on the other hand, is very efficient to use, however, the number of times it can be used is set at
the time the key pair is generated. With FHE schemes known to date, as key-pair are generated to support
more modulo-switching, they grow in size, take more time to generate and render operations performed on
ciphertext to have more overhead.
The main challenge when designing an algorithm for FHE is to make it compatible with keys generated
with the least amount of modulo switching. Since the noise accumulated in a × operation is significantly
larger than the noise accumulated in a + operation, the latter is usually ignored and the challenge becomes
to design an algorithm whose equivalent polynomial has a low degree. Although theoretically any algorithm
can be expressed as a polynomial of its inputs, in practice, the naive polynomials are rarely practical.
Hereinafter, computations are assumed to be compatible to the FHE model (arithmetic circuit model),
where we are restricted to use + and × over some finite ring.
Definition 1.1 (Polynomial’s size and depth) A function f : Zsp → Ztp is a polynomial over a finite ring
Zp if it is a multivariate polynomial that maps a vector x of s ring elements in Zp , to a vector y = f (x) of t
ring elements in Zp , which is the result of the polynomial f on the input x. The complexity of the computation
is measured by the degree of the polynomial f , denoted by deg(f ), and the number of multiplications needed
to evaluate it, that is denoted by size, denoted by size(f ).
√
For a general polynomial, P, with deg(P) = n, we have size(P) = n. See [31] for details. However,
for some polynomials,
sparse, smaller bounds exist. For example, over Zp , where p is prime,
i necessarilyp−1
P p−1not
the polynomial
x
=
(x
+
1)
, whose value is 0 for x = p − 1 and 1 otherwise, has size O(log p).
i
Motivated by FHE problems, we measure the depth and size of the polynomials in our solution. We focus
on reducing their degree and their size.
Comparing encrypted numbers. Unlike comparison model, implementing a comparison in FHE is not
trivial. Simply put, FHE does not provide a comparison operator. Having the ability to compare two
encrypted numbers and getting an unencrypted result would essentially break the security of the encryption
as it leaks information on the ciphertext. However, for two encrypted numbers JxK and JyK it is possible to
construct a polynomial P (x, y) whose value is encrypted and equals 1 if x < y and 0 otherwise.
k-nearest neighbors (KNN) is a problem where given a finite set S ⊂ Rd , with |S| = n and a point
q ∈ Rd we are looking for a subset S 0 ⊂ S, of the k nearest points to q, i.e. |S 0 | = k and maxx∈S 0 kx − qk ≤
minx∈S\S 0 kx − qk. In machine learning the KNN algorithm is used as a classifier, when each point x ∈ S
is assigned a class and the class of q is taken to be the majority of the classes in S 0 . Specifically, KNN can
address the examples mentioned above. Setting S ⊂ R2 to be a set of “sites” and q ∈ R2 to be users location,
KNN is the subset of k nearest sites to q. Setting S ⊂ Rd to be a training set for skin cancer, labeled as
2
“benign” or “malignant”, and q ∈ Rd be a sample to be classified, KNN is a subset of k nearest training
sample to q from which q can be classified as “benign” or “malignant”. Lastly, setting S ⊂ Rd to be profiles,
each paired with a recommendation, and q ∈ Rd to be a user’s profile, KNN is a subset of k most similar
profiles to q which suggests k recommendations to the user.
Despite its simplicity, k-nearest neighbors is a hard problem to solve in FHE. Informally, a polynomial
whose value is the index of one of the k nearest neighbors should somehow consider all data points in S.
Naively, projecting from a comparison-model algorithm, one would expect this to be a polynomial of degree
O(n). Making it harder, is the fact that in the FHE model an equivalent of the < operator needs to be
implemented from + and × operators which naively results in a polynomial with degree O(n · deg(<)), where
deg(<) is the degree of the polynomial evaluating the < operation.
Statistical functions such as the cumulative distribution function (CDF) can be used to solve the KNN
problem. Specifically, for a random variable d = kq − si k, where i is drawn uniformly from {1, . . . , n}, and
CDFd being its CDF then by definition we have, | {si ∈ S | kq − si k < T } | = k, where T = CDFd−1 (k/n).
A closely related set
P ofe functions are moments. Given a data set D = {d1 , . . . dn }, the e-th moment is
di . The first order moment, with e = 1, is the average of D. The variance of D can
defined as µe (D) = n1
be computed from its first two moments V (D) = µ2 (D) − (µ1 (D))2 . For some distributions the CDF can be
computed from the first few moments.
Computing moments in FHE is a hard problem. In fact, even computing the first moment, i.e. the
average, is hard. The main problem is the lack of a division operation in a ring. Even if a multiplicativeinverse exists, multiplying by the inverse does not act as division. For example, computing the average of
−1
2 and 3, Avg(2, 3) = 2+3
we would have (2 + 3) · 2−1 = 6
2 = 2.5, over the ring Z7 . By multiplying by 2
mod 7, where in fact we would like to have (since we are rounding things to integers) Avg(2, 3) =P
2. The
issue of computing an average has been addressed before. In [30] it is suggested to return the pair ( xi , n)
as the output of an average function. This solves the division problem by deferring it to a later step. This
has two obvious disadvantages: (i) it requires an expensive step to perform the division either by an iteration
with aPTuring machine or by embedding a division polynomial and (ii) in most interesting applications
we
P
have
di max di > Avg(d1 , . . . , dn ) which requires operations on numbers as large as
di which is
inefficient when n is large.
Finding k smallest values in a general unordered array D = {d1 , . . . , dn }, with di ∈ [L], for 1 ≤ i ≤ n, is
the problem of returning mink D, where mink D ⊂ D is a subset such that mink D = k and max mink D ≤
min(D \ mink D). It is believed this is a hard problem to solve practically in FHE. Informally, we expect
the polynomial degree of such a solution to be at least O(n log L) as it at least needs to perform n − 1
comparisons each of O(log L) bits. Setting D1 = D and iteratively computing mi = min1 Di and setting
Di+1 = Di \ {mi }, for i = 1, . . . n can be used to sort D, a problem that has received a lot of attention in
homomorphic encryption [11, 12, 13, 14] and no efficient solution is yet known (see more in Section 2.3) .
1.1
Our Contribution
In this work we show, counter to common belief, that averages and higher moments can be computed
efficiently in FHE and be used efficiently to solve the k-nearest neighbors problem in near real time. More
specifically our contributions are as follows.
First FHE algorithm to compute statistical functions in a practical way by a polynomial whose
degree is O(deg(<)), the degree of a polynomial comparing encrypted numbers, and independent of n. Our
algorithm is also “embarrassingly
parallel”, which makes it easily scalable. The output of our algorithm is
Pn
1
e
an approximation of m
d
.
For
the applications in this paper we consider the cases where m = n and
i=1 i
e ∈ {1, 2}, but it can be extended to any 0 ≤ e ∈ R and m > 0. The output of our algorithm
is a single
P
ciphertext. This has twoPadvantages over previous techniques, whose output was the pair ( dei , m): (i) we
avoid explicitly keeping
dei which is expensive when n is large and (ii) the output ciphertext can be passed
3
to a second step of an algorithm. This is in contrast to prior solutions (e.g. [30]. We expect this technique
will prove efficient in more algorithms.
A novel technique for coin tossing in FHE. Our solution is non-deterministic and relies on “coin
tosses” with probability that depends on an (encrypted) input. To the best of our knowledge, this is the first
efficient implementation of a coin toss. Since coin tossing is a basic primitive for many random algorithms,
we expect our implementation of coin tossing to have a large impact on future research in FHE.
First practical solution to compute k-nearest neighbors in FHE. Our techniques lead to an algorithm and a single-round protocol where the user sends one message whose size is proportional to the
representation of one point q, and receives one message whose size is proportional to the representation of
k points that are nearest to q. The k-nearest neighbors algorithm has application in searching as well as
in machine learning for classification and regression. A practical solution to this problem opens the way to
many practical systems that employ it.
System and experiments results for search. We implemented our algorithms into a system and ran it
on MIT OpenStack cloud. Our experiments, coinciding with our analysis, show that with a single core the
average of 60,000 7-bit ciphertexts can be computed in about two hours. Also, finding 10 nearest neighbors
in a set of 580 hotels in Boston area rounded to a 2D grid of 100 × 100, took about 20 minutes on a single
server.
Open Source Library for Secure-Search with FHE based on HELib [25] is provided for the community [34], to reproduce our experiments, to extend our results for real-world applications, and for practitioners
at industry or academy that wish to use these results for their future papers or products.
1.2
Novel Techniques
Coin tossing in FHE. The notion of coin tossing is somewhat not trivial in arithmetic circuit model, that
can only realize polynomials. Since a polynomial is restricted to + and × operations it is not clear how or why
it is allowed to simulate a coin toss, let alone, when the probability of the toss depends on an encrypted input
value. Unlike traditional RAM model algorithms, polynomials cannot “call” a sub-polynomial and cannot
“choose” a sub-polynomial to embed. Instead, the process of creating such a polynomial should be such
that, independently of the input, a polynomial is constructed. During the construction of the polynomial
randomness is used to decide on the sub-polynomials that are embedded. We describe our algorithms as
pseudo-code that get a random generator R generating random r parameters for coin tossing. This is of course
just for clarity of presentation. Formally speaking, the random numbers are used during the construction
of the polynomial to determine how it is built.
We show an equivalent of a coin toss.
Lemma 1.2 (Coin Toss) Let n be a integer parameter and D a distribution over N with a cumulative
distribution function CDF : N 7→ [0, 1]. There exists a set of polynomials F = {P1 , . . . , Pn }, such that if
P ← F is drawn randomly and x < n then P(x) = 1 with probability CDF (x), and Pi has degree O(log n)
and size O(log n), for every i = 0, . . . , n.
Using coresets to compute statistical functions.
Given n positive integers, x1 , . . . , xn and m, e > 0
Pn
1
e
x
in
an
efficient way that avoids the need of division and
we show how to compute the mean s∗ = m
i=1 i
does not generate unnecessary large numbers. Some interesting cases for our technique are:
Pn
• take m = n, e = 1 to compute the average n1 i=1 xi .
Pn
• take m = n, e = 2 to compute n1 i=1 x2i .
4
We make use of our new coin tossing technique and compute the polynomial s =
(
xe
1 with probability mi
ai =
0 otherwise.
P
ai , where
∗
It is easy to see that E(s) = s∗ . We give a bound on the probability of error P r(|sP− s∗ | > εs∗ ) < 2exp(− εs3 ).
1
xei , enjoys the best of both
Unlike previous technique, e.g. [30], ourPproposed solution for computing m
1
e
worlds: keeping the ring size small p = m
x(i) + O(1), while still having a polynomial with small degree.
1.3
Definitions
Notation.
For a given integer p ≥ 1 we define [p] = {1, · · · , p}. We denote by JxK the encrypted value
of x, which can be a result of encrypting x by calling encrypt(x), or a result of secure computation, for
example by the cloud, in which case x is not known. We also denote by Jx(bits) K the encryption of x given
in binary representation, where each bit is encoded in a different ciphertext. As common in cryptography,
the arithmetic operations in this paper are applied over a finite set of integers in {0, · · · , p − 1}, where the
modulo operator is used to keep the outcome of each operation in this set. Such a set is formally called the
Zp ring.
Definition 1.3 (Ring) The ring Zp is the set {0, ·· · , p − 1} equipped with multiplication
(·) and addition
(+) operations modulo p, i.e., a · b = (a · b) mod p and a + b = (a + b) mod p for every a, b ∈ Zp .
We use the operator a ← [n] for a random variable a and an integer n, to indicate that a is being drawn
$
randomly from [n]. If a is drawn with equal probabilities we use the notation a ←
− [n].
2
Related Work
It has been shown [23, 24, 38] that two parties (Alice and Bob) can compute any function over their secret
inputs over an interactive protocol that reveals no information beyond the function’s output. The major
disadvantage of an interactive protocol is the communication complexity that grows polynomially in the
time to compute the function. Using an FHE scheme such as [6, 22], a single-round protocol can be devised,
where Alice sends Bob her input encrypted with her public key, Bob computes the function using FHE, and
returns the result to Alice. Since Alice’s secret key is needed to decipher the input and output, Bob cannot
learn anything on the input or the output. On the other side, Alice does not learn anything on Bob’s input
except for the output of the function.
2.1
Searching
Prior work on low degree polynomial solving Private Information Retrieval [7, 10, 17, 20, 21, 33] can be used
to solve the k-nearest neighbors by iteratively applying them to to search for potential neighbors in increasing
order. However, these works assume there is at most one matching record. A recent work [2] removed this
assumption and supports any number of matches. In this case, only the first match is returned. This work
also supports a filter that can be given by Alice as part of the (encrypted) input such as t1 < kq − si k < t2
(i.e., points whose distance from q is at least t1 and at most t2 ). Using this filter can reduce the number of
iterations. A slightly modified filter (setting a lower limit on the index of the matched record) can be used to
iteratively get all matches and not only the first one. Nevertheless, this still requires at least k iterations to
report the k nearest neighbors to q. Another recent work [1] assumes an upper bound s ≥ 0 on the number
of matches to an (encrypted) filter and returns all matches in an output whose size is O(s). This work draws
a link between FHE and sketches and uses a sketch matrix to efficiently compact the vector of matches to a
vector of dimensionality O(s). Although, it is possible to return all k records matching a filter kq − si k < t2
in a single round, Alice is still left with the problem of finding the correct value t2 .
5
2.2
Classification
The problem of classification is to preprocess a set of training classified samples so that given a new sample,
its address can be predicted. The problem is split into two steps. The first is the training of a model (either
supervised or not). The second is to determine the classification of a new sample given a trained model. The
k-nearest neighbors problem has been used for classifications in a non-secure settings. For example, in [3, 19]
kNN was used to classify tissues and cancer. For some models the training step has been implemented in
the secure settings. For example, decision trees [29], Naive Bayes [35] and linear discriminant classifiers [18].
Given a trained model, it was shown in [4] how to use FHE to compute medical prediction functions from
patient’s encrypted data. In another work [5] secure protocols were shown to compute classification for
hyperplane decision, Nave Bayes, and decision trees. However, their work uses interactive protocols (i.e.
more than one round).
2.3
Sorting
If we consider the vector of distances D = (d1 , . . . , dn ), where di is the distance from a query point q to a
point si , then k-nearest neighbors is closely related to sorting. Specifically, after sorting the elements of D,
the k smallest values correspond to the k nearest neighbors. On the other hand, an array (or positive values)
can be sorted if we iteratively find the smallest number by setting k = 1 in a 1-dimensional KN N and
remove it from the array. The problem of sorting an array has been greatly studied. for example in [13, 14].
In [11, 12], Cetin et al. surveyed several sorting algorithms implemented in FHE, and compared them to
their arithmetic circuit that sorts n L-bit numbers, given in their binary representation. The multiplicative
depth of their circuit s O(log n + log L), i.e. the underlying polynomial is of degree O(nL). Although their
algorithm was faster than previous result, it still took almost one minute to sort 64 8-bit numbers.
3
Overview
Generic Polynomials We note that for any function f : [p] → [p] there exists a polynomial Pf,p : Zp →
Pp−1
i
Zp such that Pf,p (x) = f (x), for any x ∈ [p]. Moreover, the polynomial Pf,p (x) =
i=0 ai x can be
constructively built by interpolating over all pairs (x, f (x)). We can use Fermat’s little theorem to keep the
degree low, deg(Pf,p ) ≤ p, since xp = x. When the ring size p is clear from the context we omit it and simply
√
write Pf (x). A general p-degree polynomial has size O( p). See [31]. The generalization of this, a k-variate
polynomial Pf,p (x1 , . . . , xk ) has degree (p − 1)k, and size O(pk/2 ).
√
Throughout the paper we use some special polynomials: Psqrt,p (x) = b xc, and Pbiti ,p (x) the i-th bit in
the binary representation of x, i.e.
(
1 The i-th bit in the binary representation of x is set
Pbiti (x) =
0 otherwise.
Coreset is a data summarization C of a set P of items such that f (C, q) approximates f (P, q) for a desired
function f and a query q from a (usually infinite) set of queries. Coreset is a paradigm in the sense that its
exact definition, structure and properties change from paper to paper. Many coresets were recently suggested
to solve main problems in computational geometry (e.g.[9, 15, 32]), machine learning (e.g. [8, 27]), numerical
algebra [37] and graph theory (e.g. [16]). Recently, coresets were used to solve searching problems in FHE
[1, 2].
We make two extensions to coresets. The first extension is we allow the algorithm applied on C be
different than A. I.e. we require that |A0 (C) − A(S)| < εA(S), for some A0 . The second extension, which is
more related to FHE is we are not interested only in cases where |C| < |S|, but also where A0 (C) is easier
to compute in FHE.
6
Definition 3.1 (FHE coreset) Given a vector S = (x1 , . . . , xn ) and an algorithm A, a (δ, ε, A0 , p) coreset
is a vector C = (c1 , . . . , cm ), where |A0 (C) − A(S)| < εA(S) and cj = Pj (C), where Pj is a polynomial of
degree δ, with probability p.
Sketch Matrix We use a sketch matrix M that enables the client to quickly extract χ from the small
coreset (sketch) vector M · χ that is computed on the server. The coreset is based on what is known as a
sketch or disjunct matrix compressing sparse vectors; see [1, 28] and references therein.
k×n
Definition 3.2 (Sketch matrix [1]) Let s, k, n ≥ 1 be integers. A matrix M ∈ {0, 1}
is called an
(s, n)-sketch matrix, if the following holds. There is an algorithm DECODE that, for every vector χ0 ∈ Rk ,
n
returns a binary vector χ = DECODE(χ0 ) ∈ {0, 1} if and only if χ0 = M · χ. The vector χ0 ∈ Rk is called
the s-coreset of the vector χ.
Such a sketch matrix M can be efficiently constructed (offline, independently of the input) using the
result of Indyk, Ngo and Rudra [28]. They suggest a probabilistic and deterministic construction that can
also be decoded in time that is only poly-logarithmic in the length n of the input vector. For simplicity, we
use the following less efficient but deterministic version.
Theorem 3.3 (Corollary C.3 in [28]) Let s, n ≥ 1 be integers. An (s, n)-sketch report matrix M ∈
k×n
{0, 1}
(see Definition3.2) can be computed deterministically in nO(s log s/ log n) time, and k O(1) space,
where k = O(s2 log n). The corresponding decoding algorithm computes DECODE(y) in k O(1) time.
4
Problem Statement
k Nearest Neighbors Given a set of points S = {s1 , . . . , sn } ⊂ Rd , a query point q ∈ Rd and a parameter
0 < k < n, the search problem is to find a subset S ∗ ⊂ S such that |S ∗ | = k and maxσ∗ ∈S ∗ kσ ∗ − qk ≤
minσ∈S\S ∗ kσ − qk.
In the secure version, we assume two parties Alice and Bob, where Bob holds the set S of size n (for
example, the set of all restaurants in the world), and Alice wants to get from Bob a short list (of size k n)
of restaurants nearest to her location, without having to download the more than O(k) bits from Bob, or
revealing to Bob where she is. In our model, we assume Bob is semi-honest (i.e. he follows the protocol) and
our goal is to prevent Bob from learning anything on the location of Alice. Furthermore, we are interested in
a non-interactive protocol, meaning that Alice sends a single message of size O(1) to Bob and gets a single
reply from Bob of size O(k).
5
k-nearest neighbors Algorithm
In this section we show how to solve the secure k-nearest neighbors problem in an efficient scalable way. We
build upon an algorithm, which is interesting in its own and described in Section 6, to securely compute
statistical functions. We also give three applications that use k-nearest neighbors.
5.1
k Nearest Neighbors (KNN) with Applications
We first start by showing 3 applications of KNN, then we show how the KNN problem can be solved by
finding the k smallest values in an array. Then we provide some applications.
Find k sites near a location Given n sites S = {s(1), . . . , s(n)} ⊂ [L]2 with their associated information
aux(1), . . . , aux(n) ∈ {0, . . . , 2α }, and an encrypted query JqK ∈ [L]2 a call to KNearestNeighborsp,n,k,ε,R,s,aux (JqK, Jq (bits) K)
returns a sketch of the information of the k-nearest sites in S to q.
7
Algorithm 1: KNearestNeighborsp,n,k,ε,R,d,s,α,aux (JqK, Jq (bits) K)
Parameters:
Parameters:
Parameters:
Parameters:
Parameters:
Input:
Input:
Output:
1
2
3
4
A prime p, and integers n k > 0, and d, α ≥ 1.
A real number ε > 0.
A family of uniform random generator functions R = {Rr : N → [r]}.
√
p
An n-tuple s, where each tuple is a d-dimensional point, where 0 ≤ sδ (i) ≤ d .
An n-tuple aux of auxiliary data associated with s, where each tuple is an α-bit number.
√
A d-dimensional vector JqK = (Jq1 K, . . . , Jqd K), where 0 ≤ qδ ≤ p/d,
(bits)
(bits)
(bits)
The bit representation Jq (bits) K = (Jq1
K, . . . , Jqd
K), where Jqδ
K are the bits of qδ .
A sketch of size O((1 + ε)k) from which the auxiliary data of at least O((1 − ε)k), nearest neighbors cab
/* Denote s(i) = (s1 (i), . . . , sd (i))
*/
√
/* Also denote sδ = (sδ (1), . . . , sδ (n)) an n-dimensional vector, where 0 ≤ sδ (i) ≤ p/d. */
/* Compute an n-dimensional vector of L1 -distances from q to s(i)
*/
JdistancesK := J(0, . . . , 0)K
for each i ∈ 1, . . . , n do
P
(bits)
(bits)
/* Define: kJaK − bkL1 = δ (Jaδ K − bδ + 2(bδ − Jaδ K)isSmallerp (Jbδ
K, Jaδ
K))
*/
Jdistances(i)K := kJqK − s(i)kL1
Jdistances(bits) (i)K := Convert Jdistances(i)K to bit representations using the polynomials Pbiti ,p
/* KSmallestValues computes an indicator vector for the O(k) least distances.
Algorithm 2.
5
6
7
8
9
10
11
12
See
/* Create a sparse return vector using the sparse indicator vector
JχK := KSmallestValuesp,n,k,R (Jdistances(bits) K)
for each i ∈ 1, . . . , n do
for each δ ∈ 1, . . . , α do
(bits)
(bits)
JKNNδ
(i)K := auxδ
(i)χ(i)
/* Use a sketch to return the sparse result vector. See Section 3 and [1] for
details
JResult(bits) K := J((0, . . . , 0), . . . , (0, . . . , 0))K // a (1 + ε)k-dimensional vector of d-tuples
for each δ ∈ 1, . . . , α do
(bits)
JResultδ
K := M(1+ε)×n · JKNNδ K
Return JResultK
8
*/
*/
*/
Classification System Given n samples S = {s(1), . . . , s(n)} ⊂ [L]d with their associated classes aux(1), . . . , aux(n) ∈
{0, 1}, and an encrypted query JqK ∈ [L]d a call to KNearestNeighborsp,n,k,ε,R,s,aux (JqK, Jq (bits) K) returns a
sketch of the classification of the k-nearest samples in S to q. The classification of q is then taken to be the
majority of classifications.
Recommender system Given n profiles S = {s(1), . . . , s(n)} ⊂ [L]d with recommendations associated to them aux(1), . . . , aux(n) ∈ {0, . . . , 2α }, and an encrypted query profile JqK ∈ [L]d , a call to
KNearestNeighborsp,n,k,ε,R,s,aux (JqK, Jq (bits) K) returns a sketch of the recommendations of the k-nearest profiles in S to q. The set of recommendations to q is then taken to be the set of recommendations to profiles
similar to q.
Algorithm Overview Algorithm 1 has (as parameters) integers n k > 0, a prime, p and an n-tuple,
s, where each tuple is a d-tuple (s1 (i), . . . , sd (i)) denoting the position of the i-th site in d-space, where
√
0 ≤ sx (i), sy (i) ≤ p/d are integers. The algorithm gets as input an encrypted query q = (q1 , . . . , qd ), where
√
0 ≤ qi ≤ p/d denotes the query location given in binary representation as well as a single ciphertext, and
it outputs a sketch of size O(k) from which the user can infer s(i∗ ) | |q − s(i∗ )|L1 ∈ mink {|q − s(i)|} , that
is, the set of sites that are nearest to q, where kp1 − p2 kL1 is the distance in L1 norm.
In Line 3 Algorithm 1 computes the distance Jdistances(i)K = kJqK − s(i))kL1 , for each 1 ≤ i ≤ n. The L1
P
P
norm is computed using Algorithm 5, ka − bkL1 = δ |aδ − bδ | = δ (a−b+2(b−a)isSmaller(b(bits) , a(bits) )).
In Line 4 the distance distances(i) is converted to bit representation. This is done by computing dlog pe
polynomials Pbit1 ,p (distances(i)), Pbit2 ,p (distances(i)), . . .), where Pbiti ,p (x) = 1 if the i-th bit is set in the
binary representation of x. See Section 3. In Line
5 Algorithm 1 calls Algorithm 2 to get an encrypted
0
indicator vector JχK, where χ(i) = 1 if s(i) ∈ mink s and χ(i) = 0 otherwise, for some k 0 = O(k). In Line 8
the algorithm creates a set of sparse vectors by multiplying the elements of aux by χ. This guarantees that
only the auxiliary data of the k nearest neighbors appear in KN N . To be generic, we have aux(i), the
auxiliary associated with the i-th site, be α bits, where α is a parameter. We keep the result of multiplying
the bits of aux by χ in α n-dimensional binary vectors. By the way Algorithm KSmallestValues constructs
χ, we get that it (and also KN N ) is (1 + ε)k-sparse. In Line 11 we multiply KN N by a precomputed
constant sketch matrix M to get a (1 + ε)k dimensional sketch of KNN.
√
p
Theorem 5.1 Given n points s(1), . . . , s(n) ∈ [ d ]d , an n-tuple of auxiliary data aux, such that aux(i) is
√
p
an α-tuple of bits associated with s(i) and a query point q ∈ [ d ]d . Denote by D = {d(1), . . . , d(n)} the set
of L distances, d(i) = ks(i) − qkL1 . For any 0 ≤ k ≤ n, Algorithm 1 outputs a compact representation of
n 1
o
aux(i) | d(i) ∈ minO(k) D of size O(k) of the auxiliary data associated with the O(k) nearest neighbors of
√
q. The polynomials that compute the sketches have degree O(log p) and size O( p log p + nd log p + αn).
The proof is given in Section 7.5.
5.2
Finding k smallest values in a set
As mentioned in the introduction, the problem of finding the k smallest values in a set D is a hard problem
in FHE. We relax this problem by assuming the set D has a known distribution and specifically we show here
a solution for sets with Gaussian distribution. Another relaxation we make, given D and k, is to compute
minκ D where κ ≈ k (see a more formal relation below).
Algorithm 2 Overview Algorithm 2, has as parameters two integers n k > 0 and a prime p, where
n is the size of the input and k is the size of the output (i.e. number of smallest values to report). The
algorithm gets as input an encrypted n-dimensional vector d ∈ [p]n . The algorithm assumes the values
of d have Gaussian distribution, (d(1), . . . , d(n)) ∼ N (µ, σ 2 ) (where µ and σ are unknown). For many
applications this is a valid assumption. For example, our experiments (see Section 8.1.3) show that the
9
Algorithm 2: KSmallestValuesp,n,k,R (Jd(bits) K)
1
2
3
4
5
6
7
8
9
Parameters: Two integers, n k > 0, and a prime p.
Parameters: A random generator functions R = {R : N → [n]}.
√
Input:
Encrypted n-dimensional vector Jdbits K, where d ∈ [ p]n .
Output:
An n-dimensional indicator vector JχK, where χ(i) = 1 if d(i) ∈ minκ {d(i)} and χ(i) = 0 otherwise,
where κ ≈ k with high probability (see details below).
P
di . See Section 6 for details.
*/
/* Compute an estimation of n1
JXK := ProbabilisticAveragep,n,n,1,√p,R (JdK)
P 2
/* Compute an estimation of n1
di
*/
JX 2 K := ProbabilisticAveragep,n,n,2,√p,R (Jd(bits) K)
/* Compute estimation of the deviation
*/
Jσ ∗ K := Psqrt (JXK2 − JX 2 K)
/* Compute a threshold for the report
*/
JT ∗ K := JXK + Φ( nk )Jσ ∗ K
J(T ∗ )(bits) K := Compute bit representation of JT ∗ K using Pbiti
/* Compute an indicator vector for the report
*/
χ := (0, . . . , 0) // an n dimensional vector
for i ∈ 1, . . . , n do
Jχ(i)K := SmallerT hanp (J(T ∗ )(bits) K, Jd(i)K)
return JχK
vector of distances indeed has Gaussian distribution. The algorithm returns an (encrypted) indicator vector
n
χ ∈ {0, 1} , such that χ(i) = 1 iff d(i) ∈ minκ {d(1), . . . , d(n)}, where P r |κ − k| < εcn σµ + Φ−1 nk
<
<τ }|
|{i| d(i)−µ
µ4
σ
2
2exp −εO σ + σ2 +µ2 + µ , where Φ(τ ) =
is the cumulative distribution function. We
n
distinct parameters whose values are known to the algorithm from input that are encrypted. Given the
values of µ and σ it easy to compute T . Unfortunately, as discussed in Section 1 these values are hard to
compute in arithmetic circuit model.
P
d(i) by calling ProbabilisticAverage,
In Line 1 the algorithm computes (an approximation to) the average x = n1
√
with e = 1, m = n, l = p (see Section 6 for more details). In Line 2 the algorithm computes the average of
P
√
d(i)2 by calling ProbabilisticAverage, with e = 2, m = n, l = p (see Section 6 for more
squares x2 = n1
q
√
details). In line 3 we approximate the standard deviation by computing JσK = JxK2 − Jx2 K, where · is
n
computed by applying Psqrt (·). In Lines 7-8 the algorithm computes an indicator vector JχK ∈ {0, 1} , where
−1 k
χ(i) = 1 iff Jd(i)K < JxK + Φ ( n )JσK.
p
Theorem 5.2 Given an array D = (d(1), . . . , d(n)), of n elements, where 0 < d(i) < (p), with Gaussian
distribution, D ∼ N (µ, σ 2 ) and a parameter k n, then KSmallestValues evaluates an indicator vector
χ = (χ(1), . . . , χ(n)), such that χ(i) = 1 if d(i) < maxκ D, where
µ
k
µ4
εn
+ Φ−1
< 2exp −εO σ 2 + 2
P r |κ − k| < √
+
µ
,
n
σ + µ2
2π σ
x −µ
|{i| iσ <τ }|
is the cumulative distribution function of standard Gaussian distribution.Also, χ
where Φ(τ ) =
n
can be computed by a polynomial of degree O(log p) and size O(n log p).
The proof is given in Section 7.4.
In the next section we describe how x and x2 are computed efficiently in arithmetic circuit model.
10
6
Algorithms for Computing Moments and Statistical Functions
P
P 2
xi and n1
xi and other moments can be
In this section we show how statistical functions such as n1
computed efficiently under FHE. We believe computing these functions is of independent interest and it has
a broad set of applications expanding beyond k-nearest neighbors.
Algorithm 3: ProbabilisticAveragep,n,m,e,L,R (Jx(bits) K)
Parameters:
Parameters:
Input:
Output:
Integers, L, p, n, m > 0, such that L < p.
e
A uniform random number generator R : N → [d Lm em].
A vector JxK ∈ [L]n , where values are given in binary form using dlog Le bits.
P
2
Le
An encrypted number Jx∗ K such that P r(|1/m x(i)e − x∗ | > ) < 2e−2d m en
e
1
2
3
4
5
6
c := d Lm e
Set JaK := (J0K, . . . , J0K) to be an cn dimensional encrypted vector
for i ∈ 1, . . . , cn do
be
. See Section 6.1
/* P r(CoinT ossL,R(i)1/e (b) = 1) = cm
(bits)
Ja(i)K = CoinTossL,R(i)1/e (Jx
(di/ce)K)
Pcn
Jx∗ K := i=1 Ja(i)K
return Jx∗ K
*/
xi
Algorithm 3 Overview In Line 1 Algorithm 3 computes a resampling constant to ensure cm
< 1 for any
i. See details below. In Line 4 the algorithm uses cn values r1 , . . . , rn drawn uniformly from [cm], which are
used to set
(
1 if (ri )1/e < xbi/cc
ai =
0 otherwise.
P
P e
1
The algorithm then returns
ai as an estimation to m
xi .
n
Theorem 6.1 Let (x(1),
P. . .e, x(n)) ∈ [L] be an n dimensional vector. Also let 0 < e ∈∗ R and m be an
1
integer. Denote µ = m
xi , then Algorithm 3 describes a polynomial whose value is X , that has degree
e
O(log L) and size O(d Lm en log L) such that
P r (|X ∗ − µ| > εµ) < 2exp(−
µε2
).
3
The proof is given in Section 7.3.
Connection to coresets Our algorithm
functions
P e for computing statistical
P is in fact an FHE-coreset
xi , for S = (x1 , . . . , xn ), A0 (C) =
ci , for C = (c1 , . . . , cn ), and
(see Definition 3.1) with A(S) = n1
cj = CoinT ossL (xj ), which is a polynomial of degree L, and |A0 (C) − A(S)| < εA(S), with high probability.
6.1
Coin Toss
CoinToss Overview The formal way to look at CoinTossn,r is as an infinite set of algorithms, with one
algorithm for every pair of (n, r) for any n, r ∈ Z. Setting n and r, the algorithm is uniquely determined
and it gets an encrypted input Jx(bits) K, where 0 < x < n, given by its binary representation, i.e. as a vector
of bits, where Jx(i)K is the i-th bit of x. Since n and r are “embedded” into the algorithm their values are
known (not encrypted) and therefore can be used in a comparison operation. In Line 2 the algorithm tests
whether r > n ≥ x, and returns J0K if it is. Although a polynomial does not have a comparison operator,
11
Algorithm 4: CoinTossn,r (Jx(bits) K)
1
2
3
4
D
Parameters: Two integers r ≥ 0 and n > 0, where r ←− [n] is drawn from [n] with distribution D.
Input:
An encrypted number JxK, such that 0 ≤ x < n is given in its binary form and x(i) denotes its i-th bit.
Output:
Returns a bit JbK, such that P r(b = 1) = CDFD (x).
if r > n then
return J0K
(bits)
Jy
K := encrypt the binary representation of r
return isSmallern (Jx(bits) K, Jy (bits) K)
this comparison is in fact not encoded in the polynomial. The right way to read this line would be: for a
polynomial identified by parameters r > n the polynomial is degenerated and outputs J0K.
In Line 3 the algorithm extract the bits of r and puts them in binary vector y. Again, this is possible
since r is given as a parameter and should be thought of as: for a polynomial with parameter r, we set
constants y(1) . . . y(log n) whose values equal to the bits of the binary representation of r. The algorithm
then calls isSmallern (Jx(bits) K, Jy (bits) K).
x
, take D to be the uniform distribution over 0, . . . , m.
For example, to get a coin toss with probability m
D
Lemma 6.2 The algorithm CoinTossm,r (Jx(bits) K), where 0 ≤ x < m and r ←− [m] is drawn from [m] with
distribution D, returns a bit b, such that P r(b = 1) = CDFD (x), where CDFD (x) = P r(r < x) is the
cumulative distribution function of D, and the polynomial has degree O(log m) and size O(log m).
The proof for this lemma is given in Section 7.2.
6.2
Comparing Encrypted Values
In this subsection we show, for completeness, how to compare two encrypted values, given by their binary
representation.
Algorithm 5: isSmallern (Jx(bits) K, Jy (bits) K)
Parameters: An integer n > 0.
Input:
Two encrypted numbers JxK, JyK, such that 0 ≤ x, y < n are given in their binary form and x(i) and y(i)
Output:
Return J1K iff y < x, and J0K otherwise.
1
2
3
4
5
/* Denote x(i) and y(i) the i-th bit of x and y, respectively
sameP ref ix := (J1K, J0K, . . . , J0K)
for each i = 1, . . . , dlog ne do
JsameBit(i)K := 1 − (Jx(i)K − Jy(i)K)2
Qi
JsameP ref ix(i + 1)K := j=1 sameBit(j)
Pdlog ne
return i=1 (1 − y(i))x(i)JsameP ref ix(i)K
*/
isSmaller Overview The isSmaller algorithm gets a parameter n, and two encrypted input values JxK an
JyK, given by their binary representation, i.e. as a vector of bits, where Jx(i)K and Jy(i)K are the i-th bit of
x and y, respectively. In line 3 the algorithm computes a binary n-dimensional vector sameBit such that
sameBit(i) = 1 iff x(i) = y(i). In line 4 the algorithm computes a binary n-dimensional vector sameP ref ix
such that sameP ref ix(i) = 1 iff at least i − 1 most significant bits of x and y are equal by multiplying
sameBit(j) for j = 1, . . . , i − 1. The first element sameP ref ix(1) is set to J1K. At line 5 the algorithm
Pdlog ne
returns i=1 (1 − y(i))x(i)JsameP ref ix(i)K.
12
Lemma 6.3 The polynomial realized by Algorithm isSmallern (JxK, JyK) equals 1 if x < y and 0 otherwise,
where x and y are given as dlog ne-bit binary number, and it is of degree O(log n), and size O(log n).
The proof is given in Section 7.1.
7
Analysis
In this section we prove the correctness and efficiency of our algorithms. Unlike the algorithms that were
presented top-down, reducing one problem to another simpler problem, we give the proofs bottom up as
analyzing the efficiency of one algorithm builds upon the efficiency of the simpler algorithm.
7.1
Analysis of isSmaller
Lemma 6.3 The polynomial realized by Algorithm isSmallern (JxK, JyK) equals 1 if x < y and 0 otherwise,
where x and y are given as dlog ne-bit binary number, and it is of degree O(log n), and size O(log n).
Proof. Notice that 1 − (x(i) − y(i))2 = 1 if x(i) = y(i) and 0 otherwise. Therefore, sameP ref ix(i) = 1
if x(j) = y(j), for all j < i, effectively meaning x and y have a prefix of at least i bits. Similarly, since
x(i), y(i) ∈ {0, 1}, we have that (1 − y(i))x(i) = 1 only when 0 = y(i) < x(i) = 1.
Let y < x and let i∗ be the index of the first bit that is not equal in x and y, i.e. 0 = y(i∗ ) < x(i∗ ) = 1.
For all i < i∗ we have (1 − y(i))x(i) = 0, since either x(i) = y(i) = 0 or x(i) = y(i) = 1. For all i > i∗ we
have sameP ref ix(i) = 0. Finally, we have (1 − y(i∗ ))x(i∗ )sameP ref ix(i∗) = 1. Therefore isSmallern (x, y)
evaluates to 1.
On the other way, if isSmallern (x, y) 6= 0, then for some i∗ we have (1 − y(i∗ ))x(i∗ ) 6= 0. Since x(i), y(i) ∈
{0, 1} this means x(i∗ ) = 1 and y(i∗ ) = 0 which implies that sameP ref ix(i) = 0, for i > i∗ . Also, we have
sameP ref ix(i∗ ) 6= 0, which means that x(i) = y(i) for i < i∗ . Combining the two, we get that y < x.
The degree of the sameP ref ixn (x, y) polynomial is dominated by the degree of sameP ref ix, which is
O(log n), Similarly, the size is O(log n).
t
u
7.2
Analysis of Coin Toss
We argue that an equivalent of a coin toss that depends on an encrypted input can be achieved.
D
Lemma 6.2 The algorithm CoinTossm,r (Jx(bits) K), where 0 ≤ x < m and r ←− [m] is drawn from [m] with
distribution D, returns a bit b, such that P r(b = 1) = CDFD (x), where CDFD (x) = P r(r < x) is the
cumulative distribution function of D, and the polynomial has degree O(log m) and size O(log m).
Proof. Let F = {P0 , . . . , Pm−1 }, where Pr (x) = isSmallerm (r, x), where isSmallerm (r, x) = 1 if r < x and 0
D
otherwise. Since r ←− [m] is drawn from [m] withP
distribution D, independent to the choice of x, it follows
that P r(CoinTossm,r (JxK) = 1) = P r(r < x) = i<x P r(r = i) = CDFD (x). Following Lemma 6.3, we
have deg(CoinTossm,r ) = O(log m) and size(CoinTossm,r ) = O(log m).
t
u
The proof of the following lemma follows immediately.
Lemma 1.2 (Coin Toss) Let n be a integer parameter and D a distribution over N with a cumulative
distribution function CDF : N 7→ [0, 1]. There exists a set of polynomials F = {P1 , . . . , Pn }, such that if
P ← F is drawn randomly and x < n then P(x) = 1 with probability CDF (x), and Pi has degree O(log n)
and size O(log n), for every i = 0, . . . , n.
13
7.3
Analysis of ProbabilisticAverage
To prove the correctness of Algorithm 3 we first prove this lemma.
n
Lemma
Pn 7.1 Let x ∈ [L] be an n dimensional vector. Also m > max x(i) be a parameter. Denote µ =
1
1 x(i) and set independent Bernoulli random variables:
m
(
1 with probability x(i)
m
ai =
0 otherwise.
Then,
µε2
ai > (1 + ε)µ < exp(−
),
3
X
µε2
Pr
ai < (1 − ε)µ < exp(−
)
2
Pr
X
Pr
X
and
µε2
)
ai − µ > εµ < 2exp(−
3
Proof. Let x ∈ [L]n be an n dimensional vector. Since ai are independent Bernoulli random variables,
P
P
P
2
1
x(i) = µ and by Chernof we have: P r ( ai > (1 + ε)µ) < exp(− µε3 )
we have that E( ai ) = m
P
P
2
and P r ( ai < (1 − ε)µ) < exp(− µε2 ), from which it immediately follows that P r (| ai − µ| > εµ) <
2
2exp(− µε3 ).
t
u
n
Theorem 6.1 Let (x(1),
P. . .e, x(n)) ∈ [L] be an n dimensional vector. Also let 0 < e ∈∗ R and m be an
1
integer. Denote µ = m
xi , then Algorithm 3 describes a polynomial whose value is X , that has degree
e
O(log L) and size O(d Lm en log L) such that
P r (|X ∗ − µ| > εµ) < 2exp(−
µε2
).
3
Proof. Let x ∈ [L]n , m and e be as defined in the theorem. Assume first that max x(i)e < m. If this
e
0
assumption does not hold, set c = d Lm e, define n0 = cn, m0 = cm, x0 ∈ [Le ]n such that x0i = x(bi/cc) and
continue with x0 , m0 and n0 .
Pn e
Pn
x(i)e
1
∗
Denote µ = m
1 xi . Set X =
1 ai , where ai is a Bernoulli variable with P r(ai = 1) = m . By
2
Lemma 7.1 we have that P r (|X ∗ − µ| > εµ) < 2exp(− µε3 ), as required.
We now bound the size and depth of a polynomial that evaluates one Bernoulli random variable with
e
$
e
e
probability P r(ai = 1) = x(i)
− [m] would require
m . The naive approach CoinTossL ,ri (JxK ), with ri ←
e
computing x in binary representation, a thing that increases the degree
√ and size of the polynomial. To
make Algorithm 3 more efficient, we notice that P r(xe < r) = P r(x < e r) and consider the distribution
√
√
√
|{u≤m | d e ue=r0 }|
De,m with P r(r = r0 ) =
, that draws r (non-uniformly) from e m by setting r = e u, where
m
√
$
u←
− [m] is drawn uniformly from {0, . . . , m − 1}. Thus setting ai = CoinTossL,ri (Jx(i)K), with ri = e ui ,
e
$
where ui ←
− [m] is drawn uniformly. We get from lemma 1.2 that P r(CoinTossL,ri (Jx(i)K) = 1) = x(i)
m . Since
Le
∗
X is constructed by adding d m e outputs of CoinTossL,ri the degree of ProbabilisticAverage is O(log L)
e
and its size is O(d Lm e log L).
t
u
7.4
Analysis of KSmallestValues
p
Theorem 5.2 Given an array D = (d(1), . . . , d(n)), of n elements, where 0 < d(i) < (p), with Gaussian
distribution, D ∼ N (µ, σ 2 ) and a parameter k n, then KSmallestValues evaluates an indicator vector
14
χ = (χ(1), . . . , χ(n)), such that χ(i) = 1 if d(i) < maxκ D, where
µ
εn
k
µ4
−1
2
+µ
,
P r |κ − k| < √
+Φ
< 2exp −εO σ + 2
n
σ + µ2
2π σ
x −µ
|{i| iσ <τ }|
where Φ(τ ) =
is the cumulative distribution function of standard Gaussian distribution.Also, χ
n
can be computed by a polynomial of degree O(log p) and size O(n log p).
Proof.
P
P 2
di and µ2 = n1
di be the first two moments and σ 2 = µ2 − µ2 be the variance of D. Also,
Let µ = n1
k
let T = Q( n ), where Q is the quantile function, i.e. | {di | di < T } | = k. For the Gaussian distribution we
have Q( nk ) = µ + Φ−1 ( nk )σ, where Φ is the CDF function of the standard Gaussian distribution, and Φ−1 is
its inverse. Algorithm
2 computes X and X 2 , using Algorithm 3, as estimations to µ and µ2 , respectively.
q
Denote σ ∗ =
2
X2 − X .
02
2
Set ε0 = 2ε + (4ε2 − 6ε) µµ2 , then P r(X 2 > (1 + ε0 )µ2 ) < exp(− µ23ε ). Since, (1 + ε0 )µ2 − (1 − ε)2 µ2 =
(1 + 2ε)µ2 − (1 + 2ε)µ2 , we have:
µ4
µ2 ε02 + 6µε2
2
∗ 2
2
= exp −εO σ +
P r (σ ) > (1 + 2ε)σ < exp −
+µ
.
3
µ2
002
2
Similarly, set ε00 = ε − (ε2 + 3ε) µµ2 , then P r(X 2 < (1 − ε00 )µ2 ) < exp(− µ22ε ). Since, (1 − ε00 )µ2 − (1 +
ε)2 µ2 = (1 − ε)µ2 − (1 − ε)µ2 , we have:
2µ2 ε002 + 3µε2
µ4
∗ 2
2
2
P r (σ ) < (1 − ε)σ < exp −
= exp −εO σ +
+µ
.
6
µ2
Since
√
1 + 2ε < 1 + ε and
002
√
1 − ε < 1 − ε we get that P r(|σ ∗ − σ| < (1 + ε)σ) < exp(− µ2 ε
02
2
+6µε2
)
3
+
exp(− 2µ2 ε 6+3µε ), with ε0 , ε00 as defined above. We therefore have κ−k
= CDF (T ∗ ) − CDF (T ). For
n
∗
−µ
Gaussian distribution we have CDF (T ∗ ) − CDF (T) = Φ(T σ−µ ) − Φ( T −µ
) < Φ( (1+ε)T
) − Φ( T −µ
σ
σ
σ ). The
inequality being with probability at least 1 − exp −εO σ 2 +
Φ(a + b) < Φ(a) +
√b
2π
µ4
σ 2 +µ2
+µ
. Since Φ0 (x) <
√1
2π
we have
and therefore
Φ
(1 + ε)T − µ
σ
−Φ
T −µ
σ
ε
<√
2π
µ
−1 k
+Φ ( ) .
σ
n
T −µ
k−κ
∗
n = CDF (T ) − CDF (T ), and for Gaussian distribution weget that
Φ( σ 4 ) −
(1−ε)T −µ
Φ( T −µ
). The inequality being with probability at least 1−exp −εO σ 2 + σ2µ+µ2 +
σ )−Φ(
σ
< √12π we have
Similarly, we have that
Φ( T
∗
−µ
σ )
0
>
Since Φ (x)
Φ
T −µ
σ
−Φ
(1 − ε)T − µ
σ
ε
<√
2π
µ
−1 k
+Φ ( ) .
σ
n
Putting it all together, we get that if we set T ∗ = µ∗ + σ ∗ Φ−1 ( nk ), then for κ = |{d(i) | d(i) < T ∗ }| =
we have:
∗
Φ( T σ−µ )n
εn
P r |κ − k| < √
2π
µ
+ Φ−1
σ
k
µ4
2
< 2exp −εO σ + 2
+µ
.
n
σ + µ2
t
u
15
µ .
7.4.1
Extension to other distributions
Algorithm 2 and Theorem 5.2 assume the distribution of X is Gaussian, however, this can be extended to a
large set of distributions. To see what is needed from a distribution let us review where the assumption of
the distribution of X was used.
CDF with bounded derivative. To bound the number of elements in the output of Algorithm 2, we
need some bound on the derivative of the quantile function, |Q0 (x)| < c, for some c ∈ R. More specifically, we
are interested in such a bound in the segment nk − δ < x < nk + δ, where δ depends on ε and the parameters
of the distribution. Informally, this bound means that the error in computing the first two moments of
X does not change by much the number of elements in {di | di < T ∗ } While such a bound exists for all
distributions, the algorithm is impractical for large values of c. For example, for a Bernoulli distribution
with P r(x = 1) = P r(x = 0) = 1/2, we have CDF (0) = 1/2 and CDF (1) = 1, which means the algorithm
can either return about half of X or all of X. Algorithm 1 assumes k n. For Gaussian distribution we
have Φ0 (x) < √12π , and for nk 21 we even have Φ0 ( nk + δ) √12π for sufficiently small values of δ.
Distribution parameters easily computed from moments. The second time the algorithm assumes
the distribution is Gaussian N(µ, σ 2 ) is when computing a threshold T using the quantile function T =
Q(k/n). For general Gaussian distribution we have Q(x) = µ + Φ−1 (x)σ where Φ−1 (x) is the inverse of
the standard CDF for Gaussian distribution. To extend to another distribution one needs to show how to
compute the quantile function for that distribution.
7.5
Analysis of KNearestNeighbors
√
p
Theorem 5.1 Given n points s(1), . . . , s(n) ∈ [ d ]d , an n-tuple of auxiliary data aux, such that aux(i) is
√
p
an α-tuple of bits associated with s(i) and a query point q ∈ [ d ]d . Denote by D = {d(1), . . . , d(n)} the set
of L distances, d(i) = ks(i) − qkL1 . For any 0 ≤ k ≤ n, Algorithm 1 outputs a compact representation of
o
n 1
aux(i) | d(i) ∈ minO(k) D of size O(k) of the auxiliary data associated with the O(k) nearest neighbors of
√
q. The polynomials that compute the sketches have degree O(log p) and size O( p log p + nd log p + αn).
Proof. The correctness of Algorithm 1 follows by combining Theorem 5.2 with the compacting method
described in [1]. More specifically, after computing a set of distances D = {d(1), . . . , d(n)}, Theorem 5.2
states that an indicator vector χ of the smallest κ distances can be computed, where κ ≈ k with high
probability (see Theorem 5.2 for exact details). Using the result of [1], a compact vector χ0 ∈ [p]O(κ) can be
created, such that χ can be reconstructed from χ0 , since it is κ-sparse.
Since Theorem 5.2 states that P r(|κ − k| < εc1 n) < 2exp(−εc2 ), where c1 and c2 are constants that
depend on the distribution parameters of D, we get that χ can be reconstructed from χ0 with that probability.
Since computing an L1 -distance function involves d calls to isSmaller and d multiplications, computing
all the distances can be done by a polynomial of degree O(log p) and size O(nd log p). As argued in [1],
since the sketch matrix, M , is a global constant, the multiplication M χ can be done without ciphertext
multiplications at all.
Putting it all together, we get that Algorithm 1 can be realized by a polynomial of degree O(log p) size
√
O( p log p + nd log p + αn).
t
u
Boosting probability To boost the success probability, KNearestNeighbors can be computed b times
independently, thus boosting the success probability. KNearestNeighbors can fail in two ways and the user
can easily detect both failures. Denote c1 to be the constant as defined above. One type of failure is
when KNearestNeighbors returns κ < (1 − εc1 n)k sites, in which case the sketching algorithm decodes the
κ sites correctly. Another type of failure is when KNearestNeighbors returns κ > (1 + εc1 n)k sites, in
which case the sketching algorithm, designed to decode at most (1 + ε)k sites, fails to decode the sites
16
correctly. Of b independent computations of KNearestNeighbors, the probability that all of them failed is
P r(b failures of KNearestNeighbors) = (P r(KNearestNeighbors failed))b .
8
8.1
The System
k-Nearest Sites On A Map
We implemented the algorithms in this paper into a system that finds the nearest hotels to a query location
in Boston. The system was run on MIT’s OpenStack infrastructure. It maintained a database of 580 hotels
in Boston area (given in clear-text). Prior to sending a query to the system a client needs to generate a
pair (P k, Sk) of public key and secret key. To query the system, the client sends an encrypted location JqK
and the public key used for encrypting it. For multiple queries, the client can use the same (P k, Sk) pair
and the public key can be uploaded only once to the system. The encryption of q is done by the client, and
the encrypted location can be sent from a browser running on a smart phone or from a quadcopter. The
system then runs our secure search algorithm on the cloud using the client’s public key to encrypt constants
as needed by the algorithm, and returns an indicator vector of the k = 13 nearest hotels to q. I.e., we set
the auxiliary data to be a single set bit for all hotels. Changing the system to return the name or location
13
taken as the error parameter. The list
of the hosts is easy by changing the auxiliary data. We set ε = 580
(and the query location) can be decrypted only with the private key available only to the user. The server
can update the database of hotels at any time since it is kept in clear-text, for example, by scraping the
Internet or negotiating with the hotels themselves.
8.1.1
Hardware
Our system is generic but in this section we evaluate it on MIT’s OpenStack cloud infrastructure. We used
one of the standard suggested servers, with 12 2.2 GHz Intel Xeon E5-2630 core and 28 GigaByte of RAM.
These cores are common in standard laptops and servers.
8.1.2
Open Software and Security
The algorithms were implemented in C++. HELib library [34] was used for the FHE scheme implementation,
including its usage of SIMD (Single Instruction Multiple Data) technique. The source of our system is open
under the GNU v3 license and can be found in [34]. Our system and all the experiments below use a security
key of 80 bits. This settings can be easily changed by the client.
8.1.3
Experimental Results
In this section we describe the experiments we ran and their results. We ran experiments on a system
implementing Algorithm 1.
Data We tested our system on a list of 580 hotels in the Boston area, given by their GPS coordinates.
As expected the distribution of hotels around Boston is not even. There are many more hotels around
down-town Boston, for example. We drew a grid on the map around Boston and rounded each hotel to the
nearest grid point. We repeated our tests with grid of various sizes: 100 × 100, 80 × 80 and 60 × 60.
The Experiment We ran Algorithm 1, on 580 hotel locations in Boston area, rounding hotel locations
to be on a grid of L × L and taking p = 2L. We drew a random query point, q on the grid and ran
KNearestNeighborsp,n,k,ε,R,d,s,α,aux (q).
For the experiments that had more than 580 points we duplicated the Boston area hotels as many times
as needed. Recall that since the server operates on encrypted data, the running time is oblivious to the
actual coordinates of the query point q or the hotels’ coordinates si , since the server performs the same
operations regardless to the input.
17
Results Our experimental results are summarized in Figure 1. The experiments measured the total time
to: (i) compute the distances from the query point q to each hotel, di = |q − si |; (ii) compute statistical
functions (µ and σ) on di , and (iii) create an indicator vector χ by comparing each di to a threshold computed
from the statistical functions. Each of these steps is “embarrassingly parallel” [36] which means the running
time on each core decreases linearly with the number of cores.
What dominates the slopes of the graphs? Our analysis in Section 7.5 suggests that the time to
compute the k-nearest neighbors is
L log L + n log L
T = O MUL ·
CORES · SIM D
where
• L × L is the grid size to which we rounded the locations of the hotels
• CORES is the number of computation machines (practically, number of core processors that work in
parallel)
• SIM D (Single Instruction Multiple Data) is the amount of integers that are packed into a single
ciphertext. This SIM D factor is a function of the ring size p and the degree of the evaluated polynomial
O(log L); in HELib, this parameter can be read by calling EncryptedArray::size(), see [26].
• M U L is the times for computing a single multiplication operation.
We had CORES = 10 in all experiments, and the other parameters did not change once the grid size was
set. Our formula, therefore, predicts that the graphs should be linear, as they indeed are. The parameters L
and M U L did not change significantly for different grid sizes and the parameter whose value dominated the
slope of the (linear) graph was SIM D = 1288, 1520 and 980, for grid sizes 60 × 60, 80 × 80 and 100 × 100,
respectively. We plotted in dotted lines the linear graph as was predicted by our formula with the various
SIM D values.
Figure 1: Server’s running time (y-axis) on a single machine on MIT’s OpenStack cloud infrastructure, for
different database sizes (x-axis) of KNearestNeighbors (Algorithm 1) on encrypted query. Each colored curve
represents a different grid size. The dotted lines are the graphs that were expected by our formula.
8.2
Computing Statistical Functions
Since we believe our Algorithm 3 for computing
provide experimental results dedicated to this.
1
m
P
18
xei is a useful tool in other applications as well, we
8.2.1
System Overview
For this simple system, we again assumed the user has a pair (P k, Sk) of public and secret key, such that a
message encrypted with P k can be decrypted only with Sk. The input for this system were a list of values
x1 , . . . , xn encrypted with P k by the user. We also assumed
Pn P k is known to the server. The output of the
system was the encrypted value of fe (x1 , . . . , xn ) = n1 i xei which can be decrypted only with the secret
key Sk. Although this alone is not an interesting functionality for a system, we believe that many systems
include a similar computation as a sub system within them. We ran this system as well on MIT’s OpenStack
infrastructure.
P
P 2
xi and n1
xi , i.e. e = 1 (the average) and e = 2 (the
The Experiment We computed the sums n1
average of the squares), the first two moments. We tested with various values of 1, 000 ≤ n ≤ 100, 000, and
ran experiments with xi ∈ [60], xi ∈ [80] and xi ∈ [100]. The server is oblivious to the values of xi since
they are encrypted, and the time of computation is not influenced by the values of xi .
Results Our experimental results are summarized in Figure 2. In Fig. 2Pwe show that indeed the formula
n e
1
correctly predicts the experimental results. Assume we are computing m
1 xi for some values of n, m and
e, where xi < L for some value of L and 1 ≤ i ≤ n, then the overall running time is:
n · log L · M U L
T =O
,
CORES · SIM D
where CORES, SIM D and M U L are as explained in section 8.1.3.
Figure 2: Server’s running time (y-axis)
P on a 1single
P 2 core on MIT’s OpenStack cloud infrastructure, for
computing the first two moments ( n1
xi and n
xi ) (Algorithm 3) of n (x-axis) encrypted values. Solid
lines are for the time to compute the first moment; dashed lines are for the time to compute the second
moment. The dotted lines are the graphs that were expected by our formula. For each moment, the values
were taken from three sets: {0, . . . , 60}, {0, . . . , 80} and {0, . . . , 100}, each represented with a different color.
What dominates the slope of the graph? Although all graphs are linear as expected from our theoretic
analysis, it is interesting to note how their slopes differ. From the formula we gave above, the slope of each
log L·M U L
graph should be proportional to CORES·SIM
D . In our experiments we had CORES = 1 and negligible
differences in log L. Also the differences we measured in the values of M U L were negligible. The values of
SIM D were chosen automatically by HELib upon key generation and varied greatly between experiments
from 192 to 660. To compare our measured results to theory we plotted with dotted lines the linear functions
log L·M U L
1
predicted by our formula: f (x) = xc SIM
D , where c = CORES and SIM D is the SIMD factor that was
set in each experiment. It can be seen that the experiments match our expected formula.
19
References
[1] A. Akavia, D. Feldman, and H. Shaul. Secure database queries on the cloud: Homomorphic encryption
meets coresets, 2017. Submitted.
[2] A. Akavia, D. Feldman, and H. Shaul. Secure search on the cloud via coresets and sketches. arXiv
preprint arXiv:1708.05811, 2017.
[3] A. Ben-Dor, L. Bruhn, N. Friedman, I. Nachman, M. Schummer, and Z. Yakhini. Tissue classification
with gene expression profiles. Journal of Computational Biology, 7(3-4):559–583, July 2004.
[4] J. Bos, K. Lauter, and M. Naehrig. Private predictive analysis on encrypted medical data. 50, 05 2014.
[5] R. Bost, R. A. Popa, S. Tu, and S. Goldwasser. Machine learning classification over encrypted data. In
22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California,
USA, February 8-11, 2015, 2015.
[6] Z. Brakerski, C. Gentry, and V. Vaikuntanathan. (leveled) fully homomorphic encryption without
bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference,
ITCS ’12, pages 309–325, New York, NY, USA, 2012. ACM.
[7] Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from (standard) lwe.
SIAM Journal on Computing, 43(2):831–871, 2014.
[8] V. Braverman, G. Frahling, H. Lang, C. Sohler, and L. F. Yang. Clustering high dimensional dynamic
data streams. arXiv preprint arXiv:1706.03887, 2017.
[9] V. Braverman, A. Meyerson, R. Ostrovsky, A. Roytman, M. Shindler, and B. Tagiku. Streaming kmeans on well-clusterable data. In Proceedings of the twenty-second annual ACM-SIAM symposium on
Discrete Algorithms, pages 26–40. Society for Industrial and Applied Mathematics, 2011.
[10] G. S. Çetin, W. Dai, Y. Doröz, W. J. Martin, and B. Sunar. Blind web search: How far are we from a
privacy preserving search engine? IACR Cryptology ePrint Archive, 2016:801, 2016.
[11] G. S. Çetin, Y. Doröz, B. Sunar, and E. Savas. Depth optimized efficient homomorphic sorting. In
Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings, pages 61–80,
2015.
[12] G. S. Çetin, Y. Doröz, B. Sunar, and E. Savas. Low depth circuits for efficient homomorphic sorting.
IACR Cryptology ePrint Archive, 2015:274, 2015.
[13] A. Chatterjee, M. Kaushal, and I. Sengupta. Accelerating Sorting of Fully Homomorphic Encrypted
Data, pages 262–273. Springer International Publishing, Cham, 2013.
[14] A. Chatterjee and I. Sengupta. Searching and sorting of fully homomorphic encrypted data on cloud.
IACR Cryptology ePrint Archive, 2015:981, 2015.
[15] K. L. Clarkson. Coresets, sparse greedy approximation, and the frank-wolfe algorithm. ACM Transactions on Algorithms (TALG), 6(4):63, 2010.
[16] A. Czumaj, C. Lammersen, M. Monemizadeh, and C. Sohler. (1+ ε)-approximation for facility location in data streams. In Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete
algorithms, pages 1710–1728. Society for Industrial and Applied Mathematics, 2013.
[17] Y. Doröz, B. Sunar, and G. Hammouri. Bandwidth efficient pir from ntru. In Financial Cryptography
Workshops, pages 195–207, 2014.
20
[18] W. Du, S. Chen, and Y. S. Han. Privacy-preserving multivariate statistical analysis: Linear regression
and classification. In In Proceedings of the 4th SIAM International Conference on Data Mining, pages
222–233, 2004.
[19] S. Dudoit, J. Fridlyand, and T. P. Speed. Comparison of discrimination methods for the classification of
tumors using gene expression data. JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION,
97(457):77–87, 2002.
[20] Y. Gahi, M. Guennoun, and K. El-Khatib. A secure database system using homomorphic encryption
schemes. arXiv preprint arXiv:1512.03498, 2015.
[21] C. Gentry. A Fully Homomorphic Encryption Scheme. PhD thesis, Stanford University, Stanford, CA,
USA, 2009. AAI3382729.
[22] C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-first Annual
ACM Symposium on Theory of Computing, STOC ’09, pages 169–178, New York, NY, USA, 2009.
ACM.
[23] O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press,
New York, NY, USA, 2004.
[24] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the
Nineteenth Annual ACM Symposium on Theory of Computing, STOC ’87, pages 218–229, New York,
NY, USA, 1987. ACM.
[25] S. Halevi. Helib - an implementation of homomorphic encryption. https://github.com/shaih/HElib/,
2013.
[26] S. Halevi and V. Shoup. Algorithms in helib. In 34rd Annual International Cryptology Conference,
CRYPTO 2014. Springer Verlag, 2014.
[27] J. Huggins, T. Campbell, and T. Broderick. Coresets for scalable bayesian logistic regression. In
Advances in Neural Information Processing Systems, pages 4080–4088, 2016.
[28] P. Indyk, H. Q. Ngo, and A. Rudra. Efficiently decodable non-adaptive group testing. In Proceedings of
the Twenty-first Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’10, pages 1126–1142,
Philadelphia, PA, USA, 2010. Society for Industrial and Applied Mathematics.
[29] Y. Lindell and B. Pinkas. Privacy preserving data mining. In Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’00, pages 36–54, London, UK,
UK, 2000. Springer-Verlag.
[30] M. Naehrig, K. Lauter, and V. Vaikuntanathan. Can homomorphic encryption be practical? In
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW ’11, pages
113–124, New York, NY, USA, 2011. ACM.
[31] M. S. Paterson and L. J. Stockmeyer. On the number of nonscalar multiplications necessary to evaluate
polynomials. SIAM Journal on Computing, 1973.
[32] J. M. Phillips. Coresets and sketches. arXiv preprint arXiv:1601.00617, 2016.
[33] S. S. Roy, F. Vercauteren, J. Vliegen, and I. Verbauwhede. Hardware assisted fully homomorphic
function evaluation and encrypted search. IEEE Transactions on Computers, 2017.
[34] H. Shaul. LiPHE: Library for practical homomorphic encryption., 2017.
[35] J. Vaidya, M. Kantarcöğlu, and C. Clifton. Privacy-preserving naı̈ve bayes classification. The VLDB
Journal, 17(4):879–898, July 2008.
21
[36] B. Wilkinson and M. Allen. Parallel programming: techniques and applications using networked workstations and parallel computers. Prentice-Hall, 1999.
[37] D. P. Woodruff et al. Sketching as a tool for numerical linear algebra. Foundations and Trends R in
Theoretical Computer Science, 10(1–2):1–157, 2014.
[38] A. C.-C. Yao. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium
on Foundations of Computer Science, SFCS ’86, pages 162–167, Washington, DC, USA, 1986. IEEE
Computer Society.
22
| 8cs.DS
|
arXiv:1711.01085v1 [cs.DS] 3 Nov 2017
k-server via multiscale entropic regularization
Sebastien Bubeck
Michael B. Cohen
James R. Lee
Microsoft Research
MIT
University of Washington
Yin Tat Lee
Aleksander Madry
˛
University of Washington
MIT
Abstract
We present an O((log k)2 )-competitive randomized algorithm for the k-server problem on
hierarchically separated trees (HSTs). This is the first o(k)-competitive randomized algorithm
for which the competitive ratio is independent of the size of the underlying HST. Our algorithm
is designed in the framework of online mirror descent where the mirror map is a multiscale
entropy. When combined with Bartal’s static HST embedding reduction, this leads to an
O((log k)2 log n)-competitive algorithm on any n-point metric space. We give a new dynamic
HST embedding that yields an O((log k)3 log ∆)-competitive algorithm on any metric space
where the ratio of the largest to smallest non-zero distance is at most ∆.
Contents
1 Introduction
1.1 Mirror descent and entropic regularization . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
3
3
2 Traversing a convex body online
2.1 Evolution of the Bregman divergence . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Application: Fractional weighted paging . . . . . . . . . . . . . . . . . . . . . . . . .
4
5
6
3
k-server on trees
3.1 k + ε fractional servers . . . .
3.2 The assignment polytope . . .
3.3 Dynamics . . . . . . . . . . .
3.4 The weighted depth potential
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
8
. 9
. 10
. 11
. 14
4 Dynamic HST embeddings
4.1 Hierarchical partitions and canonical HSTs . . . . . . . . . . . . . . . . . . . . . . . .
4.2 The HST reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.3 A dynamic embedding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19
20
21
21
5 Mirror descent
5.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2 Existence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3 Uniqueness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24
24
25
26
1
1 Introduction
Perhaps the most widely-studied problem in the field of online algorithms and competitive analysis
is the k-server problem, introduced in [MMS90] to generalize and abstract a number of related
problems arising in the study of paging and caching. The problem has been the object of intensive
study since its inception, motivated largely by two long-standing conjectures about the competitive
ratios that can be achieved by deterministic and randomized algorithms, respectively.
We recall the problem briefly; see Section 1.2 for a formal definition of the model. Fix a metric
space (X, d) and k > 1, as well as an initial placement ρ 0 ∈ X k of k servers in X. An online k-server
algorithm operates as follows. At each time step, a request rt ∈ X comes online, and the algorithm
must respond to this request by moving one of the servers to rt (unless there is already a server
there). The cost of the algorithm is the total distance moved by all the servers over the course of
the request sequence. An offline algorithm operates in the same manner, but is allowed access to
the entire request sequence in advance. An online algorithm has competitive ratio α if, for every
request sequence, its movement cost per unit time step is within an α factor of that achieved by the
optimal offline algorithm.
Randomization. The authors of [MMS90] stated the k-server conjecture: On any metric space with
at least k +1 points, the best competitive ratio achieved by deterministic online algorithms is precisely
k. They showed that the ratio is always at least k. While the conjecture is still open in general,
Koutsoupias and Papadimitriou resolved it within a factor of two: The work function algorithm
obtains a competitive ratio of 2k − 1 on any metric space [KP95]. We refer the reader to the book
[BE98] for further background on online algorithms and the k-server problem.
In the context of the k-paging problem, which is the special case of k-server on a metric space
with all distances in the set {0, 1}, it was observed that randomness can help an online algorithm
dramatically: It is known that the competitive ratio for k-paging is precisely the kth harmonic
number Hk for every k > 1 [FKL+ 91, MS91].
Hierarchically separated trees. There is another class of metric spaces on which one can prove
lower bounds on the competitive ratio even for randomized algorithms. Consider a finite, rooted
tree T (V, E) with vertex weights w : V → R+ that are non-increasing along every root-leaf path.
Let L ⊆ V denote the set of leaves and define the metric
dw (ℓ, ℓ ′) : w lca(ℓ,ℓ′)
∀ℓ, ℓ ′ ∈ L .
In this case, dw is an ultrametric (in fact, all finite ultrametrics are of this form). If w v 6 w u /τ
whenever v is a child of u, then one says that (T , w) is a τ-hierarchically separated tree (τ-HST) and
the metric space (L, dw ) is referred to as a τ-HST metric. By showing lower bounds on every HST
and additionally demonstrating that all sufficiently large metric spaces contain subsets that are
close to HSTs, the authors of [BBM06] proved a lower bound on the competitive ratio for every
metric space. Using the metric Ramsey bounds
from
[BLMN05], it holds that the competitive ratio
for randomized algorithms is at least Ω
log k
log log k
on every metric space with more than k points.
A lack of further lower bounds motivates the folklore “Randomized k-server conjecture” (see,
e.g., [BBK99]) that the randomized competitive ratio is (log k)O(1) on every metric space, or even
O(log k), matching the lower bound for k-paging. One can also consult the survey [Kou09] (in
particular, Conjecture 2 and the surrounding discussion).
Since the seminal work of Bartal on probabilistic embeddings of finite metric spaces into HSTs
[Bar96, Bar98], it has been understood that obtaining upper bounds on the competitive ratio for
HSTs is of central importance. Indeed, the competitive ratio for n-point metric spaces is at most
an O(log n) factor larger than the competitive ratio for n-point HST metrics. This bound follows
from Bartal’s approach combined with the optimal distortion estimate of [FRT04].
2
The authors of [CMP08] give an O(log D)-competitive randomized algorithm on binary 2HSTs with combinatorial depth at most D, and in [BBMN15], a major breakthrough was achieved
when the authors exhibited an (log n)O(1) -competitive algorithm for general n-vertex HSTs. In the
present work, we obtain a competitive ratio independent of the size of the underlying HST, thereby
verifying a long-held belief.
Theorem 1.1. For every k > 2, there is an O((log k)2 )-competitive randomized algorithm for the k-server
problem on any HST.
As mentioned previously, this yields an O((log k)2 log n)-competitive randomized algorithm for
every n-point metric space, via probabilistic embeddings of finite metric spaces into distributions
over HSTs. The embedding underlying this reduction is oblivious to the request sequence. While
this is a very convenient feature for the analysis, oblivious embeddings cannot avoid losing an
Ω(log n) factor in the competitive ratio. We show that in certain cases, this can be circumvented
via the use of dynamic HST embeddings where the embedding is allowed to depend on the request
sequence.
Theorem 1.2. For every k > 2 and every finite metric space (X, d), there is an O (log k)3 log(1 + A X ) competitive randomized algorithm for the k-server problem on (X, d), where
AX :
max x,y∈X d(x, y)
min x , y∈X d(x, y)
.
1.1 Mirror descent and entropic regularization
Our algorithm is most naturally stated in the framework of continuous-time mirror descent. This
framework was originally introduced for convex optimization in [NY83] (see also [Bub15]), and
recently it has played a key role in online decision making; see, e.g., [Haz16] for the online
learning setting, and [ABBS14, BCN14] for applications to metrical task systems. Typically an
entropy functional is used as a mirror map, and a key contribution of our work is to propose an
appropriate multiscale entropy functional.
We establish some properties of a general setup in Section 2 and, as a warmup application,
present in Section 2.2 an O(log k)-competitive algorithm for the (fractional) weighted paging problem that is closely related to the algorithm of [BBN12]. This already exhibits a couple key ideas in
a simplified setting, including the natural use of the Bregman divergence as a potential function,
and the utility of using k + ε servers for some ε < 1. In Section 3, we begin transferring these
ideas to the setting of the k-server problem on trees. Notably, the polytope underlying our state
representation is the one derived from the fractional allocation problem as employed in [CMP08]
and [BBMN15]. In Section 3.4.1, we introduce the crucial idea of an auxilliary potential function
that tracks the weighted depth of the underlying fractional server measure, and in Section 3.4.3 we
show how using a time-varying weight can be leveraged to obtain an O((log k)2 ) competitive ratio.
1.2 Preliminaries
We use the notations R+ : [0, ∞) and Z+ Z ∩ R+ . If X and Y are two metric spaces and
F : X → Y is Lipschitz, we use kF klip to denote the Lipschitz constant of F. Consider a bounded,
1
(µ, ν) to
complete metric space (X, d) and two Borel probability measures µ and ν on X. We use WX
1
denote the L -transportation distance between µ and ν (sometimes called the Earthmover metric):
WX1 (µ, ν) : inf
[d(Y, Y ′)] ,
where the infimum is over all jointly distributed random variables (Y, Y ′) such that Y has marginal
µ and Y ′ has marginal ν. The definition is extended in the natural way to any two Borel measures
satisfying µ(X) ν(X).
3
Online algorithms and the competitive ratio. Let (X, d) be a metric space and fix k > 1. We now
describe the k-server problem more formally. The input is a sequence hσt ∈ X : t > 1i of requests.
At every time t, an online algorithm maintains a state ρ t ∈ X k which can be thought of as the
location of k servers in the space X. At time t, the algorithm is required to have a server at the
requested site rt ∈ X. In other words, a feasible state ρ t is one that services rt :
ρt
dX k (x1 , . . . , x k ), (y1 , . . . , yk ) :
k
Õ
rt ∈
1
, . . . , ρt
k
.
Formally, an online algorithm is a sequence of mappings ρ hρ 1 , ρ 2 , . . . , i where, for every t > 1,
ρ t : X t → X k maps a request sequence hr1 , . . . , rt i to a k-server state that services rt . In general,
ρ 0 ∈ X k will denote some initial state of the algorithm.
The cost of the algorithm ρ in servicing r hrt : t > 1i is defined as the sum of the movements of
all the servers:
Õ
costρ (r; k) :
dX k ρ t (r1 , . . . , rt ), ρ t−1 (r1 , . . . , rt−1 ) ,
t >1
where
dX (x i , yi )
∀ x 1 , . . . , x k , y1 , . . . , y k ∈ X ,
i1
and ρ 0 ∈ X k is some fixed initial configuration.
For a given request sequence r hrt : t > 1i, denote the cost of the offline optimum by
cost∗ (r; k) :
inf
hρ 1 ,ρ 2 ,...i
Õ
dX k ρ t , ρ t−1 ,
t >1
where the infimum is over all sequences hρ 1 , ρ 2 , . . .i such that ρ t services rt for each t > 1.
A randomized online algorithm ρ is a random online algorithm that is feasible with probability
one. Such an algorithm is said to be α-competitive if for every ρ 0 ∈ X k , there is a constant c > 0
such that for all r:
costρ (r; k) 6 α · cost∗ (r; k) + c .
2 Traversing a convex body online
Suppose that K ⊆ Rn is a closed convex set and f : R+ × K → Rn is a time-varying vector field
defined on K. It is very natural to consider the projected dynamical system:
x ′(t) ΠK x(t), f (t, x(t))
x(0) x0 ,
where
ΠK (x, v) : lim
ε→0
PK (x + εv) − x
,
ε
and
PK (x) : argmin {kx − z k2 : z ∈ K } .
One can interpret this as trying to “flow” along the vector field in direction f (t, x(t)) while
being confined to remain in the convex body K. But since projection is a discontinuous operation
(imagine hitting the boundary of a polytope, for instance), the classical theory of existence and
uniqueness of ODEs no longer applies. Fortunately, there is now a well-established theory for
projected dynamical systems.
4
Let us denote the normal cone to K at x by
NK (x) : p ∈ Rn : hp, y − xi 6 0 for all y ∈ K .
If K is a polyhedron, then the normal cone to K at x is the cone spanned by the normals of the tight
constraints at x.
Lemma 2.1. Given any matrix A ∈ Rm×n and b ∈ Rm , consider the polyhedron K : {x ∈ Rn : Ax 6 b}.
For any x ∈ K, it holds that
NK (x) AT y : y > 0 and y T (b − Ax) 0 .
For our applications, we will want to consider a projected dynamical system with respect to
a non-Euclidean geometry on K. Let Φ : K → Rn be a strongly convex function. Then ∇2 Φ is
positive definite and can be thought of as a Riemannian metric on K. One can describe the possible
dynamics in the geometry induced by Φ by the differential inclusion
∇2 Φ(x(t))x ′(t) ∈ f (t, x(t)) − NK (x(t))
(2.1)
x(0) x0
x(t) ∈ K
∀t > 0 .
Note that the right-hand side of (2.1) is a set of vectors, and a solution x(t) is one that satisfies
the inclusion. It turns out that, under suitable assumptions, an absolutely continuous solution
exists, and under stronger assumptions, the solution is unique. The following theorem is proved
in Section 5.
Theorem 2.2. Consider a compact convex set K ⊆ Rn , a strongly convex function Φ : K → R, and a
continuous function f : [0, ∞) × K → Rn . Suppose furthermore that ∇2 Φ(x)−1 is continuous. Then for
any x0 ∈ K, there is an absolutely continuous solution x : [0, ∞) → K satisfying
x ′(t) ∈ ∇2 Φ(x(t))−1 f (t, x(t)) − NK (x(t)) ,
x(0) x0 .
If we further assume that ∇2 Φ(x) is Lipschitz and f is locally Lipschitz, then the solution is unique.
2.1 Evolution of the Bregman divergence
Recall that the Bregman divergence associated to Φ : K → R is given by
DΦ (y; x) : Φ(y) − Φ(x) − h∇Φ(x), y − xi .
We will use DΦ as a potential function to track the “discrepancy” between our algorithm and the
optimal offline algorithm. In fact, it will be slightly easier to work with the function
D̂Φ (y; x) : −Φ(x) − h∇Φ(x), y − xi .
Suppose now that x(t) is an absolutely continuous solution to the differential inclusion (2.1)
and write
∇2 Φ(x(t))∂t x(t) f (t, x(t)) − λ(t)
with λ(t) ∈ NK (x(t)). One concludes immediately that for y ∈ K:
∂t D̂Φ (y; x(t)) h∇2 Φ(x(t))∂t x(t), x(t) − yi
f (t, x(t)) − λ(t), x(t) − y
6 f (t, x(t)) , x(t) − y ,
where in the last inequality we have used that hλ(t), y − x(t)i 6 0 since λ(t) ∈ NK (x(t)).
5
(2.2)
2.2 Application: Fractional weighted paging
Fix k > 1. Consider the fractional weighted paging problem on pages in [n] with a cache of size k
and positive weights {w i > 0 : i ∈ [n]}. For z ∈ Rn , define the weighted ℓ 1 norm:
kz kℓ1(w)
:
n
Õ
w i |z i | ,
i1
and the dual norm:
kz kℓ∞ (1/w)
|z i |
: max
: i ∈ [n] .
wi
Note that if z(t) ∈ Rn is an online algorithm for t ∈ [0, T], then the movement cost is precisely
∫
T
k∂t z(t)kℓ1 (w) dt .
0
Moreover, up to a factor of two, we can charge our algorithm only for the cost of moving fractional
mass into a node, i.e.,
∫
T
0
k(∂t z(t))+ k ℓ1 (w) dt ,
(2.3)
where for z ∈ Rn , we denote (z)+ : (max(0, z1 ), . . . , max(0, z n )).
2.2.1
Entropy-regularized dynamics
Define the fractional k-antipaging polytope
P :
(
x ∈ [0, 1]n :
n
Õ
)
xi n − k .
i1
Here, we think of 1 − x i as the fractional amount of page i that sits in the cache (hence x i is the
amount of fractional “antipage”). Define also the entropic regularizer
Φ(x) :
n
Õ
w i x i log x i .
i1
Suppose the current state of the cache is described by a point x ∈ P such that x i (0) > 0 for all
i ∈ [n]. When a request r ∈ {1, . . . , n} is received, we need to decrease x r to 0. To this end, we use
the (constant) control function:
f (t, x(t)) : −e r
∀t > 0 .
Now the intended trajectory is given by the differential inclusion:
∇2 Φ(x(t))∂t x(t) ∈ −e r − NP (x(t)) .
Let us analyze the dynamics which are described by
∇2 Φ(x(t))∂t x(t) −e r − λ(t) ,
(2.4)
where λ(t) ∈ NP (x(t)). From Lemma 2.1, it is an exercise to compute that
λ(t)
n
Õ
λ i (t)e i − µ(t)1
i1
6
(2.5)
for some {λ i (t) > 0} such that λ i (t) > 0 ⇒ x i (t) < 1.
Here, the {λ i } functions are the Lagrangian multipliers for the constraints {x i 6 1} of P, and
Í
µ is the multiplier for ni1 x i n − k. The fact that x i (t) > 0 for t > 0 is implicitly enforced
by Φ (assuming some boundedness on the control f ). Since k∇Φ(x)k2 → ∞ as x approaches the
boundary of the positive orthant, Φ acts as a barrier preventing the evolution from leaving R+ .
We do not stress this point formally at the moment since we will soon need to maintain a more
restrictive condition.
Let x̂ ∈ {0, 1} n ∩ P denote an integral antipaging point with x̂ r 0 (i.e., a state which has
satisfied the request). Then (2.2) immediately yields
∂t D̂Φ (x̂; x(t)) 6 he r , x̂ − x(t)i −x r (t) .
(2.6)
Moreover, from (2.4) and (2.5), one easily calculates:
∂t x i (t)
where
x i (t)
−e r (i) − λ i (t) + µ(t) ,
wi
λ i (t)
Using ∂t
Ín
i1
x i (t) 0 yields
(
(2.7)
0
x i (t) < 1
.
µ(t) otherwise.
µ(t) Í
x r (t)/w r
.
i:x i (t)<1 x i (t)/w i
(2.8)
In particular, if x r (t) < 1 then µ(t) 6 1, hence from (2.7), the instantaneous movement cost (recall
(2.3)) is bounded by
w r |∂t x r (t)| 6 x r (t) .
Thus the potential change (2.6) compensates for the movement cost.
Now we have to address convergence, and here we run into a problem: D̂Φ (x̂; x(t)) could be
infinite! Therefore (2.6) does not show that x r (t) → 0 as t → ∞.
2.2.2
Moving in the interior
Our solution to this problem will be to shift the variables away from the boundary of R+ . For
δ > 0, define
(
)
Pδ : P ∩ [δ, 1]n
x ∈ [δ, 1]n :
n
Õ
xi n − k
.
i1
Clearly we cannot remain in this polytope and still service a request r by moving to a point with
x r 0. Instead, we will allow our algorithm to satisfy the weaker constraint x r δ, and then
afterward show that any such algorithm can be transformed—in an online manner—to a valid
fractional paging algorithm, as long as δ is chosen small enough. Furthermore, we can easily
ensure that our dynamics remain inside Pδ by simplying stopping when x r (T) δ (if we can
ensure that there is a time T at which this occurs).
Now note that
1
sup k∇Φ(x)kℓ∞ (1/w) 6 O log
.
(2.9)
δ
x∈P δ
Thus if we ensure that x(t) ∈ Pδ , then (2.6) implies that x r (T) δ occurs after some finite time T.
We are left to analyze how the potential changes when OPT moves. But from the definition
and (2.9), we have
∂t D̂Φ (y(t); x) h∇Φ(x), −∂t y(t)i 6 O(log 1δ )k∂t y(t)kℓ1 (w) .
7
Thus we obtain an O(log 1δ )-competitive algorithm, where δ is the smallest constant such that we
k
can round (online) a fractional 1−δ
-paging algorithm to a genuine fractional k-paging algorithm.
1
As we will see now, this can be done when δ 2k
.
Transforming to a valid fractional paging algorithm. Consider a request sequence r®
(r1 , r2 , . . . , rM ), and a differentiable map x : [0, T] → Pδ that services r® in the sense that there
are times t1 < t2 < · · · < t M such that x r i (t i ) δ. We may assume that x(t) is elementary in the
sense that for almost every t ∈ [0, T]:
∂t x(t) (e i − e j ) dt
for some i , j ∈ [n].
Define
1 − x(t)
∀t ∈ [0, T] .
1−δ
Then z r i (t i ) 1, so z represents a trajectory on measures that services r®, but problematically we
k
for t ∈ [0, T].
have kz(t)k1 1−δ
δk
We fix this as follows: Let ε : 1−δ
and define σ : R+ → R+ so that σ|[ℓ,ℓ+ε] ℓ for every
ℓ ∈ Z+ and σ is extended affinely to the rest of R+ . For z ∈ R+n , define σ(z) : (σ(z1 ), . . . , σ(z n )),
and consider the trajectory σ(z(t)) for t ∈ [0, T]. Observe first that
z(t) :
∫
0
T
k∂t σ(z(t))k ℓ1 (w) dt 6 kσklip
∫
T
0
k∂t z(t)k ℓ1 (w) dt 6
1
1−ε
∫
0
T
k∂t z(t)k ℓ1 (w) dt .
1
Thus for δ 2k
, the movement cost has increased under σ by only an O(1) factor.
Because σ is superadditive, it also holds that for every t ∈ [0, T],
n
Õ
i1
σ(z i (t)) 6 σ
n
Õ
!
z i (t) σ (k + ε) k .
i1
Therefore we use at most k fractional server mass at any point in time. We are left to show that, at
no additional movement cost, this can be transformed into an algorithm that maintains fractional
server mass exactly k.
To that end, we may assume that kσ(z(0))k1 k. It will be easiest to think of a weighted star
metric on vertices V {1, 2, . . . , n} ∪ {0}, where 0 is the center of the star and the edge (0, i) has
length w i . When ∂t σ(z(t)) −e i dt for some i ∈ [n], the instantaneous movement cost of σ(z(t))
is w i e i dt. Instead of deleting this mass, we can move it to 0 for the same cost. Similarly, when
∂t σ(z(t)) e i dt, the instantaneous movement cost is again w i e i dt and instead of creating mass,
we can move dt mass from 0 to i.
3
k-server on trees
Consider a rooted tree T (V, E) with root r ∈ V and leaves L ⊆ V. Let {w v > 0 : v ∈ V } be a
collection of nonnegative weights on V with w r 0. We will suppose that every leaf ℓ ∈ L is at
the same combinatorial distance from the root.
For v ∈ V, let L(v) ⊆ L denote the set of leaves beneath v. For u ∈ V \ {r }, let p(u) ∈ V denote
the parent of u, and write E® {®
e : e ∈ E} (p(u), u) : u ∈ V \ {r } for the set of edges directed
® define lenw (u, v) : w v . Let distw (x, y) denote the weighted
away from the root. For (u, v) ∈ E,
path distance between x, y ∈ V, where an edge e ∈ E is given weight lenw (®
e ). We say that the pair
(T , w) is a τ-adic HST if for every v ∈ V \ {r }, it holds that w v τ j for some j ∈ Z and, moreover,
if (u, v) ∈ E® then w v w u /τ.
8
For z ∈ RV and w ∈ RV
+ , denote
kz k ℓ1 (w) :
Õ
w v |z v | .
v∈V
Leaf measures, internal measures, and supermeasures.
A leaf measure is a point z ∈ R+L . The
Í
mass of a leaf measure is defined as the quantity ℓ∈L z ℓ . An internal supermeasure is a point z ∈ RV
+
such that
Õ
zv
∀u ∈ V .
(3.1)
zu >
v:(u,v)∈E®
The mass of an internal supermeasure is the quantity zr . We say that z ∈ RV
+ is an internal measure
if (3.1) is satisfied with equality.
For a leaf measure z ∈ R+L , we define its lifting to an internal measure by
Õ
ẑ v :
∀v ∈ V .
zℓ
ℓ∈L(v)
b denote the set of internal measures on V. It is straightforward to see that this is precisely
Let M
the class of lifted leaf measures.
Lemma 3.1. For leaf measures y, z ∈ R+L with k y k1 kz k1 , it holds that
Ww1 (y, z) ŷ − ẑ
ℓ1 (w)
.
A fractional k-server algorithm for (L, distw ) is an online sequence z (t) ∈ R+L : t 0, 1, 2, . . . of
(t)
leaf measures of mass k such that for every t > 1: z ℓ t > 1 if ℓ t is the requested leaf at time t. We
also require that z (0) is integral. The cost of such an algorithm is defined by
Õ
Ww1
t >0
(t)
z ,z
(t+1)
.
Lemma 3.2 ([BBMN15, §5.2]). The following holds for all τ > 5. If (X, dX ) is a τ-HST metric and there
is a fractional online k-server algorithm for (X, dX ), then there is a randomized integral online k-server
algorithm whose expected cost is at most O(1) times larger.
3.1
k + ε fractional servers
For the remainder of the proof, we will work with continuous time trajectories z : [0, T] → R+L
whose movement cost is measured by
∫
T
0
k∂t ẑ t k ℓ1 (w) dt ,
in light of Lemma 3.1. Obviously such a trajectory can be mapped to a discrete-time algorithm by
choosing times T1 > T2 > · · · that correspond to discrete times t 1, 2, . . ..
Lemma 3.3. If y : [0, T] → RV
+ is a trajectory taking values in internal supermeasures of mass k, then
there is an (adapted) trajectory z : [0, T] → R+L taking values in leaf measures of mass k such that:
1. For every leaf ℓ ∈ L: z t (ℓ) > yt (ℓ), and
1 (z(0), z(T)) 6
2. Ww
∫T
0
k∂t y(t)kℓ1 (w) dt.
9
Proof. This lemma follows from a more general principle: If (X, d) is a metric space and X ′ ⊆ X,
then an online (fractional) k-server algorithm on (X, d) servicing a sequence of requests in X ′ can
be converted to an online (fractional) k-server algorithm on (X ′ , d|X′×X′ ) without increasing the
movement cost. This is a straightforward consequence of the triangle inequality.
Now observe that we can envision every trajectory on internal supermeasures y(t) ∈ RV
+ with
V
t ∈ [0, T] as a trajectory on genuine measures ỹ(t) ∈ R+ defined by
ỹu (t) : yu (t) −
Õ
yu (t)
∀u ∈ V .
v:(u,v)∈E®
And moreover,
Ww1 ( ỹ(0),
ỹ(T)) 6
∫
T
k∂t y(t)kℓ1 (w) .
0
Since (L, distw ) is a subspace of (V, distw ), this completes the proof by our earlier observation.
Lemma 3.4. For every 0 6 ε < 1, a fractional online (k + ε)-server algorithm on (L, distw ) can be converted
1
to a fractional online k-server algorithm so that the movement cost increases by a factor of at most 1−ε
.
Proof. The proof is similar to the case for fractional paging. Define σ : R+ → R+ so that σ|[ℓ,ℓ+ε] ℓ
for every ℓ ∈ Z+ and σ is extended affinely to the rest of R+ . For y ∈ RV
+ , define σ(y) : (σ(y v ))v∈V .
Consider a trajectory z : [0, T] → R+L taking values in leaf measures of mass k + ε. Then since
σ is superadditive, it holds that σ(ẑ(t)) is an internal supermeasure for every t ∈ [0, T]. Moreover,
σ(ẑr (t)) σ(k + ε) k, so σ(ẑ(t)) is an internal supermeasure of mass k.
Finally, note that
∫
0
T
k∂t σ(ẑ(t))k ℓ1 (w) dt 6 kσklip
∫
T
0
k∂t ẑ(t)k ℓ1 (w)
1
dt 6
1−ε
∫
0
T
k∂t ẑ(t)k ℓ1 (w) dt .
Now applying Lemma 3.3 to the internal supermeasures σ(ẑ(t)) completes the proof.
In light of the preceding lemma, it suffices to construct a competitive fractional (k + ε)-server
algorithm with ε < 1 for any request sequence on (L, distw ).
3.2 The assignment polytope
For u ∈ V, write
n
® j ∈ [Nu ]
χ(u) : (v, j) : (u, v) ∈ E,
o
where Nu is the number of leaves in the subtree rooted at u. Denote
n
o
Λ : (r , i) : i ∈ [Nr ] ∪
With a slight abuse of notation, we sometimes write
assignment polytope on T is defined by
A : x ∈ [0, 1]Λ :
Õ
i 6 |S|
x u,i 6
Õ
(v, j)∈S
xr ,i 1{i>k}
10
Ø
χ(u) .
i >1
f (x u,i ) instead of
u∈V
Í
Í
∀u ∈ V, S ⊆ χ(u) ,
x v, j
∀i > 1 .
i∈[N u ]
f (x u,i ). The
Fix some δ > 0 and define the shifted multiscale entropy by
Φ(x) :
Õ
wu
u∈V
Õ
(x u,i + δ) log(x u,i + δ) .
i >1
For ℓ ∈ L, denote x ℓ : x ℓ,1 . Finally, for u ∈ V and x ∈ A, define the associated server measure z ∈ RV
+
by
1 Õ
(1 − x u,i ) .
z u :
1−δ
i >1
Suppose we receive a request at ℓ ∈ L. Let x : [0, ∞) → A be an absolutely continuous trajectory
satisfying
∂t x(t) ∇2 Φ(x(t))−1 (−e ℓ,1 − λ(t))
(3.2)
with λ(t) ∈ NA (x(t)) for almost every t > 0. Denote
T inf {t > 0 : x ℓ (t) < δ} .
By construction, as long as T < ∞ (see Lemma 3.12 below), it holds that {z u (t) : t ∈ [0, T]} is a
1
k
k
-server trajectory that services the request at ℓ. Now set δ : 2k
< k+1
so that 1−δ
fractional 1−δ
for k > 2.
3.3 Dynamics
We now describe in detail the dynamics of x(t) on [0, T]. We allow (momentarily) for the possibility
that T +∞.
Lemma 3.5. Suppose that x ℓ,1 (0) > δ. The continuous trajectory x(t) defined in (3.2) exists uniquely for
t ∈ [0, T] and satisfies x ℓ,1 (t) > δ for all t ∈ [0, T]. Furthermore, x(t) is absolutely continuous and its
derivative is given by
x u,i (t) + δ
−1{(u,i)(ℓ,1)} − λ u,i (t) ,
(3.3)
∂t x u,i (t)
wu
for all u ∈ V \ {r } and all i > 1, and
λ u,i (t)
Õ
λ S (t) −
Õ
S⊆χ(p(u)):
(u,i)∈S
S⊆χ(u):
i 6 |S|
λ S (t) ,
Í
where λ S (t) > 0 are the Lagrangian multipliers for the constraints { i 6 |S| x u,i (t) 6
we have that
Õ
Õ
x v, j (t) .
x u,i (t)
λ S (t) > 0 ⇒
(3.4)
Í
(v, j)∈S
x v, j (t)}. Also,
(3.5)
(v, j)∈S
i 6 |S|
Remark. We will establish that T < ∞ in Lemma 3.12.
Proof. Since the assignment polytope A is compact and convex, Φ is strongly convex and smooth,
the existence and the uniqueness of the path x(t) defined in (3.2) follows from Theorem 5.7 with
f (t, x) −e ℓ,1 . In particular, using the formula for Φ, we have that
∂t x(t)
x u,i (t) + δ
(−e ℓ,1 − λ(t))
wu
(3.6)
with λ(t) ∈ NA (x(t)).
To calculate NA (x(t)), we note that the constraints {x u,i (t) > 0} are redundant, as they can be
Í
Í
expressed by the constraints { i 6 |S| x u,i (t) 6 (v, j)∈S x v, j (t)} and xr ,1 (t) 0 using the sequence of
11
singleton sets S (u, i), (p(u), 1), (p(p(u)), 1), · · ·. Hence, we can ignore the constraints {x u,i (t) > 0}
from the polytope.
Using the definition of the assignment polytope A, Lemma 2.1 asserts that
NA (x(t))
Õ
u∈V,S⊆χ(u)
©Õ
λ S (t)
«i 6 |S|
e u,i −
Õ
ª
e v, j ® +
¬
(v, j)∈S
Õ
µ i (t)er ,i +
i >1
Õ
ηu,i (t)e u,i
u∈V,i >1
where λ S (t), ηu,i (t) > 0, µ i (t) ∈ R , ηu,i (t) · (1 − x u,i (t)) 0,
Õ
ª
©Õ
x v, j (t)® 0 .
x u,i (t) −
and λ S (t) ·
(v, j)∈S
«i 6 |S|
¬
Rearranging the terms in (3.6) and NA (x(t)), and ignoring the terms for the root r , we see that it
only remains to show that one can take ηu,i (t) (the Lagrange multiplier for {x u,i (t) 6 1}) to be 0.
Let e
A be the polytope just as A, except with [0, 1] replaced by [0, 2]. Assume now that x(t)
is defined with A replaced by e
A. We will show that one has x u,i (t) 6 1. This implies that the
Lagrange multipliers for the path defined on e
A are valid Lagrange multipliers for the path on A,
and in particular one can take ηu,i (t) 0.
Toward deriving a contradiction, let us assume that there exists a time t > 0, u ∈ Vh , and i > 1
such that x u,i (t) > 1 and ∂t x u,i (t) > 0. We prove by induction on h that this impossible.
For h 0 this follows from the equality constraints at the root. Now consider h > 1 and
observe that by (3.3) and (3.4), one must have λ S (t) , 0 for some S ⊆ χ(p(u)), which means that
Í
Í
i 6 |S| x p(u),i (t)
(v, j)∈S x v, j (t). However, the induction hypothesis implies that for any j > 1,
x p(u), j (t) 6 1, and thus the constraint corresponding to S \ {(u, i)} is violated for x(t), yielding a a
contradiction.
We now prove several lemmas giving a more refined understanding of the dynamics (3.3). The
reader is encouraged to skip these arguments upon a first reading. The main technical property
b for all times t ∈ [0, T], i.e., the mass per level remains constant.
we need to establish is that z(t) ∈ M
This is established in Lemma 3.8.
For h > 0, let Vh denote the set of vertices with a simple path to the root using h edges. Define
C(t) ⊇ {S : λ S (t) , 0} to be the set of active constraints:
C(t) : S ⊆ χ(u) : u ∈ V and
Õ
x u,i (t)
i 6 |S|
Õ
x v, j (t) .
(v, j)∈S
Lemma 3.6. For any t > 0, u ∈ V, and i > j > 1, it holds that x u,i (t) > x u, j (t).
Proof. We will show that x u,i (t) > x u,i+1 (t) implies ∂t x u,i (t) 6 ∂t x u,i+1 (t). Recalling (3.3) and (3.4),
it is enough to show that
Õ
Õ
λ S (t) .
λ S (t) >
S⊆χ(p(u)):
(u,i)∈S
S⊆χ(p(u)):
(u,i+1)∈S
Let us show that if (u, i) ∈ S and (u, i + 1) < S then λ S (t) 0, yielding the desired conclusion.
Using the constraint for S ∪ {(u, i + 1)} \ {(u, i)} gives
Õ
(v, j)∈S
x v, j (t) >
Õ
x v, j (t) >
(v, j)∈S∪{(u,i+1)}\{(u,i)}
12
Õ
i 6 |S|
x p(u),i (t) ,
implying that λ S (t) 0.
Lemma 3.7. Consider u ∈ V and S, S′ ⊆ χ(u) such that S, S′ ∈ C(t). Then S ∪ S′ ∈ C(t) as well.
Proof. First we claim that MS : max(v, j)∈S x v, j (t) and MS′ : max(v, j)∈S′ x v, j (t) are equal. Let
(v∗ , j∗ ) denote some pair for which x v, j (t) is maximal among (v, j) ∈ S. If MS > MS′ , then for any
(v ′ , j ′) ∈ S′, the constraint corresponding to S ∪ {(v ′ , j ′)} \ {(v∗ , j∗ )} is violated because S, S′ ∈ C(t).
Let us denote M : MS MS′ .
Suppose that |S| > |S′ |. The same argument shows that for any (v, j) ∈ S\S′, one has x v, j (t) M.
Using the constraint for S \ {(v∗ , j∗ )} and the fact that S ∈ C(t) shows that x u,|S| (t) > M, and thus
by Lemma 3.6, one has x u,|S|+m (t) > M for any m > 0. This implies:
Õ
i 6 |S∪S′ |
x u,i (t) >
Õ
x u,i (t) + M · |S \ S′ |
i 6 |S|
Õ
x v, j (t) + M · |S \ S′ |
(v, j)∈S
Furthermore, since x(t) ∈ A it also holds that
that S ∪ S′ ∈ C(t).
Í
i 6 |S∪S′ |
x u,i (t) 6
b Then z(t) ∈ M
b for t > 0.
Lemma 3.8. Suppose that z(0) ∈ M.
Í
(v, j)∈S∪S′
Õ
x v, j (t) .
(v, j)∈S∪S′
x v, j (t), demonstrating
Proof. For u ∈ V, let S u (t) be the maximum (w.r.t. inclusion) active set at time t in χ(u) (cf.
Lemma 3.7). Since ∂t x(t) ∈ NA (x(t))⊥ (Lemma 5.8), one has
Õ
Õ
∂t x u,i (t)
(v, j)∈S u (t)
i 6 |S u (t)|
which in turns gives, for any h > 1,
Õ
∂t x v, j (t) ,
Õ
∂t x u,i (t)
u∈Vh ,i 6 |S u (t)|
∂t x v, j (t) .
(3.7)
(v, j)∈∪ u∈Vh S u (t)
Thus to compare the derivatives of the mass at two adjacent levels, it remains to establish that
Õ
Õ
∂t x u,i (t) >
u∈Vh ,i>|S u (t)|
∂t x v, j (t) .
(v, j)<∪ u∈Vh S u (t):v∈Vh+1
We show that every term in the first sum is nonnegative and every term in the second sum is
nonpositive. In particular, since ∂t xr ,i (t) 0 for all i > 1, this will imply by induction that
Í
Õ
v∈Vh+1 , j >1
∂t x v, j (t) 6
Õ
∂t x u,i (t) 6 0 ,
u∈Vh ,i >1
b and z(t) ∈ A for all t > 0.
yielding u∈Vh ∂t z u (t) > 0. Then the proof is concluded using z(0) ∈ M
Thus it remains to show that ∂t x u,i (t) > 0 for all i > |S u | and u < L, and ∂t x v, j (t) 6 0 for all
(v, j) < ∪u∈Vh S u (t). For u r , one has ∂t x u,i (t) 0, and for u , r we have thanks to (3.3) and
Lemma 3.5:
x u,i (t) + δ
λ u,i (t) .
∂t x u,i (t) −
wu
Since i > |S u (t)| and S u (t) is the maximum active set in χ(u), it holds that λ S (t) 0 for any S ⊆ χ(u)
with |S| > i. Thus from (3.4), we see that λ u,i (t) 6 0, and in turn ∂t x u,i (t) > 0. On the other hand
for (v, j) ∈ χ(u) one has
x v, j (t) + δ
∂t x v, j (t) 6 −
λ v, j (t) .
wv
Assume (v, j) < S u (t). Then since S u (t) is the maximum active set in χ(u), it holds that λ S (t) 0
for any S with (v, j) ∈ S. Using (3.4), we see that λ v, j (t) > 0, concluding the proof
13
We have established that z(t) is an internal measure for every t > 0, and thus ∂t z(t) is a flow.
We now we show that ∂t z(t) is a flow directed toward the request ℓ.
Lemma 3.9. It holds that ∂t z u (t) > 0 if u is an ancestor of the request ℓ, and ∂t z u (t) 6 0 otherwise.
b (Lemma 3.8), it suffices to show that for any leaf ℓ ′ , ℓ, one has ∂t z ℓ′ (t) 6 0.
Proof. Since z(t) ∈ M
Í
Indeed by preservation of mass at every node (i.e., ∂t z u (t) v:(u,v)∈E® ∂t z v (t)), this implies that
∂t z u (t) 6 0 for any u which is not an ancestor of ℓ. Furthermore, by preservation of mass per level
Í
(i.e., u∈Vh ∂t z u (t) 0), and the fact that there is a single ancestor of ℓ per level, this also gives
∂t z u (t) > 0 for any ancestor u of Í
ℓ.
1
Notice that ∂t z ℓ′ (t) − 1−δ
i >1 ∂t x ℓ′ ,i (t), and thus it suffices to show that for any i > 1,
′
∂t x ℓ ,i (t) > 0. The latter inequality is straightforward from (3.3) and (3.4) since χ(ℓ ′ ) ∅.
The next lemma follows immediately from Lemma 3.9 since ∂t x ℓ′ (t) > 0 for all ℓ ′ , ℓ.
Lemma 3.10. If x ℓ′ (0) > δ for all ℓ ′ ∈ L, then x ℓ′ (T) > δ for all ℓ ′ ∈ L.
Let us extend the definition of k · kℓ1 (w) to x ∈ RΛ by
kx kℓ1(w) :
Õ
wu
u∈V
Õ
|x u,i | .
i >1
Observe that
sup k∇Φ(x)kℓ∞ (1/w) 6 O(log 1δ ) .
x∈A
This yields the following.
Lemma 3.11. It holds that for every x ∈ A and { y(t)} ⊆ A differentiable:
∂t D̂Φ (y(t); x) 6 k∂t y(t)kℓ1 (w) O(log δ1 ) .
The next lemma is an immediate consequence of (2.2).
Lemma 3.12. If y ∈ A satisfies yℓ 0, then
∂t D̂Φ (y; x(t)) 6 −x ℓ,1 (t) .
In particular, we have that T < ∞ and hence x ℓ,1 (T) δ.
Proof. The first conclusion follows from (2.2) using yℓ 0 and f (t, x(t)) −e ℓ,1 . Since the
divergence is nonnegative and it is decreasing with rate at least δ whenever x ℓ,1 (t) > δ, the
trajectory ends in finite time.
3.4 The weighted depth potential
Let us first define an auxiliary potential function Ψt . We relate it to the dynamics, and then
present applications in Section 3.4.1–Section 3.4.3, culminating in the assertion that our algorithm
is O((log k)2 )-competitive.
Consider a differentiable function Ψ(t) such that
∂t Ψ(t)
Õ
w u ∆u (t) + ∆p(u) (t)
u∈V\{ r }
Õ
i >1
14
∂t x u,i (t)
(3.8)
for some functions {∆u (t) > 0 : u ∈ V } satisfying ∆u (t) 6 ∆v (t) for all (u, v) ∈ E® as well as ∆r (t) ≡ 0.
Note that an important special case is simply when
Õ
Ψ(t)
w u (∆u + ∆p(u) )
u∈V\{ r }
Õ
x u,i (t)
i >1
® define
where {∆u : u ∈ V } are independent of t. For an edge (u, v) ∈ E,
q t (v) : ∆v (t) − ∆u (t) .
(3.9)
Lemma 3.13. The following holds for almost every t ∈ [0, T]:
k∂t x(t)k ℓ1 (q t w) 6 3∆ℓ (t)(x ℓ (t) + δ) + ∂t Ψ(t) .
Proof. Note that from Lemma 3.5, for every u ∈ V \ {r }, we have:
∂t x u,i (t)
where
x u,i (t) + δ
−1{(u,i)(ℓ,1)} − λ u,i (t) ,
wu
λ u,i (t)
Õ
λ S (t) −
Õ
(3.10)
λ S (t) .
(3.11)
S⊆χ(p(u)):
(u,i)∈S
S⊆χ(u):
i 6 |S|
Recalling that ∆r (t) 0 for all t ∈ [0, T], we calculate:
> ∂t Ψ(t) + ∆ℓ (t) + ∆p(ℓ) (t) (x ℓ (t) + δ)
Õ
∂t Ψ(t) + 2∆ℓ (t)(x ℓ (t) + δ)
∆ℓ (t) + ∆p(ℓ) (t) (x ℓ (t) + δ) +
Õ
Õ
Õ
u∈V\{ r } S⊆χ(u)
+
λ S (t)
Õ
Õ
Õ
u∈V\{ r } S⊆χ(u)
+
Õ
λ S (t)
Õ
Õ
u∈V\{ r } S⊆χ(u)
+
S⊆χ(r )
∂t x u,i (t)
i >1
∆v (t) + ∆p(v) (t) (x v, j (t) + δ) − ∆u (t) + ∆p(u) (t)
∆v (t)(x v, j (t) + δ)
© Õ
λ S (t)
Õ
i 6 |S|
«(v, j)∈S
Õ
(∆v (t) − ∆u (t)) + ∆p(v) (t) − ∆p(u) (t)
∆v (t)(x v, j (t) + δ)
(v, j)∈S
S⊆χ(r )
«(v, j)∈S
Õ
u∈V\{ r }
Õ
ª
(x u,i (t) + δ)®
¬
(v, j)∈S
S⊆χ(r )
© Õ
λ S (t)
w u ∆u (t) + ∆p(u) (t)
© Õ
λ S (t)
λ S (t)
«(v, j)∈S
Õ
ª
(x v, j (t) + δ)®
¬
ª
q t (v) + q t (u) (x v, j (t) + δ)®
¬
∆v (t)(x v, j (t) + δ) ,
(v, j)∈S
where in the penultimate equality we have used that for S ⊆ χ(u),
λ S (t) > 0 ⇒
Õ
x u,i (t)
i 6 |S|
Õ
(v, j)∈S
15
x v, j (t) .
(3.12)
On the other hand, the q t · w-movement cost is equal to
Õ Õ
Õ Õ
q t (u)w u ∂t x u,i (t)
u∈V\{ r } i >1
u∈V\{ r } i >1
Using (3.10) and (3.11) gives
Õ Õ
w u q t (u) ∂t x u,i (t)
u∈V\{ r } i >1
and
−
q t (u)w u ∂t x u,i (t)
Õ Õ
w u q t (u) ∂t x u,i (t)
u∈V\{ r } i >1
−
+
Õ Õ
6
λ S (t)
Õ
+−
q t (u)w u ∂t x u,i (t)
u∈V\{ r }
Õ
q t (v)(x v, j (t) + δ)
Õ
λ S (t)q t (u)
−
.
(v, j)∈S
u∈V S⊆χ(u)
Õ
6 q t (ℓ)(x ℓ (t) + δ) +
Õ
x u,i (t) + δ
i 6 |S|
u∈V\{ r } S⊆χ(u)
Using q t (ℓ) 6 ∆t (ℓ) and (3.12) again (as well as q t (v) ∆v (t) for (v, j) ∈ S ⊆ χ(r )), we have
Õ Õ
Õ
q t (u)w u ∂t x u,i (t) 6 ∆t (ℓ)(x ℓ (t) + δ) +
u∈V\{ r } i >1
+
Õ
Õ
Õ
λ S (t)
u∈V\{ r } S⊆χ(u)
λ S (t)
S⊆χ(r )
Õ
q t (u) + q t (v) (x v, j (t) + δ)
(v, j)∈S
∆v (t)(x v, j (t) + δ) ,
(v, j)∈S
yielding the desired result.
Note that k∂t x(t)kℓ1 (q t w) (1 − δ)k∂t z(t)kℓ1 (q t w) . Thus combining Lemma 3.13 with Lemma 3.12
and using x ℓ (t) > δ for t ∈ [0, T] yields the following.
Corollary 3.14. For almost every t ∈ [0, T], if y ∈ A satisfies yℓ 0, then
(1 − δ) k∂t z(t)k ℓ1 (q t w) 6 ∂t Ψ(t) + 6∆ℓ (t)∂t D̂Φ (y; x(t)) .
For a function f : V → R+ , define b
f : V \ L → R+ by
n
o
b
f (u) : min f (v) + f (v ′) : v , v ′ , (u, v), (u, v ′) ∈ E® .
For concreteness, let us define b
f (u) : 0 if u has only one child.
Lemma 3.15. For almost every t ∈ [0, T], the following holds. Suppose that (T , w) is a τ-adic HST for
τ > 2, and there is some c > 0 such that
If y ∈ A satisfies yℓ 0, then
b
q t (v) > c
∀v ∈ V \ L .
c(1 − δ)
k∂t z(t)k ℓ1 (w) 6 ∂t Ψ(t) + 6∆ℓ (t)∂t D̂Φ (y; x(t)) .
4
Proof. From Lemma 3.8, it holds that z(t) is an internal measure for all t ∈ [0, T], and moreover
∂t z(t) is a flow towards ℓ (cf. Lemma 3.9). Therefore we can decompose
∂t z(t)
Õ
ℓ′ ∈L
′
where y (ℓ ) (t) is a flow on the unique ℓ ′-ℓ path in T .
16
′
y (ℓ ) (t) ,
′
Let us use | y (ℓ ) (t)| to denote the magnitude of the corresponding flow. Since ∂t z(t) is a flow
towards ℓ, we have
k∂t z(t)k ℓ1 (q t w) >
>
1
τ
c
τ
Õ
b
q t (lca(ℓ, ℓ ′))w lca(ℓ,ℓ′) y (ℓ ) (t)
′
Õ
ℓ′ ∈L\{ℓ}
′
w lca(ℓ,ℓ′ ) y (ℓ ) (t) >
ℓ′ ∈L\{ℓ}
(3.13)
c
k∂t z(t)k ℓ1 (w) ,
4
where the first and last inequality use the fact that w is τ-adic.
3.4.1
Combinatorial depth for general trees
Let distT denote the unweighted shortest-path metric on T . Define ∆u (t) : ∆u distT (r , u), and
Ψ(t) :
Õ
w u ∆u (t) + ∆p(u) (t)
u∈V\{ r }
Õ
x u,i (t) ,
i >1
Note that q t (cf. (3.9)) satisfies q t ≡ 1 for all t ∈ [0, T]. Therefore applying Corollary 3.14 yields
(1 − δ) k∂t z(t)k ℓ1 (w) 6 ∂t Ψ(t) + 6 distT (r , ℓ) · ∂t D̂Φ (y; x(t)) ,
which in turn gives the following result (recall also Lemma 3.11).
Corollary 3.16. For any tree metric with combinatorial depth D, there is an O(D log k)-competitive
fractional k-server algorithm.
Note that, as opposed to the situation for HSTs, it is not known how to round online a fractional
k-server algorithm on a tree to a random integral algorithm while losing only an O(1) factor in the
competitive ratio.
3.4.2
Cardinality for an HST
Assume now that (T , w) is a τ-adic HST for some τ >
2. Recall that Nu is number of leaves in the
subtree rooted at u and define ∆u (t) : ∆u log Nnu . Define:
Ψ(t) :
Õ
w u ∆u (t) + ∆p(u) (t)
u∈V\{ r }
Õ
x u,i (t) .
i >1
Define q q t as in (3.9). Then for every u ∈ V:
q(u) log
Np(u)
Nu
.
In particular, for any two children v, v ′ of u:
b
q (u) > log
Nu
Nu
+ log
> log 2 .
Nv
Nv′
Applying Lemma 3.15 with c : log 2 yields
(1 − δ) log 2
k∂t z(t)kℓ1 (w) 6 ∂t Ψ(t) + 6 log(n) · ∂t D̂Φ (y; x(t)) .
4
Combined with Lemma 3.11, this gives the following consequence.
Corollary 3.17. If (T , w) is a τ-adic HST for some τ > 2, then there is an O(log(k) log(n))-competitive
online fractional k-server algorithm on (L, distw ).
The preceding construction motivates our approach to obtaining an O((log k)2 ) competitive
ratio: Try to replace Nu by the fractional server mass in the subtree beneath u.
17
3.4.3
Fractional server-weighted depth
Finally, let us establish the O((log k)2 ) bound. Suppose now that (T , w) is a τ-adic HST. Define:
Ψ(t) :
Õ
wu
u∈V\{ r }
z u (t) + 1 + τ−1 1{u <L} ε log(z u (t) + ε) + z u (t) log(z p(u) (t) + ε) .
Consider some node u ∈ V \ {r }, and the terms in ∂t Ψ(t) corresponding to ∂t z u (t):
©
w u ∂t z u (t) 1 + log (z u (t) + ε) + log z p(u) (t) + ε +
«
τ−1 ε 1{u <L}
+ τ−1 1{u <L}
z u (t) + ε
Õ
v:(u,v)∈E®
w u ∂t z u (t) 1 + log (z u (t) + ε) + log z p(u) (t) + ε + 1{u <L} τ−1 ,
z v (t) ª
®
z u (t) + ε
b
where in the last equality we used that z(t) ∈ M.
b and (T , w) is a τ-adic HST, it holds that for every j ∈ Z:
Since z(t) ∈ M
Õ
¬
∂t z u (t) 0 ,
u∈V:
w u τ j
and therefore we conclude that
Õ
∂t Ψ(t)
w u ∂t z u (t) log (z u (t) + ε) + log z p(u) (t) + ε
u∈V\{ r }
−
Õ
u∈V\{ r }
1
1−δ
k + 2ε
k + 2ε
w u ∂t z u (t) log
+ log
z u (t) + ε
z p(u) (t) + ε
Õ
wu
u∈V\{ r }
Õ
k + 2ε
k + 2ε
log
+ log
∂t x u,i (t) .
z u (t) + ε
z p(u) (t) + ε
i >1
Therefore (3.8) holds with
∆u (t)
and in this case:
q t (u)
k + 2ε
1
log
,
1−δ
z u (t) + ε
z p(u) (t) + ε
1
log
.
1−δ
z u (t) + ε
Now we can prove the main technical theorem of this section.
Theorem 3.18. The trajectory σ(z(t)) for t ∈ [0, T] is an internal supermeasure of mass k that services the
request at ℓ ∈ L. Moreover, if y ∈ A satisfies yℓ 0, then for almost every t ∈ [0, T]:
1−ε
log 34 k∂t σ(z(t))k ℓ1 (w) 6 (1 − δ)∂t Ψ(t) + 6 log(2 + k/ε) · ∂t D̂Φ (y; x(t)) .
4
Proof. First, note that if u ∈ V \ L and z u (t) > ε, then for any children v, v ′ of u:
and therefore
(1 − δ)b
q t (u) > log
z u (t) + ε
z u (t) + ε
4
+ log
> log ,
z v (t) + ε
z v′ (t) + ε
3
b
q t (u) >
log 34
1−δ
18
1{z u (t)> ε} .
(3.14)
′
Let y (ℓ ) (t) be as in the proof of Lemma 3.15. Partition L \ {ℓ}
leaves ℓ ′ with v lca(ℓ, ℓ ′), and define
y (v) (t) :
Õ
Ð
v∈V\L
L v , where L v is the set of
′
y (ℓ ) (t) .
ℓ′ ∈L v
Note that by Lemma 3.9, ∂t z(t) is a flow towards ℓ, and thus there are no cancellations in the
preceding sum.
Now use inequality (3.13) and (3.14) to write
k∂t z(t)k ℓ1 (q t w) >
>
Õ
log 43
(1 − δ)τ
ℓ′ ∈L\{ℓ}
Õ
log 34
(1 − δ)τ
′
w lca(ℓ,ℓ′) 1{ zlca(ℓ,ℓ′) (t)> ε } y (ℓ ) (t)
w v 1{z v (t)> ε} y (v) (t)
v∈V\L
1−ε
log 43 k∂t σ(z(t))k ℓ1 (w) ,
1−δ
1
where in the final line we have used the fact that σ is 1−ε
-Lipschitz and σ(z v (t)) 0 when z v (t) < ε.
Combined with Corollary 3.14, this yields the desired result, noting that for any leaf ℓ ∈ L:
∆ℓ (t) 6
k + 2ε
1
log
.
1−δ
ε
Using Lemma 3.11 and Lemma 3.3, this yields an O((log k)2 )-competitive online fractional kserver algorithm for any HST metric. (It is not difficult to see that every HST metric embeds with
O(1) distortion into the metric of a 2-adic HST.)
4 Dynamic HST embeddings
Consider a discrete metric space (X, d). Denote the aspect ratio of (X, d) by
AX :
max x,y∈X d(x, y)
min x , y∈X d(x, y)
.
Theorem 4.1. If there is an α-competitive algorithm for k-server on HSTs, then there is an
O(α log(A X ) log k)-competitive algorithm on any metric space (X, d).
We use R(X) : X to denote the space of request sequences. For σ ∈ R(X) and s 6 t, denote
σ[s,t] : hσs , σs+1 , . . . , σt i. We will consider sequences of random variables that are implicitly
functions of σ ∈ R(X). Say that such a sequence Z hZ t : t > 0i is adapted if Z t is a function of
σ[1,t] for every t > 1.
This allows one to encode state that depends on the underlying request sequence σ in a timedependent way. For instance, to count the number of requests that fall into a subset X ′ ⊆ X, one
would set Z 0. Then given that σt arrives at time t, we would update Z : Z + 1X′ (σt ). The
meaning is: Z0 0 and Z t : Z t−1 + 1X′ (σt ) for all t > 1.
An online algorithm for k-server on X is an adapted sequence A hA1 , A2 , . . .i where for every
t > 1: A t ∈ X k and σt ∈ {(A t )1 , . . . , (A t )k }. For a function f with domain X, write f ⊗k for the
function with domain X k given by f ⊗k (x1 , . . . , x k ) : ( f (x1 ), . . . , f (x k )).
For an algorithm A and a request sequence σ, we write costX (A(σ)) for the total movement
cost incurred in servicing σ. We denote by optX : R(X) → (X k ) an optimal offline algorithm and
cost∗X (σ) : costX (optX (σ)) the optimal offline movement cost.
19
4.1 Hierarchical partitions and canonical HSTs
Let us suppose that diam(X, d) 1 and AX < ∞. Let τ : 4 be a scale parameter, and let M ∈
denote the smallest number for which τ−M < d(x, y) for all x , y ∈ X.
A sequence of subsets ξ (ξ0 , ξ1 , . . . , ξ ℓ ) of X for 0 6 ℓ 6 M is a chain if ξ0 X and
ξ0 ⊇ ξ1 ⊇ · · · ⊇ ξ ℓ .
Define the length of such a chain by len(ξ) : ℓ. Denote min(ξ) : ξlen(ξ) . A chain is complete if
it has length M and |ξ M | 1. Let CX denote the set of chains in X and let C̄X denote the set of
complete chains.
Define a rooted tree structure on CX as follows. The root of CX is X. For two chains ξ, ξ ′ ∈ CX :
ξ ′ is a child of ξ if and only if ξ is a prefix of ξ ′ and len(ξ ′) len(ξ) + 1. For ξ, ξ ′ ∈ CX , let
lca(ξ, ξ ′) ∈ CX denote their least common ancestor. Define a τ-HST metric on C̄X by
′
dτ (ξ, ξ ′) : τ−len(lca(ξ,ξ ))
ξ , ξ′ .
Embedding into complete chains. For a partition P of X we write P(x) for the unique set S ∈ P
containing x. A τ-stack P of X is a sequence P (P 0 , P 1 , . . . , P M ) of partitions of X such that:
P 0 {X} and for all j 1, 2, . . . , M, it holds that
S ∈ P j ⇒ diam(S) 6 τ−j .
Note that P M (x) {x} because diam(S) 6 τ−M implies |S| 6 1. Every τ-stack P induces a
canonical mapping FP : X → C̄X into
chains on X as
First define the
follows.
the set of complete
′
0
j
0
1
M
0
:
:
S ∩ S : S ∈ P j , S′ ∈ P j−1
P and P̂
forced refinement P̂ P̂ , P̂ , . . . , P̂ inductively by P̂
for j 1, 2, . . . , M. Next define FP by
FP (x) : P̂ 0 (x), P̂ 1 (x), . . . , P̂ M (x) .
The following two lemmas will help to estimate the distortion of the embedding FP .
Lemma 4.2. For any τ-stack P, the map FP : X → (C̄X , dτ ) is non-contracting.
Proof. Consider x, y ∈ X. If dτ (FP (x), FP (y)) τ−ℓ , then FP (x) and FP (y) share a common
prefix of length ℓ, and therefore P ℓ (x) P ℓ (y). Now property (ii) of a τ-stack guarantees that
d(x, y) 6 diam(P ℓ (x)) 6 τ−ℓ .
Lemma 4.3. For any τ-stack P P 0 , P 1 , . . . , P M , it holds that
Õ
dτ FP (x), FP (y) 6 τ
τ−j 1P j (x),P j (y)
j >1
∀x, y ∈ X .
Proof. Consider x, y ∈ X and suppose that dτ FP (x), FP (y) τ−ℓ for some ℓ < M. It is straightforward to check that ℓ + 1 min{ j : P j (x) , P j (y)}.
Next we observe that there is a universal inverse to those embeddings. Define the mapping
Fin : C̄X → X by Fin (ξ) : min(ξ). One has for any τ-stack P:
Fin ◦ FP idX .
20
(4.1)
4.2 The HST reduction
Let A C denote an α-competitive k-server algorithm for the metric space (C̄X , dτ ) over some probability space ΩC . Suppose that σ hσ1 , σ2 , . . .i is a request sequence for X, and we have an adapted
sequence P hP1 , P2 , . . .i of τ-stacks of X over an independent probability space ΩX .
This yields a mapping FP : R(X) → R(CX ) given by
FP (σ) : FP1 (σ1 ), FP2 (σ2 ), . . . .
From this one derives a k-server algorithm for X:
A X : Fin⊗k ◦ A C ◦ FP ,
Note that A X is a valid k-server algorithm precisely because of (4.1).
Moreover, because of Lemma 4.2, the inverse map Fin is non-expanding, and thus:
costX (A X (σ)) 6
ΩC
h
costdτ (A C ◦ FP )(σ)
i
6 OX,k (1) + α cost∗dτ (FP (σ)) .
(4.2)
Thus our goal becomes clear: We would like to choose P so that
ΩX
h
⊗k
◦ optX )(σ)
costdτ (FP
i
6 OX,k (1) + β cost∗X (σ)
∀σ ∈ R(X) .
(4.3)
⊗k
Indeed since FP
◦ optX services the request sequence FP (σ), one has cost∗dτ (FP (σ)) 6
⊗k
◦ optX )(σ) , and thus (4.3) in conjunction with (4.2) show that A X is an αβ-competitive
costdτ (FP
algorithm for X.
In essence, (4.3) asks that the embedding FP has β-distortion on the subset of X that currently
matters. Focusing on such a subset is the reason why one could hope to the usual Ω(log n) lower
bound by something depending on k and AX .
4.3 A dynamic embedding
The algorithm will produce an adapted sequence P hP1 , P2 , . . .i of τ-stacks verifying (4.3) with
j
β 6 O(M log k). In fact it is slightly easier for the algorithm’s description to allow Pt to be a partial
partition, i.e., simply a collection of pairwise disjoint subsets of X. In the case it is understood that
the embeddings FP use the completion of any such partial partition P, that is all the elements from
X \ [P] (we denote [P] : ∪S∈P S) are added as singletons to form a complete partition.
The embedding algorithm. For j 1, . . . , M, we will maintain an adapted set N j ⊆ X of level-j
centers as well as an adapted mapping R j : N j → R+ of radii. These will be used to construct our
adapted τ-stack P P 0 , P 1 , . . . , P M .
For every j ∈ Z, consider the probability distribution µ j with density:
dµ j (r) :
kτ j log k
exp −rτ j log k 1[0,τ− j ] (r) .
k−1
This is simply a truncated exponential distribution, as employed by Bartal [Bar96].
j
j
Initially, N0 P0 ∅ for j 1, . . . , M. Upon receiving request σt ∈ X, we proceed as follows:
For j 1, 2, . . . , M:
1. If |N j | > 2k, then
[level- j reset]:
For i j, j + 1, . . . , M, set N j : ∅ and P j : ∅.
21
2. If d(σt , N j ) > τ−j−1 , then
[level- j insertion]:
(a) N j : N j ∪ {σt }
j
j
(b) R j (σt ) : τ−j−1 + R̂ t , where R̂ t is sampled independently according to the
distribution µ j+1 .
(c) P j : P j ∪ B(σt , R j (σt )) \ [P j ] .
Analysis. Let us now prove that for the stack P generated in this way, (4.3) holds for β 6
O(M log k). We need a few preliminary results.
Lemma 4.4. Pt is a τ-stack for every t > 1.
Proof. This follows from the fact that the distribution µ j+1 is supported on the interval [0, τ−j−1 ]
j
and thus every set in Pt is contained in a ball of radius 2τ−j−1 , which is a set of diameter at most
4τ−j−1 6 τ−j for τ > 4.
We defer the proof of the next lemma to the end of this section.
Lemma 4.5. For all x ∈ X and t > 1, it holds that
ΩX
dτ (FP t (x), FP t (σt )) 6 O(M log k) d(x, σt ) .
Lemma 4.6. For all t > 1 and j 1, 2, . . . , M: If K j,t denotes the number of level-j resets up to time t,
then
cost∗X (σ[1,t] ) > kτ−j−1 · K j,t .
Proof. Suppose that between time t1 +1 and t2 there are requests made at points x1, x2 , . . . , x k+k′ ∈ X
that satisfy d(x i , x j ) > D for all i , j. Then clearly:
cost∗X (σ[1,t2 ] ) > cost∗X (σ[1,t1 ] ) + k ′ D .
Theorem 4.7. For every time t > 1:
ΩX
h
⊗k
◦ optX )(σ[1,t] )
costdτ (FP
i
6 O(M log k) cost∗X (σ[1,t] ) + OX,k (1) .
⊗k
◦ optX into three parts: First the stack P is possibly
Proof. We can split the movement of FP
updated by the algorithm, either with a reset or an insertion (each induce movement), and then
we mirror the move of optX .
Let us first consider the case of a level-j reset at time t. The key observation is that the mapping
j−1
j−1
0
FP t remains identical to FP t on the (j −1)-prefix, that is (Pt0 (x), . . . , Pt (x)) (Pt−1
(x), . . . , Pt−1 (x)),
∀x ∈ X. Thus the movement cost induced by a level-j reset is at most kτ1−j . In particular the total
cost of resets up to time t is upper bounded by
M
Õ
K j,t · kτ1−j 6 τ2 M · cost∗X (σ[1,t] ) ,
j1
where the last inequality is Lemma 4.6.
For the cost resulting from a level-j insertion at time t, we use the following argument. Assume
that j is the smallest index in [M] with a level-j insertion. Note that, by construction of the
22
j
radii, one has Pth (σt ) ⊆ Pt (σt ) for h > j. In particular, the movement comes from the set of
j
servers I t {i ∈ [k] : (optX
t−1 )i ∈ Pt (σt )}, for which the mapping F P t will change the j-suffix
j
(i.e., (Pt , . . . , PtM )) compared to FP t−1 . However, importantly the (j − 1)-prefix remains identical
(this is because there is no insertion at level j − 1 and thus these servers remain part of the same
non-singleton cluster at level j − 1).
In other words, the total movement is O(τ−j |I t |). Now we argue that we can match this
movement with either reset movement or movement coming from optX as follows. First we
ignore the set of servers in Jt ⊆ I t such that their (j − 1)-prefix remain the same forever, indeed
Í
one has t >1 | Jt | OX,k (1). Now for a server i ∈ I t \ Jt consider the first time s > t such that the
X
(j − 1)-prefix of FP t−1 ((optX
s )i ) is different from F P t ((opt t−1 )i ). The corresponding movement at
time s comes either from a reset or from a movement of optX , and moreover its cost is larger than
τ−j . Thus we just showed that at the expense of an additive term of OX,k (1) and a multiplicative
factor 2 for movement cost induced by resets and the movement of optX , one can ignore the
movement cost induced by insertions.
Finally, we deal with the cost coming from movement of optX . We may assume that optX is
X
X
X
X
conservative: If σt ∈ optX
t−1 , then optt optt−1 and otherwise optt−1 \ optt {x t } for some x t ∈ X,
X
and opt pays d(σt , x t ). From Lemma 4.5, the expected cost of mirroring this move in dτ is at most
O(M log k) d(σt , x t ).
j
Thus we are left only to analyze the stretch. Note that since d(σt , Nt ) 6 τ−j−1 by construction,
the next lemma yields Lemma 4.5 when combined with Lemma 4.3.
j
Lemma 4.8. For every y ∈ X satisfying d(y, Nt ) 6 τ−j−1 and every x ∈ X:
h
i
j
j
Pt (x) , Pt (y) 6 (2 + 4e)d(x, y)τ j+1 log k .
j
Proof. Note that |Nt | 6 2k by construction. Let us arrange the centers in the order which they were
j
j
added: Nt {x1 , x2 , . . . , x N }. Let R̂ 1 , . . . , R̂ N denote the corresponding random radii R̂ i : R̂ t (x i )
and let R i : R̂ i + τ−j−1 .
Denote the event
E i : d(x i , {x, y}) 6 R i ∧ max{d(x i , x), d(x i , y)} > R i ,
and let i ∗ : min{i : d(x i , {x, y}) 6 R i }. Define c : (1 −
h
j
Pt (x)
,
j
Pt (y)
i
6
N
Õ
i1
N
Õ
1
−j−1 .
log k )τ
Then:
[i i∗ ] · [E i | i i∗ ]
[E i ∧ { R̂ i > c}] +
i1
N
Õ
i1
For any i 1, . . . , N, we have
[E i ∧ { R̂ i > c}] 6 sup
∫
R>c
6
(∫
[i i∗ ] · E i ∧ { R̂ i < c} | i i∗ .
R+d(x,y)
dµ j+1 (r)
R
c+d(x,y)
dµ j+1 (r)
c
23
)
k
j+1
1 − exp −d(x, y)τ j+1 log k e −cτ log k
k−1
2e
6 d(x, y)τ j+1 log k ,
k
where the final line uses 1 − e −u 6 u and k > 2.
4e d(x, y)τ j+1 log k since N 6 2k.
Now analyze:
This yields
∫ R+d(x,y)
R
dµ j+1 (r)
[E i ∧ { R̂ i < c} | i i∗ ] 6 sup
∫
−
j−1
06 R<c
τ dµ j+1 (r)
R
∫ c+d(x,y)
6 c∫ − j−1
τ
c
ÍN
i1
[E i ∧ { R̂ i > c}] 6
dµ j+1 (r)
dµ j+1 (r)
1 − exp −d(x, y)τ j+1 log k
1 − exp(cτ j+1 log k)/k
6 2d(x, y)τ j+1 log k ,
where in the last line we have used again 1 − e −u 6 u and the value of c.
5 Mirror descent
We now prove Theorem 2.2.
5.1 Preliminaries
Consider an Rn -set-valued map F with domain X ⊆ Rn . We will be interested in the following
viability problem (i.e., a differential inclusion with a constraint set for the solution): Given a constraint
set K ⊆ X and initial point x0 ∈ K, find an absolutely continuous solution x : [0, ∞) → K such that
∂t x(t) ∈ F(x(t)) ,
x(0) x0 .
The upshot is that, under appropriate continuity condition on F, this problem has a solution
provided that F always contain admissible directions, that is F(x) ∩ TK (x) , ∅ where TK (x) is the
tangent cone to K at x (see definition below). We now recall the needed definitions with some
basic results, and state the general existence theorem from [AC84].
Definition 5.1. The polar N ◦ of a set N ⊆ Rn is
N ◦ : {z ∈ Rn : hz, yi 6 0 for all y ∈ N } .
The normal cone to K at x is
and the tangent cone to K at x is
NK (x) (K − x)◦ ,
TK (x) : NK (x)◦ .
Lemma 5.2 (Moreau’s decomposition [HUL93, Thm III.3.2.5]). Let N be a cone. Then for any x ∈ Rn
there is a unique pair (u, v) ∈ N × N ◦ such that hu, vi 0 and x u + v. Furthermore u (resp., v) is the
projection of x onto N (resp., N ◦ ).
24
Definition 5.3. F is upper semicontinuous (u.s.c.) if for any x ∈ X and any open neighborhood
N ⊃ F(x) there exists a neighborhood M of x such that F(M) ⊆ N. F is upper hemicontinuous (u.h.c.)
if, for any θ ∈ Rn , the support function x 7→ sup y∈F(x) hθ, yi is upper semicontinuous.
Lemma 5.4 ([AC84, Prop. 1, pg. 60; Cor. 2, pg. 63]). For any F as above, u.s.c. implies u.h.c., and
moreover if F takes compact, convex values then the two notions are equivalent.
Lemma 5.5 ([AC84, Thm. 1, pg. 41]). Let F and G be two set valued maps such that F is u.s.c., F takes
compact values, and the graph of G is closed. Then the set-valued mapping x 7→ F(x) ∩ G(x) is u.s.c.
Theorem 5.6 ([AC84, Thm. 1, pg. 180]). Assume that F is u.h.c. and takes compact, convex values, and
that K is compact. Furthermore assume the tangential condition: For any x ∈ X,
F(x) ∩ TK (x) , ∅ .
Then the viability problem admits an absolutely continuous solution.
5.2 Existence
We prove the following theorem which can be viewed as a non-Euclidean extension of [AC84, pg.
217].
Theorem 5.7. Let K ⊆ Rn be a compact convex set, let H : K → {A ∈ Rn×n : A ≻ 0} be continuous, and
let f : [0, ∞) × K → Rn be continuous. Then, for any x0 ∈ K, there is an absolutely continuous solution
x : [0, ∞) → K K satisfying
∂t x(t) ∈ H(x) f (t, x(t)) − NK (x(t)) ,
x(0) x0 .
(5.1)
Furthermore, any solution to the viability problem satisfies
2
∂t x(t) argmin kv − H(x) f (t, x(t))kx,∗
: v ∈ TK (x(t)) .
(5.2)
k∂t x(t)kx,∗ 6 k f (t, x)kx .
(5.3)
In particular, one has
Proof. It suffices to prove the existence on any time interval [T, T + 1]. We denote h·, ·ix for the
inner product induced by H(x) (i.e., hα, βix : hα, H(x)βi), k · kx for the corresponding norm, and
k · kx,∗ for its dual norm. To apply Theorem 5.6, consider the following differential inclusion, with
K [T, T + 1] × K,
e
x ′(t) ∈ F(e
x (t)) ,
where F : K → 2R
n+1
defined by
F(t, x) : 1, H(x) f (t, x) − NK (x)) ∩ {v ∈ Rn : kv kx,∗ 6 k f (t, x)kx }
.
Thanks to the restriction to velocities satisfying kv kx,∗ 6 k f (t, x)kx , it holds that F(t, x) is compact
(it is also clearly convex). Moreover, K is compact. Thus, besides the tangential condition, it remains
to show that F is u.h.c. Since F is compact and convex valued, by Lemma 5.4 it suffices to show
that F is u.s.c. For this we apply Lemma 5.5. Note that {(1, H(x)( f (t, x) − y)) : x ∈ K, y ∈ NK (x)}
is closed (using again continuity of H and f ), and thus it suffices to show that the mapping
x 7→ {v ∈ Rn : kv kx,∗ 6 k f (t, x)kx } is u.s.c., which is clearly true since its support function in
direction θ is x 7→ k f (t, x)kx kθkx which is continuous by continuity of H and f .
25
It remains to check the tangential condition. We note that
NK (t, x)
TK (t, x)
(
(
(−∞, 0] × NK (x) t 0 ,
{0} × NK (x)
otherwise.
[0, ∞) × TK (x)
R × TK (x)
t 0,
otherwise.
Thus it suffices to show that there exists u ∈ NK (x) such that kH(x)( f (t, x) − u)kx,∗ 6 k f (t, x)kx
and H(x)( f (t, x) − u) ∈ TK (x).
We apply Moreau’s decomposition (Lemma 5.2) in Rn equipped with the inner product h·, ·ix to
the cone NK (x) and write f (t, x) u + v where u ∈ NK (x) and v is in the polar (w.r.t. h·, ·ix ) of NK (x).
Since hu, vix 0, we have k f (t, x) − u kx 6 k f (t, x)kx . This gives kH(x)( f (t, x) − u)kx,∗ 6 k f (t, x)kx .
Furthermore since v is in the polar, we have for all y ∈ NK (x), h f (t, x) − u, yix 6 0 which means
that H(x)( f (t, x) − u) ∈ TK (x). This concludes the existence proof.
Since the objective function in (5.2) is strongly convex, the optimality condition of (5.2) shows
that any v ∈ TK (x(t)) satisfying H(x)−1 (v − H(x) f (t, x(t))) ∈ −TK (x(t))◦ is the unique solution.
Now, we note that ∂t x(t) ∈ TK (x(t)) because x(t) ∈ K and
H(x)−1 (∂t x(t) − H(x) f (t, x(t))) ∈ −NK (x(t)) −TK (x(t))◦ ,
where we used that TK (x(t))◦ NK (x(t))◦◦ NK (x(t)) (since NK (x(t)) is a closed and convex cone).
This establishes (5.2).
Since we exhibited a solution satisfying (5.3), the almost everywhere uniqueness of ∂t x(t) shows
that (5.3) holds for any solution.
5.3 Uniqueness
We prove here that the solution to the viability problem is in fact unique under slightly more
restrictive assumptions than those in Theorem 5.7. In what follows, we denote, as in the proof of
Theorem 5.7, h·, ·ix for the inner product induced by H(x), k · kx for its corresponding norm and
k · kx,∗ for its dual norm.
Lemma 5.8. Let x(t) be an absolutely continuous path with values in a convex set K ⊆ Rn . Then,
∂t x(t) ∈ NK (x(t))⊥ almost everywhere.
Proof. For any t such that ∂t x(t) exists, one has
x(t + h) x(t) + h∂t x(t) + o(h) .
In particular for any y ∈ NK (x(t)), since x(t + h) ∈ K, one has
y, x(t + h) − x(t) 6 0.
Taking h → 0+ , we obtain y, ∂t x(t) 6 0. Taking h → 0− , we obtain y, ∂t x(t) > 0. Therefore,
∂t x(t) ∈ NK (x(t))⊥ .
Lemma 5.9. The solution x(t) in Theorem 5.7 is unique provided that H is Lipschitz, and f is locally
Lipschitz.
Proof. Let x(t) and x̃(t) be two solutions to the viability problem. We show that for any T > 0 there
are some constants C, ε > 0 such that for all t ∈ [T, T + ε],
2
2
,
6 C kx(t) − x̃(t)kx(t),∗
∂t kx(t) − x̃(t)kx(t),∗
26
(5.4)
which concludes the proof by a simple application of Gronwall’s inequality (notice that since H is
continuous and K is compact, there is some constant ε′ such that H −1 (x) ε′In , ∀ x ∈ K).
Recall that we have ∂t x(t) H(x(t))( f (t, x(t)) − u(t)) for some u(t) ∈ NK (x(t)) (and similarly
for x̃ there is some path ũ in the normal cones). In particular we get:
1
2
∂t kx(t) − x̃(t)kx(t),∗
hx(t) − x̃(t), H(x(t))( f (t, x(t)) − u(t)) − H(x̃(t))( f (t, x̃(t)) − ũ(t))ix(t),∗
2
(5.5)
1
(5.6)
+ (x(t) − x̃(t))⊤ (∂t H(x(t))−1 )(x(t) − x̃(t)) .
2
Denote k · kop for the spectral norm, and observe that by continuity of H and compactness of K,
there exists M > 0 such that for all t, kH(x(t))kop , kH(x(t))−1 kop 6 M. Thus we can bound the
term (5.6) as follows:
2
kH(x(t))1/2 (∂t H(x(t))−1 )H(x(t))1/2 kop
(x(t) − x̃(t))⊤ (∂t H(x(t))−1 )(x(t) − x̃(t)) 6 kx(t) − x̃(t)kx(t),∗
2
6 M kx(t) − x̃(t)kx(t),∗
k(∂t H(x(t))−1 )kop .
Now since H is Lipschitz, there exists a constant M ′ such that for all t ∈ [T, T + ε],
k(∂t H(x(t))−1 )kop kH(x(t))−1 (∂t H(x(t)))H(x(t))−1 kop
6 M 2 M ′ k∂t x(t)k2 6 M 3 M ′ k∂t x(t)kx(t),∗ 6 M 3 M ′ k f (t, x(t))kx(t) ,
where the last inequality follows from (5.3). Since f (t, x) is uniformly bounded on [T, T + ε], we
2
finally get that for some C > 0, the term (5.6) is bounded from above by C kx(t) − x̃(t)kx(t),∗
for all
t ∈ [T + ε].
Next we consider the term (5.5) and decompose it into two terms:
(i) (x(t) − x̃(t))⊤ f (t, x(t)) − u(t) − ( f (t, x̃(t)) − ũ(t)) , and
(ii)
x(t) − x̃(t), (H(x(t)) − H(x̃(t))) f (t, x̃(t)) − ũ(t)
We further decompose (i) into
x(t),∗
.
(iii) (x(t) − x̃(t))⊤ ( f (t, x(t)) − f (t, x̃(t))), and
(iv) (x(t) − x̃(t))⊤ (ũ(t) − u(t)).
To bound (iii), we now use that f is locally Lipschitz, which shows that this term is bounded from
above by C kx(t) − x̃(t)kx(t),∗ for any t ∈ [T, T + ε].
The term (iv) is nonpositive since u(t) ∈ NK (x(t)) and ũ(t) ∈ NK (x̃(t)). Finally, for (ii) one can
combine Lipschitzness of H and (5.3) as above to obtain that it is bounded by C kx(t) − x̃(t)kx(t),∗
for all t ∈ [T, T + ε], thus concluding the proof.
Acknowledgements
Part of this work was carried out while M. B. Cohen, Y. T. Lee, and J. R. Lee were at Microsoft
Research in Redmond. We thank Microsoft for their hospitality. M. B. Cohen and A. Madry
˛
are
supported by NSF grant CCF-1553428 and an Alfred P. Sloan Fellowship. J. R. Lee is supported by
NSF grants CCF-1616297 and CCF-1407779 and a Simons Investigator Award.
27
References
[ABBS14] Jacob Abernethy, Peter Bartlett, Niv Buchbinder, and Isabelle Stanton. A regularization
approach to metrical task systems. In Algorithmic Learning Theory, ALT 2010. Springer,
2014. 3
[AC84]
Jean Pierre Aubin and A. Cellina. Differential Inclusions: Set-Valued Maps and Viability
Theory. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1984. 24, 25
[Bar96]
Yair Bartal. Probabilistic approximations of metric spaces and its algorithmic applications. In 37th Annual Symposium on Foundations of Computer Science, FOCS ’96, Burlington,
Vermont, USA, 14-16 October, 1996, pages 184–193, 1996. 2, 21
[Bar98]
Yair Bartal. On approximating arbitrary metrices by tree metrics. In STOC ’98 (Dallas,
TX), pages 161–168. ACM, New York, 1998. 2
[BBK99]
Avrim Blum, Carl Burch, and Adam Kalai. Finely-competitive paging. In 40th Annual
Symposium on Foundations of Computer Science (New York, 1999), pages 450–457. IEEE
Computer Soc., Los Alamitos, CA, 1999. 2
[BBM06]
Yair Bartal, Béla Bollobás, and Manor Mendel. Ramsey-type theorems for metric spaces
with applications to online problems. J. Comput. System Sci., 72(5):890–921, 2006. 2
[BBMN15] Nikhil Bansal, Niv Buchbinder, Aleksander Madry, and Joseph Naor.
A
polylogarithmic-competitive algorithm for the k-server problem. J. ACM, 62(5):Art.
40, 49, 2015. 3, 9
[BBN12]
Nikhil Bansal, Niv Buchbinder, and Joseph Naor. A primal-dual randomized algorithm
for weighted paging. J. ACM, 59(4):Art. 19, 24, 2012. 3
[BCN14]
Niv Buchbinder, Shahar Chen, and Joseph (Seffi) Naor. Competitive analysis via regularization. In Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete
Algorithms, SODA ’14, pages 436–444, Philadelphia, PA, USA, 2014. Society for Industrial and Applied Mathematics. 3
[BE98]
Allan Borodin and Ran El-Yaniv. Online computation and competitive analysis. Cambridge
University Press, New York, 1998. 2
[BLMN05] Yair Bartal, Nathan Linial, Manor Mendel, and Assaf Naor. On metric Ramsey-type
phenomena. Ann. of Math. (2), 162(2):643–709, 2005. 2
[Bub15]
Sébastien Bubeck. Convex optimization: Algorithms and complexity. Foundations and
Trends in Machine Learning, 8(3-4):231–357, 2015. 3
[CMP08]
Aaron Coté, Adam Meyerson, and Laura Poplawski. Randomized k-server on hierarchical binary trees. In STOC’08, pages 227–233. ACM, New York, 2008. 3
[FKL+ 91]
A. Fiat, R. M. Karp, M. Luby, L. A. McGeoch, D. D. Sleator, and Young N. E. Competitive
paging algorithms. J. Algorithms, 12(4):685–699, 1991. 2
[FRT04]
Jittat Fakcharoenphol, Satish Rao, and Kunal Talwar. A tight bound on approximating
arbitrary metrics by tree metrics. J. Comput. Syst. Sci., 69(3):485–497, 2004. 2
[Haz16]
Elad Hazan. Introduction to online convex optimization. Foundations and TrendsÂő in
Optimization, 2(3-4):157–325, 2016. 3
28
[HUL93]
Jean-Baptiste Hiriart-Urruty and Claude Lemaréchal. Convex analysis and minimization
algorithms, Volume I: Fundamentals. Springer-Verlag, 1993. 24
[Kou09]
Elias Koutsoupias. The k-server problem. Computer Science Review, 3(2):105–118, 2009.
2
[KP95]
Elias Koutsoupias and Christos H. Papadimitriou. On the k-server conjecture. J. Assoc.
Comput. Mach., 42(5):971–983, 1995. 2
[MMS90]
Mark S. Manasse, Lyle A. McGeoch, and Daniel D. Sleator. Competitive algorithms for
server problems. J. Algorithms, 11(2):208–230, 1990. 2
[MS91]
Lyle A. McGeoch and Daniel D. Sleator. A strongly competitive randomized paging
algorithm. Algorithmica, 6(6):816–825, 1991. 2
[NY83]
A. Nemirovski and D. Yudin. Problem Complexity and Method Efficiency in Optimization.
Wiley Interscience, 1983. 3
29
| 8cs.DS
|
arXiv:1401.5439v1 [math.AP] 21 Jan 2014
Formal Solutions of a Class of Pfaffian
Systems in Two Variables∗
Moulay Barkatou, Suzy S. Maddah
XLIM UMR 7252 ; DMI
University of Limoges; CNRS
123, Avenue Albert Thomas
87060 Limoges, France
[email protected]
[email protected]
†
Hassan Abbas
Laboratory of Mathematics
Lebanese University
Beirut, Lebanon
[email protected]
January 22, 2014
Abstract
In this article, we present an algorithm which computes a fundamental matrix of formal solutions of completely integrable Pfaffian
systems with normal crossings in two variables, based on [Barkatou,
1997]. A first step was set in [Barkatou et al., 2006] where the problem of rank reduction was tackled via the approach in [Levelt, 1991].
We give instead a Moser-based approach following [Barkatou et al.,
2014; Barkatou, 1995]. And, as a complementary step, we associate
to our problem a system of ordinary linear singular differential equations from which the formal invariants can be efficiently derived via
the package ISOLDE [Barkatou et al., 2013], implemented in the computer algebra system Maple.
Keywords: Linear systems of partial differential equations, Pfaffian systems, Formal solutions, Moser-based reduction, Hukuhara-Turritin’s normal
form
∗
Submitted to the International Symposium on Symbolic and Algebraic Computation,
Kobe, Japan, 2014.
†
Enrolled under a joint PhD program with the Lebanese University
1
1
Introduction
Let O = C[[x1 , x2 , . . . xm ]] be the ring of formal power series in x = (x1 , x2 , . . . , xm )
over the field of complex numbers C and K its field of fractions. Let V be
a K-vector space of dimension n, A(1) , . . . , A(m) be nonzero matrices with
entries in O, and p1 , . . . , pm be nonnegative integers. Set δi = xi ∂x∂ i . Then
the operator ∆i = δi − A(i) /xpi i , i = 1, . . . , m, is a δi -differential operator
acting on V , that is, an additive map from V to itself satisfying the Leibniz
condition:
∀f ∈ O, v ∈ V, ∆i (f v) = δi (f )v + f ∆i (v).
Let Y be an unknown n-dimensional column vector. In this article, we are
interested in the formal reduction of the so-called completely integrable Pfaffian systems with normal crossings, the class of linear systems of partial
differential equations in m variables and dimension n, given by
∆i Y = 0, 1 ≤ i ≤ m.
(1)
satisfying the integrability conditions (pairwise commutativity of the operators),
∆i ◦ ∆j = ∆j ◦ ∆i , 1 ≤ i, j ≤ m.
Pfaffian systems arise in many application [Awane, 2000] including the studies of aerospace and celestial mechanics [Broucke, 1978]. By far, the most
important for applications are those with normal crossings [Novikov et al.,
Pm A(i)
2002]. The associated pfaff (1-form) to system (1) is d =
i=1 pi +1 dxi .
xi
Without loss of generality, the singularity of system(1) is placed at the origin. Otherwise, translations in the independent variables can be performed.
The singular locus of the system is the union of hyperplanes of coordinates
x1 x2 . . . xm = 0. This is what is referred to as normal crossings.
Let T ∈ GL(V ). A change of basis Y = T Z gives rise to
˜ i Z = 0, 1 ≤ i ≤ m
∆
(2)
˜ i = T −1 ∆i T = δi − Ã(i) /xp̃i and
where ∆
i
(i)
Ã(i)
−1 A
T − δi T ),
=
T
(
xpi i
xp̃i i
1 ≤ i ≤ m.
(3)
We say that system (2) is equivalent to system (1). Without loss of generality, we assume that A(i) (xi = 0) are nonzero matrices; otherwise pi can be
readjusted. The m-tuple (p1 , . . . , pm ) of nonnegative integers is called the
Poincaré rank of the system. It is said to be minimal, and is called the
true Poincaré rank, whenever the pi ’s are simultaneously and individually
the smallest among all the possible changes of basis Y = T Z, T ∈ GLn (K).
In [Charrière et al., 1981; van den Essen et al., 1982], the language of stable modules over the ring of power series is used to establish the following theorem (Theorem 1 in [Charrière et al., 1981] and Main Theorem in
[van den Essen et al., 1982]).
2
Theorem 1 Consider the completely integrable system (1). Under additional ramifications, xi = tαi i where αi is a positive integer, 1 ≤ i ≤ m, there
exists T that belongs to GLn (C((t1 , . . . , tm ))) such that the change of basis
Y = T Z gives the equivalent system:
T −1 ∆i T =
∂
− Ã(i) (ti )
∂ti
where Ã(i) (ti ) = Diag(Ãi1 , Ãi2 , . . . , Ãih ), and for all 1 ≤ k ≤ h we have
−1 i
• Ãik = wki (t−1
i )Ink + ti Nk ;
Pαi pi +1
ξijk t−j
• wki (ti ) = j=1
is a polynomial in t−1
with coefficients in C.
i
i
P
α
p
+1
−j
i i
In particular, w̄ki (ti ) = j=2
ξijk ti , for all 1 ≤ k ≤ h, are called
the xi -exponential parts;
• Nki is a square matrix of order nk with elements in C, nilpotent in upper
triangular form;
• n1 + n2 + · · · + nh = n.
This theorem guarantees the existence of a change of basis which takes system
(1) to Hukuhara-Turritin’s normal form from which the construction of a
fundamental matrix of formal solutions (see (6) for m = 2) is straightforward.
In particular, if two systems are equivalent then they have the same xi exponential parts for all 1 ≤ i ≤ m. However, the formal reduction, that
is to say the algorithmic procedure computing such a change of basis, is a
question of another nature.
We remark that the integrability conditions and the property of normal crossings play a major role in establishing this theorem. In particular,
they give rise to the following aspect of system (1) (Proposition 1, page 8,
[van den Essen et al., 1982]).
Proposition 1 The eigenvalues of A(i) (xi = 0), 1 ≤ i ≤ m, lie in the field
of constants.
The univariate case, m = 1, is the well-known case of linear singular system
of ordinary differential equations (ODS, in short) which have been studied
extensively (see, e.g., [Balser, 2000; Wasow, 2002] and references therein).
Moreover, unlike the case of m > 1, algorithms to related problems leading
to the construction of the formal solutions and computation of the exponential parts have been developed by various authors (see, e.g., [Barkatou,
1997; Barkatou et al., 2013, 1999, 2009] and references therein). The package ISOLDE [Barkatou et al., 2013] written in the computer algebra system
Maple is dedicated to the symbolic resolution of ODS and more generally
linear functional matrix equations.
3
The bivariate case, m = 2, is the interest of this article. Our first contribution is an explicit method to compute the xi -exponential parts. Alongside
their importance in the asymptotic theory, their computation reduces the
ultimate task of formal reduction to constructing a basis of the C-space of
regular solutions (see, for m = 1, [Barkatou et al., 1999]). Rank reduction
as well can complement our work into full formal reduction. Rank reduction
is the explicit computation of a change of basis which takes system (1) to
an equivalent system whose rank is the true Poincaré rank. Two well-known
approaches in the uniariate case are those of Levelt [Levelt, 1991] and Moser
[Moser, 1960]. The former is generalized for systems (1) in two variables
(m = 2) in [Barkatou et al., 2006]. The latter, on the other hand, gives a
reduction criterion upon which the efficient algorithms of [Barkatou et al.,
2013] are based. It is generalized for singularly-perturbed linear differential systems in [Barkatou et al., 2014] and examples over the bivariate field
favored its efficiency [Section 4 in [Barkatou et al., 2014]]. Our second contribution is a Moser-based rank reduction algorithm of system (1) in two variables. This establishes its formal reduction upon following the univariate-case
descripiton of [Barkatou, 1997].
We remark that the multivariate particular case of pi = 0 for all 1 ≤ i ≤
m (systems with singularity of first kind) is studied in [LeRoux, 2006] and
references therein.
Our article is organized as follows: In Section 2 we give the preliminaries and restrict our notations to two variables. In Section 3 we review the
formal reduction techniques in [Barkatou, 1997] of ODS, including the computation of the exponential parts. Thereafter the discussion is restricted to
the bivariate case. In Section 4 we present the building blocks of formal
reduction reducing the discussion to two elements. The first of which is the
computation of the xi -exponential parts given in Section 5. The second is the
Moser-based rank reduction algorithm given in Section 6. We finally discuss
the limitations and point out prospects of further investigations in Section
7. Our main results are Theorem 3 and Theorem 4.
2
Preliminaries and Notations
For the clarity of presentation in the bivariate case, we set O = C[[x, y]], K
its field of fractions, Ox = C[[x]], and Oy = C[[y]]. The variables x and y will
be dropped from the notation whenever ambiguity is not likely to arise. We
refer to the identity and zero matrices of prescribed dimensions by Iν and
Oν,µ . System (1) can be rewritten as
(
x ∂Y
= A(x, y)Y = x−p (A0 (y) + A1 (y)x + A2 (y)x2 + . . . )Y
∂x
(4)
y ∂Y
= B(x, y)Y = y −q (B0 (x) + B1 (x)y + B2 (x)y 2 + . . . )Y
∂y
4
where (A0 (y), B0 (x)) is called the leading coefficient pair. The Poincaré rank
of system (4) is thus (p, q) and we refer to (A00 , B00 ) := (A(0, 0), B(0, 0)) as
the leading constant pair. An easy calculation shows that the the integrability
condition is given by
x
∂A
∂B
+ BA = y
+ AB.
∂x
∂y
(5)
It follows from Theorem 1 that a fundamental matrix of formal solutions has
the following form and properties
Φ(x1/s1 , y 1/s2 ) xΛ1 y Λ2 exp(Q1 (x−1/s1 )) exp(Q2 (x−1/s2 ))
(6)
• s = (s1 , s2 ) is two-tuple of positive integers;
• Φ is an invertible meromorphic series in (x1/s1 , y 1/s2 ) over C;
• Q1 , Q2 are diagonal matrices containing polynomials in x−1/s1 and y −1/s2
over C without contant terms; they are obtained by formally integrating the x, y-exponential parts respectively;
• Λ1 and Λ2 are constant matrices commuting with Q1 and Q2 .
System (4) (resp. system (1)) is said to be regular singular whenever Q1 and
Q2 are null. In this case s = (1, 1), and the formal series φ converges whenever the series of A and B do. Otherwise, system (4) is irregular singular and
the entries of Q1 , Q2 determine the main asymptotic behavior of the actual
solutions as xi → 0 in appropriately small sectorial regions (Proposition 5.2,
page 232, and Section 4 of [Gérard et al., 1979]). It is shown in [Deligne,
1970; van den Essen, 1979], for the multivariate case in geometric and algebraic settings respectively, that the regularity of system (4) is equivalent to
the regularity of the individual subsystems each considered as a system of
ordinary differential equations. As a consequence, system (4) is regular singular if and only if its true Poincaré rank is (0, 0). And to test its regularity,
algorithms given for m = 1 (e.g.[Barkatou et al., 2009; Levelt, 1991]) can be
applied separately to the individual subsystems.
We end this section by a further characterization of a change of basis T
in the bivariate case, which takes system (4) to an equivalent system in a
weak-triangular form, rather than that of Theorem 1. However, we’ll see in
Theorem 3 that this form suffices to give an insight into the computation of
x, y-exponential parts. The following Proposition is given as [Proposition3,
page 654, [Charrière et al., 1981]] and the proof is to be omitted here due to
the lack of space.
Proposition 2 Consider the completely integrable system (4). Under additional ramification, x = ts1 where s1 is a positive integer, there exists T ∈
GLn (C((t, y))), product of transformations of type diag(tk1 , . . . , tkn ) (where
5
k1 , . . . , kn are nonnegative integers) and transformations in GLn (C[[t, y]]),
such that the change of basis T = Y Z gives the following equivalent system:
(
∂Z
= Ã(t, y)Z
∂t
(7)
∂Z
=
B̃(y)Z
∂y
where Ã(t, y) = Diag(Ã1 , Ã2 , . . . , Ãh ) and for all 1 ≤ k ≤ h
• Ãk = ak (t−1 )Ink + t−1 Nk (y);
Ps1 p+1
ξjk t−j is a polynomial in t−1 with coefficients in C;
• ak (t) = j=1
• Nk is a nk -square matrix with elements in Oy ;
• y q+1B̃(y) ∈ Oy and B̃(y) = Diag(B̃1 , B̃2 , . . . , B̃h );
• y q+1B̃k |y=0 = ck Ink + Fk where ck ∈ C and Fk is a nilpotent constant
matrix.
Ps1 p+1
Remark 1 Let āk (t) = j=2
ξjk t−j then they are the x-exponential parts
of system (7) (resp. system (4)).
3
Formal Reduction of ODS
For m = 1, system (1) reduces to the linear singular differential system of
ordinary equations
x
dY
= A(x)Y = x−p (A0 + A1 x + A2 x2 + . . . )Y
dx
(8)
where A0 := A(0) is the leading coefficient matrix and p is a nonnegative
integer denoting the Poincaré rank. For a fundamental matrix of solutions,
in analogy to (6), we write
Φ(x1/s ) xΛ exp(Q(x−1/s )).
(9)
If T ∈ GLn (C((x))) then the change of basis Y = T Z results in the equivalent
system
dZ
x
= Ã(x)Z = x−p̃ (Ã0 + Ã1 x + Ã2 x2 + . . . )Z.
(10)
dx
The second author of this article developed in [Barkatou, 1997] a recursive
algorithmic process that constitutes of finding, at every step, a change of basis
which results in a system (10) equivalent to system (8) which is either of lower
Poincaré rank or can be decoupled into systems of lower dimensions. At each
step, the starting point is the nature of eigenvalues of the leading coefficient
matrix A0 according to which either a block-diagonalized equivalent system,
a Moser-irreducible one, or the Katz invariant are computed. The following
operations summarize the recursive process:
6
• Block-diagonalization: Whenever A0 has at least two distinct eigenvalues, system (8) can be decoupled into systems of lower dimensions
via the classical Splitting Lemma. For its statement and a constructive
proof one may consult [Section 12, pages 52-54, [Wasow, 2002]].
• Eigenvalue shifting: Whenever A0 has a single nonzero eigenvalue
γ ∈ C, the so-called Eigenvalue shifting
Z
Y = exp( γx−p−1 dx)Z,
(11)
results in a system with a nilpotent leading coefficient matrix (in fact,
Ã(x) = A − x−p γIn ).
• Moser-based rank reduction: This is the rank reduction based on
the reduction criterion defined by Moser in [Moser, 1960]. It results in
an equivalent system whose Poincaré rank is the true Poincaré rank
and whose leading coefficient matrix has the minimal rank among any
possible choice of a change of basis. For an efficient Moser-based rank
reduction algorithm, one may consult [Barkatou et al., 2009]. If the
leading matrix coefficient of the equivalent Moser-irreducible system is
still nilpotent, one proceeds to compute the Katz invariant, a process
for which Moser-irreducibility is a prerequisite.
• Katz invariant:
Definition 1 Given system (8) whose x-exponential parts are denoted
by {w̄k }1≤k≤n . For 1 ≤ k ≤ n, let ζk be the minimum exponent in x
within the terms of w̄k . The Katz invariant of (8) (resp. A(x)) is then
the rational number
κ = −1 − min1≤k≤n ζk .
Katz invariant can be obtained from the characteristic polynomial of
A(x), i.e. det(λI − A(x)), given that A(x) is Moser-irreducible [e.g.
Theorem 1 in [Barkatou, 1997]]. Consider a Moser-irreducible system
(8) whose leading matrix coefficient is nilpotent and κ = ml with l, m
relatively prime positive integers. Then, a ramification, that is to say
a re-adjustement of the independent variable t = x1/m , followed by
Moser-based rank reduction results in an equivalent Moser-irreducible
system whose Poincaré rank is equal to l and its leading matrix coefficient has at least m distinct eigenvalues. Hence, block-diagonalization
may be applied again.
This recursive process results either in a group of decoupled systems with
dimension n = 1 (scalar case) or Poicaré rank p = 0 (system with singularity
of first kind). For the latter case one may consult Chapter 1 in [Wasow,
7
2002] or [Barkatou et al., 1999] for a more general context. The changes of
basis applied at every stage are used to construct a fundamental matrix of
solutions (9). Algorithms of the four described operations are implemented
in Maple (see ISOLDE [Barkatou et al., 2013]).
4
Formal Reduction in the bivariate case
Consider again the completely integrable system (4)
(
= A(x, y)Y = x−p (A0 (y) + A1 (y)x + . . . )Y
x ∂Y
∂x
y ∂Y
= B(x, y)Y = y −q (B0 (x) + B1 (x)y + . . . )Y.
∂y
A major difficulty within the symbolic manipulation of system (4) (resp. system (1)) arises from (3) as it is evident that any transformation applied to
any of the subsystems alters the others. Hence, the generalization of the
univariate-case techniques is not straightforward. In particular, the equivalent system does not necessarily inherit the normal crossings even for very
simple examples, as exhibited by Example 1 in [Section 4, [Barkatou et al.,
2006]] which we recall here.
Example 1 Consider the following completely integrable pfaffian system with
normal crossings of Poincaé rank (3, 1) and true Poincaré rank (0, 0).
#
"
3
2
x
+
y
y
∂Y
−3
Y
x ∂x = A(x, y)Y = x
−1
−y + x3
#
"
.
(12)
2
y
y
∂Y
−1
Y.
y ∂y = B(x, y)Y = y
−2 −3
x3 −y 2
Z computed by the univariate-case MoserThe change of basis Y =
0
y
based rank reduction algorithm, upon regarding the first subsystem as an ODS
in x, results in the following equivalent system
"
#
−2
0
∂Z
x ∂x = Ã(x, y)Z = −1 1 Z
y"
#
2
−y
0
∂Z
−2
Z.
y ∂y = B̃(x, y)Z = y
−2x3 −2y 2
We can see that such a transformation achieves the goal of diminishing the
rank of the first subsystem, considered as an ODS, to its minimum (p̃ = 0).
However, it alters the normal crossings as it introduces the factor y in the
denominator of an entry in Ã. Moreover, it elevates the rank of the second
subystem.
8
The urge to preserve the normal crossings, whose importance is highlighted
in the Introduction, motivates the following definition
Definition 2 Let T ∈ GLn (K). We say that the change of basis Y = T Z
(resp. T ) is compatible with system (4) if the normal crossings of the system is preserved and the Poincaré rank of the individual subsystems is not
elevated.
Remark 2 Clearly, if T is a constant matrix or it lies in GLn (O) then it is
compatible with system (4).
As in the univariate case, the main difficulties in formal reduction arise whenever the leading constant pair consists of nilpotent matrices. Since otherwise
a block diagonalization can be attained. A generalization of the univariatecase Splitting Lemma is given with constructive proof in [Section 5.2, page
233, [Gérard et al., 1979]]. We repeat hereby the theorem without proof.
Theorem 2 Given system (4) with leading constant pair
1
2
A00 = diag(A100 , A200 ) and B00 = diag(B00
, B00
).
1
2
If the matrices in one of the couples (A100 , A200 ) or (B00
, B00
) have no eigenvalues in common, then there exists a unique transformation T ∈ GLn (O)
partitioned conformally
I T 12
T (x, y) =
T 21 I
such that the change of basis Y = T Z results in the following equivalent
system partitioned conformally with A00 , B00 ,
(
x ∂Z
= Ã(x, y)Z = diag(Ã1 , Ã2 )Z
∂x
= B̃(x, y)Z = diag(B̃ 1 , B̃ 2 )Z
y ∂Z
∂y
1
2
1
2
where (Ã100 , Ã200 ) = (A100 , A200 ) and (B̃00
, B̃00
) = (B00
, B00
).
By an eigenvalue shifting (11) we can then arrive at an equivalent system
whose leading constant pair consists of nilpotent matrices. It can be easily verified that such a transformation is compatible with system (4). By
Proposition 1, the matrices of the leading coefficient pair are nilpotent as
well. The case of n = 1 is straightforward and the case of (p, q) = (0, 0) is
already resolved in [Chapter 3, [LeRoux, 2006]]. Henceforth, following Section 3, the problem of formal reduction is reduced now to discussing two
operations: computing Katz invariant and a compatible Moser-based rank
reduction. The former is the subject of the next section.
9
5
Computing Exponential Parts and Katz Invariant
In analogy to Definition 1, the Katz invariant of system (4) is defined as
follows.
Definition 3 Given system (4) whose x, y-exponential parts are denoted by
{āk }1≤k≤n and {b̄k }1≤k≤n respectively. For 1 ≤ k ≤ n, let ζk (resp. ηk ) be
the minimum exponent in x (resp. y) within the terms of āk (resp. b̄k ). The
Katz invariant of (4) is then the two-tuple of rational numbers (κ1 , κ2 ) where
(
κ1 = −1 − min1≤k≤n ζk
κ2 = −1 − min1≤k≤n ηk .
In this section, we show that the x, y-exponential parts of system (4) are
those of the two associated ODS defined below. Hence, the computation of
the x, y-exponential parts (consequently of Q1 , Q2 , and Katz invariant) is
reduced to computations over a univariate field.
Definition 4 Given system (4). Let A(x) := A(x, 0) and B(y) := B(0, y).
We call the following the associated ODS with the first and second subsystem
respectively of (4):
dY
dx
dY
y
dy
x
= A(x) Y
(13)
= B(y) Y
(14)
Theorem 3 Given the completely integrable system (4)
(
= A(x, y)Y = x−p (A0 (y) + A1 (y)x + . . . )Y
x ∂Y
∂x
= B(x, y)Y = y −q (B0 (x) + B1 (x)y + . . . )Y.
y ∂Y
∂y
The x, y-exponential parts of this system are those of its associated ODS (13)
and (14) respectively.
Proof. We prove the theorem for A(x, y). The same follows for B(x, y) by
interchanging the order of the subsystems in system (4). Let s1 , t and T be
as in Proposition 2. Upon the change of independent variable x = ts1 , the
first subsystem of (4) is given by
∂Y
= s1 t−1 A(ts1 , y)Y.
∂t
(15)
By change of basis Y = T Z we arrive at the equivalent subsystem
∂Y
= Ã(t, y)Y
∂t
10
(16)
with the notations and properties as in Proposition 2.
It follows from (3) that
∂T
= s1 t−1 AT − T Ã.
(17)
∂t
On the other hand, we have the following expansions as formal power series
in y whose matrix coefficients lie in C((t))n×n :
A(t, y) =
∞
X
j
Aj (t)y , Ã(t, y) =
j=0
∞
X
Ãj (t)y j ,
j=0
and T (t, y) =
∞
X
Tj (t)y j
(18)
j=0
with leading terms A(ts1 ), Ã, and T respectively. We Plug (18) in (17) and
compare the like-power terms. In particular, we are interested in the relation
between the leading terms which is clearly given by
∂T
= s1 t−1 AT − TÃ.
(19)
∂t
Due to the form of T (t, y) characterized in Theorem 2, it is evident that T ∈
∂
∂
−s1 t−1 A(ts1 ) (resp. x ∂x
−A(x))
GLn (C((t))). Hence, the systems given by ∂t
∂
and ∂t − Ã are equivalent. It follows that they have the same x-exponential
parts āk (t) given in Remark 1.
Two corollaries follow directly from Theorem 3.
Corollary 1 Let κ = (κ1 , κ2 ) be as in Definition 3 denoting the Katz invariant of system (4). Then κ1 (resp. κ2 ) is the Katz invariant of the associate
ODS (13) (resp. (14)).
Corollary 2 Let γ = (γ1 , γ2) denote the true Poincaré rank of system (4).
Then γ1 (resp. γ2 ) is the true Poincaré rank of the associate ODS (13) (resp.
(14)).
Proof. Consider system (13). By (Remark 3, [Barkatou, 1997]) we have
γ1 − 1 ≤ κ1 ≤ γ1 . This fact establishes the proof since γ1 is an integer. The
same holds for system (14).
Hence, the Katz invariant, the true Poincaré rank, and most importantly
Q1 , Q2 in (6), can be computed efficiently over univariate fields using the existing package ISOLDE [Barkatou et al., 2013]. Moreover, since now we know
κ at any stage of formal reduction, it is left to give a compatible Moser-based
rank reduction of system (4). We remark however, that although the rank
reduction of [Barkatou et al., 2006] reduces the Poicaré rank to its minimal
integer value, Moser-based rank reduction results in an equivalent system for
which the Poincaré rank and the rank of the leading matrix coefficient are
both minimal. In the univariate case, this is a necessary component of formal
reduction, in particular when computing the Katz invariant.
11
6
Moser-based Rank Reduction
We consider again system (4) and label its subsystems as follows:
∂Y
= A(x, y)Y = x−p (A0 (y) + A1 (y)x + . . . )Y
∂x
∂Y
= B(x, y)Y = y −q (B0 (x) + B1 (x)y + . . . )Y.
y
∂y
x
(20)
(21)
Let T ∈ GLn (K). To keep track of applied transformations, we use the
following notation for the equivalent system resulting upon the change of
basis Y = T Z.
∂Z
∂x
∂Z
y
∂y
x
= ÃZ,
= B̃Z,
∂T
)
∂x
∂T
T [B] := B̃ = T −1 (BT − y
).
∂y
T [A] := Ã = T −1 (AT − x
(22)
(23)
In particular, T −1 AT will be referred to as the similarity term of T [A].
We study Moser-based rank reduction of subsystem (20). The same results follow for subsystem (21) by interchanging (20) its order in system (4).
We adapt the algorithm given for singularly-perturbed linear differential systems in [Barkatou et al., 2014] since it is well-suited to bivariate fields. It
suffices to verify that the transformations in the proposed algorithm of system (20) are compatible with the second. We will see that this can be
guaranteed by giving an additional structure to A0 (y), in particular form
(24), rather than the form proposed in (Lemma 1, [Barkatou et al., 2014]).
We remark that the algorithm of [Barkatou et al., 2014] is a generalization
of Moser-based rank reduction developed by the second author of this article
in [Barkatou, 1995] over a univariate field. We recall that, in the sequel, we
drop x and y from the notation whenever ambiguity is unlikely to arise. Set
r = rank(A0 (y)).
Following [Barkatou, 1995; Moser, 1960] we define the Moser rank and
Invariant of system (20) as the respective rational numbers:
m(A) = max (0, p +
r
)
n
µ(A) = min {m(T [A])|T ∈ GLn (K)}.
Definition 5 The system (20) (the matrix A respectively) is called Moserreducible if m(A) > µ(A), otherwise it is said to be Moser-irreducible.
It is easy to see from this definition that system (20) is regular if and only if
µ(A) ≤ 1, i.e. the true Poincaré rank is zero.
12
Definition 6 System (4) is said to be Moser-irrreducible whenever each of
its subsystems (20) and (21) is.
The following theorem is the analog of (Theorem 1, [Barkatou et al., 2014]).
Theorem 4 Given System (20) such that A0 (y) is of rank r and m(A) > 1.
A necessary and sufficient condition for A to be Moser-reducible, i.e. for the
existence of a T (x, y) ∈ Gln (K) such that r(Ã0 ) < r, is that the polynomial
θ(λ) := xr det(λI +
A0
+ A1 )|x=0
x
vanishes identically in λ. Moreover, T (x, y) can always be chosen to be compatible with system (21). More precisely, it is a product of transformations
in GLn (Oy ) and polynomial transformations of the form diag(xα1 , . . . , xαn )
where α1 , . . . , αn are nonnegative integers.
Remark 3 By Corollary 2, the true Poincaré rank of system (4) can be deduced from its associated ODS. However, the reduction criterion in Theorem
4 guarantees that the rank of the leading coefficient matrix of the equivalent
Moser-irreducible system is minimum as well, not only its Poincaré rank.
Moreover, this criterion furnishes the construction of the change of basis
T (x, y) as will be demonstrated in the sequel.
Theorem 4 is to be proved after giving its necessary building blocks. We
start by the following lemma.
Lemma 1 There exists a unimodular transformation U(y) ∈ GLn (Oy ) such
that for the resulting equivalent system (22), we have
11
Ã0
O
O
(24)
Ã0 (y) = Ã21
Or−d
O
0
32
31
On−r
Ã0
Ã0
where
Ã11
0
Ã21
0
and
11
Ã0
O
Ã21
Or−d
0
31
Ã0
Ã32
0
are r × d and n × r matrices of full column ranks d and r respectively.
Proof. It suffices to apply the unimodular transformation of (Lemma 1,
[Barkatou et al., 2014]) to A0 (y) and then to the first left block of the resulting similar matrix. Denoting respectively by U1 (y), U2(y) these transformations, we set
13
U(y) = diag(U2 (y), In−r ).U1 (y). Hence, the leading coefficient matrix of
U[A] has the form (24). Clearly, U(y) is compatible with system (21) as it is
unimodular.
Hence, without loss of generality, we assume that A0 (y) is in form (24)
and partition A1 (y) conformally with A0 . Let
11
A0
O
A13
1
.
O
A23
Gλ (A) = A21
(25)
0
1
31
32
33
A0 A0 A1 + λIn−r
Then we have the following Lemma given and proved as (Lemma 2, [Barkatou et al.,
2014]).
Lemma 2 Det(Gλ (A) ≡ 0 vanishes identically in λ if and only if θ(λ) does.
Proposition 3 Suppose that m(A) > 1 and det(Gλ (A)) ≡ 0 where Gλ (A) is
given by (25). Then there exists a unimodular matrix Q(y) in GLn (Oy ) with
det Q(y) = ±1, compatible with system (21), such that the matrix Gλ (Q[A])
has the form
11
A0
O
U111
U211
A21
O
U121
U221
0
,
(26)
Gλ (Q[A]) =
V111 V112 W1 + λIn−r−ρ
W2
M111 M112
M2
W3 + λIρ
where 0 ≤ ρ ≤ n − r, W1 , W3 are square matrices of orders (n − r − ρ) and
ρ respectively , M112 is a null matrix, and
11
11
A0 U111
A0 U111
21
21
,
(27)
rank A0 U1 = rank
A21
U121
11
0
M1 M2
11
A0 U111
< r.
(28)
rank
A21
U121
0
Proof. Since Q(y) is independent form x, it follows from (22) that the discussion can be restricted to the similarity term of the transformations. Hence,
the transformation Q(y) can be constructed as in the proof of (Proposition 2, [Barkatou et al., 2014]). As it is unimodular, it is necessarily compatible with system (21). It remains to remark however, that each row of
[M111 M112 M2 ] is a linear combination of the rows of
11
A0 O U111
.
A21
O U121
0
Hence, by construction, M112 is a null matrix.
14
Proposition 4 If m(A) > 1 and Gλ (A) ≡ 0 is as in (26) with conditions (27) and (28) satisfied, then system (20) (resp. A) is Moser-reducible
and reduction can be carried out with the so-called shearing Y = SZ where
S = diag(xIr , In−r−ρ , xIρ ) if ρ 6= 0 and S = diag(xIr , In−r ) otherwise. Furthermore, this shearing is compatible with system (21).
Proof. We partition A(x, y) conformally with (26)
11
A
A12 A13 A14
A21 A22 A23 A24
A=
A31 A32 A33 A34
A41 A42 A43 A44
where A11 , A22 , A33 , A44 are of dimensions d, r − d, n − r − ρ, ρ
It is easy to verify then, by (22) and (23), that
11
A
A12 x−1 A13
A21 A22 x−1 A23
∂
Ã(x, y) = S −1 AS − xS −1 S =
xA31 xA32
A33
∂x
41
42
−1 43
A
A
x A
− diag(Ir , On−r−ρ, Iρ )
11
B
B 12 x−1 B 13 B 14
B 21 B 22 x−1 B 23 B 24
.
B̃(x, y) = S −1 BS =
xB 31 xB 32
B 33
xB 34
B 41 B 42 x−1 B 43 B 44
Hence, the new leading coefficient matrix
11
A0 O
A21
O
0
Ã0 =
O O
M111 O
respectively.
A14
A24
xA34
A44
is
U111
U121
O
M2
O
O
O
O
where rank(Ã0 ) < r since (27) and (28) are satisfied.
It remains to prove the compatibility of S with the subsystem (21), in
particular, that the normal crossings is preserved. It suffices to prove that the
submatrices of B(x, y) which are multiplied by x−1 , i.e. B 13 , B 23 , B 43 , have
no term independent from x so that no poles in x are introduced. This can
be restated as requiring B 13 (0, y), B 23(0, y), and B 43 (0, y) to be null. This
requirement is always satisfied due to the integrability condition (5). In fact,
we can obtain from the former that
B(0, y)A0(y) − A0 (y)B(0, y) = y
15
∂A0 (y)
.
∂y
(29)
On the other hand, since Gλ (A) is as in (26) then A0 (y) have the following
form (30) and B(0, y) can be partitioned conformally
11
A0
O O O
A21
O O O
0
.
(30)
A0 (y) =
11
V1
V112 O O
M111 O O O
11
B0y
21
B0y
B(0, y) =
31
B0y
41
B0y
12
B0y
22
B0y
32
B0y
42
B0y
13
B0y
23
B0y
33
B0y
43
B0y
14
B0y
24
B0y
34 .
B0y
44
B0y
(31)
Inserting (30) and (31) in (29), one can obtain the desired results by equating
the entries of (29). In particular, upon investigating the entries of the L.H.S.
in (Column 3), (Rows 1 and 2, Column 2), and (Row 4, Column 2), we
observe the following respectively:
11
A0
O
13
B0y
A21
O
0
23 = On,n−ρ−r . The first matrix is of full rank r by
•
V111 V112 B0y
M111 O
13
B0y
construction thus
23 is null.
B0y
11
A0
12
B0y
= Or,r−d. The first matrix is of full rank d by construction
•
A21
0
12
is null.
thus B0y
43
12
12
• Finally, B0y
V112 − M111 B0y
= Oρ,(r−d) . But B0y
is null and V112 is of
43
full column rank r − d by construction and so B0y is null as well.
This completes the proof.
We give hereby the proof of Theorem 4.
Proof. (Theorem 4) For the necessary condition, we proceed as in the
proof of Theorem 1 in [Barkatou et al., 2014]. As for the sufficiency, we set
r = rank(A0 (y)). Without loss of generality, we can assume that A0 (y)
has the form (24). Let Gλ (A) be given as in (25). Then, by Lemma 2,
det(Gλ (A)) vanishes identically in λ if and only if θ(λ) does. Then the
matrix S[Q[A]] where S, Q are as in Propositions 3 and 4 respectively, has
the desired property.
Corollary 3 Given system (4) with Poincaré rank (p, q). A necessary and
sufficient for it to be Moser-reducible is that one of the polynomials
(
θA (λ) := xrank(A0 ) det(λI + Ax0 + A1 )|x=0
θB (λ) := y rank(B0 ) det(λI + By0 + B1 )|y=0
16
vanishes identically in λ. An equivalent Moser-irreducible system can be
attained via a change of basis compatible with both subsystems (20) and (21).
We illustrate the process by this simple example.
Example 2
#
"
3
2
2
x
+
x
+
y
y
∂Y
−3
Y
x ∂x = x
−1
x3 + x2 − y
#
"
2
3
y
−
2y
−
6
y
∂Y
−2
Y
y ∂y = y
−2y
−3y 2 − 2y − 6
(32)
The associated ODS are then respectively:
#
"
3
2
x
+
x
0
∂Y
−3
Y,
x ∂x = x
−1
x3 + x2
#
"
2
3
y
−
2y
−
6
y
∂Y
−2
Y.
y ∂y = y
−2y
−3y 2 − 2y − 6
Via ISOLDE, we compute Q1 =
s1 = s2 = 1 and (6) is given by
−1
I
x 2
Φ(x, y) xΛ1 y Λ2 e
−1
and Q2 =
−1
x
3
3
e y2
+ y2
3
y2
+ y2 I2 . Thus we have
.
+2
Upon the eigenvalue shifting Y = e x e y2 y Z we get from (32)
#
"
3
2
x
+
y
y
∂Z
−3
Z
x ∂x = x
−1
x3 − y
#
"
2
y
y
∂Z
−1
Z
y ∂y = y
−2 −3y
We
3arriveat the system of Example (1). By Algorithm 1, we compute T1 =
yx −y
. Hence, by Z = T1 U, we have
0
1
"
#
−2
0
∂U
x ∂x = −y 1 U
"
#
−2
0
∂U
y ∂y = −2x3 −1 U
1
0
.
By a simple calculation, we find T2 = y
+ 2x3 −1
3
A fundamental matrix of solutions is then given by
3
T1 T2 xΛ1 y Λ2 e x e y2
−2 0
−2 0
.
and Λ2 =
where Λ1 =
0 −1
0 1
−1
17
+ y2
Algorithm 1 Moser-based Rank Reduction of System (4)
Input: A(x, y), B(x, y) of (4)
Output: T (x, y) a change of basis and a Moser-irreducible equivalent
system {T [A], T [B]}. In particular, the Poincaré rank of this system is its
true Poincaré rank.
T ← In ; p ← Poincaré rank of A;
U(y) ← Lemma 1;
A ← U −1 AU; T ← T U;
while Det(Gλ (A) = 0) and p > 0 do
Q(y), ρ ← Proposition 3;
S(x) ← Proposition 4;
P ← QS; T ← T P ;
;
A ← P −1 AP − xS −1 ∂S
∂x
p ← Poincaré rank of A;
U(y) ← Lemma 1;
A ← U −1 AU; T ← T U;
end while.
;
B ← T −1 BT − yT −1 ∂T
∂y
T ← In ; q ← Poincaré rank of B;
U(x) ← Lemma 1;
B ← U −1 BU; T ← T U;
while Det(Gλ (B) = 0) and q > 0 do
Q(x), ρ ← Proposition 3;
S(y) ← Proposition 4;
P ← QS; T ← T P ;
B ← P −1 BP − yS −1 ∂S
;
∂y
q ← Poincaré rank of B;
U(x) ← Lemma 1;
B ← U −1 BU; T ← T U;
end while.
A ← T −1 AT − xT −1 ∂T
;
∂x
return (T, A, B).
18
7
Conclusion and Further Investigations
We gave an explicit method to compute the x, y-exponential parts of a completely integrable pfaffian system with normal crossings in two variables. This
gives the main information about the asymptotic behavior of its solutions.
Moreover, this new approach limited the computations to a finite number
of constant matrices instead of matrix-valued functions and constituted an
eminent portion of the formal reduction. To complement our work, we gave a
Moser-based rank reduction algorithm. Both results, allowed us to generalize
the formal reduction of the univariate case as developed in [Barkatou, 1997]
to the bivariate case. One field to investigate for this bivariate system would
be an algorithm to construct a basis for the space of regular solutions (see,
e.g., [Barkatou et al., 1999, 2013], for m = 1).
Another research direction over bivariate fields is the generalization of
techniques developed here to completely integrable pfaffian systems with no
restriction to the locus of singularities (i.e. general crossings rather than
normal crossings). Such systems are discussed e.g. in [Novikov et al., 2002].
And there remains of course the ultimate task of formal reduction of the
multivariate system with no restriction to the number of variables. Theorem
1 was first given and proved in [Charrière, 1980] for bivariate systems. In
the theory developed there, one operator ∆i was considered and the fact
that Oy and Ox are principal ideal domains was used in many places to
prove that certain modules introduced are free modules. This did not allow
an immediate generalization to the case of more than two variables. The
same obstacle arises in rank reduction whether in [Barkatou et al., 2006] or
in adapting the Moser-based rank reduction algorithm of [Barkatou et al.,
2014; Barkatou, 1995]. This limits our proposed formal reduction in Section
6 to m = 2. However a generalization of Proposition 2 is Theorem 2.3 in
[Charrière et al., 1981]. This furnishes the generalization of Theorem 3 to a
general multivariate system. Furthermore, it motivates the investigation of
their formal reduction since the leading coefficient matrix of a change of basis
which takes the system to a weak-triangular form, would be characterized.
References
M. Barkatou, S.S. Maddah, and H. Abbas. On the Reduction of SingularlyPerturbed Linear Differential Systems. Submitted to ISSAC’14. A preliminary version is available at arXiv.
A. Awane and M. Goze. Pfaffian Systems and k-Symplectic Systems. Springer
Science + Business Media Dordrecht, 2000.
W. Balser. Formal Power Series and Linear Systems of Meromorphic Ordinary Differential Equations. Springer-Verlag, New York, 2000.
19
M. Barkatou. An algorithm to compute the exponential part of a formal
fundamental matrix solution of a linear differential system. Journal of App.
Alg. in Eng. Comm. and Comp., 8(1):1-23, 1997.
M. Barkatou. A Rational Version of Moser’s Algorithm. In Proceedings of the
International Symposium on Symbolic and Algebraic Computation, pages
297-302. ACM Press, July 1995.
M. Barkatou and C. El Bacha. On k-simple forms of first-order linear differential systems and their computation. Journal of Sym. Comput., 54: 36-58,
2013.
M. Barkatou and E. Pflugel. An algorithm computing the regular formal solutions of a system of linear differential equations. Journal of Sym. Comput.,
28, 569-587, 1999.
M. Barkatou and E. Pflugel. On the Moser-and super-reduction algorithms
of systems of linear differential equations and their complexity. Journal of
Sym. Comput., 44 (8), 1017-1036, 2009.
M. Barkatou and E. Pflugel. ISOLDE, Integration of Systems of Ordinary
Linear Differential Equations. Available at: http://isolde.sourceforge.net/
M. Barkatou and N. LeRoux. Rank Reduction of a class of Pfaffian Systems in
Two Variables. In Proceedings of the International Symposium on Symbolic
and Algebraic Computation, pages 204-211. ACM Press, 2006.
R. Broucke. On Pfaff’s equations of motion in dynamics; Applications to
Satellite Theory. Journal of Celestial Mechanics, 18(3): 207-222, 1978.
H. Charrière. Triangulation Formelle de certains Systèmes de Pfaff
Complètement Intégrables et Application à l’etude C ∞ des Systèmes non
Linéaires. Ann. Scuola Norm. Sup. Pisa CI. Sci., 7(4): 625 - 714, 1980.
H. Charrière and R. Gérard. Formal Reduction of Integrable Linear Connexion having a certain kind of Irregular Singularities. Analysis, 1:85-115,
1981.
P. Deligne. Equations Différentielles à Points Singuliers Réguliers. Volume
163 of Lecture Notes In Mathematics. Springer-Verlag,1970.
A. van den Essen. Regular Singularities along Normal Crossings. In Gerard
ramis, editor, Systèmes de Pfaff et Equations Différentielles dans le Champ
Complexe, volume 712 of Lecture Notes in Mathematics, pages 88-130.
Springer-Verlag, 1979.
A. van den Essen et A.H.M. Levelt. Irregular Singularities in Several Variables. Memoirs of AMS, 40(270), 1982.
20
R. Gérard et Y. Sibuya. Etude de certains systèmes de Pfaff avec singularités.
In Gerard ramis, editor, Systemes de Pfaff et Equations Différentielles dans
le Champ Complexe, volume 712 of Lecture Notes in Mathematics, pages
131-288. Springer-Verlag, 1979.
N. LeRoux. Solutions formelles d’équations aux d’érivées partielles. Ph.D.
Thesis. University of Limoges. 2006.
A.H.M. Levelt. Stabilizing Differential Operators: a method for Computing
Invariants at Irregular Singularities. Differential Equations and Computer
Algebra, M. Singer (ed.), pages 181-228, 1991.
Maddah S.S., http : //www.unilim.f r/pages perso/suzy.maddah/
J. Moser. The Order of a Singularity in Fuchs’ Theory. Mathematische
Zeitschrift, 72:379- 398, 1960.
D. Novikov, S. Yakovenko. Lectures on meromorphic flat connections, 2002.
Available at: arXiv:math/0212334
W. Wasow. Asymptotic Expansions for Ordinary Differential Equations.
Dover Phoenix Editions, 2002.
21
| 0math.AC
|
Inverse Classification for Comparison-based Interpretability in Machine Learning
Thibault Laugel1 , Marie-Jeanne Lesot1 , Christophe Marsala1 , Xavier Renard2 , Marcin Detyniecki1,2,3
arXiv:1712.08443v1 [stat.ML] 22 Dec 2017
1
Sorbonne Universitı̈¿œs, UPMC Univ Paris 06, CNRS, LIP6 UMR 7606, 4 place Jussieu 75005 Paris, France
2
AXA – Data Innovation Lab, 48 rue Carnot 92150 Suresnes, France
3
Polish Academy of Science, IBS PAN, Warsaw, Poland
[email protected]
Abstract
In the context of post-hoc interpretability, this paper addresses the task of explaining the prediction of a classifier,
considering the case where no information is available, neither on the classifier itself, nor on the processed data (neither
the training nor the test data). It proposes an instance-based
approach whose principle consists in determining the minimal changes needed to alter a prediction: given a data point
whose classification must be explained, the proposed method
consists in identifying a close neighbour classified differently,
where the closeness definition integrates a sparsity constraint.
This principle is implemented using observation generation in
the Growing Spheres algorithm. Experimental results on two
datasets illustrate the relevance of the proposed approach that
can be used to gain knowledge about the classifier.
Introduction
Bringing transparency to machine learning models is nowadays a crucial task. However, the complexity of today’s bestperforming models as well as the subjectivity and lack of
consensus over the notion of interpretability make it difficult to address.
Over the past few years, multiple approaches have been
proposed to bring interpretability to machine learning, relying on intuitions about what ’interpretable’ means and
what kind of explanations would help a user understand a
model or its predictions. Existing categorizations of interpretability (Bibal 2016; Kim and Doshi-Velez 2017; DoshiVelez and Kim 2017; Biran and Cotton 2017) usually distinguish approaches mainly on the characteristics of these
explanations: given a classifier to be interpreted, in-model
interpretability relies on modifying its learning process to
make it simpler (see for instance Abdollahi et al. 2016).
Other approaches consist in building a new simpler model
to replace the original classifier (Lakkaraju and Rudin 2017;
Angelino et al. 2017). On the contrary, post-hoc interpretability focuses on building an explainer system using the
results of the classifier to be explained.
In this work, we propose a post-hoc approach that aims
at explaining a single prediction of a model through comparison. In particular, given a classifier and an observation
to be interpreted, we focus on finding the closest possible
observation belonging to a different class.
Explaining through particular examples has been shown
in cognitive and teaching sciences to facilitate the learning
process of a user (see e.g. Watson et al. (2008)). This is especially relevant in cases where the classifer decision to explain is complex and other interpretability approaches cannot provide meaningful explanations. Another motivation
for our approach lies in the fact that in many applications
of machine learning today, no information about the original
classifier or existing data is made available to the end-user,
making model- and data-agnostic intepretability approaches
essential.
To address these issues we propose Growing Spheres, a
generative approach that locally explores the input space of
a classifier to find its decision boundary. It has the specifity
of not relying on any existing data other than the observation
to be interpreted to find the minimal change needed to alter
its associated prediction.
The paper is organized as follows: we first present some
existing approaches for post-hoc interpretability and how
they relate to the one proposed in this paper. Then, we
describe the proposed comparison-based approach as well
as its formalization and motivations. We then describe
the Growing Spheres algorithm. Finally, we illustrate the
method through two real-world applications and analyze
how it can be used to gain information about a classifier.
Post-hoc Interpretability
Post-hoc interpretability approaches aim at explaining the
behavior of a classifier around particular observations to let
the user understand their associated predictions, generally
disregarding what the actual learning process of the model
might be. Post-hoc interpretability of results has received
a lot of interest recently (see for instance Kim and DoshiVelez (2017)), especially as black-box models such as deep
neural networks and ensemble models are being more and
more used for classification despite their complexity. This
section briefly reviews the main existing approaches, depending on the hypotheses that are made about available
inputs and on the forms the explanations take. These two
axes of discussion, which obviously overlap, provide a good
framework for the motivations of our approach.
Available Inputs
Let us consider the case of a physician using a diagnostic
tool. It is natural to speculate that (s)he does not have any
information about the machine learning model used to make
disease predictions, neither may (s)he have any idea about
what patients were used to train it. This raises the question
of what knowledge (about the machine learning model and
the training or other data) an end-user has, and hence what
inputs a post-hoc explainer should use.
Several approaches rely specifically on the knowledge of
the algorithm used to make predictions, taking advantage of
the classifier structure to generate explanations (Barbella et
al. 2009; Hendricks et al. 2016). However, in other cases,
no information about the prediction model is available (the
model might be accessible only through an API or a software for instance). This highlights the necessity of having model-agnostic interpretability methods that can explain
predictions without making any hypotheses on the classifier
(Baehrens et al. 2009; Adler et al. 2017; Ribeiro, Singh, and
Guestrin 2016). These approaches, sometimes called sensitivity analyzes, generally try to analyze how the classifier
locally reacts to small perturbations. For instance, Baehrens
et al. (2010) approximate the classifier with Parzen windows
to calculate the local gradient of the model and understand
what features locally impact the class change.
Forms of Explanations
Beyond the differences regarding their inputs, the variety of
existing methods also comes from the lack of consensus regarding the definition, and a fortiori the formalization, of
the very notion of interpretability. Depending on the task
performed by the classifier and the needs of the end-user,
explaining a result can take multiple forms. Interpretability
approaches hence rely on the following assumptions to design explanations:
1. The explanations should be an accurate representation of
what the classifier is doing.
2. The explanations should be understandably read by the
user.
Feature importances (Baehrens et al. 2009; Ribeiro, Singh,
and Guestrin 2016), binary rules (Turner 2016) or visualizations (Krause, Perer, and Bertini 2016) for instance give
different insights about predictions without any knowledge
on the classifier. The LIME approach (Ribeiro, Singh, and
Guestrin 2016) linearily approximates the local decision
boundary of a classifier and calculates the linear coefficients
of this approximation to give local feature importances,
while Hendricks et al. (2016) identify class-discriminative
properties that justify predictions and generate sentences to
explain image classification.
In this paper, we consider the case of instance-based approaches, which bring interpretability by comparing an observation to relevant neighbors (Mannino and Koushik 2000;
Štrumbelj, Kononenko, and Robnik Šikonja 2009; Martens
and Provost 2014; Kabra, Robie, and Branson 2015). These
approaches use other observations (from the train set, from
the test set or generated ones) as explanations to bring transparency to a prediction of a black-box classifier.
One of the motivations for instance-based approaches lies
in the fact that in some cases the two objectives 1 and 2 mentioned above are contradictory and cannot be both reached
in a satisfying way. In these complex situations, finding examples is an easier and more accurate way to describe the
classifier behavior than trying to force a specific inappropriate explanation representation, which would result in incomplete, useless or misleading explanations for the user.
As an illustration, Baehrens et al. (2010) discuss how their
approach based on Parzen windows does not succeed well in
providing explanations for individual predictions that are at
the boundaries of the training data, giving explanation vectors (gradients) actually pointing in the (wrong) opposite direction from the decision boundary. Comparison with observations from the other class would probably make more
sense in such a case and give more useful insights.
Existing instance-based approaches moreover often rely
on having some prior knowledge, be it about the machine
learning model, the train dataset, or other labelled instances.
For instance, Kabra et al. (2015) try to identify which train
observations have the highest direct influence over a single
prediction.
Comparison-based Interpretability
In this section, we motivate the proposed approach in the
light of the two axes of discussion presented in the previous
section.
Explaining by Comparing
Disposing of knowledge on the classifier or data is an asset existing methods can use to create the explanations they
desire. However, the democratization of machine learning
implies that in a lot of nowadays cases, the end-user of an
explainer system does not have access to any of this knowledge, making such approaches unrealistic. In this context,
the need for a comparison-based interpretability tool that
does not rely on any prior knowledge, including any existing
data, constitutes one of the main motivations for our work.
Due to its highly subjective nature, interpretability in
machine learning sometimes looks up to cognitive sciences for a justification for building explanations (when
they do not, they rely on intuitive ideas about what interpretable means). Although not mentioned by the previously cited instance-based approaches, it must be underlined
that learning through examples also possesses a strong justification in cognitive and teaching sciences (Decyk 1994;
Watson and Shipman 2008; Mvududu and Kanyongo 2011;
van Gog, Kester, and Paas 2011). For instance, Watson et al.
(2008) show through experiences that generated examples
help students ’see’ abstract concepts that they had trouble
understanding with more formal explanations.
Driven by this cognitive justification and the need to have
a tool that can be used when the available information is
scarce, we propose an instance-based approach relying on
comparison between the observation to be interpreted and
relevant neighbors.
Principle of the Proposed Approach
In order to interprete a prediction through comparison, we
propose to focus on finding an observation belonging to the
other class and answer the question: ’Considering an observation and a classifier, what is the minimal change we
need to apply in order to change the prediction of this observation?’. This problem is similar to inverse classification (Mannino and Koushik 2000), but we apply it to interpretability.
Explaining how to change a prediction can help the user
understand what the model considers as locally important.
However, compared to feature importances which are often built to have some kind of statistical robustness, this approach does not claim to bring any causal knowledge. On the
contrary, it gives local insights disregarding the global behavior of the model and thus differs from other interpretability approaches. For instance, Ribeiro et al. (2016) evaluate
their method LIME by looking at how faithful to the global
model the local explainer is. However, despite not providing
any causal information, the proposed approach provides the
exact values needed to change the prediction class, which is
also very helpful to the user.
Furthermore, it is important to note that our primary goal
here is to give insights about the classifier, not the reality it
is approximating. This approach thus aims at understanding
a prediction regardless of whether the classifier is right or
wrong, or whether or not the observations generated as explanations are absurd. This characteristic is shared with adversarial machine learning (Tygar 2011; Szegedy et al. 2014;
Goodfellow, Shlens, and Szegedy 2015), which relates to
our approach since it aims at ’fooling’ a classifier by generating close variations of original data in order to change
their predictions. These adversarial examples rely on exploiting weaknesses of classifiers such as their sensitivity to
unknown data, and are usually generated using some knowledge of the classifier (such as its loss function). The approach we propose also relies on generating observations
that might not be realistic but without any knowledge about
the classifier whatsoever and for the purpose of interpretability.
Finding the Closest Ennemy
For simplification purposes, we propose a formalization of
the proposed approach for binary classification. However, it
can be applied to multiclass classification.
Let us consider a problem where a classifier f maps
some input space X of dimension d to an output space
Y = {−1, 1}, and suppose that no information is available about this classifier. Suppose all features are scaled to
the same range. Let x = (xi )i ∈ X be the observation to
be interpreted and f (x) ∈ Y its associated prediction. The
goal of the proposed instance-based approach is to explain
x through an other observation e ∈ X . The final form of
explanation is the difference vector e − x.
In particular, we focus on finding an observation e belonging to a different class than x, i.e. such that f (e) 6= f (x). For
simplification purposes, we call ally an observation belonging to the same class as x by the classifier, and ennemy if it
is classified to the other class.
Recalling objective 1 mentioned earlier, the final explanation e−x we are looking for should be an accurate representation of what the classifier is doing. This is why we decide
to transform this problem into a minimization problem by
defining the function c : X × X → R+ such that c(x, e) is
the cost of moving from observation x to ennemy e.
Using this notation, we focus on solving the following
minimization problem:
e∗ = arg min{c(x, e) | f (e) 6= f (x)}
(1)
e∈X
The difficulty of defining the cost function c comes from
the fact that despite the classifier being designed to learn and
optimize some specific loss function, the considered blackbox hypothesis compells us to choose a different metric.
Thus, we define c as:
c(x, e) = ||x − e||2 + γ||x − e||0
(2)
P
with ||e − x||0 = i≤d 1xi 6=ei ,γ ∈ R+ the weight associated to the vector sparsity and ||.||2 the Euclidean norm.
Looking up to Strumbelj et al. (2009), we choose to use
the l2 norm of the vector e − x as a component of the cost
function to measure the proximity between e and x. However, recalling objective 2, we need to make sure that this
cost function guarantees a final explanation that can be easily read by the user. In this regard, we consider that human
users intuitively find explanations of small dimension to be
simpler. Hence, we decide to integrate vector sparsity, measured by the l0 norm, as another component of the cost function c and combine it with the l2 norm as a weighted average.
Due to the cost function c being discontinuous and the
hypotheses made (black-box classifier and no existing data)
solving problem (1) is difficult. Hence, we choose to solve
sequentially the two components of the cost function using
Growing Spheres, a two-step heuristic approach that approximates the solution of this problem.
Growing Spheres
In order to solve the problem defined in Equation (1), the
proposed approach Growing Spheres uses instance generation without relying on existing data. Thus, considering an
observation to interprete, we ignore in which direction the
closest classifier boundary might be. In this context, a greedy
approach to find the closest ennemy is to explore the input
space X by generating instances in all possible direction until the decision boundary of the classifier is crossed, thus
minimizing the l2 -component of our metric. This step is detailed in the next part, Generation.
Then, in order to make the difference vector of the closest
ennemy sparse, we simplify it by reducing the number of
features used when moving from x to e (thus minimizing the
l0 component of the cost function and generating the final
solution e∗ ), as explained in the Feature Selection part.
An illustration of the two steps of Growing Spheres is
drawn in Figure 1.
Figure 1: Illustration of Growing Spheres: The red circle
represents the observation to interprete, the plus signs observations generated by Growing Spheres (blue for allies, black
for ennemies). The white plus is the final ennemy e∗ used to
generate explanations.
Generation
The generation step of Growing Spheres is detailed in Algorithm 1. Its main idea is to generate observations in the feature space in l2 -spherical layers around x until an ennemy
is found. For two positive numbers a0 and a1 , we define a
(a0 , a1 )-spherical layer SL around x as:
SL(x, a0 , a1 ) = {z ∈ X : a0 ≤ ||x − z||2 ≤ a1 }
To generate uniformly over these subspaces, we use the
YPHL algorithm (Harman and Lacko 2010) which generates observations uniformly distributed over the surface of
the unit sphere. We then draw U[a0, a1 ] -distributed values and
use them to rescale the distances between the generated observations and x. As a result, we obtain observations that are
uniformly distributed over SL(x, a0 , a1 ).
The first step of the algorithm consists in generating uniformly n observations in the l2 -ball of radius η and center
x, which corresponds to SL(x, 0, η) (line 1 of Algorithm 1),
with n and η hyperparameters of the algorithm.
In case this initial generation step already contains ennemies, we need to make sure that the algorithm did not miss
the closest decision boundary. This is done by updating the
value of the initial radius: η ← η/2 and repeating the initial
step until no ennemy is found in the intial ball SL(x, 0, η)
(lines 2 to 5).
However, if no ennemy is found in SL(x, 0, η), we update a0 and a1 using η, generate over SL(x, a0 , a1 ) and repeat this process until the first ennemy has been found (as
detailed in lines 6 to 11).
In the end, Algorithm 1 returns the l2 -closest generated
ennemy e from the observation to be interpreted x (as represented by the black plus in Figure 1).
Once this is done, we focus on making the associated explanation as easy to understand as possible through feature
selection.
Feature Selection
Let e be the closest ennemy found by Algorithm 1. Our second objective is to minimize the l0 component of the cost
function c(x, e) defined in Equation (2). This means that we
Algorithm 1 Growing spheres generation
Require: f : X → {−1; 1} a binary classifier
Require: x ∈ X an observation to be interpreted
Require: Hyperparameters: η, n
Ensure: Ennemy e
1: Generate (zi )i≤n uniformly in SL(x, 0, η)
2: while ∃ e ∈ (zi )i≤n | f (e) 6= f (x) do
3:
η = η/2
4:
Update (zi )i≤n by generating uniformly in
SL(x, (0, η))
5: end while
6: Set a0 = η, a1 = 2η
7: while 6 ∃ e ∈ (zi )i≤n | f (e) 6= f (x) do
8:
a0 = a1
9:
a1 = a1 + η
10:
Generate (zi )i≤n uniformly in SL(x, a0 , a1 )
11: end while
12: Return e, the l2 -closest generated ennemy from x
Algorithm 2 Feature Selection
Require: f : X → {−1; 1} a binary classifier
Require: x ∈ X the observation to be interpreted
Require: e ∈ X | f (e) 6= f (x) the solution of Algorithm 1
Ensure: Ennemy e∗
Set e0 = e
2: while f (e0 ) 6= f (x) do
e∗ = e0
4:
i = arg min |e0j − xj |
j∈[1:d], e0j 6=xj
Update e0i = xi
6: end while
Return e∗
are looking to maximize the sparsity of vector e − x with respect to f (e) 6= f (x). To do this, we consider again a naive
heuristic based on the idea that the smallest coordinates of
e − x might be less relevant locally regarding the classifier
decision boundary and should thus be the first ones to be
ignored.
The feature selection algorithm we use is detailed in Algorithm 2.
The final explanation provided to interprete the observation x and its associated prediction is the vector x − e∗ , with
e∗ the final ennemy identified by the algorithms (represented
by the white plus in Figure 1).
Experiments
The aforementioned difficulties of working with interpretability make it often impossible to evaluate approaches
and compare them one to another.
Some of the existing approaches (Baehrens et al. 2009;
Ribeiro, Singh, and Guestrin 2016; Doshi-Velez and Kim
2017) rely on surveys for evaluation, asking users questions
to measure the extent to which they help the user in performing his final task, in order to assess some kind of explanation
quality. However, creating reproducible research in machine
Feature
Min. shares of referenced articles in Mashable
Avg. keyword (max. shares)
Move
+2016
+913
Table 1: Output examples of Growing Spheres for Article 1,
predicted to be not popular by RF
Feature
Avg. keyword (max. shares)
Min. shares of referenced articles in Mashable
Text subjectivity
Move
-911
-3557
-0.03
Table 2: Output examples of Growing Spheres for Article 2,
predicted to be popular by RF
learning requires to define mathematical proxies for explanation quality.
In this context, we present illustrative examples of the
proposed approach applied to news and image classification. In particular, we analyze how the explanations given
by Growing Spheres can help a user gain knowledge about a
problem or identify weaknesses of a classifier. Additionally,
we check that the explanations can be easily read by a user
by measuring the sparsity of the explanations found.
Application for News Popularity Prediction
We apply our method to explain the predictions of a random
forest algorithm over the news popularity dataset (Fernandes, Vinagre, and Cortez 2015). Given 58 numerical features
created from 39644 online news articles from website Mashable, the task is to predict wether said articles have been
shared more than 1400 times or not. Features for instance
encode information about the format and content of the articles, such as the number of words in the title, or a measure
of the content subjectivity or the popularity of the keywords
used. We split the dataset and train a random forest classifier
(RF) on 70% of the data. We use a grid search to look for
the best hyperparameters of RF (number of trees) and test it
on the rest of the data (0.70 final AUC score). We use γ = 1
to define the cost function c and set the hyperparameters of
Algorithm 1 to η = 0.001 and n = 10000.
Illustrative Example We apply Growing Spheres to two
random observations from the test set (one from each class).
For instance, let us consider the case of an article entitled
’The White House is Looking for a Few Good Coders’ (Article 1). This article is predicted to be not popular by RF.
The explanation vector given by Growing Spheres for this
prediction has 2 non-null coordinates that can be found in
Table 1: among the articles referenced in Article 1, the least
popular of them would need to have 2016 more shares in
order to change the prediction of the classifier. Additionally,
the keywords used in Article 1 are each associated to several
articles using them. For each keyword, the most popular of
these articles would need to have 913 more shares in order
to change the prediction. In other words, Article 1 would
be predicted to be popular by RF if the references and the
keywords it uses were more popular themselves.
On the opposite, as presented in Table 2, these same features would need to be reduced for Article 2, entitled ”Intern’ Magazine Expands Dialogue on Unpaid Work Experience’ and predicted to be popular, to change class. Additionally, the feature ’text subjectivity score’ (score between
0 and 1) would need to be reduced by 0.03, indicating that a
slightly more objective point of view from the author would
lead to have Article 2 predicted as being not popular.
Figure 2: Sparsity distribution over the news test dataset.
Reading: ’30% of the observations of our test dataset have
explanations that use 5 features or less’.
Sparsity Evaluation In order to check whether the proposed approach fulfills its goal of finding explanations that
can be easily understood by the user, we evaluate the global
sparsity of the explanations generated for this problem. We
measure sparsity as the number of non-zero coordinates
of the explanation vector ||x − e∗ ||0 . Figure 2 shows the
smoothed cumulative distribution of this value for all 11893
test data points. We observe that the maximum value over
the whole test dataset is 17, meaning that each observation
of the test dataset only needs to change 17 coordinates or less
in order to cross the decision boundary. Moreover, 80% of
them only need to move in 9 directions or less, that is 15%
of the features only. This shows that the proposed method
indeed achieves sparsity in order to make explanations more
readable. It is important to note that this does not mean that
we only need 17 features to explain all the observations,
since nothing guarantees different explanations use the same
features.
This experiment gives an illustration of how this method
can be used to gain knowledge on articles popularity prediction.
Applications to Digit Classification
Another application for this approach is to get some understanding of how the model behaves in order to improve it.
We use the MNIST handwritten digits database (LeCun et
al. 1998) and apply Growing Spheres to the binary classification problem of recognizing the digits 8 and 9. The filtered
dataset contains 11800 instances of 784 features (28 by 28
pictures of digits). We use a support vector machine classifier (SVM) with a RBF kernel and parameter C = 15. We
a human observer would still probably identify the center
digit as a noised version of the original 9 instead of an 8.
Thus, despite achieving high accuracy and having learned
that bottom-left pixels are important to turn a 9 into an 8 and
reciprocally, the classifier still fails to understand the actual
concepts making digits recognizable to a human.
We also check the sparsity of our approach over the whole
test set (3528 instances). Once again, our method seems to
be generating sparse explanations since 100% of the test
dataset predictions can be interpreted with explanations of
at most 62 features (representing 7.9% of total features).
Conclusion and Future Works
Figure 3: Output example from the application of Growing
Spheres for two instances. Example of original instance x
(left column), its closest ennemy found e∗ (center) and the
explanation vector x − e∗ (right). A white pixel indicates a
0 value, black a 1
train the model on 70% of the data and test it on the rest
(0.98 AUC score). We use the same values for γ and the
hyperparameters of Algorithm 1 as in the first experiment.
Illustrative Example Given a picture of an 8 (Figure 3),
our goal is to understand how, according to the classifier, we
could transform this 8 into a 9 (and reciprocally), in order to
get a sense of what parts of the image are considered important. Our intuition would be that ’closing the bottom loop’ of
a 9 should be the most influential change needed to make a
9 become an 8, and hence features provoking a class change
should include pixels found in the bottom-left area of the
digits. Output examples to interprete a 9 and a 8 predictions
are shown in Figure 3.
Looking at Figure 3, the first thing we observe confirms
our intuition that a good proportion of the non-null coordinates of the explanation vector are pixels located in the
bottom-left part of the digits (as seen in pictures rightcolumn pictures). Hence, we can see when comparing left
and center pictures that Growing Spheres found the closest
ennemies of the original observation by either opening (top
example) or closing (bottom example) the bottom part of the
digits.
However, we also note that some pixels of the explanation
vectors are much harder to understand, such as the ones located on the top right corner of the explanation image for instance. This was to be expected since, as mentioned earlier,
our method is trying to understand the classifier’s decision,
not the reality it is approaximating. In this case, the fact that
the classifier apparently considers these pixels to be influential the classification of these digits could be an evidence of
the learned boundary inaccuracy.
Finally, we note that the closest ennemies found by Growing Spheres (pictures in the center) in both cases are not
proper 8 and 9 digits. Especially in the bottom example,
The proposed post-hoc interpretability approach provides
explanations of a single prediction through the comparison
of its associated observation with its closest ennemy. In particular, we introduced a cost function taking into account the
sparsity of the explanations, and described the implementation Growing Spheres, which answers this problem when
having no information about the classifier nor existing data.
We showed that this approach provides insights about the
classifier through two applications. In the first one, Growing
Spheres allowed us to gain meaningful information about
features that were locally relevant in news popularity prediction. The second application highlighted both strengths
and weaknesses of the support vector machine used for digits classification, illustrating what concepts were learned by
the classifier. Furthermore, we also checked that the explanations provided by the proposed approach are indeed sparse.
Beside collaborating with experts of industrial domains
for explanations validation, outlooks for our work include
focusing on the constraints imposed to the Growing Spheres
algorithm. In numerous real-world applications, the final
goal of the user may be such that it would be useless for him
to have explanations using specific features. For instance, a
business analyst using a model predicting whether or not a
specific customer is going to make a purchase would ideally
have an explanation based on features that he can leverage.
In this context, forbidding the algorithm to generate explanations in specific areas of the input space or using specific
features is a promising direction for future work.
References
[Abdollahi and Nasraoui 2016] Abdollahi, B., and Nasraoui,
O. 2016. Explainable Restricted Boltzmann Machines for
Collaborative Filtering. ICML Workshop on Human Interpretability in Machine Learning (Whi).
[Adler et al. 2017] Adler, P.; Falk, C.; Friedler, S. A.; Rybeck, G.; Scheidegger, C.; Smith, B.; and Venkatasubramanian, S. 2017. Auditing black-box models for indirect influence. Proceedings - IEEE International Conference on Data
Mining, ICDM 1–10.
[Angelino et al. 2017] Angelino, E.; Larus-Stone, N.; Alabi,
D.; Seltzer, M.; and Rudin, C. 2017. Learning Certifiably
Optimal Rule Lists for Categorical Data. Proceedings of the
23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 35–44.
[Baehrens et al. 2009] Baehrens, D.; Schroeter, T.; Harmeling, S.; Kawanabe, M.; Hansen, K.; and Mueller, K.-R.
2009. How to Explain Individual Classification Decisions.
Journal of Machine Learning Research 11:1803–1831.
[Barbella et al. 2009] Barbella, D.; Benzaid, S.; Christensen,
J.; Jackson, B.; Qin, X. V.; and Musicant, D. 2009. Understanding Support Vector Machine Classifications via a Recommender System-Like Approach. Proceedings of the International Conference on Data Mining 305–11.
[Bibal 2016] Bibal, A. 2016. Interpretability of Machine
Learning Models and Representations : an Introduction.
ESANN 2016 proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (April):77–82.
[Biran and Cotton 2017] Biran, O., and Cotton, C. 2017. Explanation and Justification in Machine Learning : A Survey. International Joint Conference on Artificial Intelligence
Workshop on Explainable Artificial Intelligence (IJCAIXAI).
[Decyk 1994] Decyk, B. N. 1994. Using Examples to Teaching Concepts. In Changing College Classrooms: New teaching and learning strategies for an inscreasingly complex
world. 39–63.
[Doshi-Velez and Kim 2017] Doshi-Velez, F., and Kim, B.
2017. Towards A Rigorous Science of Interpretable Machine Learning. 1–12.
[Fernandes, Vinagre, and Cortez 2015] Fernandes, K.; Vinagre, P.; and Cortez, P. 2015. A proactive intelligent decision
support system for predicting the popularity of online news.
In Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), volume 9273, 535–546.
[Goodfellow, Shlens, and Szegedy 2015] Goodfellow, I. J.;
Shlens, J.; and Szegedy, C. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on
Learning Representation.
[Harman and Lacko 2010] Harman, R., and Lacko, V. 2010.
On decompositional algorithms for uniform sampling from
n-spheres and n-balls. Journal of Multivariate Analysis
101(10):2297–2304.
[Hendricks et al. 2016] Hendricks, L. A.; Akata, Z.;
Rohrbach, M.; Donahue, J.; Schiele, B.; and Darrell, T.
2016. Generating visual explanations. Lecture Notes in
Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics)
9908 LNCS:3–19.
[Kabra, Robie, and Branson 2015] Kabra, M.; Robie, A.;
and Branson, K. 2015. Understanding classifier errors by
examining influential neighbors. In Proceedings of the IEEE
Computer Society Conference on Computer Vision and Pattern Recognition, volume 07-12-June, 3917–3925.
[Kim and Doshi-Velez 2017] Kim, B., and Doshi-Velez, F.
2017. Interpretable Machine Learning : The fuss , the concrete and the questions. In ICML Tutorial on interpretable
machine learning.
[Krause, Perer, and Bertini 2016] Krause, J.; Perer, A.; and
Bertini, E. 2016. Using Visual Analytics to Interpret Predictive Machine Learning Models. ICML Workshop on Human
Interpretability in Machine Learning (Whi):106–110.
[Lakkaraju and Rudin 2017] Lakkaraju, H., and Rudin, C.
2017. Learning Cost-Effective and Interpretable Treatment
Regimes. Proceedings of the 20th International Conference
on Artificial Intelligence and Statistics 54(3):166–175.
[LeCun et al. 1998] LeCun, Y.; Bottou, L.; Bengio, Y.; and
Haffner, P. 1998. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86(11):2278–
2323.
[Mannino and Koushik 2000] Mannino, M. V., and Koushik,
M. V. 2000. The Cost Minimizing Inverse Classification
Problem : a Genetic Algorithm Approach. Decision Support
Systems 29(3):283–300.
[Martens and Provost 2014] Martens, D., and Provost, F.
2014. Explaining Data-Driven Document Classifications.
Mis Quarterly 38(1):73–99.
[Mvududu and Kanyongo 2011] Mvududu, N., and Kanyongo, G. Y. 2011. Using real life examples to teach abstract
statistical concepts. Teaching Statistics 33(1):12–16.
[Ribeiro, Singh, and Guestrin 2016] Ribeiro, M. T.; Singh,
S.; and Guestrin, C. 2016. Why Should I Trust You? Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’16
39(2011):1135–1144.
[Štrumbelj, Kononenko, and Robnik Šikonja 2009]
Štrumbelj, E.; Kononenko, I.; and Robnik Šikonja, M.
2009. Explaining instance classifications with interactions of subsets of feature values. Data and Knowledge
Engineering 68(10):886–904.
[Szegedy et al. 2014] Szegedy, C.; Zaremba, W.; Sutskever,
I.; Bruna, J.; Erhan, D.; Goodfellow, I.; and Fergus, R. 2014.
Intriguing properties of neural networks. International Conference on Learning Representation.
[Turner 2016] Turner, R. 2016. A model explanation system. IEEE International Workshop on Machine Learning
for Signal Processing, MLSP 2016-November:1–5.
[Tygar 2011] Tygar, J. D. 2011. Adversarial machine learning. In IEEE Internet Computing, volume 15, 4–6.
[van Gog, Kester, and Paas 2011] van Gog, T.; Kester, L.;
and Paas, F. 2011. Effects of worked examples, exampleproblem, and problem-example pairs on novices’ learning.
Contemporary Educational Psychology 36(3):212–218.
[Watson and Shipman 2008] Watson, A., and Shipman, S.
2008. Using learner generated examples to introduce new
concepts. Educational Studies in Mathematics 69(2):97–
109.
| 2cs.AI
|
Segler et al.
RESEARCH
Generating Focussed Molecule Libraries for Drug
Discovery with Recurrent Neural Networks
arXiv:1701.01329v1 [cs.NE] 5 Jan 2017
Marwin HS Segler1* , Thierry Kogej2 , Christian Tyrchan3 and Mark P Waller4
Abstract
In de novo drug design, computational strategies are used to generate novel molecules with good affinity to the
desired biological target. In this work, we show that recurrent neural networks can be trained as generative
models for molecular structures, similar to statistical language models in natural language processing. We
demonstrate that the properties of the generated molecules correlate very well with the properties of the
molecules used to train the model. In order to enrich libraries with molecules active towards a given biological
target, we propose to fine-tune the model with small sets of molecules, which are known to be active against
that target.
Against Staphylococcus aureus, the model reproduced 14% of 6051 hold-out test molecules that medicinal
chemists designed, whereas against Plasmodium falciparum (Malaria) it reproduced 28% of 1240 test
molecules. When coupled with a scoring function, our model can perform the complete de novo drug design
cycle to generate large sets of novel molecules for drug discovery.
Keywords: computer-assisted drug design; recurrent neural networks
1 Introduction
Chemistry is the language of nature. Chemists speak
it fluently and have made their discipline one of the
true contributors to human well-being, which has
“change[d] the way you live and die”.[1] This is particularly true for medicinal chemistry. However, creating novel drugs is an extraordinarily hard and complex problem.[2] One of the many challenges in drug
design is the sheer size of the search space for novel
molecules. It has been estimated that 1060 drug-like
molecules could possibly be synthetically accessible.[3]
Chemists have to select and examine molecules from
this large space to find molecules that are active towards a biological target. Active means for example
that a molecule binds to a biomolecule, which causes
an effect in the living organism, or inhibits replication
of bacteria. Modern high-throughput screening techniques allow to test molecules in the order of 106 in
the lab.[4] However, larger experiments will get prohibitively expensive. Given this practical limitation of
in vitro experiments, it is desirable to have computational tools to narrow down the enormous search
space. Virtual screening is a commonly used strategy to search for promising molecules amongst mil*
Correspondence: [email protected]
Institute of Organic Chemistry & Center for Multiscale Theory and
Computation, Westfälische Wilhelms-Universität, Münster, Germany
Full list of author information is available at the end of the article
1
lions of existing or billions of virtual molecules.[5]
Searching can be carried out using similarity-based
metrics, which provides a quantifiable numerical indicator of closeness between molecules. In contrast, in
de-novo drug design, one aims to directly create novel
molecules that are active towards the desired biological target.[6, 7] Here, like in any molecular design task,
the computer has to
i create molecules,
ii score and filter them, and
iii search for better molecules, building on the knowledge gained in the previous steps.
Task i, the generation of novel molecules, is usually solved with one of two different protocols.[7]
One strategy is to build molecules from predefined
groups of atoms or fragments. Unfortunately, these approaches often lead to molecules that are very hard to
synthesise.[8] Therefore, another established approach
is to conduct virtual chemical reactions based on expert coded rules, with the hope that these reactions
could then also be applied in practice to make the
molecules in the laboratory.[9] These systems give reasonable drug-like molecules, and are considered as “the
solution” to the structure generation problem.[2] We
generally share this view. However, we have recently
shown that the predicted reactions from these rulebased expert systems can sometimes fail.[10] Also, fo-
Segler et al.
cussing on a small set of robust reactions can unnecessarily restrict the possibly accessible chemical space.
Task ii, scoring molecules and filtering out undesired structures, can be solved with substructure filters for undesirable reactive groups in conjunction
with established approaches such as docking[11] or
machine-learning (ML) approaches.[7, 12, 13] The ML
approaches are split into two branches: Target prediction classifies molecules into active and inactive, and
quantitative structure-activity relationships (QSAR)
seek to quantitatively predict a real-valued measure
for the effectiveness of a substance (as a regression
problem). As molecular descriptors, Signature Fingerprints, Extended-Connectivity (ECFP) and atom
pair (APFP) fingerprints and their fuzzy variants are
the de-facto standard today.[14–16] Convolutional Networks on Graphs are a recent addition to the field
of molecular descriptors.[17, 18] Random Forests and
Neural Networks are currently the most widely used
machine learning models for target prediction.[19–31]
This leads to task iii, the search for molecules with
the right binding affinity combined with optimal molecular properties. In earlier work, this was performed
(among others) with classical global optimisation techniques, for example genetic algorithms or ant-colony
optimisation.[7, 32] Furthermore, de novo design is related to inverse QSAR.[33–36] While in de novo design design, a regular QSAR mapping X → y from
molecular descriptor space X to properties y is used
as the scoring function for the global optimizer, in
inverse QSAR one aims to find an explicit inverse
mapping y → X, and then maps back from optimal
points in descriptor space X to valid molecules. However, this is not well defined, because molecules are
inherently discrete. Several protocols have been developed to address this, for example enumerating all structures within the constraints of hyper-rectangles in the
descriptor space.[33–38] Gómez-Bombarelli et al. proposed to learn continuous representations of molecules
with variational auto-encoders, based on the model
by Bowman et al.,[39] and to perform Bayesian optimisation in this vector space to optimise molecular
properties.[40] Nevertheless, this approach was not applied to create active drug molecules, and did not succeed in optimising more complex molecular properties,
such as emission color and delayed fluorescence decay
rate (kTADF ).[40]
In this work, we suggest a novel, completely datadriven de novo drug design approach. It relies only on
a generative model for molecular structures, based on
a recurrent neural network, that is trained on large
sets of molecules. Generative models learn a probability distribution over the training examples; sampling from this distribution generates new examples
Page 2 of 17
similar to the training data. Intuitively, a generative
model for molecules trained on drug molecules would
"know" how valid and reasonable drug-like molecules
look like, and could be used to generate more druglike molecules. However, for molecules, these models
have been studied rarely, and rigorously only with
traditional models such as Gaussian mixture models
(GMM).[37, 41] Recently, recurrent neural networks
(RNNs) have emerged as powerful generative models
in very different domains, such as natural language
processing,[42] speech,[43] images,[44] video,[45] formal languages,[46] computer code generation,[47] and
music scores.[48] In this work, we highlight the analogy
of language and chemistry, and show that RNNs can
also generate reasonable molecules. Furthermore, we
demonstrate that RNNs can also transfer their learned
knowledge from large molecule sets to directly produce
novel molecules that are biologically active by retraining the models on small sets of already known actives.
We test our models by reproducing hold-out test sets
of known biologically active molecules.
2 Methods
2.1 Representing Molecules
To connect chemistry with language, it is important
to understand how molecules are represented. Usually, they are modeled by molecular graphs, also called
Lewis structures in chemistry. In molecular graphs,
atoms are labeled nodes. The edges are the bonds between atoms, which are labeled with the bond order
(e.g. single, double or triple). One could therefore envision having a model that reads and outputs graphs.
Several common chemistry formats store molecules in
such a manner. However, in models for natural language processing, the input and output of the model
are usually sequences of single letters, strings or words.
We therefore employ the Smiles format, which encodes molecular graphs compactly as human-readable
strings. Smiles is a formal grammar which describes
molecules with an alphabet of characters, for example
c and C for aromatic and aliphatic carbon atoms, O for
oxygen, -, = and # for single, double and triple bonds
(see Figure 1).[49] To indicate rings, a number is introduced at the two atoms where the ring is closed. For
example, benzene in aromatic Smiles notation would
be c1ccccc1. Side chains are denoted by round brackets. To generate valid Smiles, the generative model
would have to learn the Smiles grammar, which includes keeping track of rings and brackets to eventually
close them. In morphine, a complex natural product,
the number of steps between the first 1 and the second 1, indicating a ring, is 32. Having established a
link between molecules and (formal) language, we can
now discuss language models.
Segler et al.
Page 3 of 17
O
O
O
N
N
N
OH
N
Caffeine
CN1c2ncn(C)c2C(=O)N(C)C1=O
Ibuprofen
CC(C)Cc1ccc(cc1)C(C)C(O)=O
HO
O
H
x1:n = (x1 , ..., xn ) and an initial state vector h0 , and
returns a sequence of state vectors h1:n = (h1 , ..., hn )
and a sequence of output vectors y1:n = (y1 , ..., yn ).
The RNN consists of a recursively defined function R,
which takes a state vector hi and input vector xi+1
and returns a new state vector hi+1 . Another function
O maps a state vector hi to an output vector yi .[50]
N
HO
RNN(h0 , x1:n ) = h1:n , y1:n
hi = R(hi−1 , xi )
yi = O(hi )
Morphine
[H][C@]12C=C[C@H](O)[C@@H]3Oc4c5c(C[C@H]1N(C)CC[C@@]235)ccc4O
Figure 1 Examples of molecules and their Smiles
representation. To correctly create smiles, the model has to
learn long term dependencies, for example to close rings
(indicated by numbers) and brackets.
The state vector hi stores a representation of the information about all symbols seen in the sequence so far.
As an alternative to the recursive definition, the recur-
2.2 Language Models and Recurrent Neural Networks
Given a sequence of words (w1 , ..., wi ), language models predict the distribution of the (i + 1)th word
wi+1 .[50] For example, if a language model receives the
sequence "Chemistry is", it would assign different
probabilities to possible next words. "fascinating",
"important", or "challenging" would receive high
probabilities, while "runs" or "potato" would receive
very low probabilities. Language models can both capture the grammatical correctness ("runs" in this sentence is wrong) and the meaning ("potato" does not
make sense). Language models are implemented for
example in message autocorrection in many modern
smartphones. Interestingly, language models do not
have to use words. They can also be based on characters or letters.[50] In that case, when receiving the sequence of characters chemistr, it would assign a high
probability to y, but a low probability to q. To model
molecules instead of language, we simply swap words
or letters with atoms, or, more practically, characters
in the Smiles alphabet, which form a (formal) language. For example, if the model receives the sequence
c1ccccc, there is a high probability that the next symbol would be a "1", which closes the ring, and yields
benzene.
More formally, to a sequence S of symbols si at steps
ti ∈ T , the language model assigns a probability of
Pθ (S) = Pθ (s1 ) ·
T
Y
Pθ (st |st−1 , ..., s1 )
(2)
(3)
(4)
(1)
t=2
where the parameters θ are learned from the training
set.[50] In this work, we use a recurrent neural network (RNN) to estimate the probabilities of Equation
1. In contrast to regular feedforward neural networks,
RNNs maintain state, which is needed to keep track
of the symbols seen earlier in the sequence. In abstract terms, an RNN takes a sequence of input vectors
a)
xt
ht-1
R,O
ht
b)
x1
h0
R,O
θ
yt
x2
h1
h2
R,O
θ
y1
x3
h3
R,O
θ
y2
x4
y3
h4
R,O
θ
θ
y4
Figure 2 a) Recursively defined RNN b) The same RNN,
unrolled. The parameters θ (the weight matrices of the neural
network) are shared over all time steps.
rent network can also be unrolled for finite sequences
(see Figure 2). An unrolled RNN can be seen as a very
deep neural network, in which the parameters θ are
shared among the layers, and the hidden state ht is
passed as an additional input to the next layer. Training the unrolled RNN to fit the parameters θ can then
simply be done by using backpropagation to compute
the gradients with respect to the loss function, which
is categorical cross-entropy in this work.[50]
As the specific RNN function, in this work, we use
the Long Short Term Memory (LSTM), which was introduced by Hochreiter and Schmidhuber.[51] It has
been used successfully in many natural language processing tasks,[42] for example in Google’s Neural Machine Translation system.[52] For excellent in-depth
discussions of the LSTM, we refer to the articles by
Goldberg,[50] Graves,[53] Olah,[54] and Greff et al.[55]
To encode the Smiles symbols as input vectors xt
, we employ the "one-hot" representation.[53] This
means if there are K symbols, and k is the symbol
to be input at step t, then we can construct an input
vector xt with length K, whose entries are all zero except the k-th entry, which is one. If we assume a very
restricted set of symbols {c, 1, \n}, input c would correspond to xt = (1, 0, 0), 1 to xt = (0, 1, 0) and \n to
xt = (0, 0, 1).
The probability distribution Pθ (st+1 |st , ..., s1 ) of the
next symbol given the already seen sequence is thus
Segler et al.
Page 4 of 17
1
2
3
...
7
8
st
c
1
c
...
c
1
xt
(1,0,0)
(0,1,0)
(1,0,0)
(1,0,0)
(0,1,0)
h1
h2
h3
h8
Step t
h9
c1ccccc1\n
yt
st+1
(0.2,0.8,0)
(0.9,0,0.1)
(0.8,0.1,0.1)
1
c
c
...
(0.2,0.8,0)
(0.1,0.1,0.9)
1
\n
gather
symbols
Figure 3 The Symbol Generation and Sampling Process. We start with a random seed symbol s1 , here c, which gets converted into
a one-hot vector x1 and input into the model. The model then updates its internal state h0 to h1 and outputs y1 , which is the
probability distribution over the next symbols. Here, sampling yields s2 =1. Converting s2 to x2 , and feeding it to the model leads to
updated hidden state h2 and output y2 , from which can sample again. This iterative symbol-by-symbol procedure can be continued
as long as desired. In this example, we stop it after observing an EOL (\n) symbol, and obtain the Smiles for benzene. The hidden
state hi allows the model to keep track of opened brackets and rings, to ensure that they will be closed again later.
a multinomial distribution, which is estimated using
the output vector yt of the recurrent neural network
at time step t by
exp(ytk )
Pθ (st+1 = k|st , ..., s1 ) = PK
k′
k′ =1 exp(yt )
(5)
where ytk corresponds to the k-th element of vector
yt .[53] Sampling from this distribution would then
allow generating novel molecules: After sampling a
Smiles symbol st+1 for the next time step t + 1, we
can construct a new input vector xt+1 , which is fed
into the model, and via yt+1 and Equation 5 yields
Pθ (st+2 |st+1 , ..., s1 ). Sampling from the latter generates st+2 , which serves again also as the model’s input for the next step (see Figure 4). This symbol-bysymbol sampling procedure is repeated until the desired number of characters has been generated.[53]
To indicate that a molecule is "completed", each
molecule in our training data finishes with an “end
of line” (EOL) symbol, in our case the single character \n (which means the training data is just a simple
Smiles file). Thus, when the system outputs an EOL,
a generated molecule is finished. However, we simply
continue sampling, thus generating a regular Smiles
file that contains one molecule per line.
In this work, we used a network with three stacked
LSTM layers, using the keras library.[56] The model
was trained with back propagation through time,[53]
using the ADAM optimizer at standard settings.[57]
To mitigate the problem of exploding gradients during
training, a gradient norm clipping of 5 is applied.[53]
2.3 Transfer Learning
For many machine learning tasks, only small datasets
are available, which might lead to overfitting with powerful models such as neural networks. In this situation,
transfer learning can help.[58] Here, a model is first
trained on a large dataset for a different task. Then,
the model is retrained on the smaller dataset, which is
also called fine-tuning. The aim of transfer learning is
to learn general features on the bigger data set, which
also might be useful for the second task in the smaller
data regime. To generate focussed molecule libraries,
we first train on a large, general set of molecules,
then perform fine-tuning on a smaller set of specific
molecules, and after that start the sampling procedure.
2.4 Target Prediction
To verify whether the generated molecules are active
on the desired targets, standard target prediction was
employed. Machine learning-based target prediction
aims to learn a classifier c : M → {1, 0} to decide
whether a molecule m ∈ molecular descriptor space M
is active or not against a target.[12, 13] The molecules
are split into actives and inactives using a threshold
on a measure for the substance effectiveness. pIC50 =
− log10 (IC50 ) is one of the most widely used metrics
for this purpose. IC50 is the half maximal inhibitory
concentration, that is the concentration of drug that is
required to inhibit 50% of a biological target’s function
in vitro.
To predict whether the generated molecules are active towards the biological target of interest, target
prediction models (TPMs) were trained for all the
tested targets (5-HT2A , Plasmodium falciparum and
Staphylococcus aureus). We evaluated Random Forest,
Segler et al.
Page 5 of 17
Logistic Regression, (Deep) Neural Networks and Gradient Boosting Trees (GBT) as models with ECFP4
(Extended Connectivity Fingerprint with a diameter
of 4) as the molecular descriptor.[14, 15] We found
that GBTs slightly outperformed all other models, and
used these as our virtual assay in all studies (see Supporting Information for details). ECFP4 fingerprints
were generated with CDK version 1.5.13.[59, 60] ScikitLearn,[61] xgBoost[62] and keras[56] were used as the
machine learning libraries. For 5-HT2A and Plasmodium, molecules are considered as active for the TPM
if their IC50 reported in ChEMBL is < 100 nm, which
translates to a pIC50 > 7, whereas for Staphylococcus,
we used pMIC > 3.
2.5 Data
The chemical language model was trained on a Smiles
file containing 1.4 million molecules from the ChEMBL
database, which contains molecules and measured
biological activity data. The Smiles strings of the
molecules were canonicalized (which means finding
a unique representation that is the same for isomorphic molecular graphs)[63, 64] before training with
the CDK chemoinformatics library, yielding a Smiles
file that contained one molecule per line.[59, 60] It has
to be noted that ChEMBL contains many peptides,
natural products with complex scaffolds, Michael acceptors, benzoquinones, hydroxylamines, hydrazines
etc. which is reflected in the generated structures (see
below). This corresponds to 72 million individual characters, with a vocabulary size of 51 unique characters.
51 characters is only a subset of all Smiles symbols,
since the molecules in ChEMBL do not contain many
of the heavy elements. As we have to set the number of
symbols as a hyperparameter during model construction, and the model can only learn the distribution over
the symbols present in the training data, this implies
that only molecules with these 51 Smiles symbols seen
during training can be generated during sampling.
The 5-HT2A , the Plasmodium falciparum and the
Staphylococcus aureus dataset were also obtained from
ChEMBL. The molecules for the hold-out test sets
were removed from the training data.
2.6 Model Evaluation
To evaluate the models for a test set T , and a set of
molecules GN generated from the model by sampling,
∩T |
we report the ratio of reproduced molecules |GN
|T | ,
and enrichment over random (EOR), which is defined
as,
EOR =
n
|GN |
m
|RM |
(6)
where n = |GN ∩ T | is the number of reproduced
molecules from T by sampling a set GN of |GN | = N
molecules from the fine-tuned generative model, and
m = |RM ∩ T | is the number of reproduced molecules
from T by sampling a set RM of |RM | = M molecules
from the generic, unbiased generative model trained
only on the large dataset. Intuitively, EOR indicates
how much better the fine-tuned models work when
compared to the general model.
3 Results and Discussion
In this work, we address two points: First, we want
to generate large sets of diverse molecules for virtual screening campaigns. Second, we want to generate smaller, focussed libraries enriched with possibly
active molecules for a specific target. For the first
task, we can train a model on a large, general set
of molecules to learn the Smiles grammar. Sampling
from this model would generate sets of diverse, but unfocused molecules. To address the second task, and to
obtain novel active drug molecules for a target of interest, we perform transfer learning: We select a small
set of known actives for that target and we refit our
pre-trained chemical language model with this small
data-set. After each epoch, we sample from the model
to generate novel actives. Furthermore, we investigate
if the model actually benefits from transfer learning,
by comparing it to a model trained from scratch on
the small sets without pre-training.
3.1 Training the recurrent network
We employed a recurrent neural network with three
stacked LSTM layers, each with 1024 dimensions,
and each one followed by a dropout[65] layer, with
a dropout ratio of 0.2, to regularise the neural network. The model was trained until convergence, using
a batch size of 128. The RNN was unrolled for 64 steps.
It had 21.3 × 106 parameters.
During training, we sampled a few molecules from
the model every 1000 mini-batches to inspect progress.
Within a few 1000 steps, the model starts to output
valid molecules (see Table 1).
3.2 Generating Novel Molecules
To generate novel molecules, 50,000,000 Smiles symbols were sampled from the model symbol-by-symbol.
This corresponded to 976,327 lines, from which 97.7%
were valid molecules after parsing with the CDK
toolkit. Removing all molecules already seen during
training yielded 864,880 structures. After filtering out
duplicates, we obtained 847,955 novel molecules. A few
generated molecules were randomly selected and depicted in Figure 4. The Supporting Information contains more structures. The created structures are not
Segler et al.
Page 6 of 17
Table 1 Molecules sampled during training.
Batch
Generated Example
0
1000
2000
3000
Oc.BK5i%ur+7oAFc7L3T=F8B5e=n)CS6RCTAR((OVCp1CApb)
OF=CCC2OCCCC)C2)C1CNC2CCCCCCCCCCCCCCCCCCCCCCC
O=C(N)C(=O)N(c1occc1OC)c2ccccc2OC
O=C1C=2N(c3cc(ccc3OC2CCC1)CCCc4cn(c5c(Cl)cccc54)C)C
O
F
O
NH
HN
N
O
OH
HN
O
F
F
F
Cl
N
N
H
N
N
O
N
N
O
O
O
10
O
N
HN
H
N
O
N
N
S
ChEMBL
Generated
O
N N
O
NH2
no
no
yes
yes
t-SNE of Phys.Chem Descriptors
15
N
N
N
O
N
O
O
S
O
valid
Ad
F
N
H
N
H
O
5
O
N
O
0
Cl
Figure 4 A few randomly selected, generated molecules. Ad =
Adamantyl
−5
−10
−15
−20
just formally valid, but are also mostly chemically reasonable.
In order to check if the de novo compounds could
be considered as valid starting points for a drug discovery program, we applied the internal AstraZeneca
filters.[66] At AstraZeneca, this flagging system is used
to determine if a compound is suitable to be part of
the high-throughput screening collection (if flagged as
“core” or “backup”) or should be restricted for particular use (flagged as “undesirable” since it contains one
or several unwanted substructures, e.g. undesired reactive functional groups). The filters were applied to
the generated set of 848 k molecules and they flagged
most of them, 640 k (75%), are either core or backup.
Since the same ratio (75%) of core and backup compounds has been observed for the ChEMBL collection,
we therefore conclude that the algorithm generates preponderantly valid screening molecules and faithfully
reproduces the distribution of the training data.
To determine whether the properties of the generated molecules match the properties of the training
data from ChEMBL, we followed the procedure of
Kolb:[67] We computed several molecular properties,
namely molecular weight, BertzCT, the number of Hdonors, H-acceptors, and rotatable bonds, logP and
total polar surface area for randomly selected subsets from both sets with the RDKit[68] library version 2016.03.1. Then, we performed dimensionality reduction to 2D with t-SNE (t-Distributed Stochastic
Neighbor Embedding, a technique analogous to PCA),
which is shown in Figure 5.[69] Both sets overlap almost completely, which indicates that the generated
molecules very well recreate the properties of the training molecules.
−15
−10
−5
0
5
10
15
20
Figure 5 t-SNE projection of 7 physicochemical descriptors of
random molecules from ChEMBL (blue) and molecules
generated with the neural network trained on ChEMBL
(green), to two unitless dimensions. The distributions of both
sets overlap significantly.
Furthermore, we analysed the Bemis-Murcko scaffolds of the training molecules and the sampled
molecules.[70] Bemis-Murcko scaffolds contain the ring
systems of a molecule and the moieties that link these
ring systems, while removing any side chains. They
represent the scaffold, or “core” of a molecule, which
series of drug molecules often have in common. The
number of common scaffolds in both sets, divided by
the union of all scaffolds in both sets (Jaccard index)
is 0.12, which indicates that the language model does
not just modify side chain substituents, but also introduces modifications at the molecular core.
3.3 Generating Active Drug Molecules and Focused
Libraries
3.3.1 Targeting the 5-HT2A receptor
To generate novel ligands for the 5-HT2A receptor,
we first selected all molecules with pIC50 > 7 which
were tested on 5-HT2A from ChEMBL (732 molecules),
and then fine-tuned our pre-trained chemical language
model on this set. After each epoch, we sampled
100,000 chars, canonicalised the molecules, and removed any sampled molecules that were already contained in the training set. Following this, we evaluated the generated molecules of each round of retraining with our 5-HT2A target prediction model (TPM).
Segler et al.
Page 7 of 17
In Figure 4, the ratio of molecules predicted to be
active by the TPM after each round of fine-tuning
is shown. Before fine-tuning (corresponding to epoch
0), the model generates almost exclusively inactive
molecules. Already after 4 epochs of fine-tuning the
model produced a set in which 50% of the molecules
are predicted to be active.
Influence of fine-tuning epochs on the ratio of actives
1.0
Ratio of actives
0.8
0.6
3.3.2 Targeting Plasmodium falciparum (Malaria)
Plasmodium falciparum is a parasite that causes the
most dangerous form of Malaria.[71] To probe our
model on this important target, we used a more
challenging validation strategy. We wanted to investigate whether the model could also propose the same
molecules that medicinal chemists chose to evaluate in
published studies. To test this, first, the known actives
against Plasmodium falciparum with a pIC50 > 8 were
selected from ChEMBL. Then, this set was split randomly into a training (1239 molecules) and a test set
(1240 molecules). The chemical language model was
then fine-tuned on the training set. 7500 molecules
were sampled after each of the 20 epochs of refitting.
Table 2 Reproducting known actives in the Plasmodium test set.
EOR: Enrichment over random.
0.4
#
1
2
3
0.2
pIC50
Train.
Test
Gen. mols.
Reprod.
EOR
>8
>8
>9
1239
100
100
1240
1240
1022
128,256
93,721
91,034
28%
7%
11%
66.9
19.0
35.7
0.0
0
5
10
Epochs of fine-tuning
15
20
Figure 6 Epochs of fine-tuning vs ratio of actives.
Diversity Analysis In order to assess the novelty of
the de novo molecules generated with the fine-tuned
model, a nearest neighbor similarity/diversity analysis
has been conducted using a commonly used 2D fingerprint (ECFP4) based similarity method (Tanimoto
index).[67] Figure 7 shows the distribution of the nearest neighbor Tanimoto index generated by comparing
all the novel molecules and the training molecules before and after n epochs of fine-tuning. For each bin,
the white bars indicate the molecules generated from
the unbiased, general model, while the darker bars indicate the molecules after several epochs of fine-tuning.
Within the bins corresponding to lower similarity, the
number of molecules decreases, while the bins of higher
similarity get populated with increasing numbers of
molecules. The plot thus shows that the model starts
to output more and more similar molecules to the
target-specific training set. Notably, after a few rounds
of training not only highly similar molecules are produced, but also molecules covering the whole range of
similarity, indicating that our method could not only
deliver close analogs but new chemotypes or scaffold
ideas to a drug discovery project.[5] To have the best
of both worlds, that is diverse and focussed molecules,
we therefore suggest to sample after each epoch of retraining and not just after the final epoch.
This yielded 128,256 unique molecules. Interestingly,
we found that our model was able to "redesign" 28%
of the unseen molecules of the test set. In comparison to molecules sampled from the unspecific, untuned
model, an Enrichment over Random (EOR) of 66.9 is
obtained. With a smaller training set of 100 molecules,
the model can still reproduce 7% of the test set, with
an EOR of 19.0. To test the reliance on pIC50 we
chose to use another cut-off of pIC50 > 9, and took
100 molecules in the training set and 1022 in the test
set. 11% of the test set could be recreated, with an
EOR of 35.7. To visually explore how the model populates chemical space, Figure 8 shows a t-SNE plot of
the ECFP4 fingerprints of the test molecules and 2000
generated molecules that were predicted to be active
by the target prediction model for Plasmodium falciparum. It indicates that the model has generated many
similar molecules around the test examples.
3.3.3 Targeting Staphylococcus aureus (Golden Staph)
To evaluate a different target, we furthermore conducted a series of experiments to reproduce known active molecules against Staphylococcus aureus. Here, we
used actives with a pMIC > 3. MIC is the Mean Inhibitory Concentration, the lowest concentration of a
compound that prevents visible growth of a microorganism. As above, the actives were split into a training and a test set. However, here, the availability of
the data allows larger test sets to be used. After finetuning on the training set of 1000 molecules (Table 3,
Entry 1), our model could retrieve 14% of the 6051 test
molecules. When scaling down to a smaller training set
of 50 molecules (the model gets trained on less than
Segler et al.
Page 8 of 17
Figure 7 Nearest-neighbour Tanimoto similarity distribution of the generated molecules for 5-HT2A after n epochs of fine-tuning
against the known actives. The generated molecules are distributed over the whole similarity range. Generated molecules with a
medium similarity can be interesting for scaffold-hopping.[5]
Table 3 Reproducting known actives in the Staphylococcus test set. EOR: Enrichment over random.
Entry
1
2
3a
4b
5c
a Fine-tuning
pMIC
Train.
Test
Gen. mols.
Reprod.
EOR
>
>
>
>
>
1000
50
50
50
0
6051
7001
7001
7001
7001
51,052
70,891
85,755
285
60,988
14%
2.5%
1.8%
0%
6%
155.9
21.6
6.3
—
59.6
3
3
3
3
3
learning rate = 10−4 . b No Pretraining. c 8 Generate-Test cycles.
1% of the data!), it can still reproduce 2.5% of the test
set, and performs 21.6 times better than the unbiased
model (Table 3, Entry 2). Using a lower learning rate
(0.0001, Entry 3) for fine-tuning, which is often done in
transfer learning, does not work as well as the standard
learning rate (0.001, Entry 2). We additionally examined whether the model benefits from transfer learning.
When trained from scratch, the model performs much
worse than the pretrained and subsequently fine-tuned
model (see Figure 9 and Table 3, Entry 4). Pretraining on the large dataset is thus crucial to achieve good
performance against Staphylococcus aureus.
3.4 Simulating Design-Synthesis-Test Cycles
The experiments we conducted so far are applicable if
one already knows several actives. However, in drug
discovery, one often does not have such a set to start
with. Therefore, high throughput screenings are conducted to identify a few hits, which serve as a starting
point for the typical cyclical drug discovery process:
Molecules get designed, synthesised, and then tested
in assays. Then, the best molecules are selected, and
based on the gained knowledge new molecules are designed, which closes the cycle. Therefore, as a final challenge for our model, we simulated this cycle by iterating molecule generation ("synthesis"), selection of the
best molecules with the machine learning-based target prediction ("virtual assay") and retraining the language model with the best molecules ("design") with
Staphylococcus aureus as the target. We thus do not
use a set of known actives to start the structure generation procedure (see Figure 10).
We started with 100,000 sampled molecules from the
unbiased chemical language model. Then, using our
target prediction model, we extracted the molecules
classified as actives. After that, the RNN was finetuned for 5 epochs on the actives, sampling ≈10,000
molecules after each epoch. The resulting molecules
Segler et al.
Page 9 of 17
t-SNE of ECFP4
20
Generated, Predicted Actives
Plasmodium f. Test Set
15
RNN
Target Prediction
Model
1) Retrain
2) Sample
1) Score
2) Filter Inactives
10
5
New Active Molecules
0
−5
−10
−15
−20
−20
−15
−10
−5
0
5
10
15
20
Figure 8 t-SNE plot of the pIC50 >9 test set (blue) and the de
novo molecules predicted to be active (green). The language
model populates chemical space around the test molecules.
Fine-Tuning vs Direct Training
type
1.4
from scratch
pretrained
1.2
Test Loss
1.0
0.8
0.6
Figure 10 Scheme of our de novo design cycle. Molecules are
generated by the chemical language model and then scored
with the target prediction model (TPM). The inactives are
filtered out, and the RNN is retrained. Here, the TPM is a
machine learning model, but it could also be a robot
conducting synthesis and biological assays, or a docking
program.
3.5 Why does the model work?
Our results presented in Section 3.2 show that the
general model trained on a large molecule set has
learned the Smiles rules and can output valid, druglike molecules, which resemble the training data. However, sampling from this model does not help much if
we want to generate actives for a specific target: We
would have to generate very large sets to find actives
for that target among the diverse range of molecules
the model creates, which is indicated by the high EOR
scores in our experiments.
0.4
0.2
0
1
2
3
4
5
6
7
8
0.14
9 10 11 12 13 14 15 16 17 18 19
Epochs
Figure 9 Different training strategies on the Staphylococcus
aureus dataset with 1000 training and 6051 test examples.
Fine-tuning the pretrained model performs better than training
from scratch (lower test loss [cross entropy] is better).
0.12
Normed Frequency
0.0
0.16
0.10
0.08
0.06
0.04
0.02
were filtered with the target prediction model, and the
new actives appended to the actives from the previous
round, closing the loop.
Already after 8 iterations, the model reproduced 416
of the 7001 test molecules from the previous task,
which is 6% (Table 3, Entry 5), and exhibits and EOR
of 59.6. This EOR is higher than if the model is retrained directly on a set of 50 actives (Entry 2). Additionally, we obtained 60,988 unique molecules that
the target prediction model classified as active. This
demonstrates that in combination with a target prediction or scoring model, our model can also perform
the complete de novo-design cycle.
0.00
0
10
20
30
Levenshtein Distance
40
50
60
Figure 11 Histogram of Levenshtein (String edit) distances of
the Smiles of the reproduced molecules to their nearest
neighbour in the training set (Staphylococcus aureus, model
retrained on 50 actives). While in many cases the model
makes changes of a few symbols in the Smiles, resembling
the typical modifications applied when exploring series of
compounds, the distribution of the distances indicates that the
RNN also performs more complex changes by introducing
larger moieties or generating molecules that are structurally
different, but isofunctional to the training set.
When fine-tuned to a set of actives, the probability
distribution over the molecules captured by our model
Segler et al.
is shifted towards molecules active towards our target. To study this, we compare the Levenshtein (String
edit) distance of the generated Smiles to their nearest
neighbours in the training set in Figure 11. The Levenshtein distance of e.g. benzene c1ccccc1 and pyridine
c1ccncc1 would be 1. Figure 11 shows that while the
model often seems to have made small replacements
in the underlying Smiles, in many cases it also made
more complex modifications or even generated completely different Smiles. This is supported also by the
distribution of the nearest neighbour fingerprint similarities of training and rediscovered molecules (ECFP4,
Tanimoto, Figure 12). Many rediscovered molecules
are in the medium similarity regime.
Because we perform transfer learning, during finetuning, the model does not "forget" what it has
learned. A plausible explanation why the model works
is therefore that it can transfer the modifications that
are regularly applied when series of molecules are studied, to the molecules it has seen during fine-tuning.
1.0
Nearest Neighbour Distribution - Training vs Reproduced Molecules
Similarity
0.8
0.6
0.4
0.2
0.0
Figure 12 Violin plot of the nearest-neighbour
ECFP4-Tanimoto similarity distribution of the 50 training
molecules against the rediscovered molecules in Table 3, Entry
2. The distribution suggests the model has learned to make
typical small functional group replacements, but can also
reproduce molecules which are not too similar to the training
data.
4 Conclusion
In this work, we have shown that recurrent neural networks based on the Long Short Term Memory (LSTM)
can be applied to learn a statistical chemical language
model. The model can generate large sets of novel
molecules with similar physico-chemical properties to
the training molecules. This can be used to generate
libraries for virtual screening. Furthermore, we demonstrated that the model performs transfer learning when
fine-tuned to smaller sets of molecules active towards
Page 10 of 17
a specific biological target, which enables the creation
of novel molecules with the desired activity. By iterating cycles of structure generation with the language
model, scoring with a target prediction model (TPM)
and retraining of the model with increasingly larger
sets of highly scored molecules, we showed that we do
not even need a set of active known active molecules to
start our procedure with, as the TPM could also be a
docking program, or a robot conducting synthesis[72]
and biological testing.
We see three main advantages of our method. First,
it is conceptually orthogonal to established molecule
generation approaches, as it learns a generative model
for molecular structures. Second, our method is very
simple to setup, train and to use, and can be adapted
to different datasets without any modifications to the
model architecture, and does not depend on handencoded expert knowledge. Furthermore, it merges
structure generation and optimisation in one model. A
weakness of our model is interpretability. In contrast,
existing de-novo design methods settled on virtual reactions to generate molecules, which has advantages as
it minimises the chance of obtaining "overfit", weird
molecules, and increases the chances to find synthesizable compounds.[2, 7]
To extend our work, it is just a small step to cast
molecule generation as a reinforcement learning problem, where the pre-trained LSTM generator could be
seen as a policy, which can be encouraged to create
better molecules with a reward signal obtained from a
target prediction model.[73] In addition, different approaches for target prediction, for example docking,
could be evaluated.[7, 11]
Deep Learning is not a panacea, and we join Gawehn
et al. in expressing “some healthy skepticism” regarding its application in drug discovery.[26] Generating
molecules that are almost right is not enough, because in Chemistry, a miss is as good as a mile, and
drug discovery is a “needle in the haystack” problem
– in which also the needle looks like hay. Nevertheless, given that we have shown in this work that our
model can rediscover those needles, and other recent
developments,[26, 74–76] we believe that deep neural networks can be complimentary to established approaches in drug discovery. The complexity of the problem certainly warrants the investigation of novel approaches. Eventually, success in the wet lab will determine if the new wave[21] of neural networks will
prevail.
Competing interests
The authors declare that they have no competing interests.
Segler et al.
Acknowledgements
The project was conducted during a research stay of M.S. at
AstraZeneca R&D Gothenburg. We thank H. Chen and O. Engkvist for
valuable discussions and feedback on the manuscript, and G. Klambauer
for helpful suggestions.
Author details
1
Institute of Organic Chemistry & Center for Multiscale Theory and
Computation, Westfälische Wilhelms-Universität, Münster, Germany.
2
External Sciences, Discovery Sciences, AstraZeneca R&D Gothenburg,
Sweden. 3 Department of Medicinal Chemistry, IMED RIA, AstraZeneca
R&D Gothenburg, Sweden. 4 Department of Physics & International
Centre for Quantum and Molecular Structures,Shanghai University,
China.
References
1. Whitesides, G. M. Angew. Chem. Int. Ed. 2015, 54, 3196–3209.
2. Schneider, P.; Schneider, G. J. Med. Chem. 2016, 59, 4077–4086.
3. Reymond, J.-L.; Ruddigkeit, L.; Blum, L.; van Deursen, R. Wiley
Interdisc. Rev. Comp. Mol. Sci. 2012, 2, 717–733.
4. Schneider, G.; Baringhaus, K.-H. Molecular design: concepts and
applications; John Wiley & Sons, 2008.
5. Stumpfe, D.; Bajorath, J. Wiley Interdisc. Rev. Comp. Mol. Sci.
2011, 1, 260–282.
6. Schneider, G.; Fechner, U. Nat. Rev. Drug Disc. 2005, 4, 649–663.
7. Hartenfeller, M.; Schneider, G. Wiley Interdisc. Rev. Comp. Mol.
Sci. 2011, 1, 742–759.
8. Hartenfeller, M.; Zettl, H.; Walter, M.; Rupp, M.; Reisen, F.;
Proschak, E.; Weggen, S.; Stark, H.; Schneider, G. PLoS Comput
Biol 2012, 8, e1002380.
9. Hartenfeller, M.; Eberle, M.; Meier, P.; Nieto-Oberhuber, C.;
Altmann, K.-H.; Schneider, G.; Jacoby, E.; Renner, S. J. Chem. Inf.
Mod. 2011, 51, 3093–3098.
10. Segler, M.; Waller, M. P. manuscript submitted 2016,
11. Kitchen, D. B.; Decornez, H.; Furr, J. R.; Bajorath, J. Nat. Rev.
Drug Disc. 2004, 3, 935–949.
12. Varnek, A.; Baskin, I. J. Chem. Inf. Mod. 2012, 52, 1413–1437.
13. Mitchell, J. B. Wiley Interdisc. Rev. Comp. Mol. Sci. 2014, 4,
468–481.
14. Riniker, S.; Landrum, G. A. J. Cheminf. 2013, 5, 1.
15. Rogers, D.; Hahn, M. J. Chem. Inf. Mod. 2010, 50, 742–754.
16. Alvarsson, J.; Eklund, M.; Engkvist, O.; Spjuth, O.; Carlsson, L.;
Wikberg, J. E.; Noeske, T. J. Chem. Inf. Mod. 2014, 54,
2647–2653.
17. Duvenaud, D. K.; Maclaurin, D.; Iparraguirre, J.; Bombarell, R.;
Hirzel, T.; Aspuru-Guzik, A.; Adams, R. P. Convolutional networks
on graphs for learning molecular fingerprints. Adv. Neural Inf. Proc.
Sys. 2015; pp 2224–2232.
18. Kearnes, S.; McCloskey, K.; Berndl, M.; Pande, V.; Riley, P. arXiv
preprint arXiv:1603.00856 2016,
19. Zupan, J.; Gasteiger, J. Analytica Chimica Acta 1991, 248, 1–30.
20. Gasteiger, J.; Zupan, J. Angew. Chem. Int. Ed. 1993, 32, 503–527.
21. Zupan, J.; Gasteiger, J. Neural networks in chemistry and drug
design; John Wiley & Sons, Inc., 1999.
22. Lusci, A.; Pollastri, G.; Baldi, P. J. Chem. Inf. Mod. 2013, 53,
1563–1575.
23. Unterthiner, T.; Mayr, A.; Klambauer, G.; Steijaert, M.;
Wegner, J. K.; Ceulemans, H.; Hochreiter, S. Adv. 2014, 27.
24. Unterthiner, T.; Mayr, A.; Klambauer, G.; Hochreiter, S. arXiv
preprint arXiv:1503.01445 2015,
25. Schneider, P.; Müller, A. T.; Gabernet, G.; Button, A. L.;
Posselt, G.; Wessler, S.; Hiss, J. A.; Schneider, G. Molecular
Informatics 2016,
26. Gawehn, E.; Hiss, J. A.; Schneider, G. Molecular Informatics 2016,
35, 3–14.
27. Ramsundar, B.; Kearnes, S.; Riley, P.; Webster, D.; Konerding, D.;
Pande, V. arXiv preprint arXiv:1502.02072 2015,
28. Kearnes, S.; Goldman, B.; Pande, V. arXiv preprint
arXiv:1606.08793 2016,
29. Behler, J. Intern. J. Quantum Chem. 2015, 115, 1032–1050.
30. Behler, J.; Parrinello, M. Phys. Rev. Lett. 2007, 98, 146401.
Page 11 of 17
31. Ma, J.; Sheridan, R. P.; Liaw, A.; Dahl, G. E.; Svetnik, V. J. Chem.
Inf. Mod. 2015, 55, 263–274.
32. Reutlinger, M.; Rodrigues, T.; Schneider, P.; Schneider, G. Angew.
Chem. Int. Ed. 2014, 53, 4244–4248.
33. Miyao, T.; Arakawa, M.; Funatsu, K. Molecular Informatics 2010,
29, 111–125.
34. Miyao, T.; Kaneko, H.; Funatsu, K. J. Chem. Inf. Mod. 2016, 56,
286–299.
35. Takeda, S.; Kaneko, H.; Funatsu, K. J. Chem. Inf. Mod. 2016, 56,
1885–1893.
36. Mishima, K.; Kaneko, H.; Funatsu, K. Molecular Informatics 2014,
33, 779–789.
37. White, D.; Wilson, R. C. J. Chem. Inf. Mod. 2010, 50, 1257–1274.
38. Patel, H.; Bodkin, M. J.; Chen, B.; Gillet, V. J. J. Chem. Inf. Mod.
2009, 49, 1163–1184.
39. Bowman, S. R.; Vilnis, L.; Vinyals, O.; Dai, A. M.; Jozefowicz, R.;
Bengio, S. arXiv preprint arXiv:1511.06349 2015,
40. Gómez-Bombarelli, R.; Duvenaud, D.; Hernández-Lobato, J. M.;
Aguilera-Iparraguirre, J.; Hirzel, T. D.; Adams, R. P.;
Aspuru-Guzik, A. arXiv preprint arXiv:1610.02415 2016,
41. Voss, C. Modeling Molecules with Recurrent Neural Networks. 2015;
http://csvoss.github.io/projects/2015/10/08/rnns-and-chemistry.html.
42. Jozefowicz, R.; Vinyals, O.; Schuster, M.; Shazeer, N.; Wu, Y.
arXiv preprint arXiv:1602.02410 2016,
43. Graves, A.; Eck, D.; Beringer, N.; Schmidhuber, J. Biologically
plausible speech recognition with LSTM neural nets. International
Workshop on Biologically Inspired Approaches to Advanced
Information Technology. 2004; pp 127–136.
44. van den Oord, A.; Kalchbrenner, N.; Kavukcuoglu, K. arXiv preprint
arXiv:1601.06759 2016,
45. Srivastava, N.; Mansimov, E.; Salakhutdinov, R. CoRR,
abs/1502.04681 2015, 2.
46. Gers, F. A.; Schmidhuber, E. IEEE Transactions on Neural
Networks 2001, 12, 1333–1340.
47. Bhoopchand, A.; Rocktäschel, T.; Barr, E.; Riedel, S. arXiv preprint
arXiv:1611.08307 2016,
48. Eck, D.; Schmidhuber, J. Finding temporal structure in music:
Blues improvisation with LSTM recurrent networks. Neural
Networks for Signal Processing, 2002. Proceedings of the 2002 12th
IEEE Workshop on. 2002; pp 747–756.
49. Weininger, D. J. Chem. Inf. Comp. Sci. 1988, 28, 31–36.
50. Goldberg, Y. J. Artif. Intell. Res. 2016, 57, 345–420.
51. Hochreiter, S.; Schmidhuber, J. Neural computation 1997, 9,
1735–1780.
52. Johnson, M.; Schuster, M.; Le, Q. V.; Krikun, M.; Wu, Y.;
Chen, Z.; Thorat, N.; Viégas, F.; Wattenberg, M.; Corrado, G.
arXiv preprint arXiv:1611.04558 2016,
53. Graves, A. arXiv preprint arXiv:1308.0850 2013,
54. Olah, C. Understanding LSTM Networks.
http://colah.github.io/posts/2015-08-Understanding-LSTMs/.
55. Greff, K.; Srivastava, R. K.; Koutník, J.; Steunebrink, B. R.;
Schmidhuber, J. arXiv preprint arXiv:1503.04069 2015,
56. Chollet, F. Keras. https://github.com/fchollet/keras, retrieved on
2016-10-24.
57. Kingma, D.; Ba, J. arXiv preprint arXiv:1412.6980 2014,
58. Cireşan, D. C.; Meier, U.; Schmidhuber, J. Transfer learning for
Latin and Chinese characters with deep neural networks. The 2012
International Joint Conference on Neural Networks (IJCNN). 2012;
pp 1–6.
59. Steinbeck, C.; Hoppe, C.; Kuhn, S.; Floris, M.; Guha, R.;
Willighagen, E. L. Current pharmaceutical design 2006, 12,
2111–2120.
60. Steinbeck, C.; Han, Y.; Kuhn, S.; Horlacher, O.; Luttmann, E.;
Willighagen, E. J. Chem. Inf. Comp. Sci. 2003, 43, 493–500.
61. Pedregosa, F. et al. J. Machine Learning Res. 2011, 12, 2825–2830.
62. Chen, T.; Guestrin, C. arXiv preprint arXiv:1603.02754 2016,
63. Weininger, D.; Weininger, A.; Weininger, J. L. J. Chem. Inf. Comp.
Sci. 1989, 29, 97–101.
64. Checked on 14.12.2016.
https://en.wikipedia.org/wiki/Graph_canonization.
Segler et al.
65. Srivastava, N.; Hinton, G. E.; Krizhevsky, A.; Sutskever, I.;
Salakhutdinov, R. Journal of Machine Learning Research 2014, 15,
1929–1958.
66. Cumming, J. G.; Davis, A. M.; Muresan, S.; Haeberlein, M.;
Chen, H. Nat. Rev. Drug Disc. 2013, 12, 948–962.
67. Chevillard, F.; Kolb, P. J. Chem. Inf. Mod. 2015, 55, 1824–1835.
68. RDKit: Open-source cheminformatics; http://www.rdkit.org.
69. Maaten, L. v. d.; Hinton, G. J. Machine Learning Res. 2008, 9,
2579–2605.
70. Bemis, G. W.; Murcko, M. A. J. Med. Chem. 1996, 39, 2887–2893.
71. Williamson, A. E.; Todd, M. H. ACS central science 2016, 2,
687–701.
72. Ley, S. V.; Fitzpatrick, D. E.; Ingham, R.; Myers, R. M. Angew.
Chem. Int. Ed. 2015, 54, 3449–3464.
73. Sutton, R. S.; Barto, A. G. Reinforcement learning: An
introduction; MIT press Cambridge, 1998; Vol. 1.
74. Schmidhuber, J. Neural Networks 2015, 61, 85–117.
75. Altae-Tran, H.; Ramsundar, B.; Pappu, A. S.; Pande, V. arXiv
preprint arXiv:1611.03199 2016,
76. Graves, A.; Wayne, G.; Reynolds, M.; Harley, T.; Danihelka, I.;
Grabska-Barwińska, A.; Colmenarejo, S. G.; Grefenstette, E.; et al.,
Nature 2016, 538, 471–476.
Additional Files
Generated Molecules
In the following, a few randomly selected molecules produced with the
general model trained on ChEMBL are shown.
Page 12 of 17
Segler et al.
Page 13 of 17
Segler et al.
Page 14 of 17
Segler et al.
Page 15 of 17
Segler et al.
Page 16 of 17
Segler et al.
Page 17 of 17
| 9cs.NE
|
Fast Algorithm for Finding Maximum Distance with
Space Subdivision in E2
Vaclav Skala1, Zuzana Majdisova1
1
Faculty of Applied Sciences, University of West Bohemia,
Univerzitni 8, CZ 30614 Plzen, Czech Republic
Abstract. Finding an exact maximum distance of two points in the given set is
a fundamental computational problem which is solved in many applications.
This paper presents a fast, simple to implement and robust algorithm for finding
this maximum distance of two points in E2. This algorithm is based on a polar
subdivision followed by division of remaining points into uniform grid. The
main idea of the algorithm is to eliminate as many input points as possible
before finding the maximum distance. The proposed algorithm gives the
significant speed up compared to the standard algorithm.
Keywords: maximum distance; polar space subdivision; uniform 2D grid;
points reduction
1
Introduction
Finding a maximum distance of two points in the given data set is a fundamental
computational problem. The solution of this problem is needed in many applications.
A standard brute force (BF) algorithm with complexity is usually used, where
is a number of points in the input dataset. If large sets of points have to be
processed, then the BF algorithm leads to very bad time performance. Typical size of
datasets in computer graphics is usually 10 and more points. Therefore the
processing time of the BF algorithm for such sets is unacceptable.
However, our main goal is to find the maximum distance, not all the pairs of two
points having a maximum distance. Therefore the complexity of this algorithm should
be lower.
Various approaches, how to solve finding the maximum distance, are described in
[9]. Other algorithms for finding the maximum distance of two points are in [1], [7].
1.1
Brute Force Algorithm
The standard BF algorithm for finding a maximum distance in set of points uses two
nested loops. We can find such type of algorithms in many books dealing with
fundamental algorithms and data structures, e.g. [4], [6]. In general, the BF algorithm
can be described by Algorithm 1.
//Square of the distance
FUNCTION distance(A,B: point)
distance := (A.x - B.x)^2 + (A.y - B.y)^2;
END FUNCTION
dist := 0;
FOR i := 1 to N-1 do
FOR j := i + 1 to N do
dij := distance(Xi, Xj);
IF dist < dij THEN
dist := dij;
END IF
END FOR
END FOR
dist := SQRT(dist);
Algorithm 1. Brute force algorithm
Complexity of Algorithm 1 is clearly and thus run time significantly
increases with size of the input dataset.
In practice, we can expect that points in input set are not organized in a very
specific manner and points are more or less uniformly distributed. In this case, we can
use “output sensitive” algorithms which lead to efficient solutions. We propose such
algorithm in Section 2.
2
Proposed Algorithm
In this section, we introduce a new algorithm for finding a maximum distance of two
points in the given dataset in E2. The main idea of this algorithm is to eliminate as
many input points as possible using an algorithm with complexity using space
subdivision and determines the maximum distance for the remaining points with
complexity, where ≪ . We use polar space subdivision for this elimination
of points.
This section is organized as follows. In Section 2.1, we present the first step of the
algorithm which is an axis aligned bounding box (AABB) and an initial convex
polygon construction followed by the location of points inside the initial convex
polygon. Section 2.2 describes how to divide the points into non-overlapping 2
triangular shape sectors. Section 2.3 presents reduction of the points [2] which have
absolutely no influence on the value of maximum distance. In Section 2.4, we
describe the division of remaining points into uniform 2 grid. Finally, the finding of
the maximum distance of two points is made in Section 2.5.
2.1
Location of Points inside Initial Polygon
An important property is that two points with maximal distance are lying on the
convex hull of a given set of points [10]. This fact is apparent if we consider a case in
which two points with the largest distance are part of the convex hull. It is then
obvious that there are another two points with larger distance. We also know that the
most extreme point on any axis is part of the convex hull. These properties are used to
significantly speedup the proposed algorithm for finding the exact maximal distance.
At the beginning of our proposed algorithm, we need to find the exact extremal
points in both axes, i.e. axis aligned bounding box (AABB) of a given dataset. The
time complexity of this step is . So we generally get four distinct extremal
points or less.
Now, we can create a convex polygon using these extremal points, see Fig. 1. One
important property of this polygon is that any point lying inside has no influence on
the value of maximal distance. Due to this fact, we can perform a fast and simple
initial test for a point inside/outside the initial polygon and discard a lot of points.
a)
b)
c)
Fig. 1. Location of AABB and initial testing polygon for 10 points: a) uniform points in ellipse,
b) uniform points in rectangle, c) Gauss points.
The location test of a point inside a polygon can be performed as follows. Each
edge of the polygon is an oriented line and so we can calculate outer product [10]:
∧
,
(1)
where is the point and edge with index is determined by point and direction
vector , . If the polygon has an anticlockwise orientation and outer
product 0 for at least one ∈ !0,1,2,3#, then point does not lie inside the
polygon and has to be further processed. Otherwise, point can be discarded as it is
inside.
2.2
Division of Points into Polar Sectors
Only the points which lie outside or on the boundary of the initial convex polygon
will be further processed. Firstly, we perform the division of AABB into eight
non-overlapping 2 triangular shape sectors, i.e. polar subdivision. This division of
AABB is using a center point and angular division, see Fig. 2. The center point $ is
determined as the average of all corners of the AABB.
When we do the division of points into non-overlapping sectors, we also determine
angle between the -axis and the vector % $ for each point . This can be
performed using two different calculations. One way is to use an exact angle
from 0 to 2&. For this approach, we have to calculate the angle using the following
formula:
'( arctg2. , / .
(2)
However, calculation of function arctg2 takes a lot of computing time. Therefore, we
use a simplified calculation of approximated angle. When the angle is determined, we
have to locate the exact sectors (half of the quadrant for square AABB), where the
point is located, and then calculate the intersection with the given edge. Calculation of
the intersection with the given edge of AABB is easy. The distribution of simplified
angle can be seen in Fig. 2. Calculation of simplified angle is faster than the formula
(2).
Fig. 2. Non-overlapping sectors for division and uniform distribution of simplified angle on AABB. Angle
' ∈ 10,8 instead of 10,2&.
Now we have the procedure how to calculate the simplified angle and therefore we
are able to divide the points into sectors to which the given points belong.
For each sector with index , one minimal point 345
is determined. This point has
the minimum (from all points in a sector) distance from the nearest corner of AABB.
(Note that the nearest corner of AABB lies in the same quadrant as the point.) The
initial points 345
are lying on the edges of the initial polygon, see Fig. 3. These
points can be calculated as an intersection point of the middle axis of a sector and the
edge of the initial polygon.
Fig. 3. Visualization of initial 645 points (red dots on the edges of the initial polygon).
All minimum points 345
are connected into a polygon with vertices
…, 345
8 .
For each new point we have to check whether the distance from this point to the
to the same corner of
nearest corner of AABB is smaller than the distance from 345
AABB. If this is true, then we have to replace point 345
with
a
processed point, add
this point into the sector with index and recalculate the test lines 9 : and 9 ; , see
Fig. 4. Otherwise we continue with the next step.
In the next step, we check whether the processed point lies over or under the test
line segments 9 : and 9 ; . We can compare the angle of the point with the angle of
point 345
. If the angle is smaller, then we have to use the line 9 : , otherwise we have
to use the line 9 ; . If the point lies under the test line, it can be eliminated, because
such a point has no influence on the value of maximum distance. Otherwise we add
this point into the sector with index .
3745 ,
Fig. 4. Visualization of test lines 9: and 9; .
2.3
Reduction of Points for Testing
All points, which can have an influence on the value of maximum distance, are
already divided into polar sectors. We gave points 345
some initial values before
starting to divide the points into non-overlapping sectors and we used them to check
whether to add or eliminate a point. Values of points 345
have changed during the
division process; hence we recheck all remaining points using the final values of
. Moreover, we perform union of the vertices of initial polygon and
points 345
minimum points 345
before new testing and connect them into a polygon, see
Fig. 5a).
In this step, we check whether the processed point lies over or under the line
segments 9 :: , 9 : , 9 ; and 9 ;; , see Fig. 5b). We select the concrete test line according
to the angle again.
a)
b)
Fig. 5. Visualization of test lines for rechecking all remaining points
We minimize the number of points, which have an influence on the largest
distance, using this step. Final sets of remaining points for input datasets with
different distributions of points are shown in Fig. 6.
a)
b)
c)
Fig. 6. Remaining points (red dots) which have influence on the maximum distance (10 input points):
a) uniform points in ellipse, b) uniform points in rectangle, c) Gauss points.
2.4
Division of Remaining Points into Uniform Grid
We have a set of suspicious points, i.e. points which can have an influence on the
final maximum distance. In this step, these suspicious points will be further
processed. Firstly, we define the uniform grid of AABB. This uniform grid contains
< cells. Thus, each cell has index =>? ∙ A B>9, width C and height C
where:
C
DDEEFGHI
, C
DDEEI(JIH
.
(3)
Now, we can perform the division of suspicious points into a defined uniform grid.
We are able to calculate the exact index of a cell to which the given point belongs
using following formulae:
45
45
=>? K
L , B>9 M
N,
C
C
(4)
where 45 and 45 are the coordinates of bottom left corner of AABB, see Fig. 7.
After performing previous step, we determined all possible pairs of nonempty
P(QQ
cells. Moreover, for each pair of nonempty cells, the shortest distance CO
, i.e. the
P(QQ
distance of the nearest corners of cells, and the largest distance O , i.e. the distance
of the farthest corners of cells, are determined, see Fig. 7.
Fig. 7. Uniform grid of AABB. Value
shortest distance of two cells.
P(QQ
presents the largest distance of two cells and C P(QQ presents the
2.5 Find Maximal Distance of Two Points
Now a maximum distance of two points in the given dataset can be found by
P(QQ
following steps. We determine the maximum value C4R
from the shortest distances
P(QQ
CO which were calculated for all pairs of nonempty cells. When this value is known,
we can eliminate all pairs of nonempty cells for which the largest distance OP(QQ is
P(QQ
smaller than C4R
.
For remaining pairs of nonempty cells, we perform the following. For each pair of
nonempty cells, the maximum distance O between points in these cells is
determined, i.e. we calculate all distances from points in one cell to points in second
cell and determine their maximum. Finally, we find the maximum value of these
maximum distances O .
3
Experimental Results
The proposed algorithm has been implemented in C# using .Net Framework 4.5 and
tested on datasets using a PC with the following configuration:
• CPU: Intel® Core™ i7-2600 (4 × 3.40 GHz)
• memory: 16 GB RAM
• operating system Microsoft Windows 7 64bits
3.1
Distribution of Points
The proposed algorithm for finding the maximum distance of two points has been
tested using different datasets. These datasets have different types of distributions of
points. For our experiments, we used well-known distributions such as randomly
distributed uniform points in an ellipse, uniform points in a rectangle or points with a
Gaussian distribution. Other distributions used were Halton points and Gauss ring
points. Both of these distributions are described in the following text.
Halton Points. Construction of a Halton sequence is based on a deterministic method.
This sequence generates well-spaced “draws” points from the interval 1S, T]. The
sequence uses a prime number as its base and is constructed based on finer and finer
prime-based divisions of sub-intervals of the unit interval. The Halton sequence [3]
can be described by the following recurrence formula:
fghi [k
VW9X>YZ[ ∑lm j
7
]^_`
[
aM ^N mod Ze,
]
(5)
where Z is the prime number and is the index of the calculated element.
For the 2 space, subsequent prime numbers are used as a base. In our test, we
used !2,3# for the Halton sequence and we got a following sequence of points in a
rectangle:
1 1
1 2
3 1
1 4
5 7
VW9X>Y2,3,5 op W, qr , p W, qr , p W, qr , p W, qr , p W, qr ,
2 3
4 3
4 9
8 9
8 9
3 2
7 5
1 8
9
1
p W, qr , p W, qr , p W, qr , p W, qr , … x
8 9
8 9
16 9
16 27
(6)
where W is a width of the rectangle and q is a height of the rectangle.
Visualization of the dataset with 103 points of the Halton sequence from (6) can be
seen in Fig. 8. We can see that the Halton sequence in 2 space covers this space
more evenly than randomly distributed uniform points in the same rectangle.
Fig. 8. 2 Halton points generated by VW9X>Y2,3 (left) and 2
uniform distribution (right). Number of points is 10y in both cases.
random points in a rectangle with
Gauss Ring Points. It is a special distribution of points in z{. Each point is
determined as follows:
| }W ∙ ~ ∙ cos.=WYC0,2&/ , q ∙ ~ ∙ sin.=WYC0,2&/
~ 0.5 A 0.5 ∙ Y ∙ =WYC
(7)
R
where W is a length of semi-major axis, q is a length of semi-minor axis, Y is a
randomly generated number from set !1,1#, =WYC R is a randomly generated
number with Gauss distribution from interval 10, ∞ and =WYC0,2& is a random
number with uniform distribution from 0 to 2&.
Visualization of the dataset with 10y Gauss ring points can be seen in Fig. 9. We
can see that this dataset consists of a large set of points, which are close to the ellipse,
and a small set of points, which are far from this ellipse.
Fig. 9. 2 Gauss ring points. Number of points is 10y .
3.2
Optimal Size of Grid
In the proposed approach, the remaining points are divided into uniform grid <
after their elimination by polar division. The size of the grid has significantly
influence on the number of pairs of points for which their mutual distance is
determined. Simultaneously the time complexity is increasing with growing size of
the grid. Therefore, we need know an estimation of the optimal size of the grid,
which should be dependent on the distribution of points and on the number of points.
Therefore, we have to measure it for each type of input points separately.
We measured the time performance of our proposed algorithm for different
distributions of points, different numbers of points and different sizes of grid.
Measurement for 10 points is presented in Fig. 10. For all tested distributions of
input points, we can see that the time performance decreases with the increasing size
of grid until the optimal size of the grid is achieved. After that time, the complexity
increases with the increasing number of divisions. Moreover, for all tested
distributions of input points, except uniform points in the ellipse, it can be seen that
the time complexity is practically independent on size of the grid. This is due to the
fact that size of set of suspicious points is very small and the number of nonempty
cells is small too, see Fig. 6 b)- Fig. 6 c). Thus the time complexity of division into
uniform grid and consequent calculation is almost insignificant.
21
time [s]
time [s]
17
13
9
5
64
128
256
512
Grid size
1 024
1.230
1.225
1.220
1.215
1.210
1.205
1.200
64
128
a)
1.175
1.170
time [s]
time [s]
256
512
256
512
b)
1.180
1.165
1.160
1.155
64
Grid size
128
256
512
Grid size
1.150
1.125
1.100
1.075
1.050
1.025
1.000
64
128
c)
Grid size
d)
0.962
time [s]
0.960
0.958
0.956
0.954
64
128
Grid size
256
512
e)
Fig. 10. The time performance of algorithm for finding maximum distance of two points for different points
distributions and different size of grid. The size of grid denotes the number of cells in one axis. The number
of input points is 10 . Distribution of points are: a) uniform points in ellipse, b) uniform points in rectangle,
c) Halton points, d) Gauss points, e) Gauss ring points.
512
256
256
128
Grid size
Grid size
Fig. 11 presents the optimal size of grid for different distributions of points and
different numbers of points. It can be seen that the optimal size of grid increases with
the increasing number of points. Moreover, we can see that for uniform distribution of
points in the ellipse is needed larger size of the grid than for other tested distributions.
This is due to the fact that for this distribution of points is the number of suspicious
points substantially larger.
128
64
64
32
32
16
1E+05
1E+06
1E+07
number of points
1E+08
1E+05
1E+06
1E+07
number of points
b)
256
256
128
128
Grid size
Grid size
a)
1E+08
64
32
64
32
16
16
1E+05
1E+06
1E+07
number of points
1E+08
1E+05
1E+06
1E+07
number of points
c)
1E+08
d)
Grid size
256
128
64
32
16
1E+05
1E+06
1E+07
number of points
1E+08
e)
Fig. 11. Optimal number of grid size for algorithm for finding maximum distance of two points for different
points distributions and different number of points. The size of grid denotes the number of cells in one axis.
Distribution of points are: a) uniform points in ellipse, b) uniform points in rectangle, c) Halton points,
d) Gauss points, e) Gauss ring points.
Evaluating experimental results for different distributions of points and different
numbers of input points, i.e. 10 , √10 ∙ 10 , 10 , √10 ∙ 10 and 108 , including
results from Fig. 10 and Fig. 11, we came to the following conclusion.
The optimal size of the grid is dependent on the number of input points, more
precisely the size of the grid is dependent on number of suspicious point. Size of the
grid has to increase with the increasing number of points.
3.3
Time Performance
In some applications, the time performance is one of an important criterion.
Therefore, running times were measured for different number of input points with
different distributions of points. Measurements were performed many times and
average running times, calculated from the measured results, are in Table 1.
Moreover, we can see these running times in Fig. 12.
Table 1. The time performance of convex hull for different number of input points and different
distributions of points.
Time [ms]
Number of points
Uniform ○
Uniform □
Halton
Gauss
GaussRing
1E+5
32.9
11.5
11.0
9.0
8.8
√10E+5
137.6
37.4
36.3
30.6
29.8
1E+6
466.2
119.1
113.5
93.3
93.4
√10E+6
1 745.5
367.8
355.8
315.0
296.0
1E+7
5 631.3
1 203.9
1 158.0
1 009.2
954.9
√10E+7
17 976.5
3 596.6
3 579.0
3 221.5
3 057.9
56 769.0
11 154.0
11 505.0
12 004.0
9 680.0
1E+8
It can be seen that the best time performance is for the Gauss ring points. The time
performance for Halton points and for uniform distribution of points inside a
rectangle is similar. Overall, we can say that for all tested distributions of input points,
except uniform points in an ellipse, is the running time practically similar. This is
expected behavior because most of the points are eliminated during the phase of polar
division. Therefore, there are only a few points and nonempty cells of uniform grid
for finding the maximum distance. The worst time performance was obtained for
uniform points in an ellipse.
1E+5
Time [ms]
1E+4
1E+3
Uniform ○
Uniform □
Halton
1E+2
Gauss
GaussRing
1E+1
1E+5
1E+6
Points count
1E+7
1E+8
Fig. 12. The time performance of algorithm for finding maximum distance two points for different number
of input points and different distribution of this points.
3.4
Comparison with Other Algorithms
We compared our proposed algorithm for finding exact maximum distance of two
points in the given dataset with the BF algorithm, whose time complexity is ,
and with the algorithm proposed in [8], which has expected time complexity ,
where is the number of input points. It should be noted that the results for the
algorithm in [8] are based on the use of the ratio of the BF algorithm to this algorithm.
Running times were measured for different numbers of input points with uniformly
distributed points. The resultant speed-up of our proposed algorithm with respect to
the BF algorithm and algorithm in [8] can be seen in Fig. 13 and Fig. 14.
1.E+07
ν
1.E+06
1.E+05
Proposed alg. vs. BF
1.E+04
1.E+03
1E+5
1E+6
Points count
1E+7
Fig. 13. The speed-up of our proposed algorithm for uniformly distributed points with respect to BF
algorithm for the same datasets.
1.54
1.52
ν
1.50
1.48
1.46
1.44
1.42
Proposed alg. vs. Alg. [2]
1.40
Points count
1E+5
1E+6
1E+7
Fig. 14. The speed-up of our proposed algorithm for uniformly distributed points with respect to
algorithm in [8] for the same datasets.
It can be seen that the speed-up of the proposed algorithm is significant with
respect to BF algorithm and grows with the number of points processed. Moreover,
our algorithm is in average 1.5 times faster than the algorithm in [8].
4
Conclusion
A new fast algorithm for finding an exact maximum distance of two points in with
complexity has been presented. This algorithm uses a space division
technique. It is robust and can process a large number of points. The advantages of
our proposed algorithm are simple implementation and robustness. Moreover, our
algorithm can be easily extended to E3 by a simple modification.
For future work, the algorithm for finding exact maximum distance of two points,
can be easily parallelized, as most of the steps are independent. The second thing is to
extend this algorithm to E3.
Acknowledgments. The authors would like to thank their colleagues at the University
of West Bohemia, Plzen, for their discussions and suggestions, and anonymous
reviewers for their valuable comments and hints provided. The research was
supported by MSMT CR projects LH12181 and SGS 2013-029.
References
1. Clarkson, K.L., Shor, P.W.: Applications of random sampling in computational geometry,
II. Discrete & Computational Geometry, 1989, Vol.4, No.1, pp.387-421.
2. Dobkin, D. P., Snyder, L.: On a general method for maximizing and minimizing among
certain geometric problems. Proceedings of the 20th Annual Symposium on the
Foundations of Computer Science, 1979, pp. 9-17.
3. Fasshauer, G.E.: Meshfree Approximation Methods with MATLAB. World Scientific
Publishing Co., Inc., 2007.
4. Hilyard, J., Teilhet, S.: C# cookbook. O'Reilly Media, Inc., 2006.
5. Liu, G., Chen, Ch.: A new algorithm for computing the convex hull of a planar point set,
Journal of Zhejiang University SCIENCE A, 2007, Vol.8, No.8, pp.1210-1217.
6. Mehta, D. P., Sahni, S: Handbook of data structures and applications. CRC Press, 2004.
7. O'Rourke, J.: Computational geometry in C. Cambridge university press, 1998.
8. Skala, V.: Fast Oexpected (N) algorithm for finding exact maximum distance in E2 instead of
O (N2) or O (N lgN). AIP Conference Proceedings, 2013, No.1558, pp.2496-2499.
9. Snyder, W.E., Tang, D.A.: Finding the extrema of a region. IEEE Trans. on Pattern
Analysis and Machine Intelligence, 1980, Vol.2, No.3, pp.266-269.
10. Vince, J.: Geometric algebra for computer graphics. Springer Science & Business Media,
2008.
| 8cs.DS
|
Directed multicut is W [1]-hard, even for four terminal pairs∗
Marcin Pilipczuk†
Magnus Wahlström‡
arXiv:1507.02178v3 [cs.DS] 12 Feb 2018
Abstract
We prove that Multicut in directed graphs, parameterized by the size of the cutset, is W [1]-hard
and hence unlikely to be fixed-parameter tractable even if restricted to instances with only four terminal
pairs. This negative result almost completely resolves one of the central open problems in the area of
parameterized complexity of graph separation problems, posted originally by Marx and Razgon [SIAM
J. Comput. 43(2):355–388 (2014)], leaving only the case of three terminal pairs open. The case of two
terminal pairs was shown to be FPT by Chitnis et al. [SIAM J. Comput. 42(4):1674–1696 (2013)].
Our gadget methodology also allows us to prove W [1]-hardness of the Steiner Orientation problem
parameterized by the number of terminal pairs, resolving an open problem of Cygan, Kortsarz, and Nutov
[SIAM J. Discrete Math. 27(3):1503-1513 (2013)].
1
Introduction
The study of cuts and flows is one of the central areas of combinatorial optimization, with decades of intensive
research on polynomial-time exact and approximate algorithms. Since the seminal work of Marx [23], it has
also become one of the most dynamic research directions in parameterized complexity, under the name of
graph separation problems.
The key contribution of Marx’ paper [23] lies in the notion of an important separator, which is a kind of
greedy cut that is useful in some graph cut problems. Marx showed that the number of important separators of
size up to k in a graph is bounded as a function of k alone, and gave applications to a number of graph separation
problems, in particular an FPT algorithm for Multiway cut [23].1 (An improved bound was given by Chen et
al. [4], with a simple but influential proof method.) These techniques also led to FPT algorithms for Directed
Feedback Vertex Set [5] and eventually for Almost 2-SAT [30], which is a powerful generic problem
encapsulating a number of other well-studied problems, such as Odd Cycle Transversal and Vertex
Cover parameterized by the excess above a maximum matching. Further study of the graph separation
problems in the realm of parameterized complexity revealed a plethora of other algorithmic techniques: the
technique of shadow removal [28] lead to an FPT algorithm for the directed version of Multiway Cut [8], the
framework of randomized contractions [6] lead to an FPT algorithm for Minimum Bisection [11], whereas the
idea to guide a branching algorithm by the solution to the LP relaxation [12] lead not only to the fastest known
algorithm for Odd Cycle Transversal [22], but also can be cast into a very general CSP framework [31].
In tandem with these developments, we have gained a growing understanding of the structure of boundedsize cuts in graphs. Starting again with the proof that bounded size important separators are bounded in
number, we wish to highlight two further main contributions in this vein. First, Marx et al. [27] showed that
all inclusion-minimal st-cuts of size at most k in a graph G (for fixed vertices s, t) are contained in (essentially)
∗ An
extended abstract of this work has been presented at SODA 2016 [29].
of Warsaw, Poland, [email protected]. Research done while the author was at University of Warwick,
partially supported by the Centre for Discrete Mathematics and its Applications (DIMAP) at the University of Warwick and
by Warwick-QMUL Alliance in Advances in Discrete Mathematics and its Applications.
‡ Royal Holloway University of London, UK, [email protected]
1 In the Multiway Cut problem, the input consists of a graph G, a set T ⊆ V (G) of terminals, and an integer p; the goal
is to delete at most p edges (in the edge-deletion variant) or nonterminal vertices (in the node-deletion variant) so that every
terminal lies in a different connected component of the resulting graph, that is, to separate all pairs of terminals.
† University
a subgraph of G of treewidth at most f (k). This statement is attractive in its simplicity, although algorithmic
applications of it tend to have a bad running time dependency on k (since f (k) is already exponential,
and a treewidth dynamic programming algorithm would normally have running time exponential in f (k)).
Second, the FPT algorithm for Minimum Bisection [11] involves a technically intricate but very powerful
decomposition of the input graph in a tree-like manner into “nearly unbreakable” parts (see the paper for
details). However, these two results apply only to undirected graphs, and for directed graphs we have a much
weaker grasp of the structure.
A central milestone in the above developments was the discovery in 2010 of FPT algorithms for Multicut,
a robust generalization of Multiway Cut, parameterized by the size of the cutset only [3, 28]. In this
problem we are given a graph G, a family T of k terminal pairs, and an integer p; the goal is to delete at most
p nonterminal vertices from the graph such that all terminal pairs are separated.2 Marx and Razgon [28] also
proved that a similar result is unlikely in directed graphs, showing that Directed Multicut is W [1]-hard
parameterized by the cutset only. In contrast, Directed Multiway Cut is FPT by the same parameter [8].
Marx and Razgon [28] asked about the complexity of Directed Multicut when you restrict also the
number of terminal pairs, either assuming it is constant or by adding it to the parameter. Since then,
this has become one of the most important open problems in the study of graph separation problems in
parameterized complexity. It was positively resolved for DAGs (i.e., the problem is FPT on directed acyclic
graphs parameterized by both the cutset and the number of terminals) [19], but otherwise little progress has
been made. In particular, it has been repeated in the survey of Marx [26] on future directions of parameterized
complexity, where also the study of cut problems in directed graphs has been identified as an important
research direction. Similarly, the question of the structure of bounded-size directed cuts (e.g., the existence
of a directed version of [27]) has been floating around the community.
Our results.
We almost completely resolve the question of Marx and Razgon [28]:
Theorem 1.1. Directed Multicut is W [1]-hard when parameterized by p, the size of the cutset, even if
restricted to instances with only four terminal pairs. Furthermore, assuming the Exponential Time Hypothesis
(ETH), there is no algorithm solving n-vertex instances of Directed Multicut with four terminal pairs
in time f (p)no(p/ log p) for any computable function f .
Since Directed Multicut is polynomial-time solvable for one terminal pair, and reduces to Directed
Multiway Cut for two terminal pairs [8], only the case of three terminal pairs remains open.
The Exponential Time Hypothesis (ETH) [18], now a standard lower bound assumption in parameterized
complexity and moderately-exponential algorithms (cf. [21]), essentially asserts that there exists no algorithm
verifying satisfiability of 3-CNF SAT formulae in time subexponential in the number of variables. The ETH
lower bound of Theorem 1.1 implies that a brute-force solution running in time nO(p) is close to optimal.
Furthermore, we observe that our gadgets and reduction outline, after minor modifications, gives also a
lower bound for the Steiner Orientation problem, answering an open question of [9]. In the Steiner Orientation problem, given a mixed graph G with k terminal pairs T , one asks for an orientation of all undirected
edges of G, such that for every terminal pair (s, t) ∈ T there is a path from s to t in the oriented graph.
Theorem 1.2. Steiner Orientation is W [1]-hard when parameterized by k, the number of terminal pairs.
Furthermore, assuming ETH, there is no algorithm solving n-vertex instances of Steiner Orientation
in time f (k)no(k/ log k) for any computable function f .
Cygan, Kortsarz, and Nutov [9] showed an nO(k) -time algorithm; Theorem 1.2 implies that there is little
hope for a fixed-parameter algorithm, and that the running time of the algorithm of Cygan, Kortsarz, and
Nutov is close to optimal.
We also show a structural result for directed st-cuts of bounded size. A graph G is k-cut-minimal (for
arc-cuts) if it contains a source vertex s and a sink vertex t, and every other vertex is incident to at least
one arc that participates in an inclusion-minimal st-cut of size at most k. (For example, one can reduce an
2 In this paper we use consistently the node-deletion variant of Multicut; note that it is equivalent to the edge-deletion
setting in the directed case, and strictly more general in the undirected case.
s
t
s
t
Figure 1: An example of 5-cut-minimal graph with unbounded treewidth of the underlying undirected graph.
The right panel shows a minimal cut of size five; observe that every edge of the graph participates in a similar
cut, except for a few edges in the four corners of the graph, which can be easily covered by other small cuts.
arbitrary graph to a k-cut-minimal one by repeatedly bypassing every vertex that is not incident to any such
arcs.) We have the following.
2
Theorem 1.3. Every k-cut-minimal graph has directed treewidth at most f (k), where f (k) = 2O(k ) .
We note that this result is likely not as tight as it could be, both in terms of the choice of width measure and
the function f (k). However, as discussed below, our results also show that Directed Multicut is essentially
hard already for four terminal pairs and directed pathwidth two, so for the purpose of the Directed Multicut
problem, a sharpening of Theorem 1.3 is not likely to help (even though it may be useful for other problems).
Discussion. In the presence of the lower bound of Theorem 1.1, whose proof in this manuscript takes less
than five pages including a figure and is not very technically complex, the natural question is why the lower
bound was so elusive in the past five years, despite significant effort.
The idea to represent an n-wise choice in the reduction (e.g., the choice of a vertex of a clique or an
image of a vertex of the pattern graph in the case of the Subgraph Isomorphism problem) as a choice of a
single-vertex cut on a n-vertex bidirectional path connecting a terminal pair, seems quite natural, especially
in the light of the FPT algorithm for Directed Multicut in DAGs [19] and a deeper study of where this
algorithm uses the assumption of acyclicity. However, a gadget to check an arbitrary binary relation between
two such choices was elusive; we stumbled upon a “correct” construction by investigating the structural
question that led to Theorem 1.3 (the idea being that a sufficiently powerful structural result could have
been useful in designing an efficient algorithm).
A few words about directed width measures may be in order (for more, see, e.g., [1, 20]). Two approaches
are possible. On the one hand, one can simply consider the underlying undirected graph and ignore the arc
orientations; e.g., if the underlying undirected graph of a directed graph G has bounded treewidth, then many
problems are solvable on G via standard dynamic programming. On the other hand, several width notions
specific to directed graphs have been proposed (to name a few: directed pathwidth; directed treewidth;
DAG-width; Kelly-width). Of these, directed treewidth is the most general and directed pathwidth the most
restrictive. It has been noted that these directed width notions are rather more difficult to use in algorithms
than the undirected variants (e.g., [16, 15]), but on the other hand they are more permissive (e.g., they all
include DAGs as a constant-width base case).
Our gadgets are based around a counterexample against the first of these approaches. Figure 1 shows a
graph which is 5-cut-minimal (in fact, where every arc participates in a minimal st-cut of bounded size), but
whose underlying undirected graph is a grid (and thus has unbounded treewidth). Our hardness reduction
uses this graph to route one commodity horizontally and one vertically, allowing us to control which pairs
of flows can be killed at unit cost.
Also note that the graph in Figure 1 is acyclic; in fact, the reduction of Theorem 1.1 outputs an instance
of integer-weighted Directed Multicut of directed pathwidth 2. Standard reductions (replacing a vertex
of weight w by w unit-weight copies) creates an instance of unweighted Directed Multicut with directed
pathwidth bounded polynomially in the parameter. Hence Directed Multicut remains W [1]-hard, even for
four terminal pairs, if we parameterize by both the size of the cutset and the directed pathwidth of the input
graph. By the discussion above, this leaves little room for generalizing the FPT-algorithm for DAGs [19]
to broader classes.
Organization and notation. We show the reduction for Theorem 1.1 in Section 2 and for Theorem 1.2
in Section 3. We prove Theorem 1.3 in Section 4.
We use standard graph notation, see e.g. [2]. Both our hardness reductions start from the W [1]-hard
Partitioned Subgraph Isomorphism problem, parameterized by the number of edges of the pattern graph.
An input to Partitioned Subgraph Isomorphism consists of two graphs G and H
U with |E(H)| = k, where
V (G) is partitioned into |V (H)| color classes, one for each vertex of H: V (G) = i∈V (H) Vi ; the goal is to
check if there exists a homomorphism φ : V (H) → V (G) such that φ(i) ∈ Vi for every i ∈ V (H). The W [1]and ETH-hardness of Partitioned Subgraph Isomorphism has been shown by Marx:
Theorem 1.4 (Cor. 6.3 of [24]). Partitioned Subgraph Isomorphism is W [1]-hard when parameterized by
k = |E(H)|. Furthermore, assuming ETH, there is no algorithm solving n-vertex instances of Partitioned
Subgraph Isomorphism in time f (k)no(k/ log k) for any computable function f .
Both our reductions work in polynomial time and, given a Partitioned Subgraph Isomorphism
instance (G, H), output an instance with the corresponding parameter bounded linearly in k = |E(H)| and
size bounded polynomially in the input size.
In both
S reductions, given an input instance (G, H) of Partitioned Subgraph Isomorphism, we denote
V (G) = i∈V (H) Vi , k = |E(H)|, and ` = |V (H)|. Furthermore, without loss of generality we assume that H
does not have any isolated vertices and thus ` ≤ 2k. Indeed, if some color class Vi of V (G) is empty, we can
output a trivial no-instance, and otherwise we can delete all isolated vertices from H and their corresponding
color classes in G without changing the answer to the problem. We also fix some total order < on the set
V (H) and, by some potential padding, assume that |Vi | = n and Vi = {vai : 1 ≤ a ≤ n} for every i ∈ V (H).
For discussion on the output of the reduction of Theorem 1.1, we need to recall the definition of directed
pathwidth; we follow here Kreutzer and Ordyniak [20].
Definition 1.1. Let G be a directed graph. A directed path decomposition is a pair (P, β) where P =
v1 , v2 , . . . , vs is a directed path and β : V (P ) → 2V (G) is a mapping satisfying:
1. For every v ∈ V (G) the set β −1 (v) is connected in P and nonempty.
2. For every arc (u, v) ∈ E(G) there are indices 1 ≤ i ≤ j ≤ s such that u ∈ β(vi ) and v ∈ β(vj ).
The width of (P, β) is max1≤i≤s |β(vi )|, and the directed pathwidth of G is the minimum width among all
its directed path decompositions. For every 1 ≤ i ≤ s, the set β(vi ) is called a bag at node vi .
Note that directed pathwidth of a nonempty directed acyclic graph G equals 1: we can take vertices of
G one-by-one in any topological ordering of G.
2
Hardness for Directed Multicut
We reduce an input Partitioned Subgraph Isomorphism instance (G, H) to a node-weighted variant of
Directed Multicut, where every non-terminal vertex has a weight being a positive integer, and the goal is to
find a cutset of total weight not exceeding the budget p. We fix some integer constant M ; in fact it suffices to set
M = 2, but it helps to think of it as a sufficiently large integer constant. We use three levels of weight: there will
be light vertices, of weight 1, heavy vertices, of various integer weights being multiples of M , usually depending
on the degree of the corresponding vertex of H, and undeletable vertices, of weight p+1. Observe that it is easy
to reduce the weighted variant to the original one by replacing every vertex of weight w with w unit-weight
vertices. Thus, it suffices to show the reduction to the weighted variant, with only four terminal pairs.
Construction. Let us now describe the construction of the (weighted) Directed Multicut instance
(G0 , T , p). We start by setting budget p = (6M + 1)k. We also introduce eight terminals, arranged in four
terminal pairs:
(sx0→n , tx0→n ),
(sy0→n , ty0→n ),
<
(s<
n→0 , tn→0 ),
>
(s>
n→0 , tn→0 ).
For every i ∈ V (H), we introduce a bidirected path on 2n + 1 vertices
z0i , ẑ1i , z1i , ẑ2i , z2i , . . . , ẑni , zni ,
called henceforth the z-path for vertex i, and denoted by Z i . Similarly, for every ordered pair (i, j) where
ij ∈ E(H), we introduce two bidirected paths on 2n + 1 vertices
i,j
i,j
i,j
i,j
i,j
i,j
xi,j
0 , x̂1 , x1 , x̂2 , x2 , . . . , x̂n , xn ;
y0i,j , ŷ1i,j , y1i,j , ŷ2i,j , y2i,j , . . . , ŷni,j , yni,j .
We call these paths the x-path and the y-path for the pair (i, j), and denote them by X i,j and Y i,j . All vertices
i,j
i
i,j
i,j
i
zai , xi,j
a , ya are undeletable, while all vertices ẑa , x̂a , ŷa are heavy: vertex ẑa has weight M · degH (i) and
i,j
i,j
the vertices x̂a and ŷa have weight M each.
Note that so far we have created 4k + ` paths, each having 2n + 1 vertices. Furthermore, if we are to
delete one heavy vertex from each of these paths, the total cost would be
X
M · 4k +
degH (i) = 6kM.
i∈V (H)
i
i
i,j
For every pair (i, j) with ij ∈ E(H), and every 0 ≤ a ≤ n, we add arcs (xi,j
a , za ) and (za , ya ). Furthermore,
we attach terminals to the paths as follows.
i,j y
• for every pair (i, j) with ij ∈ E(H), we add arcs (sx0→n , xi,j
0 ) and (yn , t0→n );
• for every i ∈ V (H) we add arcs (sy0→n , z0i ) and (zni , tx0→n );
i,j <
i,j
• for every pair (i, j) with ij ∈ E(H) and i < j we add arcs (s<
n→0 , xn ) and (y0 , tn→0 );
i,j >
i,j
• for every pair (i, j) with ij ∈ E(H) and i > j we add arcs (s>
n→0 , xn ) and (y0 , tn→0 ).
We refer to Figure 2 for an illustration. Intuitively, the so-far constructed bidirectional paths and terminals
require to delete at least one heavy vertex per bidirectional path; the connections between paths ensure that
i,j
i
for every i ∈ V (H), we need to chose one index 1 ≤ φ(i) ≤ n and delete vertices ẑφ(i)
, x̂i,j
φ(i) , and ŷφ(i) , that
is, cut all paths corresponding to the vertex i at the same place. The choice of the index φ(i) corresponds
to the choice of the image of i in the sought homomorphism.
Let us now introduce gadgets that check the edge relations between the chosen vertices. For every pair
(i, j) with ij ∈ E(H), i < j we introduce an acyclic n × n grid with vertices pi,j
a,b for 1 ≤ a, b ≤ n and arcs
i,j
i,j
i,j
i,j
(pa,b , pa+1,b ) for every 1 ≤ a < n and 1 ≤ b ≤ n, as well as (pa,b , pa,b+1 ) for every 1 ≤ a ≤ n and 1 ≤ b < n.
We call this grid p-grid for the pair (i, j), and denote it by P i,j . We set the vertex pi,j
a,b to be a light vertex
i j
if va vb ∈ E(G), and undeletable otherwise. Finally, for every 1 ≤ a ≤ n we introduce arcs:
i,j
(xi,j
a , pa,1 ),
i,j
(pi,j
a,n , ya−1 ),
i,j
(xj,i
a , p1,a ),
j,i
(pi,j
n,a , ya−1 ).
Intuitively, after deleting the aforementioned heavy vertices on the x-, y-, and z-paths, for fixed ij ∈ E(H),
i,j
<
<
i < j, there is only one remaining path from xi,j
n (an out-neighbor of sn→0 ) to y0 (an in-neighbor of tn→0 ),
passing through the φ(i)-th row of the p-grid for the pair (i, j), and there is only one remaining path from
j,i
>
>
xj,i
n (an out-neighbor of sn→0 ) to y0 (an in-neighbor of tn→0 ), passing through the φ(j)-th column of the
p-grid for the pair (i, j). We can kill both these paths with a single vertex pi,j
φ(i),φ(j) , but only the existence
j
i
of the edge vφ(i)
vφ(j)
ensures that this vertex is light, not undeletable.
This concludes the construction of the instance (G0 , T , p). We now formally show that the constructed
instance is equivalent to the input Partitioned Subgraph Isomorphism instance (G, H).
From a homomorphism to a cutset.
of H into G. Define
i
Let φ : V (H) → [n] be such that i 7→ vφ(i)
∈ Vi is a homomorphism
i,j
X = {x̂i,j
φ(i) , ŷφ(i) : (i, j) ∈ V (H) × V (H) s.t. ij ∈ E(H)}∪
i
∪ {ẑφ(i)
: i ∈ V (H)} ∪ {pi,j
φ(i),φ(j) : (i, j) ∈ V (H) × V (H) s.t. ij ∈ E(H), i < j}.
The total weight of the vertices in X equals:
X
M · degH (i) + k = (6M + 1)k = p.
2k · 2 · M +
i∈V (H)
Note that the fact that pi,j
φ(i),φ(j) is light for every ij ∈ E(H), i < j follows from the assumption that the
i
vertices i 7→ vφ(i) is a homomorphism. Consequently, X is of weight exactly p. We now show that it is a
multicut in (G0 , T ).
We start with a simple observation about the structure of the graph G0 . While the x-, y-, and z-paths
are bidirected, they — together with the p-grids — are arranged in a DAG-like fashion. That is, there are
directed arcs from X i,j to Z i , from Z i to Y i,j , from X i,j and X j,i to P i,j , and from P i,j to Y i,j and Y j,i ,
but all cycles in G0 are contained in one x-, y-, or z-path.
Consider first the terminal pair (sx0→n , tx0→n ). The out-neighbors of sx0→n are the endpoints xi,j
0 for every
pair (i, j) with ij ∈ E(H); the only in-neighbors of tx0→n are the endpoints zni for every i ∈ V (H). Thus, by
the previous observation, the only paths from sx0→n to tx0→n in the graph G0 start by going to some vertex
i,j
i,j i
i
i
xi,j
up to some vertex xi,j
a , use the arc (xa , za ) to fall to Z , and then traverse Z to the
0 , traverse X
i
x
x
endpoint zn . (In particular, there are no paths from s0→n to t0→n that contain a vertex of some grid P i,j .)
However, all such paths for a ≥ φ(i) are cut by the vertex x̂i,j
φ(i) ∈ X, while all such paths for a < φ(i) are
i
cut by the vertex ẑφ(i) ∈ X. Consequently, the terminal pair (sx0→n , tx0→n ) is separated in H \ X.
A similar argument holds for the pair (sy0→n , ty0→n ). By the same reasoning, the only paths between sy0→n
and ty0→n in the graph H are paths that start by going to some vertex z0i , traverse Z i up to some vertex zai ,
use the arc (zai , yai,j ) for some ij ∈ E(H) to fall to Y i,j , and then continue along this y-path to the vertex
i
yni,j . However, all such paths for a ≥ φ(i) are cut by the vertex ẑφ(i)
∈ X, while all such paths for a < φ(i)
i,j
are cut by the vertex ŷφ(i)
∈ X.
<
<
Let us now focus on the terminal pair (s<
n→0 , tn→0 ). Observe that there are two types of paths from sn→0
<
i,j
to tn→0 in the graph H. The first type consists of paths that starts by going to some vertex xn where i < j,
i,j i
i
i
traverse X i,j up to some vertex xi,j
a , use the arc (xa , za ) to fall to Z , then traverse Z up to some vertex
0
0
0
zbi , use the arc (zbi , ybi,j ) for some j 0 > i to fall to Y i,j , and finally traverse this y-path to the endpoint y0i,j .
i,j 0
i
However, similarly as in the previous cases, the vertices x̂i,j
φ(i) , ẑφ(i) , ŷφ(i) ∈ X cut all such paths.
The second type of paths use the p-grids in the following manner: the path starts by going to some vertex
i,j
i,j i,j
i,j
xi,j
up to some vertex xi,j
, traverse this
n where i < j, traverse X
a , use the arc (xa , pa,1 ) to fall to P
i,j
i,j
i,j
i,j
p-grid up to a vertex pb,n where b ≥ a, use the arc (pb,n , yb−1 ) to fall to Y , and traverse this path to the
endpoint y0i,j . These paths are cut by X as follows: the paths where a < φ(i) are cut by x̂i,j
φ(i) ∈ X, the paths
i,j
where b > φ(i) are cut by ŷφ(i)
, while the paths where a = b = φ(i) are cut by the vertex pi,j
φ(i),φ(j) ∈ X; note
i,j
<
that the φ(i)-th row of the grid is the only path from pi,j
φ(i),1 to pφ(i),n . Please observe that the terminal tn→0
cannot be reached from P i,j by going to the other y-path reachable from this p-grid, namely Y j,i , as Y j,i
has only outgoing arcs to the terminal t>
n→0 since j > i.
>
i,j
i
i,j 0
A similar argument holds for the pair (s>
,
n→0 , tn→0 ). The paths going through X , i > j, Z , and Y
0
i,j
i
i,j
j,i
i,j
i > j 0 , are cut by vertices x̂i,j
,
ẑ
,
ŷ
∈
X.
The
paths
going
through
X
,
i
>
j,
P
,
and
Y
,
are
cut
φ(i) φ(i) φ(i)
i,j
j,i
by the vertices x̂i,j
φ(i) , ŷφ(i) , pφ(j),φ(i) . Again, it is essential that the other y-path reachable from the p-grid for
<
the pair (j, i), namely Y j,i , does not have outgoing arcs to the terminal t>
n→0 , but only to the terminal tn→0 .
0
We infer that X is a solution to the Directed Multicut instance (G , T , p).
From a multicut to a homomorphism. Let X be a solution to the Directed Multicut instance
(G0 , T , p). Our goal is to find a homomorphism of H into G.
First, let us focus on heavy vertices in X. Observe that for every pair (i, j), ij ∈ E(H) the following
three paths needs to be cut by X:
• a path from sx0→n to tx0→n that traverses the entire path X i,j up to the vertex xi,j
n , and uses the arc
i
x
(xi,j
,
z
)
to
reach
t
,
n
n
0→n
i
i
• a path from sx0→n to tx0→n that starts with using the arc (xi,j
0 , z0 ), and then traverses Z up to the
i
vertex zn , and
• a path from sy0→n to ty0→n that starts with using the arc (z0i , y0i,j ), and then traverses Y i,j up to the
vertex yni,j .
We infer that X needs to contain at least one heavy vertex on every x-, y-, and z-path in H. Recall that
the total weight of exactly one heavy vertex from each of these paths is 6kM = p − k. Thus, we have only
k slack in the budget constraint.
We say that a path X i,j , Y i,j , or Z i is normal if it contains exactly one vertex of X, and cheated otherwise.
We say that a pair (i, j) for ij ∈ E(H) is normal if each of the paths X i,j , Y i,j , X j,i , Y j,i , Z i , and Z j is
normal. A pair (i, j) is cheated if it is not normal. Note that (i, j) is normal if and only if (j, i) is normal.
i
For every i ∈ V (H) we fix one φ(i) ∈ [n] such that ẑφ(i)
∈ X.
Fix now a normal pair (i, j), ij ∈ E(H). Assume i < j; a symmetrical argument holds for i > j but
>
<
<
i,j i i,j
uses the terminal pair (s>
n→0 , tn→0 ) instead of (sn→0 , tn→0 ). Let x̂a , ẑb , ŷc ∈ X. Observe that a ≤ b, as
i,j
x
x
i,j
i
otherwise the path from s0→n to t0→n that traverses X up to the vertex xi,j
a−1 , uses the arc (xa−1 , za−1 ),
i
i
and traverses Z up to the endpoint zn is not cut by X, a contradiction. A similar argument for the terminal
<
pair (sy0→n , ty0→n ) implies that b ≤ c. However, if a < b, then the path from s<
n→0 to tn→0 that traverses
i,j
i,j
i,j i
i
i
X up to the vertex xa , uses the arc (xa , za ), traverses Z up to the endpoint z0 , and finally uses the arc
(z0i , y0i,j ), is not cut by X, a contradiction. A similar argument implies gives a contradiction if b < c.
i,j
i
We infer that for every normal pair (i, j) we have ẑφ(i)
∈ X and x̂i,j
φ(i) , ŷφ(i) ∈ X.
Fix now a normal pair (i, j) with i < j. Observe that the following paths are not cut by the heavy vertices
in X:
i,j
i,j
<
i,j
• a path from s<
up to the vertex xi,j
n→0 to tn→0 that traverses X
φ(i) , uses the arc (xφ(i) , pφ(i),1 ), traverses
i,j
i,j
i,j
the φ(i)-th row of P i,j up to the vertex pi,j
up to
φ(i),n , uses the arc (pφ(i),n , yφ(i)−1 ), and traverses Y
the endpoint y0i,j ;
j,i
i,j
>
j,i
• a path from s>
up to the vertex xj,i
n→0 to tn→0 that traverses X
φ(j) , uses the arc (xφ(j) , p1,φ(j) ), traverses
i,j
j,i
j,i
the φ(j)-th column of P i,j up to the vertex pi,j
n,φ(j) , uses the arc (pn,φ(j) , yφ(j)−1 ), and traverses Y
up to the endpoint y0j,i .
Consequently, X needs to contain at least one light vertex in the p-grid P i,j . Furthermore, if X contains
exactly one light vertex in P i,j , then, as the only vertex in common of the two aforementioned paths for a
i,j
fixed choice of normal (i, j), i < j, is the vertex pi,j
φ(i),φ(j) , we have that pφ(i),φ(j) ∈ X is a light vertex, and,
j
i
by construction, vφ(i)
vφ(j)
∈ E(G).
It remains to show that every pair (i, j), ij ∈ E(H), is normal. Indeed, if this is the case, then, as
p = 6kM + k, the total weight of exactly one heavy vertex on each path X i,j , Y i,j , and Z i is 6kM , and there
are exactly k grids P i,j , every grid P i,j contains exactly one vertex of X, and the argumentation from the
i
previous section shows that i 7→ vφ(i)
is a homomorphism, concluding the proof of Theorem 1.1.
Recall that (i, j) is normal if and only if (j, i) is normal. Let c be the number of cheated pairs (i, j), i < j.
If (i, j), i < j, is cheated, then there is a witness for it: one of the paths X i,j , Y i,j , X j,i , Y j,i , Z i , or Z j is
cheated, that is, contains more than one vertex of X. However, note that a cheated path X i,j , Y i,j , X j,i ,
or Y j,i is a witness only that (i, j) and (j, i) is cheated. Let cXY be the number of cheated x- and y-paths.
Furthermore, a cheated path Z i is a witness that (i, j) is cheated for every ij ∈ E(H): there are only degH (i)
such pairs (i, j). We infer that
X
c ≤ cXY +
degH (i).
i∈V (H):Z i cheated
On the other hand, a cost of a second heavy vertex in X on an x- or y-path is M , while the cost of a second
heavy vertex on Z i is M · degH (i). Furthermore, recall that if (i, j), i < j, is normal, then P i,j contains at
least one vertex of X. Thus, the total weight of X is at least
X
6kM + M · cXY +
M · degH (i) + k − c
i∈V (H):z i cheated
≥ 6kM + M · c + k − c = p + (M − 1)c.
Consequently, if M > 1 and the weight of X is at most p, we have c = 0. This finishes the proof of Theorem 1.1.
The resulting digraph can easily be shown to have directed pathwidth 2. Clearly, it cannot have smaller
directed pathwidth, as it contains two-vertex cycles. In the other direction, order the vertices of the resulting
graphs as follows.
1. All source terminals.
2. The vertices xi,j
a , sorted first by the pair (i, j) lexicographically, and then by the subscript a.
3. The vertices zai , sorted first by i, and then by the subscript a.
4. The vertices pi,j
a,b , sorted first by the pair (i, j) lexicographically, and then by the pair (a, b) lexicographically.
5. The vertices yai,j , sorted first by the pair (i, j) lexicographically, and then by the subscript a.
6. All sink terminals.
Observe now that we can construct a directed path decomposition of the resulting graph by taking bags
consisting of every two consecutive vertices in this order.
We infer that Directed Multicut is W [1]-hard already for integer-weighted instances, parameterized
by total solution weight, for instances with 4 terminals and directed pathwidth 2. This is in sharp contrast
to the result that it is FPT for DAGs [19].
3
Hardness for Steiner Orientation
Construction. Given an input Partitioned Subgraph Isomorphism instance (G, H), we construct an
equivalent Steiner Orientation instance (G0 , T ) as follows.
First, we introduce a number of undirected paths on n vertices: for every i ∈ V (H) we introduce a path
C i on vertices ci1 , ci2 , . . . , cin and a path Di on vertices di1 , di2 , . . . , din , while for every ordered pair (i, j) where
i,j
i,j
i,j
ij ∈ E(H), we introduce a path X i,j on vertices xi,j
on vertices y1i,j , y2i,j , . . . , yni,j .
1 , x2 , . . . , xn and a path Y
We connect these paths as follows: for every i ∈ V (H) and 1 ≤ a ≤ n we add an arc (cia , dia ), while for every
i
i
i,j
pair (i, j) with ij ∈ E(H) and for every 1 ≤ a ≤ n we add arcs (xi,j
a , da ) and (ca , ya ). Furthermore, for
i
i
i
i
every i ∈ V (H) we add terminal pairs (c1 , dn ) and (cn , d1 ) and for every pair (i, j) where ij ∈ E(H), we add
i,j
i
i,j
i
i
i,j
i
terminal pairs (xi,j
1 , dn ), (xn , d1 ), (c1 , yn ), and (cn , y1 ).
i
For an index 1 ≤ a ≤ n, we say that the path C is oriented towards cia if for every 1 ≤ b < n, the edge
i i
cb cb+1 is oriented from cib to cib+1 if b < a and from cib+1 to cib if b ≥ a. Similarly, we say that the path Di
is oriented away from dia if for every 1 ≤ b < n, the edge dib dib+1 is oriented from dib+1 to dib if b < a and from
dib to dib+1 if b ≥ a, and similar notions are defined for the paths X i,j and Y i,j .
Informally speaking, the introduced paths play the role of x−, y−, and z− paths from the reduction for
Directed Multicut. In the currently constructed graph, the only way to satisfy both the terminal pair
(ci1 , din ) and the terminal pair (cin , di1 ) is to chose a number 1 ≤ φ(i) ≤ n and direct the path C i towards ciφ(i)
and the path Di away from diφ(i) . The choice of φ(i) corresponds to the image of i ∈ V (H) in the sought
homomorphism. The additional terminal pairs ensure that the choice is copied to other paths: X i,j needs to
i,j
i,j
be directed towards xi,j
needs to be directed away from yφ(i)
. In the remainder of the construction,
φ(i) and Y
we will not introduce any more edge nor arc incident to a vertex of any path C i or Di , and only arcs going
out of the paths X i,j and arcs going towards the paths Y i,j . In this way we will not introduce any unwanted
way of satisfying the terminal pairs introduced so far, guaranteeing the desired behavior.
Let us now proceed to the construction of the p-grids. Similarly as in the case of Directed Multicut,
for every pair (i, j) with ij ∈ E(H) and i < j we introduce an acyclic n × n grid (called again a p-grid ) with
i,j
i,j
i,j
i,j
vertices pi,j
a,b for 1 ≤ a, b ≤ n and arcs (pa,b , pa+1,b ) for every 1 ≤ a < n and 1 ≤ b ≤ n, as well as (pa,b , pa,b+1 )
for every 1 ≤ a ≤ n and 1 ≤ b < n. We connect the grid to the previously constructed vertices as follows:
for every 1 ≤ a ≤ n we introduce arcs
i,j
(xi,j
a , pa,1 ),
i,j
(pi,j
a,n , ya ),
i,j
(xj,i
a , p1,a ),
j,i
(pi,j
n,a , ya );
please note the lack of shift by one as compared to the Directed Multicut construction. Furthermore,
i,j
j,i j,i
we add terminal pairs (xi,j
n , y1 ) and (xn , y1 ).
j,i
i,j
Observe that, if the paths X and X j,i were directed towards xi,j
φ(i) and xφ(j) respectively, while the
i,j
j,i
paths Y i,j and Y j,i were directed away from yφ(i)
and yφ(j)
respectively, there are unique paths in the graph
i,j
satisfying the newly introduced terminal pairs: the one from xi,j
n to y1 needs to traverse the grid for the
j,i
j,i
pair (i, j) along the φ(i)-th row, while the one from xn to x1 needs to traverse it along the φ(j)-th column.
These two paths intersect at the vertex pi,j
φ(i),φ(j) ; we finish the construction by encoding the edges of G by
the following modification of the vertices pi,j
a,b .
i,j
j,i
For every vertex pa,b , we call its incident four arcs as follows: the north arc goes from pi,j
a−1,b (or xb if
i,j
i,j
i,j
j,i
i,j
a = 1) to pa,b , the south arc goes from pa,b to pa+1,b (or yb if a = n), the west arc goes from pa,b−1 (or
i,j
i,j
i,j
i,j
i j
xi,j
a if b = 1) to pa,b , while the east arc goes from pa,b to pa,b+1 (or ya if b = n). If va vb ∈ E(G), we keep
i,j
i,j
i,j
the vertex pi,j
a,b intact; otherwise, we split the vertex pa,b into two vertices pa,b,SW , pa,b,N E , connected by an
i,j
undirected edge, with pi,j
a,b,SW incident to the south and west arcs and pa,b,N E incident to the north and east
i,j
arcs. With this construction, we cannot traverse the split vertex pa,b from north to south and from west to
east at the same time, forbidding us from choosing φ(i) = a and φ(j) = b simultaneously. This implies that
(G0 , T ) is a positive instance if and only if (G, H) is a positive instance.
This finishes the description of the constructed Steiner Orientation instance (G0 , T ). Note that the
number of terminal pairs is bounded by O(k + `) = O(k). We now prove formally that the reduction is a
correct hardness reduction for Steiner Orientation.
i
From a homomorphism to an orientation. Let φ : [k] → [n] be such that i 7→ vφ(i)
is a homomorphism
of H into G. We start by orienting some of the edges of H as follows. For every i ∈ V (H), orient the path
C i towards ciφ(i) and the path Di away from diφ(i) . Similarly, for every pair (i, j) with ij ∈ E(H), orient the
i,j
i,j
path X i,j towards xi,j
away from yφ(i)
.
φ(i) and orient the path Y
Let G00 be the mixed graph obtained so far. For every terminal pair (s, t) ∈ T , we exhibit a path in G00
from s to t in such a way that no two such paths share an undirected edge. This proves that the remaining
undirected edges can be oriented in the desired way.
It is straightforward to observe that for every terminal pair (s, t) involving a c-vertex or a d-vertex (i.e.,
one introduced in the first part of the construction) there exists a directed path in G00 from s to t consisting of
i,j
i
i
directed arcs only: we may traverse from any endpoint of X i,j or C i up to xi,j
φ(i) or cφ(i) , fall to dφ(i) or yφ(i) ,
i,j
and go along the path Di or Y i,j to any of its endpoints. Thus, it remains to focus on the pairs (xi,j
n , y1 )
j,i j,i
and (xn , y1 ) for ij ∈ E(H), i < j.
For the first pair, we traverse X i,j up to xi,j
φ(i) , then traverse along the φ(i)-row of the grid (i.e., using
vertices pi,j
φ(i),b for 1 ≤ b ≤ n; if any of these vertices is split, we traverse it from west to east using the
i,j
intermediate undirected edge), and traverse Y i,j from yφ(i)
up to y1i,j . The path for the second pair is similar,
but uses the φ(j)-th column of the grid, and traverses every vertex pi,j
a,φ(j) for 1 ≤ a ≤ n from north to south.
j
i
These two paths intersect at pi,j
φ(i),φ(j) . Since vφ(i) vφ(j) ∈ E(G), this vertex is not split and the two
aforementioned paths do not share an undirected edge. As only these two paths are present in the grid for the
pair (i, j), and all undirected edges in G00 are contained in such grids, we conclude that (G0 , T ) is a yes-instance.
From an orientation to a homomorphism. Assume that (G0 , T ) is a yes-instance, and let G00 be an
oriented graph G0 such that for every (s, t) ∈ T , there is a path from s to t in G00 .
Fix a vertex i ∈ V (H). Recall that no arc leads toward any path C i or X i,j , and no arc leads from any
path Di or Y i,j . Furthermore, all arcs leaving C i lead to Di or one of the paths Y i,j , and all arcs going into
Di start in C i or in one of the paths X i,j . We infer that the path from ci1 to din and the path from cin to di1
in G00 both need to be completely contained in G00 [C i ∪ Di ]. Furthermore, such a path for (ci1 , din ) traverses
C i up to some vertex cia , falls to dia , and continues along Di , and similarly for the pair (cin , di1 ). We infer that
there exists an index 1 ≤ φ(i) ≤ n such that C i is oriented towards ciφ(i) , while Di is oriented away from diφ(i) .
i
We claim that i 7→ vφ(i)
is a homomorphism of H into G. Fix an edge ij ∈ E(H), i < j; we aim to show
j
i
that the vertex pi,j
φ(i),φ(j) is not split, which is equivalent to vφ(i) vφ(j) ∈ E(G).
i
i,j
i
A similar reasoning as earlier for the path X i,j and terminal pairs (xi,j
1 , dn ) and (xn , d1 ) implies that
i,j
j,i
j,i
X is oriented towards xφ(i) . Analogously, we obtain that X is oriented towards xφ(j) , Y i,j is oriented
i,j
i,j
j,i
away from yφ(i)
, and Y j,i is oriented away from yφ(j)
.
i,j
The only arcs leaving the path X are arcs going towards Di and the p-grid for the pair (i, j). Similarly,
the only arcs ending in Y i,j start in C i and in the aforementioned p-grid, and analogous claims hold for
i,j
j,i j,i
the paths X j,i and Y j,i . We infer that the paths in H 0 for terminal pairs (xi,j
n , y1 ) and (xn , y1 ) need to
traverse through the p-grid for the pair (i, j).
With the paths X i,j , X j,i , Y i,j , and Y j,i oriented as described, even with keeping the undirected edges
in the grid not oriented, the only path for the first terminal pair traverses the φ(i)-th row of the grid from
i,j
i,j
xi,j
φ(i) , through pφ(i),b for 1 ≤ b ≤ n (split or not), towards yφ(i) , and similarly the only path for the second
terminal pair traverses the φ(j)-th column of the grid. If the vertex pi,j
φ(i),φ(j) is split, these paths traverse
i,j
the undirected edge pi,j
φ(i),φ(j),SW pφ(i),φ(j),N E in opposite directions, a contradiction.
This concludes the proof of Theorem 1.2.
4
Directed treewidth bound of k-cut-minimal graphs
We now prove the directed treewidth upper bound (Theorem 1.3). For the duration of this section, we will
consider arc cuts for convenience, but the result also implies a very similar statement for vertex cuts.
We will need some further preliminaries. For a vertex set U , we let δ(U ) denote the set of arcs leaving
U . Let G = (V, A) be a digraph. A set T ⊆ V is well-linked if for every pair of equal sized subsets X and
Y of T , there are |X| vertex disjoint paths from X to Y in G − (T \ (X ∪ Y )). Well-linked sets are connected
to directed treewidth in the following sense.
Theorem 4.1 (Cor. 6.4.24 of [20]). Let G be a digraph with no well-linked set of cardinality more than k.
Then G has directed treewidth O(k).
In what follows we will work only with well-linked sets, and thus we omit the definition of directed treewidth.
For the definition of directed treewidth, and more on directed width notions, see Kreutzer and Ordyniak [20].
We will show that a k-cut-minimal graph cannot contain an arbitrarily large well-linked set. To illustrate
the approach, assume that T ⊆ V is a well-linked set of sufficiently large size (|T | > f (k) for some f (k) yet to
be specified). We will identify a set U ⊆ V with |δ(U )| ≤ k, such that |T ∩ U |, |T \ U | > k. This contradicts
the assumption that T is well-linked, and implies that G has bounded directed treewidth.
The basic engine of the proof is the anti-isolation lemma, due to Marx. For this, we need to recall the notion
of important separators. (We use the version for directed graphs [8], adapted to our purpose; in particular,
we use arc separators instead of vertex separators. The original definition for undirected graphs was [23].)
Let G = (V, A) be a digraph with s, t ∈ V . An important st-separator is a minimal s-t-cut C ⊆ A such
that there is no s-t-cut C 0 ⊆ A, C 0 =
6 C, with |C 0 | ≤ |C| such that every vertex reachable from s in G − C
0
is also reachable from s in G − C .
Lemma 4.2 ([8]). There are at most 4k important s-t-separators of size at most k.
It is important to note that every s-t-cut C can be “pushed” to an important s-t-separator C 0 with
|C | ≤ |C|, such that every vertex reachable from s in G − C is also reachable from s in G − C 0 .
We state and prove the anti-isolation lemma. (This is taken from a set of lecture slides of Marx [25]; to
the best of our knowledge, no proof has appeared in a formally reviewed publication.) Because the expression
will be used several times, define g(k) = (k + 1)4k+1 .
0
Lemma 4.3 (Anti-isolation [25]). Let s, v1 , . . . , vr be vertices in a digraph G = (V, A), and let C1 , . . . , Cr ⊆ A
be arc sets of size at most k such that for all i, j ∈ [r] there is a path from s to vj in G − Ci if and only if
i = j. Then r ≤ g(k).
Proof. Add a vertex t, and an arc (vi , t) for every i ∈ [r]. Then for every i ∈ [r], the cut Ci ∪ {vi , t} is an
s-t-cut of size at most k + 1, and can be pushed to an important separator Ci0 of size at most k + 1. Note
that necessarily (vi , t) ∈ Ci0 . Since there are only at most 4k+1 important separators of size at most k + 1,
and each of them contains at most k + 1 arcs (vj , t), j ∈ [r], and since every such arc is contained in an
important separator, we conclude that r ≤ (k + 1)4k+1 = g(k).
We will also use the following dual form.
Lemma 4.4. Let t, v1 , . . . , vr be vertices in a digraph G = (V, A), and let C1 , . . . , Cr ⊆ A be arc sets of size
at most k such that for all i, j ∈ [r] there is a path from vj to t in G − Ci if and only if i = j. Then r ≤ g(k).
Proof. Simply apply the anti-isolation lemma to the reversed graph G0 = (V, {(v, u) : (u, v) ∈ A}).
Let us now recall the sunflower lemma. A sunflower is a collection {X1 , . . . , Xr } of subsets of a ground
set V such that all pairwise intersections are identical, i.e., there is a set K ⊆ V (the core of the sunflower)
such that for all i, j ∈ [r], i 6= j we have Xi ∩ Xj = K. The (pairwise disjoint) sets Xi \ K for i ∈ [r] are
called the petals of the sunflower. The famous Sunflower Lemma says the following (original lemma is due
to Erdős and Rado [13]; the following is from Flum and Grohe [14]).
Lemma 4.5. Let H ⊆ 2V be a collection of subsets of size d of a ground set V . If |H| > d!k d , then H
contains a sunflower of cardinality more than k.
Observe that for any minimal st-cut C containing an arc (u, v), the graph G − C contains both an su-path
and a vt-path. Using the Erdős-Rado sunflower lemma, we can then sharpen these statements into the following.
Lemma 4.6. Let G = (V, A) be a digraph, with two distinguished vertices s, t ∈ V . Let F ⊆ A be a collection
of arcs such that every arc (u, v) ∈ F participates in some minimal st-cut of size at most k. If |F | > h(k)
2
where h(k) = 2O(k ) , then there is a minimal st-cut C ⊆ A in G of size at most k that splits F , i.e., there are
more than k arcs (u, v) ∈ F \ C such that G − C contains an su-path, and more than k arcs (u, v) ∈ F \ C
such that G − C contains a vt-path.
Proof. For each (u, v) ∈ F , let Cuv ⊆ A be a minimal s-t-cut with (u, v) ∈ Cuv , with |Cuv | ≤ k. Let Suv
denote the set of vertices reachable from s in G − Cuv , and let Tuv denote the set of vertices that reach t
in G − Cuv . From the observation stated before the lemma statement, by the minimality of Cuv we have
u ∈ Suv and v ∈ Tuv . Also let U = {u : (u, v) ∈ F } and W = {v : (u, v) ∈ F }. We first make a claim to
lower-bound the size of U and W . (This is standard, but we include a proof for completeness.)
Claim 4.7. For every vertex v, at most 2g(k) arcs incident to v participate in minimal s-t-cuts of size at
most k.
Proof. We bound the number of in-arcs and out-arcs separately. For the in-arcs, consider the graph resulting
by adding k + 1 arcs (v, t). Note that every minimal s-t-cut that contains an in-arc of v remains a minimal
s-t-cut. As in the proof of the anti-isolation lemma, we may push each such cut to an important separator,
and this operation will not decrease the set of in-arcs of v contained in the cut. Hence at most g(k) in-arcs of v
participate in minimal s-t-cuts of cardinality at most k. The proof bounding out-arcs is entirely analogous. y
We make a further subsidiary claim.
Claim 4.8. There are at most 2O(k
2
)
arcs (u, v) ∈ F such that |Suv ∩ U | ≤ 2k.
Proof. Consider the collection S = {Suv ∩ U : (u, v) ∈ F }. Let X1 , X2 , . . . , Xr be a sunflower in S with
core K and let Ci be the cut Cuv such that Suv ∩ U = Xi for i ∈ [r]. Pick a vertex xi ∈ Xi \ K for every
i ∈ [r]. Then, the vertices s and xi together with cuts Ci satisfy the prerequisities for the anti-isolation
lemma. Consequently, S does not contain a sunflower of cardinality more than g(k).
Hence by the sunflower lemma, it contains at most d!(g(k))d distinct sets of cardinality d, for each
2
1 ≤ d ≤ 2k. Summing, and ignoring the constant factor, we find that S contains only 2O(k ) sets of size at
most 2k. By the degree observation in the previous claim, every u ∈ U is an endpoint for at most g(k) arcs
2
2
(u, v) ∈ F ; hence there are at most g(k)2O(k ) = 2O(k ) arcs uv ∈ F such that |Suv ∩ U | ≤ 2k, as promised. y
The dual bound also holds.
Claim 4.9. There are at most 2O(k
2
)
arcs (u, v) ∈ F such that |Tuv ∩ W | ≤ 2k.
Proof. This proof is identical to the previous one (except using the form Lemma 4.4 instead of the usual
anti-isolation lemma).
y
Hence, if |F | is large enough, there is at least one arc (u, v) ∈ F such that |Suv ∩ U |, |Tuv ∩ W | > 2k.
Naturally, for every u0 ∈ Suv ∩ U there is a corresponding arc (u0 , v 0 ) ∈ F and similarly for Tuv . Since
Cuv contains at most k arcs, this leaves more than k further arcs of each type, and the cut Cuv fits the
requirements of this lemma. This finishes the proof.
From here, Theorem 1.3 follows easily. Recall that T is a proposed well-linked set. Since G is k-cut-minimal,
every vertex v ∈ T is incident to some arc that participates in a minimal st-cut of size at most k. This gives
us a collection FT ⊆ A of arcs as in Lemma 4.6, with |FT | ≥ |T |/2. If |FT | > h(k), then the cut C provided
2
by the lemma is a witness that T is not well-linked. Hence |T | is bounded by 2O(k ) , and by Theorem 4.1
the directed treewidth of G is bounded by f (k).
5
Conclusions
We have presented reductions showing W [1]- and nearly tight ETH-hardness of Directed Multicut and
Steiner Orientation.
We would like to conclude with two open problems. The first one is the most natural one: is Directed
Multicut, parameterized by the size of the cutset, fixed-parameter tractable for three terminal pairs? It
seems that our main gadget (the p-grid that we use to check an auxiliary binary relation) inherently requires
four commodities to work: two that pass through it horizontally and vertically, and two additional for
synchronizing the cutpoints of the input and output bidirectional paths. On the other hand, we were not
able to extract any combinatorial property of the solutions in the three terminal case that would warrant an
FPT algorithm. As a related question, we would also like to ask whether the two terminal case is WK[1]-hard
parameterized by the cutset, or whether it admits a so-called polynomial Turing kernel (see [17]). It is known
not to admit a polynomial kernel under standard complexity-theoretical assumptions [10], but nothing is
known about Turing kernels (even conjecturally).
Secondly, we would like to repeat from [7] the question of fixed-parameter tractability of the `-Chain
SAT problem, parameterized the cutset. In this problem (with a fixed integer ` in the problem description)
we are given an integer k and a set of n binary variables, unary constraints, and constraints of the form
(x1 ⇒ x2 ) ∧ (x2 ⇒ x3 ) ∧ . . . ∧ (x`−1 ⇒ x` ); one asks to delete at most k constraints to get a satisfiable
instance. It is easy to see that this problem can be cast as a cut problem in directed graphs via the
natural implication/arc correspondence. While it is reasonable to suspect that a strong structural result for
k-cut-minimal graphs may lead to an FPT algorithm for this problem, our lower bound methodology seems
irrelevant, as it inherently requires different commodities.
Acknowledgements. We would like to acknowledge a number of insightful discussions with various people
on the graph cut problems in directed graphs, in particular on k-cut-minimal graphs; we especially thank
Anudhyan Boral, Marek Cygan, Alina Ene, Tomasz Kociumaka, Stefan Kratsch, Daniel Loksthanov, Dániel
Marx, Michal Pilipczuk, Saket Saurabh, and Michal Wlodarczyk.
References
[1] S. A. Amiri, L. Kaiser, S. Kreutzer, R. Rabinovich, and S. Siebertz. Graph searching games and width measures
for directed graphs. In E. W. Mayr and N. Ollinger, editors, 32nd International Symposium on Theoretical
Aspects of Computer Science, STACS 2015, March 4-7, 2015, Garching, Germany, volume 30 of LIPIcs, pages
34–47. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2015.
[2] J. Bang-Jensen and G. Gutin. Digraphs: Theory, Algorithms and Applications. Springer, 2008.
[3] N. Bousquet, J. Daligault, and S. Thomassé. Multicut is FPT. In L. Fortnow and S. P. Vadhan, editors,
Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, San Jose, CA, USA, 6-8 June
2011, pages 459–468. ACM, 2011.
[4] J. Chen, Y. Liu, and S. Lu. An improved parameterized algorithm for the minimum node multiway cut problem.
Algorithmica, 55(1):1–13, 2009.
[5] J. Chen, Y. Liu, S. Lu, B. O’Sullivan, and I. Razgon. A fixed-parameter algorithm for the directed feedback
vertex set problem. J. ACM, 55(5), 2008.
[6] R. H. Chitnis, M. Cygan, M. Hajiaghayi, M. Pilipczuk, and M. Pilipczuk. Designing FPT algorithms for cut
problems using randomized contractions. In 53rd Annual IEEE Symposium on Foundations of Computer Science,
FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012, pages 460–469. IEEE Computer Society, 2012.
[7] R. H. Chitnis, L. Egri, and D. Marx. List H-coloring a graph by removing few vertices. In H. L. Bodlaender and G. F.
Italiano, editors, Algorithms - ESA 2013 - 21st Annual European Symposium, Sophia Antipolis, France, September
2-4, 2013. Proceedings, volume 8125 of Lecture Notes in Computer Science, pages 313–324. Springer, 2013.
[8] R. H. Chitnis, M. Hajiaghayi, and D. Marx. Fixed-parameter tractability of directed multiway cut parameterized
by the size of the cutset. SIAM J. Comput., 42(4):1674–1696, 2013.
[9] M. Cygan, G. Kortsarz, and Z. Nutov. Steiner forest orientation problems. SIAM J. Discrete Math.,
27(3):1503–1513, 2013.
[10] M. Cygan, S. Kratsch, M. Pilipczuk, M. Pilipczuk, and M. Wahlström. Clique cover and graph separation:
New incompressibility results. TOCT, 6(2):6, 2014.
[11] M. Cygan, D. Lokshtanov, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Minimum bisection is fixed parameter
tractable. In D. B. Shmoys, editor, Symposium on Theory of Computing, STOC 2014, New York, NY, USA,
May 31 - June 03, 2014, pages 323–332. ACM, 2014.
[12] M. Cygan, M. Pilipczuk, M. Pilipczuk, and J. O. Wojtaszczyk. On multiway cut parameterized above lower
bounds. TOCT, 5(1):3, 2013.
[13] P. Erdős and R. Rado. Intersection theorems for systems of sets. Journal of the London Mathematical Society,
s1-35(1):85–90, 1960.
[14] J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006.
[15] R. Ganian, P. Hlinený, J. Kneis, D. Meister, J. Obdrzálek, P. Rossmanith, and S. Sikdar. Are there any good
digraph width measures? In V. Raman and S. Saurabh, editors, Parameterized and Exact Computation - 5th
International Symposium, IPEC 2010, Chennai, India, December 13-15, 2010. Proceedings, volume 6478 of
Lecture Notes in Computer Science, pages 135–146. Springer, 2010.
[16] R. Ganian, P. Hlinn, J. Kneis, A. Langer, J. Obdrlek, and P. Rossmanith. Digraph width measures in
parameterized algorithmics. Discrete Applied Mathematics, 168(0):88 – 107, 2014. Fifth Workshop on Graph
Classes, Optimization, and Width Parameters, Daejeon, Korea, October 2011.
[17] D. Hermelin, S. Kratsch, K. Soltys, M. Wahlström, and X. Wu. A completeness theory for polynomial (turing)
kernelization. Algorithmica, 71(3):702–730, 2015.
[18] R. Impagliazzo, R. Paturi, and F. Zane. Which problems have strongly exponential complexity? J. Comput.
Syst. Sci., 63(4):512–530, 2001.
[19] S. Kratsch, M. Pilipczuk, M. Pilipczuk, and M. Wahlström. Fixed-parameter tractability of multicut in directed
acyclic graphs. SIAM J. Discrete Math., 29(1):122–144, 2015.
[20] S. Kreutzer and S. Ordyniak. Width-measures for directed graphs and algorithmic applications. In M. Dehmer
and F. Emmert-Streib, editors, Quantitative Graph Theory: Mathematical Foundations and Applications.
Chapman and Hall/CRC Press, 2014.
[21] D. Lokshtanov, D. Marx, and S. Saurabh. Lower bounds based on the exponential time hypothesis. Bulletin
of the EATCS, 105:41–72, 2011.
[22] D. Lokshtanov, N. S. Narayanaswamy, V. Raman, M. S. Ramanujan, and S. Saurabh. Faster parameterized
algorithms using linear programming. ACM Transactions on Algorithms, 11(2):15:1–15:31, 2014.
[23] D. Marx. Parameterized graph separation problems. Theor. Comput. Sci., 351(3):394–406, 2006.
[24] D. Marx. Can you beat treewidth? Theory of Computing, 6(1):85–112, 2010.
[25] D. Marx.
Important separators and parameterized algorithms, 2011.
Lecture slides; available at
http://www.cs.bme.hu/~dmarx/papers/marx-mds-separators-slides.pdf.
[26] D. Marx. What’s next? Future directions in parameterized complexity. In H. L. Bodlaender, R. Downey,
F. V. Fomin, and D. Marx, editors, The Multivariate Algorithmic Revolution and Beyond - Essays Dedicated
to Michael R. Fellows on the Occasion of His 60th Birthday, volume 7370 of Lecture Notes in Computer Science,
pages 469–496. Springer, 2012.
[27] D. Marx, B. O’Sullivan, and I. Razgon. Finding small separators in linear time via treewidth reduction. ACM
Transactions on Algorithms, 9(4):30, 2013.
[28] D. Marx and I. Razgon. Fixed-parameter tractability of multicut parameterized by the size of the cutset. SIAM
J. Comput., 43(2):355–388, 2014.
[29] M. Pilipczuk and M. Wahlström. Directed multicut is W [1]-hard, even for four terminal pairs. In R. Krauthgamer,
editor, Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016,
Arlington, VA, USA, January 10-12, 2016, pages 1167–1178. SIAM, 2016.
[30] I. Razgon and B. O’Sullivan. Almost 2-SAT is fixed-parameter tractable. J. Comput. Syst. Sci., 75(8):435–450,
2009.
[31] M. Wahlström. Half-integrality, LP-branching and FPT algorithms. In C. Chekuri, editor, Proceedings of the
Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA,
January 5-7, 2014, pages 1762–1781. SIAM, 2014.
x-path for pair (j, i)
sx0→n
xj,i
0
xj,i
n
s>
n→0
t<
n→0
xi,j
0
y-path for pair (i, j)
x-path for pair (i, j)
y0i,j
xi,j
n
yni,j
s<
n→0
t>
n→0
y0j,i
ynj,i
ty0→n
y-path for pair (j, i)
x-path
sx0→n
z-path
sy0→n
y-path
t<
n→0
x̂i,j
a
s<
n→0
ẑai
ŷai,j
tx0→n
ty0→n
Figure 2: Illustration of the reduction for Directed Multicut. Black vertices are light, gray are heavy,
and white are undeletable. The top figure illustates a p-grid, together with an intended solution marked
by red circles. Here, the vertex p1,1 lies in the top-left corner of the grid, the first coordinate describes the
row of the grid, and the second one the column. The bottom figure illustrates an x-, z-, and y-path for
a pair (i, j) with ij ∈ E(H) and i < j.
X j,i
X i,j
Y i,j
Y j,i
Y i,j
Ci
Di
X i,j
Figure 3: Illustration of the reduction for Steiner Orientation. Thick gray arrows represent terminal
pairs. The top figure illustates a p-grid; dashed rectangles represent single entities pi,j
a,b . The bottom figure
i,j
i,j
i
i
illustrates synchronization between paths X , Y , C , and D .
| 8cs.DS
|
Information
Sciences
Information Sciences 00 (2014) 1–16
arXiv:1410.3744v1 [cs.CV] 14 Oct 2014
Refined Particle Swarm Intelligence Method for Abrupt Motion
Tracking
Mei Kuan Lim1 , Chee Seng Chan1 , Dorothy Monekosso2 and Paolo Remagnino3
1 University
of Malaya, Center of Image and Signal Processing, 50603 Kuala Lumpur, Malaysia;
of West England, Eng. & Maths., Bristol BS16 1QY, United Kingdom;
3 Kingston University, Comp. & Info. Sys., Surrey KT1 2EE, United Kingdom
2 University
Abstract
Conventional tracking solutions are not feasible in handling abrupt motion as they are based on smooth motion assumption or an
accurate motion model. Abrupt motion is not subject to motion continuity and smoothness. To assuage this, we deem tracking
as an optimisation problem and propose a novel abrupt motion tracker that based on swarm intelligence - the SwaTrack. Unlike
existing swarm-based filtering methods, we first of all introduce an optimised swarm-based sampling strategy to tradeoff between
the exploration and exploitation of the search space in search for the optimal proposal distribution. Secondly, we propose Dynamic
Acceleration Parameters (DAP) allow on the fly tuning of the best mean and variance of the distribution for sampling. Such
innovating idea of combining these strategies in an ingenious way in the PSO framework to handle the abrupt motion, which so far
no existing works are found. Experimental results in both quantitative and qualitative had shown the effectiveness of the proposed
method in tracking abrupt motions.
Keywords: abrupt motion, visual tracking, particle swarm optimisation
1. Introduction
Visual tracking is one of the most important and challenging research topics in computer vision. One of the main
reason is due to it’s pertinent in the tasks of motion based recognition, automated surveillance, video indexing, humancomputer interaction and vehicle navigation [1, 2]. In general, motion estimation in a typical visual tracking system
can be formulated as a dynamic state estimation problem: xt = f (xt −1, vt −1) and zt = h(xt , wt ), where xt is the current
state, f is the state evolution function, vt − 1 is the evolution process noise, zt is the current observation, h denotes
the measurement function, and wt is the measurement noise. The task of motion estimation is usually completed by
utilizing predictors such as Kalman filters [3, 4, 5] particle filters [6, 7, 8] or linear regression techniques [9]. This is
commonly further enhanced by assuming that motion is always governed by Gaussian distribution based on Brownian
motion or constant velocity motion models [2, 10].
While this assumption holds true to a certain degree of smooth motion, it tends to fail in the case of abrupt
motion such as fast motion (e.g. the movement of ball in sport events), camera switching (tracking of subject in a
camera topology), low frame-rate video as illustrated in Fig. 1. The main reason is that the state equation could not
cope with the unexpected dynamic movement, e.g. sudden or sharp changes of the camera/object motion in adjacent
frames. Nonetheless, such sampling-based solutions also suffered from the well-known local trap problem and particle
I Corresponding
Author: Mei Kuan Lim (email: [email protected]; phone/fax: +0060379676433)
1
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
2
Figure 1. Example of the abrupt motion in different scenarios. Top: Abrupt Motion with Inconsistent Speed. Middle: Switching of Camera during
a Boxing Game. Bottom: Low Frame Rate of Video due to Downsampling.
degeneracy problem. In order to handle these issues, one of the earliest work [11] considered tracking in low frame
rate video. The work considered tracking in low frame rate as to abrupt motion and proposed a cascade particle filters
to tackle this issue. This is, then, followed by a number of sampling strategies [12, 13, 14, 15, 16] incorporated
into Markov Chain Monte Carlo (MCMC) tracking framework. Their method alleviates the constant velocity motion
constraint in MCMC by improvising the sampling efficiency.
These aforementioned works have shown satisfactory results in tracking abrupt motion, however, we observed that
most of the work had been focused on employing different sampling strategy into the Bayesian filtering framework.
There are clear trends of increased complexity; as methods have gotten more complicated to cope with more difficult
tracking scenarios. Often these sophisticated methods compensate the increased in complexity in a certain aspect of
the algorithm by reducing the other aspect of it. For example, the increased number of subregions for sampling to cope
with the variation of abrupt motion is compensated by using a smaller number of samples to reduce, if not maintaining
the computational cost incurred. However, are these complex and sophisticated methods really necessary?
Recently, Particle Swarm Optimization (PSO) [17, 18, 19, 20, 21], a new population based stochastic optimization
technique, has received more and more attention because of its considerable success. Unlike the independent particles
in the particle filter, the particles in PSO interact locally with one another and with their environment in analogy with
the cooperative and social aspects of animal populations, for example as found in birds flocking. With this, Li et al.
[22] employed PSO in contour tracking problem to handle the abrupt motions. However, in the PSO method, there is
a possibility that most samples will get trapped in a few strong local maxima. Hence, the PSO method fails to track
highly abrupt motions.
In this paper, we proposed SwaTrack - Swarm intelligence-based Tracking algorithm to handle the abrupt motion.
Our contributions are firstly, in contrast to the conventional abrupt motion solutions that based on different sampling
methods in Bayesian filtering which are computational expensive, we deem tracking as an optimisation problem
and adopted particle swarm optimisation algorithm soley as the motion estimator. In particular, we replace the state
equation, xt = f (xt − 1, vt − 1) with a novel velocity model in the PSO. Secondly, we introduced Dynamic Acceleration
Parameters (DAP) and Exploration Factor (EF ) into the PSO framework to avoid the swarm explosion and divergence
problem in tracking highly abrupt motion. While the PSO is not new, it is the innovating idea of combining the DAP
and EF in an ingenious way to handle the abrupt motion which so far no existing works are found. Experimental
results using a large scale of public datasets and comparison with the state-of-the-art algorithms have shown the
effectiveness and robustness of the proposed method in terms of dataset unbiased, different size of object and recovery
from error.
The rest of this paper is organised as follows. In Section 2, we provide the background work in tracking abrupt
motion. The PSO is revisited in Section 3 and its limitation to handle abrupt motion. Proposed work is detailed in
2
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
(a) Particle degeneracy
3
(b) Trapped in local optima
Figure 2. Known problem of sampling-based tracking such as particle filter tracking and its variation (a) particle degeneracy problem (b) trapped
in local optima.
Section 3 while experimental results and discussion are given in Section 5. Finally, conclusion is drawn in Section 6.
2. Related Work
While considerable research efforts exist in relation to visual tracking, only a handful corresponds to abrupt motion
[23, 14, 24, 16]. Abrupt motion can be defined as situations where the objects motion changes at adjacent frames with
unknown pattern in scenarios such as i) partially low-frame rate, ii) switching of cameras view in a topology network
or iii) the irregular motion of the object. Therefore conventional sampling-based solutions that assume Gaussian
distribution based on Brownian motion or constant velocity motion models tend to fail in this area as illustrated in
Fig. 2 . For a complete review on the general visual tracking, we encourage the reader to [1, 2] while this literature
review section will only focus on work that handle abrupt motion.
In the recent work, Markov Chain Monte Carlo (MCMC) has been proposed to overcome the computational
complexity in PF when the state space increases [25]. While MCMC methods cope better in a high-dimensional state
space, a common problem is the need to have a large number of samples, especially when tracking abrupt motion.
Thus, to deal with abrupt motion, there has been a handful of work which introduced modifications and refinements
on the conventional MCMC. Kwon et al. in [12], introduced an integration of the Wang-Landau algorithm into the
MCMC tracking framework to track abrupt motion. Their method alleviates the constant-velocity motion constraint in
MCMC by improvising the sampling efficiency using the proposed annealed Wang-Landau Monte Carlo (A-WLMC)
sampling method. The A-WLMC method increases the flexibility of the proposal density in MCMC by utilising the
likelihood and density of states terms for resampling. Then, another variation of MCMC known as the interactive
MCMC (IMCMC) was proposed [13], where multiple basic trackers are deployed to track the motion changes of
a corresponding object. The basic trackers which comprise of different combinations of observation and motion
models are then fused into a compound tracker using the IMCMC framework. The exchange of information between
these trackers has been shown to cope with abrupt motion while retaining the number of samples used. In another
advancement, an intensively adaptive MCMC (IA-MCMC) sampler [16] has been proposed. Their method further
reduces the number of samples required when tracking abrupt motion by performing a two-step sampling scheme;
the preliminary sampling step to discover the rough landscape of the proposal distribution (common when there is
large motion uncertainty in abrupt motion) and the adaptive sampling step to refine the sampling space towards the
promising regions found by the preliminary sampling step. In another attempt for effective sampling of abrupt motion,
[14] proposed the N-fold Wang-Landau (NFWL) tracking method that uses the N-fold algorithm to estimate the
density of states which will then be used to automatically increase or decrease the variance of the proposal distribution.
The NFWL tracking method copes with abrupt changes in both position and scale by dividing the state space into larger
number of subregions. Therefore, the N-fold algorithm was introduced during sampling to cope with the exponentially
increased number of subregions.
Motivated by the meta-level question prompted in [26] on whether there is a need to have more training data
or better models for object detection, we raise similar question in the domain of this area; will continued progress
in visual tracking be driven by the increased complexity of tracking algorithms? As indicated in the earlier section,
often these sophisticated methods compensate the increased in complexity in a certain aspect of the algorithm by
3
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
4
reducing the other aspect of it. Furthermore, according to [10], different scenarios require different dynamic models.
If motion models only work sometimes, on a particular scenario, then how far should the increased in complexity of
tracking algorithms be, in order to cope with the challenges of real-time tracking scenarios? Should we look into less
complex methods instead, since motion models only work sometimes? Hence, we study a simple and yet effective
algorithm, the SwaTrack that utilise the PSO framework to effectively handle the abrupt motion using the particles
sharing information themselves. We deem the tracking as an optimisation problem, and hence the proposed method
is dataset unbias and able to recover from error.
Work that are considered similar to us are [22, 27]. Li et al [22] proposed a two-layer tracking framework in
which PSO is successfully combined with a level set evolution. In the first layer, PSO is adopted to capture the global
motion of the target and to help construct the coarse contour. In the second layer, level set evolution based on the
coarse contour is carried out to track the local deformation. However, there is a possibility that most samples will get
trapped in a few strong local maxima. Hence, the PSO method fails to track highly abrupt motions. Zhang et al. [27]
proposed a swarm intelligence based particle lter algorithm with a hierarchical importance sampling process which
is guided by the swarm intelligence extracted from the particle conguration, and thus greatly overcome the sample
impoverishment problem suffered by particle lters. Unfortunately, it cannot be a perfect solution either as it is still
depends on the Gaussian approximation. In order to handle this issue, we introduce 1) DAP - a dynamic acceleration
parameters by utilising the averaged velocity information of the particles; and 2) EF - a mechanism that balance the
tradeoffs between exploration and exploitation of the swarm into the PSO framework. With this, the SwaTrack will
able to alleviate these problems and track in highly abrupt motion or recover from tracking error.
3. Particle Swarm Optimisation Revisit
Particle Swarm Optimisation (PSO) - a population-based stochastic optimisation technique was developed by
Kennedy and Eberhart in 1995 [17]. It was inspired by the social behaviour of a flock of birds. The operation of
the PSO can be described as let us assume an n-dimensional search space, S ⊂ Rn and a swarm comprising of I
particles. Each particle represents a candidate solution to the search problem and is associated to a fitness function
(cost function), f : S → R. At every kth iteration, each particle is represented as {xki }i=1,...,I at kth iteration, where
k = 1, 2, ...K. Each particle, xki has its own velocity, v(xki ) and a corresponding fitness value (cost), f (xki ). The
best position encountered by the ith particle (personal best) will be denoted as {p(xki )}i=1,...,I and the fitness value as
pBestki = f (p(xki )). For every kth iteration, the particle with the best fitness value will be chosen as the global best
and is denoted as the index of the particle is denoted as f . Finally, the overall best position found by the swarm will
denote as gBestki = f (p(xkg )). The PSO algorithm is shown in Algo 1:
1. Initialisation, at iteration k = 0
• Initialise a population of I particles, {xki }i=1,...,I with positions, p(xki ),at random within the search space, S.
• Initialise the velocities, v(xki ) at random within [1, −1].
• Evaluate the fitness value of each particle and identify their personal best pBestki = f (p(xki )).
• Identify the global best gth particle and update the global best information, gBestk = f (p(xkg )).
2. Repeat at iteration k = 1, 2, ...K until the stopping criterion is met.
• For each ith particle, compute the new velocity according to:
vik+1 = [(ω ∗ vik ) + (c1 ∗ r1 ∗ (pBestki − xki )) + (c2 ∗ r2 ∗ (gBestk − xki )]
(1)
• For each ith particle, move them using the computed new velocity as in Eq. 2 and update its position
according to:
i
p(xk+1
) = p(xk )i + vik+1
(2)
i
• For each ith particle, ensure the newly computed position is within state space, p(xk+1
)⊂S
• Update pBestki , p(pBestki ), g, gBestk , p(gBestkg ).
4
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
5
• Check for Convergence
• End Repeat
The parameters ω, c1 and c2 are positive acceleration constants used to scale the influence of the inertia, cognitive
and social components respectively; r1 , r2 ⊂ (0, 1) are uniformly distributed random numbers to randomise the search
exploration.
3.1. Limitations for Abrupt Motion Tracking
However, the traditional PSO does not able to cope with abrupt motion, due to few reasons:
Constant Acceleration Parameters: The parameter c1 controls the influence of the cognitive component, (c1 ∗
r1 ∗ (pBestki − xki )) which represents the individual memory of particles (personal best solution). A higher values gives
more emphasize on the cognitive component and vice versa. In contrast, the parameter c2 controls the influence of the
social component,(c2 ∗ r2 ∗ (gBestk − xki ) which indicates the joint effort of all particles to optimize a particular fitness
function, f .
A drawback of the current PSO is the lack of a reasonable mechanism to effectively handle the acceleration
parameters (ω, c and r); which always set to a constant variable. For example, many applications of the PSO and
its variant set these parameters c1 = c2 = 2.00, which gives the stochastic factor a mean of 1.0 and giving equal
importance to both the cognitive and social components [17]. This limits the search space and therefore could not
cope with abrupt motion. Therefore, it is essential to have dynamic acceleration parameters that able to cope with
unexpected dynamic motion.
Tradeoffs in Exploration and Exploitation: The inertia weight, ω serves an important value that directs the
exploratory behaviour of the swarms. High inertia weights accentuates the influence of previous velocity information
and force the swarm to explore a wider search space; while a decreasing inertia weight reduces the influence of
previous velocity and exploit a smaller search space. Often, the inertia value that controls the influence of the previous
velocity is set to ω ∈ [0.8, 1.2] [28]. Recently, decaying inertia weigh, ω = 0.9 → 0.4 has been proposed and tested,
with the aim of favouring global search at the start of the algorithm and local search later. While these settings has
been tested to work well in other optimisation problems, one must note that it is not applicable in tracking abrupt
motion where the dynamic change is unknown. Therefore, a solution that able to handle the tradeoffs between the
exploration and exploitation will be beneficial.
4. Proposed Method - SwaTrack
In this section, we present our proposed SwaTrack - a variant of the traditional PSO to track target with arbitrary
motion. Particularly, we will discuss how the ingenious combination of Dynamic Acceleration Parameters (DAP) and
Exploration Factor EF in the proposed PSO framework has alleviated the problem of swarm explosion and divergence
problem.
4.1. Dynamic Acceleration Parameters (DAP)
PSO is a population based stochastic optimization technique. Since PSO is an iterative solution, efficient convergence is an important issue toward a real time abrupt motion estimation system. However, the strict threshold of
the conventional PSO velocity computation as in Eq. 2 will always lead to particles converging to a common state
estimate (the global solution). One reason is that the velocity update equation uses a decreasing inertia value which
indirectly forces the exploration of particles to decrease over the iterations. On the other hand, an increasing inertia
value will lead to swarm explosion in some scenarios.
To overcome this, we introduce DAP - a mechanism to self-tune the acceleration parameters by utilising the
averaged velocity information of the particles. That is, we normalised the acceleration parameters so that they can
be compared fairly with respect to the estimated velocity, p(w ∩ c1 ∩ c2 ) = 1. The fitness function information is
incorporated in the PSO framework in order to refine the acceleration parameters dynamically rather than a static
value. The basic idea is that when an object moves consistently in a particular direction, C → 1, the inertia, w and
cognitive weight, c1 values are increased to allow resistance of any changes in its state of motion in the later frames.
Otherwise when C → 0, the social weight c2 is increased by a stepsize to reduce its resistance to motion changes
5
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
6
as Eq. 3. The increase of the social weight allows global influence and exploration of the search space, which is
relevant when the motion of a target is dynamic. The exploitation within nearby regions is reasonable when an object
is moving with small motion.
c1 = c1 + m; c2 = c2 − m; ω = ω + m
c1 = c1 − m; c2 = c2 + m; ω = ω − m
∗ condition on p(ω ∩ c ∩ c ) = 1
1
2
C→1
otherwise
(3)
The C is estimated by computing the frequency of the change in the quantised motion direction of the object;
C → 1 represent consistent motion with minimal change of direction, while C → 0 represent inconsistent or dynamic
motion.
4.1.1. Exploration Factor (EF )
The normalisation of DAP as 1 will restrict the overall exploration of the state to a certain degree. Hence, we
refine this by introducing the exploration factor, EF which serves as a multiplying factor to increase or decrease the
exploration. We define the exploration factor, EF as the parameters that adaptively
1. increase the exploration with high variance, and
2. increase the exploitation with low variance.
By utilising these exploitation and exploration abilities, our method is capable to recover from being trapped into a
common state (local optima). Thus, the proposed SwaTrack copes better with both the smooth and abrupt motion. At
every kth iteration, the quality of the estimated position upon convergence (global best) is evaluated using its fitness
value. f (gBestkg ) → 1 indicates high likelihood whereas f (gBestkg ) → 0 indicates low likelihood or no similarity
between an estimation and target.
When f (gBestkg ) ≤ T MinF , where T MinF is a threshold, we know that there is low resemblance between the estimation and target and most likely the proposal distribution may not match the actual posterior. Thus in this scenario, EF
is increased alongside the maximum number of iterations, K by empirically determined step sizes m and n respectively. This drives the swarm of particles to explore the region beyond the current local maxima (increase exploration).
However, when an object has left the scene, K tend to increase continuously and cause swarm explosion. Thus, we
limit K ⊂ S.
E α f (gBestkg )
(4)
f (gBestkg )
In another scenario, where
≥ T MinF , EF is decreased alongside K; constraining the search around the
current local maximum (exploitation). In a straightforward manner, it is always best to drive particles at its maximum
velocity to provide a reasonable bound in order to cope with the maximum motion change. However, this is not
reasonable for real-time applications as it incurs unnecessary computational cost especially when the motion is not
abrupt. Thus, by introducing the adaptive scheme to automatically adjust the exploration and exploitation behaviour
of the swarm, SwaTrack is able to cope with both the smooth and abrupt motion with less computational cost. Also,
we observed that since the particles in SwaTrack exchange information with one another, we only need a few particles
for sampling.
4.2. Novel Velocity Model
With the introduction of DAP and EF , the novel velocity model, v0 in our PSO framework is represented as:
v̀ik+1 = EF k [(ω ∗ v̀ik ) + (c1 ∗ r1 ∗ (pBestki − xki )) + (c2 ∗ r2 ∗ (gBestk − xki )]
(5)
where EF k is the exploration factor at iteration k and c, r, ω are the acceleration parameters with the condition
p(w ∩ c1 ∩ c2 ) = 1. The normalised condition applied to the acceleration allows on the fly tuning of these parameters
6
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
7
according to the quality of the fitness function. The fitness function used here is represented by the normalised
distant measure between the appearance model of an estimation and the object-of-interest. The fitness value of a
particle, f (xki ) measures how well an estimation of the object’s position matches the actual object-of-interest; where 1
represents the highest similarity between an estimation and target and 0 represents no similarity.
At every kth iteration, each particle varies its velocity according to Eq. 5 and move its position in the search space
according to:
i
p(xk+1
) = p(xk )i + v̀ik+1
(6)
Note that the motion of each particle is directed towards the promising region found by the global best, gBestk
from previous iteration, k = k − 1.
1. Initialisation, at iteration k = 0
• Initialise a population of I particles, {xki }i=1,...,I with positions, p(xki ),at random within the search space, S.
• Initialise the velocities, v(xki ) at random within [1, −1].
• Evaluate the fitness value of each particle and identify their personal best pBestki = f (p(xki )).
• Identify the global best gth particle and update the global best information, gBestk = f (p(xkg )).
2. Repeat at iteration k = 1, 2, ...K until the stopping criterion is met.
• For each ith particle, compute the new velocity according to:
v̀ik+1 = Ek [(ω ∗ v̀ik ) + (c1 ∗ r1 ∗ (pBestki − xki )) + (c2 ∗ r2 ∗ (gBestk − xki )]
where,
p(w ∩ c1 ∩ c2 ) = 1
• If f (gBestkg ) ≤ T MinF
then E = E + n, K = K + n
else
then E = E − n, K = K − n
end If
• If C → 1
then c1 = c1 + m, c2 = c2 − m, ω = ω + m
else
then c1 = c1 − m, c2 = c2 + m, ω = ω − m
end If
• For each ith particle, move them using the computed new velocity as in Eq. 2 and update its position
according to:
i
p(xk+1
) = p(xk )i + v̀ik+1
i
• For each ith particle, ensure the newly computed position is within state space, p(xk+1
)⊂S
• Update pBestki , p(pBestki ), g, gBestk , p(gBestkg ).
• Check for Convergence
• End Repeat
5. Experimental Results & Discussion
In this section, we verify the feasibility and robustness of our proposed method in handling abrupt motion via various experiments using public and synthetic datasets. The experiments were performed on an Intel Core-2 processor
with C++ and OpenCV implementation.
7
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
8
5.1. Experimental Settings
We assumed the object-of-interest to be known and hence initialise manually the 2D position of the target in the
first frame as automatic initialisation is another research topic by itself. The object is represented by its appearance
model, which comprises of HSV histogram with uniform binning; 32 bins. The normalised Bhattacharyya distant
measure is used as the fitness value (cost function) to measure the quality of the estimation; where 1 represents the
highest similarity between an estimation and target and 0 represents no similarity. Here, the initial values for SwaTrack
are EF = 25, ω = 0.4, c1 = 0.3, c2 = 0.3, K = 30, I = 15 respectively. These values are set empirically and are not
as critical; the adaptive mechanism in the proposed method allows adjustment of these parameters according to the
quality of the observation model.
We manually labelled the ground truth of nth object. The ground truth is described as bounding box information,
Xn (xn ,yn ,wn ,hn = x-positions, y-positions, width, height). We compare the state-of-the-art results of PSO, PF [30, 31],
BDM [23], FragTrack [32], A-WLMC [12] and CT [19], respectively in terms of both the detection accuracy (%) and
processing time (milliseconds per frame).
Figure 3. Sample shots of the dataset employed.
5.2. Dataset
We tested our proposed method with a number of public and synthetic datasets. In the quantitative experiments,
we employed 5 public datasets (TableTennis, Youngki, Boxing and Tennis) as illustrated in Fig. 3. Rapid Motion
of Small Object: The T ableT ennis(T ableT ) dataset consists of 5 video sequences to test the effectiveness of the
proposed method in terms of tracking small object (e.g. table tennis ball) that exhibits fast motion. Sequence 11 , the
SIF Table Tennis sequence is a widely used dataset in the area of computer vision, especially for evaluation of detection
and tracking methods. This sequence has complex, highly textured background and exhibit camera movement with
some occlusion between the ball and the player’s arm. Sequence 22 , is a sample training video from the ITTF video
library which is created to expose players, coaches and umpires to issues related to service action. Although this
sequence is positioned to provide the umpire’s point of view of a service, it is very challenging as the size of the
tennis ball is very small; about 8x8 pixels to 15x15pixels for an image resolution of 352x240. The video comprises
of 90 frames including 10 frames in which severe occlusion happens, where the ball is hidden by the player’s arm.
Sequence 33 is a match obtained from a publicly available source. In this sequence, the tennis ball is relatively large
as it features a close-up view of the player. However, there are several frames where the ball appears to be blurred
1 The
SIF training data is available at http://www.sfu.ca/∼ibajic/datasets.html
ITTF training and demo dataset is available at http://www.ittf.com
3 The video is available at http://www.youtube.com/watch?v=C9D88AcmLjI
2 The
8
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
9
due to the low frame rate and abrupt motion of the tennis ball. Sequence 4 and 54 is captured at a higher frame rate,
thus the spatial displacement of the ball from one frame to another appears to be smaller (less abrupt) and the ball
is clearer. This is to test the ability of proposed method to handle normal visual tracking scenario. Since the dataset
didnt provide any groundtruth, we manually labelled the ground truth of nth object. The ground truth is described as
bounding box information, Xn (xn ,yn ,wn ,hn = positions in the x-dimension, y-dimension, width, height). If the paper is
accepted, we will make the dataset and groundtruth publicly available. Switching Camera: The Youngki and Boxing
dataset [14] comprise of frames edited from different cameras (camera switching). This results in an object appearing
at the different part of the image. Low-frame rate T ennis dataset [14] comprises of downsampled data to simulate
abrupt change. The frames are downsampled from a video with more than 700 original frames, by keeping one frame
in every 25frames. The rapid motion of the tennis player from one frame to another due to the downsampling made
tracking extremely difficult. Downsampling is done to simulate abrupt motion during low-frame rates.
In the qualitative experiments, on top of the 5 public datasets, we included 1 more dataset that consists of 3 video
sequences to further test the robustness of the proposed method. Abrupt Motion with Inconsistent Speed: The first
sequence of the dataset is to track a synthetic ball which moves randomly across the sequence with inconsistent speed,
whilst the second sequence tracks a soccer ball which is being juggled in a free-style manner in a moving scene with a
highly textured background (grass). Multiple targets: In the third sequence is two simulated balls moving at random.
We intend to demonstrate the capability of the proposed system to track multiple targets; whilst most of the existing
solutions are focused on single target.
5.3. Quantitative Results
5.3.1. Experiment 1: Detection Rate
Detection rate refers to the correct number and placement of the objects in the scene. For this purpose, we denote
the ground truth of nth object as GTn and the output from the tracking algorithms of jth object is denoted as ξn . We
describe the ground truth and tracker output of each nth object as bounding box information , Xn (xn ,yn ,wn ,hn = xposition, y-position, width, height). The coverage metric determines if a GT is being tracked, or if an ξ is tracking
accurately. In [33], it is shown that the F-measure, F suited this task as the measure is 1.0 when the estimate, ξn
overlaps perfectly with the ground truth, GTn . Two fundamental measures known as precision and recall are used to
determine the F-measure.
Recall: Recall measures how much of the GT is covered by the ξ and takes value of 0 if there is no overlap and 1
if they are fully overlapped. Given a ground truth, GTn and a tracking estimate, ξn , the recall, <n is expressed as:
|ξn ∩ GT n |
(7)
|GT n |
Precision: Precision measures how much of the ξ covers the GT takes value of 0 if there is no overlap and 1 if
they are fully overlapped. The precision, ℘n is expressed as:
<n =
℘n =
|ξn ∩ GT j |
|ξn |
(8)
2<n ℘n
<n + ℘n
(9)
F-measure: The F-measure, Fn is expressed as:
Fn =
Coverage Test In this experiment, we employ the F − measure according to the score measurement of the known
PASCAL challenge [34]. That is, if the Fn of nth object is larger than 0.5, the estimation is considered as correctly
tracked in the frame. Table. 1 demonstrates the detection accuracy of the benchmarked tracking algorithms for all
8 test sequences. Overall, the experimental results show that the average tracking accuracy of the proposed method
surpasses most of the state-of-the art tracking methods with an average detection accuracy of 91.39%. For all 6
test sequences (TableT1, TableT2, TableT5, Youngki and T ennis), the SwaTrack generates the best tracking results
amongst the rest and Rank 2 for TableT4 and Boxing, respectively.
4 This
dataset can be obtained from http://xgmt.open.ac.uk
9
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
10
Table 1. Experiment results - Comparison of the Detection Rate (in %)
TableT1
TableT2
TableT3
TableT4
TableT5
Average
PSO
70.1
83.1
58.2
59.6
60.3
66.26
PF [30, 31]
58.4
69.8
52.1
47.3
34.5
52.42
BDM [23]
68.3
53.4
67.3
73.2
64.2
65.28
FragTrack [32]
64.9
24.1
55.3
57.2
9.7
42.24
A-WLMC [12]
47.2
3.2
8.7
6.9
5.4
14.28
CT [19]
72.3
4.3
24.5
98.2
36.3
47.12
SwaTrack
87.8
93.1
74.1
97.3
72.8
85.02
In the meantime, methods that do not built on sophisticated motion model, the FragTrack [32] employs refine
appearance model that adapts to the changes of the object. Even so, it still performs poorly in this condition when
compared to the others with an average accuracy of 37.19%. PF on the other hand, gives the detection accuracy of
85.6%. This is expected as it is known that PF algorithm is constraint to a fixed Gaussian motion model. Once PF
has lost track of the object, it has the tendency to continue searching for the object in the wrong region such as shown
in Fig. 4a; leading to error propagation and inability to recover from incorrect tracking. The proposed method copes
better with abrupt motion and is not subjected to trapped in local optima as shown in Fig. 4b. While the MCMC
tracking method is still subjected to a certain degree of recovery as shown in Fig. 6.
Table 2. Experiment results - Comparison of the Detection Rate (in %)
Tennis
Youngki
Boxing
Average
PSO
87.3
87.1
82.4
85.6
PF [30, 31]
67.3
47.2
16.3
43.6
FragTrack [32]
20.6
27.5
48.3
32.13
A-WLMC [12]
95.1
86.8
98.1
93.33
SwaTrack
98.3
98.7
96.3
97.76
Dataset Unbias The problem of dataset bias was highlighted in [35] where the paper argue that “Is it to be
expected that when training on one dataset and testing on another there is a big drop in performance?” In here, we
replicate similar scenario in tracking domain and observe that though the A-WLMC method [12] performs well in
TableT4 and Youngki sequence, they do not produce consistent results when tested across the other datasets as shown
in Table 1-2 . For example, we can notice that the average detection accuracy of A-WLMC is 14.28% for TableT
dataset, and 93.33% for Tennis, Boxing and Youngki dataset respectively. The indicate that the A-WLMC solution
[12] is dataset bias as it seem to only work well in their proposed dataset, but performed porrly when is employed
on different dataset. Perhaps this is due to the motion model employed by these tracking methods that works well
only on certain scenarios, alluding to the notion in [10] that different motion requires different motion models. This is
indeed not the case for our proposed SwaTrack. Our overall detection rates are 85.02% and 97.76%, respectively. For
all sequences that exhibit different challenging conditions, e.g. rapid motion (T ableT 1 − 5), low-frame rate (T ennis),
the Swatrack has shown its robustness to cope without any ease.
We further investigated the dataset bias problem and found out that there is an influence of object size to the
detection rate. For instance, A-WLMC algorithm [12] performs poorly for sequences in which the resolution of the
object-of-interest is small, such as in Table Tennis dataset and performs surprisingly well when the object is large
such as in the Youngki, Boxing and T ennis dataset, respectively. This indicates the need to have better representation
of the object for a more accurate acceptance and rejection of estimations in the MCMC.
5.3.2. Experiment 2: Computational Cost
Fig. 5 demonstrates the comparison of the proposed method with state-of-the-art solution in terms of time complexity. As for the processing time, the SwaTrack algorithm requires the least processing time with an average of 63
milliseconds per frame. In contrary, MCMC-based solution such as A-WLMC [12] and PF [30, 31] require higher
processing time. This is likely due to the inherent correlation between MCMC samplers which suffer from slow convergence when an object has not been tracked accurately. Notice that in scenarios where the MCMC requires high
10
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
11
(a) Sample detections from PF tracking.
(b) Sample detections from SwaTrack tracking.
Figure 4. Sample output to demonstrates incorrect tracking due to trapped in local optima. The aim is to track the person in dark skin and purple
short. From Frame 449-451 (a), PF lost track of the object due to sampling from incorrect distribution during abrupt motion.. On the other hand,
the results in (b) demonstrate the capability of the SwaTrack tracking in dealing with the non-linear and non-Gaussian motion of the object.
Figure 5. Time Complexity. This figure illustrates the comparison of processing time (milliseconds per frame) between the proposed SwaTrack,
standard PSO, PF, BDM, FragTrack, A-WLMC and CT
11
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
12
processing time, the accuracy of the MCMC is minimal; the increase in computational cost is due to the increase of
search space when the observation model is unlikely representing the target. Note that the optimal number of samples
deployed in the PF and MCMC throughout the sequences has been selected empirically; where it ranges from 150 to
1000 particles in PF, 600 to 1000 particles in MCMC with 600 iterations while SwaTrack uses 10-50 particles with
5-70 iterations. Intuitively, an increase in the number of samples would lead to an increase in computational cost as
each particle would need to be evaluated against the appearance observation; elucidating the minimal processing time
required by the proposed SwaTrack.
As shown in Table 1-2, in which the SwaTrack detection rate is Rank 2, though the CT [19] and A-WLMC [12]
achieved better but their average processing time are almost increase by 3x compared to SwaTrack. As compared
to the A-WLMC tracking which increases its subregions for sampling when the state space increases, our method
adaptively increases and decreases its proposal variance for a more effective use of samples. Thus the processing time
required is much lesser as compared to the other methods. The advantage of the dynamic mechanism is shown when
comparing the processing time of SwaTrack to PSO (average of 195.20 milliseconds per frame); where the processing
time of PSO is 3x more than that of SwaTrack. In summary, the experimental results demonstrate the capability of the
proposed system to cope with the variety of scenario that exhibits highly abrupt motion. The adaptation of a stochastic
optimisation method into tracking abrupt motion has been observed to incur not much additional processing cost, yet
at the same time is able to have fair tracking accuracy as compared to the more sophisticated methods. Thus, the
preliminary results give a promising indication that sophisticated tracking methods may not be necessary after all.
5.4. Qualitative Results
Low Frame Rate The sequence aims to track a tennis player in a low-frame rate video, which is down-sampled
from a 700 frames sequence by keeping one frame in every 20 frames. Here, the target (player) exhibits frequent
abrupt changes which violate the smooth motion and constant velocity assumptions. Thus, motion that is governed
by Gaussian distribution based on the Brownian or constant-velocity motion models will not work in this case. Fig.
6 shows sample shots to compare the performance between conventional PF tracking (500 samples), A-WLMC (600
samples) [14], IA-MCMC (300 samples)[16] and SwaTrack (50 samples). It is observed that the tracking accuracy
of SwaTrack is better than PF and A-WLMC even by using fewer samples. While the performance of SwaTrack is
comparable to IA-MCMC, SwaTrack requires fewer samples and thus requires less processing requirement. These
results further verify that the proposed method is able to track the moving targets accurately and effectively, regardless
of the variety of change in the target’s motion.
Local Miminum Problem In this experiment, we aim to test the capability of SwaTrack to recover from incorrect
tracking. This is to test the capability of the DAP and EF to handle the abrupt motion. Fig. 7 shows the result for
Youngki where the camera switches. Due to this phenomenon, the subject will have a drastic change of position the
adjacent image. It can be seen that the SwaTrack is able to cope with this problem.
Secondly, we simulate another challenging scenario in which incorrect tracking is most likely to happen by sampling frames from 2 different datasets as shown in Fig.8 (a). The frames in the Boxing sequence are combined in
an alternative manner with the frames from the Youngki sequence. In this combined sequence, the object-of-interest
which is highlighted in the ellipse in Frame 1 of in Fig. 8 (a) tend to disappear from one frame and re-appear in the
subsequent frame interchangeably. From the qualitative results shown in Fig. 8 (b), we observe that the A-WLMC
tracking [14] is not robust and does not cope well with inaccurate tracking. When the object-of-interest disappear
from the scene (i.e. Frame 77), the A-WLMC gives an erroneous estimation of the object. In the subsequent frame,
where the object re-appears, the A-WLMC has difficulty to recover from its tracking such as shown in Frame 78
where the estimation does not fit the actual position of the object accurately. In the subsequent frames, the A-WLMC
tend to continuously missed tracked of the object. Although the sampling efficiency in the A-WLMC adopts a more
efficient proposal distribution as compared to the standard PF, it is still subjected to a certain degree of trapped in
local optima. Furthermore, the A-WLMC utilizes the information of historical samples for intensive adaptation, thus
requiring more frames information to recover from inaccurate tracking. The proposed SwaTrack on the other hand,
is observed to work well in this experiment, where minimal frame is required to recover from erroneous tracking.
As shown in Fig. 8 (c), the SwaTrack is able to track the object accurately when the object appear or re-appears in
the scene (as shown in the even frame number). The inaccurate tracking in the odd frame number is reasonable as
the object does not appear in those scenes. This is made possible due to the information exchange and cooperation
12
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
13
between particles in a swarm that provide a way to escape the local optima and reach the global maximum; leading to
and optimised proposal distribution.
Sensitivity to Object Size We further tested the proposed SwaTrack, PF [30, 31] and A-WLMC [14] on resized
sequences of similar data to simulate scenario in which the object size is smaller. Thus, the initial frame size of
360x240 is reduced into half, to 180x120 pixels. From our observations, the SwaTrack is the least sensitive towards
the size of object-of-interest, while the detection accuracy of the A-WLMC is reduced as the size of object gets
smaller. This is due to the robustness of the optimised sampling in SwaTrack as compared to the least robust method
of rejection and acceptance as proposed in the A-WLMC. The overall detection accuracy of the proposed SwaTrack
remain at an average of 90% regardless of the object’s size whereas the detection accuracy of PF and A-WLMC
decrease significantly by more than 25% when the object’s size decreases. Sample output is as shown in Fig. 9.
Finally, we evaluated the proposed SwaTrack on videos obtained from Youtube and the qualitative results are as
depicted in Fig. 10. Abrupt motion with Inconsistent Speed: The first aim to track a synthetic ball which moves
randomly across the sequence with inconsistent speed, whilst the second sequence tracks a soccer ball which is being
juggled in a free-style manner in a moving scene with a highly textured background (grass). It is observed that the
SwaTrack is able to track the abrupt motion of the balls efficiently. Multiple targets: In the third sequence, we
demonstrate the capability of the proposed system to track multiple targets; two simulated balls moving at random.
Most of the existing solutions are focused on single target.
5.5. Sampling-based vs Iterative-based Solutions
Motivated by the meta-level question prompted in [26] on whether there is a need to have more training data or
better models for object detection, we raise similar question in the domain of this area; will continued progress in
visual tracking be driven by the increased complexity of tracking algorithms? Intuitively, an increase in the number
of samples in sampling-based tracking methods such as PF and MCMC would increase the tracking accuracy. One
may also argue that the additional computational cost incurred in the iterative nature of the proposed SwaTrack and
MCMC would complement the higher number of particles required by the PF. Thus, in order to investigate if these
intuitions hold true, we perform experiments using an increasing number of samples and iterations. We then observe
the behaviors of PF and SwaTrack in terms of accuracy and processing time with the increase in complexity. PF is
chosen in this testing as it bears close resemblance to the proposed SwaTrack algorithm in which a swarm of particles
are deployed for tracking.
5.5.1. Sample of Particles vs Accuracy
Particle Filter: In the PF algorithm, we vary the number of samples or particles (i.e. 50, 100, · · · , 2000) used
throughout the sequence to determine the statistical relationship between number of samples and performance. We
gauge the performance by the detection accuracy (%) and processing time (in milliseconds per frame). The average
performance across all 5 datasets (TableT) are as shown in Fig. 11a. Sample of the performance for sequence T ableT 1
and T ableT 2 are as shown in Fig. 12.
The results demonstrate that the number of particles used in PF is correlated to the detection accuracy; where the
increase in the number of particles tends to increase the accuracy. Similarly, the average time taken also increases
exponentially as the number of particles used in PF grows. This alludes the fact that as the number of particles
increase, the estimation processes which include object representation, prediction and update also multiply. However,
it is observed that PF reaches plateau after hitting the optimal accuracy, after which any increase in the number
of particles will either have a decrease in accuracy or no significant improvement. From Fig. 11, we can see the
detection accuracy decreases after the optimal solution, which is given when the number of particles are 600. Our
findings provoke the underlying assumption that the increase of number of particles will lead to an increase in the
accuracy. Thus, we raise the question of whether complex (in this context the complexity is proportional to the
number of particles deployed) tracking methods are really necessary? Also, the best parameter configurations may
differ from one sequence to another due to the different motion behaviour portrayed by the object in each sequence.
For example, in Fig. 12(a), the optimal setting is 250 particles which produces detection accuracy of 55% and takes
1.78 seconds of processing time. Whilst the second sequence has a different optimal setting of 150 particles as shown
in Fig. 12(b). This advocates the notion as in [10] that motion models indeed only work for sometimes.
SwaTrack: Similarly, we perform the different parameter settings test on the proposed SwaTrack algorithm and
the average results are demonstrated in Fig. 11b, while Fig. 13 illustrate the results for T ableT 1 and T ableT 2.
13
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
14
In addition to the number of particles used in PF tracking, the proposed SwaTrack has an additional influencing
parameter, the maximum number of iterations. We vary the number of particles against the number of iterations for
fair evaluation. As illustrated in the left y-axis of the chart (bottom graph), we can see that the average processing time
increases as the number of iterations increase. However, the increment seems to be valid until it reaches a maximal
value; in which any increase in the iterations would not incur much difference in its processing time. Notice that the
processing time for different higher number of iterations (55 & 70) tend to overlap with one another, demonstrating
minimal increase in processing time as the number of iterations grows. This is due to the optimisation capability of
the proposed SwaTrack to terminate its search upon convergence, regardless of the defined number of iterations. This
is particularly useful in ensuring efficient search for the optimal solution, with minimal number of particles. As for
the detection accuracy, we can see that in general the average accuracy of the proposed SwaTrack is higher than PF,
with an average accuracy of 92.1% in the first sequence as shown in Fig. 13a. The sudden decrease in accuracy for
SwaTrack tracking with 70 number of iterations as shown in Fig. 13a may be due to the erratic generation of random
values in C++ implementation. This behaviour is not observed in other sequences, where their detection accuracy
is consistent across frames. Thus far, we take an average result for each test case over 10 runs to ensure reliable
results and we believe that with a higher number of runs, we would be able to obtain unbiased results without outliers.
In summary, the results further validate our findings that the proposed SwaTrack is able to achieve better accuracy
as compared to PF, whilst requiring only about 10% of the number of samples used in PF with minimal number of
iterations. This is made possible by an iterative search for the optimal proposal distribution, incorporating available
observations rather than making strict assumptions on the motion of an object. Thus, we believe that the findings
from our study create prospects for a new paradigm of object tracking. Again, we raise the question if there is a need
to make complex existing tracking methods by fusing different models and algorithms to improve tracking efficiency?
Would simple optimisation methods be sufficient?
5.5.2. Number of Samples vs Processing Time
Particle Filter: In the PF algorith,m we vary the number of samples or particles (i.e. 50, 100, · · · , 2000) used
throughout the sequence to determine the statistical relationship between number of samples and detection accuracy.
The lowest value of the parameter value is determined based on the minimal configuration to allow tracking while
the highest value is set to the maximal configuration before it reaches a plateau detection accuracy. The detection
accuracy and performance of the PF algorithm with different parameter settings are as shown in Fig. 14-18a. The
results demonstrate that the number of particles used in PF is correlated to the detection accuracy; where the increases
in the number of particles tend to increase the accuracy. Similarly, the average time taken also increases as the number
of particles used in PF grows. This alludes the fact that as the number of particles increase, the estimation processes
which include object representation, prediction and update also multiply. However, it is observed that PF reaches a
plateau detection accuracy after hitting the optimal accuracy, after which any increase in the number of particles will
either have a decrease in accuracy or no significant improvement. Thus, the underlying assumption that the increase
of number of particles will lead to an increase in the accuracy does not hold true. This may be due to the resampling
step in most PF algorithms that is highly prone to error propagation. Also, the best parameter configurations may
differ from one sequence to another due to the different motion behaviour portrayed by the object in each sequence.
For example, in Fig. 14, the optimal setting is 250 number of particles which produces detection accuracy of 55% and
takes 1.78 seconds of processing time. Note that in this set of experiments, other parameters such as the mean and
variance for the Gaussian distribution in PF is not optimal values as compared to the earlier experiment. A standard
configuration of Gaussian white noise is used across frames. Thus, the results obtained may slightly differ.
SwaTrack: Similarly, we perform the different parameter settings test on the proposed SwaTrack algorithm and
the results are demonstrated in Fig. 14-18b. In addition to the number of particles used in PF tracking, the proposed
SwaTrack has an additional influencing parameter, the maximum number of iterations. Thus, here we vary the number
of particles against the number of iterations and obtain their detection accuracy. As illustrated in the left y-axis of
the chart (bottom graph), we can see that the average processing time increases as the number of iterations increase.
However, the processing time taken reaches a maximal value, where the different number of iterations require almost
comparable amount of time. This can be seen by the overlapping results as shown in Fig. 14-18b, in particular. This
demonstrate that the effectiveness of the termination criteria in the proposed SwaTrack. When a global solution has
been found by the entire swarm (swarm reaches convergence), the search activity terminates despite the initial setting
value of the number of iterations. Also, our proposed method which automatically changes the number of iterations
14
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
15
according to the swarms search quality allows a self-tuned setting of the maximum iteration number. As for the
detection accuracy, we can see that in general the average accuracy of the proposed SwaTrack is higher than PF, with
an average accuracy of 92.1% in the first sequence as shown in Fig. 14b. In summary, the results further validate our
findings that the proposed SwaTrack is able to achieve better accuracy as compared to PF, whilst requiring only about
10% of the number of samples used in PF with minimal number of iterations.
5.5.3. Sampling Strategy
To further evaluate the robustness of the proposed algorithm as well as to understand the behaviours of other
algorithms when tracking abrupt motion, we perform the sampling strategy test. In this test, we simulate the scenario
of receiving inputs from the sensors with a lower frame rate by downsampling the number of frames from the test
sequence; assuming the actual data are obtained at normal rate of 25 frames per second to a lower rate of 5 frames per
second.
Fig. 19 demonstrates the detection accuracy between the proposed SwaTrack and PF for all four sequences by
down-sampling each sequence to simulate the 5 frames per second scenario. Note that the detection accuracy is
determined by comparing the ground truth for the sampled frames only. However, it is observed that in general the
proposed SwaTrack has better detection accuracy as compared to PF in both situations; with and without sampling.
The average detection accuracy of SwaTrack for the complete sequences is about 95.5% whereas the average for PF is
about 62.5%. During sampling, the average detection of accuracy of SwaTrack is about 77.25% whereas PF is about
32.75%. We can see that the detection accuracy of PF drops drastically when the frame rate decreases. This is because,
in low frame rate videos, the target tends to have abrupt motion and thus, methods that assume Gaussian distribution
in its dynamic motion model such as PF fail in such cases. The changes between detection accuracy on complete and
sampled sequence is as indicated in red in Fig. 19. SwaTrack on the other hand, copes better with low frame rate with
an average accuracy of more than 70% although there is a decrease in its efficiency. This is because, the proposed
SwaTrack algorithm allows iterative adjustment of the exploration and exploitation of the swarm in search for the
optimal motion model without making assumptions on the target’s motion. We can thus conclude that the proposed
SwaTrack algorithm is able to cope with scenarios where the frame rate is low.
6. Conclusions
In this paper, we presented a novel swarm intelligence-based tracker for visual tracking that copes with abrupt
motion efficiently. The proposed SwaTrack optimised the search for the optimal distribution without making assumptions or need to learn the motion model before-hand. In addition, we introduced an adaptive mechanism that detects
and responds to changes in the search environment to allow on the tuning of the parameters for a more accurate and
effective tracking. Experimental results show that the proposed algorithm improves the accuracy of tracking while
significantly reduces the computational overheads, since it requires less than 20% of the samples used by PF. In future,
we would like to further investigate the robustness of the proposed method as well as its behaviour change with the
different parameter settings and sampling strategy.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
H. Yang, L. Shao, F. Zheng, L. Wang, Z. Song, Recent advances and trends in visual tracking: A review, Neurocomp. 74 (2011) 3823–3831.
A. Yilmaz, O. Javed, M. Shah, Object tracking: A survey, ACM Comp. Surv. 38.
G. Welch, G. Bishop, An introduction to the kalman filter (1995).
E. A. Wan, R. Van Der Merwe, The unscented kalman filter for nonlinear estimation, in: AS-SPCC, 2000, pp. 153–158.
M. Oussalah, J. D. Schutter, Possibilistic kalman filtering for radar 2d tracking, Information Sciences 130 (14) (2000) 85 – 107.
M. Isard, A. Blake, Condensationconditional density propagation for visual tracking, IJCV 29 (1) (1998) 5–28.
M. S. Arulampalam, S. Maskell, N. Gordon, T. Clapp, A tutorial on particle filters for online nonlinear/non-gaussian bayesian tracking, IEEE
TSP 50 (2) (2002) 174–188.
Efficient visual tracking using particle filter with incremental likelihood calculation, Information Sciences 195 (2012) 141 – 153.
L. Ellis, N. Dowson, J. Matas, R. Bowden, Linear regression and adaptive appearance models for fast simultaneous modelling and tracking,
IJCV 95 (2) (2011) 154–179.
F. J. Cristina Garca Cifuentes, Marc Sturzel, G. J. Brostow, Motion models that only work sometimes, in: BMVC, 2012, pp. 1–12.
Y. Li, H. Ai, T. Yamashita, S. Lao, M. Kawade, Tracking in low frame rate video: A cascade particle filter with discriminative observers of
different life spans, IEEE TPAMI 30 (10) (2008) 1728–1740.
15
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
16
J. Kwon, K. M. Lee, Tracking of abrupt motion using wang-landau monte carlo estimation, in: ECCV, pp. 387–400.
J. Kwon, K. M. Lee, Visual tracking decomposition, in: CVPR, 2010, pp. 1269–1276.
J. Kwon, K. M. Lee, Wang-landau monte carlo-based tracking methods for abrupt motions, IEEE TPAMI 35 (4) (2013) 1011–1024.
X. Zhang, W. Hu, X. Wang, Y. Kong, N. Xie, H. Wang, H. Ling, S. Maybank, A swarm intelligence based searching strategy for articulated
3d human body tracking, in: CVPRW, 2010, pp. 45–50.
X. Zhou, Y. Lu, J. Lu, J. Zhou, Abrupt motion tracking via intensively adaptive markov-chain monte carlo sampling, IEEE TIP 21 (2012) 789
–801.
R. Eberhart, J. Kennedy, A new optimizer using particle swarm theory, in: MHS, 1995, pp. 39–43.
A study of particle swarm optimization particle trajectories, Information Sciences 176 (8) (2006) 937 – 971.
X. Zhang, W. Hu, S. Maybank, X. Li, M. Zhu, Sequential particle swarm optimization for visual tracking, in: CVPR, 2008, pp. 1–8.
G. Tong, Z. Fang, X. Xu, A particle swarm optimized particle filter for nonlinear system state estimation, in: CEC, 2006, pp. 438 –442.
F. Neri, E. Mininno, G. Iacca, Compact particle swarm optimization, Information Sciences 239 (2013) 96 – 121.
W. Li, X. Zhang, W. Hu, Contour tracking with abrupt motion, in: ICIP, 2009, pp. 3593–3596.
K. C. P. Wong, L. S. Dooley, Tracking table tennis balls in real match scenes for umpiring applications, BJMCS 1(4) (2011) 228–241.
Y. Liu, S. Lai, B. Wang, M. Zhang, W. Wang, Feature-driven motion model-based particle-filter tracking method with abrupt motion handling,
Opt. Eng. 51(4).
I. Zuriarrain, F. Lerasle, N. Arana, M. Devy, An mcmc-based particle filter for multiple person tracking, in: ICPR, 2008, pp. 1–4.
X. Zhu, C. Vondrick, D. Ramanan, C. Fowlkes, Do we need more training data or better models for object detection?, in: BMVC, 2012, pp.
1–11.
X. Zhang, W. Hu, S. Maybank, A smarter particle filter, in: ACCV, Springer, 2010, pp. 236–246.
Y. Shi, R. Eberhart, A modified particle swarm optimizer, in: WCCI, 1998, pp. 69–73.
L. P. Kaelbling, M. L. Littman, A. W. Moore, Reinforcement learning: a survey, JAIR 4 (1996) 237–285.
F. Yan, W. Christmas, J. Kittler, A tennis ball tracking algorithm for automatic annotation of tennis match, Sig. Proc. (2005) 619–628.
E. Maggio, A. Cavallaro, Accurate appearance-based bayesian tracking for maneuvering targets, CVIU 113 (4) (2009) 544–555.
A. Adam, E. Rivlin, I. Shimshoni, Robust fragments-based tracking using the integral histogram, in: CVPR, 2006, pp. 798–805.
K. Smith, D. Gatica-Perez, J. Odobez, S. Ba, Evaluating multi-object tracking, in: CVPRW, 2005, pp. 36–36.
M. Everingham, L. Gool, C. K. Williams, J. Winn, A. Zisserman, The pascal visual object classes (voc) challenge, IJCV 88 (2010) 303–338.
A. Torralba, A. A. Efros, Unbiased look at dataset bias, in: CVPR, 2011, pp. 1521–1528.
16
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
17
(a) Sample detections from PF.
(b) Sample detections from SwaTrack.
(c) Sample detections from A-WLMC.
(d) Sample detections from IA-MCMC.
Figure 6. A comparison between PF, SwaTrack, A-WLCM [14] and IA-MCMC [16]. It is observed that the SwaTrack tracking gives a more
accurate fit of the state.
17
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
18
(a) Sample of SwaTrack on Boxing sequence.
(b) Sample of SwaTrack on Youngki sequence.
Figure 7. Sample outputs to demonstrate the flexibility of the proposed SwaTrack to recover from incorrect tracking. Minimal frames (1-2frames)
are required to escape from local optima and achieve global maximum.
(a) Sample shots of the dataset that is obtained by combining frames from two different sequences. The object enclosed
in the ellipse is the object to be tracked.
(b) Sample detections by the A-WLMC tracking. A-WLMC tend to tracked the object inaccurately once it has lost or missed
tracked of the object as shown from Frame 79 onwards.
(c) Sample detections by the SwaTrack tracking. In Frame 77, since the object-of-interest does not appear in the frame,
inaccurate tracking happens. However, the SwaTrack is able to recover its tracking at the following frame, Frame 78.
Figure 8. Sample outputs to demonstrate the capability to recover from incorrect tracking.
18
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
(a) Sample detections from A-WLMC on reduced image size. A-WLMC has a high tendency to lost track of the object
when it moves abruptly, and demonstrate continuous inaccurate tracking such as shown in Frame 279-284. Note that
for similar frames, MCMC is able to track the object accurately when the image size is larger. Number of iterations =
600, particles = 600.
(b) Sample detections from SwaTrack on reduced image size. SwaTrack produces consistent tracking as compared to
PF and A-WLMC, regardless of the size of object. Number of iterations = 30, particles =20.
Figure 9. Qualitative Results: Comparison between A-WLMC and Our Proposed Method in term of different image size.
Figure 10. Sample shots of tracking results on our proposed method.
19
19
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
(a) PF
20
(b) SwaTrack
Figure 11. A comparison between PF and SwaTrack in terms accuracy vs different number of samples and accuracy vs different number of samples
and iteration
(a) Sequence 1.
(b) Sequence 2.
Figure 12. The accuracy and performance of PF with different number of samples for T ableT 1 − 2.
(a) Sequence 1.
(b) Sequence 2.
Figure 13. The accuracy and performance of SwaTrack with different number of samples and iterations for T ableT 1 − 2.
20
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
(a) PF
(b) SwaTrack
Figure 14. TableTennis 1: The accuracy and performance of PF/SwaTrack with different parameter settings
(a) PF
(b) SwaTrack
Figure 15. TableTennis 2: The accuracy and performance of PF with different parameter settings
(a) PF
(b) SwaTrack
Figure 16. TableTennis 3: The accuracy and performance of PF with different parameter settings
21
21
M.K. Lim et al. / Information Sciences 00 (2014) 1–16
(a) PF
(b) SwaTrack
Figure 17. TableTennis 4: The accuracy and performance of PF with different parameter settings
(a) PF
(b) SwaTrack
Figure 18. TableTennis 5: The accuracy and performance of PF with different parameter settings
Figure 19. The detection accuracy of SwaTrack against PF during sampling for sequence 1 to 4.
22
22
| 9cs.NE
|
Adapting the Bron-Kerbosch Algorithm for
Enumerating Maximal Cliques in Temporal Graphs∗
arXiv:1605.03871v2 [cs.DS] 2 May 2017
Anne-Sophie Himmel1 , Hendrik Molter1 , Rolf Niedermeier1 , and
Manuel Sorge2
1
Institut für Softwaretechnik und Theoretische Informatik, TU Berlin,
Germany, [email protected],
{h.molter, rolf.niedermeier}@tu-berlin.de
2
Ben Gurion University of the Negev, Department of Industrial
Engineering and Management, Be’er Sheva, Israel,
[email protected]
May 3, 2017
Abstract
Dynamics of interactions play an increasingly important role in
the analysis of complex networks. A modeling framework to capture
this are temporal graphs which consist of a set of vertices (entities in
the network) and a set of time-stamped binary interactions between
the vertices. We focus on enumerating ∆-cliques, an extension of the
concept of cliques to temporal graphs: for a given time period ∆, a
∆-clique in a temporal graph is a set of vertices and a time interval such that all vertices interact with each other at least after every ∆ time steps within the time interval. Viard, Latapy, and Magnien [ASONAM 2015, TCS 2016] proposed a greedy algorithm for enumerating all maximal ∆-cliques in temporal graphs. In contrast to this
approach, we adapt the Bron-Kerbosch algorithm—an efficient, recursive backtracking algorithm which enumerates all maximal cliques in
static graphs—to the temporal setting. We obtain encouraging results
both in theory (concerning worst-case running time analysis based on
the parameter “∆-slice degeneracy” of the underlying graph) as well
as in practice1 with experiments on real-world data. The latter culminates in an improvement for most interesting ∆-values concerning
running time in comparison with the algorithm of Viard, Latapy, and
Magnien.
∗
A preliminary version of this article appeared in the Proceedings of the 2016
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining [10]. Parts of this work are based on the first author’s Bachelor thesis at TU Berlin [9].
1
Code freely available at http://fpt.akt.tu-berlin.de/temporalcliques/ (GNU
General Public License).
1
1
Introduction
Network analysis is one of the main pillars of data science. Focusing on
networks that are modeled by undirected graphs, a fundamental primitive
is the identification of complete subgraphs, that is, cliques. This is particularly true in the context of detecting communities in social networks.
Finding a maximum-cardinality clique in a graph is a classical NP-hard
problem, so super-polynomial worst-case running time seems unavoidable.
Moreover, often one wants to solve the more general task of not only finding one maximum-cardinality clique but to list all maximal cliques. Their
number can be exponential in the graph size. The famous Bron-Kerbosch
algorithm (“Algorithm 457” in Communications of the ACM 1973, [3]) addresses this task and still today forms the basis for the best (practical) algorithms to enumerate all maximal cliques in static graphs [4]. However, to
realistically model many real-world phenomena in social and other network
structures, one has to take into account the dynamics of the modeled system
of interactions between entities, leading to so-called temporal networks. In
a nutshell, compared to the standard static networks, the interactions in
temporal networks (edges) appear sporadically over time (while the vertex
set remains static). Indeed, as Nicosia et al. [22] pointed out, in many realworld systems the interactions among entities are rarely persistent over time
and the non-temporal interpretation is an “oversimplifying approximation”.
In this work, we use the standard model of temporal graphs. A temporal
graph consists of a vertex set and a set of edges, each with an integer timestamp. The generalization of a clique to the temporal setting that we study
is called ∆-clique and was introduced by Viard et al. [28, 29]. Intuitively,
being in a ∆-clique means to be regularly in contact with all other entities
in this ∆-clique. In slightly more formal terms, each pair of vertices in the
∆-clique has to be in contact in at least every ∆ time steps. A fully formal
definition is given in Section 2. We present an adaption of the framework of
Bron and Kerbosch to temporal graphs. To this end, we overcome several
conceptual hurdles and propose a temporal version of the Bron-Kerbosch
algorithm as a new standard for efficient enumeration of maximal ∆-cliques
in temporal graphs.
1.1
Related Work
Our work relates to two main lines of research. First, enumerating ∆-cliques
in temporal graphs generalizes the enumeration of maximal cliques in static
graphs, this being subject of many different algorithmic approaches (sometimes also exploiting specific properties such as the “degree of isolation”
of the cliques searched for) [3, 4, 12, 14, 16, 25]. Indeed, clique finding is
a special case of dense subgraph detection. Second, more recently, mining
dynamic or temporal networks for periodic interactions [17] or preserving
2
structures [26] (in particular, this may include cliques as a very fundamental pattern) has gained increased attention. Our work is directly motivated
by the study of Viard et al. [28, 29] who introduced the concept of ∆-cliques
and provided a corresponding enumeration algorithm for ∆-cliques. In fact,
following one of their concluding remarks on future research possibilities,
we adapt the Bron-Kerbosch algorithm to the temporal setting, thereby
outperforming their greedy-based approach in most cases.
1.2
Results and Organization
Our main contribution is to adapt the Bron-Kerbosch recursive backtracking algorithm for clique enumeration in static graphs to temporal graphs.
In this way, we achieve a significant speedup for most interesting time period values ∆ (typically two orders of magnitude of speedup) when compared to a previous algorithm due to Viard et al. [28, 29] which is based
on a greedy approach. We also provide a theoretical running time analysis
of our Bron-Kerbosch adaption employing the framework of parameterized
complexity analysis. The analysis is based on the parameter “∆-slice degeneracy” which we introduce, an adaption of the degeneracy parameter that
is frequently used in static graphs as a measure for sparsity. This extends
results concerning the static Bron-Kerbosch algorithm [4]. A particular feature to achieve high efficiency of the standard Bron-Kerbosch algorithm is
the use of pivoting, a procedure to reduce the number of recursive calls of
the Bron-Kerbosch algorithm. We show how to define this and make it work
in the temporal setting, where it becomes a significantly more delicate issue
than in the static case. In summary, we propose our temporal version of the
Bron-Kerbosch approach as a current standard for enumerating maximal
cliques in temporal graphs.
The paper is organized as follows. In Section 2, we introduce all main
definitions and notations. In addition, we give a description of the original
Bron-Kerbosch algorithm as well as two extensions: pivoting and degeneracy
ordering. In Section 3, we propose an adaption of the Bron-Kerbosch algorithm to enumerate all maximal ∆-cliques in a temporal graph, prove the
correctness of the algorithm and give a running time upper bound. Furthermore, we adapt the idea of pivoting to the temporal setting. In Section 4
we adapt the concept of degeneracy to the temporal setting and give an
improved running time bound for enumerating all maximal ∆-cliques. In
Section 5, we present the main results of the experiments on real-world data
sets. We measure the ∆-slice degeneracy of real-world temporal graphs, we
study the efficiency of our algorithm, and compare its running time to the
algorithm of Viard et al. [28], showing a significant performance increase due
to our Bron-Kerbosch approach. We conclude in Section 6, also presenting
directions for future research.
3
2
Preliminaries
In this section we introduce the most important notations and definitions
used throughout this article.
2.1
Graph-Theoretic Concepts
In the following we provide definitions of adaptations to the temporal setting
for central graph-theoretic concepts.
2.1.1
Temporal Graphs
The motivation behind temporal graphs, which are also referred to as temporal networks [11], time-varying graphs [22], or link streams [28], is to
capture changes in a graph that occur over time. In this work, we use the
well-established model where each edge is given a time stamp [2, 11, 28]. Assuming discrete time steps, this is equivalent to a sequence of static graphs
over a fixed set of vertices [5, 19]. Formally, the model is defined as follows.
Definition 1 (Temporal Graph). A temporal graph G = (V, E, T ) is defined
as a triple consisting of a set of vertices V , a set of time-edges E ⊆ V2 ×T ,
and a time interval T = [α, ω], where α, ω ∈ N, T ⊆ N and ω − α is the
lifetime of the temporal graph G.
The notation V2 describes the set of all possible undirected edges {v1 , v2 }
with v1 6= v2 and v1 , v2 ∈ V . A time-edge e = ({v1 , v2 }, t) ∈ E can be interpreted as an interaction between v1 and v2 at time t. Note that we will
restrict our attention to discretized time, implying that changes only occur at discrete points in time. This seems close to a natural abstraction of
real-world dynamic systems and “gives the problems a purely combinatorial
flavor” [20].
2.1.2
∆-Cliques
A straightforward adaptation of a clique to the temporal setting is to additionally assign a lifetime I = [a, b] to it, that is, the largest time interval such
that the clique exists in each time step in said interval. However, this model
is often too restrictive for real-world data. For example, if the subject matter
of examination is e-mail traffic and the data set includes e-mails with time
stamps including seconds, we are not interested in people who sent e-mails
to each other every second over a certain time interval, but we would like to
know which groups of people were in contact with each other, say, at least
every seven days over months. One possible approach would be to generalize the time stamps, taking into account only the week an e-mail was sent,
resulting in a loss of accuracy in the data set. The constraint of each pair of
vertices being connected in each time step can be relaxed by introducing an
4
additional parameter ∆, quantifying how many time steps may be skipped
between two connections of any vertex pair. These so-called ∆-cliques were
introduced by Viard et al. [28, 29] and are formally defined as follows.
Definition 2 (∆-Clique). Let ∆ ∈ N. A ∆-clique in a temporal graph G =
(V, E, T ) is a tuple C = (X, I = [a, b]) with X ⊆ V , b − a ≥ ∆, and I ⊆ T
such that for all τ ∈ [a, b − ∆] and for all v, w ∈ X with v 6= w there exists
a ({v, w}, t) ∈ E with t ∈ [τ, τ + ∆].
In other words, for a ∆-clique C = (X, I) all pairs of vertices in X interact with each other at least after every ∆ time steps during the time interval I. We implicitly exclude ∆-cliques with time intervals smaller than ∆.
It is evident that the parameter ∆ is a measurement of the intensity of
interactions in ∆-cliques. Small ∆-values imply that the interaction between
vertices in a ∆-clique has to be more frequent than in the case of large ∆values. The choice of ∆ depends on the data set and the purpose of the
analysis.
We can also consider ∆-cliques from another point of view. For a given
temporal graph G = (T, V, E) and a ∆ ∈ N, the static graph G∆
τ = (Vτ , Eτ )
describes all contacts that appear within the ∆-sized time window [τ, τ + ∆]
with τ ∈ [α, ω − ∆] in the temporal graph G, that is Vτ = V and for
every {v1 , v2 } ∈ Eτ there is a time step t ∈ [τ, τ + ∆] such that ({v1 , v2 }, t) ∈
E. The existence of a ∆-clique C = (X, I = [a, b]) indicates that all vertices
in X form a clique in all static graphs G∆
τ with τ ∈ [a, b − ∆]. This implies
that all vertices in X are pairwise connected to each other in the static
graphs of all sliding, ∆-sized time windows from time a until b − ∆.
By setting ∆ to the length of the whole lifetime of the temporal graph,
every ∆-clique corresponds to a normal clique in the underlying static graph
that results from ignoring the time stamps of the time-edges.
We are most interested in ∆-cliques that are not contained in any other
∆-clique. For this we also need to adapt the notion of maximality to the
temporal setting [28, 29]. Let G be a temporal graph. We call a ∆-clique C =
(X, I) in G vertex-maximal if we cannot add any vertex to X without having
to decrease the clique’s lifetime I. That is, there is no ∆-clique C 0 = (X 0 , I 0 )
in G with I ⊆ I 0 and X ( X 0 . We say that a ∆-clique is time-maximal if
we cannot increase the lifetime I without having to remove vertices from X.
That is, there is no ∆-clique C 0 = (X 0 , I 0 ) in G with I ( I 0 and X ⊆ X 0 .
We call a ∆-clique maximal if it is both vertex-maximal and time-maximal.
2.1.3
∆-Neighborhood, ∆-Cut, and other Temporal Graph Concepts
In this section, we introduce and define further graph theoretical concepts
that need to be adapted to the temporal setting.
5
We refer to a tuple (v, I = [a, b]) with v ∈ V and I ⊆ T as a vertexinterval pair of a temporal graph. We call a the starting point of interval I
and b the endpoint of interval I. Let X be a set of vertex-interval pairs.
The modified element relation (v, I) @
− X (temporal membership) expresses
that there exists a vertex-interval pair (v, I 0 ) ∈ X with I ⊆ I 0 .
Using these definitions, we can adapt the notion of a neighborhood of
a vertex to temporal graphs. Intuitively, we want that two vertex-interval
pairs are neighbors if they can be put into a ∆-clique together.
Definition 3 (∆-Neighborhood). For a vertex v ∈ V and a time interval I ⊆ T in a temporal graph, the ∆-neighborhood N ∆ (v, I) is the set
of all vertex-interval pairs (w, I 0 = [a0 , b0 ]) with the property that for every τ ∈ [a0 , b0 − ∆] at least one edge ({v, w}, t) ∈ E with t ∈ [τ, τ + ∆] exists.
Furthermore, b0 − a0 ≥ ∆, I 0 ⊆ I, and I 0 is maximal, that is, there is no
time interval I 00 ⊆ I with I 0 ⊂ I 00 satisfying the properties above.
Notice that being a ∆-neighbor of another vertex is a symmetric relation.
If (w, I 0 ) @
− N ∆ (v, I), then we say that w is a v∆-neighbor of v during the
time interval I 0 . In Figure 1, we visualize the concepts of ∆-neighborhood
and ∆-clique in a temporal graph. See also Example 1 below.
We need to define a suitable way of intersecting of two sets of vertexinterval pairs, so that, as the intuition suggests, a ∆-clique is just the intersection of the “closed” ∆-neighborhoods2 of its elements over the lifetime of
the clique.
Definition 4 (∆-Cut). Let X and Y be two sets of vertex-interval pairs.
The ∆-cut X uY contains for each vertex, all intersections of intervals in X
and Y that are of size at least ∆. More precisely,
X u Y = {(v, I ∩ I 0 ) | (v, I) ∈ X ∧ (v, I 0 ) ∈ Y ∧ |I ∩ I 0 | ≥ ∆}.
In other words, the ∆-cut X u Y contains all vertex-interval pairs (v, I)
such that (v, I) @
− X and (v, I) @
− Y , as well as |I| ≥ ∆, and I is maximal
under these properties. That is, there is no J with I ( J and J ⊆ I 0
and J ⊆ I 00 such that (v, I 0 ) @
− X and (v, I 00 ) @
− Y for some I 0 and I 00 .
Example 1. In Figure 1 we visualize a temporal graph and the concepts of
∆-neighborhood and ∆-clique. We consider a temporal graph G = (T, V, E)
with T = [0, 8], V = {a, b, c}, E = {({a, b}, 2), ({a, b}, 3), ({a, c}, 4), ({b, c}, 5),
({a, c}, 6)}, and ∆ = 2. The vertices are visualized as horizontal lines. The
connections between two vertices at a specific time step represent the timeedges of the temporal graph.
We visualize the ∆-neighborhood of each vertex of the temporal graph
over the whole time interval T in Figures 1(a)-1(c):
2
In static graphs, the closed neighborhood of a vertex includes the vertex itself.
6
0
1
2
3
4
5
6
7
8
5
6
7
8
5
6
7
8
5
6
7
8
a
b
c
(a) N ∆ (a, T )
0
1
2
3
4
a
b
c
(b) N ∆ (b, T )
0
1
2
3
4
a
b
c
(c) N ∆ (c, T )
0
1
2
3
4
a
b
c
(d) Maximal ∆-Clique ({a, b, c} , [3 , 5])
Figure 1: ∆-Neighborhoods and a ∆-clique of a temporal graph with ∆ = 2.
The lifetime of the graph is T = [0, 8]. The elements of the ∆-neighborhoods
in (a), (b), and (c) are shaded in yellow and green (hatched), respectively.
A maximal ∆-clique (d) is shaded in yellow.
• In Figure 1(a), we consider the ∆-neighborhood N ∆ (a, T ) of vertex
a during the whole time interval T . The yellow shaded bar marks
the vertex-interval pair (b, [0, 5]) ∈ N ∆ (a, T ). The vertex b is a ∆neighbor of a during [0, 5] because for every τ ∈ [0, 5 − ∆ = 3] at
7
least one time-edge ({a, b}, t) ∈ E with t ∈ [τ, τ + ∆] exists since
({a, b}, 2), ({a, b}, 3) ∈ E. The same holds for the vertex-interval pair
(c, [2, 8]) ∈ N ∆ (a, T ) which is marked in hatched green.
• In Figure 1(b), we visualize the ∆-neighborhood N ∆ (b, T ) of b over
the whole lifetime T of the temporal graph. The vertex-interval pair
(c, [3, 7]) ∈ N ∆ (b, T ) is marked in hatched green. The vertex-interval
pair (a, [0, 5]) ∈ N ∆ (b, T ) is shaded in yellow. It becomes evident that
being a ∆-neighbor of another vertex is a symmetric relation—if a
is a ∆-neighbor of b during [0, 5], then b is also a ∆-neighbor of a
during [0, 5].
• In Figure 1(c), we visualize the ∆-neighborhood N ∆ (c, T ) of c over
the whole lifetime T of the temporal graph. The vertex-interval pair
(b, [3, 7]) ∈ N ∆ (c, T ) is marked in hatched green. The vertex-interval
pair (a, [2, 8]) ∈ N ∆ (c, T ) is shaded in yellow.
Figure 1(d) shows the maximal ∆-clique ({a, b, c}, [3, 5]). During the time
interval [3, 5], a and b are ∆-neighbors, b and c are ∆-neighbors and a and c
are ∆-neighbors, see Figures 1(a)-1(c). We cannot increase the time interval
because at time step 2 the vertices b and c are not yet ∆-neighbors and at time
step 6 the vertices a and b are no longer ∆-neighbors. Further nontrivial
maximal ∆-cliques in this temporal graph are: ({a, b}, [0, 5]), ({a, c}, [2, 8]),
({b, c}, [3, 7]), as well as the trivial ∆-cliques ({a}, [0, 8]), ({b}, [0, 8]), and
({c}, [0, 8]).
2.2
Bron-Kerbosch Algorithm
In this section, we explain the basic idea of the (static) Bron-Kerbosch
algorithm. We also present two techniques known from the literature which
improve the running time of the algorithm.
The Bron-Kerbosch algorithm [3] enumerates all maximal cliques in undirected, static graphs. It is a widely used recursive backtracking algorithm
which is easy to implement and more efficient than alternative algorithms
in many practical applications [4].
The Bron-Kerbosch algorithm, see Algorithm 1, receives three disjoint
vertex-sets as an input: P , R, and X. The set R induces a clique and P ∪ X
is the set of all vertices which are adjacent to every vertex in R. Each vertex
in P ∪X is a witness that the clique R is not maximal yet. The set P contains
the vertices that have not been considered yet whereas the set X includes all
vertices that have already been considered in earlier steps. In each recursive
call, the algorithm checks whether the given clique R is maximal or not.
If P ∪ X = ∅, then there are no vertices that can be added to the clique
and therefore, the clique is maximal and can be added to the solution.
Otherwise, the clique is not maximal because at least one vertex exists that
8
Algorithm 1 Enumerating all Maximal Cliques
1: function BronKerbosch(P, R, X)
. R : a clique
. P ∪ X : set of all vertices v such that R ∪ {v} is a clique and where
• vertices in P have not yet been considered as additions to R and
• vertices in X already have been considered in earlier steps
2:
3:
4:
5:
6:
7:
8:
9:
10:
if P ∪ X = ∅ then
add R to the solution
end if
for v ∈ P do
BronKerbosch(P ∩ N (v), R ∪ {v}, X ∩ N (v)))
P ← P \ {v}
X ← X ∪ {v}
end for
end function
is adjacent to all vertices in R and consequently would form a clique with R.
For each v ∈ P the algorithm makes a recursive call for the clique R ∪ {v}
and restricts P and X to the neighborhood of v. After the recursive call,
vertex v is removed from P and added to X. This guarantees that the same
maximal cliques are not detected multiple times. For a graph G = (V, E)
the algorithm is initially called with P = V and R = X = ∅.
2.2.1
Pivoting
Bron and Kerbosch [3] introduced a method to increase the efficiency of
the basic algorithm by choosing a pivot element to decrease the number
of recursive calls. It is based on the observation that for any vertex u ∈
P ∪ X either u itself or one of its non-neighbors must be contained in any
maximal clique containing R. This is true since if neither u nor one of the
non-neighbors of u are included in a clique containing R, then this clique
cannot be maximal because u can be added to this clique due to the fact
that only neighbors of u were added to R. Hence, if we modify the BronKerbosch algorithm (Algorithm 1) so that we choose an arbitrary pivot
element u ∈ P ∪ X and iterate only over u and all its non-neighbors, then
we still enumerate all maximal cliques containing R but decrease the number
of recursive calls in the for-loop of Algorithm 1. Tomita et al. [25] have shown
that if u is chosen from P ∪ X such that u has the most neighbors in P , then
all maximal cliques of a graph G = (V, E) are enumerated in O(3|V |/3 ) time,
see Algorithm 2.
9
Algorithm 2 Enumerating all Maximal Cliques in a Graph with Pivoting
1: function BronKerboschPivot(P, R, X)
. R : a clique
. P ∪ X : set of all vertices v such that R ∪ {v} is a clique and where
• vertices in P have not yet been considered as additions to R and
• vertices in X already have been considered in earlier steps
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
if P ∪ X = ∅ then
add R to the solution
end if
choose pivot vertex u ∈ P ∪ X with |P ∩ N (u)| = max | P ∩ N (v) |
v∈P ∪X
for v ∈ P \ N (u) do
BronKerboschPivot(P ∩ N (v), R ∪ {v}, X ∩ N (v)))
P ← P \ {v}
X ← X ∪ {v}
end for
end function
2.2.2
Degeneracy of a Graph
Degeneracy is a measure of graph sparsity. Real-world instances of static
graphs (especially social networks) are often sparse, resulting in a small
degeneracy value [4]. This motivates a modification of the Bron-Kerbosch
algorithm which we present in this section and the complexity analysis of
this algorithm parameterized by the degeneracy of the input graph. The
degeneracy of a graph is defined as follows.
Definition 5 (Degeneracy). The degeneracy of a static graph G is defined
as the smallest integer d ∈ N such that each subgraph G0 of G contains a
vertex v with degree at most d.
If a graph has degeneracy d, we also call it d-degenerated. It is easy to
see that the maximal clique size of a d-degenerated graph is at most d + 1:
If there is a clique of size at least d + 2, then the vertices of this clique
would form a subgraph in which every vertex v of the clique has a degree
larger than d. For each d-degenerated graph there is a degeneracy ordering,
which is a linear ordering of the vertices with the property that for every
vertex v we have that at most d of its neighbors occur at a later position
in the ordering. The degeneracy d and a corresponding degeneracy ordering
for a graph G = (V, E) can be computed in linear time [4]: For graph G, the
vertex with the smallest degree is selected in each step and removed from
the graph until no vertex is left. The degeneracy of the graph is the highest
degree of a vertex at the time the vertex has been removed from the graph
and a corresponding degeneracy ordering is the order in which the vertices
were removed from the graph.
10
Algorithm 3 Enumerating all Maximal Cliques in a Graph with Degeneracy
Ordering
1: function BronKerboschDeg(P, R, X)
. R : a clique
. P ∪ X : set of all vertices v such that R ∪ {v} is a clique and where
• vertices in P have not yet been considered as additions to R and
• vertices in X already have been considered in earlier steps
2:
3:
4:
5:
6:
7:
for vi in a degeneracy odering v0 , v1 , . . . , vn of G = (V, E) do
P ← N (vi ) ∩ {vi+1 , . . . , vn−1 }
X ← N (vi ) ∩ {v0 , . . . , vi−1 }
BronKerboschPivot(P, {vi }, X)
end for
end function
For a graph G = (V, E) with degeneracy d, Eppstein et al. [4] showed
that using the degeneracy ordering of G in the outer-most recursive call and
afterwards using pivoting, all maximal cliques can be enumerated in O(d·|V |·
3d/3 ) time, see Algorithm 3. In other words, enumerating maximal cliques
is fixed-parameter tractable with respect to the parameter degeneracy d of
the input graph.
3
Bron-Kerbosch Algorithm for Temporal Graphs
We adapt the static Bron-Kerbosch algorithm to the temporal setting to enumerate all ∆-cliques, see Algorithm 4. The input of the algorithm consists
of two sets P and X of vertex-interval pairs as well as a tuple R = (C, I),
where C is a set of vertices and I a time interval. The idea is that in every recursive call of the algorithm, R is a time-maximal ∆-clique, and the
sets P and X contain vertex-interval pairs that are in the ∆-neighborhood
of every vertex in C during an interval I 0 ⊆ I. In particular, P ∪ X includes
all vertex-interval pairs (v, I) for which (C ∪ {v}, I) is a time-maximal ∆clique. While each vertex-interval pair in P still has to be combined with R
to ensure that every maximal ∆-clique will be found, for every vertexinterval pair (v, I 0 ) ∈ X every maximal ∆-clique (C 0 , I 00 ) with C ∪ {v} ⊆ C 0
and I 00 ⊆ I 0 has already been detected in earlier steps.
We show below that if ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I, then there is no vertex v that forms a ∆-clique together with C over the whole time interval I.
Consequently, R = (C, I) is a maximal ∆-clique.
In one step, for every vertex-interval pair (v, I 0 ) ∈ P a recursive call is
initiated for the ∆-clique R0 = (C ∪ {v}, I 0 ) with all parameters restricted to
the ∆-neighborhood of v in the time interval I 0 , that is, P u N ∆ (v, I 0 ) and
X u N ∆ (v, I 0 ). For the set P 0 for example, we get a set of all time-maximal
11
Algorithm 4 Enumerating all Maximal ∆-Cliques
1: function BronKerboschDelta(P, R = (C, I), X)
. R = (C, I) : time-maximal ∆-clique
. P ∪ X : set of all vertex-interval pairs (v, I 0 ) such that I 0 ⊆ I and
(C ∪ {v}, I 0 ) is a time-maximal ∆-clique and where
• vertex-interval pairs in P have not yet been considered as additions
to R and
• vertex-interval pairs in X already have been considered in earlier
steps
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
if ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I then
add R to the solution
end if
for (v, I 0 ) ∈ P do
R0 ← (C ∪ {v}, I 0 )
P 0 ← P u N ∆ (v, I 0 )
X 0 ← X u N ∆ (v, I 0 )
BronKerboschDelta(P 0 , R0 , X 0 )
P ← P \ {(v, I 0 )}
X ← X ∪ {(v, I 0 )}
end for
end function
vertex-interval pairs (w, I 00 ) for which it holds that (w, I 00 ) @
− N ∆ (v, I 0 ) and
00
(w, I ) @
− P . This restriction is made so that for all (w, I 00 ) ∈ P 0 of the
recursive call the vertex w is not only a ∆-neighbor of all x ∈ C but also of
the vertex v during the time I 00 ⊆ I 0 .
After the recursive call for ∆-clique (C ∪ {v}, I 0 ), the tuple (v, I 0 ) is
removed from the set P and added to the set X to avoid that the same
cliques are found multiple times.
For a temporal graph G = (V, E, T ) and a given time period ∆, the initial
call of Algorithm 4 to enumerate all maximal ∆-cliques in graph G is made
with P = {(v, T ) | v ∈ V }, R = (∅, T ) and X = ∅. In the remainder of this
document we will always assume that BronKerboschDelta is initially
called with those inputs.
3.1
Analysis
In the following, we prove the correctness of the algorithm and analyze its
running time. We start with arguing that the sets P and X behave as
claimed.
Lemma 1. For each recursive call of BronKerboschDelta
with R =
d
(C, I) and C 6= ∅, it holds that P ∪ X = v∈C N ∆ (v, I).
12
Proof. We prove this by induction on the recursion depth, that is, the number |C| of vertices in the clique in the current recursive call. In the initial call we have that C = ∅. In each iteration of the first call we have
that P ∪ X = {(v, T ) | v ∈ V } since, whenever a vertex-interval pair is
removed from P , then it is added to X, and initially P = {(v, T ) | v ∈ V }.
For every recursive call of BronKerboschDelta with R0 = (C 0 , I 0 ), P 0 ,
and X 0 , and C 0 = {v} for some vertex v we have that P 0 = P u N ∆ (v, I 0 )
and X 0 = X u N ∆ (v, I 0 ). Hence, we get
P 0 ∪ X 0 = {(v, T ) | v ∈ V } u N ∆ (v, I 0 ) = N ∆ (v, I 0 ).
Now we assume that we are in a recursive call of BronKerboschDelta
with R = (C, I), P , and
|C| > 1. By the induction hypothesis we
d X, where
∆
know that P ∪ X = v∈C N (v, I). Let (v, I 0 ) ∈ P be the vertex added to
the ∆-clique, that is, in the next recursive call we have that R0 = (C 0 , I 0 ),
with C 0 = C ∪ {v}, and P 0 = P u N ∆ (v, I 0 ) as well as X 0 = X u N ∆ (v, I 0 ).
Then,
P 0 ∪ X 0 = (P u N ∆ (v, I 0 )) ∪ (X u N ∆ (v, I 0 ))
= (P ∪ X) u N ∆ (v, I 0 )
l
=
N ∆ (w, I) u N ∆ (v, I 0 )
w∈C
=
l
N ∆ (w, I 0 ).
w∈C 0
This proves the claim.
Next, we show that the set R behaves as claimed, that is, R is indeed a
time-maximal ∆-clique in each recursive call of BronKerboschDelta.
Lemma 2. In each recursive call of BronKerboschDelta, R = (C, I) is
a time-maximal ∆-clique.
Proof. We show by induction on the recursion depth that R = (C, I) is
a time-maximal ∆-clique and that all vertex-interval pairs (v, I 0 ) in P are
∆-neighbors during I 0 to all vertices in the ∆-clique R and that I 0 is maximal under this property. The algorithm is initially called with R = (∅, T ),
which is a trivial time-maximal ∆-clique, and P = {(v, T ) | v ∈ V }, which
fulfills the desired property since the initial ∆-clique is empty and T is the
maximum time interval. In each recursive call BronKerboschDelta is
called with (P u N ∆ (v, I 0 ), (C ∪ {v}, I 0 ), X u N ∆ (v, I 0 )) for some (v, I 0 ) ∈ P .
By the induction hypothesis, v is a ∆-neighbor to all vertices in C during
time interval I 0 , and I 0 is maximal. Hence, (C ∪ {v}, I 0 ) is a time-maximal
∆-clique. Furthermore, each vertex-interval pair (v 0 , I 00 ) in P u N ∆ (v, I 0 ) is
in the ∆-neighborhood of each vertex-interval pair (v 00 , I 0 ) with v 00 ∈ C ∪{v},
13
since it is both in P and hence in the ∆-neighborhood of each vertex in C
and in N ∆ (v, I 0 ). The maximality of I 0 follows from the fact that the ∆-cut
and ∆-neighborhood operations preserve maximality of intervals by definition.
Now we can prove the correctness of the algorithm.
Theorem 1 (Correctness of Algorithm 4). Let G = (V, E, T ) be a temporal
graph. If algorithm BronKerboschDelta(P, R, X) is run on input (V ×
{T }, (∅, T ), ∅), then it adds all maximal ∆-cliques of G, and only these, to
the solution.
Proof. Let R∗ = (C ∗ , I ∗ ) be a maximal ∆-clique with |C ∗ | > 1. For a
recursive call of BronKerboschDelta on (P, R, X), say that a vertex is
a candidate, if there is an interval I with I ∗ ⊆ I such that (v, I) ∈ P . We
show by induction on |C ∗ | − `, that for each ` = 0, 1, . . . , |C ∗ | there is a
recursive call of BronKerboschDelta on (P, R = (C, I), X) with C ⊆ C ∗
and ` = |C ∗ \ C| candidates.
Clearly, in the initial call, C = ∅ ⊆ C ∗ and each vertex in C ∗ is a candidate. Now assume that there is a recursive call with (P, R = (C, I), X)
and C ⊆ C ∗ , and with ` − 1 = |C ∗ \ C| candidates. Consider the for-loop in
that recursive call and consider the first vertex-interval pair (v, I 0 ) in that
loop in which v is a candidate and I ∗ ⊆ I 0 . BronKerboschDelta proceeds
with a recursive call on (P u N ∆ (v, I 0 ), R0 = (C ∪ {v}, I 0 ), X u N ∆ (v, I 0 )).
Observe that each candidate except v remains a candidate also in this recursive call. Furthermore, |C ∗ \ (C ∪ {v})| = `. Thus, by induction there is a
recursive call with the sets (P, R, X) in which R∗ = R. Since
R∗ is maximal
d
00
by assumption, for each vertex-interval pair (w, I ) ∈ v∈C ∗ N ∆ (v, I ∗ ) we
have I 00 ( I ∗ . By Lemma 1 we have ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I ∗ and hence,
R∗ is added to the solution.
Now assume that R = (C, I) is added to the solution. By Lemma 2, R
is a time-maximal ∆-clique. By Lemma 1 and since P ∪ X = ∅, there is no
vertex that can be added to R. Hence, R is a maximal ∆-clique.
Next, we analyze the running time of BronKerboschDelta. We start
with the following observation.
Lemma 3. For every time-maximal ∆-clique R of a temporal graph G =
(V, E, T ), there is at most one recursive call of BronKerboschDelta
with R as an input.
Proof. Assume that there are two recursive calls A and B of BronKerboschDelta with the same R = (C, I). Let R0 = (C 0 , I 0 ), with C 0 ⊂ C
and I ⊆ I 0 , occur in the recursive call corresponding to the closest common ancestor of the recursive calls A and B in the recursion tree. Hence,
14
there are two vertex-interval pairs (v, J), (w, J 0 ) ∈ P that lead to the calls A
and B, respectively, in the for loop.
Consider the case v = w. Then, J and J 0 must overlap in at least ∆
time steps, because I ⊆ J, J 0 ⊆ I 0 . However, P is contained in the ∆cut of the ∆-neighborhoods of C 0 over I 0 and thus, for each vertex no two
vertex-interval pairs in P overlap in ∆ time steps, a contradiction.
Now consider the case v 6= w. Without loss of generality due to symmetry assume that (v, J) is processed first in the for loop. Then, when
processing (w, J 0 ), pair (v, J) has been added to X. This is a contradiction
to the fact that recursive call B outputs R, that is, it outputs a clique with
time interval I ⊆ J.
Hence, we have that there cannot be two recursive calls of BronKerboschDelta with R = (C, I).
Now we upper-bound the running time for computing a ∆-cut.
Lemma 4. Let X and Y be two sets of vertex-interval pairs with the following properties.
• For every (v, I) ∈ X ∪ Y we have that |I| ≥ ∆,
• for every (v, I) ∈ X and (v, I 0 ) ∈ X we have that |I ∩ I 0 | < ∆,
• for every (v, I) ∈ Y and (v, I 0 ) ∈ Y we have that |I ∩ I 0 | < ∆,
• X and Y are sorted lexicographically by first the vertex and then the
starting point of the interval.
Then the ∆-cut X u Y can be computed in O(|X| + |Y |) time such that it is
also sorted lexicographically by first the vertex and then the starting point of
the interval.
Proof. The ∆-cut X u Y of two sets of vertex-interval pairs X and Y can
be computed in the following way.
For every vertex v, we do the following:
1. Select the first vertex-interval pairs (v, I) and (v, I 0 ) from X and Y ,
respectively.
2. If |I ∩ I 0 | > ∆, then add (v, I ∩ I 0 ) to the output (the ∆-cut). If the
endpoint of I 0 is smaller than the endpoint of I, then replace (v, I 0 )
with the next vertex-interval pair in Y , otherwise replace (v, I) with
the next vertex-interval pair in X.
3. Repeat Step 2 until all vertex-interval pairs containing vertex v are
processed.
Note that the intervals for each vertex v are added to the output in order
of their starting point. Furthermore, by construction of the algorithm we
have that for each (v, I) in the output, (v, I) is also in the ∆-cut X u Y . It
remains to show that for all (v, I) ∈ X and (v, I 0 ) ∈ Y with |I ∩ I 0 | ≥ ∆ we
have that (v, I ∩ I 0 ) is included in the output. Let I = [a, b] and I 0 = [a0 , b0 ].
At some point, the procedure processes in Step 2 for the first time one of
(v, I) ∈ X or (v, I 0 ) ∈ Y . Without loss of generality, let (v, I) ∈ X be
15
processed first. If at the same time also (v, I 0 ) ∈ Y is processed, clearly,
(v, I ∩ I 0 ) is added to the output, as required. Now assume that Step 2
processes some other vertex-interval pair (v, I 00 = [a00 , b00 ]) ∈ Y , a00 < a0 ,
together with (v, I) ∈ X. Since |I ∩ I 0 | ≥ ∆ and |I 0 ∩ I 00 | < ∆ we have
that b00 < b and hence, (v, I) is not replaced in this step. Consequently, the
procedure eventually adds (v, I ∩ I 0 ) to the output.
In each step of the procedure at least one new vertex-interval pair is
processed and each vertex-interval pair in X and Y is only processed once.
Hence, the running time is in O(|X| + |Y |).
Lemmata 3 and 4 allow us to upper-bound the running time of BronKerboschDelta depending on the number of different time-maximal ∆-cliques
of the input graph.
Theorem 2. Let G = (V, E, T ) be a temporal graph with x distinct timemaximal ∆-cliques. Then BronKerboschDelta enumerates all maximal
∆-cliques in O(x · |E| + |E| · |T |) time.
Proof. We assume that all edges of the temporal graph are sorted by their
time stamp. Note that this can be done in a preprocessing step in O(|E|·|T |)
time using Counting Sort. Furthermore, we assume that for each vertex v,
the ∆-neighborhood N ∆ (v, T ) is given. These neighborhoods can be precomputed in O(|E|) time, assuming that the edges are sorted by their time
stamps.
By Lemma 3 we know that for each time-maximal ∆-clique there is at
most one recursive call of BronKerboschDelta. By charging the computation of P 0 , R0 , and X 0 to the corresponding recursive call, for each recursive
call we compute a constant number of ∆-neighborhoods and ∆-cuts. The
size of the sets P , X, and any ∆-neighborhood is upper-bounded by |E|
and each of these sets has the property that for every (v, I) and (v, I 0 ) out
of the same set we have that |I ∩ I 0 | < ∆. Given N ∆ (v, T ), N ∆ (v, I) can
be computed in O(|E|) time for any I and by Lemma 4, a ∆-cut can be
computed in O(|E|) time. Hence, all maximal ∆-cliques can be enumerated
in O(x · |E| + |E| · |T |) time.
We now use a general upper bound for the number of time-maximal ∆cliques in a temporal graph to bound the overall running time of BronKerboschDelta.
Corollary 1. Let G = (V, E, T ) be a temporal graph. BronKerboschDelta
enumerates all maximal ∆-cliques of G in O(2|V | · |T | · |E|) time.
Proof. Note that the vertex set of each maximal ∆-clique induces a static
clique in the static graph G underlying G that has an edge between two
vertices if and only if there is a time-edge in G between these vertices at
some time step. Furthermore, for each clique in G, there are at most |T |
16
maximal ∆-cliques because their time intervals are pairwise not contained in
one-another. Hence, the number of time-maximal ∆-cliques of any temporal
graph is upper-bounded by 2|V | ·|T |. By Theorem 2, we get an overall running
time in O(2|V | · |T | · |E|).
3.2
Pivoting
In this section, we explain how we can decrease the number of recursive
calls of BronKerboschDelta by using pivoting. Recall that the idea of
pivoting in the classic Bron-Kerbosch algorithm for static graphs is based
on the observation that for any vertex u ∈ P ∪ X either u itself or one of
its non-neighbors must be contained in any maximal clique containing R.
Vertex u is also called pivot.
A similar observation holds for maximal ∆-cliques in temporal graphs.
Instead of vertices, however, we now choose vertex-interval pairs as pivots:
For any (vp , Ip ) ∈ P ∪ X and any maximal ∆-clique Rmax = (Cmax , Imax )
with Imax ⊆ Ip , either vertex vp or one vertex w 6= vp which is not a ∆neighbor of vp during the time Imax , that is, (w, Imax ) 6@
− N ∆ (vp , Ip ), must
be contained in Cmax .
By choosing a pivot element (vp , Ip ) ∈ X ∪P we only have to iterate over
all elements in P which are not in the ∆-neighborhood of the pivot element,
see Algorithm 5. In other words, we do not have to make a recursive call
for any (w, I 0 ) ∈ P which holds (w, I 0 ) @
− N ∆ (vp , Ip ).
In Figure 2 we give an illustrative example for pivoting. In this example, we assume that the algorithm runs on a temporal graph such that the
set P = {(a, [0, 8]), (b, [0, 4]), (c, [1, 3]), (c, [5, 8])} occurs within a recursive
call of BronKerboschDeltaPivot. For simplicity, we show in Figure 2(a)
only the subgraph containing the elements of P and the relation between
these elements rather than displaying the whole graph. In Figure 2(b), we
choose element (a, [0, 8]) (hatched) as pivot. It can be seen that the elements (b, [0, 4]) and (c, [5, 8]) lie completely in the ∆-neighborhood (dotted)
of the pivot, that is, (b, [0, 4]), (c, [5, 8]) @
− N ∆ (a, [0, 8]). These two elements
can therefore be left out in the iteration over the elements in P of the
BronKerboschDelta. We only have to iterate over the pivot (a, [0, 8])
and the element (c, [1, 3]) which is not completely in the ∆-neighborhood
of our chosen pivot. In Figure 2(c), we can see that for every maximal
∆-clique (C, I) with respect to P either a ∈ C, I ⊆ [0, 8] or c ∈ C,
I ⊆ [1, 3]. The figure hence shows that iterating over the elements (b, [0, 4])
and (c, [5, 8]) will not find any maximal ∆-clique that we do not find via one
of the elements (a, [0, 8]) and (c, [1, 3]).
Next, we formally prove the correctness of this procedure.
Proposition 1. For each ∆-clique R = (C, I) and a pivot element (vp , Ip ) ∈
P ∪ X, the following holds: for every Rmax = (Cmax , Imax ) with C ⊂ Cmax
17
0
1
2
3
4
5
6
7
8
a
b
c
(a) P = {(a, [0, 8]), (b, [0, 4]), (c, [1, 3]), (c, [5, 8])}
0
1
2
3
4
5
6
7
8
a
b
c
(b) Pivot (a, [0, 8]) with (b, [0, 4]), (c, [5, 8]) ∈ N ∆ (a, [0, 8])
0
1
2
3
4
5
6
7
8
a
b
c
(c) ∆-cliques
Figure 2: A exemplary set P of BronKerboschDeltaPivot, a possible pivot element (hatched) including its ∆-neighborhood (dotted), and all
maximal ∆-cliques with respect to set P , ∆ = 2.
and Imax ⊆ Ip ⊆ I it either holds that vp ∈ Cmax or otherwise there is a
vertex w ∈ Cmax that satisfies (w, I 0 ) ∈ P ∪ X, Imax ⊆ I 0 , and (w, Imax ) 6@
−
N ∆ (vp , Ip ), and consequently (w, I 0 ) 6@
− N ∆ (vp , Ip ).
Proof. Let Rmax = (Cmax , Imax ) be a maximal ∆-clique with C ⊂ Cmax
and Imax ⊆ Ip ⊆ I. Assume that vp ∈
/ Cmax and for each w ∈ Cmax it holds
that (w, Imax ) @
− N ∆ (vp , Ip ). Consequently, for each w ∈ Cmax \ C there
exists a (w, I 0 ) ∈ P ∪ X with Imax ⊆ I 0 . Because vp is a ∆-neighbor of all
vertices in Cmax \ C at least during Imax and a ∆-neighbor of all vertices
in C during Ip , the vertex vp can be added to the ∆-clique Rmax , yielding
another ∆-clique with at least the same lifetime. This is a contradiction to
the assumption that Rmax is maximal.
18
Algorithm 5 Enumerating all Maximal ∆-Cliques in a Temporal Graph
with Pivoting
1: function BronKerboschDeltaPivot(P, R = (C, I), X)
. R = (C, I) : time-maximal ∆-clique
. P ∪ X : set of all (v, I 0 ) s.t. I 0 ⊆ I and (C ∪ {v}, I 0 ) is a time-maximal
∆-clique
2:
if ∀(w, I 0 ) ∈ P ∪ X : I 0 ( I then
3:
add R to the solution
4:
end if
5:
choose pivot element (vp , Ip ) ∈ P ∪ X
6:
for (v, I 0 ) ∈ P \ {(w, I 00 ) | (w, I 00 ) ∈ P ∧ (w, I 00 ) @
− N ∆ (vp , Ip )} do
0
0
7:
R ← (C ∪ {v}, I )
8:
P 0 ← P u N ∆ (v, I 0 )
9:
X 0 ← X u N ∆ (v, I 0 )
10:
BronKerboschDeltaPivot(P 0 , R0 , X 0 )
11:
P ← P \ (v, I 0 )
12:
X ← X ∪ (v, I 0 )
13:
end for
14: end function
An optimal pivot element is chosen in such a way that it minimizes the
number of recursive calls. It is the element in the set P ∪ X having the
largest number of elements in P in its ∆-neighborhood. We have seen that
the whole procedure is quite similar to pivoting in the basic Bron-Kerbosch
algorithm but with one difference: we are able to choose more than one
pivot element. The only condition that has to be satisfied is that the time
intervals of the pivot elements cannot overlap:
For each ∆-clique R = (C, I) in a recursive call of the algorithm, choosing
a pivot element (vp , Ip ) ∈ P ∪ X only affects maximal ∆-cliques Rmax =
(Cmax , Imax ) fulfilling Imax ⊆ Ip . Moreover, for all elements (w, I 0 ) ∈ P
satisfying (w, I 0 ) @
− N ∆ (vp , Ip ) it holds I 0 ⊆ Ip . Consequently, a further pivot
0
0
element (vp , Ip ) ∈ P ∪ X fulfilling that Ip0 does not overlap with Ip neither
interferes with the considered maximal ∆-cliques nor with the vertex-interval
pairs in P that are in the ∆-neighborhood of the pivot element (vp , Ip ).
The problem of finding the optimal set of pivot elements in P ∪ X can
be formulated as a weighted interval scheduling maximization problem:
Weighted Interval Scheduling
Input: A set J of jobs j with a time interval Ij and a weight wj
each.
P
Task: Find a subset of jobs J 0 ⊆ J that maximizes j∈J 0 wj such
that for all i, j ∈ J 0 with i 6= j, the time intervals Ii and Ij do
not overlap.
In our problem, the jobs are the elements of P ∪ X and the weight of an
19
element is thereby the number of all elements that are in P and lie in the ∆neighborhood of this element. Formally, the jobs are the elements (v, I 0 ) ∈
P ∪X, the corresponding time interval is I 0 of the element (v, I 0 ) and the corresponding weight w(v,I 0 ) = |{(v, I) | (v, I) ∈ P ∧ (v, I) @
− N ∆ (v, I 0 )}|. This
problem can be solved efficiently in O(min(|E|, |V | · |T |) · log(min(|E|, |V | ·
|T |))) time by using dynamic programming [15, Chapter 6.1] under the assumption that the weights of the potential pivot elements are known.
4
Degeneracy of Temporal Graphs
Recall from Section 2.2.2 that one can upper-bound the running time of the
static Bron-Kerbosch algorithm using the degeneracy of the input graph.
The degeneracy of a graph G is the smallest integer d such that every nonempty subgraph of G contains a vertex of degree at most d. We now give an
analogue for the temporal setting, motivated by the fact that static graphs
are often sparse in practice as measured by small degeneracy [4]. Intuitively,
we want to capture the fact that a temporal graph keeps its degeneracy value
during its whole lifetime.
Definition 6 (∆-slice degeneracy). A temporal graph G = (V, E, T ) has
∆-slice degeneracy d if for all t ∈ T we have that the graph Gt = (V, Et ),
where Et = {{v, w} | ({u, w}, t0 ) ∈ E for some t0 ∈ [t, t+∆]}, has degeneracy
at most d.
Using the parameter ∆-slice degeneracy, we can upper-bound the number
of time-maximal ∆-cliques of a temporal graph.
Lemma 5. Let G = (V, E, T ) be a temporal graph with ∆-slice degeneracy d.
Then, the number of time-maximal ∆-cliques in G is at most 3d/3 · 2d+1 ·
|V | · |T |.
Proof. Let G = (V, E, T ) be a temporal graph with ∆-slice degeneracy d.
Then we call the graph Gt = (V, Et ), where Et = {{v, w} | ({u, w}, t0 ) ∈
E for some t0 ∈ [t, t + ∆]} a ∆-slice of G at time t. The vertex set of each
time-maximal ∆-clique which starts at time t is also a clique in Gt , otherwise
there would be two vertices which are disconnected for more than ∆ timesteps. Since Gt has degeneracy at most d, the number of maximal cliques
of Gt is upper-bounded by 3d/3 · |V | [4]. Furthermore, the maximum size of
a clique is upper-bounded by d + 1. Hence, the total number of cliques is
upper-bounded by 3d/3 · 2d+1 · |V |. Note that for each of those cliques we
have at most one time-maximal ∆-clique starting at time t. Hence, the total
number of ∆-cliques is at most 3d/3 · 2d+1 · |V | · |T |.
Lemma 5 now allows us to bound the running time of Algorithm 4 using
the ∆-slice degeneracy d of the input graph G.
20
Theorem 3. Let G = (V, E, T ) be a temporal graph with ∆-slice degeneracy d. Then, BronKerboschDelta enumerates all ∆-cliques of G in
O(3d/3 · 2d · |V | · |T | · |E|) time.
Proof. By Lemma 5 we know that the number of time-maximal ∆-cliques in
a temporal graph with ∆-slice degeneracy d is at most 3d/3 · 2d+1 · |V | · |T |.
Hence, by Theorem 2, we get an overall running time in O(3d/3 · 2d · |V | ·
|T | · |E|).
Note that Theorem 3 implies that enumerating all maximal ∆-cliques is
fixed-parameter tractable with respect to the parameter ∆-slice degeneracy.
Hence, while NP-hard in general, the problem can be solved efficiently if the
∆-slice degeneracy of the input graph is small.
5
Experimental Results
In this section we present our experimental results. We give the ∆-slice degeneracy of several real-world temporal graphs for several values for ∆. Then
we show the behavior of our implementation of BronKerboschDeltaPivot
(Algorithm 5) applied to these real-world temporal graphs and compare it
to the algorithm implemented by Viard et al. [29].
5.1
Setup and Statistics
We now give details of the implementation and the used reference algorithm,
and introduce the data sets we used in the experiments. Furthermore, we
explain how the values of ∆ were chosen, give some statistics for the data
set, and calculate the ∆-slice degeneracy of the data sets for the chosen
values of ∆.
Implementation. We implemented3 BronKerboschDeltaPivot with
slight modifications that allow the algorithm to use multiple pivot elements
(we refer to this version as BronKerboschDeltaPivot*). Furthermore,
we implemented a simple algorithm to compute the ∆-slice degeneracy.
Both implementations are in Python 2.7.12 and all experiments were carried
out on an Intel Xeon E5-1620 computer with four cores clocked at 3.6 GHz
and 64 GB RAM. We did not utilize the parallel-processing capabilities although it should be easy to achieve almost linear speed-up with growing
number of cores due to the simple nature of BronKerboschDeltaPivot.
The operating system was Ubuntu 16.04.4 with Linux kernel version 4.4.057. We compared BronKerboschDeltaPivot* with the algorithm by
Viard et al. [29] which was also implemented in Python. We modified their
3
Code freely available at http://fpt.akt.tu-berlin.de/temporalcliques/ (GNU
General Public License).
21
source code4 by removing the text output in their implementation in order
to avoid speed differences. We call their algorithm Algorithm VLM below.
Data Sets. We chose several freely available real-world temporal graphs
aiming for an overview over the different kinds of contexts in which such
graphs arise, that is, an overview over different modes of communication and
different kinds of entities and environments in which this communication
takes place. However, a focus is on temporal graphs based on physical
proximity of individuals, since previous work on ∆-cliques also focused on
these [28, 29]. The contexts and sources of our test set of temporal graphs
are as follows:
• internet-router communication: as733 [18],
• email communication: karlsruhe [7],
• social-network communication: facebook-like [23], and
• physical-proximity5 between
– high school students: highschool-2011, highschool-2012, highschool2013 [1, 6, 24],
– patients and health-care workers: hospital-ward [27],
– attendees of the ACM Hypertext 2009 conference: hypertext [13],
– attendees of the Infectious SocioPatterns event: infectious [13],
and
– children and teachers in a primary school: primaryschool [24].
Table 1 contains the number of vertices, edges, temporal resolution, and
lifetime of the corresponding temporal graphs. As a time step we fixed one
second for each of the data sets. Viard et al. [29], as the first work on enumerating ∆-cliques, used the data set highschool-2012 in their experiments.
Chosen values of ∆. In order to limit the influence of time scales in the
data and to make running times comparable between instances, as well as
to be able to present the results in a unified way, we chose the ∆-values as
follows. We decided on a reference point of the edge appearance rate that
is, of the average number of edges per time step and we fixed a set of ∆values for this reference point. For each considered instance we then scaled
the reference ∆-values proportionally to the quotient of the reference edge
appearance rate and the edge appearance rate in the instance.
4
5
Code freely available at https://github.com/TiphaineV/delta-cliques .
Available at http://www.sociopatterns.org/datasets .
22
Table 1: Statistics for the data sets used in our experiments.
Instance
as733
facebook-like
highschool-2011
highschool-2012
highschool-2013
hospital-ward
hypertext
infectious
karlsruhe
primaryschool
Vertices
Edges
Resolution
Lifetime (s)
7,716
1,899
126
180
327
75
113
10,972
1,870
242
11,410,810
59,835
28,560
45,047
188,508
32,424
20,818
415,912
461,661
125,773
1d
1s
20s
20s
20s
20s
20s
20s
1s
20s
67,824,000
16,736,181
272,330
729,500
363,560
347,500
212,340
6,946,340
123,837,267
116,900
As the reference point we chose the edge appearance rate of 1/5 edges per
time step; this value was chosen for convenience within the interval of edgeappearance rates in the studied data sets (see Table 1). Since, intuitively, the
∆-values of interest in practice increase exponentially, we chose as reference
∆-values the numbers 0 and 5i for i = 1, 2, . . .. As mentioned, for each
instance, these values are then multiplied by the quotient of edge appearance
rates. That is, if the instance has m edges and lifetime `, then we scaled
the reference ∆-values by the factor (1/5)/(m/`) = `/(5m). For example,
for highschool-2012 we obtain the ∆-values {0, 80, 404, 2024, 10121, 50606,
253034, . . .}. For reference, recall that each time step in highschool-2012
corresponds to one second (a day has 86,000 seconds and a week has 604,800
seconds). In figures, we refer to each scaled value of ∆ by ∆ ∼ 5i for some
concrete i. Viard et al. [28] used ∆-values according to 60 seconds, 15
minutes, 1 hour and 3 hours.
∆-Slice Degeneracy. The ∆-slice degeneracies for our set of instances are
shown in Table 2 together with the static degeneracy of the underlying static
graph which has an edge whenever there is an edge at some time step in
the temporal graph. Clearly, as the value of ∆ increases, the ∆-slice degeneracy approaches—and is upper-bounded by—the static degeneracy. The
static degeneracy of our instances is small in comparison with the size of the
graph. This falls in line with the analysis by Eppstein et al. [4] for many
real-world graphs. Moreover, for many practically relevant values of ∆ the
∆-slice degeneracy is still significantly smaller. For example, in the instance
highschool-2012, the scaled value of ∆ corresponding to 53 equals 2204 time
steps (seconds) and the corresponding ∆-slice degeneracy is 5. This indicates that ∆-slice degeneracy can be a very promising (that is, also small)
parameter when designing and analyzing algorithms for temporal graphs.
We computed the ∆-slice degeneracies using a straightforward approach.
23
Table 2: Static degeneracy and ∆-slice degeneracy. Empty cells indicate
that the lifetime of the temporal graph is smaller than the scaled ∆-value.
Instance
as733
facebook-like
highschool-2011
highschool-2012
highschool-2013
hospital-ward
hypertext
infectious
karlsruhe
primaryschool
Static
∆=0
∼ 53
∼ 55
∼ 57
∼ 59
24
20
21
18
24
22
28
18
33
47
13
1
4
4
4
4
6
4
2
4
13
3
7
5
5
6
7
9
6
4
14
6
11
6
9
11
8
18
9
10
15
19
19
12
14
18
22
18
17
31
24
18
32
We iteratively computed for each ∆-long time interval the graph induced by
the edges in that time interval. For each of these graphs we computed
the static degeneracy using an implementation from the NetworkX python
library [8]. This approach is rather inefficient. For example, it took about
seven hours to compute the ∆-slice degeneracy for karlsruhe with ∆ ∼ 55
(equating to a ∆ value of about two hours).
5.2
Results and Running Times
We now study the efficiency of BronKerboschDeltaPivot*, evaluate
pivoting strategies, and compare the result to Algorithm VLM.
Pivoting. Generally we observed that pivoting plays a negligible role when
∆ is small compared to the overall lifetime of the graph, that is, when ∆ is
less than roughly one third of the lifetime. In this case, pivoting has almost
no effect on the running time and the number of recursive calls. For larger
values of ∆, however, pivoting can make a clear difference depending on the
type of temporal graph.
We tested five strategies for selecting a set of pivots from P in BronKerboschDeltaPivot*. Call a set of pivots is maximal if the interval of each
element from P overlaps with at least one pivot. We tested the following
variants of pivot sets:
1A) a single arbitrary pivot,
1G) a single pivot maximizing the number of elements removed from P ,
MA) an arbitrary maximal set of pivots (pivots picked one-by-one arbitrarily),
24
No Pivoting
1A
1G
MA
MG
MM
Running time (s)
30
20
10
0
0
2
4
∆
6
·105
Figure 3: Running time for different pivoting strategies on highschool-2012.
MG) a maximal set of pivots (pivots picked one by one according to the
maximum number of further elements removed from P ), and
MM) a set of pivots which maximizes the number of elements removed
from P .
Clearly, each strategy has its own trade-off between the time needed to
compute the pivots and the possible reduction in recursive calls.
Running times are given for highschool-2012 in Figure 3 with ∆ between 15,000 and 725,000. We note that running times for some very small
values of ∆ below 15,000 are larger than 30 s and hence do not fit in the
chart. We consider this phenomenon more closely below. For ∆ ≤ 15,000
there is no appreciable difference between the pivoting strategies. In terms
of relative difference between pivoting strategies, highschool-2012 seems to
be a representative example. Strategies 1G and MG seem to be the best options: they do not incur much overhead compared to no pivoting for small ∆
and yield strong running time improvements for larger ∆. In comparison
to no pivoting, strategies 1G and MG achieve a 60 % reduction in recursive
calls for ∆-values of around 7 · 106 in highschool-2012. Since the running
times of strategy 1G and MG are so close to each other we conclude that
in most cases there is only one important pivot that should be selected.
We were surprised to see that maximizing the overall number of elements
removed from P via the pivot set (strategy MM) results in slightly worse
running times and slightly larger numbers of recursive calls. The number
of elements that are removed by a pivot in one recursive call of the algorithm ranges between one and 14 while many of the calls remove two to four
elements. Notice that occasional reduction by ten or more elements can
25
No Pivoting
1A
1G
MA
MG
MM
Running time (s)
50
45
40
0
0.5
1
∆
1.5
2
·107
Figure 4: Running time for different pivoting strategies on facebook-like.
substantially decrease the search space, because in general its size depends
exponentially on the size of P .
Figure 4 shows running times for facebook-like. On this graph, pivoting
seldom removes more than one element from the candidate set P in one call
of the recursive procedure. Hence, for this instance, pivoting mainly incurs
overhead for computing the pivots, but do not substantially decrease the
search space. We consequently observe about 10 % slower running times,
regardless of the pivoting strategy.
In conclusion, strategy 1G offers the best trade-off between additional
running time spent with computing the pivot(s) and running time saved due
to decreased number of recursive calls. Overall, the the possible benefits
seem to outweigh the overhead incurred by pivoting on some instances. All
remaining experiments were thus carried out with strategy 1G.
Running Times and Comparison with Algorithm VLM. We experimented with BronKerboschDeltaPivot* (Algorithm 5) using pivoting strategy 1G and with Algorithm VLM for ∆ = 0 and ∆ ∼ 5i with
i = 1, 3, 5, 7, 9 (where the lifetime allowed such values of ∆). An excerpt of
the results is given in Table 3. Clearly, larger instances with more vertices
or edges demand a longer running time. However, even large instances like
infectious can still be solved within one hour.
From our theoretical results in Section 3 we expected that the running
time of BronKerboschDeltaPivot* increases exponentially with growing ∆-slice degeneracy. As the ∆-slice degeneracy grows very slowly with
increasing ∆ (see Table 2), we expected a corresponding moderate growth in
running time with respect to ∆. For larger ∆, this is consistent with the ex-
26
Table 3: ∆-clique statistics and running times: |C| denotes the number of
maximal ∆-cliques, s denotes the maximum ∆-clique size, ` the maximum
∆-clique lifetime divided by 105 , tBKD and tVLM denote the running time
in seconds of BronKerboschDelta* and Algorithm VLM, respectively.
Empty cells represent an exceeded running time limit of one hour.
∆=0
Instance
facebook-like
highschool-2011
highschool-2012
highschool-2013
hospital-ward
hypertext
infectious
karlsruhe
primaryschool
|C|
s
`
tBKD
tVLM
61,648
26,510
42,285
172,362
27,910
19,150
349,787
2
5
5
5
5
6
5
1,674
27
73
36
35
21
695
169
131
248
1,952
370
85
1,530
107,121
5
12
995
12
7
12
118
14
5
2,515
1,494
147
∆ ∼ 53
Instance
facebook-like
highschool-2011
highschool-2012
highschool-2013
hospital-ward
hypertext
infectious
karlsruhe
primaryschool
|C|
s
`
tBKD
tVLM
33,876
7,394
9,501
57,121
8,694
6,345
134,787
4
7
6
6
7
7
9
1,675
27
73
36
35
21
695
70
5
8
178
15
8
1,195
1,141
153
236
1,990
226
107
83,314
9
12
83
∆ ∼ 55
Instance
facebook-like
highschool-2011
highschool-2012
highschool-2013
hospital-ward
hypertext
infectious
karlsruhe
primaryschool
|C|
s
`
tBKD
23,247
7,760
7,536
29,752
10,869
7,459
163,162
235,684
508,430
5
10
7
8
12
7
16
9
20
1,709
28
75
37
36
23
697
12,417
15
47
4
4
23
7
4
1,277
1,235
890
27
tVLM
1,365
2,193
Running time (s)
103
BronKerboschDeltaPivot*
Algorithm VLM
102
101
102
103
104
∆
Figure 5: Running time vs. ∆ on highschool-2012.
perimental results, as shown in Figures 3, 4 and Table 3. However, for (very)
small ∆ we often observe an initial spike in the running time (and number of
∆-cliques) which then subsides. This is also shown in Figure 5. A possible
explanation for this spike is that, for small ∆, the ∆-neighborhood of many
vertices becomes very fragmented, leading to large candidate sets P in the
algorithm (although the size of P is still linear in the input size for constant
∆-slice degeneracy). Furthermore, if ∆ is small, then many singleton edges
may form maximal ∆-cliques themselves. These ∆-cliques then get taken
up into larger maximal ∆-cliques when ∆ increases, which decreases the
number of ∆-cliques and running times for BronKerboschDeltaPivot*.
On facebook-like our algorithm notably is comparably efficient given the
relatively large size (see Figures 4 and 6). Furthermore, the number of
∆-cliques does not seem to vary strongly with changing values of ∆. These
two facts may hint at some special structure that is present in temporal
graphs based on online social networks, in addition to small ∆-slice degeneracy.
Algorithm VLM is usually faster than BronKerboschDeltaPivot*
for small values of ∆ below the ∆ ∼ 53 threshold. Starting from there,
however, BronKerboschDeltaPivot* outperforms Algorithm VLM with
running times smaller by at least one order of magnitude and up to three
orders of magnitude (see Table 3). In terms of main memory, 385 MB is
the maximum used by BronKerboschDeltaPivot* over all solved instances, attained on infectious for ∆ = 0. On this instance, Algorithm VLM
uses 494 MB and often more than 1 GB.
Finally we mention that, when increasing the time limit to six hours,
BronKerboschDeltaPivot* can solve all instances of karlsruhe for ∆ = 0
28
Running time (s)
BronKerboschDeltaPivot*
Algorithm VLM
103
102
103
104
∆
Figure 6: Running time vs. ∆ on facebook-like.
and ∆ ∼ 5i for i = 1, 3, 5, 7, 9 wherein the last value of ∆ involves enumerating 43 · 106 maximal ∆-cliques.
6
Conclusion and Outlook
We studied the algorithmic complexity of enumerating ∆-cliques in temporal graphs. We adapted the Bron-Kerbosch algorithm ([3]), including the
procedure of pivoting to reduce the number of recursion calls, to the temporal setting and provided a theoretical analysis. For the theoretical analysis,
we formalized and employed the concept of ∆-slice degeneracy which may
be a useful parameter when analyzing problems in sparse temporal graphs.
In experiments on real-world data sets, we showed that our algorithm is
notably faster than the first approach for enumerating all maximal ∆-cliques
in temporal graphs due to Viard et al. [28, 29]. Our experimental results
further reveal that pivoting can notably decrease the running time for large
values of ∆. Furthermore, we measured the ∆-slice degeneracy for different
∆-values and showed that it is reasonably small in many real-world data
sets.
As to future research, an algorithmic challenge is to find a more efficient
way to compute the ∆-slice degeneracy of a given temporal graph, perhaps
via different characterizations as in the case of static graphs. See [4] for an
account of several equivalent definitions of the degeneracy of a static graph.
Regarding the adapted version of the Bron-Kerbosch algorithm, our theoretical analysis (based on the ∆-slice degeneracy parameter) of the running
time still leaves room for improvement. In particular, we leave the impact
of pivoting on the running time upper bound as an open question for future
29
research. It furthermore makes sense to try and implement further improved
branching rules on top of pivoting. This was also successful for the static
Bron-Kerbosch algorithm [21]. Another interesting question is whether an
analogue to the degeneracy ordering can be defined in the temporal setting
and, if so, whether it can be used to further improve the algorithm.
Acknowledgements. Anne-Sophie Himmel, Hendrik Molter and Manuel
Sorge were partially supported by DFG, project DAPA (NI 369/12). Manuel
Sorge gratefully acknowledges support by the People Programme (Marie
Curie Actions) of the European Union’s Seventh Framework Programme
(FP7/2007-2013) under REA grant agreement number 631163.11 and by
the Israel Science Foundation (grant no. 551145/14).
We are grateful to two anonymous SNAM reviewers whose feedback
helped to significantly improve the presentation and to eliminate some bugs
and inconsistencies.
References
[1] A. Barrat and J. Fournet. Contact patterns among high school students.
PLoS ONE, 9(9):e107878, 2014.
[2] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio, J. GómezGardeñes, M. Romance, I. Sendiña-Nadal, Z. Wang, and M. Zanin.
The structure and dynamics of multilayer networks. Physics Reports,
544(1):1–122, 2014.
[3] C. Bron and J. Kerbosch. Algorithm 457: finding all cliques of an
undirected graph. Communications of the ACM, 16(9):575–577, 1973.
[4] D. Eppstein, M. Löffler, and D. Strash. Listing all maximal cliques in
large sparse real-world graphs in near-optimal time. ACM Journal of
Experimental Algorithmics, 18(3):3.1:1–3.1:21, 2013.
[5] T. Erlebach, M. Hoffmann, and F. Kammer. On temporal graph exploration. In Proceedings of the 42nd International Colloquium on Automata, Languages, and Programming (ICALP 2015), volume 9134 of
LNCS, pages 444–455. Springer, 2015.
[6] V. Gemmetto, A. Barrat, and C. Cattuto. Mitigation of infectious disease at school: targeted class closure vs school closure. BMC Infectious
Diseases, 14(1):1, 2014.
[7] R. Goerke. Email network of KIT informatics. http://i11www.iti.
uni-karlsruhe.de/en/projects/spp1307/emaildata, 2011.
30
[8] A. A. Hagberg, D. A. Schult, and P. J. Swart. Exploring network
structure, dynamics, and function using NetworkX. In Proceedings of
the 7th Python in Science Conference (SciPy 2008), pages 11–15, 2008.
[9] A.-S. Himmel.
Enumerating maximal cliques in temporal graphs.
Bachelorthesis, TU Berlin, January 2016.
URL
http://fpt.akt.tu-berlin.de/publications/theses/
BA-anne-sophie-himmel.pdf. Bachelor thesis.
[10] A.-S. Himmel, H. Molter, R. Niedermeier, and M. Sorge. Enumerating maximal cliques in temporal graphs. In Proceedings of the 2016
IEEE/ACM International Conference On Advances in Social Networks
Analysis and Mining (ASONAM 2016), pages 337–344. IEEE, 2016.
[11] P. Holme and J. Saramäki. Temporal networks. Physics Reports, 519
(3):97–125, 2012.
[12] F. Hüffner, C. Komusiewicz, H. Moser, and R. Niedermeier. Isolation
concepts for clique enumeration: Comparison and computational experiments. Theoretical Computer Science, 410(52):5384–5397, 2009.
[13] L. Isella, J. Stehlé, A. Barrat, C. Cattuto, J.-F. Pinton, and W. Van den
Broeck. What’s in a crowd? Analysis of face-to-face behavioral networks. Journal of Theoretical Biology, 271(1):166–180, 2011.
[14] H. Ito and K. Iwama. Enumeration of isolated cliques and pseudocliques. ACM Transactions on Algorithms, 5(4):40, 2009.
[15] J. Kleinberg and É. Tardos. Algorithm Design. Pearson Education,
2006.
[16] C. Komusiewicz, F. Hüffner, H. Moser, and R. Niedermeier. Isolation
concepts for efficiently enumerating dense subgraphs. Theoretical Computer Science, 410(38):3640–3654, 2009.
[17] M. Lahiri and T. Y. Berger-Wolf. Periodic subgraph mining in dynamic
networks. Knowledge and Information Systems, 24(3):467–497, 2010.
[18] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In Proceedings of the eleventh ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pages 177–187. ACM, 2005.
[19] O. Michail. An introduction to temporal graphs: An algorithmic perspective. Internet Mathematics, 12(4):239–280, 2016.
[20] O. Michail and P. G. Spirakis. Traveling salesman problems in temporal
graphs. Theoretical Computer Science, 634:1–23, 2016.
31
[21] K. A. Naudé. Refined pivot selection for maximal clique enumeration
in graphs. Theoretical Computer Science, 613:28–37, 2016.
[22] V. Nicosia, J. Tang, C. Mascolo, M. Musolesi, G. Russo, and V. Latora.
Graph metrics for temporal networks. In P. Holme and J. Saramäki,
editors, Temporal Networks, pages 15–40. Springer Berlin Heidelberg,
2013.
[23] T. Opsahl and P. Panzarasa. Clustering in weighted networks. Social
Networks, 31(2):155–163, 2009.
[24] J. Stehlé, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J.-F. Pinton,
M. Quaggiotto, W. Van den Broeck, C. Régis, B. Lina, et al. Highresolution measurements of face-to-face contact patterns in a primary
school. PLoS ONE, 6(8):e23176, 2011.
[25] E. Tomita, A. Tanaka, and H. Takahashi. The worst-case time complexity for generating all maximal cliques and computational experiments.
Theoretical Computer Science, 363(1):28–42, 2006.
[26] T. Uno and Y. Uno. Mining preserving structures in a graph sequence.
Theoretical Computer Science, 654:155–163, 2016.
[27] P. Vanhems, A. Barrat, C. Cattuto, J.-F. Pinton, N. Khanafer, C. Régis,
B.-a. Kim, B. Comte, and N. Voirin. Estimating potential infection
transmission routes in hospital wards using wearable proximity sensors.
PLoS ONE, 8(9):e73970, 2013.
[28] J. Viard, M. Latapy, and C. Magnien. Revealing contact patterns
among high-school students using maximal cliques in link streams.
In Proceedings of the 2015 IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining, pages 1517–1522.
ACM, 2015.
[29] T. Viard, M. Latapy, and C. Magnien. Computing maximal cliques in
link streams. Theoretical Computer Science, 609:245–252, 2016.
32
| 8cs.DS
|
arXiv:1802.04607v2 [math.GR] 7 Mar 2018
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
PATRICK DEHORNOY
Abstract. We establish a new, fairly general cancellativity criterion for a
presented monoid that properly extends the previously known criteria. It is
based on a new version of the word transformation called factor reversing,
and its specificity is to avoid any restriction on the number of relations in the
presentation. As an application, we deduce the cancellativity of some natural
extension of Artin’s braid monoid in which crossings are colored.
Establishing that a presented monoid (or semigroup) is cancellative is in general
a nontrivial task, see for instance [13]. If a distinguished expression (“normal form”)
has been identified for each element of the monoid, and if, for each element a of
the considered monoid M and every generator s of the considered presentation,
the normal form of a can be retrieved from that of sa and s, then one can indeed
conclude that sa = sb implies a = b. But, when no normal form is known, no
generic method is available. Adjan’s criterion based on the left graph [1, 15] is
useful, but, by definition, it applies only to presentations with (very) few defining
relations. Ultimately relying on Garside’s analysis of the braid monoids Bn+ [12],
the so-called reversing method [5, 8] provides a simple criterion, which proved to be
useful for many concrete presentations, typically those of all Artin–Tits monoids.
However, an intrinsic limitation of the method is that it only applies to monoid
presentations (S, R) that contain a limited number of relations, namely those such
that, for all s, t in S, there exists at most one relation of the form s... = t...
in R (“right-complemented” presentations). The aim of this paper is to extend the
previous criterion by developing a new approach that does not require any limitation
on the number of defining relations. The result we prove takes the following form:
Proposition. If (S, R) is a semigroup presentation such that
(i) there exists an ≡R -invariant map λ from S ∗ to ordinals satisfying λ(sw) > λ(w)
for all s in S and w in S ∗ , and
(ii) for every s in S, for every relation w=w′ in R, and for every (S, R)-grid
from (s, w), there exists an equivalent grid from (s, w′ ), and vice versa.
Then the monoid hS | Ri+ admits left cancellation.
In the above statement, ≡R refers to the congruence on the free monoid S ∗
generated by the relations of R, and an (S, R)-grid is a certain type of rectangular
van Kampen diagram specified in Definition 1.1 below. Note that Condition (i) in
the above statement is trivial when each relation in R consists of two words with
the same length (“homogeneous presentation”).
As an application, we deduce:
1991 Mathematics Subject Classification. 20B30, 20F55, 20F36.
Key words and phrases. semigroup presentation, van Kampen diagram, rewrite system, cancellativity, word problem, Garside monoid, group of fractions, monoid embeddability, Artin–Tits
groups.
1
2
PATRICK DEHORNOY
Proposition. For every n and every nonempty set C, the monoid
+
(b) (a)
(a) (b)
for |i − j| > 2
σi σj = σj σi
(a)
+
.
Bn,C
:= σi | i 6 n, a ∈ C
(c) (b) (a)
(a) (b) (c)
for |i − j| = 1
σi σj σi = σj σi σi
is left and right cancellative.
+
The monoid Bn,C
is an extension of Artin’s Bn+ of positive n-strand braids, and
it is a typical example of a monoid that is inaccessible to all previously known
+
methods. We shall see that the elements of Bn,C
admit a natural interpretation
+
and its enveloping
in terms of braids with C-colored crossings, and both Bn,C
group might be structures of independent interest. They are in particular directly
reminiscent of (but not identical to) the monoids investigated in [2].
1. Using reversing grids
As in [8], our cancellativity criterion is based on some word transformation called
factor (or subword) reversing, and on a criterion for establishing that the latter
is complete, meaning that it detects every word equivalence with respect to the
presentation. The specificity of the current paper is to extend the framework so as
to avoid any restriction on the number of relations in the presentation. This is done
by introducing the new notion of a reversing grid (Section 1.1), then establishing a
convenient completeness criterion (Section 1.2), and finally deducing the expected
cancellativity criterion an various other consequences (Section 1.3).
1.1. The notion of a reversing grid. If S is a nonempty set, we denote by S ∗ the
free monoid of all words in S, and use ε for the empty word. A monoid presentation
is a pair (S, R), where R is a list of (unordered) pairs of words of S ∗ ; as usual,
we write relations with an equality sign, thus writing w=w′ for {w, w′ }. We then
denote by hS | Ri+ the monoid presented by (S, R), that is, the monoid S ∗ /≡R ,
where ≡R is the congruence on S ∗ generated by R.
By a semigroup presentation we mean a monoid presentation (S, R) such that R
contains no relation of the form w=ε with w 6= ε (“ε-relation”). In this case, the
only invertible element in hS | Ri+ is the unit 1, represented by the empty word.
Our main subject of investigation is a certain binary relation (or rewrite system)
on S × S associated with (S, R) as follows.
Definition 1.1. If (S, R) is a monoid presentation, an (S, R)-grid is a rectangular
diagram consisting of finitely many matching S ∪ {ε}-labeled pieces of the types
t
s1
-s
sp
tq
t1
s
- s
with s, t, s1 , ..., sp , t1 , ..., tq in S
and st1 ··· tq = ts1 ··· sp a relation of R,
ε
ε,
s
t
s,
ε
ε
ε,
ε
ε
with s, t in S.
ε
ε
ε
t
For u, v, u1 , v1 in S ∗ , we say that an (S, R)-grid Γ goes from (u, v) to (u1 , v1 ) if the
labels of the left and top edges of Γ form the words u and v, respectively, whereas
the labels of the right and bottom edges form the words u1 and v1 . If there exists an
(S, R)-grid from (u, v) to (u1 , v1 ), we say that (u, v) is right R-reversible to (u1 , v1 ),
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
3
v
written (u, v) yR (u1 , v1 ) or, in a diagrammatic way, u
yR
u1; we then
v1
often skip R if there is no ambiguity.
Example 1.2. Consider the Artin presentation of the n-strand braid monoid
+
σi σj = σj σi
for |i − j| > 2
(1.1)
Bn+ := σ1 , ..., σn−1
.
σi σj σi = σj σi σj for |i − j| = 1
For n > 4, a typical grid for (1.1) is
σ2
σ3
σ1
(1.2)
σ3
σ1
σ1
σ1
σ2
σ2
σ2
σ2
σ3
σ2
σ3
σ1
σ2
σ1
σ2
ε ε
σ3
ε
σ1
ε
σ3
σ1
It contains eight squares, of which five correspond to relations of (1.1), and it goes
from (σ1 , σ2 σ3 σ2 ) to (σ1 σ2 σ3 , σ2 σ1 σ3 σ2 σ1 ), witnessesing for the right reversing relation
σ2 σ3 σ2
(σ1 , σ2 σ3 σ2 ) y (σ1 σ2 σ3 , σ2 σ1 σ3 σ2 σ1 ), alias σ1
σ1 σ2 σ3 .
y
σ2 σ1 σ3 σ2 σ1
In all five types of elementary pieces considered in Definition 1.1, the labels of the
two possible paths from the top-left vertex to the bottom-right vertex form words
that are ≡R -equivalent, i.e., represent the same element in the monoid hS | Ri+ .
An easy induction on the number of elementary pieces implies:
Lemma 1.3. For every monoid presentation (S, R), and for all words u, v, u1 , v1
in S ∗ , the relation (u, v) yR (u1 , v1 ) implies uv1 ≡R vu1 . In particular,
(1.3)
(u, v) yR (ε, ε)
implies
u ≡R v.
In other words, a reversing grid from (u, v) to (u1 , v1 ) is a special type of van
Kampen diagram witnessing for the ≡R -equivalence of the words uv1 and vu1 .
Remark 1.4. In literature [5, 6, 7, 11], reversing was described in terms of signed
S-words, defined to be words in a symmetrized alphabet S ∪ S with S consisting
of one copy s for each letter s of S. If w, w′ are signed S-word, one declares that
w yR w′ holds if one can go from w to w′ by a finite sequence of transformations,
each of which consists either in deleting some length two factor ss, or in replacing
some length two factor st with t1 ··· tq sp ··· s1 , where st1 ··· tq = ts1 ··· sp is a relation
of R. The connection with our current approach is easy: writing w for the word
obtained from w by exchanging s and s everywhere and reversing the order of letters,
the relation (u, v) yR (u1 , v1 ) of Definition 1.1 is equivalent to uv yR v1 u1 in the
sense of signed word reversing. The advantage of the current description is to make
it more visible that reversing only involves positive words and the presented monoid,
without connection with inverting the elements and moving to a group context. In
any case, the reversing grid is the fundamental object, and it seems more natural
to begin with it.
4
PATRICK DEHORNOY
One of the advantages of the current grid-based approach is to make the following
technical result almost straightforward:
Lemma 1.5. For every monoid presentation (S, R), and for all u, v ′ , v ′′ , u1 , v1
in S ∗ , the following are equivalent:
(i) The relation (u, v ′ v ′′ ) yR (u1 , v1 ) holds;
(ii) There exist u′ , v1′ , v1′′ in S ∗ satisfying (u, v ′ ) yR (u′ , v1′ ), (u′ , v ′′ ) yR (u1 , v1′′ ),
and v1 = v1′ v1′′ .
Proof. Assume that Γ is an (S, R)-grid from (u, v ′ v ′′ ) to (u1 , v1 ). By definition, Γ
is a juxtaposition of elementary diagrams as in Definition 1.1.
Grouping the diagrams that lie below v ′ on the one hand,
v′
v ′′
′′
′
and below v on the other hand, splits Γ into two grids Γ
y
u′ y
u1
and Γ′′ . By construction, the input of Γ′ is (u, v ′ ); call u
′ ′
′
its output (u , v1 ). Then, by construction, the input of Γ
v1′
v1′′
is (u′ , v ′′ ), and its output has the form (u1 , v1′′ ), with
v
1
v1 = v1′ v1′′ . So (i) implies (ii).
Conversely, concatenating a grid from (u, v ′ ) to (u′ , v1′ ) and a grid from (u′ , v ′′ )
to (u1 , v1′′ ) provides a grid from (u, v ′ v ′′ ) to (v1′ v1′′ , u1 ), so (ii) implies (i).
1.2. Completeness of reversing. A reversing grid is a van Kampen diagram of a
special type, namely one in which at most two edges (one horizontal, one vertical)
start from each node. If there exists an (S, R)-grid from (u, v) to (ε, ε), then, by
Lemma 1.3, the words u and v must be ≡R -equivalent. Conversely, if u and v are
≡R -equivalent words, there must exist a van Kampen diagram connecting u and v
but, in general, there is no reason why the latter could be chosen with the special
form of a reversing grid. We now consider the case when such a choice is possible.
Definition 1.6. We say that right reversing is complete for a monoid presentation (S, R) if the converse of (1.3) also holds, that is, if, for all u, v in S ∗ ,
(1.4)
(u, v) yR (ε, ε)
is equivalent to
u ≡R v.
This definition is theoretical, and our aim will be is to establish a practical criterion characterizing completeness of reversing. Two such criteria have already
appeared. A first criterion is described in [7], in terms of what is called the cube
condition: in principle, this criterion works for arbitrary presentations but, in practice, it can be used only for complemented presentations, namely presentations with
at most one relation s... = t... for each pair of generators (s, t). Another criterion
is described in [6], but, even in theory, it does not apply to presentations that are
not complemented. What we do below is to establish a new completeness criterion
that extends the one of [6] and works for every presentation, complemented or not.
The main point is that this new criterion, contrary to the cube condition, remains
tractable in the non-complemented case, i.e., without any restriction on the number
of relations in the considered presentation.
It follows from the definition of a reversing grid that reversing can be complete
only for semigroup presentations, that is, for presentations containing no ε-relation:
indeed, by definition, (w, ε) y (ε, ε) is impossible for w nonempty. So we shall hereafter restrict to semigroup presentations. We start from the following observation.
Lemma 1.7. Let (S, R) be a semigroup presentation. Say that two (S, R)-grids Γ, Γ′
are equivalent if the labels of the four edges of Γ form words that are ≡R -equivalent
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
5
to their counterparts in Γ′ . Then a sufficient condition for right reversing to be
complete for (S, R) is that, for all u, v in S ∗ ,
(♦∗ )
For every grid from (u, v), and for all u′ , v ′ satisfying u′ ≡R u and v ′ ≡R v,
there is an equivalent grid from (u′ , v ′ ).
Proof. Assume that (♦∗ ) holds for all u, v in S ∗ , and let u, u′ be ≡R -equivalent
words. A trivial induction on the length of u shows
u
that there exists a grid Γ from (u, u) to (ε, ε), as
s1
sℓ
shown on the right. Applying (♦∗ ) to Γ and to the
s1
ε ε
ε
equivalences u ≡R u and u ≡R u′ , we conclude that
′
′
ε
s
ℓ
there exists a grid Γ from (u, u ) that is equivalent
u
sℓ
ε
to Γ. Let (u′1 , v1′ ) be the output of Γ′ . Then, by
assumption, we have u′1 ≡R ε and v1′ ≡R ε. Because
sℓ
sℓ sℓ
ε
R contains no ε-relation, u′1 ≡R ε implies u′1 = ε,
ε
ε
and, similatly, v1′ ≡R ε implies v1′ = ε.
′
′
Then Γ witnesses that (u, u ) right-reverses to (ε, ε). Therefore, right reversing is
complete for (S, R).
As it stands, Lemma 1.7 does not provide a tractable criterion, because it involves arbitrary pairs of ≡R -equivalent words in S ∗ . We show now that, under
convenient finiteness assumptions (“noetherianity”), the most elementary instances
of compatibility are sufficient to deduce the full condition.
If M is a monoid and g, h belong to M , one says that g properly right-divides h,
written g ≺R h or h ≻R g, if h = h′ g holds for some non-invertible element h′ of M
(proper left-division ≺L would be defined symmetrically with g on the left).
Definition 1.8. A monoid M is called right noetherian if there is no no infinite
descending sequence with respect to proper right-divisibility relation in M , that is,
every sequence g0 ≻R g1 ≻R ... in M is finite.
Lemma 1.9. For every monoid M , the following are equivalent:
(i) The monoid M is right noetherian.
(ii) There exists a map λ from M to ordinals such that, for all g, g ′ in M ,
(1.5)
g ≻R g ′ implies λ(g) > λ(g ′ ).
(iii) There exists a map λ from M to ordinals satisfying, for all g, h in M ,
(1.6)
λ(gh) > λ(h) + λ(g), and λ(g) > 0 whenever g is non-invertible.
Proof. The equivalence of (i) and (ii) is standard: for ≻R to admit no infinite
descending sequence means that the relation ≻R is well-founded, and it is well
known that this amounts to the existence of a map to the ordinals that decreases
along ≻R .
Next, (iii) implies (ii): indeed, assuming g = hg ′ with h non-invertible and
applying (1.6), we obtain λ(g) > λ(g ′ ) + λ(h) > λ(g ′ ).
Finally, assume (i), whence (ii). As above, the relation ≻R is well founded, so,
by standard arguments, there exists a map λ : M → Ord inductively defined by
(
0
if g is invertible,
(1.7)
λ(g) :=
max{λ(f ) + 1 | f ≺R g} otherwise.
We claim that this particular function λ, which satisfies (1.5) by construction, also
satisfies (1.6). First, we observe that, if g is not invertible, then g ≻R 1 is true,
6
PATRICK DEHORNOY
so we must have λ(g) > λ(1) = 0. So the second assertion in (1.6) is true. Next,
we observe that, if g is invertible, then λ(gh) > λ(h) holds. Indeed, the inequality
is trivial for λ(h) = 0, and, otherwise, the sets {f | f ≺R h} and {f | f ≺R gh}
coincide, and we deduce
λ(gh) = max{λ(f ) + 1 | f ≺R gh} = max{λ(f ) + 1 | f ≺R h} = λ(h).
We prove now using induction on λ(g) that λ(gh) > λ(h) + λ(g) holds for every h
in M . Assume first λ(g) = 0. Then g must be invertible, and we established above
the equality λ(gh) = λ(h) = λ(h) + λ(g), as expected. Assume now λ(g) > 0. Then
g is not invertible and, by definition, we have λ(g) = max{λ(f ) + 1 | f ≺R g}. Let h
be an arbitrary element of M . Then gh is not invertible, and we obtain
λ(gh) = max{λ(f ) + 1 | f ≺R gh}
by definition
> max{λ(f h) + 1 | f ≺R g}
because f ≺R g implies f h ≺R gh
> max{λ(h) + λ(f ) + 1 | f ≺R g}
by induction hypothesis
= λ(h) + max{λ(f ) + 1 | f ≺R g}
by monotonicity of ordinal addition
= λ(h) + λ(g)
by definition.
Thus the first inequality in (1.6) is established, and (i) implies (iii).
Translating the previous result at the level of presentations, we can state:
Lemma 1.10. If (S, R) is a semigroup presentation, the monoid hS | Ri+ is right
noetherian if, and only if, the following equivalent conditions hold:
(1.8)
(1.9)
there exists an ≡R -invariant map λ from S ∗ to the ordinals
satisfying λ(sw) > λ(w) for all s in S and w in S ∗ ;
there exists an ≡R -invariant map λ from S ∗ to the ordinals
satisfying λ(uv) > λ(v) + λ(u) for all u, v in S ∗ , and λ(s) > 0 for s in S.
Thus, (1.8) provides a sufficient condition for right noetherianity, and then one
is ensured that the stronger condition (1.9) can be satisfied (possibly by another
map λ′ ). As already noted, in the case of a homogeneous presentation, i.e., one
where all relations have the form w=w with w, w′ of the same length, defining λ(w)
to be the length of w provides a map λ witnessing for (1.9).
The main technical result we shall establish is the following criterion for the
completeness of reversing:
Lemma 1.11. A semigroup presentation (S, R) satisfying (1.8) satisfies (♦∗ ) if,
and only if, for every element s in S and every relation w=w′ in R,
for every grid from (s, w), there is an equivalent grid from (s, w′ ),
and vice versa.
′
Proof. One implication is trivial: (♦) for s and w=w follows from applying (♦∗ )
to the words s and w with the equivalences s ≡R s and w′ ≡R w.
The point is to establish the converse implication. This will be done using two
nested inductions. First, we fix a map λ from S ∗ to ordinals satisfying (1.9), which
is possible by Lemma 1.10. By the properties of ordinal addition, we always have
(♦)
(1.10)
λ(u) 6 λ(uv),
λ(v) 6 λ(uv),
and λ(v) < λ(uv) for u nonempty.
If Γ is a (S, R)-grid from (u, v) to (u1 , v1 ), the parameter λ(uv1 ), which, by
Lemma 1.3, is also equal to λ(vu1 ), will be called the diagonal of Γ. Then, for α
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
7
an ordinal, we introduce the special case of Condition (♦∗ ) corresponding to grids
whose diagonal is at most α:
For every grid with diagonal 6 α from (u, v), and for all u′ , v ′ satisfying
u′ ≡R u and v ′ ≡R v, there is an equivalent grid from (u′ , v ′ ).
(♦α∗ )
Next, for w, w′ in S ∗ , we write distR (w, w′ ) for the combinatorial distance between w and w′ with respect to R, namely the minimal length of an R-derivation
from w to w′ if w and w′ are ≡R -equivalent, and ∞ otherwise. Then, for d a natural
number, we consider the special case of Condition (♦α∗ ) corresponding to distances
between the sources of the old and new grids bounded by d:
∗
(♦α,d
)
For every grid with diagonal 6 α from (u, v), and for all u′ , v ′ satisfying
distR (u, u′ ) + distR (v, v ′ ) 6 d, there is an equivalent grid from (u′ , v ′ ).
It should be clear that (♦∗ ) for two words u, v is equivalent to the conjunction
∗
of all (♦α,d
) for u, v. Using an induction on α and, for a given α, on d, we shall
∗
establish that, if (♦) is true for every s and every relation w=w′ of R, then (♦α,d
)
is true for all u, v.
Assume first α = 0. Assume that Γ is a grid with zero diagonal from (u, v)
to (u1 , v1 ), and u′ ≡R u and v ′ ≡R v hold. By construction, λ(w) = 0 implies
w = ε, so λ(uv1 ) = λ(vu1 ) = 0 requires u = v = u1 = v1 = ε. Next, the
assumption u′ ≡R ε implies u′ = ε = u, and v ′ ≡R v implies v ′ = ε = v. Then
choosing Γ′ := Γ provides the expected condition. So (♦0∗ ) is true for all u, v.
Assume now α > 0 and d = 0. Assume that Γ is a grid with diagonal 6 α
from (u, v) to (u1 , v1 ), and distR (u, u′ ) + distR (v, v ′ ) = 0 holds. By definition, we
have u′ = u and v ′ = v. Then choosing Γ′ := Γ provides the expected condition.
∗
) is true for all u, v and for every α.
So (♦α,0
Assume now α > 0 and d = 1. Assume that Γ is a grid with diagonal 6 α
from (u, v) to (u1 , v1 ), and distR (u, u′ ) + distR (v, v ′ ) = 1 holds. Up to a symmetry,
we may assume u′ = u and distR (v ′ , v) = 1. By definition, the latter relation means
that there exists a relation w=w′ in R and two words v0 , v2 satisfying v = v0 wv2
and v ′ = v0 w′ v2 . As v is the product v0 wv2 , repeated applications of Lemma 1.5
show that the assumption (u, v) yR (u1 , v1 ) implies the existence of u0 , u2 and v3 ,
v4 , and v5 satisfying v1 = v3 v4 v5 and
(u, v0 ) yR (u0 , v3 ),
(u0 , w) yR (u2 , v4 ),
and (u2 , v2 ) yR (u1 , v5 ),
corresponding to a decomposition of the grid Γ into the union of three grids
u
v0
v
w
v2
y
u0 y
u2 y
v3
v4
v1
v5
u1
8
PATRICK DEHORNOY
Assume first that the word u0 is empty. Then, necessarily, we have u1 = u2 = ε,
v4 = w, and v5 = v2 . Then the situation is as the left diagram below
v
w
v0
u
ε
y
v2
ε
y
v3
w
v1
y
v′
w′
v0
ε
u
v2
y
ε
v3
y
v2
ε
y
ε
v2
w′
v1′
∗
and the right diagram shows that (♦α,1
) is satisfied with u′1 := ε and v1′ := v3 w′ v2 .
Assume now that u0 is not empty. Then we write u0 = su3 with s in S. Splitting
the grid again, we obtain the existence of words u4 , ..., u7 and v6 , v7 such that the
situation is as in the left diagram below
v
w
v0
s
u
y
v3
v0
v2
u6
v6
u4 y
v7
u3 y
u5 y
u7
v4
v1
v5
y
v′
w′
s
u
u1
y
v3
y
v6′
u3 y
v4′
v1′
v2
u′4
y u′6
v7′
u′5 y u′7
u′1
v5′
We shall now establish the existence of words u′3 , ..., u′7 and v4′ , ..., v7′ such that the
right diagram above is a legitimate (S, R)-grid, with u′i ≡R ui and vj′ ≡R vj for
all i and j.
We begin with the top median square. By assumption, we have (s, w) yR
(u4 , v6 ) and w=w′ ∈ R. By (♦), there exist u′4 and v6′ satisfying
u′4 ≡R u4 ,
v6′ ≡R v6
and
(s, w′ ) yR (u′4 , v6′ ).
Consider now the bottom median square. Then u3 ≡R u3 is trivial, whereas
v6′ ≡R v6 and (u3 , v6 ) yR (u5 , v4 ) hold by construction. Moreover, (1.10) implies
λ(u3 v4 ) < λ(su3 v4 ) 6 λ(v0 su3 v4 ) 6 λ(v0 su3 v4 v5 ) = λ(uv1 ) 6 α,
whence β := λ(u3 v4 ) < α. By induction hypothesis, (♦β∗ ) is true for u3 and v6 , and
we deduce the existence of u′5 and v4′ satisfying
u′5 ≡R u5 ,
v4′ ≡R v4
and
(u3 , v6′ ) yR (u′5 , v4′ ).
We move to the top right square. Then v2 ≡R v2 is trivial, whereas u′4 ≡R u4
and (u4 , v2 ) yR (u6 , v7 ) hold by construction. Moreover, because w cannot be
empty, since R contains no ε-relation, (1.10) implies
λ(u4 v7 ) < λ(wu4 v7 ) 6 λ(v0 wu4 v7 ) 6 λ(v0 wu4 v7 u7 ) = λ(uv1 ) 6 α,
whence γ := λ(u4 v7 ) < α. By induction hypothesis, (♦γ∗ ) is true for u4 and v2 , and
we deduce the existence of u′6 and v7′ satisfying
u′6 ≡R u6 ,
v7′ ≡R v7
and
(u′4 , v2 ) yR (u′6 , v7′ ).
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
v7′
9
Finally, we consider the bottom right square. By construction, we have u′5 ≡R u5 ,
≡R v7 and (u5 , v7 ) yR (u7 , v5 ). Moreover, (1.10) implies
λ(u5 v5 ) 6 λ(v6 u5 v5 ) < λ(sv6 u5 v5 ) 6 λ(v0 sv6 u5 v5 ) = λ(uv1 ) 6 α,
whence δ := λ(u5 v5 ) < α. By induction hypothesis, (♦δ∗ ) is true for u5 and v7 , and
we deduce the existence of u′7 and v5′ satisfying
u′7 ≡R u7 ,
v5′ ≡R v5
and
(u′5 , v7′ ) yR (u′7 , v5′ ).
Put u′1 := u′6 u′7 and v1′ := v3 v4′ v5′ . Then u′1 ≡R u1 and v1′ ≡R v1 hold, and the
∗
right diagram below witnesses for (v, v ′ ) yR (u′1 , v1′ ). Thus (♦α,1
) is satisfied for u
∗
and v, which completes the case d = 1 in the induction for (♦α ).
Assume finally α > 0 and d > 2. Assume that Γ is a grid with diagonal 6 α
from (u, v) to (u1 , v1 ), and distR (u, u′ ) + distR (v, v ′ ) = d holds. We can find two
words u′′ , v ′′ satisfying
distR (u′′ , u) + distR (v ′′ , v) = d − 1
and distR (u′ , u′′ ) + distR (v ′ , v ′′ ) = 1.
∗
By assumption, we have λ(uv1 ) 6 α. By induction hypothesis, (♦α,d−1
) is true
′′ ′′
for u and v, so we deduce the existence of u1 , v1 satisfying
u′′1 ≡R u1 ,
v1′′ ≡R v1 ,
and (u′′ , v ′′ ) yR (u′′1 , v1′′ ).
Now u′′ ≡R u and v1′′ ≡R v1 imply λ(u′′ v1′′ ) = λ(uv1 ) 6 α. By induction hypothesis,
∗
) is true for u′′ and v ′′ , so we deduce the existence of u′1 , v1′ satisfying
(♦α,1
u′1 ≡R u′′1 ,
v1′ ≡R v1′′ ,
and (u′ , v ′ ) yR (u′1 , v1′ ).
By transitivity of ≡R , we have u′1 ≡R u1 and v1′ ≡R v1 , and we conclude that
∗
) is true for u and v. This completes the induction.
(♦α,d
1.3. Main results. We are now ready to state the main results of the paper and,
in particular, to establish the cancellativity criterion announced in the title.
First, summarizing the results established so far directly gives the following:
Proposition 1.12. Assume that a semigroup presentation (S, R) satisfies (1.8)—
which is true in particular if (S, R) is homogeneous—and (♦) for every s in S and
every relation w=w′ in R.
(i) For all u, v, u1 , v1 in S ∗ satisfying (u, v) yR (u1 , v1 ), and for all u′ , v ′ in S ∗
satisfying u′ ≡R u and v ′ ≡R v, there exist u′1 , v1′ satisfying (u′ , v ′ ) yR (u′1 , v1′ ),
with u′1 ≡R u1 and v1′ ≡R v1 .
(ii) For all u, v in S ∗ , the words u and v represent the same element of the
monoid hS | Ri+ if, and only if, (u, v) yR (ε, ε) holds.
Proof. Point (i) is Condition (♦∗ ) for u, v, and Lemma 1.11 states that the latter
holds whenever (1.8) holds and so does (♦) for every s in S and every relation w=w′
in R.
(ii) By Lemma 1.7, (i), that is, (♦∗ ) for all u, v, implies that reversing is complete
for (S, R), which, by definition, implies the equivalence of (ii).
Let us turn to left cancellability. Then completeness of right reversing is useful,
as it shows that, if there is no obvious counter-example to left cancellativity, then
there is no hidden counter-example either:
Lemma 1.13. If right reversing is complete for the presentation (S, R) and R
contains no relation of the form su = sv with s in S and u 6= v in S ∗ , then the
monoid hS | Ri+ admits left cancellation.
10
PATRICK DEHORNOY
Proof. It is enough to prove that, for all words u, v in S ∗ , every relation of the form
s
v
su ≡R sv with s in S implies u ≡R v. So assume su ≡R sv.
By completeness of right reversing, we deduce (su, sv) yR s
u1
ε
(ε, ε). By Lemma 1.5, a grid witnessing for (su, sv) yR (ε, ε)
v1
v2
decomposes into four grids, as shown on the right. The assumpu2
ε
tion about the presentation requires u = v = ε, which in turn u
1
1
implies u2 = u and v2 = v.
ε
ε
Then the bottom right square witnesses for (u, v) yR (ε, ε), which, by Lemma 1.3,
implies u ≡R v.
Putting things together, we deduce the practical cancellativity criterion that is
the main result of this paper, as stated in the preamble of the paper:
Proposition 1.14. Assume that a semigroup presentation (S, R) satisfies (1.8)—
which is true in particular if (S, R) is homogeneous—and (♦) for every s in S and
every relation w=w′ in R. Then a sufficient condition for the monoid hS | Ri+ to
be left cancellative is that there is no relation sw = sw′ with w 6= w′ in R.
Of course, a symmetric criterion exists for right cancellativity: right noetherianity is to be replaced with left noetherianity, meaning the non-existence of an infinite
descending sequence with respect to proper left divisibility, and right reversing grids
are to be replaced with their left counterparts, in which one starts from the bottom
and right edges and uses the relations to build a rectangular diagram in which the
output corresponds to the left and top edges. Note that a right reversing grid is
not a left reversing grid, in particular because “cancellation squares” are not the
s
ε
same: s
ε in a right reversing grid, to be compared with ε
ε
reversing grid.
s in a left
s
Remark 1.15. Contrary to Adjan’s cancellability criterion of [1, 15], the criterion
of Proposition 1.14 does not guarantee that the monoid embeds in its enveloping
group. For instance, consider the monoid M with presentation
(1.11)
ha, b, c, d, a′, b′ , c′ , d′ | ac = bd, ac′ = bd′ , a′ c = b′ di+ .
The monoid M fails to satisfy the first Malcev condition [4, Chapter 12] and,
therefore, it does not embed in its enveloping group. However, the presentation
of (1.11) is eligible for the cancellability criterion of Proposition 1.14—but not for
Adjan’s criterion, since (a, b) is a cycle in the left graph.
We conclude with one more application of completeness of right reversing, now
in terms of common (right) multiples.
Proposition 1.16. Assume that a semigroup presentation (S, R) satisfies (1.8)—
which is true in particular if (S, R) is homogeneous—and (♦) for every s in S
and every relation w=w′ in R. Then two elements a, b of hS | Ri+ respectively
represented by words u and v in S ∗ admit a common right multiple if, and only if,
there exists at least one (S, R)-grid from (u, v); in this case, every common right
multiple of a and b is a right multiple of an element represented by uv1 and by vu1
with u1 , v1 satisfying (u, v) yR (u1 , v1 ).
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
11
Proof. Assume that there exists a grid from (u, v), say (u, v) yR (u1 , v1 ). By
Lemma 1.3, this implies uv1 ≡R vu1 , which shows that the element of hS | Ri+
represented by uv1 and vu1 is a common right multiple of a and b.
v
u′
Conversely, assume that c is a common right multiple of a and b:
this means that there exist words u′ , v ′ such that c is repre- u
u1
ε
sented by uv ′ and vu′ , which therefore satisfy uv ′ ≡R vu′ . Unv2
der the assumptions, right reversing is complete for (S, R), so ′ v1
v
u
ε
′
′
2
(uv , vu ) yR (ε, ε) holds. Splitting a reversing grid in four
pieces as shown on the right, we see that there exists a grid
ε
ε
from (u, v), and that the equivalences u′ ≡R u1 v2 , v2 ≡R u2 , and v ′ ≡R v1 u2
are satisfied. The latter show that c is a right multiple of the element represented
by uv1 and vu1 .
Corollary 1.17. Assume that a semigroup presentation (S, R) satisfies the assumptions of Proposition 1.16 and, moreover, it is right complemented, i.e., if, for
all s, t in S, there is at most one relation s...=t... in R. Then two elements a, b
of hS | Ri+ respectively represented by u and v in S ∗ admit a common right multiple
if, and only if, (u, v) yR (u1 , v1 ) holds for some u1 , v1 ; in this case, the element
represented by uv1 and vu1 is a right lcm of a and b.
Proof. The assumption that (S, R) is right complemented implies that an (S, R)grid from (u, v) is unique when it exists. Thus, Proposition 1.16 says that every
common right multiple of a and b is a right multiple of the element represented
by uv1 . So the latter element, when it exists, is a right lcm of a and b.
Specializing even more, we finally obtain:
Corollary 1.18. Assume that a semigroup presentation (S, R) satisfies the assumptions of Proposition 1.16 and, moreover, for all s, t in S, the exist s′ , t′ in S
such that st′ =ts′ is a relation of R. Then any two elements of the monoid hS | Ri+
admit a right lcm.
Proof. The presentation is eligible for Corollary 1.17, so we know that any two elements with a common right multiple admit a right lcm. The additional assumption
about (S, R) guarantees that, for all words u, v in S ∗ , there exists one (S, R)-grid
from (u, v): indeed, obstructions arise when a relation s...=t... is missing, and when
the process never terminates because smaller and smaller arrows appear without
end. The assumption that there always exist a relation s...=t... discards the first
obstruction; the assumption that the relations involve words of length 6 2 discards
the second one. Thus, any two elements of the monoid hS | Ri+ admit a common
right multiple, hence a right lcm.
Remark 1.19. The cancellativity criterion of Proposition 1.14 subsumes the one
established in [6] in the case of a right complemented presentation. In such a case,
there exists at most one (R, S)-grid admitting a given source (u, v), and, therefore,
the output words can be seen as functions of u and v. Then, the cancellativity
criterion can be stated as a compatibility of the functions in question, called “complement”, with the equivalence relation ≡R . In our general case, the scheme of the
proof remains the same, but one needs to find a different formalism, which makes
the extension nontrivial. In [6], in addition to qualitative aspects, some quantitative results are established, and they can be extended to our current framework.
12
PATRICK DEHORNOY
Say that a semigroup presentation (S, R) has defect d if, for every s in S, every
relation w=w′ in R, and every (S, R)-grid Γ from (s, w), there exists an equivalent
(S, R)-grid Γ′ from (s, w′ ) such that the cumulated distances between the output
words of Γ and Γ′ is bounded above by d, and d is minimal with that property.
Then the inductive proof of Proposition 1.11 can be adapted to show that, if (S, R)
has finite defect d and Γ is a grid from (u, v), then, for all u′ ≡R u and v ′ ≡R v,
there exists an equivalent grid Γ′ from (u′ , v ′ ) such that the distance between the
outputs of Γ and Γ′ is bounded by an explicit function of the distance between their
inputs, actually a double exponential of base d. We do not go into details.
2. Applications to variants of braid monoids
As an application of the results of Section 1, we now establish that the monoids
of colored braids, which are extensions of the classical Artin braid monoids, admit
cancellation.
2.1. Braids with colored crossings. We mentioned in Example 1.2 that, for
n > 1, the standard n-strand monoid Bn+ is the monoid presented by (1.1). We
recall, for instance from [3] or [10], that, under interpreting σi as the elementary
crossing that exchanges the strands at positions i and i + 1 as in
1
σi :
2
i−1
···
i
i+1 i+2
n
···
the monoid Bn+ is the monoid of isotopy classes of positive n-strand braid diagrams.
We now consider an extension of the monoid Bn+ :
Definition 2.1. For n > 1 and C a nonempty set, the monoid of positive C-colored
braids is the monoid with presentation
+
(b) (a)
(a) (b)
for |i − j| > 2
σi σj = σj σi
(a)
+
.
(2.1) Bn,C := σi | i 6 n, a ∈ C
(c) (b) (a)
(a) (b) (c)
for |i − j| = 1
σi σj σi = σj σi σj
(a)
The idea is that the generator σi corresponds (as usual) to a crossing at positions i and i+1 with, in addition, an attached “color” a in C. The relations of (2.1)
are then natural if we imagine that the colors are connected with the names, or
initial positions, of the strands (as opposed to the current positions). Typically, we
may think of taking for C the set of all (unordered) pairs in {1, ..., n}, the mean(p,q)
being “the strands starting at positions p and q cross at
ing of the crossing σi
position i”, see Figure 1.
Of course, when the colour set C is a singleton, we can forget about colours, and
+
the monoid Bn,C
is simply the n-strand monoid—which is known to be cancellative
since Garside [12]. By contrast, for #C > 2 and n > 3, the presentation of (2.1) is
not complemented (for some generators s, t, there is more than one relation of the
type s... = t... in the presentation), and no simple criterion seems to apply. Here
we shall prove:
+
admits left and right cancellation.
Proposition 2.2. The monoid Bn,C
The proof consists of applying the criterion of Proposition 1.14, namely consid(a)
ering all generators σi and all relations w=w′ of (2.1), and checking that, for every
(a)
reversing grid built from σi and w, there exists an equivalent reversing grid built
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
p
q
r
p
q
13
r
(p,q)
σi
(q,r)
σi+1
(p,r)
σi+1
(p,r)
∼
σi
(q,r)
(p,q)
σi
σi+1
(p,q)
the meaning “the
Figure 1. Colored braid relation: if we give σi
strands starting at positions p and q cross at position i”, that is, if we
take into account the names (origins) of the strand that cross, then
the relations of (2.1) appear naturally.
(a)
from σi and w′ , and vice versa. We shall see that there are only two critical cases,
with all other cases either reducing to them or being trivial.
(a)
Lemma 2.3. Property (♦) holds for σ1
(b) (c) (d)
(d) (c) (b)
and the relation σ2 σ3 σ2 = σ3 σ2 σ3 .
(a)
(b) (c) (d)
Proof. We look at all possible grids from (σ1 , σ2 σ3 σ2 ), and exhibit for each of
(a) (d) (c) (b)
them an equivalent grid from (σ1 , σ3 σ2 σ3 ), and conversely. First, we see using
(a) (b) (c) (d)
the definition that the valid grids from (σ1 , σ2 σ3 σ2 ) are the following grids,
where e and f are arbitrary elements of the color set C:
(b)
(c)
σ2
(d)
σ3
σ2
(f)
(e)
(e)
σ1
(2.2)
(c)
σ1
σ3
(a)
σ1
(a)
σ2
(e)
(b)
σ2
σ1
∗
(f)
(f)
(d)
σ2
σ1
(e)
σ2
(f)
(d) ε
ε ε σ1
(a)
σ3
ε
σ2
σ3
(c)
σ3
σ1
∗
σ2
(a)
(a)
σ3
(d)
σ1
A priori, one might use different colors f, f ′ in the squares marked ∗, but f 6= f ′
(f)
(f ′)
leads to a grid that cannot be completed, since there is no relation σ2 ... = σ2 ...
in (2.1). Now, consider the following valid grid:
(d)
(c)
σ3
(b)
σ2
σ3
(f)
(2.3)
(a)
(f)
(b)
σ1
σ1
σ3
(a)
σ1
(e)
σ1
(d)
σ3
σ2
(a)
σ2
(f)
σ2
(c)
σ1
(a)
σ3
(e)
σ3
(b)
σ2
(f) (e) (a)
The right edges of (2.2) and (2.3) both yield the word σ1 σ2 σ3 . For the bottom
edges, using ≡ for the congruence generated by the relations of (2.1), we find
(d) (f) (c) (e) (b)
(d) (f) (e) (c) (b)
(e) (f) (d) (c) (b)
σ3 σ2 σ1 σ3 σ2 ≡ σ3 σ2 σ3 σ1 σ2 ≡ σ2 σ3 σ2 σ1 σ2
(e) (f) (b) (c) (d)
(e) (b) (f) (c) (d)
≡ σ2 σ3 σ1 σ2 σ1 ≡ σ2 σ1 σ3 σ2 σ1 ,
14
PATRICK DEHORNOY
which shows that (2.2) and (2.3) are equivalent grids.
(a)
(d) (c) (b)
Conversely, starting from σ1 and σ3 , σ2 σ3 , the only possible reversing grids
have the form of (2.3) for some e and f in C, and then (2.2) provides the expected
equivalent grid.
(a)
Lemma 2.4. Property (♦) holds for σ2
(b) (c)
(c) (b)
and the relation σ1 σ3 = σ3 σ1 .
(a)
(b) (c)
Proof. As in Lemma 2.3, we look at all reversing grids from (σ2 , σ1 σ3 ), and
(a) (c) (b)
exhibit an equivalent grid from (σ2 , σ3 σ1 ), and conversely. The grids from
(a) (b) (c)
(σ2 , σ1 σ3 ) are the following grids, with d, e, f arbitrary in C:
(b)
(c)
σ1
σ3
(e)
σ2
(d)
σ2
(e)
σ2
(d)
(c)
σ3
(a)
(2.4)
σ3
σ2
(f)
(a)
(d)
σ1
(b)
σ1
σ1
(a)
σ1
(e)
σ2
(a)
σ2
(f)
σ3
(c)
σ2
σ1
On the other hand, the following grid is also valid:
(c)
(b)
σ3
σ1
(e)
σ2
(f)
σ2
(e)
σ2
(f)
(b)
σ1
(a)
(2.5)
σ1
σ2
(d)
(a)
(f)
σ3
(c)
σ3
σ3
(a)
σ3
(e)
σ2
(a)
σ2
(d)
σ1
(b)
σ2
σ3
The right edges of (2.4) and (2.5) correspond to equivalent words, since we have
(e) (d) (f) (a)
(e) (f) (d) (a)
σ2 σ1 σ3 σ2 ≡ σ2 σ3 σ1 σ2 .
Similarly, we find for the bottom edges
(f) (c) (e) (d) (b)
(f) (d) (e) (c) (b)
(d) (f) (e) (b) (c)
(d) (b) (e) (f) (c)
σ3 σ2 σ1 σ2 σ3 ≡ σ3 σ1 σ2 σ1 σ3 ≡ σ1 σ3 σ2 σ3 σ1 ≡ σ1 σ2 σ3 σ2 σ1 .
Hence (2.4) and (2.5) are equivalent grids.
(a) (c) (b)
Conversely, the possible reversing grids from (σ2 , σ3 , σ1 ) have the form of (2.5)
for some f , e, and d in C, and then (2.4) provides the expected equivalent grid.
(a)
and all relations of (2.1).
Lemma 2.5. Property (♦) holds for all σi
(a)
Proof. First consider the case of σi
(b) (c) (d)
and a relation σj σk σj
(a)
(d) (c) (b)
= σk σj σk with,
(b) (c) (d)
say, k = j + 1. For i 6 j − 2, every grid from (σi , σj σk σj ) is a commutation
(a)
(d) (c) (b)
grid and then there exists an equivalent grid from (σi , σk σj σk ) as shown below:
(b)
σj
(2.6)
(a)
(c)
σk
(a)
σi
σi
(b)
σj
(c)
σk
(d)
(d)
σj
(a)
σi
(d)
σj
σk
(a)
σi
(a)
(c)
σj
(a)
σi
σi
(d)
σk
(c)
σj
(b)
σk
(a)
σi
(b)
σk
(a)
σi
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
(a)
15
(d) (c) (b)
The case when we start with a grid from (σi , σk σj σk ) is similar.
The case i = j − 1 corresponds to Lemma 2.3 for i = 1, and the general case is
similar, since the relations of (2.1) are invariant under shifting the indices.
(a) (b) (c) (d)
Next, assume i = j. Then a grid from (σi , σj σk σj ) exists only for a = b, and
then it is as in the left hand diagram below, in which case the right hand diagram
provides an equivalent grid for e = c:
(c)
(d)
(b)
σj
σk
σk
(b)
(d)
(c)
σj
σj
σk
(e)
σj
ε σ(b) ε
k
ε
(a)
(a)
σ
(2.7) σi
i
ε
ε
ε
(a)
(a)
σk
σk
ε
ε
(c)
(d)
σk
σj
ε
ε
(e)
(d)
σk
σj
(d) (c) (b)
(a)
In the other direction, the only possible grids from (σi , σk σj σk ) correspond to
the right hand diagram in (2.7) with e = c and a = b, in which case the left diagram
provides the required equivalent grid.
The case i = j + 1 = k is symmetric to i = j. Similarly, the case i = j + 2 = k + 1
is symmetric to i = j − 1. Finally, the cases i > k + 2 are symmetric to i 6 j − 2.
(c) (b)
(b) (c)
(a)
We now consider the case of σi and a relation σj σk = σk σj with, say,
k > j + 2. The case i 6 j − 2 is similar to that of (2.6), with commutation grids.
(a) (b) (c)
Assume i = j − 1. Then the grids from (σi , σj σk ) are as on the left diagram
below, with d arbitrary in C, and the right diagram then provides the expected
(a) (c) (b)
equivalent grid from (σi , σk σj ):
(b)
(c)
(b)
(c)
σj
σk
σ
σ
j
(2.8)
k
(d)
σi
(a)
σi
(c)
σk
(a)
(a)
σj
(d)
σj
(d)
(d)
σi
(a)
σi
σi
(a)
σi
(a)
σj
σj
(b)
(c)
(c)
σi
σk
σk
(a)
(d)
(b)
σj
σi
(c) (b)
In the other direction, the only grids from (σi , σk σj ) are those shown in the
right diagram of (2.8) with d arbitrary in C, and the left diagram then provides
the expected equivalent grid.
The case i = j is almost trivial: grids may exist only for a = b, and then they
take the form
(b)
(b)
(c)
(c)
σj
σj
σk
σk
(2.9)
(a)
σi
ε
ε
ε
(c)
(a)
(a)
σi
σi
(c)
ε
ε
σk
σk
Next, assume j + 1 6 i 6 k − 1. If k = j + 2 holds, typically i = 2, j = 1,
k = 3, we are, up to a shifting of the indices, in the situation of Lemma 2.4, and
so (♦) is guaranteed. Otherwise, either i is adjacent to exactly one of j or k, and
the situation is that of (2.8), or i is at distance at least 2 from both j and k, and
the situation is that of (2.7). Finally, the cases of i = k, i = k + 1, and i > k + 2
are symmetric to those of (2.9), (2.8), and (2.7), respectively. Thus, all cases have
been successfully treated.
We can now easily complete the proof of Proposition 2.2:
16
PATRICK DEHORNOY
Proof of Proposition 2.2. The presentation (2.1) is eligible for the criterion of Proposition 1.14. Indeed, it contains no ε-relation, and all relations are of the form w=w′
+
with w, w′ of the same length. Hence the monoid Bn,C
is right noetherian. By
Proposition 1.14 and Lemma 2.5, right reversing is complete for (2.1). Hence, as
the presentation contains no relation contradicting left cancellation, the monoid
admits left cancellation. Finally, the symmetry of the relations guarantees that the
monoid is isomorphic to the opposed monoid, and, therefore, right cancellativity
automatically follows from left cancellativity.
Inspecting the proofs above shows that, in the worst cases, the combinatorial
distance between the outputs of the old and the new grids is at most 5, so, according
to the terminology sketched in Remark 1.19, the defect of the presentation (2.1) is 5,
which could be used to obtain explicit upper bounds on the number or reversing
steps needed to possibly establish the equivalence of words.
As mentioned in Remark 1.15, our current approach says nothing about the
embeddability of the involved monoid in a group. So the obvious question after
Proposition 2.2 is
+
Question 2.6. Does the monoid Bn,C
embed in its enveloping group, that is, in
the group defined by the presentation (2.1)?
A classical sufficient condition is provided by Ore’s theorem [14] stating in the
current context that a cancellative monoid M in which any two elements admit
a common right multiple embeds in its enveloping group, which, in addition, is
then a group of right fractions for M . This applies for instance to the monoid Bn+ .
+
admits no common multiple: for a 6= b,
However, for #C > 2, the monoid Bn,C
(a)
(b)
the elements σ1 and σ1 admit no common right (or left) multiple, since there is
(a) (b)
no valid reversing grid from (σ1 , σ1 ). In [9], the embeddability criterion of Ore’s
theorem is extended to cancellative monoids with no nontrivial invertible elements
that satisfy the following “3-Ore condition”:
any three elements of M which pairwise admit a common right multiple
(2.10)
admit a common right multiple, and similarly for left multiples,
provided any two elements of M admit a left and a right gcd, i.e., greatest lower
+
bounds with respect to left and right division. For #C > 2, the monoid Bn,C
(a)
(a)
does not admit gcds: for instance, for a 6= b, the elements σ1 and σ2 left divide
(a) (a) (a)
(a) (b) (a)
(a)
(a)
both σ1 σ2 σ1 and σ1 σ2 σ1 , but no common multiple of σ1 and σ2 left divides
the above elements. This leads to two new questions:
+
satisfy the 3-Ore condition (2.10)?
Question 2.7. Does the monoid Bn,C
Question 2.8. Is the 3-Ore condition (2.10) sufficient for implying the embeddability of a monoid in its enveloping group in the case of a cancellative monoid that
need not admit gcds?
+
2.2. A variant. In [2], the authors consider a variant of the monoid Bn,C
with the
same generators but with a restricted list of relations:
Definition 2.9. For n > 1 and C a nonempty set, the monoid of restricted positive
C-colored braids is the monoid with presentation
+
(b) (a)
(a) (b)
for |i − j| > 2
σi σj = σj σi
(a)
+
e
.
(2.11) Bn,C := σi | i 6 n, a ∈ C (a) (a) (b)
(b) (a) (a)
for |i − j| = 1
σi σj σi = σj σi σj
A CANCELLATIVITY CRITERION FOR PRESENTED MONOIDS
17
All relations of (2.11) are relations of (2.1), but, in the “Yang-Baxter” relations,
+
the median color must be equal to one of the extremal colors. Thus the monoid Bn,C
e+ . The authors of [2] ask whether the monoid B
e+
is a quotient of the monoid B
n,C
n,C
is cancellative. Frustratingly, the criterion of Proposition 1.14 cannot be applied:
Fact 2.10. Right reversing is not complete for the presentation (2.11).
(a)
(b) (c) (c)
(c) (c) (b)
Proof. Property (♦) fails for σ1 and the relation σ2 σ3 σ2 = σ3 σ2 σ3 . Indeed,
we have the following valid grid
(c)
(c)
σ3
(b)
σ2
σ3
(a)
(2.12)
(a)
(a)
(b)
σ1
σ1
σ3
(a)
σ1
(b)
σ1
(c)
(a)
σ3
σ2
(a)
σ2
(c)
σ2
(a)
σ3
(b)
σ1
(b)
σ3
(a)
σ2
(b) (c) (c)
and there may exist no equivalent grid from (σ1 , σ2 σ3 σ2 ). Indeed, according to
what was seen in the proof of Lemma 2.3, the only possible form for such a grid
would be
(b)
(c)
σ2
(c)
σ3
σ2
(y)
(x)
σ1
(2.13)
(c)
(x)
σ1
σ3
(a)
σ1
(x)
σ2
(b)
σ1
(y)
(x)
σ2
(c) ε
ε ε σ1
(a)
σ3
ε
(c)
σ2
(c)
σ1
(y)
σ3
σ3
(y)
σ2
σ2
(a)
σ2
σ1
(a)
(a)
σ3
(c)
σ1
(a) (b) (a)
(y) (x) (a)
with x ∈ {a, b} and y ∈ {a, c} ∩{x, c}. The equivalence of σ1 σ2 σ3 and σ1 σ2 σ3
would require in particular x = b. But, on the other hand, the equivalence class
(c) (a) (c) (b) (b)
of the word σ3 σ2 σ1 σ3 σ2 on the bottom edge of (2.12) with respect to the
congruence generated by the relations of (2.11) consists of two words only, namely
(c) (a) (c) (b) (b)
(c) (a) (b) (c) (b)
(b)
σ3 σ2 σ1 σ3 σ2 and σ3 σ2 σ3 σ1 σ2 , none of which begins with σ2 . Hence no
(a) (b) (c) (c)
(σ1 , σ2 σ3 σ2 )-grid may be equivalent to (2.12).
e+ is not cancellative,
The above negative result does not say that the monoid B
n,C
it just says that the criterion of Proposition 1.14 fails to apply. The proof of
Fact 2.10 provides an explicit example of a valid relation that cannot be checked
using reversing, namely
(2.14)
(b) (c) (c) (a) (b) (a)
(a) (c) (a) (c) (b) (b)
σ2 σ3 σ2 σ1 σ2 σ3 ≡ σ1 σ3 σ2 σ1 σ3 σ2 ,
(c)
whose only proof requires introducing an intermediate word beginning with σ3 , for
(c) (b) (b) (a) (b) (a)
instance σ3 σ2 σ3 σ1 σ2 σ3 . In other words, every van Kampen diagram witnessing for (2.14) must contain a vertex from which three edges start. By adding (2.14)
as a new (redundant) relation in the presentation, we can make the above relation
eligible for factor reversing, but new obstructions are likely to appear, and it is not
18
PATRICK DEHORNOY
clear why the completion procedure thus sketched should come to an end. Thus,
the following question is left open:
e+ admit cancellation? Does it embed in
Question 2.11. [2] Does the monoid B
n,C
its enveloping group?
References
[1] S.I. Adyan, On the embeddability of monoids, Soviet. Math. Dokl. 1-4 (1960) 819–820.
[2] A. Berenstein, J. Greenberg, and J.R. Li, Monomial braidings, in preparation,
http://www.wisdom.weizmann.ac.il/∼jianrong/mon braid fin.pdf.
[3] J. Birman, Braids, Links, and Mapping Class Groups, Annals of Math. Studies 82 Princeton
Univ. Press (1975).
[4] A.H. Clifford & G.B. Preston, The algebraic Theory of Semigroups, vol. 1, Amer. Math. Soc.
Surveys 7, (1961).
[5] P. Dehornoy, Groups with a complemented presentation, J. Pure Appl. Algebra 116 (1997)
115–137.
[6] P. Dehornoy, On completeness of word reversing, Discrete Math. 225 (2000) 93–119.
[7] P. Dehornoy, Complete positive group presentations, J. Algebra 268 (2003) 156–197.
[8] P. Dehornoy, The subword reversing method, Internat. J. Algebra Comput. 21 (2011) 71–118.
[9] P. Dehornoy, Multifraction reduction I: The 3-Ore case and Artin-Tits groups of type FC, J.
Comb. Algebra 1 (2017) 185–228.
[10] P. Dehornoy, with I. Dynnikov, D. Rolfsen, B. Wiest, Ordering Braids, Mathematical Surveys
and Monographs vol. 148, Amer. Math. Soc. (2008).
[11] P. Dehornoy & B. Wiest, On word reversing in braid groups, Int. J. Algebra Comput. 16(5)
(2006) 931–947.
[12] F.A. Garside, The braid group and other groups, Quart. J. Math. Oxford 20-78 (1969) 235–
254.
[13] R.C. Lyndon & P.E. Schupp, Combinatorial Group Theory, Springer-Verlag; 1977, reprinted
in 2001.
[14] Ø. Ore, Linear equations in non-commutative fields, Ann. of Math. 34 (1933) 480–508.
[15] J.H. Remmers, On the geometry of semigroup presentations, Adv. Math. 36 (1980) 283–296.
Laboratoire de Mathématiques Nicolas Oresme, UMR 6139 CNRS, Université de Caen,
14032 Caen, France
E-mail address: [email protected]
URL: dehornoy.users.lmno.cnrs.fr
| 4math.GR
|
Quickest Change Detection Approach to Optimal Control in Markov
Decision Processes with Model Changes
arXiv:1609.06757v2 [stat.AP] 1 Mar 2017
Taposh Banerjee1 , Miao Liu2 and Jonathan P. How3
Abstract— Optimal control in non-stationary Markov decision processes (MDP) is a challenging problem. The aim in
such a control problem is to maximize the long-term discounted
reward when the transition dynamics or the reward function
can change over time. When a prior knowledge of change
statistics is available, the standard Bayesian approach to this
problem is to reformulate it as a partially observable MDP
(POMDP) and solve it using approximate POMDP solvers,
which are typically computationally demanding. In this paper,
the problem is analyzed through the viewpoint of quickest
change detection (QCD), a set of tools for detecting a change
in the distribution of a sequence of random variables. Current
methods applying QCD to such problems only passively detect
changes by following prescribed policies, without optimizing
the choice of actions for long term performance. We demonstrate that ignoring the reward-detection trade-off can cause
a significant loss in long term rewards, and propose a two
threshold switching strategy to solve the issue. A non-Bayesian
problem formulation is also proposed for scenarios where
a Bayesian formulation cannot be defined. The performance
of the proposed two threshold strategy is examined through
numerical analysis on a non-stationary MDP task, and the
strategy outperforms the state-of-the-art QCD methods in both
Bayesian and non-Bayesian settings.
I. I NTRODUCTION AND M OTIVATION
In their life time, autonomous agents may be required
to deal with non-stationary stochastic environments, where
parameters of the world (dynamics, cost and goals) change
over time (for the same states spaces). For example, in
robotic navigation, a path planner might need to accommodate
dynamically changing friction coefficients of road surfaces
or wind conditions to ensure safety. In inventory control,
an order management agent might need to account for the
time varying distribution of demands for goods and services
when determining the order at each decision period. A service
robot may have to adapt to different personality or behavior
of the person it is assisting. In a multi-agent system, an agent
may have to adapt to changing strategies of the opponent or
other players [1]. In order to maximize long term rewards,
it is paramount that the agents are able to quickly detect
the changes in the environment and adapt their policies
accordingly.
When the environment is stationary, many of these problems for autonomous agents, path planning or robot control
can be formulated as an MDP, for which there is a rich
1 Taposh Banerjee is with the School of Engineering and Applied Sciences,
Harvard University, Cambridge, MA. [email protected]
2 Miao Liu is with IBM T. J. Watson Research Center, Yorktown Heights,
New York. [email protected]
3 Jonathan P. How is with the Laboratory for Information and Decision
Systems (LIDS), Massachusetts Institute of Technology, Cambridge, MA.
[email protected]
Work completed while the first two authors were at LIDS, MIT.
literature [2].When the environment is non-stationary, there
is a limited understanding on the best strategy to employ.
In this paper, we are interested in the case where the nonstationary process consists of several stationary processes.
Each stationary process corresponds to an MDP, and the
non-stationary nature is captured by changes in the transition
and/or reward structure of the MDPs. That is, we consider
the whole operation in a non-stationary environment as a
global task, which can be decomposed into several stationary
subtasks. This is a general case often encountered in real
world applications, such as robotics, inventory controls, etc.
For example, in inventory control, it is reasonable to assume
that the demand rate would be steady for some time, before
changing to another value. For path planning, one can assume
that the road surfaces or wind conditions are steady for a
while before changing, etc.
Solving dynamic decision making in non-stationary environments optimally is an extremely hard problem. Although
it is extensively studied in the literature, due to the analytical
intractability of the problem, however, existing works aim
towards developing approximate solutions. For example, in
some papers, the problem is reformulated as a Partially Observable MDP (POMDP), and approximate POMDP solvers
are used to obtain a solution; e.g., see [3] and [4]. In others,
estimates are maintained of the current MDP parameters, and
next state or reward predictors are used to assess whether
the parameters of the active MDP has changed; see e.g. [5]
and [6]. In [7] and [8], new models such as hidden mode
MDPs (hmMDPs) and mixed observability MDPs (MOMDPs)
are proposed to capture the transition between different
MDPs, and approximate solutions are obtained. Although
these approximate solutions are promising tools for solving
non-stationary MDPs, they are restricted to problems where
the model sizes are known a priori, and they might still suffer
from high computational overhead. The approach of multitask
or transfer learning has also been used to study these problems.
However, in these approaches, tasks are usually assumed to
be well separated and given before learning and planning
take place. There is no explicit concept of automatic change
detection in these problems. Problems of this nature are also
explored in the adaptive control literature. For example, in [9]
and [10], the authors study optimal control of an MDP with
unknown parameters in the transition kernel. Again, there is
no concept of a change in this problem.
In this paper, we approach the problem of optimal control
in MDPs with model changes through the viewpoint of
classical quickest change detection (QCD) [11]. The changes
in properties of MDPs (transition or reward) cause a change
in the law of the state-action sequence. Tools and ideas
from the QCD literature can be used to detect these changes
in law. QCD algorithms are scalable, and are optimized
for quickest detection. In spite of these properties, these
tools are either never used, or are not fully exploited in
science and engineering literature, especially in the problem
of interest in this paper. For example, sequential detection
approaches are applied in [12] and [13], where the optimal
policy for each MDP is executed, and a change detection
algorithm is employed to detect model changes. We will
show in this paper that such a naive approach may lead to
significant loss in performance. The key idea is that what
is optimal for optimizing rewards may not necessarily be
optimal for quickest detection of model changes. Thus, there
is a fundamental reward-detection trade-off to be exploited.
The purpose of this paper is to articulate this trade-off in
a mathematically precise manner, and to propose solutions
that we claim best exploit this trade-off. Specifically, we
propose a computationally efficient, simple two-threshold
strategy to quickly detect model changes, without significant
loss in rewards. We show that such an approach is superior to
the existing methods in the literature. Specifically, we show
that the two-threshold strategy leads to better performance
as compared to the single threshold classical QCD tests, as
employed in [13]. Note that it is shown in [13] that a QCD
approach is better (with respect to the Bayesian problem we
use in this paper; see (2) below) than other approaches in
the literature, e.g., [6]. For benchmarking purposes, we also
compare with the MOMDP solution [8] and a random action
strategy.
II. P ROBLEM F ORMULATION
Assuming we have a family of MDPs {Mθ }, where θ
takes value in some index set Θ, which could be finite or
infinite. For each θ , an MDP is defined by a four tuple:
Mθ = (S , A , Tθ , Rθ ), where S and A are respectively
the state space and the action space common to all MDPs,
Tθ is the transition kernel, and Rθ is the reward function.
A decision maker observes a sequence of states {sk }k≥0 ,
sk ∈ S , ∀k, and for each observed state sk , it chooses an
action ak ∈ A . For each pair (sk , ak ), the next state sk+1
takes values according to the law dictated by the kernel: ∀k
Tθ (s, a, s0 ) :=P(sk+1 = s0 | ak = a, sk = s), s, s0 ∈ S , a ∈ A .
The reward obtained by choosing action ak after observing
sk is given by Rθ (sk , ak ).
We operate in a non-stationary environment, which means
that the transition structure or the reward structure can change
over time. Specifically, at time say γ1 , the parameter θ of the
MDP changes from θ = θ0 to say θ = θ1 . At a later time,
say γ2 , the parameter changes from θ = θ1 to θ = θ2 , and
so on. To be precise, denote the non-stationary dynamics for
k ≥ 0 as
P(sk+1 = s0 | ak = a,sk = s)
Tθ0 (s, a, s0 ), for k < γ1
=
Tθ1 (s, a, s0 ), for γ1 ≤ k < γ2
(1)
Reward for (sk , ak ) := Rk (sk , ak )
Rθ0 (sk , ak ), for k < γ1
=
Rθ1 (sk , ak ), for γ1 ≤ k < γ2 .
For simplicity of exposition, for now we restrict our
attention to the case where there is only one change point
γ, and there are only two models, a pre-change model
M0 = (S , A , T0 , R0 ) and a post-change model M1 =
(S , A , T1 , R1 ). In Section VI, we discuss extensions of
the ideas developed for the two model case, to the case
where there are more than two models (possibly infinite), and
possibly more than one change point.
We consider two different problem formulations: Bayesian
and Non-Bayesian.
A. Bayesian Formulation
Suppose we have a prior on the single change point γ = γ1 ,
and we have chosen a policy Π = (π1 , π2 , · · · ) that maps the
states {sk } to actions {ak }. The MDPs M0 and M1 , the policy
Π, and the prior on the change point, together induce a joint
distribution on the product space of state spaces and actions
which we denote by P, and the corresponding expectation by
E. The objective is to choose the policy Π so as to maximize
a long term reward.
h
i
∞
(2)
max E ∑k=0 β k Rk (sk , ak ) ,
Π
where β ∈ [0, 1) is a discount factor. Note that the change
point γ is unobservable. As a result, a Markov policy may
not be optimal, and the policy Π above has to use the past
history to choose the optimal action. To accommodate model
changes, problem (2) can be reformulated as a Partially
Observable MDP (POMDP) (see Lemma 1 below), and can
be solved using approximate POMDP solvers. However, it is
computationally expensive to solve this problem numerically,
especially when the number of possible models is large. We
thus use other approaches to obtain approximate solutions.
The vehicle we have chosen to obtain the approximate
solutions is the theory of QCD. We show in Section VII
that our proposed solutions performs as well as the solution
obtained from standard approximate POMDP solvers in the
literature, while at the same time it incurs significantly less
computational cost, online and off-line.
Lemma 1: The non-stationary MDP problem (2) is equivalent to a POMDP problem with the model specified as
f, Ω, R),
e where X = S × Θ is the
MPOMDP (X , A , O, T
POMDP state space, which concatenates the fully observable
MDP state space S and the unobservable model index space
Θ; O is the set of observations, which is equivalent to the set
f: X × A × X → [0, 1] is the POMDP state
of MDP states; T
transition function; Ω : X ×A ×O → [0, 1] is the observation
function; Re : X × A → R is the reward function with
f x0 = (s0 , θ 0 )|x = (s, θ ), a = Tθ 0 (s, a, s0 )F (θ 0 |θ )I(θ 0 6= θ )
T
+ Tθ (s, a, s0 )F (θ 0 |θ )I(θ 0 = θ )
ω(o|x0 , a) = I(o = s0 )
R̃(x, a) = Rθ (s, a)
(3)
where I(·) is an indicator function, and F is a model
transition matrix. Given the prior over a change point to
be geometric distribution, i.e.,γ ∼ Geom(λ ), it can be shown
that
λ I(θ 0 6= θ )+(1 − λ )I(θ 0 = θ ) if θ = 0
0
F (θ |θ ) =
.
I(θ 0 6= θ )
if θ = 1
(4)
By converting the original non-stationary MDP problem
into a POMDP problem, one can apply any existing POMDP
solvers to obtain an approximate POMDP policy, which maps
the belief state b(x) to an action a. Considering the fact that
here the state space can be factorized into an observable part
and an unobservable part, this POMDP model can be treated
as a mixed observable MDP (MOMDP). In an MOMDP, the
belief state becomes a union of |S| disjoint |Θ|-dimension
subspaces, and all the operations are performed in the lower
dimension, hence is more time efficient to solve a MOMDP
than to solve a POMDP.
B. Non-Bayesian Formulation
In practice, a prior on the change point is not often known.
Thus, a Bayesian formulation cannot be defined. If the change
point is treated as an unknown constant, there are infinite
possible laws on the state-action joint spaces, one for each
possible change point. In statistics, there are two ways to study
non-Bayesian problems: minimax or maxmin and NeymanPearson type criteria.
For minimax or maxmin criterion we may consider the
following problem:
h
i
∞
max min Eγ ∑k=0 β k Rk (sk , ak ) ,
Π
γ
where Eγ is the expectation with respect to the probability
measure when change occurs at time γ. However, there
are two major issues with such an approach in practice.
First, a minimax approach may lead to a conservative or
pessimistic approach to policy design. Secondly, it is not
always straightforward to compute such costs for comparing
various competing algorithms.
Since the problem under consideration is about identifying
the correct regime, we also consider a Neyman-Pearson
type of criterion: trying to maximize reward in one regime
subject to a constraint on the performance under alternative
regime. We take this approach (in addition to the Bayesian
formulation) in our paper and consider the following problem.
max
Π
subj. to
h
E1
,
i
∞
∑k=0 β k Rk (sk , ak ) ≥ α.
∑
h
E∞
i
∞
β k Rk (sk , ak )
k=0
(5)
Thus, the objective is to optimize rewards when the change
occurs at time 1, subject to a constraint on the performance
when the change never occurs. In sequential analysis literature,
one often uses a minimax objective rather than the average
under E1 . As mentioned earlier, this leads to a pessimistic
viewpoint. Also, for many sequential detection algorithms
in the literature,
the worst case is often achieved for γ = 1.
k
Thus, E1 ∑∞
k=0 β Rk (sk , ak ) can also be seen as a proxy for
the minimax or maxmin reward.
Another advantage of the Neyman-Pearson type criterion
is that it maintains a balance in reward structure between
the pre- and post-change regime. A discounted cost criterion
with a discount factor β < 1, as chosen in Bayesian and
maxmin problems, may not always be appropriate for the
application in hand. This is because such a criterion penalizes
under-performing under M0 more than it penalizes underperforming under M1 . In reality, we may be interested in
maintaining good performance under every regime.
C. Oracle Policy
Let V0 (x) and V1 (x) be the cost/reward to go at state x
for the MDP models M0 and M1 , respectively. Suppose the
following conditions are satisfied:
1) the change point is exactly known,
2) the change point γ >> 1,
3) for some small δ > 0, the function |V1 (x) − V1 (y)| ≤ δ ,
∀x, y, that is the reward to go for the model M1 is not
sensitive to the initial state x.
The implication of the first two conditions is that it is
approximately optimal to use the optimal policy for M0
before the change point. The implication of the last condition
is that, no matter which policy is used for model M0 , it
is still approximately optimal to use the optimal policy for
model M1 after the change point. As a result, if all three of
these conditions are satisfied, then one can just implement the
optimal policy for the model M0 before change and use the
optimal policy for the model M1 after change, and achieve
close to maximum average rewards. In the following, such a
policy is referred to as the Oracle.
Since the change point is unknown, it is clear that if the
change can be reliably detected, then one can hope to achieve
rewards close to what the Oracle can achieve. There are
powerful algorithms in the literature that one can use to
detect this change as quickly as possible. We briefly discuss
relevant ideas and algorithms in the next section, which serves
as a background to readers not familiar with the literature on
quickest change detection.
III. BACKGROUND ON Q UICKEST C HANGE D ETECTION
In the quickest change detection literature, algorithms are
developed that allows one to quickly detect a change in the
distribution of a stochastic process from one law to another.
The optimality properties of the algorithms are studied under
various modeling assumptions and problem formulations. The
theoretical foundations were laid by the work of Wald [14]
and Shiryaev [15]; see also [11] for a survey of the area. We
discuss three such algorithms in the context of problems (2)
and (5).
Suppose we employ a certain policy Π and observe a
sequence of states and actions (driven by the policy) {(sk , ak )}.
At the change point Γ, modeled as a random variable with
prior probability mass function φ , the model changes from
M0 to M1 . Thus, the law of the stochastic sequence {(sk , ak )}
changes. Then the following algorithm, called the Shiryaev
algorithm [16], has strong optimality properties. The Shiryaev
algorithm dictates that we compute the following statistic at
each time n:
T1 (si−1 , ai−1 , si )
,
T
i=k 0 (si−1 , ai−1 , si )
n
Sn =
∑
1≤k≤n
φ (k) ∏
(6)
and declare that a change in the model has occurred at the
stopping time
τs = min{n ≥ 1 : Sn > A}.
(7)
Here, A is a threshold chosen to control false alarms. If the
prior on the change point is geometric with parameter ρ, then
the statistic Sn can be computed recursively:
1 + Sn−1 T1 (sn−1 , an−1 , sn )
Sn =
;
1 − ρ T0 (sn−1 , an−1 , sn )
It is shown in [16] that if A =
1−ζ
ζ
S0 = 0.
(8)
then
| log ζ |
as ζ → 0.
Iπ + d
τ:P(τ≤Γ)≤ζ
(9)
Thus, the Shiryaev algorithm achieves the best average
detection delay over all stopping times that satisfied a
given probability of false alarm constraint of ζ , as ζ → 0.
Here, d is a constant that is a function of the prior φ and
equals | log(1 − ρ)| for Γ ∼ Geom(ρ). The quantity Iπ is the
Kullback-Leibler information number defined by
T1 (sk−1 , ak−1 , sk )
1 n
under P1 . (10)
Iπ = lim ∑ log
n→∞ n
T0 (sk−1 , ak−1 , sk )
k=1
E[(τs − Γ)+ ] ∼
E[(τ − Γ)+ ] ∼
min
Thus, larger this number Iπ is, the smaller is the detection delay. We use the subscript π to emphasize that the information
number is a function of the policy Π employed.
If the prior on the change point is not known, or if a prior
cannot be defined, one can replace the Shiryaev statistic by
the CUmulative SUM statistic (CUSUM) [17]
n
Wn =
T1 (si−1 , ai−1 , si )
∑ log T0 (si−1 , ai−1 , si ) ,
n−m≤k≤n
max
(11)
i=k
where m is a window size that depends on the false alarm
constraint. The CUSUM algorithm has strong optimality properties, similar to (9), but with average delay and probability
of false alarm expressions replaced by suitable minimax delay
and mean time to false alarm expressions [17]. Specifically,
if
τc = min{n ≥ 1 : Wn > A},
(12)
then, with A = log η,
sup Eγ [τc − γ|τc > γ] ∼
γ
∼
min
sup Eγ [τ − γ|τ > γ]
τ:E∞ [τ]≥η γ
| log η|
as η → ∞.
Iπ
(13)
Here, Eγ is the expectation when the change point is at γ, and
E∞ is the expectation when the change never occurs. Thus,
the CUSUM algorithm minimizes the maximum of detection
delay–maximum over all possible change points–subject to a
constraint η on the mean time to false alarm, as η → ∞.
Again, the optimal performance, for a given false alarm,
depends on the information number Iπ . Thus, the number Iπ
is the fundamental quantity of interest in quickest change
detection problems. It will also play a fundamental role in
the rest of the paper.
An alternative to CUSUM in the non-Bayesian setting is
to put ρ = 0 in the Shiryaev algorithm and obtain what is
called the Shiryaev-Roberts (SR) statistic
SRn = (1 + SRn−1 )
T1 (sn−1 , an−1 , sn )
;
T0 (sn−1 , an−1 , sn )
SR0 = 0,
(14)
and use the stopping time
τsr = min{n ≥ 1 : SRn > A}.
(15)
In the numerical results reported in Section VII, we use the SR
test instead of CUSUM because of the ease of implementation.
The algorithms discussed above can be easily modified
to also account for a change of distribution of rewards. We
do not discuss that here for simplicity of exposition. Also,
the state and action sequences are more informative. Thus,
unless only the reward undergoes a change, and the transition
functions do not change, only then it will be useful to consider
rewards for detection.
Trade-off Between Detection Performance and Reward
Note that the problems in (2) and (5) are not classical
change detection problems. The objective is not to optimize
delay subject to constraint on false alarms, but to optimize
long term rewards. Thus, while quick detection is key, what
is optimal for change detection may not be optimal with
respect to optimizing rewards, and vice versa. Thus, there
is a fundamental trade-off between detection performance
and maximizing rewards. See Section IV below for a more
rigorous statement.
The fundamental contribution of this paper is a computationally efficient two-threshold algorithm that optimizes
this detection-reward trade-off to achieve near optimal performance. As discussed in the introduction, most of the works
in the existing literature either do not exploit tools from the
change detection literature, or very few who exploit them,
ignore this trade-off in their design.
IV. Q UICKEST D ETECTION WITH L OCALLY O PTIMAL
S OLUTION
One approach to solving either (2) or (5) is to use a
locally optimal approach, i.e., to start with using the optimal
policy for model M0 , compute the change detection statistics
(Shiryaev, SR or CUSUM) over time, and switch to the
optimal policy for the model M1 at the time when the change
detection algorithm crosses its threshold. Mathematically, let
Π0 = (π0 , π0 , · · · ) be the (stationary) Markov optimal policy
for model M0 , and let Π1 = (π1 , π1 , · · · ) be the (stationary)
Markov optimal policy for model M1 . Then use the following
policy
Πloc = (π0 , π0 , · · · , π0 , π1 , π1 , · · ·),
(16)
|
{z
} | {z }
τ−1 times
τ onward
where τ is the stopping time for the Shiryaev, SR or the
CUSUM algorithm.
a) Choosing the threshold: In the quickest change
detection problem, the threshold A used in the Shiryaev, SR or
CUSUM tests is designed to satisfy the constraint on the rate
of false alarms. However, for problems in (2) and (5), there is
no notion of a false alarm. For the non-Bayesian criterion, one
can choose the threshold to satisfy the constraint of α (see
(5)). However, in the Bayesian setting, the threshold is a free
parameter, and can be optimized for optimal performance.
b) Issues with policy Πloc : As we will show in Section VII, the policy Πloc may lead to poor performance.
This is because, as discussed in Section III, the detection
performance of the stopping rule τ used depends on the
information number Iπ0 ; see (10). Let
Algorithm 5.1: ΠTT : Two-Threshold Switching Strategy
Require: Thresholds A and B, B < A; optimal policies π0 ,
π1 , πKL ; transition kernels T1 (s, a, s0 ) and T0 (s, a, s0 )
1: Start with S0 = 0
2: while Sn ≤ A do
3:
Use locally optimal policy Π0 = (π0 , π0 , · · · )
4:
Compute the statistic Sn using (8)
5:
If Sn ≤ B continue using the policy π0
6:
If Sn > B use πKL
7:
n=n+1
8: end while
9: Switch to policy Π1 = (π1 , π1 , · · · )
10: return
Imax := max Iπ .
π
Then, it is possible that
Iπ0 Imax ,
and that Iπ0 is itself quite small. This may lead to poor
detection performance, and hence may cause significant loss
of revenue or rewards. If it so happens that Iπ0 ≈ Imax , and
Iπ0 is significant, then one can expect that this simple strategy
Πloc itself may lead to near optimal performance. But, this is
more a matter of chance, and more sophisticated approaches
are needed that considers every possibility. We note that in
some cases one may be able to use MOMDP or POMDP based
approximations to compute the optimal policy for our problem,
but such solutions are computationally demanding. Using a
quickest change detection approach leads to computationally
efficient algorithmic techniques.
V. A T WO -T HRESHOLD S WITCHING S TRATEGY TO
E XPLOIT R EWARD -D ETECTION T RADE -O FF
One way to improve the performance of the policy Πloc is
to replace the policy Π0 by another policy that better exploits
the reward-detection trade-off. One option is to replace Π0 by
a policy that maximizes the information number Iπ . Define for
each state s ∈ S , the information maximizing policy πKL (s)
as
T1 (s, a, s0 )
πKL (s) = arg maxa ∑ T1 (s, a, s0 ) log
. (17)
T0 (s, a, s0 )
s0
Specifically, use
ΠKL = (πKL , πKL , · · · , πKL , π1 , π1 , · · ·).
|
{z
} | {z }
τ−1 times
(18)
τ onward
Using this policy will lead to quickest and most efficient
detection of model changes. However, since the policy πKL
may not be optimal for the MDP model M0 , it may cause
significant loss of rewards before the change point.
We propose to use a simple two-threshold strategy that
switches between π0 and πKL , using π0 to optimize rewards,
and switching to πKL for information extraction. The proposed
switching strategy is closely related to the notion of sequential
design of experiments [18], or to the notion of exploitation
and exploration in multi-arm bandit problems [19].
The two-threshold policy ΠTT is described in Algorithm 5.1.
In words, fix two thresholds A and B, with B < A. Also,
assume that we are in the Bayesian setting so that we can
compute the Shiryaev statistic Sn (8). Then the policy ΠTT is
defined as follows. Start with the locally optimal policy Π0 =
(π0 , π0 , · · · ) and compute the statistic Sn . As long as Sn ≤ B,
keep using the Markov policy π0 . If Sn > B, suggesting that
we may be in the wrong model, extract more information by
using πKL . If Sn goes below B again, switch back to π0 , else
we keep using πKL . If Sn > A, switch to the optimal Markov
policy for model M1 , that is π1 .
In short, use π0 when Sn ∈ [0, B], use πKL when Sn ∈ (B, A],
and use π1 when Sn ∈ (A, ∞). Thus, the change detection
statistic Sn is used as a belief on the unknown model, and is
used for detection between M0 and M1 , depending on whether
Sn is small or large, respectively. For moderate values of Sn ,
the policy πKL is used to improve detection performance.
ΠTT = (π0 , · · · , π0 , πKL , · · · , πKL , π0 , · · · , π0 , · · · ,
| {z } |
{z
} | {z }
Sn ≤B
B<Sn ≤A
Sn ≤B
· · · , πKL , · · · , πKL , π1 , π1 , · · ·).
|
{z
} | {z }
B<Sn ≤A until τ−1
(19)
τ onward
In the non-Bayesian setting, we can replace the Shiryaev
statistic Sn by the SR statistic SRn (14) or the CUSUM
statistic Wn (11).
a) On the choice of thresholds A and B: Note first that
setting A = B reduces the two-threshold policy ΠTT to the
locally optimum policy Πloc . Also, by setting B = 0 the policy
reduces to ΠKL . As discussed earlier, this will lead to good
detection performance, but may lead to loss of rewards. Akin
to Πloc , the thresholds A and B here are free parameters,
even for the non-Bayesian setting. Thus, the thresholds can
be optimized for best performance: choosing the optimal
thresholds is equivalent to choosing the best detection-reward
trade-off.
b) Bayesian vs Non-Bayesian: We emphasize that the
definition of ΠTT is implicitly different for Bayesian and
non-Bayesian cases. In the Bayesian case, we have access to
the prior on the change point, and we use that to compute the
Shiryaev statistic Sn . However, in the non-Bayesian case, we
replace the Shiryaev statistic by the Shiryaev-Roberts statistic
SRn or the CUSUM statistic Wn .
c) When will ΠTT outperform Πloc ?: The amount of
performance gain depends in general on the problem structure:
reward function and the transition kernel. However, a condition which must be satisfied is Iπ0 Imax . This condition often
leads to better detection performance for ΠTT as compared
to Πloc , resulting in efficient detection and more average
rewards. Another condition under which performance gains
are significant is when under-performing under any of the
models is penalized equally. For example, in the Bayesian
case (2), if the discount factor β is small, then the rewards
lost in delaying a transition to the optimal policy of M1 will
not affect the overall cost. As a result, a policy can cause
large delays, without significantly loosing rewards, and a good
detection performance may not necessarily lead to noticeable
gain in rewards. Numerical results are provided in the next
section to support these observations.
VI. M ULTIPLE M ODELS AND C HANGE P OINTS
For a parametrized family of models {Mθ }, if the model
changes from Mθ0 to some other unknown model in the
family, then the Shiryaev, SR or CUSUM statistic cannot
be used for change detection. This is because one needs the
exact knowledge of the post-change distribution to compute
those statistics. Popular alternatives are to use generalized
likelihood ratio (GLR) based tests or mixture based tests. We
only discuss the former. A GLR statistic for change detection
is defined as
n
Gn =
max
sup
Tθ (si−1 , ai−1 , si )
∑ log Tθ (si−1 , ai−1 , si ) ,
n−m≤k≤n kθ −θ k≥ε i=k
0
0
where ε is the minimum magnitude of change that can occur
in the problem.
A replacement for Πloc in this setting would be to use
locally optimal policy and switch at the time of stopping,
where now the stopping rule is
τg = min{n ≥ 1 : Gn > A}.
Since there is more than one possibility for the post-change
model, one can use the maximum likelihood estimate (the θ
that achieved the maximum in the expression for Gn at the
time of stopping) to choose the model. When the number of
models is finite, one can also use the theory of fault isolation
to choose the right model [20].
A replacement for ΠTT in this setting is even less obvious
because of the difficulty in defining an appropriate version
of πKL . We propose the following
πKL (s) = arg maxa
Tθ (s, a, s0 )
∑ Tθ (s, a, s0 ) log Tθ (s, a, s0 ) .
kθ −θ0 k≥ε 0
min
s
0
(20)
Thus, maximize the worst case KL divergence. Analytical
and numerical performance of these schemes will be reported
elsewhere.
If there are multiple change points, then as long as the
gap between the change points is large enough, we can
repeat the two model algorithm for consecutive change points.
Specifically, if the GLR based algorithm detects a change
and gives θ1 as an estimate for the post-change parameter,
then we can reset the algorithm with θ1 as the pre-change
parameter, and reapply the GLR based test. As long as there
is a significant gap between model parameters, one would
expect this technique to be close to optimal.
VII. N UMERICAL R ESULTS
We now compare the two policies ΠTT and Πloc for an
inventory control problem, and show that using ΠTT results
in significant gains. We use the inventory control problem to
illustrate the ideas because of its simplicity. The understanding
developed through this simple problem can be extended to
more complex problems.
a) Inventory control problem: The state sk is the level
of the inventory at time k, and the maximum size of the
inventory is N. The action ak is the additional inventory to
be ordered based on the state sk , making the total inventory
sk + ak . A stochastic demand wk arrives making the residual
inventory or the next state sk+1 = max{0, sk + ak − wk }. Let
c to be cost of ordering a unit of inventory, h be the holding
cost per unit, and p be the cost of loosing a unit of demand.
Thus the cost per unit time is given by
C(sk , ak ) = Ewk [ cak + h max{0, sk + ak − wk }
+p max{0, −(sk + ak − wk )}] .
(21)
It is assumed that at the change point, the distribution of the
demands changes from Poisson(λ ) to Uniform. The demands
are assumed to be independent, conditioned on the change
point. For clarification, note that the problem formulations
(2) and (5) are about maximizing rewards, but the objective
in the inventory control problem is to minimize cost.
b) Numerical results for Bayesian setting: Under the
Bayesian setting (2), it is assumed that the change occurs
with a geometric prior ρ = 0.01. The other parameter values
used are c = 1, h = 5, β = 0.99, λ = 2, N = 10, 20, and p
is chosen to be 100, 200 or 300. This is a classical optimal
control problem and the optimal policy under each model,
Poisson or Uniform, can be found using value iteration [2].
The performance of various policies discussed are tabulated in
Table I. The results are obtained by performing average over
1000 independent runs, each of horizon size 1000. The Oracle
policy is the one that knows the change point, and switches
from the optimal policy for the Poisson model to the optimal
policy for the Uniform model, exactly at the change point. The
policy Πloc employs the Shiryaev algorithm (7). Since there
is no concept of false alarms, the choice of threshold A is
optimized to achieve minimum possible cost. The policy ΠTT
also employs the Shiryaev algorithm, and the values of the
two thresholds are also chosen to achieve minimum possible
cost. For comparison, the costs achieved by performing an
MOMDP approximation and a random action strategy is also
shown. The performance of the policy ΠTT is comparable to
that of the MOMDP solution, and significantly better than
that of Πloc . Note that the gain is more significant when Imax
is much larger than Iπ0 . Also, since the Poisson arrival rate
chosen implies less demand as compared to the Uniform
arrival rate, the optimal control is more aggressive for the
Uniform arrival model. A delay in detecting the change will
result in significant loss of demands. The chosen value of
the discount factor β and p ensures that delays in detection,
TABLE I: Bayes discounted cost (2) for different policies: c = 1,
h = 5, β = 0.99, ρ = 0.01. The values in the table are obtained by
averaging costs over 1000 independent runs, each of horizon size
1000.
N
20
20
20
10
10
10
p
100
200
300
100
200
300
Oracle
4057
4229
4277
2336
2445
2550
Πloc
4980
5678
5884
2619
2902
2920
ΠTT
4579
5051
5238
2515
2728
2813
MOMDP
4688
5144
5325
2677
2876
3020
RANDOM
16489
27655
38821
7861
13623
19386
Imax
8.45
8.45
8.45
1.72
1.72
1.72
Iπ0
2.56
2.56
3.24
1.17
1.42
1.61
and outperform the state-of-the art QCD method and MOMDP
method for solving non-stationary MDP tasks. Future work
will include application of ideas developed in this paper
to design of reinforcement learning based algorithms for
decision making in non-stationary environments. See [21] for
a stochastic approximation based approach to this problem.
ACKNOWLEDGMENT
This research was funded in part by Northrop Grumman
and Lincoln Laboratory.
R EFERENCES
Fig. 1: Performance under M1 subject to constraints on the
performance under M0 . The SR algorithm (14) is used while
implementing the policies.
and hence loss in demands, are sufficiently penalized under
both regimes, pre-change and post-change.
c) Numerical results for Non-Bayesian setting: An
overall discounted criterion like (2) may not be the best
or even fair way to compare competing algorithms for a nonstationary environment. One of the primary reasons for using
(2) as a criterion was to show that the proposed algorithm
can perform comparable to an MOMDP approximation. A
more appropriate performance metric is a variational one (5).
In this setting, instead of optimizing the threshold used in the
policies, the thresholds are selected
to satisfy the constraint
kC (s , a ) , in which the change never
of α on E∞ ∑∞
β
k k k
k=0
occurs.
of the thresholds, the performance
∞ Fork these choices
E1 ∑k=0 β Ck (sk , ak ) is evaluated for both ΠTT and Πloc in
which the change occurs at time 1. This way, performance
under both the regimes or MDPs are equally weighted, and
an algorithm that performs well in every setting can be
obtained. The performance comparison is plotted in Fig. 1.
The parameter used are c = 1, h = 5, β = 0.99, λ = 2, N = 20,
and p = 200. We use the Shiryaev-Roberts (14) algorithm to
detect changes. Clearly, ΠTT is superior. Finally, note that
since we do not have a prior on the change point, a POMDP
or MOMDP solution cannot be obtained.
VIII. C ONCLUSIONS
This paper presents a novel way to combine techniques
used for stationary MDPs and quickest change detection
to solve non-stationary MDPs by considering the tradeoff between change detection and reward maximization, an
important problem that has not been adequate addressed
before. Our method uses a two threshold switching strategy
to exploit reward-detection trade-off. Our numerical results
show that the proposed method can achieve better trade-off,
[1] P. Hernandez-Leal, M. E. Taylor, B. Rosman, L. E. Sucar, and E. M.
de Cote, “Identifying and tracking switching, non-stationary opponents:
a Bayesian approach,” in Workshops at the Thirtieth AAAI Conference
on Artificial Intelligence, 2016.
[2] D. P. Bertsekas, Dynamic programming and optimal control. Athena
Scientific Belmont, MA, 1995, vol. 1, no. 2.
[3] E. Hadoux, A. Beynier, and P. Weng, “Solving hidden-semi-Markovmode Markov decision problems,” in Scalable Uncertainty Management.
Springer, 2014, pp. 176–189.
[4] P. Dayan and T. J. Sejnowski, “Exploration bonuses and dual control,”
Machine Learning, vol. 25, no. 1, pp. 5–22, 1996.
[5] K. Doya, K. Samejima, K.-i. Katagiri, and M. Kawato, “Multiple
model-based reinforcement learning,” Neural computation, vol. 14,
no. 6, pp. 1347–1369, 2002.
[6] B. C. Da Silva, E. W. Basso, A. L. Bazzan, and P. M. Engel,
“Dealing with non-stationary environments using context detection,” in
Proceedings of the 23rd international conference on Machine learning.
ACM, 2006, pp. 217–224.
[7] S. P. Choi, D.-Y. Yeung, and N. L. Zhang, “Hidden-mode Markov
decision processes for nonstationary sequential decision making,” in
Sequence Learning. Springer, 2000, pp. 264–287.
[8] I. Chades, J. Carwardine, T. Martin, S. Nicol, R. Sabbadin, and
O. Buffet, “MOMDPs: a solution for modelling adaptive management
problems,” in Twenty-Sixth AAAI Conference on Artificial Intelligence
(AAAI-12), 2012.
[9] V. Borkar and P. Varaiya, “Adaptive control of Markov chains, i: Finite
parameter set,” IEEE Transactions on Automatic Control, vol. 24, no. 6,
pp. 953–957, 1979.
[10] ——, “Identification and adaptive control of Markov chains,” SIAM
Journal on Control and Optimization, vol. 20, no. 4, pp. 470–489,
1982.
[11] V. V. Veeravalli and T. Banerjee, “Quickest change detection,” Academic press library in signal processing: Array and statistical signal
processing, vol. 3, pp. 209–256, 2013.
[12] R. Allamaraju, H. Kingravi, A. Axelrod, G. Chowdhary, R. Grande,
J. P. How, C. Crick, and W. Sheng, “Human aware UAS path planning
in urban environments using nonstationary MDPs,” in Robotics and
Automation (ICRA), 2014 IEEE International Conference on. IEEE,
2014, pp. 1161–1167.
[13] E. Hadoux, A. Beynier, and P. Weng, “Sequential decision-making under non-stationary environments via sequential change-point detection,”
in Learning over Multiple Contexts (LMCE), 2014.
[14] A. Wald, Sequential analysis. Courier Corporation, 1973.
[15] A. N. Shiryaev, “On optimum methods in quickest detection problems,”
Theory of Probability & Its Applications, vol. 8, no. 1, pp. 22–46,
1963.
[16] A. G. Tartakovsky and V. V. Veeravalli, “General asymptotic Bayesian
theory of quickest change detection,” Theory of Probability & Its
Applications, vol. 49, no. 3, pp. 458–497, 2005.
[17] T. L. Lai, “Information bounds and quick detection of parameter
changes in stochastic systems,” Information Theory, IEEE Transactions
on, vol. 44, no. 7, pp. 2917–2929, 1998.
[18] H. Chernoff, “Sequential design of experiments,” The Annals of
Mathematical Statistics, vol. 30, no. 3, pp. 755–770, 1959.
[19] J. Gittins, K. Glazebrook, and R. Weber, Multi-armed bandit allocation
indices. John Wiley & Sons, 2011.
[20] A. G. Tartakovsky, “Multidecision quickest change-point detection:
Previous achievements and open problems,” Sequential Analysis, vol. 27,
no. 2, pp. 201–231, 2008.
[21] R. Singh and T. Banerjee, “Kiefer wolfowitz algorithm is asymptotically
optimal for a class of non-stationary bandit problems,” arXiv preprint
arXiv:1702.08000, 2017.
| 10math.ST
|
Score estimation in the monotone single index model
arXiv:1712.05593v1 [math.ST] 15 Dec 2017
Fadoua Balabdaoui
Université Paris-Dauphine, PSL Research University,
CNRS, CEREMADE, 75016 Paris, France
and
Seminar für Statistik, ETH Zürich,
8092, Zürich, Schweiz
e-mail: [email protected]
Piet Groeneboom
Delft University of Technology, Mekelweg 4, 2628 CD Delft, The Netherlands.
e-mail: [email protected]
Kim Hendrickx
Hasselt University, I-BioStat, Agoralaan, B3590 Diepenbeek, Belgium.
e-mail: [email protected]
Abstract: We consider estimation of the regression parameter in the single index model where the
link function ψ is monotone. For this model it has been proposed to estimate the link function nonparametrically by the monotone least square estimate ψ̂nα for a fixed regression
P parameter α and to
estimate the regression parameter by minimizing the sum of squared deviations i {Yi −ψ̂nα (αT Xi )}2
over α, where Yi are the observations and Xi the corresponding covariates. Although
√ it is natural to
propose this least squares procedure, it is still unknown whether it will produce n-consistent estimates of α. We show that the latter property will hold if we solve a score equation corresponding to
this minimization problem. We also compare our method√with other methods such as Han’s maximum
rank correlation estimate, which has been proved to be n-consistent.
AMS 2000 subject classifications: 62G05, 62G20, 62H12.
Keywords and phrases: monotone link functions, nonparametric least squares estimates, semiparametric model, single index regression model.
1. Introduction
Single index models are flexible models used in regression analysis of the type E(Y |X) = ψ0 (αT0 X), where
ψ0 is an unknown link function and α0 is an unknown regression parameter. By lowering the dimensionality
of the classical linear regression problem, determined by the number of covariates, to a univariate αT0 X
index, single index models do not suffer from the “curse of dimensionality”. They also provide an advantage
over the generalized linear regression models by overcoming the risk of misspecifying the link function ψ0 . To
ensure identifiability of the single index model, one typically assumes that the Euclidean norm kα0 k equals
one with the first non-zero element of α0 being positive.
Several estimation approaches have been considered in the literature of single index models. These methods
can be classified into two groups: M-estimators and direct estimators. In the first approach, one considers a
non-parametric regression estimate for the infinite dimensional link function ψ0 and then estimates α0 by
minimizing a certain criterion function, where ψ0 is replaced by its estimate. Examples of this type are the
semi-parametric least squares estimators of [16] and [13] and the pseudo-maximum likelihood estimator of
[8], all using kernel regression estimates for the unknown link functions. An example of an M-estimator that
does not depend on an estimate of the link function ψ0 is Han’s maximum rank correlation estimator [12].
Direct estimators, such as the average derivative estimator of [14] or the slicing regression method proposed in [9], avoid solving an optimization problem and are often computationally more attractive than
M-estimators.
In this paper we focus on estimating the regression parameter α0 under the constraint that ψ0 is monotone.
Shape constrained inference arises naturally in a variety of fields. For example in economics where a concavity
restriction is assumed in utility theory to indicate the exhibition of risk conversion in economic behavior.
Convex optimization problems also appear frequently and often allow for straightforward computation and
1
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
2
optimization. The single index model with convex link has been studied in [18] where the
√ authors consider
estimation of a penalized least squares estimator using smoothing splines and prove n-consistency and
asymptotic normality of their proposed estimator.
A special case of the monotone singe index model is the widely used econometric binary choice model
where interest is in estimating a choice probability based on a binary response variable Y and one or more
covariates X. Whether or not the outcome is zero or one depends on an underlying utility score, i.e. Y = 1
if αT0 X ≥ ε, where ε is an unobserved disturbance term with unknown distribution function F0 . The binary
choice model therefore belongs to the class of monotone single index models since E(Y |X) = F0 (αT0 X).
Estimation of the regression parameters in the binary choice model is among others considered in [6], [7] and
[17].
[1] considered a global least squares estimator for the pair (α0 , ψ0 ) in the general single index model
under monotonicity of the function ψ0 . They derived an n−1/3 convergence rate, but the asymptotic limiting
distribution for their estimator of α0 has not been derived. A conjecture is made in [20] that this rate is too
slow. In this paper, we will give simulation results on the asymptotic variance of the least squares estimator
and investigate its rate of convergence numerically.
Recently, [10] developed several score estimators for the current status linear regression model Y =
β0T Z + ε, where the distribution function F0 of ε is left unspecified. Instead of observing the response
Y a censoring variable T and censoring indicator ∆ = 1Y ≤T are observed. This model is a special case
of the monotone single index model and can be formulated as E(∆|T, Z) = F0 (T − β0T Z) = F0 (αT0 X)
where α0 = (1, −β0 )T and X = (T, Z)T . Their estimators are obtained by the root of a score function
involving
√ the maximum likelihood estimator (MLE) of the distribution function for fixed β. The authors
prove n-consistency and asymptotic normality of their estimators and show that under certain smoothness
assumptions the limiting variance of a score estimator is arbitrarily close to the efficient
√ variance. Their result
is remarkable since it is the first time in the current status regression model that a n-consistent estimate
for β0 is proposed based on the MLE for F0 which only converges at n−1/3 -rate to the true distribution
function F0 .
We consider extending the estimators of [10] to the more general single index regression problem and
propose two different score equations involving the least squares estimator (LSE) ψ̂nα minimizing
n
o2
1 Xn
Yi − ψ(αT Xi ) ,
n i=1
(1.1)
over all monotone increasing functions ψ for fixed α. We establish an n−1/3 log n-rate for the estimator ψ̂nα
and propose a single index score estimator of α0 that converges at the parametric rate n−1/2 to the true
regression parameter α0 .
2. The single-index model with monotone link
Consider the following regression model
Y = ψ0 (αT0 X) + ε,
(2.1)
where Y is a one-dimensional random variable, X = (X1 , . . . , Xd )T is a d-dimensional random vector with
distribution G and ε is a one-dimensional random variable such that E[ε|X] = 0 G-almost surely. The function
ψ0 is a monotone link function in M, where M is the set of monotone increasing functions defined on R and
α0 is a vector of regression parameters belonging to the d−1 dimensional sphere Sd−1 := {α ∈ Rd : kαk = 1},
where k · k denotes the Euclidean norm in Rd .
3. The least squares estimator (LSE) for the link function ψ
Let (X1 , Y1 ), . . . , (Xn , Yn ) denote n random variables which are i.i.d. like (X, Y ) in (2.1), i.e. E(Y |X) =
ψ0 (αT0 X) G-almost surely and consider the sum of squared errors
n
Sn (ψ, α) =
o2
1 Xn
Yi − ψ(αT Xi ) ,
n i=1
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
3
which can be computed for any pair (ψ, α) ∈ M × Sd−1 . For a fixed α, order the values αT X1 , . . . , αT Xn
in increasing order and arrange Y1 , . . . , Yn accordingly. Then, well-known results from monotone regression
theory imply that the functional ψ 7→ Sn (ψ, α) is minimized by the left derivative of the greatest convex
minorant of the cumulative sum diagram
i
n
X
o
(0, 0), i,
Yiα , i = 1, . . . , n ,
j=1
where Yiα corresponds to the ith order statistic of the αT Xi . See for example Theorem 1.1 in [4].
By strict convexity of ψ 7→ Sn (ψ, α), the minimizer is unique at the distinct projections. We denote by
ψ̂nα the monotone function which takes the values of this minimizer at the distinct projections and is a
stepwise and right-continuous function outside the set of those projections.
We first list below the assumptions needed to prove the asymptotic results stated in the remainder of the
paper.
Assumptions A1-A6
A1. The space X is convex, with a nonempty interior. There exists also R > 0 such that X ⊂ B(0, R).
A2. There exists K0 > 0 such that the true link function ψ0 satisfies |ψ0 (u)| ≤ K0 for all u in {αT x, x ∈
X , α ∈ Sd−1 }.
A3. There exists δ0 > 0 such that the function u 7→ E ψ0 (αT0 X)|αT X = u is monotone increasing on
Iα := {αT x, x ∈ X } for all α ∈ B(α0 , δ0 ) := {α : kα − α0 k ≤ δ0 }.
A4. Let a0 and b0 denote the infimum and supremum of the interval Iα0 = αT0 x, x ∈ X . Then, the true
link function ψ0 is continuously differentiable on (a0 − δ0 R, b0 + δ0 R), where R is the same radius of
assumption A1 above, and there exists C > 0 such that ψ00 ≥ C on (a0 − δ0 R, b0 + δ0 R).
A5. The distribution of X admits a density g, which is differentiable on X . Also, there exist positive
constants c0 , c̄0 , c1 and c̄1 such thath c0 ≤ g ≤ c̄0 and
i c1 ≤ ∂g/∂xi ≤ c̄1 on X for all i = 1, . . . , d.
A6. There exist a0 , M0 > 0 such that E |Y |m |X = x ≤ m!M0m−2 a0 for all integers m ≥ 2 and x ∈ X
G-almost surely.
Assumption A1 ensures that the support of the linear predictor αT X is an interval for all α ∈ B(α0 , δ0 ).
Assumption A3 is made to enable deriving the explicit limit of the LSE ψ̂nα for all α ∈ B(α0 , δ0 ). We
will show, in the supplemental material, the plausibility of this Assumption
A3 by proving
that for α in
a neighborhood of α0 the derivative of the function u 7→ ψα := E ψ0 (αT0 X)|αT X = u is indeed strictly
positive if the derivative of the true link function stays away from zero. Assumption A6 is needed to show
that max1≤i≤n |Yi | = Op (log n). As noted in [1], such an assumption is satisfied if the conditional distribution
of Y |X = x belongs to an exponential family.
In Figure 1 we compare the true link function ψ0 with the function ψα for the model E(Y |X) =
√
√
i.i.d
ψ0 (α01 X1 + α02 X1 ), where X1 , X2 ∼ U [0, 1], ψ0 (x) = x3 and α01 = α02 = 1/ 2 for α1 = 1/2, α2 = 3/2.
Figure 1 illustrates the monotonicity of the function ψα introduced in Assumption A3.
We have the following results.
Proposition 3.1. Suppose that Assumptions A1-A2 hold and let the function ψα be defined by
ψα (u) = E ψ0 (αT X)|αT X = u .
(3.1)
Then, the functional Lα given by,
ψ 7→ Lα (ψ) :=
Z
2
ψ0 (αT0 x) − ψ(αT x) g(x)dx,
(3.2)
X
admits a minimizer ψ̂ α , over the set of monotone increasing
on R, denoted by M, such
n functions defined
o
that ψ̂ α is uniquely given by the function in (3.1) on Iα = αT x : x ∈ X .
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
4
√
Fig 1: The real ψ0 (red, solid) and the function ψα (blue, dashed) for ψ0 (x) = x3 , α01 = α02 = 1/ 2 and
√
i.i.d
α1 = 1/2, α2 = 3/2, with X1 , X2 ∼ U [0, 1].
Proposition 3.2. Under Assumptions A1-A6, we have,
Z n
o2
sup
ψ̂nα (αT x) − ψα (αT x) dG(x) = Op (log n)2 n−2/3 .
α∈B(α0 ,δ0 )
The proofs of Proposition 3.1 and Proposition 3.2 are given in the Appendix.
4. The score estimator on the unit sphere
Consider the problem of minimizing
n
o2
1 Xn
Yi − ψ̂nα (αT Xi ) ,
n i=1
(4.1)
over all α ∈ Sd−1 , where ψ̂nα is the LSE of ψα .
Let S be a local parametrization mapping Rd−1 to the sphere Sd−1 , i.e., for each α ∈ B(α0 , δ0 ) on the
sphere Sd−1 , there exists a unique vector β ∈ Rd−1 such that
α = S (β) .
The minimization problem given in (4.1) is equivalent to minimizing
n
o2
1 Xn
Yi − ψ̂nα S(β)T Xi
,
n i=1
(4.2)
over all β where ψ̂nα is the LSE of ψα with α = S(β). Analogously to the treatment of the score approach
in the current status regression model proposed by [10], we consider the derivative of (4.2) w.r.t. β, where
we ignore the non-differentiability of the LSE ψ̂nα . This leads to the set of equations,
n
n
o
1X
T
(JS (β)) Xi Yi − ψ̂nα S(β)T Xi = 0,
n i=1
(4.3)
where JS is the Jacobian of the map S and where 0 ∈ Rd−1 is the vector of zeros. Just as in the analogous
case of the “simple score equation” in [10], we cannot hope to solve equation (4.3) exactly. Instead, we define
the solution in terms of a “zero-crossing” of the above equation. The following definition is taken from [10].
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
5
Definition 4.1 (zero-crossing). We say that β∗ is a crossing of zero of a real-valued function ζ : A 7→ R :
β 7→ ζ(β) if each open neighborhood of β∗ contains points β1 , β2 ∈ A such that ζ̄(β1 )ζ̄(β2 ) ≤ 0, where ζ̄ is
the closure of the image of the function (so contains its limit points). We say that an m-dimensional function
ζ : A 7→ Rm : β 7→ ζ(β) = (ζ1 (β), . . . ζm (β))0 has a crossing of zero at a point β∗ , if β∗ is a crossing of zero
of each component ζj : A 7→ R, j = 1 . . . , m.
Our index score estimator α̂n is defined by,
α̂n := S(β̂n ),
(4.4)
where β̂n is a zero crossing of the function
Z
n
o
T
φn (β) := (JS (β)) x y − ψ̂nα S(β)T x dPn (x, y),
(4.5)
and Pn denotes the empirical probability measure of (X1 , Y1 ), . . . , (Xn , Yn ). The probability measure of
(X, Y ) will be denoted by P0 in the remainder of the paper.
In addition to Assumptions A1-A6 above, the following assumptions will also be made.
Assumptions A7-A9
A7. For all β 6= β0 such that S (β) ∈ B(α0 , δ0 ), the random variable
h
i
Cov (β0 − β)T JS (β)T X, ψ0 S(β0 ) | S(β)T X ,
is not equal to 0 almost surely.
A8. The functions JSij (β), where JSij (β) denotes the i × j entry of JS (β) for i = 1, . . . , d and j = 1, . . . , d − 1
are d − 1 times continuously differentiable on C := {β ∈ Rd−1 : S (β) ∈ B(α0 , δ0 )} and there exists
M > 0 satisfying
max sup |Dk JSij (β)| ≤ M
(4.6)
k.≤d−1 β∈C
where k = (k1 , . . . , kd ) with kj an integer ∈ {0, . . . , d − 1}, k. =
Dk s(β) ≡
Pd−1
i=1
ki and
∂ k. s(β)
.
∂βk1 . . . ∂βkd
We also assume
that C is a convex andi bounded set in Rd−1 with a nonempty interior.
h
T
A9. (JS (β0 )) E ψ00 (αT0 X) Cov(X|αT0 X) (JS (β0 )) is non-singular.
Theorem 4.1. Let Assumptions A1-A9 be satisfied. Let also α̂n be defined by (4.4). Then:
(i) [Existence of a root] For all large n, a crossing of zero β̂n of φn (β) exists with probability tending to
one.
(ii) [Consistency]
p
α̂n → α0 ,
n → ∞.
(iii) [Asymptotic normality] Define the matrices,
h
i
def
A = E ψ00 (αT0 X) Cov(X|αT0 X) ,
(4.7)
and
def
Σ = E
h
Y − ψ0 (αT0 X)
2
X − E(X|αT0 X) X − E(X|αT0 X)
T
i
.
(4.8)
Then
√
n(α̂n − α0 ) →d Nd 0, A− ΣA− ,
where A− is the Moore-Penrose inverse of A.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
6
Remark 4.1. Note that αT0 A = 0 and that the normal distribution Nd (0, A− ΣA− ) is concentrated on the
(d−1)-dimensional subspace, orthogonal to α0 and is therefore degenerate, as is also clear from its covariance
matrix A− ΣA− , which is a matrix of rank d − 1.
4.1. The asymptotic relation
To obtain the asymptotic normality result of the score estimator α̂n given in Theorem 4.1, we shall prove
the following asymptotic relationship for β̂n :
Z
T
B β̂n − β0 = (JS (β0 )) x − E(X|S(β0 )T X = S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)
+ op n−1/2 + kβ̂n − β0 k .
where
h
i
T
T
B = (JS (β0 )) E ψ00 (S(β0 )T X) Cov(X|S(β0 )T X) (JS (β0 )) = (JS (β0 )) A JS (β0 ),
(4.9)
in R(d−1)×(d−1) . We assume in Assumption A9 that B is invertible so that
√
n β̂n − β0
Z
√
T
= nB −1 (JS (β0 )) x − E(X|S(β0 )T X = S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)
√
+ op 1 + nkβ̂n − β0 k
→d N (0, Π),
where
T
Π = B −1 (JS (β0 )) Σ JS (β0 ) B −1 ∈ R(d−1)×(d−1) .
(4.10)
The limit distribution of the single index score estimator α̂n defined in (4.4) now follows by an application
of the delta-method and we conclude that
√
√
√
√
n(α̂n − α0 ) = n S β̂n − S (β0 ) = JS (β0 ) n(β̂n − β0 ) + op
n(β̂n − β0 )
T
→d Nd 0, JS (β0 )Π (JS (β0 ))
= Nd 0, A− ΣA− ,
where the last equality follows from the following lemma.
Lemma 4.1. Let the matrix A be defined by (4.7) and let A− be the Moore-Penrose inverse of A. Then
n
o−1
T
T
T
A− = JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) = JS (β0 )B −1 (JS (β0 )) .
The proof of Lemma 4.1 is given in Supplement C of [2]. An example of the mapping S and corresponding
matrix JS is given in Section 6.
Remark 4.2. For each map S and each parameter vector β, we have
T
(S(β)) S(β) = 1.
Taking derivatives w.r.t. β, we get
T
(S(β)) JS (β) = 0T ,
so that the columns of JS (β) belong to the space
n
o
⊥
T
{α}⊥ ≡ {S(β)} ≡ z ∈ Rd : αT z = 0 ≡ z ∈ Rd : (S(β)) z = 0 .
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
7
By Lemma 4.1 it is now easy to see that also αT0 A− = 0. It is shown in Lemma 1 of [18] that it is possible
to construct a set of “local parametrization matrices” Hα for each α ∈ B(α0 , δ0 ) with kαk = 1 satisfying
α T Hα = 0 T
T
and
(Hα ) Hα = Id−1 .
T
Their matrix (Hα ) corresponds to the Moore-Penrose pseudo-inverse of the matrix Hα and is the analogue
T
of our matrix (JS (β)) in the proof of asymptotic normality of their estimator. We however show that the
orthonormality assumption is not needed in the proofs.
5. The efficient score estimator
In this section we extend the score approach of Section 4 by incorporating an estimate of the derivative of
the link function ψ0 to obtain an efficient estimator of α0 . Let ψ̂nα denote again the LSE of ψα defined in
0
Section 3 and define the estimate ψ̃nh,α
by
0
ψ̃nh,α
(u)
1
=
h
Z
K
u−x
h
dψ̂nα (x),
where h is a chosen bandwidth. Here dψ̂nα represents the jumps of the discrete function ψ̂nα and K is one
of the usual symmetric twice differentiable kernels with compact support [−1, 1], used in density estimation.
The estimator α̃n is given by
α̃n := S(β̃n ),
(5.1)
where β̃n is a zero crossing of ξnh (see Definition 4.1) defined by
Z
n
o
T
0
ξnh (β) := (JS (β)) x ψ̃nh,α
S(β)T x y − ψ̂nα S(β)T x dPn (x, y).
(5.2)
The function ξnh is inspired by representing the sum of squares
n
1 X
Yi − ψα (αT Xi )
n i=1
2
,
in a local coordinate system with d − 1 unknown parameters β = (β1 , . . . , βd−1 )T followed by differentiation
of the re-parametrized sum of squares w.r.t. β where we also consider differentiation of the function ψα .
We make the following additional assumptions for establishing the weak convergence of β̃n
Assumptions A10-A11
A10. The function
differentiable on Iα for all α.
h ψα is two times continuously
i
T
0
T
2
T
A11. (JS (β)) E ψ0 (α0 X) Cov(X|α0 X) JS (β) is non-singular.
Theorem 5.1. Let Assumptions A1-A8, A10-A11 be satisfied. Let α̃n be defined by (5.1) and suppose
h n−1/7 . Then:
(i) [Existence of a root] For all large n, a crossing of zero β̃n of ξnh (β) exists with probability tending to
one.
(ii) [Consistency]
p
α̃n → α0 ,
n → ∞.
(iii) [Asymptotic normality] Define the matrices,
h
i
def
à = E ψ00 (αT0 X)2 Cov(X|αT0 X) ,
(5.3)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
8
and
def
Σ̃ = E
h
Y − ψ0 (αT0 X)
2
ψ00 (αT0 X)2 X − E(X|αT0 X) X − E(X|αT0 X)
T
i
.
(5.4)
Then
√
n(α̃n − α0 ) →d Nd 0, Ã− Σ̃Ã− ,
where Ã− is the Moore-Penrose inverse of Ã.
Remark 5.1. The asymptotic variance of the estimator α̃n is similar to that obtained for the “efficient”
estimates proposed in [24] and in [18]. The efficient score function for the semi-parametric single index model
is
)
(
y − ψ αT0 x 0 T
E σ −2 (X)X|αT0 X = αT0 x
˜
.
`α0 ,ψ0 (x, y) =
ψ α0 x x −
σ 2 (x)
E σ −2 (X)|αT0 X = αT0 x
More details on the efficiency calculations can be found in e.g. [22], chapter 25 for a general description of
the efficient score functions and in [8] or [18] for the efficient score in the single index model.
In a homoscedastic model with var(Y |X = x) = σ 2 , where σ 2 is independent of covariates x, the asymptotic variance equals σ 2 Ã− which is the same as the inverse of E(`˜α0 ,ψ0 (X, Y )`˜α0 ,ψ0 (X, Y )T ). This indeed
shows that our estimate defined in (5.1) is efficient in the homoscedastic model. As also explained in Remark 2 of [18], our estimator has also a high relative efficiency with respect to the optimal semi parametric
efficiency bound if the constant variance assumption provides a good approximation to the truth.
The asymptotic variance is obtained similarly to the derivations of the asymptotic limiting distribution
for the simple score estimator as shown in Section 4.1. First the asymptotic variance is expressed in terms of
the parametrization S as in (4.10) and next, similar to Lemma 4.1, equivalence to the expression Ã− Σ̃Ã−
given in Theorem 5.1 is proved.
6. Computation
In this section we describe how the score estimator α̂n defined in (4.4) can be obtained using a local coordinate
system representing the unit sphere in combination with a pattern search numerical optimization algorithm.
An example of such a parameterization is the spherical coordinate system S : [0, π](d−2) × [0, 2π] 7→ Sd−1 :
(β1 , β2 , . . . , βd−1 ) 7→(cos(β1 ), sin(β1 ) cos(β2 ), sin(β1 ) sin(β2 ) cos(β3 ), . . . ,
sin(β1 ) . . . sin(βd−2 ) cos(βd−1 ), sin(β1 ) . . . sin(βd−2 ) sin(βd−1 ))T .
The map parameterizing the positive half of the sphere S : {(β1 , β2 , . . . , βd−1 ) ∈ [0, 1](d−1) : kβk ≤ 1} 7→
Sd−1 :
q
T
2
(β1 , β2 , . . . , βd−1 ) 7→ β1 , β2 , . . . , βd−1 , 1 − β12 − . . . − βd−1
,
is another example that can be used provided αd is positive. Prior knowledge about the position of α0
can be derived from an initial estimate such as the LSE proposed in [1]. We illustrate the set of equations
corresponding to (4.3) for dimension d = 3 using the simulation model studied in Section 8. We consider the
model
√
i.i.d
X1 , X2 , X3 ∼ U [1, 2], ε ∼ N (0, 1),
Y = ψ0 (αT0 X) + ε, , ψ0 (x) = x3 , α01 = α02 = α03 = 1/ 3,
where ε is independent of the covariate vector X = (X1 , X2 , X3 )T . For this model, we have
2 −1 −1
2 −1 −1
2
17
1
A=
−1 2 −1 , Σ =
−1 2 −1 and à = Σ̃ = 11.898545 −1
15
36
−1 −1 2
−1 −1 2
−1
−1
2
−1
−1
−1 ,
2
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
9
where the matrices A, Σ, Ã and Σ̃ are defined in (4.7), (4.8), (5.3) and (5.4) respectively. Note that the rank
of the matrices is equal to d − 1 = 2. We consider the parametrization
S3 = {(α1 , α2 , α3 ) = (cos(β1 ) sin(β2 ), sin(β1 ) sin(β2 ), cos(β2 )) : 0 ≤ β1 ≤ 2π, 0 ≤ β2 ≤ π} ⊂ R2 ,
(6.1)
and we solve the problem
n
o
s1 (β1 , β2 ) = 1 Pn (− sin(β1 ) sin(β2 )Xi1 + cos(β1 ) sin(β2 )Xi2 ) Yi − ψ̂nα (αT Xi ) = 0,
i=1
n
n
o
s2 (β1 , β2 ) = 1 Pn (cos(β1 ) cos(β2 )Xi1 + sin(β1 ) cos(β2 )Xi2 − sin(β2 )Xi3 ) Yi − ψ̂nα (αT Xi ) = 0.
i=1
n
(6.2)
Note that
√
√
√ T
T
S(β0 ) = (cos(β01 ) sin(β02 ), sin(β01 ) sin(β02 ), cos(β02 )) = 1/ 3, 1/ 3, 1/ 3 ,
and
where β01
− √1
− sin(β01 ) sin(β02 ) cos(β01 ) cos(β02 )
3
√1
JS (β0 ) = cos(β01 ) sin(β02 ) sin(β01 ) cos(β02 ) =
3
0
− sin(β02 )
0
√
= π/4 and β02 = arctan( 2). We also have,
S(β)T JS (β) = (0, 0) ,
√1
6
√1
q6
−
2
3
,
(6.3)
for all β. This implies that the columns of JS (β) are perpendicular to the vector α = S(β). Note moreover
that the columns are linearly independent and hence form a basis for {α}⊥ . The asymptotic variance of α̂n
resp. α̃n defined in Theorem 4.1 resp. Theorem 5.1 is equal to,
2 −1 −1
2 −1 −1
25
A− ΣA− =
resp. Ã− Σ̃Ã− = Ã− = 0.009338 −1 2 −1 .
(6.4)
−1 2 −1
2601
−1 −1 2
−1 −1 2
By the discontinuous nature of the functions s1 and s2 in (6.2), it is not possible to solve equations (6.2)
exactly, we search the crossing of zero (see Definition 4.1), by minimizing the sum of squares s21 (β) + s22 (β)
over all possible values of β = (β1 , β2 )T . Note that the crossing of zero of the score function is equivalent to
the minimizer of the sum of squared component scores so that the minimization procedure is justified.
We use a derivative free optimization algorithm proposed by [15]. The method is a pattern-search optimization method that does not require the objective function to be continuous. The algorithm starts from
an initial estimate of the minimum and looks for a better nearby point using a set of 2d equal step sizes
along the coordinate axes in each direction, first making a step in the direction of the previous move. For
the object function we take the sum of the squared values of the component functions, which achieve a
minimum at a crossing of zero. If in no direction an improvement is found, the step size is halved, and a new
search for improvement is done, with the reduced step sizes. This is repeated until the step size has reached
a prespecified minimum. A very clear exposition of the method is given in [21], section 4.3. In this paper also
convergence proofs for the optimization algorithm are presented.
7. Lagrange approach
Instead of tackling the fact that our parameter space is essentially of dimension d − 1 by the parametrization
α = S(β) which locally maps Rd−1 into the sphere Sd−1 , one can introduce the restriction kαk = 1 via a
Lagrangian term. We then consider the problem of minimizing
n
o2
1 Xn
Yi − ψ̂nα (αT Xi ) + λ kαk2 − 1 ,
n i=1
(7.1)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
10
where ψ̂nα is the LSE defined in Section 3 and λ is a Lagrange parameter which we add to the sum of
squared errors to deal with the identifiability of the single-index model. We consider a Lagrange penalty for
solving the optimization problem under the constraint that kαk = 1.
Analogously to the treatment given in Section 4, we consider the derivative of (7.1) w.r.t. α, where we
ignore the non-differentiability of the LSE ψ̂nα . This leads to the set of equations,
n
n
o
1X
Xij ψ̂nα (αT Xi ) − Yi + λαj = 0,
n i=1
j = 1, . . . , d.
(7.2)
Here λ has to satisfy
λ=λ
d
X
j=1
n
αj2 = −
n
o
1X T
α Xi Yi − ψ̂nα (αT Xi ) .
n i=1
(7.3)
Plugging in the above expression for λ in (7.2), we would consider the score equation
!
n
n
n
o
n
o
1X
1X
T
T
T
0=
Xi Yi − ψ̂nα (α Xi ) − α
Xi Yi − ψ̂nα (α Xi )
α
n i=1
n i=1
Z n
o
= I − ααT
x y − ψ̂nα αT x dPn (x, y),
(7.4)
where I is the d × d identity matrix.
A computer program was implemented to solve (7.4). It has the advantage that we do not have to deal
with the parametrization α = S(β), but has the disadvantage that we cannot assume that α̂n has exactly
norm 1 because we again have to deal with crossings of zero instead of exact equality to zero. One way
to circumvent this problem is to normalize the solution after each iteration by dividing by its norm. This
approach seems to provide reasonable solutions, although it is not entirely satisfactory from a theoretical
point of view. Also note that if the right-hand side of (7.3) equals zero, so λ = 0, the equation does not force
the norm of α to be one; it only does so if λ 6= 0. Indeed, in our computer experiments, λ was never zero, so
this problem did actually not occur, but λ will tend to zero with increasing sample sizes, so some numerical
instability is to be expected.
For reasons of space we do not further describe all details of this approach, but instead restrict ourselves
to showing a picture of the simple score estimate of ψ0 for n = 1000 and d = 10 for the simulation where
all the Xi variables
and √
the random error variable ε are standard normal and independent, ψ0 (x) = x3
√
and α0 = (1/ 10, . . . , 1/ 10)T . It is clear that the estimate of ψ0 will be rather accurate because of the
information provided by the 10 covariates Xi (instead of, say, just two covariates X1 , X2 ).
8. Simulations
In this section we illustrate the finite sample behavior of the single index score estimators proposed in Section
4 and Section 5. We consider the model
3
Y = ψ0 (αT0 X) + ε = αT0 X + ε,
(8.1)
√
where α0i = 1/ d, i = 1, . . . , d and ε ∼ N (0, 1), independent of X. We consider two different dimensions
i.i.d
i.i.d
d = 2 and d = 3 and two different distributions for the covariate vector X, Xi ∼ U [1, 2] and Xi ∼ N (0, 1)
for i = 1, . . . , d. This yields four different simulation set-ups.
For the two dimensional models, we consider the parametrization S(β0 ) = (cos(β0 ), sin(β0 ))T and we use
the parametrization given in (6.1) for the three dimensional models. In each simulation setting, we estimate
α0 by the simple score estimator (SSE) and the efficient score estimator (ESE) and compare the behavior of
our proposed estimates with the least squares estimate (LSE) minimizing (1.1) over all possible (ψ, α) and the
maximum rank correlation estimate (MRCE) proposed in [12]. For sample sizes n = 100, 500, 1000, 2000, 5000
and n = 10000 we generate N = 5000 datasets from Model (8.1) and show, in Tables 1-4, the mean and n
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
11
40
20
0
−20
−3
−2
−1
0
1
2
3
√
Fig 2: The real ψ0 (red, solid) and the function ψ̂nα̂n (black, step function) for ψ0 (x) = x3 , α0i = 1/ 10
i.i.d
and Xi ∼ N (0, 1), i = 1 . . . 10.
times the covariance of the estimates. Tables 1-4 also show the asymptotic values to which the results should
converge based on Theorem 4.1 and Theorem 5.1. The limiting distribution of the LSE is still unknown
and therefore no asymptotic results are provided for the LSE. For the MRCE, [19] has an expression for
the asymptotic covariance matrix in an (implicit) (d − 1)-dimensional representation in his Theorem 4 on
p. 133. If, in accordance with the methods of our paper, we turn this into an expression in terms of our
d-dimensional representation, we obtain as the asymptotic covariance matrix of the MRCE V − ΣV − where
h
i
T
Σ = E X − E(X|αT0 X) X − E(X|αT0 X) S(Y, αT0 X)2 g0 (αT0 X)2 ,
and V − is the Moore-Penrose inverse of
h
V = E X − E(X|αT0 X) X − E(X|αT0 X)
T
i
S2 (Y, αT0 X)g0 (αT0 X)2 ,
and g0 is the density of αT0 X and S and S2 are defined by
S(y, u) = E 1{y>Y } − 1{y<Y } αT0 X = u ,
S2 (y, u) =
∂
S(y, u).
∂u
It is clear from our simulations that the factor 2 in front of V in (20) of [19] cannot be correct and indeed [5]
have a note on p. 361 of their paper, attributed to Myoung-Jae Lee that this factor 2 should not be there.
For all simulation studies, the results shown in Tables 1-4 show convergence of n times the variancecovariance matrices towards its asymptotic values.
The performance of the ESE is slightly better than the performance of the SSE; the difference between
the asymptotic limiting variances is smaller in the model with uniform[1, 2] covariates Xi than the difference
in the model with standard normal covariates Xi . Tables 1-4 also illustrate that n times the variances of the
estimates decrease if the dimension d of the model increases in the model with Xi ∼ U [1, 2] but increases in
the model with Xi ∼ N (0, 1).
Although the model with standard normal covariates violates Assumptions A1, A2 and A4 given in Section
3, our proposed estimates perform reasonably well.
The performance of the MRCE is worse than the performances of our proposed score estimates in all
simulation settings. In the model with standard normal covariates, the variances of the MRCE are remarkable
larger than the variances of the score estimates and the LSE. Also, the asymptotic variances of the MRCE
in these models are considerably larger than the variances of the score estimators. This might be caused by
the fact that only the indicators 1{y>Yi } and 1{y>Yi } are used in the definition of the MRCE and not the
actual values of the Yi ’s.
The behavior of the LSE is rather remarkable. Tables 1 and 2 suggest an increase of n times the covariance
matrix, whereas Tables 3 and 4 suggest a decrease.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
12
The results presented in Tables 3 and 4 show that the performance of the LSE is better than the performance of the SSE for small sample sizes when Xi ∼ N (0, 1). For the model with uniform covariates,
summarized in Tables 1 and 2 our proposed score estimates outperform the LSE. The variances for the LSE
presented in Tables 1-4 suggest that the rate of convergence for the LSE is faster than the cube-root n1/3 -rate
proved in [1]. The asymptotic distribution of the LSE falls beyond the scope of this paper and needs to be
addressed in further research.
Table 1
Simulation model (Xi ∼ U [1, 2], d = 2): The mean value (µ̂i = mean(α̂in ), i = 1, 2) and n times the variance-covariance
(σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares
estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and
Xi ∼ U [1, 2]. The line, preceded by ∞, gives the asymptotic values.
Method
SSE
n
100
500
1000
2000
5000
10000
∞
µ̂1
0.707249
0.707224
0.707175
0.707173
0.707134
0.707109
0.707107
µ̂2
0.706389
0.706890
0.706992
0.707016
0.707070
0.707100
0.707107
σ̂11
0.040773
0.035018
0.033262
0.034017
0.034011
0.033344
0.032439
σ̂22
0.040866
0.035057
0.033273
0.034012
0.034012
0.033350
0.032439
σ̂12
-0.040787
-0.035033
-0.033265
-0.034014
-0.034011
-0.033347
-0.032439
ESE
100
500
1000
2000
5000
10000
∞
0.707293
0.707230
0.707185
0.707175
0.707130
0.707111
0.707107
0.706359
0.706888
0.706983
0.707015
0.707074
0.707098
0.707107
0.039631
0.033888
0.032302
0.032992
0.032925
0.032278
0.031516
0.039758
0.033922
0.032316
0.032989
0.032924
0.032283
0.031516
-0.039663
-0.033900
-0.032307
-0.032990
-0.032924
-0.032280
-0.031516
LSE
100
500
1000
2000
5000
10000
∞
0.706848
0.707060
0.707138
0.707122
0.707118
0.707128
0.707107
0.706624
0.707002
0.707000
0.707053
0.707079
0.707077
0.707107
0.052397
0.053547
0.053513
0.055502
0.059731
0.061843
?
0.052415
0.053570
0.053573
0.055519
0.059756
0.061868
?
-0.052321
-0.053542
-0.053535
-0.055506
-0.059741
-0.061854
?
MRCE
100
500
1000
2000
5000
10000
∞
0.707301
0.707178
0.707107
0.707145
0.707154
0.707125
0.707107
0.706188
0.706910
0.707047
0.707039
0.707048
0.707083
0.707107
0.051226
0.044397
0.041886
0.041231
0.040968
0.040129
0.035535
0.051272
0.044428
0.041904
0.041248
0.040976
0.040141
0.035535
-0.051182
-0.044402
-0.041891
-0.041237
-0.040971
-0.040135
-0.035535
9. Discussion
In this paper we propose a method for estimating the regression parameter in the monotone single index
model. Our estimators are defined as zero-crossings of an unsmooth score function which contains the LSE of
the monotone link function. The estimation approach extends the√results of [10] for the current status linear
regression model and as far as we know, it is the first time that n−consistent estimates of the regression
parameter are constructed based on the piecewise-constant LSE for the link function. Good performances,
both asymptotically and numerically, of our estimation approach are illustrated by the asymptotic normality
of our score estimators and by simulation studies that show comparable or even better behavior of our
score estimates compared to the maximum rank correlation estimate proposed by [12] and the least squares
estimate discussed in [1].
A limitation of our approach might be that we use a local parametrization of the sphere to obtain the
estimates. We however showed that the asymptotic properties of the resulting regression parameter estimators is independent of the parametrization used and we moreover developed a computationally interesting
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
13
Table 2
Simulation model (Xi ∼ U [1, 2], d = 3): The mean value (µ̂i = mean(α̂in ), i = 1, 2, 3) and n times the variance-covariance
(σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2, 3) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares
estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and
Xi ∼ U [1, 2]. The line, preceded by ∞, gives the asymptotic values.
Method
SSE
n
100
500
1000
2000
5000
10000
∞
µ̂1
0.577082
0.577066
0.577128
0.577232
0.577286
0.577324
0.577350
µ̂2
0.576760
0.577370
0.577364
0.577281
0.577343
0.577351
0.577350
µ̂3
0.577536
0.577505
0.577505
0.577512
0.577412
0.577370
0.577350
σ̂11
0.026000
0.020865
0.020471
0.020101
0.019549
0.019208
0.019223
σ̂22
0.026531
0.021461
0.020915
0.020454
0.019796
0.019732
0.019223
σ̂33
0.025168
0.020629
0.020576
0.020325
0.019966
0.019746
0.019223
σ̂12
-0.013676
-0.010840
-0.010394
-0.010107
-0.009688
-0.009597
-0.009612
σ̂13
-0.012352
-0.010012
-0.010054
-0.009987
-0.009855
-0.009609
-0.009612
σ̂23
-0.012797
-0.010623
-0.010531
-0.010346
-0.010112
-0.010138
-0.009612
ESE
100
500
1000
2000
5000
10000
∞
0.576080
0.576671
0.576861
0.577055
0.577175
0.577251
0.577350
0.577006
0.577423
0.577388
0.577293
0.577351
0.577359
0.577350
0.578298
0.577850
0.577750
0.577677
0.577516
0.577436
0.577350
0.025577
0.020379
0.019936
0.019503
0.019054
0.018714
0.018677
0.026523
0.020804
0.020265
0.019941
0.019269
0.019187
0.018677
0.024775
0.020022
0.019954
0.019749
0.019449
0.019205
0.018677
-0.013601
-0.010557
-0.010099
-0.009830
-0.009431
-0.009344
-0.009338
-0.011903
-0.009793
-0.009803
-0.009657
-0.009612
-0.009364
-0.009338
-0.012910
-0.010250
-0.010174
-0.010108
-0.009843
-0.009845
-0.009338
LSE
100
500
1000
2000
5000
10000
∞
0.576900
0.577271
0.577343
0.577440
0.577379
0.577335
0.577350
0.577212
0.577276
0.577285
0.577277
0.577338
0.577356
0.577350
0.576726
0.577256
0.577294
0.577267
0.577305
0.577345
0.577350
0.046654
0.047999
0.049601
0.050351
0.054862
0.058277
?
0.047393
0.047934
0.050000
0.051728
0.055341
0.057892
?
0.045991
0.047352
0.049575
0.051742
0.054135
0.058661
?
-0.023955
-0.024291
-0.024999
-0.025168
-0.028024
-0.028773
?
-0.022584
-0.023683
-0.024590
-0.025194
-0.026838
-0.029497
?
-0.023394
-0.023653
-0.024991
-0.026544
-0.027305
-0.029143
?
MRCE
100
500
1000
2000
5000
10000
∞
0.576976
0.577285
0.577285
0.577339
0.577381
0.577370
0.577350
0.576965
0.577414
0.577414
0.577325
0.577371
0.577355
0.577350
0.576916
0.577265
0.577265
0.577347
0.577285
0.577319
0.577350
0.046496
0.017158
0.034317
0.030230
0.028795
0.026680
0.021436
0.046523
0.016660
0.033319
0.030323
0.028768
0.027576
0.021436
0.044848
0.016967
0.033935
0.031574
0.029245
0.027700
0.021436
-0.024092
-0.008421
-0.016843
-0.014493
-0.014163
-0.013279
-0.010718
-0.022429
-0.008723
-0.017445
-0.015744
-0.014630
-0.013402
-0.010718
-0.022333
-0.008247
-0.016493
-0.015825
-0.014611
-0.014297
-0.010718
Lagrangian approach that avoids the use of a local parametrization and allows for easy estimation in high
dimensions. The theory for the Lagrangian procedure is complicated by the fact that we do no longer work
on the sphere, which is rather unusual in the theory on single index models where identifiability assumptions
are commonly used. Our simulations however suggest that its asymptotic properties are the same as those
presented in this paper.
The presence/absence of smoothing procedures involved with the estimation techniques is one of the main
difference between our two score estimates. Although the simple score estimator, avoiding any smoothing
parameters is not an efficient estimate of the regression parameter, its performance in finite samples is not
remarkably worse than the performance of the efficient score estimates. By avoiding the use of a smooth estimate for the derivative of the link function, the simple score approach has the advantage that no bandwidth
selection procedures are needed, which makes it computationally more attractive.
10. Appendix
In this Section, we give the proofs of the results stated in Sections 3 and 4. The results given in Section 5
together with additional technical lemmas needed for proving our main results are given in the supplementary
material [2]. We will write “Lemma X in Supplement Y” when we refer to these results in the remainder of
the Appendix. Entropy results are used in our proofs. Before we start the proofs, we first introduce some
notations and definitions used in the remainder of the Appendix.
We will denote the L2 -norm of a function f defined on X with respect to some probability measure P by
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
14
Table 3
Simulation model (Xi ∼ N (0, 1), d = 2): The mean value (µ̂i = mean(α̂in ), i = 1, 2) and n times the variance-covariance
(σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares
estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and
Xi ∼ N (0, 1). The line, preceded by ∞, gives the asymptotic values.
Method
SSE
n
100
500
1000
2000
5000
10000
∞
µ̂1
0.705202
0.706395
0.706824
0.707100
0.707026
0.707091
0.707107
µ̂2
0.706163
0.707509
0.707259
0.707056
0.707167
0.707113
0.707107
σ̂11
0.201378
0.109547
0.092557
0.080981
0.072021
0.067685
0.055556
σ̂22
0.200975
0.109291
0.092464
0.080966
0.071947
0.067665
0.055556
σ̂12
-0.200327
-0.109371
-0.092494
-0.080967
-0.071982
-0.067674
-0.055556
ESE
100
500
1000
2000
5000
10000
∞
0.706800
0.706905
0.706978
0.707061
0.707079
0.707104
0.707107
0.706173
0.707200
0.707190
0.707133
0.707128
0.707106
0.707107
0.087513
0.038450
0.031701
0.027930
0.023914
0.022827
0.018519
0.087878
0.038468
0.031672
0.027924
0.023907
0.022828
0.018519
-0.087480
-0.038453
-0.031685
-0.027926
-0.023911
-0.022827
-0.018519
LSE
100
500
1000
2000
5000
10000
∞
0.706748
0.706710
0.706737
0.707009
0.707087
0.707074
0.707107
0.706135
0.707309
0.707389
0.707161
0.707110
0.707131
0.707107
0.093819
0.068561
0.061614
0.061123
0.060759
0.061708
?
0.094319
0.068260
0.061325
0.061109
0.060722
0.061692
?
-0.093715
-0.068383
-0.061459
-0.061111
-0.060738
-0.061699
?
MRCE
100
500
1000
2000
5000
10000
∞
0.701888
0.705470
0.706374
0.707090
0.706895
0.707062
0.707107
0.704656
0.707715
0.707364
0.706892
0.707229
0.707107
0.707107
0.542166
0.364976
0.336674
0.328658
0.317497
0.313625
0.268711
0.539405
0.360968
0.335793
0.328860
0.317000
0.313331
0.268711
-0.530421
-0.362295
-0.335971
-0.328632
-0.317202
-0.313456
-0.268711
k · kP ; i.e.,
2 1/2
kf kP = P(f )
Z
=
1/2
f (x)dP(x)
.
2
(10.1)
X
Also, we will denote by k · kB,P the Bernstein norm of a function f defined on X × R which is given by
kf kP,B =
1/2
|f |
2P e − |f | − 1
.
(10.2)
For both norms, P will be taken to be P0 , the true joint probability measure of the (X, Y ). Note that when
f is only a function of x ∈ X then
Z
kf kP0 =
X
1/2 Z
1/2
2
f (x)dG(x)
=
f (x)g(x)dx
,
2
X
by Assumption A5.
For a class of functions F on R equipped with a norm k · k, we let NB (ζ, F, k · k) denote the minimal
number N for which there exists pairs of functions {[gjL , gjU ], j = 1, . . . , N } such that kgjU − gjL k ≤ ζ for all
j = 1, . . . , N and such that for each g ∈ F there is a j ∈ {1, . . . , N } such that gjL ≤ g ≤ gjU . The ζ−entropy
with bracketing of F is defined as HB (ζ, F, k · k) = log(NB (ζ, F, k · k)).
Results on entropy calculations used in proving our main results are given in the supplemental material.
Our proofs use inequalities for empirical processes described in Lemma 3.4.2 and Lemma 3.4.3 of [23].
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
15
Table 4
Simulation model (Xi ∼ N (0, 1), d = 3): The mean value (µ̂i = mean(α̂in ), i = 1, 2, 3) and n times the variance-covariance
(σ̂ij = n·cov(α̂in , α̂jn ),i, j = 1, 2, 3) of the simple score estimate (SSE), the efficient score estimate (ESE), the least squares
estimate (LSE) and the maximum rank correlation estimate (MRCE) for different sample sizes n with N = 5000 and
Xi ∼ N (0, 1). The line, preceded by ∞, gives the asymptotic values.
Method
SSE
n
100
500
1000
2000
5000
10000
∞
µ̂1
0.570983
0.575676
0.576424
0.576826
0.577037
0.577107
0.577350
µ̂2
0.575590
0.577118
0.577186
0.577144
0.577330
0.577377
0.577350
µ̂3
0.578029
0.578470
0.578120
0.577945
0.577635
0.577543
0.577350
σ̂11
0.263776
0.141363
0.123481
0.104429
0.093606
0.087822
0.074074
σ̂22
0.309305
0.161205
0.124819
0.104871
0.097177
0.092609
0.074074
σ̂33
0.282773
0.149813
0.121335
0.103671
0.093909
0.089642
0.074074
σ̂12
-0.144522
-0.076137
-0.063075
-0.052625
-0.048362
-0.045356
-0.037037
σ̂13
-0.114110
-0.064089
-0.060038
-0.051672
-0.045185
-0.042420
-0.037037
σ̂23
-0.165663
-0.085601
-0.061653
-0.052170
-0.048793
-0.047258
-0.037037
ESE
100
500
1000
2000
5000
10000
∞
0.571762
0.575761
0.576414
0.576780
0.577012
0.577125
0.577350
0.577007
0.577456
0.577396
0.577305
0.577403
0.577401
0.577350
0.579906
0.578542
0.578128
0.577918
0.577620
0.577517
0.577350
0.123299
0.056520
0.043292
0.036568
0.030453
0.029584
0.024691
0.141033
0.059089
0.043200
0.036203
0.032063
0.029680
0.024691
0.121794
0.051253
0.041763
0.036525
0.032005
0.030257
0.024691
-0.070078
-0.032075
-0.022266
-0.018055
-0.015234
-0.014494
-0.012346
-0.049452
-0.023321
-0.020903
-0.018448
-0.015195
-0.015074
-0.012346
-0.071866
-0.027809
-0.020953
-0.018145
-0.016831
-0.015193
-0.012346
LSE
100
500
1000
2000
5000
10000
∞
0.575121
0.576833
0.577022
0.577337
0.577311
0.577258
0.577350
0.574814
0.577377
0.577354
0.577418
0.577469
0.577498
0.577350
0.577588
0.577289
0.577415
0.577177
0.577224
0.577272
0.577350
0.173704
0.107186
0.101079
0.092130
0.090412
0.088953
?
0.174857
0.104621
0.098209
0.091427
0.088701
0.085219
?
0.173169
0.106974
0.100486
0.089505
0.089865
0.089801
?
-0.085890
-0.052394
-0.049366
-0.047012
-0.044678
-0.042188
?
-0.086918
-0.054652
-0.051622
-0.045113
-0.045745
-0.046740
?
-0.086607
-0.052262
-0.048862
-0.044391
-0.044061
-0.043056
?
MRCE
100
500
1000
2000
5000
10000
∞
0.568656
0.576584
0.577444
0.577241
0.577312
0.577239
0.577350
0.570735
0.576612
0.576655
0.576968
0.577253
0.577371
0.577350
0.571815
0.576154
0.576699
0.577275
0.577265
0.577334
0.577350
0.794208
0.513244
0.487464
0.436314
0.416947
0.398551
0.358281
0.796010
0.520888
0.482635
0.434728
0.430323
0.418207
0.358281
0.802239
0.524345
0.475335
0.436539
0.426823
0.410919
0.358281
-0.389900
-0.253712
-0.246720
-0.217338
-0.210246
-0.202886
-0.179141
-0.384086
-0.257288
-0.240780
-0.218922
-0.206836
-0.195591
-0.179141
-0.387755
-0.265869
-0.234323
-0.217178
-0.219833
-0.215307
-0.179141
Lemma 3.4.2 ([23]) Let F be a class of measurable functions such that kf kP ≤ δ and kf k∞ ≤ M for
every f in F. Then
h
i
Jn (δ, F, k · kP )
√ 2
EP kGn kF . Jn (δ, F, k · kP ) 1 +
M ,
nδ
where
Z
Jn (δ, F, k · k) =
δ
p
1 + HB (, F, k · k)d
0
Lemma 3.4.3 ([23]) Let F be a class of measurable functions such that kf kP,B ≤ δ for every f in F.
Then
h
i
Jn (δ, F, k · kP,B )
√ 2
EP kGn kF . Jn (δ, F, k · kP,B ) 1 +
,
nδ
In the sequel, and whenever the -bracketing entropy of some class F with respect to some norm k · k is
bounded above by C−1 for some constant C > 0 (which may depend on n), we will write for all e >
Z e
Jn (d) =
(1 + C/)1/2 d
(10.3)
0
Moreover, we will use the inequality
Jn (d) ≤ d + 2C 1/2 e1/2
√
√
√
which is an immediate consequence of the fact that x + y ≤ x + y for all x, y ≥ 0.
(10.4)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
16
10.1. Appendix A: The least squares estimator (LSE) of the link function ψ
In this section we first prove Proposition 3.1. We next show in Lemma 10.1 that the LSE ψ̂nα is of order
Op (log n) uniformly in B(α0 , δ0 ). This result is used in the proof of Proposition 3.2, given at the end of this
section.
Proof of Proposition 3.1. Note that with X ∼ g we can write
h
2 i
Lα (ψ) = E ψ0 (αT0 X) − ψ(αT X)
.
Thus,
h
2 i
E ψ0 (αT0 X) − E(ψ0 (αT0 X) | αT X)
= min 0 Lα (ψ),
ψ∈M
with M0 the set of all bounded Borel-measurable function defined on Iα . Therefore, if the minimizing
function u 7→ E(ψ0 (αT0 X) | αT X = u) is monotone increasing on Iα , then this implies that it necessarily
minimizes Lα over M. Furthermore, such a minimizer is unique by strict convexity of Lα .
Lemma 10.1.
max
sup ψ̂nα (αT x) = Op (log n).
α∈B(α0 ,δ0 ) x∈X
Proof. The proof of this lemma is similar to that of Lemma 4.4 of [1]. For a fixed α it follows from the
min-max formula of an isotonic regression that we have for all x ∈ X
Pk
Pn
α
α
i=1 Yi
i=k Yi
min
≤ ψ̂nα (αT x) ≤ max
.
1≤k≤n
1≤k≤n n − k + 1
k
Hence,
min Yi ≤ ψ̂nα (αT x) ≤ max Yi
1≤i≤n
1≤i≤n
and this in turn implies that
max
sup ψ̂nα (αT x) ≤ max |Yi |.
α∈B(α0 ,δ0 ) x∈X
1≤i≤n
Using similar arguments as in [1], we use Assumption A7 to show that max1≤i≤n |Yi | = Op (log n), which
completes the proof.
Proof of Proposition 3.2. By the definition of the LSE of the unknown monotone link function, ψ̂nα maximizes the map ψ 7→ Mn over M where,
Z
Mn (ψ, α) =
2yψ(αT x) − ψ 2 (αT x) dPn (x, y).
(10.5)
X ×R
Moreover, ψα maximizes the map ψ 7→ M over M, where
Z
M(ψ, α) =
2yψ(αT x) − ψ 2 (αT x) dP0 (x, y).
(10.6)
X ×R
Define the function fψ,α by,
fψ,α (x, y) = 2yψ(αT x) − ψ 2 (αT x)
Note that by definition of the LSE as the maximizer of (10.5), we have
Z
fψ̂nα ,α (x, y) − fψα ,α (x, y) dPn (x, y) ≥ 0.
X ×R
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
17
Moreover for all α ∈ B(α0 , δ0 ) and ψ ∈ M, we have,
Z
fψ,α (x, y) − fψα ,α (x, y) dP0 (x, y) = −d2α (ψ, ψα ),
X ×R
where, for any α ∈ B(α0 , δ0 ) and for any two elements ψ1 and ψ2 in M, we define the squared distance
Z
2
2
dα (ψ1 , ψ2 ) =
ψ2 (αT x) − ψ1 (αT x) g(x)dx.
X
This can be seen as follows:
Z
fψ,α (x, y) − fψα ,α (x, y) dP0 (x, y)
X ×R
Z
2
=
2ψα (αT x)(ψ(αT x) − ψα (αT x)) − ψ 2 (αT x) + ψα
(αT x) dP0 (x, y)
X ×R
Z
2
=−
ψ(αT x) − ψα (αT x) g(x)dx = −d2α (ψ, ψα ),
X
where we use that E{Y |αT X = u} = ψα (u). This implies that, for all α ∈ B(α0 , δ0 ) and ψ ∈ M, we have,
Z
fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) ≥ d2α (ψ, ψα ).
X ×R
We write,
(
)
dα (ψ̂nα , ψα ) ≥
sup
P
α∈B(α0 ,δ0 )
(
Z
≤P
sup
α∈B(α0 ,δ0 ),dα (ψ̂nα ,ψα )≥
X ×R
fψ̂nα ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) − d2α (ψ̂nα , ψα ) ≥ 0,
)
dα (ψ̂nα , ψα ) ≥
sup
α∈B(α0 ,δ0 )
(
Z
≤P
sup
α∈B(α0 ,δ0 ),ψ∈MRK ,dα (ψ,ψα )≥
max
fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) − d2α (ψα , ψ) ≥ 0,
X ×R
T
sup ψ̂nα (α x) ≤ K
α∈B(α0 ,δ0 ) x∈X
+P
max
T
sup ψ̂nα (α x) > K .
α∈B(α0 ,δ0 ) x∈X
Fix ν > 0. Since
max
sup ψ̂nα (αT x) = Op (log n),
α∈B(α0 ,δ0 ) x∈X
by Lemma 10.1, we can find K1 > 0 large enough such that
T
P
max sup ψ̂nα (α x) > K1 log n < ν/2.
α∈B(α0 ,δ0 ) x∈X
Define
n
o
MRK = ψ monotone non-decreasing on [−R, R] and bounded by K ,
(10.7)
and consider the related class
FRK = f (x, y) = 2y ψ(αT x) − ψα (αT x) − ψ(αT x)2 + ψα (αT x)2 ,
(α, ψ) ∈ B(α0 , δ0 ) × MRK and (x, y) ∈ X × R ,
(10.8)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
18
and for some v > 0
FRKv : =
f ∈ FRK : dα (ψ, ψα ) ≤ v for all α ∈ B(α0 , δ0 ) .
(10.9)
Note now that the class FRKv is included in the class HRCδ defined in Lemma 10.5 of Supplement B of [2]
with C = 2K 2 and δ = 2Kv. This holds true provided that K0 ≤ K, and K ≥ 1 which we can assume for n
large enough since K will be chosen to be of order log n. To see the claimed inclusion, it is enough to show
that if m is a nondecreasing function [−R, R] then m2 can be written as the difference of two monotone
functions. This is true because m2 = m2 Im≥0 − (−m2 )Im<0 , and m2 and −m2 are nondecreasing on the
subsets {m ≥ 0} and {m < 0} respectively. When restricting attention to the event that ψ̂nα is bounded
by K for n large enough, we can consider only monotone functions ψ ∈ MRK . Using the expression of ψα
the latter is bounded by K0 ≤ K. On the other hand, for any function f ∈ FRKv , there exist nondecreasing
2
monotone functions f1 and f2 such that ψ 2 − ψα
= f2 − f1 , such that kf1 k∞ , kf2 k∞ ≤ K 2 + K02 ≤ 2K 2 .
Using that K ≥ 1 implies that k2ψk∞ , k2ψα k∞ ≤ 2K ≤ 2K 2 . To finish, note that for any α we have that
2
R
ψ(αT x) − ψα (αT x) dG(x) ≤ v 2 we also have that
X
Z
Z
2
2
2
ψ 2 (αT x) − ψα
(αT x) dG(x) ≤ (2K)2
ψ(αT x) − ψα (αT x) dG(x)
X
X
2 2
≤ 4K v .
The calculation above implies that we can take δ = 2Kv. Using the result of Lemma 10.5 in Supplement B
of [2], it follows that the related class FeRKv = D̃−1 FRKv with D̃ = 16M0 C = 32M0 K 2 and a given v > 0
satisfies
eRKv , k · kB,P
HB , FeRKv , k · kB,P0
≤ HB , H
0
A
≤
for some constant A > 0 (depending only on d and the other parameters of the problem), and that for all
f˜ ∈ FeRKv we have kf˜kB,P0 ≤ D̃−1 δ = (32M0 K 2 )−1 2Kv = (16M0 )−1 K −1 v ≡ A0 K −1 v. It follows from
Lemma 3.4.3 of [23] that
h
i
Jn (A0 K −1 v)
E kGn kFeRKv
. Jn (A0 K −1 v), 1 + K 2 √ 2 2
, where Jn is defined in (10.3)
nA0 v
1/2
≤
A0 K −1 v + 2A0 K −1/2 v 1/2 A1/2 , using the inequality in (10.4)
≤
B0 K −1/2 (v + v 1/2 )
for some constant B0 > 0, where we used the fact that K −1/2 ≥ K −1 . Therefore,
h
i
B0 K −1/2 (v + v 1/2 )
√ 2 2
E kGn kFeRKv
. B0 K −1/2 (v + v 1/2 ) 1 + K 2
nA0 v
1 + v 1/2
≤ C0 K −1/2 (v + v 1/2 ) 1 + C0 K 3/2 √ 3/2 .
nv
Using the definition of the class FeRKv , the preceding display implies that
h
i
1/2
3/2
1/2
3/2 1 + v
√ 3/2 .
E kGn kFRKv
. C0 K (v + v ) 1 + C0 K
nv
(10.10)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
19
Now with K = K1 log n, we have that
(
)
dα (ψ̂nα , ψα ) ≥
sup
P
α∈B(α0 ,δ0 )
≤P
Z
sup
α∈B(α0 ,δ0 ),ψ∈MRK ,
2
fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) − dα (ψ, ψα ) ≥ 0,
X ×R
dα (ψ,ψα )≥
max
sup ψ̂nα (αT x) ≤ K
+ ν/2
(10.11)
α∈B(α0 ,δ0 ) x∈X
Z
∞
X
√
√ 2s 2
≤
P
sup
n
fψ,α (x, y) − fψα ,α (x, y) d(Pn − P0 )(x, y) ≥ n2 , + ν/2
X ×R
s=0 α∈B(α0 ,δ0 ),ψ∈MRK ,
2s ≤dα (ψ,ψα )≤2s+1
≤
∞
X
(
sup
P
√
Z
h(x, y)d(Pn − P0 )(x, y) ≥
n
h∈FRK2s+1
s=0
√
)
2s 2
n2
+ ν/2.
X ×R
We now show that there exists a constant C > 0 such that with = M (log n)n−1/3 ,
)
(
Z
√
h(x, y)d(Pn − P0 )(x, y) ≤ CM 1/2 (log n)2 n−1/6 2(s+1)/2
n
E
sup
h∈FRK2s+1
X ×R
(10.12)
An application of Markov’s inequality, together with (10.11), then yields, with = M (log n)n−1/3
(
)
∞
X
CM 1/2 (log n)2 n−1/6 2(s+1)/2
√ 2s 2
P
sup
dα (ψ̂nα , ψα ) ≥
≤
+ ν/2
n2
α∈B(α0 ,δ0 )
s=0
=
∞
∞
X
C(log n)2 n−1/6 2(s+1)/2
21/2 C X 1
√ 2s 3/2
+
ν/2
=
+ ν/2 ≤ ν,
n2 M (log n)2 n−2/3
M 3/2 s=0 23s/2
s=0
for M sufficiently large. The result of Proposition 3.2 hence follows by showing (10.12). Using the obtained
bound in (10.10) with v = 2s+1 and using that 2s+1 ≥ 1, s ≥ 0 and ≤ 1 for n large enough we get some
some constant D0 > 0
(
)
Z
√
E
sup
n
h(x, y)d(Pn − P0 )(x, y)
h∈FRK2s+1
X ×R
1 + M 1/2 2(s+1)/2 (log n)1/2 n−1/6
. (log n)3/2 M 1/2 2(s+1)/2 (log n)1/2 n−1/6 1 + D0 (log n)3/2 √
nM 3/2 23(s+1)/2 (log n)3/2 n−1/2
1 + M 1/2 2(s+1)/2 (log n)1/2 n−1/6
= (log n)2 n−1/6 M 1/2 2(s+1)/2 1 + D00
, with D00 = D0 M −3/2
23(s+1)/2
≤ 2(log n)2 n−1/6 M 1/2 2(s+1)/2 , for s ≥ 0 and n large enough.
This proves the desired result:
sup
α∈B(α0 ,δ0 )
d2α (ψ̂nα , ψα ) =
sup
Z n
o2
ψ̂nα (αT x) − ψα (αT x) dG(x) = Op (log n)2 n−2/3 .
α∈B(α0 ,δ0 )
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
20
10.2. Appendix B: Asymptotic behavior of the simple score estimator
In this section we prove Theorem 4.1 given in Section 4. The proof is decomposed into three parts: In Section
10.2.1 we first prove the existence of a crossing of zero of φn defined in (4.5). The proof of consistency and
asymptotic normality of α̂n are given in Section 10.2.2 and Section 10.2.3.
10.2.1. Proof of existence of a crossing of zero
Let φ be the population version of φn defined by
Z
T
φ(β) := (JS (β)) x y − ψα S(β)T x dP0 (x, y),
(10.13)
where ψα is defined by
ψα (u) := E ψ0 αT X |αT X = u ≡ E ψ0 S(β)T X |S(β)T X = u .
We have the following result:
Proposition 10.1.
φn (β) = φ(β) + op (1),
uniformly in β ∈ C := β ∈ Rd−1 : S(β) ∈ B(α0 , δ0 ) .
Proof. For any β ∈ C, we write,
Z
T
φn (β) = (JS (β)) x y − ψα S(β)T x dPn (x, y)
Z
n
o
T
+ (JS (β)) x ψα S(β)T x − ψ̂nα S(β)T x dPn (x, y)
Z
T
= φ(β) + (JS (β)) x y − ψα S(β)T x d(Pn − P0 )(x, y)
Z
n
o
T
+ (JS (β)) x ψα S(β)T x − ψ̂nα S(β)T x d(Pn − P0 )(x, y)
Z
n
o
T
+ (JS (β)) x ψα S(β)T x − ψ̂nα S(β)T x dP0 (x, y)
= φ(β) + I + II + III.
(10.14)
To find the rate of convergence of the term I in (10.14) we will use Lemma 10.6 in Supplement B of
T
[2]. Note first that for 1 ≤ i ≤ d − 1 the i-th component of the vector (JS (β)) x can be written as
s(β)i1 x1 + . . . + s(β)id xd , where by Assumption A8 the functions sij are assumed to be uniformly bounded
with partial derivatives that are also uniformly bounded on the bounded convex set C to which β belongs. If
B1 is the same constant found in Lemma 10.6 in Supplement B of [2] then the -bracketing entropy is bounded
above by B1 K0 /. Applying Lemma 3.4.3 of [23], Markov’s inequality and Lemma 10.6 in Supplement B to
each of the empirical processes corresponding to the term s(β)ij xj for 1 ≤ j ≤ d yields (with D = 8M RK0 ,
and M is a constant bounding the sum of s(β)ij and their partial derivatives) for A > 0
D
Jn (B2 )
−1/2
P |I| ≥ An
≤ Jn (B2 ) 1 + √ 2 , where Jn is defined in (10.3) and B2 is the same
A
nB2
constant of Lemma 10.6 in Supplement B
D
B3
1/2 1/2 1/2
≤ B3 1 + √ 2 , using the inequality in (10.4) with B3 = B2 + 2B1 K0 B2
A
nB2
1
.
A
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
21
This implies that I = Op (n−1/2 ). For the last term III in (10.14) we get by an application of the CauchySchwarz inequality and by Proposition 3.2 that this term is Op (n−1/3 log n), i.e.
Z
III ≤
= Op (n
2
T
(JS (β)) x
−1/3
2
1/2 Z n
1/2
o2
T
T
ψα S(β) x − ψ̂nα S(β) x
dG(x)
dG(x)
log n),
T
where we also use that (JS (β)) x is bounded in L2 norm, a straightforward implication of Assumption A1
(boundedness of X and Assumption A8 (uniform boundedness of the components of the matrix JS ). The
result now follows by showing that the term II is op (1). Consider the class of functions
GjRKv =
g(x, y) = s(β)xj ψα αT x − ψ(αT x ,
such that (α, β, ψ) ∈ Sd−1 × C × MRK and (x, y) ∈ X × ∈ R,
and
sup
dα (ψα , ψ) ≤ v
α∈B(α0 ,δ0 )
with s a function satisfying (10.43). Then, GjRKv ⊂ QjRK − QjRK , where QjRC is the same class defined in
(10.44). Here, we choose K large enough such that K ≥ K0 . If follows from (10.46) in the proof of Lemma
10.6 in Supplement B, that (at the cost of increasing the constant L in (10.46))
LK
,
HB , G̃jRKv , k · kP0 ≤
where G̃jRKv = (16M0 K)−1 GjRKv . Also, we have for all g ∈ GjRKv
kgkP0 ≤ M Rv.
Fix ν > 0 and let sij be the i × j entry of JS (β) for 1 ≤ i ≤ d − 1 and 1 ≤ j ≤ d. Also, let
Z
n
o
IIij =
sij (β)xj ψα S(β)T x − ψ̂nα S(β)T x d(Pn − P0 )(x, y).
X ×R
Using Lemma 10.1 and Proposition 3.2 there exists some constant K1 > 0 large enough (and independent
of n ) such that with K = K1 log n and v = K1 log n n−1/3 we have that for A > 0
P |IIij | ≥ An−1/2
!
=P
|IIij | ≥ An−1/2 ,
sup
sup ψ̂nα (αT x) ≤ K,
α∈B(α0 ,δ0 ) x∈X
sup
dα (ψα , ψ) ≤ v
+ ν/2
α∈B(α0 ,δ0 )
Jn (M Rv)
K
+ ν/2, where Jn is defined in (10.3)
. Jn (M Rv) 1 + √
A
nM 2 R2 v 2
K
M Rv + 2(M RL)1/2 K 1/2 v 1/2
√
≤
M Rv + 2(M RL)1/2 K 1/2 v 1/2
1+
+ ν/2, using the inequality in (10.4)
A
nM 2 R2 v 2
1
M̃
(log n)2 n−1/6 1 +
≤
+ ν/2, for some constant M̃ > 0
A
log nM 2 R2
≤ν
for n large enough. We conclude that IIij = op (n−1/2 ) which in turn implies that II = op (n−1/2 ).
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
22
Proof of Theorem 4.1 (Existence). Using Proposition 10.1 we get, analogously to the development in [10],
the relation
φn (α) = φ0 (β0 )(β − β0 ) + Rn (β),
(10.15)
where Rn (α) = op (1) + o(β − β0 ), uniformly in β ∈ C and where φ0 is the derivative of φ defined in (10.13).
Using Lemma 10.9 in Supplement C of [2], we get that the derivative of φ at β0 is given by the matrix
T
T
φ0 (β0 ) = (JS (β0 )) E ψ00 S(β0 )T x Cov(X|S(β0 )T X) JS (β0 ) = (JS (β0 )) AJS (β0 ) = B,
where A and B are defined in (4.7) and (4.9) respectively. We now define, for h > 0, the functions
Z
1
Kh (u1 − β01 ) . . . Kh (ud−1 − βd−1 ) Rn (u1 , . . . , ud−1 ) du1 . . . dud−1 ,
R̃n,h (β) = d−1
h
where
Kh (x) = h−1 K(x/h),
x ∈ R,
letting K be one of the usual smooth kernels with support [−1, 1].
Furthermore, we define:
φ̃n,h (β) = φ0 (β0 )(β − β0 ) + R̃nh (β).
Clearly:
lim φ̃n,h (β) = φn (β)
h↓0
and
lim R̃nh (β) = Rn (β),
h↓0
for each continuity point β of φn .
We now reparametrize, defining
γ = φ0 (β0 )β,
γ0 = φ0 (β0 )β0 .
This gives:
φ0 (β0 )(β − β0 ) + R̃nh (β) = γ − γ0 + R̃nh B −1 γ ,
By (10.15), the mapping
γ 7→ γ0 − Rn B −1 γ ,
maps, for each η > 0, the ball Bη (β0 ) = {β : kβ − β0 } ≤ η} into Bη/2 (β0 ) = {β : kβ − β0 } ≤ η/2}
for all large n, with probability tending to one, where k · k denotes the Euclidean norm, implying that the
continuous map
γ 7→ γ0 − R̃nh B −1 γ ,
maps Bη (γ0 ) = {γ : kγ − γ0 k2 ≤ η} into itself for all large n and small h. So for large n and small h there
is, by Brouwer’s fixed point theorem, a point γnh such that
γnh = γ0 − R̃nh B −1 γnh .
Defining βnh = B −1 γnh , we get:
φ̃n,h (βnh ) = φ0 (β0 )(βnh − β0 ) + R̃nh (βnh ) = 0.
(10.16)
By compactness, (βn,1/k )∞
k=1 must have a subsequence (βn,1/ki ) with a limit β̃n , as i → ∞.
Suppose that the jth component φnj of φn does not have a crossing of zero at β̃n . Since φnj only has finitely
many jump discontinuities, since there can only be discontinuities at a changing of ordering of the values
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
23
αT Xi , there must be a closed ball Bδ (β̃n ) = {β : kβ − β̃n k ≤ δ} of β̃n such that {φ̄nj (β) : β ∈ Bδ (β̃n )} has
a constant sign in the closed ball Bδ , say φ̄nj (β) > 0 for β ∈ B̄δ (β̃n ). Again using that φnj only has finitely
many jump discontinuities, this means that
φ̄n,j (β) ≥ c > 0,
for all β ∈ B̄δ (β̃n ).
This means that the jth component φ̃n,h,j of φ̃n,h satisfies
φ̃n,h,j (β) = [φ0 (β0 )(β − β0 )]j + R̃nh,j (β)
Z n
o
1
[φ0 (β0 )(β − β0 )]j + Rnj (u1 , . . . , ud−1 ) Kh (u1 − β01 ) . . . Kh (ud−1 − βd−1 ) du1 . . . dud−1
= d−1
h
Z n
o
1
[φ0 (β0 )(u − β0 )]j + Rnj (u1 , . . . , ud−1 ) Kh (u1 − β1 ) . . . Kh (ud−1 − βd−1 ) du1 . . . dud−1 − c/2
≥ d−1
h
Z
1
≥ c d−1
Kh (u1 − β1 ) . . . Kh (ud − βd ) du1 . . . dud − c/2
h
= c/2,
for β ∈ Bδ/2 (β̃n ) and sufficiently small h, contradicting (10.16), since βnh , for h = 1/ki , belongs to Bδ/2 (β̃n )
for large ki .
10.2.2. Proof of consistency of the simple score estimator
Proof. Since β̂n is contained in the compact set C, the sequence (β̂n ) has a subsequence (β̂nk = β̂nk (ω)),
converging to an element β∗ . Let αnk = S(β̂nk ). If β̂nk = β̂nk (ω) −→ β∗ , we get by continuity of the map
S that αnk → α∗ = S(β∗ ). By Proposition 3.2, we also have
ψ̂nk ,α̂nk S(βnk )T x −→ ψα∗ (S(β∗ )T x),
where ψα is defined in (3.1). By Proposition 10.1 and the fact that in the limit, the crossing of zero becomes
a root of the continuous limiting function, we get,
lim φnk (βnk ) = φ(β∗ ) = 0
k→∞
(10.17)
where,
Z
φ(β∗ ) =
Z
=
JS (β∗ )T x y − ψα∗ S(β∗ )T x dP0 (x, y)
JS (β∗ )T x ψ0 S(β0 )T x − ψα∗ S(β∗ )T x dG(x)
Z
JS (β∗ )T x ψ0 S(β0 )T x − E ψ0 S(β0 )T x |S(β∗ )T X = S(β∗ )T x dG(x)
= E Cov JS (β)T X, ψ0 S(β0 )T |S(β∗ )T X
=
We next conclude that,
0 = (β0 − β∗ )T φ(β∗ )
= E Cov (β0 − β∗ )T JS (β∗ )T X, ψ0 S(β∗ )T X + (S(β0 ) − S(β∗ ))T X |S(β∗ )T X
which can only happen if β0 = β∗ where we use the positivity of the random variable Cov((α0 − α)T X,
ψ0 (αT X)|αT X) shown in Lemma 10.10 in Supplement C of [2] and Assumption A6 which guarantees that
the random variable Cov[(β0 − β∗ )T JS (β)T X, ψ0 (S(β)T X + (S(β0 ) − S(β))T X)|S(β)T X] is not equal to
0 almost surely for all β 6= β0 . Note that,
Cov (β0 − β)T JS (β)T X, ψ0 S(β)T X + (S(β0 ) − S(β))T X |S(β)T X = u
= Cov (S(β0 ) − S(β) + o(β − β0 ))T X, ψ0 S(β)T X + (S(β0 ) − S(β))T X |S(β)T X = u
= Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)T X)|αT X = u + o(β − β0 )
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
24
where the first term in the expression above is positive for all α ∈ B(α0 , δ0 ) by Lemma 10.10 in Supplement
C.
10.2.3. Proof of asymptotic normality of the simple score estimator
We define φn at β̂n by putting
φn (β̂n ) = 0.
(10.18)
Note that, with this definition, we use the representation of the components as a convex combination of the
left and right limit at β̂n :
φn,j (β̂n ) = γj φn,j (β̂n −) + (1 − γj )φn,j (β̂n +) = 0,
(10.19)
where φn,j denotes the jth component of φn and where we can choose γj ∈ [0, 1] in such a way that (10.19)
holds since we have a crossing of zero componentwise. Note that this does not change the location of the
crossing of zero. Since the following asymptotic representations are also valid for one-sided limits as used in
(10.19) we can use Definition (10.18) and assume φn (β̂n ) = 0. We show
Z
φn (β̂n ) = JS (β0 )T
x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)
Z
T
+ JS (β0 )
x − E(X|S(β0 )T x) y − ψα̂n S(βn )T x dP0 (x, y)
+ op n−1/2 + kβ̂n − β0 k ,
(10.20)
where from now on we will use the notation E(X|S(β)T x) to denote E(X|S(β)T X = S(β)T x) for all β ∈ C
and x ∈ X .
T
0
T
T
Since β̂n →p β0 and since
the function β → ψS(β) (S(β) x) has derivative ψ0 (S(β0 ) x)JS (β0 ) x −
T
T
E(X|S(β0 ) X = S(β0 ) x) at β = β0 for all x ∈ X (See Lemma 10.9 in Supplement C), we get by
Definition (10.18) and a Taylor expansion at β = β0 that,
Z
JS (β0 )T
x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)
= B β̂n − β0 + op n−1/2 + kβ̂n − β0 k ,
(10.21)
where B is defined in (4.9). We conclude that,
√
n(β̂n − β0 ) →d Nd (0, Π) ,
where Π is defined in (4.10). The asymptotic normality of the estimator α̂n then follows by noting that,
√
√
√
T
n(α̂n − α0 ) = JS (β0 ) n(β̂n − β0 ) + op
n(β̂n − β0 ) →d Nd 0, JS (β0 )Π (JS (β0 )) .
To prove (10.20) we first define the piecewise constant function Ēn,β
if ψα (u) > ψ̂nα (τi ) for all u ∈ (τi , τi+1 ),
E X|S(β)T X = τi,β
Ēn,β (u) =
E X|S(β)T X = s
if ψα (s) = ψ̂nα (s) for some s ∈ (τi , τi+1 ),
if ψα (u) < ψ̂nα (τi ) for all u ∈ (τi , τi+1 ),
E X|S(β)T X = τi+1,β
where the τi,β denote the sequence of jump points of the monotone LSE ψ̂nα = ψ̂nS(β) . We then have
Z
n
o
Ēn,β̂n S(β̂n )T x y − ψ̂nα̂n S(β̂n )T x
dPn (x, y) = 0.
(10.22)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
25
2
R
This follows from the fact that ψ̂nα , i.e. the minimizer of the quadratic criterion X ×R y − ψ(αT x) dPn (x, y)
over monotone functions
of the greatest convex minorant of the cumulative
o
Pψ ∈ M, is the left derivative
i
α
sum diagram {(0, 0), i, j=1 Yi , i = 1, . . . , n . (See also [11], p.332). By Lemma 10.14 in Supplement C
0
of [2] we also know that ψα
stays away from zero for all α = S(β) in a neighborhood of α0 = S(β0 ). Using
the same techniques as in [11], we can find a constant C > 0 such that for all i = 1, . . . , d and u ∈ Iα ,
E Xi |S(β)T X = u − Ēni,β (u) ≤ C ψα (u) − ψ̂nα (u)
(10.23)
where Ēni,β denotes the ith component of En,β . In the sequel, we will use JS (β̂n ) = Op (1), an immediate
consequence of consistency of α̂n and Assumption A8. Now, as a consequence of (10.22), we can write
Z n
o n
o
φn (β̂n ) = JS (β̂n )T
x − E X|S(β̂n )T x
y − ψ̂nα̂n S(β̂n )T x
dPn (x, y)
Z n
o n
o
y − ψ̂nα̂n S(β̂n )T x
dPn (x, y)
E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x
+ JS (β̂n )T
= JS (β̂n )T I + II .
(10.24)
The term II can be written as
Z n
o n
o
II =
E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x
y − ψ̂nα̂n S(β̂n )T x
d(Pn − P0 )(x, y)
Z n
o
o n
dP0 (x, y)
+
E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x
y − ψα̂n S(β̂n )T x
Z n
o n
o
+
E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x
ψ̂nα̂n S(β̂n )T x − ψα̂n S(β̂n )T x
dP0 (x, y)
= IIa + IIb + IIc .
(10.25)
We first note that by Lemma 10.12 in Supplement C, the functions u 7→ E(Xi |S(β)T X = u) are uniformly
bounded by R for all β ∈ C and i ∈ {1, . . . , d}. Also, they admit a bounded variation, with a total variation
that is uniformly bounded for all β ∈ C and i ∈ {1, . . . , d}. By definition of Ēn,β its i-th component, Ēni,β
is also uniformly bounded by R and has a finite total variation which cannot exceed the total variation of
u 7→ E(Xi |S(β)T X = u). Using Lemma 10.13 of Supplement C , we can find two monotone functions f1
and f2 such that u 7→ E X|S(β)T X = u − Ēn,β (u) = f2 (u) − f1 (u) with f1 , f2 ∈ MRC1 for some constant
C1 > 0. Also, we know that ψ̂nα̂n ∈ MRK with K = K1 log n with increasing probability as n → ∞ provided
that K1 > 0 is chosen large enough. Noting that for any bounded increasing functions f1 , f2 , f3 we have
that (f2 − f1 )f3 is again bounded and has a bounded variation, it follows that the class of functions, Fa
say, involved in term IIa is included in HRK 0 v defined in Lemma 10.5 in Supplement B . Here, the constant
K 0 = K2 log n for some large enough constant K2 > 0, and v = C2 (log n)2 n−1/3 for some constant C2 > 0
using (10.23) and Proposition 3.2. Using Lemma 10.5 in Supplement B, we can show that (when the event
ψ̂nα̂n ∈ MRK occurs)
B1
, for some constant B1 > 0,
HB , Fea , k · kB,P0 ≤
with Fea = D̃−1 Fa with D̃ K 0 = K2 log n. Also, for any element f˜ = D̃−1 f ∈ Fe we have that
kf˜kB,P0 ≤ B2 D̃−1 v = C2 (log n)n−1/3 = δn , for some constant C2 > 0.
Let IIa,i be the term corresponding to i-th component of X. Using Markov’s inequality we have for a fixed
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
26
A > 0, ν > 0 and n large enough that
P |IIa,i | ≥ An−1/2 = P
!
|IIa,i | ≥ An−1/2 ,
sup
sup ψ̂nα (αT x) ≤ K
+ ν/2
α∈B(α0 ,δ0 ) x∈X
D̃
Jn (δn )
. Jn (δn ) 1 + √ 2 + ν/2, where Jn is defined in (10.3)
A
nδn
!
log n
B2
1/2
.
B2 δ n
1 + √ 3/2 + ν/2, for some constant B2 > 0, using the inequality in (10.4)
A
nδn
1
B3
−3/2
+ ν/2, with B3 = B2 C2
. (log n)3/2 n−1/6 1 +
A
(log n)3/2
≤ν
forn large enough. We conclude that IIa,i = op (n−1/2 ) which in turn implies that
IIa = op (n−1/2 ).
We turn now to IIb . Using Lemma 10.9 in Supplement C and a Taylor expansion of β 7→ ψα S(β)T x we
get,
ψα S(β)T x = ψ0 S(β0 )T x + (β − β0 )T JS (β0 )T x − E(X|S(β0 )T X = S(β0 )T x) ψ00 S(β0 )T x
+ o(β − β0 ),
(10.26)
so that
Z n
o n
o
IIb = JS (β̂n )T
E X|S(β̂n )T x − Ēn,β̂n S(β̂n )T x
ψ0 S(β0 )T x − ψα̂n S(β̂n )T x
dP0 (x, y)
= op β̂n − β0
using consistency of β̂n . We next consider the term IIc . Using uniform boundedness of JS on C and the
inequality in (10.23) it follows that
Z n
o2
kIIc k .
dG(x)
ψα̂n α̂Tn x − ψ̂nα̂n α̂Tn x
= Op ((log n)2 n−2/3 ) = op (n−1/2 )
uniformly in β ∈ C. We conclude that (10.24) can be written as
Z n
o n
o
T
φn (β̂n ) = JS (β̂n )
x − E X|S(β̂n )T x
y − ψ̂nα̂n S(β̂n )T x
dPn (x, y)
+ op n−1/2 + (β̂n − β0 )
Z n
o n
o
T
= JS (β̂n )
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
dPn (x, y)
Z n
o n
o
+ JS (β̂n )T
x − E X|S(β̂n )T x
ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x
dPn (x, y)
+ op n−1/2 + (β̂n − β0 )
= Ia + Ib + op n−1/2 + (β̂n − β0 ) .
(10.27)
We show below that Ib = op n−1/2 + (α̂n − α0 ) such that the limiting distribution of the score estimator
follows from the analysis of the term Ia which can be rewritten as
Z n
o n
o
T
Ia = JS (β̂n )
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
d(Pn − P0 )(x, y)
Z n
o n
o
dP0 (x, y)
(10.28)
+ JS (β̂n )T
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
27
where we recall that ψα (u) = E ψ0 (αT X|αT X = u . For the second term on the right-hand side of (10.28)
we have by (10.26)
Z n
o
o n
T
dP0 (x, y)
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
JS (β̂n )
(
Z
T
= − JS (β0 )T ψ00 S(β0 )T x x − E X|S(β0 )T x
x − E X|S(β0 )T x
dP0 (x, y)
)
× JS (β0 ) (β̂n − β0 )
+ op (β̂n − β0 ).
(10.29)
For the first term on the right-hand side of (10.28) we have that
Z n
o
o n
d(Pn − P0 )(x, y)
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
JS (β̂n )T
Z
= JS (β0 )T
x − E X|S(β0 )T x
y − ψ0 S(β0 )T x d(Pn − P0 )(x, y) + op (n−1/2 ) + op (β̂n − β0 ).
(10.30)
Indeed, since this amounts to showing that
T Z n
o n
o
A = JS (β̂n ) − JS (β0 )
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
d(Pn − P0 )(x, y)
= op (β̂n − β0 ),
Z
T
T
B=
E X|S(β̂n ) x − E X|S(β0 ) x (y − ψ0 (αT0 x))d(Pn − P0 )(x, y) = op (n−1/2 )
(10.31)
(10.32)
and
Z
C=
T
x − E X|S(β̂n ) x
ψ0 (αT0 x)
T
− ψα̂n S(β̂n ) x
d(Pn − P0 )(x, y) = op (n−1/2 ).
(10.33)
We start by proving (10.31). Using again that u 7→ E Xi |S(β̂n )T X = u is a bounded function with a
uniformly bounded total variation, and that xi is a fixed (and deterministic) function, we can show that
the class of functions involved in A, FA say, satisfies FA ⊂ xi HRC1 v + HRC1 v with v and C1 are some
constants that are independent of n (since ψα , X and u 7→ E[X|αT X = u] are all bounded by constants
eRC v , k · kB,P . 1/ with
independent of n). Now it follows by Lemma 10.5 in Supplement B that HB , H
1
0
eRC v = (16M0 C1 )−1 HRC v and kh̃kB,P . C2 for some constant C2 > 0 that is independent of n for all
H
1
1
0
eRC v . Hence, using arguments similar to those of the proof of IIa = op (n−1/2 ) we can show that
h̃ ∈ H
1
Z n
o n
o
x − E X|S(β̂n )T x
y − ψα̂n S(β̂n )T x
d(Pn − P0 )(x, y) = Op (n−1/2 ).
Using a Taylor expansion of JS (β) around β0 gives the desired rate in (10.31).
Now we turn to term B in (10.32). Fix ν > 0 and i ∈ {1, . . . , d}. Using consistency of β̂n and Lemma
10.11 in Supplement C, then for all η > 0 there exists n large enough such that
E Xi |S(β̂n )T x − E Xi |S(β0 )T x ≤ η,
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
28
with probability at least 1 − ν/2. Thus, for L > 0 we have that for n large enough
P (|Bi | > Ln−1/2 )
Z
T
T
T
−1/2
>
Ln
=P
E Xi |S(β̂n ) x − E Xi |S(β0 ) x (y − ψ0 (α0 x))d(Pn − P0 )(x, y)
1
E[kGn kF 0 ], where F 0 is defined in (10.49)
L
C1
η for some constant C1 > 0,
≤ ν/2 +
L
≤ ν/2 +
where Bi denotes the ith component of B defined in (10.32) and where we have used the result of Lemma
10.8. Choosing η such that η ≤ νLC1−1 /2 gives the claimed rate of convergence in (10.32).
To establish the convergence rate of C, we first note that, for i ∈ {1, . . . , d}, we have that x 7→
E(Xi |S(β̂n )T X = S(β̂n )T x)ψα̂n (S(β̂n )T x) belongs to the class GRC1 − GRC1 for some constant C1 > 0 where
GRK was defined in (10.40). This follows from using again the fact that the function u 7→ E Xi |S(β)T X = u
is uniformly bounded and has a uniform total variation for all β ∈ C, that ψα is a bounded monotone function, and the fact that (f1 − f2 )f3 is a bounded function with bounded total variation for any increasing and
bounded functions f1 , f2 and f3 , where we again use Lemma 10.13 in Supplement C to write the function
u 7→ E Xi |S(β)T X = u as the difference f1 − f2 . Note now that both x 7→ xi and x 7→ ψ0 (S(β0 )T x) are
fixed and bounded functions, and that the order bracketing entropy of a class does not get altered after multiplication its members by such functions (similarly for addition). It follows from Lemma 10.3 and Lemma
10.4 in Supplement B, that the -bracketing entropy of the class of functions involved in term C with respect
to k · kP0 is bounded above by B/ for some constant B.
Furthermore, using consistency of α̂n and Lemma 10.11 of Supplement C, we can find for any fixed ν > 0
an η > 0 such that supx |ψ0 (αT0 x) − ψα̂n (α̂Tn x)| ≤ η with probability at least 1 − ν/2 for n large enough.
Hence, at the cost of increasing the constant B, both the k · k∞ and k · kP0 norms of the functions of the
class involved in term C are bounded above by Bη. Using Markov’s inequality and Lemma 3.4.2 of [23] it
follows that for all L > 0
P (|Ci | > Ln−1/2 )
Z
xi − E Xi |S(β̂n )T x
ψ0 (S(β0 )T x) − ψα̂n S(β̂n )T x d(Pn − P0 )(x, y) ≥ Ln−1/2
=P
1
Jn (Bη)
1
B1 1
√
≤ ν/2 + Jn (Bη) 1 + Bη √ 2 2 ≤ ν/2 +
B1 η 1/2 +
≤ν
L
L
B n
nB η
taking η small enough and n large enough. We conclude that C = op (n−1/2 ). Now we come back to term Ib
given by
Z n
o n
o
T
Ib = JS (β̂n )
x − E X|S(β̂n )T x
ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x
dPn (x, y).
Note first that
Ib = JS (β̂n )T
Z n
o n
o
x − E X|S(β̂n )T x
ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x
d(Pn − P0 )(x, y)
= JS (β̂n )T Ib0 ,
(10.34)
since
Z n
o n
o
x − E X|S(β̂n )T x
ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x dP0 (x, y)
h
i
= E X − E X|S(β̂n )T X
ψα̂n S(β̂n )T X − ψ̂nα̂n S(β̂n )T X
i
h h
i
= E E X − E X|S(β̂n )T X |S(β̂n )T X ψα̂n S(β̂n )T X − ψ̂nα̂n S(β̂n )T X
= 0.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
29
Let Fb denote the class of functions involved in term Ib0 defined in (10.34), where in the definition of this class
we consider the event where ψ̂nα̂n is bounded. Given the arguments used recurrently above we can directly
state that the -bracketing entropy of this class is no larger than A1 log n/ for some constant A1 > 0 with
increasing probability. Also, the k · k∞ and k · kP0 norms of the members of the class Fb are respectively
bounded above with increasing probability by A1 log n and A1 log n n−1/3 = ηn at the cost of taking a larger
A1 . For a fixed ν > 0 and L > 0 we have for i ∈ {1, . . . , d},using Lemma 3.4.2 of [23],
Z n
o n
o
xi − E Xi |S(β̂n )T x
ψα̂n S(β̂n )T x − ψ̂nα̂n S(β̂n )T x
d(Pn − P0 )(x, y) > Ln−1/2
P
!
1/2
A2
A2 (log n)1/2 ηn
1/2 1/2
√ 2
≤ ν/2 +
(log n) , for some constant A2 > 0
(log n) ηn
1+
L
nηn
!
A2
A2 (log n)3/2
1/2 1/2
≤ ν/2 +
(log n) ηn
1 + √ 3/2
, for some constant A2 > 0
L
nηn
!
A2
A2
−1/6
(log n)n
. ν/2 +
1 + 3/2 ≤ ν,
L
A
1
for n large enough. This implies that Ib = op (n−1/2 ). We conclude by (10.29), (10.30), (10.31), (10.32),
(10.33) and Definition (10.18) that,
Z
T
B β̂n − β0 = (JS (β0 )) x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)
+ op n−1/2 + kβ̂n − β0 k ,
where
h
i
T
B = (JS (β0 )) E ψ00 (S(β0 )T X) Cov(X|S(β0 )T X) (JS (β0 )) .
We get,
Z
√
√
T
n β̂n − β0 = nB −1 (JS (β0 )) x − E(X|S(β0 )T x) y − ψ0 S(β0 )T x d Pn − P0 (x, y)
√
+ op 1 + nkβ̂n − β0 k
→d N (0, Π),
where
T
Π = B −1 (JS (β0 )) Σ JS (β0 ) B −1 ∈ R(d−1)×(d−1) .
The asymptotic limiting distribution of the single index score estimator α̂n now follows by an application of
the Delta method and we conclude that
√
√
√
T
n(α̂n − α0 ) = JS (β0 ) n(β̂n − β0 ) + op
n(β̂n − β0 ) →d Nd 0, JS (β0 )Π (JS (β0 )) .
Finally, the result of Theorem 4.1 follows by Lemma 4.1. This completes the proof.
Acknowledgements
The research of the third author was supported by the Research Foundation Flanders (FWO) [grant number
11W7315N]. Support from the IAP Research Network P7/06 of the Belgian State (Belgian Science Policy) is
gratefully acknowledged. For the simulations we used the infrastructure of the VSC - Flemish Supercomputer
Center, funded by the Hercules Foundation and the Flemish Government - department EWI.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
30
References
[1] Balabdaoui, F., Durot, C. and Jankowski, H. (2016). Least squares estimation in the monotone
single index model. arXiv preprint arXiv:1610.06026.
[2] Balabdaoui, F., Groeneboom, P. and Hendrickx, K. (2017a). Score estimation in the monotone
single index model: supplement. working paper.
[3] Balabdaoui, F., Groeneboom, P. and Hendrickx, K. (2017b). Score estimation in the monotone
single index model. working paper.
[4] Barlow, R. E., Bartholomew, D. J., Bremner, J. M. and Brunk, H. D. (1972). Statistical
inference under order restrictions. The theory and application of isotonic regression. John Wiley &
Sons, London-New York-Sydney Wiley Series in Probability and Mathematical Statistics. MR0326887
(48 ##5229)
[5] Cavanagh, C. and Sherman, R. P. (1998). Rank estimators for monotonic index models. J. Econometrics 84 351–381. MR1630210
[6] Cosslett, S. R. (1987). Efficiency bounds for distribution-free estimators of the binary choice and the
censored regression models. Econometrica 55 559–585. MR890854 (88e:62087)
[7] Cosslett, S. R. (2007). Efficient estimation of semiparametric models by smoothed maximum likelihood. Internat. Econom. Rev. 48 1245–1272. MR2375624
[8] Delecroix, M., Härdle, W. and Hristache, M. (2003). Efficient estimation in conditional singleindex regression. Journal of Multivariate Analysis 86 213–226.
[9] Duan, N. and Li, K.-C. (1991). Slicing regression: a link-free regression method. The Annals of Statistics 505–530.
[10] Groeneboom, P. and Hendrickx, K. (2017). Current status linear regression. To appear in Annals
of Statistics, available at https://arxiv.org/abs/1601.00202.
[11] Groeneboom, P. and Jongbloed, G. (2014). Nonparametric Estimation under Shape Constraints.
Cambridge Univ. Press, Cambridge.
[12] Han, A. K. (1987). Non-parametric analysis of a generalized regression model: the maximum rank
correlation estimator. Journal of Econometrics 35 303–316.
[13] Härdle, W., Hall, P. and Ichimura, H. (1993). Optimal smoothing in single-index models. Ann.
Statist. 21 157–178. MR1212171 (94d:62134)
[14] Härdle, W. and Stoker, T. M. (1989). Investigating smooth multiple regression by the method of
average derivatives. Journal of the American statistical Association 84 986–995.
[15] Hooke, R. and Jeeves, T. A. (1961). “Direct Search”Solution of Numerical and Statistical Problems.
Journal of the ACM (JACM) 8 212–229.
[16] Ichimura, H. (1993). Semiparametric least squares (SLS) and weighted SLS estimation of single-index
models. Journal of Econometrics 58 71–120.
[17] Klein, R. W. and Spady, R. H. (1993). An efficient semiparametric estimator for binary response
models. Econometrica 61 387–421. MR1209737 (93k:62214)
[18] Kuchibhotla, A. K. and Patra, R. K. (2016). Efficient Estimation in Single Index Models through
Smoothing splines. available at https://arxiv.org/abs/1612.00068.
[19] Sherman, R. P. (1993). The limiting distribution of the maximum rank correlation estimator. Econometrica 61 123–137. MR1201705
[20] Tanaka, H. (2008). Semiparametric least squares estimation of monotone single index models and its
application to the iterative least squares estimation of binary choice models Technical Report.
[21] Torczon, V. (1997). On the convergence of pattern search algorithms. SIAM J. Optim. 7 1–25.
MR1430554
[22] van der Vaart, A. W. (1998). Asymptotic statistics. Cambridge Series in Statistical and Probabilistic
Mathematics 3. Cambridge University Press, Cambridge. MR1652247 (2000c:62003)
[23] van der Vaart, A. W. and Wellner, J. A. (1996). Weak convergence and empirical processes.
Springer Series in Statistics. Springer-Verlag, New York. With applications to statistics. MR1385671
(97g:60035)
[24] Xia, Y. and Härdle, W. (2006). Semi-parametric estimation of partially linear single-index models.
Journal of Multivariate Analysis 97 1162–1184.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
31
Score estimation in the single index model: supplement
We give the proofs of the remaining results given in the main manuscript that were not considered in
Section 10 of [3] together with additional technical lemmas needed for proving our main results.
Supplement A: Asymptotic normality of the efficient score estimator
In this section we prove (iii) of Theorem 5.1 on the asymptotic normality of the efficient score estimator
α̃n . The proofs of existence and consistency of α̃n , given in (i) and (ii) of Theorem 5.1 follow the same lines
as the corresponding proofs for the simple score estimator α̂n given in Sections 10.2.1 and 10.2.1 and are
omitted.
Proof of asymptotic normality: Let τi denote the sequence of jump points of the monotone LSE ψ̂nα .
We introduce the piecewise constant function ρ̄n,β defined for u ∈ [τi , τi+1 ) as
0
(τi )
if ψα (u) > ψ̂nα (τi ) for all u ∈ (τi , τi+1 ),
E[X|S(β)T X = τi ]ψα
T
0
ρ̄n,β (u) =
E[X|S(β) X = s]ψα (s)
if ψα (s) = ψ̂nα (s) for some s ∈ (τi , τi+1 ),
0
E[X|S(β)T X = τi+1 ]ψα
(τi+1 ) if ψα (u) < ψ̂nα (τi ) for all u ∈ (τi , τi+1 ).
We can write,
ξnh (β̃n )
Z n
o n
o
0
0
xψ̃nh,α
S(β̃n )T x − E X|S(β̃n )T x ψα̃
S(β̃n )T x
y − ψ̂nα̃n S(β̃n )T x
dPn (x, y)
n
Z n
o n
o
0
T
T
T
+ JS (β̃n )T
E X|S(β̃n )T x ψα̃
S(
β̃
)
x
−
ρ̄
S(
β̃
)
x
y
−
ψ̂
S(
β̃
)
x
dPn (x, y)
n
n
n
α̃
n
n
n,β̃n
n
= JS (β̃n )T
= J + JJ,
(10.35)
using,
Z
n
o
ρ̄n,β̃n S(β̃n )T x y − ψ̂nα̃n S(β̃n )T x
dPn (x, y) = 0.
The term JJ can be written as
Z n
o
T
T
0
S(
β̃
)
x
−
ρ̄
S(
β̃
)
x
JJ = JS (β̃n )T
E X|S(β̃n )T x ψα̃
n
n
n,β̃n
n
n
o
· y − ψ̂nα̃n S(β̃n )T x
d(Pn − P0 )(x, y)
Z n
o
0
T
T
+ JS (β̃n )T
E X|S(β̃n )T x ψα̃
S(
β̃
)
x
−
ρ̄
S(
β̃
)
x
n
n
n,β̃n
n
n
o
· y − ψα̃n S(β̃n )T x
dP0 (x, y)
Z n
o
0
T
T
+ JS (β̃n )T
E X|S(β̃n )T x ψα̃
S(
β̃
)
x
−
ρ̄
S(
β̃
)
x
n
n
n,β̃n
n
n
o
· ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x
dP0 (x, y)
= JJa + JJb + JJc ,
(10.36)
0
0
We first note that by Assumption A10, the functions u 7→ ψα
(u) := ψS(β)
(u) are uniformly bounded and
have a total variation that is uniformly
bounded
for
all
β
∈
C.
This
also
implies,
using Lemma 10.12, that the
0
functions u 7→ E Xi |S(β)T X = u ψα
(u) have a bounded variation for all β ∈ C. Using the same arguments
as those for term IIa defined in (10.25) in the proof of Theorem 4.1, it easily follows that,
JJa = op (n−1/2 ).
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
32
0
We next consider the term JJb . By Lemma 10.14 we know that ψα
stays away from zero for all S(β) in a
neighborhood of S(β0 ). Using the same techniques as in [11], we can find a constant K > 0 such that for all
i = 1, . . . , d and u ∈ Iα ,
0
(10.37)
E Xi |S(β)T X = u ψα
(u) − ρ̄ni,β (u) ≤ K ψα (u) − ψ̂nα (u) ,
0
where ρ̄ni,β denotes the ith component of ρn,β . This implies that the difference E Xi |S(β)T X = u ψα
(u) −
ρ̄ni,β (u) converges to zero for all u ∈ Iα . Using Lemma 10.9 and a Taylor expansion of β 7→ ψα S(β)T x
we get,
ψα S(β)T x = ψ0 S(β0 )T x + (β − β0 )T JS (β0 )T x − E(X|S(β0 )T X = S(β0 )T x) ψ00 S(β0 )T x
+ o(β − β0 ),
such that
Z n
o
0
S(β̃n )T x − ρ̄n,β̃n S(β̃n )T x
E X|S(β̃n )T x ψα̃
n
n
o
· ψ0 S(β0 )T x − ψα̃n S(β̃n )T x
dP0 (x, y)
= op β̃n − β0 .
JJb = JS (β̃n )T
For the therm JJc , we get by an application of the Cauchy-Schwarz inequality together with the uniform
boundedness of JS , Proposition 3.2 and (10.37) that,
!1/2
Z n
o2
T
T
0
T
T
JJc ≤ JS (β̃n )
E X|S(β̃n ) x ψα̃n S(β̃n ) x − ρ̄n,β̃n S(β̃n ) x
dP0 (x, y)
·
!1/2
Z n
o2
T
T
ψα̃n S(β̃n ) x − ψ̂nα̃n S(β̃n ) x
dP0 (x, y)
Z n
o2
.
ψα̃n α̃Tn x − ψ̂nα̃n α̃Tn x
dG(x) = Op (log n)2 n−2/3 = op (n−1/2 ).
We conclude that (10.35) can be written as
ξnh (β̃n )
Z n
o
0
T
T
0
T
= JS (β̃n )
xψ̃nh,
α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x
n
o
· y − ψ̂nα̃n S(β̃n )T x
dPn (x, y)
+ op n−1/2 + (β̃n − β0 )
T
Z n
o
0
T
T
0
T
xψ̃nh,
S(
β̃
)
x
−
E
X|S(
β̃
)
x
ψ
S(
β̃
)
x
n
n
n
α̃n
α̃n
n
o
· y − ψα̃n S(β̃n )T x
dPn (x, y)
Z n
o
0
T
T
0
T
+ JS (β̃n )T
xψ̃nh,
α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x
n
o
· ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x
d(Pn − P0 )(x, y)
Z n
o
0
T
T
0
T
+ JS (β̃n )T
xψ̃nh,
α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x
n
o
dP0 (x, y)
· ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x
+ op n−1/2 + (β̃n − β0 )
= Ja + Jb + Jc + op n−1/2 + (β̃n − β0 ) .
(10.38)
= JS (β̃n )T
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
33
We first consider the term
A10, Lemma 10.12 and Lemma 10.15 we get that the functions
0Jb . By Assumption
0
u 7→ E X|S(β)T x = u ψα̃
(u)
and
u
→
7
ψ̃
nh,α̃n (u) have a uniformly bounded total variation for all β ∈ C.
n
Using similar arguments as for the term Ib defined in (10.27) we get for A > 0 and ν > 0 that
P (|Jb | ≥ An−1/2 ) ≤ ν,
for n large enough and we conclude that Jb = op (n−1/2 ). For the term Jc we get,
Z n
o
T
0
T
Jc = JS (β̃n )
x − E X|S(β̃n )T x ψ̃nh,
α̃n S(β̃n ) x
n
o
· ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x
dP0 (x, y)
Z n
o
T
T
0
0
E X|S(β̃n )T x
ψ̃nh,
+ JS (β̃n )T
α̃n S(β̃n ) x − ψα̃n S(β̃n ) x
n
o
· ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x
dP0 (x, y)
Z n
o
0
T
0
T
ψ̃nh,
= JS (β̃n )T
E X|S(β̃n )T x
α̃n S(β̃n ) x − ψα̃n S(β̃n ) x
n
o
· ψα̃n S(β̃n )T x − ψ̂nα̃n S(β̃n )T x
dP0 (x, y)
Furthermore, let Hβ be the distribution function of the random variable S(β)T X and let E(X|u) denote the
conditional expectation of X given S(β)T X = u, then
Z n
o
n
o
0
0
(u)
E
(X|u)
ψ
ψ̃nh,
(u)
−
ψ
(u)
−
ψ̂
(u)
dHβ̃n (u)
α̃
n
α̃
α̃n
α̃n
n
n
Z Z
n
o
1
0
(u)
E
(X|u)
ψ
(u)
−
ψ̂
(u)
dHβ̃n (u)
=
K ({u − v}/h) dψ̂nα̃n (v) − ψα̃
α̃
n
α̃
n
n
n
h
Z Z
o
o
n
n
1
0
(u)
−
ψ̂
(u)
dHβ̃n (u)
=
(v)
dv
E
(X|u)
ψ
K
({u
−
v}/h)
ψ̂
(v)
−
ψ
α̃
n
α̃
α̃
n
α̃
n
n
n
n
h2
Z Z
n
o
1
0
0
+
K ({u − v}/h) ψα̃
(v)
dv
−
ψ
(u)
E
(X|u)
ψ
(u)
−
ψ̂
(u)
dHβ̃n (u).
α̃
n
α̃
α̃
n
n
n
n
h
The last term on the right hand side is Op n−2/7−1/3 = op n−1/2 . This follows by an application of the
Cauchy-Schwarz inequality since
)1/2
(Z Z
2
1
0
0
K ({u − v}/h) ψα̃n (v) dv − ψα̃n (u)
dHβ̃n (u)
= Op n−2/7 ,
h
and
Z
1/2
2
ψα̃n (u) − ψ̂nα̃n (u) dHβ̃n (u)
= Op n−1/3 .
The first term on the right hand side is Op n1/7−2/3 = op n−1/2 using that for small h
Z Z
n
o
n
o
1
0
K
({u
−
v}/h)
ψ̂
(v)
−
ψ
(v)
dv E (X|u) ψα̃n (u) − ψ̂nα̃n (u) dHβ̃n (u)
nα̃n
α̃n
2
h
Z
2
1
.
ψα̃n (u) − ψ̂nα̃n (u) dHβ̃n (u).
h
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
34
We conclude that (10.38) can be written as,
Z n
o
T
T
T
0
0
T
xψ̃nh,
ξnh (β̃n ) = JS (β̃n )
α̃n S(β̃n ) x − E X|S(β̃n ) x ψα̃n S(β̃n ) x
n
o
· y − ψα̃n S(β̃n )T x
dPn (x, y) + op n−1/2 + (β̃n − β0 )
Z n
o n
o
T
0
T
0
T
= JS (β̃n )
x ψ̃nh,
y − ψα̃n S(β̃n )T x
d(Pn − P0 )(x, y)
α̃n S(β̃n ) x − ψα̃n S(β̃n ) x
Z n
o n
o
T
T
0
0
y − ψα̃n S(β̃n )T x
dP0 (x, y)
+ JS (β̃n )T x ψ̃nh,
α̃n S(β̃n ) x − ψα̃n S(β̃n ) x
Z n
o
n
o
0
T
T
x − E X|S(β̃n )T x ψα̃
S(
β̃
)
+ JS (β̃n )T
x
y
−
ψ
S(
β̃
)
x
d(Pn − P0 )(x, y)
n
α̃
n
n
n
Z n
n
o
o
0
S(β̃n )T x y − ψα̃n S(β̃n )T x
dP0 (x, y)
x − E X|S(β̃n )T x ψα̃
+ JS (β̃n )T
n
+ op n−1/2 + (β̃n − β0 )
= JJJa + JJJb + JJJc + JJJd + op n−1/2 + (β̃n − β0 ) .
(10.39)
0
0
and ψ̃nh,α
We consider JJJa first and note that by Assumption A10 and Lemma 10.15, the functions ψα
have a uniformly bounded total variation. By an application of Lemma 10.13 we can write the difference
0
0
ψ̃nh,α
− ψα
as the difference of two monotone functions, say f1 , f2 ∈ MRC1 for some constant C1 > 0. This
implies that the class of functions
(
)
0
T
0
T
T
F1 = f (x, y) := {ψ̃nh,α S(β) x − ψα S(β) x }{y − ψα S(β) x }, (x, y, β) ∈ X × R × C ,
is contained in the class HRC1 v where v h−1 log nn−1/3 (See the proof of Lemma 10.15). By Lemma 10.5
and the fact that the order bracketing entropy of a class does not get altered after multiplication with the
fixed and bounded function x 7→ xi we get that the class of functions involved with the term JJJa , say Fa ,
satisfies
1
HB , Fa , k · kB,P0 .
and
kf kB,P0 . v
Using again an application of Markov’s inequality, together with Lemma 3.4.3 of [23] we conclude that for
A>0
P (|JJJa | > An−1/2 ) . v 1/2 = h−1/2 (log n)1/2 n−1/6 ,
which can be made arbitrarily small for n large enough and h n−1/7 . We conclude that
JJJa = op (n−1/2 ).
Using similar arguments as for the term JJb defined in (10.36) we also get,
JJJb = op β̃n − β0 .
The result of Theorem 5.1 follows by noting that, using the same techniques as for the term Ia in (10.30),
we get
Z
T
JJJc = (JS (β0 ))
x − E X|S(β0 )T x ψ00 S(β0 )T x y − ψ0 S(β0 )T x d(Pn − P0 )(x, y)
+ op (n−1/2 ) + op (β̂n − β0 ),
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
and that by a Taylor expansion of β 7→ ψα S(β)T x we get,
(
Z
2
T
JJJd = − (JS (β0 ))
ψ00 S(β0 )T x
· x − E X|S(β0 )T x
x − E X|S(β0 )T x
35
T
!
dP0 (x, y)
)
× JS (β0 ) (β̃n − β0 ) + op (β̃n − β0 ).
The rest of the proof follows the same line as the proof of asymptotic normality of the simple score estimator
defined in Theorem 4.1 and is omitted.
Supplement B: Entropy results
Lemma 10.2. Fix > 0, and consider F1 a class of functions defined on X × R bounded by some constant
A > 0 and equipped by the L2 norm k · kP0 with respect to P0 . Also, let F2 be another class of continuous
functions defined on a bounded set C ⊂ Rd−1 such that F2 is equipped by the supremum norm k · k∞ , and
bounded by some constant B > 0. Moreover assume that HB (, F1 , k · kP0 ) < ∞ and HB (, F2 , k · k∞ ) < ∞.
Consider
n
o
F = F1 F2 = f (x) = fβ (x, y) = f1 (x, y)f2 (β) : (x, y, β) ∈ X × R × C .
Then there exists some constant B > 0 such that
HB (, F, k · kP0 ) ≤ HB (B, F1 , k · kP0 ) + HB (B, F2 , k · k∞ ).
Proof. Let f = f1 f2 ∈ F for some pair (f1 , f2 ) ∈ F1 × F2 . For > 0 consider the (f1L , f1U ) and (f2L , f2U )
-brackets with respect to k · kP0 for f1 and f2 . Note that since F1 and F2 are bounded by M = max(A, B)
we can always assume that −M ≤ fiL ≤ fiU ≤ M for i ∈ {1, 2}. As we deal with a product of two functions,
construction of a bracket for f requires considering different sign cases for a given pair (x, β):
1.
2.
3.
4.
5.
6.
7.
8.
9.
0 ≤ f1L (x) and 0 ≤ f2L (β),
0 ≤ f1L (x), f2L (β) < 0 and f2U (β) ≥ 0,
f1L (x) ≤ 0, f1U (x) ≥ 0 and 0 ≤ f2L (β),
f U (x) ≤ 0, f L (β) ≥ 0,
f L (x) ≥ 0, f U (β) ≥ 0,
f1L (x) ≤ 0, f U (x) ≥ 0, f2L (β) ≤ 0 and f2U (β) ≥ 0,
f1L (x) ≤ 0, f U (x) ≥ 0 and f2U (β) ≤ 0,
f U (x) ≤ 0, f L (β) ≤ 0 and f U (β) ≥ 0,
f1U (x) ≤ 0 and f2U (β) ≤ 0.
We can assume without loss of generality that each one these cases occur for all x ∈ X and β ∈ C since the
general case can be handled by considering the 9 different subsets of X × C. In the proof, we will restrict
ourselves to making the calculations explicit for cases 1 and 2 since the remaining cases can be handled very
similarly. Then, f1L f2L ≤ f ≤ f1U f2U . Also, we have that
f1U f2U − f1L f2L = f1U − f1L f2U + f1L f2U − f2L .
Recall that M = max(A, B). Then, it follows that
Z
2
Z
2
f1U f2U − f1L f2L dP0 ≤ 2M
f1U − f1L dP0 (x) + kf2U − f2L k2∞
X
X
≤ 4M 2 .
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
36
This in turn implies that HB (, F, k · kP0 ) ≤ HB (C, F1 , k · kP0 ) + HB (C, F2 , k · k∞ ) with C = (2M )−1 . Now
we consider case 2. It is not difficult to show that
f2L f1U ≤ f ≤ f1U f2U .
Hence,
Z
f1U f2U − f2L f1U
2
dP0 ≤ A2 kf2U − f2L k2∞ ≤ A2 2
X
and we can take C = A−1 .
Lemma 10.3. Let F be a class of functions satisfying HB (, F, k · kP0 ) < ∞ for every ∈ (0, 0 ) for some
given 0 > 0. If D = F − F the class of all differences of elements of F, then
HB (, D, k · kP0 ) ≤ 2HB (/2, F, k · kP0 ).
Proof. Let ∈ (0, 0 ) and d = f2 − f1 denote an element in D with (f1 , f2 ) ∈ F 2 . Also, let (f1L , f1U ) and
(f2L , f2U ) -brackets for f1 and f2 . Define dL = f2L − f1U and dU = f2U − f1L . It is clear that (dL , dU ) is a
bracket for d. Furthermore, we have that
Z
2
dU (x, y) − dL (x, y) dP0 (x, y)
X
Z
Z
2
2
≤2
f1U (x, y) − f1L (x, y) dP0 (x, y) +
f2U (x, y) − f2L (x, y) dP0 (x, y)
X
X
≤ 42 .
Thus,
2
exp HB (2, D, k · kP0 ) ≤ exp HB (, F, k · kP0 ) ,
which is equivalent to the statement of the lemma.
Consider the class GRK defined as
n
o
GRK = g : g(x) = gα (x) = ψ(αT x), x ∈ X , (ψ, α) ∈ MRK × B(α0 , δ0 ) .
(10.40)
where MRK is the same class defined in (10.7).
Lemma 10.4. There exists A > 0 such that for ∈ (0, K) we have that
HB (, GRK , k · kP0 ) ≤
AK
.
Proof. See the proof of Lemma 4.9 in [1].
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
37
Lemma 10.5. For some constants C > 0 and δ > 0 consider the class of functions
n
o
2
DRCδ = d : d = f1,α − f2,α , (f1,α , f2,α ) ∈ GRC
, kd(αT ·)kP0 ≤ δ for all α ∈ B(α0 , δ0 ) .
Let HRCv be a class of functions such that
n
o
2
HRCv = h : h(x, y) = yd1 (αT x) − d2 (αT x), (x, y, α) ∈ X × R × B(α0 , δ0 ), (d1 , d2 ) ∈ DRCv
(10.41)
where C ≥ K0 ∨ 1. Then, for all ∈ (0, C) we have that
e k · kB,P ≤ HB C̃ −1 , HRCv , k · kP ≤ C̃C 1 ,
HB , H,
0
0
and that
kh̃kB,P0 . D̃−1 v,
where
0
A = A 2(a0 M0 + 1)
−1/2
1
, D̃ = 16M0 C and C̃ =
8M0
−1
1
2a0 + e(2M0 )
2
1/2
1
,
C
(10.42)
e def
with a0 , M0 the same constants from Assumption A6, A the same constant in Lemma 10.4, and H
=
HRCv D̃−1 .
U
L U
T
T
Proof. Consider (dL
1 , d1 ) and (d2 , d2 ) to be -brackets of the functions x 7→ d1 (α x) and x 7→ d2 (α x)
and some α ∈ B(α0 , δ0 ). It follows from Lemma 4.9 of [1] and Lemma 10.3 that there exists some constant
A > 0 such that
AC
HB , DRC , k · kP0 ≤
.
Define now
(
U
ydL
1 (x) − d2 (x), if y ≥ 0
hL (x, y) =
U
ydU
1 (x) − d2 (x), if y < 0
and
(
L
ydU
1 (x) − d2 (x), if y ≥ 0
h (x, y) =
L
ydL
1 (x) − d2 (x), if y < 0.
U
Note first that (hL , hU ) is a bracket for h(x, y) = yd1 (αT x) − d2 (αT x). Next we compute the size of this
bracket with respect to k · kP0 . We have that
Z
Z
2
nZ
2
2
o
L
L
hU (x, y) − hL (x, y) dP0 (x, y) ≤ 2
y 2 dU
(x)
−
d
(x)
dP
(x,
y)
+
dU
0
1
1
2 (x) − d2 x) dG(x)
X ×R
X ×R
Z
Z X
n
2
2
o
U
L
L
= 2 2a0
d1 (x) − d1 (x) dG(x) +
dU
(x)
−
d
x)
dG(x)
2
2
X
X
2
≤ 2 2a0 + 1 ,
where a0 is the same constant of Assumption A6. It follows that
ÃC
HB , H, k · kP0 ≤
,
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
38
−1/2
with à = A 2(2a0 + 1)
and A is the same constant of Lemma 10.4. Let now D > 0 be some constant
to be determined later. For a given h ∈ HRK 2 v , we consider h̃ = D−1 h which admits [D−1 hL , D−1 hU ] as
bracket. We will compute the size of this bracket with respect to the Bernstein norm. By definition of the
latter we can write for any function h such that hk is P0 integrable that
khk2B,P0 = 2
∞
X
1 k
|h| dP0 .
k!
k=2
Thus, using this and convexity of the function x 7→ |x|k for all k ≥ 2 it follows that
Z
∞
X
k
1
L
U
L
y dU
kD−1 hU − D−1 hL k2B,P0 = 2
1 (x) − d1 (x) + d2 (x) − d2 (x) dP0 (x, y)
k
k!D X ×R
k=2
Z
Z
∞
X 2k−1
k
k
k U
L
U
L
≤2
|y|
d
(x)
−
d
(x)
dP
(x,
y)
+
d
(x)
−
d
(x)
dP
(x,
y)
.
0
0
1
1
2
2
k!Dk
X ×R
X ×R
k=2
2
U
Using Assumption A7 and the fact that |dL
i | ≤ K and |di | ≤ 2C for i ∈ {1, 2} (an assumption that one can
always make in constructing brackets for a bounded class) we can write
k
Z
∞
X
2
1 2
L
a0 M0k−2 k!(4C)k−2
dU
kD−1 hU − D−1 hL k2B,P0 ≤
1 (x) − d1 (x) dP0 (x, y)
k! D
X
k=2
Z
2
L
+(4C)k−2
dU
(x)
−
d
(x)
dP
(x,
y)
0
1
1
X
k−2
∞
X
1 8C
=
a0
+
2
D
k! D
k=2
k=2
k
k
2 X
∞
∞
X
1 8C
8M0 C
1
2
a0
+
2 , using k! ≥ 2(k − 2)!.
≤
D
D
2
k! D
2
D
2
k−2
∞
X
8M0 C
k=0
k=0
Taking D = D̃ = 16M0 C yields
kD̃−1 hU − D̃−1 hL k2B,P0 ≤
2
D̃
2
−1
1
2a0 + e(2M0 )
2 ,
2
which in turn implies that
kD̃−1 hU − D̃−1 hL kB,P0 ≤
1
8M0
1/2
−1
1
1
.
2a0 + e(2M0 )
2
C
e with D̃ defined as above.
This completes the proof of the first claim about the entropy bound of the class H
e
Now for a given element h̃ ∈ H we calculate
Z
∞
X
1 1
k
2
kh̃kB,P0 = 2
yd1 (αT x) − d2 (αT x) dP0 (x, y)
k
k!
D̃
X ×R
k=2
Z
∞
n
o
k−1
X2
1
k
k
k
≤ 2
y d1 (αT x) + d2 (αT x) dP0 (x, y)
D̃k k! X ×R
k=2
Z
Z
∞
X
2k−1 1
2
2
≤ 2
(2C)k−2 a0 M0k−2 k!
d1 (αT x) dP0 (x, y) +
d2 (αT x) dP0 (x, y)
D̃k k!
X ×R
X ×R
k=2
k−2 X
k−2 )
2 ( X
∞
∞
8M0 C
1 8C
2
≤
a0
+
v 2 using the definition of the class
k! D̃
D̃
D̃
k=2
k=2
2
−1
2
1
≤
2a0 + e(2M0 )
v 2 using arguments as above,
2
D̃
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
39
implying that
1/2
−1
1
1
kh̃kB,P0 ≤ 2 2a0 + e(2M0 )
v . D̃−1 v,
2
D̃
as claimed.
Recall that X is the support of the covariates Xi , i = 1, . . . , n. Let us denote by Xj , j = 1, . . . , d the set
of the j-th projection of x ∈ X . Also, consider some function s that d − 1 times continuously differentiable
on a convex and bounded set C ∈ Rd−1 with a nonempty interior such that there exists M > 0 satisfying
max sup |Dk s(β)| ≤ M
(10.43)
k.≤d−1 β∈C
where k = (k1 , . . . , kd ) with kj an integer ∈ {0, . . . , d − 1}, k. =
Dk ≡
Pd−1
i=1
ki and
∂ k. s(β)
.
∂βk1 . . . ∂βkd
Consider now the class
n
o
QjRC = qj (x, y) = s(β)xj (y − ψ(αT x)), (α, β, ψ) ∈ B(α0 , δ0 ) × C × MRC and (xj , y) ∈ Xj × ∈ R (10.44)
.
Define
n
o
ejRC = q̃j : q̃j = qj D̃−1 , qj ∈ QRC ,
Q
where D̃ > 0 is some appropriate constant.
1/2
Lemma 10.6. Let ∈ (0, 1) and C ≥ max(1, 2M0 , M e−1/4 2−1/2 R−1 , 2a0 e−1/2 ). Then, there exist some
constant B1 > 0 and B2 depending on a0 , M0 , and R such that
ejRC , k · kB,P ≤ B1 C , kq̃j kB,P ≤ B2 ,
HB , Q
0
0
if D̃ = 8M RC where a0 and M0 are the same positive constants in Assumption A6, and M is from (10.43).
Proof. Fix j ∈ {1, . . . , d}. The proof of this lemma uses similar techniques as in showing Lemma 10.5. Let
(g L , g U ) be -brackets for the class GRC . Using the result of Lemma 10.4 we know that there are at most
N ≤ exp(AC/) such brackets covering GRC for some constant A > 0. Define
xj (y − g L (x)), xj (y − g U (x)) , if xj ≥ 0
k L (x, y), k U (x, y) =
(10.45)
xj (y − g U (x)), xj (y − g L (x)) , if xj < 0 .
Then, the collection of all possible pairs (q L , q U ) form brackets for the class of functions
n
o
KjRC ≡ kj (x, y) = xj (y − ψ(αT x)), (α, ψ) ∈ B(α0 , δ0 ) × MRC and (xj , x, y) ∈ Xj × X × R .
Furthermore we have that
U
kk −
k L k2P0
Z
2
x2j g U (x) − g L (x) dG(x)
X
Z
2
g U (x) − g L (x) dG(x) ≤ R2 2 .
≤ kxk22
=
X
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
40
This implies that
ARC
HB , KjRC , k · kP0 ≤
,
where A is the same constant of Lemma 10.4. Furthermore, the assumption in (10.43) implies that the
d−1
function s belongs to CM̃
as defined in Section 2.7 in [23], with M̃ = 2M . Using now Theorem 2.7.1 of [23]
it follows that there exists some constant B > 0 such that
d/(d−1)
B
1
d−1
log N , CM̃
≤ .
, k · k∞ ≤ B
This also implies that
2B
d−1
d−1
HB , CM̃
, k · k∞ = log N /2, CM̃
.
, k · k∞ ≤
d−1
d−1
Indeed, for an arbitrary s ∈ CM̃
there exists si , i ∈ {1, . . . , N }, with N = N /2, CM̃
, k · k∞ , such that
d−1
ks − si k∞ ≤ /2. The claim follows from noting that (si − /2, si + /2) is an -bracket for CM̃
with respect
to k · k∞ . Using Lemma 10.2 it follows that there exists some constant L > 0 such that
2LC
1 C
+
,
(10.46)
≤
HB , QjRC , k · kP0 ≤ L
using that C ≥ 1, d − 1 ≥ 1 and ∈ (0, 1). Consider now a constant D > 0, and (q L , q U ) and -bracket. From
the proof of Lemma 10.2 we know that we can restrict attention to the case for example to case 1 assumed to
occur for all (x, β) ∈ X × C. In such that we have q L = sL k L and q U = sU k U where (sL , sU ) is an -bracket
1
for CM̃
equipped with k · k∞ , where the expression of (k L , k U ) is given in (10.45). We can now write
kD−1 q U − D−1 q L k2B,P0
=
≤
Z
∞
X
1 1
k
sU k U − sL k L dP0
k! Dk X ×R
k=2
Z
∞
X
2k 1
L U
L k
U
U
L k
dP0
s k −k | + k s −s
k! Dk X ×R
2
k=2
with
Z
sU k U − k L
X ×R
k
dP0 ≤ M k (2RC)k−2
Z
2
k U − k L dP0 = M 2 (2M CR)k−2 2
X ×R
where we used the fact that |s| ≤ M by assumption of the lemma (implying that we can constructs brackets
(sL , sU ) satisfying the same property), and k U − k U = xj (g U − g L ) ≤ 2RC. Also, if we assume without loss
of generality that xj ≥ 0 is satisfied for all x ∈ X we have that
Z
Z
L U
L k
k−2
k s −s
dP0 ≤ (2M )
xj (y − g L (x))|k dP0 (x, y) × 2
X ×R
X ×R
Z
n
o
k
k−2 k k−1
≤ (2M )
R 2
|y|k + g L (x)
dP0 (x, y) × 2
X ×R
≤ (2M )k−2 Rk 2k−1 a0 M0k−2 k! + C k 2 .
Putting these inequalities together and after some algebra we get
kD−1 q U − D−1 q L k2B,P0
!
2
2
2
1 2M
2RC
2R
1
4M CR/D
8M CR/D
≤
e
+
e
+ 2a0
) 2 .
2
D
D
D
1 − 8M M0 R/D
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
41
Now let us choose D̃ = D ≥ max(16M M0 R, 8M RC). In particular, we can assume that C is large enough
so that max(16M M0 R, 8M RC) = 8M RC = D̃ (or equivalently C ≥ 2M0 ). Then, 4M CR/D̃ = 1/2,
8M CR/D̃ = 1/4, and 8M M0 R/D̃ = M0 /C ≤ 1/2. Therefore,
2
2
2 !
2RC
2R
1 2M
−1 U
−1 L 2
1/2
kD̃ q − D̃ q kB,P0 ≤
e +
e + 4a0
2
2
D̃
D̃
D̃
1
2
=
2M 2 e1/2 + 4R2 e C 2 + 16a0 R2
D̃2
ÃC 2 2
Ã
=
2 ,
≤
2
64M 2 R2
D̃
if C is large enough, where à = 2M 2 e1/2 + 4R2 e + 16a0 R2 . It follows that we can find some constant L̃ > 0
such that
kD̃−1 q U − D̃−1 q L kB,P0 ≤ L̃.
This in turn implies that
e jRC , k · kB,P ≤ HB , QjRC , k · kP . 2M C ,
HB L̃, Q
0
0
using (10.46). Hence, we can find a constant B1 > 0 such that
e jRC , k · kB,P ≤ B1 C .
HB , Q
0
Now we turn to computing an upper bound for kq̃j kB,P0 . We have
kq̃j k2B,P0
=
≤
Z
∞
X
k
1 −k
D
|s(β)|k xj y − ψ(αT x) dP0 (x, y)
k!
X ×R
k=2
Z
∞
n
o
X 1
k
k
y + ψ(αT x) dP0 (x, y)
2k D−k (RM )k
k!
X ×R
2
k=2
∞
X
1 k −k
2 D (RM )k a0 M0k−2 k! + C k
k!
k=2
2 ∞
k−2
2 X
k−2
∞
1
2M R X 2RM M0
1 2M RC
2RM C
≤ a0
+
D
D
2
D
(k − 2)!
D
k=2
k=2
2 X
∞
k
2 ∞
k
1
1
1 1 X 1 1
≤ a0
+
2C
4
2 2
k! 2
k=0
k=0
2
2
1
3 1 1
≤ a0
+
e1/2
if D = 4M RC and C ≥ max(1, 2M0 ).
2C
4 2 2
≤
The proof of the lemma is complete if we write B2 = (3a0 /16 + e1/2 /8)1/2 .
In the next lemma, we consider a given a class of functions F which admits a bounded bracketing entropy
with respect to k · kP0 for ∈ (0, 1]. Suppose also that there exists D > 0 such that kf k∞ ≤ D and δ > 0
such that kf kP0 ≤ δ for all f ∈ F. Then we can derive an upper bound for the bracketing entropy for the
class
n
o
Fe =
f˜ : f˜(x, y) = (4M0 D)−1 f (x) y − λψ0 (αT0 x) , (x, y) ∈ X × R and f ∈ F
(10.47)
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
42
with respect to the Bernstein norm. Here, M0 is the same constant from Assumption A6 and D̃ is a positive
constant that will be determined below.
Lemma 10.7. Let F be a class of functions satisfying the conditions above. Then,
e k · kB,P ) ≤ HB (D̃−1 , F, k · kP ), and kf˜kB,P ≤ D̃δ
HB (, F,
0
0
0
where
D̃ =
λ2 K02 λK0 (2M0 )−1
a0
+
e
2
2M0
8M02
1/2
D−1 ,
(10.48)
and a0 , M0 are the same constants from Assumption A6.
Proof. Let (L, U ) be an -bracket for F with respect to k · kP0 . Consider the class
n
o
F 0 = f 0 : f 0 (x, y) = f (x) y − λψ0 (αT0 x) , (x, y) ∈ X × R and f ∈ F .
Then for f 0 ∈ F 0 we have
L(x)(y − λψ0 (αT0 x)) ≤ f 0 (x, y) ≤ U (x)(y − λψ0 (αT0 x)), if y − λψ0 (αT0 x) ≥ 0 or
U (x)(y − λψ0 (αT0 x)) ≤ f 0 (x, y) ≤ L(x)(y − λψ0 (αT0 x)), if y − λψ0 (αT0 x) < 0 .
Let (L0 , U 0 ) denote the new bracket. Using the definition of the Bernstein norm, convexity of x 7→ xk , k ≥ 2
and kψ0 k∞ ≤ K0 we have that
2
(U 0 − L0 )(4M0 D)−1 B,P0
Z
∞
X
(4M0 D)−k
=2
(U (x) − L(x))k |y − λψ0 (αT0 x)|k dP0 (x, y)
k!
X ×R
k=2
∞
−k Z
X
(4M0 D)
≤2
(U (x) − L(x))k 2k−1 |y|k + λk |ψ0 (αT0 x)|k dP0 (x, y)
k!
X ×R
k=2
Z
∞
X
1
(U (x) − L(x))k |y|k + λk K0k dP0 (x, y)
≤
k
k
k
2 D M0 k! X ×R
k=2
Z
∞
X
1
≤
(U (x) − L(x))k (a0 k!M0k−2 + λk K0k )dP0 (x, y)
k D k M k k!
2
X ×R
0
k=2
k−2 Z
∞
∞
X 1 Z
a0
λ2 K02 X λK0
1
2
≤
(U (x) − L(x)) g(x)dx +
(U (x) − L(x))2 g(x)dx
2
2
2
k−2
2
4M0 D
2
4D M0
2M0
k! X ×R
X
×R
k=2
k=2
k−2
∞
2 2 X
a0
λ K0
1
λK0
≤
2 +
2
2M02 D2
8D2 M02
(k − 2)! 2M0
k=2
2 2
a0
λ K0 λK0 (2M0 )−1 2
+
e
= D̃2 2 .
≤
2M02 D2
8D2 M02
This implies that
e k · kB,P ≤ HB , F, k · kP ,
HB D̃, F,
0
0
or equivalently
HB , F 0 , k · kB,P0 ≤ HB D̃−1 , F, k · kP0 .
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
43
Using similar calculations we can write
kf˜k2B,P
=
≤
≤
2
∞
X
1
1
k
(4M0 D) k!
Z
1
1
(2M0 )k k!
Z
k=2
∞
X
1
D2
k=2
a0
4M02 D2
∞
X
k=2
|f (x)|k |y − λψ0 (αT0 x)|k dP( x, y)
X ×R
1
2k−2
X ×R
f (x)2 (a0 k!M0k−2 + λk K0k )g(x)dx
k−2
∞
λ2 K02 X λK0
1
+
2
2
8D M0
2M0
(k − 2)!
k=2
!Z
f (x)2 g(x)dx
X ×R
≤ D̃2 δ 2 ,
which completes the proof.
In the next corollary, we consider the class
n
o
F = x 7→ fα (x) = Ei,α0 (αT0 x) − Ei,α (αT x), x ∈ X , α ∈ B(α0 , δ) ,
where Ei,α (u) = E Xi |αT X = u for i ∈ {1, . . . , d} and δ ∈ (0, δ0 ). Using the same arguments in the proof
of Lemma 10.11 with f (x) = xi it follows that for all x ∈ X and α, α0 ∈ B(α0 , δ)
|fα0 (x) − fα (x)| ≤ M kα0 − αk,
for the same constant M of that lemma. Now, we can apply Theorem 2.7.11 of [23] to conclude that
NB 2, F, k · kP0 ≤ N , B(α0 , δ), k · k ,
where N , B(α0 , δ), k · k is the -covering number for B(α0 , δ) with respect to the norm k · k which is of
order (δ/)d for ∈ (0, δ). Hence, using the inequality log(x) ≤ x for x > 0 we can find a constant M 0 > 0
depending on d such that
M 0δ
HB , F, k · kP0 ≤
.
Furthermore, there exists M̃ > 0 such that kf k∞ ≤ M̃ δ and kf kP0 ≤ M̃ δ.
Lemma 10.8. Let F be the class of functions as above and consider the related class
n
o
F 0 = f 0 : f 0 (x, y) = f (x) y − λψ0 (αT0 x) , (x, y) ∈ X × R, f ∈ F .
(10.49)
Then,
E[kGn kF 0 ] . δ.
Proof. Note that for any function f 0 ∈ F 0 and constant C > 0 we have that Gn (f 0 C −1 ) = C −1 Gn f 0 implying
that kGn kF 0 = 4M0 M̃ δkGn kFe , where
n
o
Fe = f˜ : f˜(x, y) = (4M0 M̃ δ)−1 f 0 (x, y), f 0 ∈ F 0 .
Note also that the constant D̃ in Lemma 10.7 is given by D̃ δ −1 , where D̃ depends on M̃ , a0 , M0 and K0 .
Also, using the entropy calculations along with Lemma 10.7 we can show easily that
e k · kB,P ) . 1 ,
HB (, F,
0
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
44
and that kf˜kB,P0 . 1. Using Lemma 3.4.3 of [23] it follows that there exists some constant B > 0 such that
Jn
E[kGn kFe ] . Jn 1 + √ 2 ,
nB
RBp
with Jn = 0
1 + B/d. Hence, E[kGn kFe ] . 1 and E[kGn kF 0 ] . δ as claimed.
Supplement C: Auxiliary results
Proof of Lemma 4.1. We have:
n
o−1
T
T
T
T
(JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) AJS (β0 ) = (JS (β0 )) AJS (β0 ).
In the parametrization that we consider, the columns of JS (β0 ) are orthogonal to α0 . We can therefore
extend the matrix JS (β0 ) with a last column α0 to a square nonsingular matrix J¯S (β0 ). This leads to the
equality
n
o−1
T
T
T
T
J¯S (β0 ) AJS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) AJ¯S (β0 ) = J¯S (β0 ) AJ¯S (β0 ).
Multiplying on the left by
T −1
J¯S (β0 )
and on the right by J¯S (β0 )−1 , we get:
n
o−1
T
T
(JS (β0 )) A = A.
AJS (β0 ) (JS (β0 )) AJS (β0 )
(10.50)
n
o−1
T
T
(JS (β0 )) is a generalized inverse of A.
This shows that JS (β0 ) (JS (β0 )) AJS (β0 )
To complete the proof and show that it is indeed the Moore-Penrose inverse of A, we first note that
n
o−1
n
o−1
T
T
T
T
JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) AJS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 ))
n
o−1
T
T
= JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) .
(10.51)
Furthermore,
T
n
o−1
T
T
AJS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 ))
n
o−1
T
T
= JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) AT
n
o−1
T
T
= JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) A,
where the last equality holds since A is symmetric, being a covariance matrix. We have to show that
o−1
n
T
T
JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) A
n
o−1
T
T
= AJS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) .
(10.52)
Multiplying on the left by (JS (β0 ))T and on the right by JS (β0 ), we get:
n
o−1
T
T
(JS (β0 ))T JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) AJS (β0 )
= (JS (β0 ))T JS (β0 )
n
o−1
T
T
= (JS (β0 ))T AJS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) JS (β0 ),
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
45
and (10.52) follows by the orthogonality relation of the columns of JS (β0 ) with α0 in the same way as before,
replacing the matrix JS (β0 ) by J¯S (β0 ) in the outer factors of the equality relation.
In a similar way we obtain:
T
n
o−1
T
T
JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) A
n
o−1
T
T
= JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) A.
(10.53)
n
o−1
T
T
Since the matrix JS (β0 ) (JS (β0 )) AJS (β0 )
(JS (β0 )) satisfies properties (10.50), (10.51),(10.52) and
(10.53), the matrix satisfies the four properties which define the Moore-Penrose pseudo-inverse matrix of A.
This completes the proof of Lemma 4.1.
Remark 10.1. The same proof holds for showing that the Moore-Penrose inverse à is given by
n
o−1
T
T
JS (β0 ) (JS (β0 )) ÃJS (β0 )
(JS (β0 )) .
Lemma 10.9 (Derivative α 7→ ψα (αT x)).
∂
ψα (αT x)
∂αj
α=α0
= xj − E(Xj |αT X = αT0 x) ψ00 (αT0 x),
and
∂
ψα (αT x)
∂βj
where JS (β0 )T
j
∂
ψS(β) (S(β)T x)
∂βj
β=β0
T
= JS (β0 ) j x − E(X|S(β)T X = S(β)T x) ψ00 S(β)T x ,
=
α=α0
denotes the jth row of JS (β0 )T .
Proof. We assume without loss of generality that the first component α1 of α is not equal to zero. Denote
the conditional density of (X2 , . . . , Xd )T given αT X = u by hα (·|u) Using the change of variables t1 = αT x,
tj = xj for j = 1, . . . , d, the function ψα can be written as
ψα (αT x) = E[ψ0 (αT0 X)|αT X = αT x]
Z
d
d
Y
X
α
01
T
T
dx̃j ,
= ψ0
α0j x̃j hα (x̃2 , . . . , x̃d |α x)
(α x − α2 x̃2 − . . . − αd x̃d ) +
α1
j=2
j=2
with partial derivatives w.r.t. αj for j = 2, . . . , d given by,
∂
∂
ψα (αT x) =
E[ψ0 (αT0 X)|αT X = αT x]
∂αj
∂αj
Z
d
d
X
Y
α01
0 α01
T
T
=
(xj − x̃j )ψ0
(α x − α2 x̃2 − . . . − αd x̃d ) +
α0j x̃j hα (x̃2 , . . . , x̃d |α x)
dx̃j
α1
α1
j=2
j=2
Z
d
d
X
Y
α01 T
∂
+ ψ0
(α x − α2 x̃2 − . . . − αd x̃d ) +
α0j x̃j
hα (x̃2 , . . . , x̃d |αT x)
dx̃j ,
α1
∂αj
j=2
j=2
which is at α = α0 equal to
∂
ψα (αT x)
∂aj
Z
=
α=α0
d
Y
(xj − x̃j )ψ0T αT0 x hα0 (x̃2 , . . . , x̃d |αT0 x)
dx̃j
j=2
=
ψ00 (αT0 x)
xj −
E(Xj |αT0 X
=
αT0 x)
.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
46
For the partial derivatives w.r.t. α1 we have,
∂
ψα (αT x)
∂α1
Z
d
X
α
α01
α01 T
01
=
x1 − 2 (α x − α2 x̃2 − . . . − αd x̃d ) ψ00
(αT x − α2 x̃2 − . . . − αd x̃d ) +
α0j x̃j
α1
α1
α1
j=2
hα (x̃2 , . . . , x̃d |αT x)
d
Y
dx̃j
j=2
d
d
T
X
Y
∂
α
x
−
α
x̃
−
.
.
.
−
α
x̃
2
2
d
d
+
h(x̃2 , . . . , x̃d |αT x)
(α0j − αj )x̃j
dx̃j ,
ψ0 αT x + (α01 − α1 )
α1
∂α1
j=2
j=2
Z
+
and,
∂
ψα (αT x)
∂a1
α=α0
= ψ00 (αT0 x) x1 − E(X1 |αT0 X = αT0 x) .
This proves the first result of Lemma 10.9. The proof for the second results follows similarly and is omitted.
Lemma 10.10. Let φ̄ be defined by
Z
Z
φ̄(α) = x y − ψα (αT x) dP0 (x, y) = x ψ0 (αT0 x) − ψα (αT x) dG(x),
(10.54)
then we have for each α ∈ B(α0 , δ0 ),
φ̄(α) = E Cov X, ψ0 (αT X + (α0 − α)T X)|αT X .
Moreover,
αT φ̄(α) = 0,
and,
(α0 − α)T φ̄(α) = E Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)T X)|αT X ≥ 0,
and α0 is the only value such that the above equation holds uniform in α ∈ B(α0 , δ0 ).
Proof. We have,
Z
φ̄(α) =
x y − ψα (αT x) dP0 (x, y) =
Z
x ψ0 (αT0 x) − ψα (αT x) dG(x)
Z
x ψ0 (αT0 x) − E ψ0 (αT0 X)|αT X = αT x dG(x)
= E Cov X, ψ0 (αT0 X)|αT X ,
=
(10.55)
and
α
T
Z
x ψ0 (αT0 x) − E ψ0 (αT0 X)|αT X = αT x dG(x) = E Cov αT X, ψ0 (αT0 X)|αT X = 0.
We next note that,
(α0 − α)T φ̄(α) = E Cov (α0 − α)T X, ψ0 (αT0 X)|αT X
= E Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)T X)|αT X ,
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
47
which is positive by the monotonicity of ψ0 . This can be seen as follows. Using Fubini’s theorem, one can
prove that for any random variables X and Y such that XY, X and Y are integrable, we have
Z
Cov {X, Y } = EXY − EXEY = {P(X ≥ s, Y ≥ t) − P(X ≥ s)P(Y ≥ t)} ds dt.
Denote Z1 = (α0 − α)T X and Z2 = ψ0 (u + (α0 − α)T X) = ψ0 (u + Z1 ), then, using monotonicity of the
function ψ0 , we have
P(Z1 ≥ z1 , Z2 ≥ z2 ) = P(Z1 ≥ max{z1 , z̃2 }) ≥ P(Z1 ≥ max{z1 , z̃2 })P(Z1 ≥ min{z1 , z̃2 })
= P(Z1 ≥ z1 )P(Z2 ≥ z2 },
where
z̃2 = ψ0−1 (z2 ) − u = inf{t ∈ R : ψ0 (t) ≥ z2 } − u.
We conclude that,
Cov (α0 − α)T X, ψ0 (αT X + (α0 − α)0 X)|αT X = u
Z
= {P(Z1 ≥ z1 , Z2 ≥ z2 ) − P(Z1 ≥ z1 )P(Z2 ≥ z2 )} ds dt ≥ 0,
and hence the first part of the Lemma follows. We next prove the uniqueness of the parameter α0 . We start
by assuming that, on the contrary, there exists α1 6= α0 in B(α0 , δ0 ) such that
(α0 − α)T φ̄(α) ≥ 0
and (α1 − α)T φ̄(α) ≥ 0
for all α ∈ B(α0 , δ0 ),
and we consider the point α ∈ B(α0 , δ0 ) such that
|αj − αj0 | = |αj − αj1 |
for j = 1, . . . , d.
For this point, we have,
(α0 − α)T φ̄(α) = −(α1 − α)T φ̄(α)
for all α ∈ B(α0 , δ0 ),
which is not possible since both terms should be positive. This completes the proof of Lemma 10.10.
Lemma 10.11. Let f : X → Rk , k ≤ d be a differentiable function on X such that there exists a constant
M > 0 satisfying kf k∞ ≤ M . Then, under the assumptions A1 and A5 we can find a constant M̃ > 0 such
that for all α ∈ B(α0 , δ0 ) we have that
sup E[f (X)|αT X = αT x] − E[f (X)|αT0 X = αT0 x] ≤ M kα − α0 k.
x∈X
Proof. We can assume without loss of generality that α0,1 6= 0 where α0,1 is the first component of α0 . At
the cost of taking a smaller δ0 , we can further assume that α̃1 6= 0 for all α ∈ B(α0 , δ0 ). Consider the change
of variables t1 = αT X, ti = xi for i = 1, . . . , d. Then, the density of (αT X, X2 , . . . , Xd ) is given by
1
1
g(αT X,X2 ,...,Xd ) (t1 , . . . , td ) = g
t1 − α2 t2 − . . . − αd td ), t2 , . . . , td
.
α1
α1
Then, for i = 2, . . . , d, the conditional density hα (·|u) of the (d − 1)-dimensional vector (X2 , . . . , Xd ) given
that αT X = u is equal to
d xd
g u−α2 x2 −...−α
,
x
,
.
.
.
,
x
2
d
α1
Q
:= hα (x2 , . . . , xd |u),
(10.56)
R u−α2 t2 −...−αd td
d
,
t
,
.
.
.
,
t
g
2
d
j=2 dtj
α1
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
48
where the domain of integration in the denominator is the set {(x2 , . . . , xd ) : (x, X )}. Note that X1 =
(αT X − α2 X2 − . . . − αd Xd )/α1 . Thus, for (x, X ) we have that
E[f (X)|αT X = αT x] = E[f (X1 , X2 , . . . , Xd )|αT X = αT x]
T
α X − α2 X2 − . . . − αd Xd
T
T
=E f
, X2 , . . . , Xd | α X = α x
α1
Z T
d
Y
α x − α2 x2 − . . . − αd xd
= f
, x2 , . . . , xd hα (x2 , . . . , xd |αT x)
dxj .
α1
j=2
Note now that function
g
αT x−α2 x2 −...−αd xd
, x2 , . . . , xd
α1
Q
,
α 7→ hα (x2 , . . . , xd |αT x) = R T
d
g α x−α2 tα21−...−αd td , t2 , . . . , td
j=2 dtj
is continuously differentiable on B(α0 , δ0 ). This follows from assumptions A1 and A5 together with Lebesgue
dominated convergence theorem which allows us to differentiate the density g under the integral sign. With
some notation abuse we write ∂h/∂xi for the i-th partial derivative of α 7→ hα (x2 , . . . , xd |αT x). Straightforward calculations yield
T
∂hα
α x − α2 x2 − . . . − αd xd
= g
, x2 , . . . , xd
∂α1
α1
Q
R Pd
d
∂g
αT x−α2 t2 −...−αd td
,
t
,
.
.
.
,
t
)
(x
−
t
)
2
d
i
i
j=2 dtj
i=2
∂x1
α1
,
×
R T
Q
2
d
α12
g α x−α2 tα21−...−αd td , t2 , . . . , td
j=2 dtj
and for i = 2, . . . , d
αT x − α2 x2 − . . . − αd xd
= −g
, x2 , . . . , xd
α1
Q
R
d
∂g
αT x−α2 t2 −...−αd td
,
t
,
.
.
.
,
t
)
(xi − ti ) ∂x
2
d
j=2 dtj
α1
i
×
R T
Q
2 .
d
α1
g α x−α2 tα21−...−αd td , t2 , . . . , td
j=2 dtj
∂hα
∂αi
Assumptions A1 and A5 allow us to find a constant D > 0 depending on R, c0 , c̄0 and c̄1 such that
∂hα
∂αi
∞
≤ D,
for i = 1, . . . , d. Consider now the function α 7→ E[f (X)|αT X = αT x]. Using the assumptions of the lemma
and applying again Lebesgue dominated convergence theorem we conclude for i ∈ {1, . . . , d} that we have
∂E[f (X)|αT X = αT x]
∂αi
Z T
d
α x − α2 x2 − . . . − αd xd
∂hα (x2 , . . . , xd |αT x) Y
= f
, x2 , . . . , xd
dxj .
α1
∂αi
j=2
Furthermore, we have that
sup
(x,X
∂E[f (X)|αT X = αT x]
≤ MD
∂αi
Z Y
d
dxj = M 0 ,
j=2
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
49
for all i ∈ {1, . . . , d} and (x, X ) and α ∈ B(α0 , δ). The results now follow using a first order Taylor expansion
to obtain
E[f (X)|αT X = αT x] − E[f (X)|αT0 X = αT0 x] =
d
X
eT X = α
e T x]
∂E[f (X)|α
(αi − α0,i ) ,
∂αi
i=1
e ∈ Rd such that kα
e − α0 k ≤ kα − α0 k. Bounding the right side of the preceding display by
for some α
M̃ kα − α0 k with M̃ = dM 0 gives the result.
Lemma 10.12. Denote for i ∈ {1, . . . , d} the ith component of the function u 7→ E[X|αT X = u] by Ei,α .
Then Ei,α has a total bounded variation. Furthermore, there exists a constant B > 0 such that for all
α ∈ B(α0 , δ0 )
Z
0
kEi,α k∞ ≤ B, and
|Ei,α
(u)|du ≤ B,
Iα
where Iα = {αT x : x ∈ X }.
Proof. Since X ⊂ B(0, R), it is clear that kEi,α k∞ ≤ R. As above let us assume without loss of generality
that the first component of α0 is not equal to 0. At the cost of taking a smaller δ0 , we can further assume
that α̃1 6= 0 for all α ∈ B(α0 , δ0 ). We known that for i = 2, . . . , d
Z
Ei,α (u) = xi hα (x2 , . . . , xd |u)dx2 . . . dxd ,
where integration is done over the set {(x2 , . . . , xd ) : (x, X )} and u ∈ Iα ⊂ (a0 − δ0 R, b0 + δ0 R) and where
hα denotes conditional density of (X2 , . . . , Xd )0 given αT X = u, defined in (10.56). Using assumptions A1
and A5 along with the Lebesgue dominated convergence theorem we are allowed to write
Z
∂
0
Ei,α
(u) = xi hα (x2 , . . . , xd |u) dx2 . . . dxd .
∂u
Straightforward calculations yield that
∂
hα (x2 , . . . , xd |u)
∂u
=
∂g
∂x1
u−α2 x2 −...−αd xd
, x2 , . . . , xd
α1
R
Q
d
d td
α1
,
t
,
.
.
.
,
t
dt
g u−α2 t2 −...−α
2
d
j
j=2
α1
R
Q
d
∂g
u−α2 t2 −...−αd td
1
g α1 u − α2 x2 − . . . − αd xd ), x2 , . . . , xd
, t2 , . . . , td
j=2 dtj
∂x1
α1
−
.
R
2
Q
d
d td
α1
g u−α2 t2 −...−α
,
t
,
.
.
.
,
t
dt
2
d
j
j=2
α1
Thus, we can find constant C > 0 depending only on |α0,1 |, c0 , c1 , c̄1 and R such that
all α ∈ B(α0 , δ0 ). Now B = max(R, C) gives the claimed inequalities. If i = 1, then
E1,α (u) =
R
0
|Ei,α
(u)|du ≤ C for
d
d
X
X
1
1
u − αj
Ej,α (u) , and e01,α (u) =
1 − αj
e0j,α (u) .
α1
α1
j=2
j=2
for u ∈ Iα . We conclude again that the claimed inequalities are true at the cost of increasing the constant
B obtained above.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
50
Lemma 10.13. Let f be a function defined on some interval [a, b] such that
kf k∞ ≤ M, V (f, [a, b]) :=
n
X
sup
|f (xj ) − f (xj−1 )| ≤ M,
a=x0 <x1 ...<xn =b j=1
for some finite constant M > 0. Then, there exist two non-decreasing functions f1 and f2 on [a, b] such that
kf1 k∞ , kf2 k∞ ≤ 2M and f = f2 − f1 .
Proof. The fact that f = f2 − f1 with f1 and f2 non-decreasing on [a, b] follows from the well-known
Jordan’s decomposition. Furthermore, we can take f1 (x) = V (f, [a, x]) and f2 (x) = f (x) − f1 (x)for (x, [a, b].
By assumption, kf1 k∞ ≤ M ≤ 2M and kf2 k ≤ kf k∞ + kf1 k∞ ≤ 2M .
Lemma 10.14. Under Assumptions A4-A5, we can find a constant C > 0 such that for all α close enough
to α0 we have that
0
ψα
(u) > C,
for all u ∈ Iα .
Proof. We assume again that a1 6= 0. By calculations similar to the calculations made in the proof of Lemma
10.9, we get
Z
d
d
X
Y
α01
α
01
ψα (u) =
ψ00
α0j x̃j hα (x̃2 , . . . , x̃d |u)
dx̃j
(u − α2 x̃2 − . . . − αd x̃d ) +
α1
α1
j=2
j=2
Z
d
d
Y
X
∂
α
01
dx̃j .
α0j x̃j
h(x̃2 , . . . , x̃d |u)
+ ψ0
(u − α2 x̃2 − . . . − αd x̃d ) +
α1
∂u
j=2
j=2
Now, a Taylor expansion of αi in the neighborhood of α0,i and using that α0,1 /α1 = 1 − 1 /α0,1 + o(1 ) yields
α0,1
ψ0
(u − α2 x2 − · · · − αd xd ) + α0,2 x2 + · · · + α0,d xd
α1
1
(u − 2 x2 − . . . − d xd ) + o(1 )
= ψ0 u −
α0,1
1
= ψ0 (u) −
(u − 2 x2 − . . . − d xd )ψ00 (u) + o(1 )
α0,1
1
= ψ0 (u) −
uψ 0 (u) + o(kα − α0 k).
α0,1 0
Using the Lebesgue dominated convergence theorem and the fact that hα (x̃2 , . . . , x̃d |u) is a conditional
density it follows that
Z
d
d
X
Y
∂
α
01
(u − α2 x̃2 − . . . − αd x̃d ) +
α0j x̃j
h(x̃2 , . . . , x̃d |u)
dx̃j , = o(α − α0 ),
ψ0
α1
∂u
j=2
j=2
such that
0
ψα
(u)
1
≥C 1−
α0,1
+ o(α − α0 ) ≥ C > 0,
provided that kα − α0 k is small enough.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
/single index model
51
Lemma 10.15. If h n−1/7 , then there exists a constant B > 0 such that for all α ∈ B(α0 , δ)
Z
0
00
kψnh,α k∞ ≤ B
and
|ψnh,α
(u)|du ≤ B,
Iα
where Iα = {αT x : x ∈ X }
Proof. Using integration by
Z
1
0
ψnh,α
(u) =
h
Z
1
=
h
Z
1
=
h
parts and Proposition 3.2, we have for all u ∈ Iα
u−x
K
dψ̂nα (x)
h
Z
u−x
1
u−x
0
K
K0
ψα
(x)dx + 2
(ψ̂nα (x) − ψα (x))dx
h
h
h
Z
u−x
1
K
dψα (x) +
K 0 (w) (ψ̂nα (u + hw) − ψα (u + hw))dw
h
h
0
0
= ψα
(u) + O(h2 ) + Op (h−1 log nn−1/3 ) = ψα
(u) + op (1).
This proves the first part of Lemma 10.15. For the second part, we get by a similar calculation that,
Z
Z
u−x
1
1
00
00
K
ψα
(x)dx + 2
K 00 (w) (ψ̂nα (u + hw) − ψα (u + hw))dw
ψnh,α
(u) =
h
h
h
Z
1
u−x
00
=
K
ψα
(x)dx + Op (h−2 log nn−1/3 ).
h
h
Since h−2 log nn−1/3 = o(1) for h n−1/7 , the second part follows by Assumption A10.
imsart-generic ver. 2014/10/16 file: BGH_SIM.tex date: December 18, 2017
| 10math.ST
|
1
Mutually Uncorrelated Primers for DNA-Based
Data Storage
S. M. Hossein Tabatabaei Yazdi∗ , Han Mao Kiah† , Ryan Gabrys∗ and Olgica Milenkovic∗
arXiv:1709.05214v1 [cs.IT] 13 Sep 2017
∗ ECE
Department, University of Illinois, Urbana-Champaign
Abstract—We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNAbased data storage systems and for synchronization of communication devices. WMU sequences are characterized by the
property that no sufficiently long suffix of one sequence is
the prefix of the same or another sequence. WMU sequences
used for primer design in DNA-based data storage systems are
also required to be at large mutual Hamming distance from
each other, have balanced compositions of symbols, and avoid
primer-dimer byproducts. We derive bounds on the size of WMU
and various constrained WMU codes and present a number of
constructions for balanced, error-correcting, primer-dimer free
WMU codes using Dyck paths, prefix-synchronized and cyclic
codes.
1. I NTRODUCTION
Mutually uncorrelated (MU) codes are a class of fixed
length block codes in which no proper prefix of one codesequence is a suffix of the same or another codesequence. MU
codes have been extensively studied in the coding theory and
combinatorics literature under a variety of names. Levenshtein
introduced the codes in 1964 under the name ‘strongly regular
codes’ [1], and suggested that the codes be used for synchronization. For frame synchronization applications described by
van Wijngaarden and Willink in [2], Bajić and Stojanović [3]
rediscovered MU codes, and studied them under the name
of ‘cross-bifix-free’ codes. Constructions and bounds on the
size of MU codes were also reported in a number of recent
contributions [4], [5]. In particular, Blackburn [5] analyzed
these sequences under the name of ‘non-overlapping codes’,
and provided a simple construction for a class of codes with
optimal cardinality.
MU codes have recently found new applications in DNAbased data storage [6], [7]: In this setting, Yazdi et al. [8], [9]
developed a new, random-access and rewritable DNA-based
data storage architecture that uses MU address sequences that
allow selective access to encoded DNA blocks via Polymerase
Chain Reaction (PCR) amplification with primers complementary to the address sequences. In a nutshell, DNA informationbearing sequences are prepended with address sequences used
to access strings of interest via PCR amplification. To jump
start the amplification process, one needs to ‘inject’ complements of the sequences into the storage system, and those
complementary sequences are referred to as DNA primers.
Primers attach themselves to the user-selected address strings
and initiate the amplification reaction. In order to ensure
accurate selection and avoid expensive postprocessing, the
information sequences following the address are required to
Parts of the work were presented at ISIT 2016, Barcelona, Spain. The
research is supported in part by the NSF CCF 16-18366 grant.
† SPMS,
Nanyang Technological University, Singapore
avoid sequences that resemble the addresses, thereby imposing
a special coding constraint that may be met through the use
of MU addresses. In addition, the addressing scheme based on
MU codes may be used in conjunction with other specialized
DNA-based data storage codes like the ones outlined in [10]–
[12]. Detailed descriptions of implementations of DNA-based
data storage systems and their underlying synthetic biology
principles are beyond the scope of this paper; the interested
reader is referred to [13] for a discussion of system components and constraints.
The goal of this work is to generalize the family of MU
codes by introducing weakly mutually uncorrelated (WMU)
codes. WMU codes are block codes in which no sufficiently
long prefix of one codesequence is a suffix of the same or
another codesequence. In contrast, MU codes prohibit suffixprefix matches of any length. This relaxation of prefix-suffix
constraints was motivated in [8], with the purpose of improving code rates and allowing for increased precision DNA
fragment assembly and selective addressing. A discussion of
the utility of WMU codes in DNA-based data storage may be
found in the overview paper [9], [13] and the paper describing
recent practical implementations of portable DNA-based data
storage systems which make use of WMU codes [14].
Here, we are concerned with determining bounds on the
size of specialized WMU codes and efficient WMU code constructions. Of interest are both binary and quaternary WMU
codes, as the former may be used to construct the latter, while
the latter class may be adapted for encoding over the four
letter DNA alphabet {A, T, C, G}. Our contributions include
bounds on the largest size of unconstrained and constrained
WMU codes, constructions of WMU codes that meet the
derived upper bounds as well as results on several important
constrained versions of WMU codes: Error-correcting WMU
codes, balanced WMU codes, balanced error-correcting WMU
codes, and WMU codes that avoid primer-dimer byproducts.
The aforementioned constraints arise due to the following
practical considerations.
A binary sequence is called balanced if half of its symbols
are zero. On the other hand, a DNA sequence is termed
balanced if it has a 50% GC content (i.e., if 50% of the
symbols in the sequence are either G or C). Balanced DNA
sequences are more stable than DNA sequences with lower or
higher GC content and they have lower sequencing error-rates.
Balanced DNA sequences are also easier to synthesize than
unbalanced sequences [15]. In addition, WMU codes at large
Hamming distance limit the probability of erroneous codesequence selection dues to address errors. When referring to
primer dimer (PD) issues [16], we consider potential problems
that may arise during random access when two primers used
2
for selection bond to each other, thereby prohibiting amplification of either of the two corresponding information-bearing
sequences. PD byproducts can be eliminated by restricting the
WMU codes to avoid simultaneous presence of long substrings
and their complements in the codesequences.
The paper is organized as follows. Section 2 contains an
overview of the topics and results discussed in the paper
and some formal definitions needed to follow the material in
subsequent sections. In Section 3 we review MU and introduce
WMU codes, and derive bounds on the maximum size of the
latter family of combinatorial objects. In addition, we outline
a construction of WMU codes that meets the derived upper
bound. We also describe a construction that uses binary MU
component codes and other constrained codes in order to obtain families of WMU codes that obey different combinations
of primer constraints. In Section 4 we describe constructions
for error-correcting WMU codes, while in Section 5 we discuss
balanced WMU codes. Primer-dimer constraints are discussed
in Section 6. Our main results are presented in Section 7,
where we first propose to use cyclic codes to devise WMU
codes that are both balanced and have error correcting capabilities. We then proceed to improve the cyclic code construction
in terms of coding rate through decoupled constrained and
error-correcting coding for binary strings. In this setting, we
use DC-balanced codes [17]. Encoding of information with
WMU address codes is described in Section 8.
2. ROADMAP OF A PPROACHES AND R ESULTS
Throughout the paper we use the following notation: Fq
stands for a finite field of order q ≥ 2. Two cases of special
interest are q = 2 and q = 4. In the latter case, we tacitly
identify the elements of F4 with the four letters of the DNA
code alphabet, {A, T, C, G}. We let a = (a1 , . . . , an ) ∈ Fnq
stand for a sequence of length n over Fq , and let aji , 1 ≤
i, j ≤ n, stand for a substring of a starting at position i and
ending at position j, i.e.,
(
(ai , . . . , aj )
i≤j
j
ai =
(ai , ai−1 , . . . , aj ) i > j.
Moreover, for two arbitrary sequences a ∈ Fnq , b ∈ Fm
q , we
use ab = (a1 , . . . , an , b1 , . . . , bm ) to denote a sequence of
length n+m generated by appending b to the right of a. Thus,
al stands for a sequence of length ln comprising l consecutive
copies of the sequence a.
We say that a sequence ā = (a¯1 , . . . , a¯n ) ∈ Fnq represents
the complement of sequence a ∈ Fnq if:
• For q = 2, and 1 ≤ i ≤ n,
(
1 if ai = 0,
āi =
(1)
0 if ai = 1;
•
For q = 4, and 1 ≤ i ≤ n,
T if
A if
āi =
G if
C if
ai
ai
ai
ai
= A,
= T,
= C,
= G.
(2)
The notion of complement used for F4 is often referred to as
the Watson-Crick (W-C) complement.
In this work, we define an (address) code C of length n as
a collection of sequences from Fnq , for q ∈ {2, 4}, satisfying
a set of specific combinatorial constraints described below.
The goal is to describe new constructions for address sequences used for DNA-based data storage. Address sequences
should enable reliable access to desired information content.
This is accomplished by making the addresses as distinguishable from each other as possible via a simple minimum Hamming distance constraint; recall that the Hamming distance dH
between any two sequences of length n, a = (a1 , . . . , an ) and
b = (b1 , . . . , bn ), over some finite alphabet A equals
dH (a, b) =
n
X
1(ai 6= bi ),
i=1
where 1(·) stands for the indicator function. One may also use
the Levenshtein distance instead, as discussed in the context
of MU codes in [18].
Access to desired sequences is accomplished by exponentially amplifying them within the pool of all sequences via
addition of primer sequences corresponding to the W-C complement of their addresses. As primers have to be synthesized,
they need to satisfy constraints that enable simplified synthesis,
such as having a balanced GC-content,
formally defined for
Pn
n
a sequence a over Fn4 as
1(a
i ∈ {G, C}) = 2 .
i=1
This constraint directly translates to a balancing property
for the address sequences. Furthermore, as one may require
simultaneous amplification of multiple sequences, multiple
primers need to be added in which case it is undesirable
for different pairs of primers to bond to each other via WC complementarity. The PD byproducts of this binding may
be significantly reduced if one imposes an additional PD
constraint on the primers, and hence on the address sequences,
as defined below.
Definition 1. A set of sequences C ⊆ Fnq , for q ∈ {2, 4},
is said to avoid primer dimer (APD) byproducts of effective
length f if substrings of sequences in C with length ≥ f
cannot hybridize with each other in the forward or the reverse
direction. More precisely, we say that C is an f -APD code if
for any two sequences a, b ∈ C, not necessarily distinct, and
1 ≤ i, j ≤ n + 1 − f, we have āfi +i−1 6= bfj +j−1 , bjf +j−1 . We
refer to the sequence bjf +j−1 as the reverse of the sequence
bjf +j−1 .
For practical reasons, we only focus on the parameter
regime f = Θ (n), as only sufficiently long complementary
sequences may bond with each other. Furthermore, we defer
the study of the related problem of secondary structure formation [19], [20] to future work.
In certain DNA-based data storage systems, one may be
interested in restricting the address sequences by imposing
only one or two of the above constraints. For example, if
the addresses are relatively short (≤ 10), one may dispose
of the requirement to make the sequences balanced, as short
sequences are significantly easier to synthesize than longer
ones. If one allows for postprocessing of the readouts, then the
3
Hamming distance constraint may be relaxed or completely
removed. It is for this reason that we also consider a more
general class of code constructions that accommodate only a
subset of the three previously described constraints.
By far the most important constraint imposed on the address sequences is that they enable a simple construction
of information-bearing sequences (assumed to be of length
N >> n) that do not contain any of the address sequences
of length n as substrings. It is in this context of forbidden
substring coding that MU codes were introduced in [21],
[22]. WMU codes may be used in the same setting, but they
are less restrictive than MU codes, and therefore allow for
larger codebooks. This is why our main results pertain to
constructions of WMU codes with various subsets of primer
constraints, and we formally define and discuss these codes in
the next section. For some related questions pertaining to MU
codes, the interested reader is referred to [18].
3. MU AND WMU C ODES : D EFINITIONS , B OUNDS AND
C ONSTRUCTIONS
For simplicity of notation, we adopt the following naming
convention for codes: If a code C ⊆ Fnq has properties
Property1 , Property2 , . . . , Propertys , then we say that C is a
Property1 _Property2 _ . . . , Propertys _q_n code, and use
the previous designation in the subscript.
A. Mutually Uncorrelated Codes
Fnq
is selfWe say that a sequence a = (a1 , . . . , an ) ∈
uncorrelated if no proper prefix of a matches its suffix, i.e.,
if (a1 , . . . , ai ) 6= (an−i+1 , . . . , an ), for all 1 ≤ i < n. This
definition may be extended to a set of sequences as follows:
Two not necessarily distinct sequences a, b ∈ Fnq are said to
be mutually uncorrelated if no proper prefix of a appears as a
suffix of b and vice versa. We say that C ⊆ Fnq is a mutually
uncorrelated (MU) code if any two not necessarily distinct
codesequences in C are mutually uncorrelated.
The maximum cardinality of MU codes was determined
up to a constant factor by Blackburn [5, Theorem 8]. For
completeness, we state the modified version of this result for
alphabet size q ∈ {2, 4} below
Theorem 1. Let AMU_q_n denote the maximum size of a
MU_q_n code, with n ≥ 2 and q ∈ {2, 4}. Then
cq
qn
qn
≤ AMU_q_n ≤
n
2n
2
where cq = (q−1)4q(2q−1)
, which for q = 2 and q = 4 equal
4
c2 = 0.04688 and c4 = 0.06152, respectively.
We also briefly outline two known constructions of MU
codes, along with a new and simple construction for errorcorrecting MU codes that will be used in our subsequent
derivations.
Bilotta et al. [4] described an elegant construction for
MU codes based on well-known combinatorial objects termed
Dyck sequences. A Dyck sequence of length n is a binary
sequence composed of n2 zeros and n2 ones such that no prefix
of the sequence has more zeros than ones. By definition, a
Dyck sequence is balanced and it necessarily starts with a one
and ends with a zero. The number of Dyck word
of length n
n
2
is the n2 -th Catalan number, equal to n+2
n .
2
Construction 1. (BAL_MU_2_n Codes) Consider a set D of
Dyck sequences of length n − 2 and define the following set
of sequences of length n,
C = {1a0 : a ∈ D}.
It is straightforward to show that C is balanced and MU
code. Size of C is also equal to n−2
2 -th Catalan number, or
n
1
|C| = 2(n−1)
n .
2
An important observation is that MU codes constructed
using Dyck sequences are inherently balanced, as they contain
n
n
2 ones and 2 zeros. The balancing property also carries over
to all prefixes of certain subsets of Dyke sequences. To see
this, recall that a Dyck sequence has height at most D if for
any prefix of the sequence, the difference between the number
of ones and the number of zeros is at most D. Hence, the
disbalance of any prefix of a Dyck sequence of height D
is at most D. Let Dyck(n, D) denote the number of Dyck
sequences of length 2n and height at most D. For fixed values
of D, de Bruijn et al. [23] proved that
π
π
4n
2
2n
tan
cos
. (3)
Dyck(n, D) ∼
D+1
D+1
D+1
Here, f (n) ∼ g(n) is used to denote the following asymptotic
relation limm→∞ f (n)/g(n) = 1.
Bilotta’s construction also produces nearly prefix-balanced
MU codes, provided that one restricts his/her attention to
subsets of sequences with small disbalance D; equation 3
establishes the existence of large subsets of Dyck sequences
with small disbalance. By mapping 0 and 1 to {A, T} and
{C, G}, respectively, one may enforce a similar GC balancing
constraint on DNA MU codes.
The next construction of MU codes was proposed by
Levenshtein [1] and Gilbert [21].
Construction 2. (MU_q_n Codes) Let n ≥ 2 and 1 ≤ ` ≤
n−1, be two integers and let C ⊆ Fnq be the set of all sequences
a = (a1 , . . . , an ) such that
•
•
•
The sequence a starts with ` consecutive zeros, i.e., a`1 =
0` .
It holds that a`+1 , an 6= 0.
The subsequence an−1
`+2 does not contain ` consecutive
zeros as a subsequence.
Then, C is an
Blackburn [5, Lemma 3] showed
MU code.
that when ` = logq 2n and n ≥ 2`+2 the above construction
is optimal. His proof relies on the observation that the number
of strings an−1
`+2 that do not contain ` consecutive zeros as a
2
subsequence exceeds (q−1)4nq(2q−1)
q n , thereby establishing the
4
lower bound of Theorem 1. The aforementioned result is a
simple consequence of the following lemma.
Lemma 1. The number of q-ary sequences of length n that
avoid t specified sequences in Fnq s as substrings is greater than
q n (1 − qnt
ns ).
4
Proof: The result obviously holds for n ≤ ns . If n ≥ ns ,
then the number of bad strings, i.e., q-ary strings of length n
that contain at least one of the specified t strings as a substring,
is bounded from above by:
To maximize nH = t (` − 1) given n = (t + 1) ` + 1 and
t, ` ≥ 1, we write
p
√
nH = n − (` + t + 1) ≤ n − 2 `(t + 1) = n − 2 n − 1.
#bad strings ≤ (n − ns + 1)tq n−ns
Here, the inequality follows from
p the arithmetic and geometric
` (t + 1). On the other hand,
≥
mean inequality, i.e., `+t+1
2
it is √
easy to verify that√this upper bound is achieved by setting
` = n − 1 and t = √n − 1 − 1. Hence, the maximum value
of nH is n∗H = n − 2 n − 1.
By using a code CH with parameters [n∗H , s, d] as specified
n∗
by the GV bound, where d ≤ 2H and s = n∗H (1 − h( nd∗ ) −
H
o(1)), we obtain an
MU code Cparse with
q error-correcting
p
parameters [n∗H + 2 n∗H + 2 n∗H − 1 − 1, n∗H (1 − h( nd∗ ) −
H
o(1)), d].
≤ ntq n−ns .
Hence, the number of good sequences, i.e., the number of qary sequences of length n that avoid t specified strings in Fnq s
as substrings, is bounded from below by
#good strings ≥ q n − #bad strings
nt
≥ q n (1 − ns ).
q
It is straightforward to modify Construction 2 so as to incorporate error-correcting redundancy. Our constructive approach
to this problem is outlined in what follows.
Construction 3. (Error − Correcting_MU_2_n Codes) Fix
two positive integers t and ` and consider a binary (nH , s, d)
code CH of length nH = t(` − 1), dimension s, and Hamming
distance d. For each codesequence b ∈ CH , we map b to a
sequence of length n = (t + 1)` + 1 given by
2(`−1)
a(b) = 0` 1b`−1
1 1b`
t(`−1)
1 · · · b(t−1)(`−1)+1 1.
Let Cparse , {a(b) : b ∈ CH }.
It is easy to verify that |Cparse | = |CH |, and that the
code Cparse has the same minimum Hamming distance as
CH , i.e., d(Cparse ) = d(CH ). As nH = t(` − 1), we also
n
have Cparse ⊆ {0, 1} , where n = (t + 1)` + 1. In addition,
the parsing code Cparse is an MU code, since it satisfies all
the constraints required by Construction 2. To determine the
largest asymptotic size of a parsing code, we recall the GilbertVarshamov bound.
Theorem 2. (Asymptotic Gilbert-Varshamov bound [24],
[25]) For any two positive integers n and d ≤ n2 , there exists
n
a block code C ⊆ {0, 1} of minimum Hamming distance d
with normalized rate
d
R(C) ≥ 1 − h
− o(1),
n
where h(·) is the binary entropy function, i.e., h(x) =
1
x log2 x1 + (1 − x) log2 1−x
, for 0 ≤ x ≤ 1.
Recall that the parameters s (dimension) and d (minimum
Hamming distance) of the codes CH and Cparse are identical.
Their lengths, nH and n, respectively, equal nH = t (` − 1)
and n = (t + 1) ` + 1, where t, ` are positive integers. We
next aim to optimize the parameters of the parsing code for
fixed s and fixed n, which amounts to maximizing d. Since d
is equal to the corresponding minimum distance of the code
CH , and both codes have the same dimension s, in order to
maximize d we maximize nH under the constraint that n is
fixed. More precisely, we optimize the choice of `, t and then
use the resulting parameters in the Gilbert-Varshamov lower
bound.
B. Weakly Mutually Uncorrelated Codes: Definitions, Bounds
and Constructions
The notion of mutual uncorrelatedness may be relaxed by
requiring that only sufficiently long prefixes of one sequence
do not match sufficiently long suffixes of the same or another
sequence. A formal definition of this property is given next.
Definition 2. Let C ⊆ Fnq and 1 ≤ κ < n. We say that C is a
κ-weakly mutually uncorrelated (κ-WMU) code if no proper
prefix of length l, for all l ≥ κ, of a codesequence in C appears
as a suffix of another codesequence, including itself.
Our first result pertains to the size of the largest WMU code.
Theorem 3. Let Aκ−WMU_q_n denote the maximum size of a
κ-WMU code over Fnq , for 1 ≤ κ < n and q ∈ {2, 4}. Then,
qn
qn
≤ Aκ−WMU_q_n ≤
,
n−κ+1
n−κ+1
where the constant cq is as described in Theorem 1.
cq
Proof: To prove the upper bound, we use an approach first
suggested by Blackburn in [5, Theorem 1], for the purpose of
analyzing MU codes. Assume that C ⊆ Fnq is a κ-WMU code.
Let L = (n + 1) (n − κ + 1) − 1, and consider the set X of
pairs (a, i) , where i ∈ {1, . . . , L}, and where a ∈ FL
q is such
that the (possibly cyclically wrapped) substrings of a of length
n starting at position i belongs to C. Note that our choice of
the parameter L is governed by the overlap length κ.
Clearly, |X| = L |C| q L−n , since there are L different
possibilities for the index i, |C| possibilities for the string
starting at position i of a, and q L−n choices for the remaining
L − n ≥ 0 symbols in a. Moreover, if (a, i) ∈ X, then
(a, j) ∈
/ X for j ∈ {i ± 1, . . . , i ± n − κ}mod L due to the
weak mutual uncorrelatedness property.
Hence,
for a fixed
j
k
L
L
string a ∈ Fq , there are at most n−κ+1 different pairs
(a, i1 ) , . . . , a, ib L c ∈ X. This implies that
n−κ+1
L
|X| ≤
qL .
n−κ+1
Combining the two derived constraints on the size of X, we
obtain
L
|X| = L |C| q L−n ≤
qL .
n−κ+1
5
n
q
Therefore, |C| ≤ n−κ+1
.
To prove the lower bound, we describe a simple WMU code
construction, outlined in Construction 4.
Construction 4. (κ − WMU_q_n Codes) Let κ, n be two integers such that 1 ≤ κ ≤ n. A κ-WMU code C ∈ Fnq
may be constructed using a simple concatenation of the form
C = {ab | a ∈ C1 , b ∈ C2 }, where C1 ⊆ Fn−κ+1
is an MU
q
code, and C2 ⊆ Fκ−1
is
unconstrained.
q
It is easy to verify that C is an κ-WMU code with |C1 | |C2 |
codesequences. Let C2 = Fκ−1
and let C1 ⊆ Fn−κ+1
q
q
be the largest MU code of size AMU_q_n−κ+1 . Then, |C| =
q κ−1 AMU_q_n−κ+1 . The claimed lower bound now follows
from the
lower bound of Theorem 1, establishing that |C| ≥
qn
.
cq n−κ+1
As described in the Introduction, κ-WMU codes used in
DNA-based storage applications are required to satisfy a
number of additional combinatorial constraints in order to be
used as blocks addresses. These include the error-correcting,
balancing and primer dimer constraints. Balancing and errorcorrecting properties of codesequences have been studied
in great depth, but not in conjunction with MU or WMU
codes. The primer dimer constraint has not been previously
considered in the literature.
In what follows, we show that all the above constraints can
be imposed on κ-WMU codes via a simple decoupled binary
code construction. To this end, let us introduce a mapping Ψ as
follows. For any two binary sequences a = (a1 , . . . , an ) , b =
n
n
n
(b1 , . . . , bn ) ∈ {0, 1} , Ψ (a, b) : {0, 1} × {0, 1} →
n
{A, T, C, G} is an encoding function that maps the pair a, b
n
to a DNA string c = (c1 , . . . , cn ) ∈ {A, T, C, G} , according
to the following rule:
A if (ai , bi ) = (0, 0)
T if (a , b ) = (0, 1)
i i
(4)
for 1 ≤ i ≤ n, ci =
C
if
(a
,
b
)
=
(1,
0)
i
i
G if (ai , bi ) = (1, 1) .
Clearly, Ψ is a bijection and Ψ(a, b)Ψ(c, d) = Ψ(ac, bd).
The next lemma lists a number of useful properties of Ψ.
(ii) We prove the result by contradiction. Suppose that C
is not a κ-WMU code while C1 is a κ-WMU code.
Then, there exist sequences c, c0 ∈ C such that a proper
prefix of c of length at least κ appears as a suffix of
c0 . Alternatively, there exist sequences p, c0 , c00 such that
c = pc0 , c0 = c00 p and the length of p is at least κ. Next,
we use the fact Ψ is a bijection and find binary strings
a, b, a0 , b0 such that
p = Ψ (a, b) , c0 = Ψ (a0 , b0 ) , c00 = Ψ (a00 , b00 ) .
Therefore,
c = pc0 = Ψ (a, b) Ψ (a0 , b0 ) = Ψ (aa0 , bb0 ) ,
c0 = c00 p = Ψ (a00 , b00 ) Ψ (a, b) = Ψ (a00 a, b00 b) ,
where aa0 , a00 a ∈ C1 . This implies that the string a of
length at least κ appears both as a proper prefix and
suffix of two not necessarily distinct elements of C1 . This
contradicts the assumption that C1 is a κ-WMU code. The
same argument may be used for the case that C2 is a κWMU code.
(iii) For any two distinct sequences c, c0 ∈ C there exist
a, a0 ∈ C1 , b, b0 ∈ C2 such that c = Ψ (a, b) , c0 =
Ψ (a0 , b0 ). The Hamming distance between c, c0 equals
X
X
1 (ci 6= c0i ) =
1 (ai 6= a0i ∨ bi 6= b0i )
1≤i≤n
1≤i≤n
(
d1
≥
d2
if a 6= a0
≥ min (d1 , d2 ) .
if b =
6 b0
This proves the claimed result.
(iv) By combining (1), (2) and (4), one can easily verify
that Ψ(a, b) = Ψ a, b . We again prove the result by
contradiction. Suppose that C is not an f -APD code.
Then, there exist c, c0 ∈ C, a, a0 ∈ C1 , b, b0 ∈ C2
such that c = Ψ (a, b) , c0 = Ψ (a0 , b0 ) and cfi +i−1 =
(c0 )jf +j−1 or (c0 )jf +j−1 , for some 1 ≤ i, j ≤ n + 1 − f .
f +i−1
= (b0 )jf +j−1 or (b0 )jf +j−1 ,
This implies that bi
which contradicts the assumption that C2 is an f -APD
code.
n
Lemma 2. Suppose that C1 , C2 ⊆ {0, 1} are two binary block
codes of length n. Encode pairs of codesequences (a, b) ∈
C1 × C2 into a code C = {Ψ (a, b) | a ∈ C1 , b ∈ C2 }. Then:
(i) If C1 is balanced, then C is balanced.
(ii) If either C1 or C2 are κ-WMU codes, then C is also an
κ-WMU code.
(iii) If d1 and d2 are the minimum Hamming distances of
C1 and C2 , respectively, then the minimum Hamming
distance of C is at least min (d1 , d2 ).
(iv) If C2 is an f -APD code, then C is also an f -APD code.
Proof:
(i) Any c ∈ C may be written as c = Ψ (a, b) , where
a ∈ C1 , b ∈ C2 . According to (4), the number of G, C
symbols in c equals the number of ones in a. Since a is
balanced, exactly half of the symbols in c are Gs and Cs.
This implies that C has balanced GC content.
In the next sections, we devote our attention to establishing
bounds on the size of WMU codes with error-correction,
balancing and primer dimer constraints, and to devising constructions that use the decoupling principle or more specialized
methods that produce larger codebooks. As the codes C1 and
C2 in the decoupled construction have to satisfy two or more
properties in order to accommodate all required constraints,
we first focus on families of binary codes that satisfy one or
two primer constraints.
4. E RROR -C ORRECTING WMU C ODES
The decoupled binary code construction result outlined in
the previous section indicates that in order to construct an
error-correcting κ-WMU code over F4 , one needs to combine
a binary error-correcting κ-WMU code with a classical errorcorrecting code. To the best of our knowledge, no results are
6
available on error-correcting MU or error-correcting κ-WMU
codes.
We start by establishing lower bounds on the coding rates
for error-correcting WMU codes using the constrained GilbertVarshamov bound [24], [25].
For a ∈ Fnq and an integer r ≥ 0, let BFnq (a, r) denote the
Hamming sphere of radius r centered around a, i.e.,
BFnq (a, r) = b ∈ Fnq | dH (a, b) ≤ r ,
where, as before, dH denotes the Hamming distance. Clearly,
the cardinality of BFnq (a, r) equals
r
X
n
i
Vq (n, r) =
(q − 1) ,
i
i=0
independent on the choice of the center of the sphere. For the
constrained version of Gilbert-Varshamov bound, let X ⊆ Fnq
denote an arbitrary subset of Fnq . For a sequence a ∈ X, define
the Hamming ball of radius r in X by
and
L2 =
i=0
n−κ−`
i
i
(q − 2) Vq (κ − 1, d − i − 2) .
Proof: Assume that X is a κ-WMU code over Fnq generated according to Construction
4 and such that it has the carqn
. Recall that in this
dinality at least cq n−κ+1
case, X is the set
of sequences a ∈ Fnq that start with ` = logq 2 (n − κ + 1)
consecutive zeros (a`1 = 0` ), a`+1 , an−κ+1 6= 0, and no ` consecutive zeros appears as a subsequence in an−κ
`+2 . With every
a ∈ X, we associate two sets X (a, d − 1) and Y (a, d − 1):
The set X (a, d − 1) includes sequences b ∈ Fnq that satisfy
the following three conditions:
`
`
• Sequence b starts with ` consecutive zeros, i.e., b1 = 0 .
• One has b`+1 6= 0.
n
n
• Sequence b satisfies dH a`+1 , b`+1 ≤ d − 1.
The set Y (a, d − 1) ⊆ X (a, d − 1) is the collection of
n−κ
sequences b that contain 0` as a subsequence in b`+2
, or
that satisfy bn−κ+1 = 0. Therefore,
BX (a, r) = BFnq (a, r) ∩ X.
BX (a, d − 1) = X (a, d − 1) /Y (a, d − 1) ,
The volumes of the spheres in X may depend on the choice
of a ∈ X. Of interest is the maximum volume of the spheres
of radius r in X,
VX,max (r) = max |BX (a, r)| .
and
|BX (a, d − 1) | = |X (a, d − 1) | − |Y (a, d − 1) |.
Let L0 = |X (a, d − 1)|. Thus,
a∈X
The constrained version of the GV bound asserts that there
exists a code of length n over X, with minimum Hamming
distance d that contains
|X|
M≥
VX,max (d − 1)
codesequences. Based on the constrained GV bound, we can
establish the following lower bound for error-correcting WMU
codes. The key idea is to use a κ-WMU subset as the ground
set X ⊆ Fnq .
Theorem 4. (Lower bound on the maximum size of errorcorrecting WMU codes.) Let κ and n be two integers such
that n − κ − 1 ≥ 2`, for ` = logq 2 (n − κ + 1) , q ∈ {2, 4}.
Then there exists a κ-WMU code C ⊆ Fnq with minimum
Hamming distance d and cardinality
qn
|C| ≥ cq
,
(n − κ + 1) (L0 − L1 − L2 )
(5)
where
2
cq =
n−κ−`
X
(q − 1) (2q − 1)
,
4q 4
and L0 , L1 , and L2 , are given by
L0 =Vq (n − ` − 1, d − 1) + (q − 2) Vq (n − ` − 1, d − 2) ,
L0 =Vq (n − ` − 1, d − 1) + (q − 2) Vq (n − ` − 1, d − 2) .
(6)
The result holds as the first term on the right hand side of the
equation counts the number of sequences b ∈ X (a, d − 1)
that satisfy b`+1 = a`+1 , while the second term counts those
sequences for which b`+1 6= a`+1 .
We determine next |Y (a, d − 1) |. For this purpose, we look
into two disjoints subsets Y I and Y II in Y (a, d − 1) which
allow us to use |Y (a, d − 1)| ≥ Y I + Y II and establish a
lower bound on the cardinality sought.
The set Y I is defined according to
YI =
n−κ−`+1
[
Y I (i) ,
i=`+2
I
where Y (i) is the set of sequences b ∈ X (a, d − 1) that
satisfy the following constraints:
`
• The sequence b contains the substring 0 starting at
i+`−1
`
position i, i.e., bi
=0 .
• It holds that bi−1 6= 0.
i−2
`
• The sequence 0 does not appears as a substring in b`+2 .
i−1
i−1
n
n
• One has dH a`+1 , b`+1 + dH ai+` , bi+` ≤ d − ` − 1.
I
The cardinality of Y (` + 2) can be found according to
Y I (` + 2) =Vq (n − 2` − 1, d − ` − 1)
+ (q − 2) Vq (n − 2` − 1, d − ` − 2)
L1 = (q − 1)
n−κ−`+1
X
i−`−2
X
i=`+2
j=0
i−`−2
j
×Vq (n − i − ` + 1, d − ` − j − 2))] ,
j
(q − 2)
≥ (q − 1) Vq (n − 2` − 1, d − ` − 2)
The first term on the right hand side of the above equality
counts the sequences b ∈ Y I (` + 2) for which b`+1 =
a`+1 , while the second term counts sequences for which
7
b`+1 6= a`+1 . The inequality follows from the fact that
Vq (n − 2` − 1, d − ` − 1) ≥ Vq (n − 2` − 1, d − ` − 2).
To evaluate the remaining terms Y I (i)for ` + 3 ≤ i ≤
i−2
n − κ − ` + 1, assume that dH ai−2
`+1 , b`+1 = j. In this case,
there are at least
i−`−2
j
(q − 2)
j
possible choices for bi−2
`+1 . This result easily follows from
counting the number of ways to select the j positions in ai−2
`+1
on which the sequences agree and the number of choices for
the remaining symbols which do not include the corresponding
values in a and 0. As no additional symbol 0 is introduced in
i−2
i−2
`
bi−2
`+1 , b`+2 does not contain the substring 0 as a`+2 avoids
that string; similarly, b`+1 6= 0.
On the other hand, there are q − 1 possibilities for bi−1 ∈
Fq \ {0}, and to satisfy the distance property we have to have
dH ani+` , bni+` ≤ d − ` − j − 2.
Therefore,
i−`−2
X
Y I (i) ≥ (q − 1)
j=0
i−`−2
j
j
(q − 2)
×Vq (n − i − ` + 1, d − ` − j − 2)] .
Hence, the cardinality of Y I may be bounded from below as
Y I ≥LI ,
where
LI = (q − 1)
n−κ−`+1
X
i−`−2
X
j=0
i=`+2
i−`−2
j
(q − 2)
×Vq (n − i − ` + 1, d − ` − j − 2))] .
(7)
It is easy to verify that
Y II ⊆ X (a, d − 1) \ [BX (a, d − 1) ∪ YI ] .
Following the same arguments used in establishing the bound
on the cardinality of Y II , on can show that
Y II ≥L2 ,
where
n−κ−`
X
i=0
n−κ−`
i
i
(q − 2) Vq (κ − 1, d − i − 2) .
(8)
As a result, for each a ∈ X, we have
|BX (a, d − 1)| = |X (a, d − 1)| − |Y (a, d − 1)|
≤L0 − L1 − L2 .
VX,max (d − 1) ≤ L0 − L1 − L2 .
This inequality, along with the constrained form of the GV
bound, establishes the validity of the claimed result.
Figure 1 plots the above derived lower bound on the maximum achievable rate for error-correcting κ-WMU codes (5),
and for comparison, the best known error-correcting linear
codes for binary alphabets. The parameters used are n =
50, κ = 1, q = 2, corresponding to MU codes.
To construct q = 4-ary error-correcting κ-WMU codes via
the decoupled construction, we need to have at our disposition
an error-correcting κ-WMU binary code. In what follows, we
use ideas similar to Tavares’ synchronization technique [26]
to construct such codes. We start with a simple lemma and a
short justification for its validity.
Lemma 3. Let C be a cyclic code of dimension κ. Then the
run of zeros in any nonzero codesequence is at most κ − 1.
Proof: Assume that there exists a non-zero codesequence
c(x), represented in polynomial form, with a run of zeroes of length κ. Since the code is cyclic, one may write
c(x) = a(x)g(x), where a(x) is the information sequence
corresponding to c(x) and g(x) is the generator polynomial
of the code. Without loss of generality, one may assume that
the
P run of zeros appears at positions 0, . . . , κ − 1, so that
i+j=s ai gj = 0, for s ∈ {0, . . . , κ − 1}. The solution of
the previous system of equations gives a0 = a1 = . . . =
aκ−1 = 0, contradicting the assumption that c(x) is non-zero.
j
The set Y II comprises the set of sequences in b ∈
X (a, d − 1) that have the following properties:
n−κ
`
• The sequence 0 does not appear as a substring in b`+2 .
• It holds bn−κ+1 = 0.
• One has
n−κ
n
n
dH an−κ
`+1 , b`+1 + dH an−κ+2 , bn−κ+2 ≤ d − 2.
L2 =
Note that L0 , L1 , L2 are independent from a. Therefore,
Construction 5. (d − HD_κ − WMU_q_n Codes) Construct a
code C ⊆ Fnq according to
C = {a + e | a ∈ C1 , e = (1, 0, . . . , 0)}
where C1 is a [n, κ − 1, d] cyclic code.
We argue that C is a κ-WMU code, with minimum Hamming distance d. To justify the result, we first demonstrate
the property of weakly mutually uncorrelatedness. Suppose
that on the contrary the code is C is not κ-WMU. Then there
exists a proper prefix p of length at least κ such that both pa
and bp belong to C. In other words, the sequences (pa) − e
and (bp) − e belong to C1 . Consequently, (pb) − e0 belongs
to C1 , where e0 is a cyclic shift of e. Hence, by linearity
of C1 , z , 0(a − b) + e0 − e belongs to C1 . Now, observe
that the first coordinate of z is one, and hence nonzero. But
z has a run of zeros of length at least κ − 1, which is a
contradiction. Therefore, C is indeed a κ-WMU code. Since
C is a coset of C1 , the minimum Hamming distance property
follows immediately.
As an example, consider the family of primitive binary terror-correcting BCH codes with parameters [n = 2m − 1, ≥
n − mt, ≥ 2t + 1]. The family is cyclic, and when used in
Construction 5, it results in an error-correcting (n − mt + 1)WMU code of minimum distance 2t + 1. The rate of such a
≥ 1 − 2mmt−1 , while according to the Theorem
code is n−mt
n
3, the cardinality of the optimal-order corresponding κ-WMU
8
Error-correcting linear code
Error-correcting MU code
1.0
Relative rate
0.8
0.6
0.4
0.2
0.0
0
10
20
30
Hamming distance
40
50
Figure 1. Comparison of two different lower bounds for binary codes: Error-correcting MU codes (inequality (5) of Theorem 4) and the best known linear
error-correcting codes; n = 50, κ = 1, as κ = 1-WMU codes are MU codes.
code is at least
rate of at least
0.04688×2n
,
mt
n
corresponding to an information
)
log( 0.04688×2
5 + log (mt)
mt
>1−
.
(9)
n
2m − 1
As an illustration, we compare the rates of the BCH-based
κ-WMU and the optimal κ-WMU codes for different values
of m = 10, t = 1, 3, 5:
(i) m = 10, t = 1: In this case our BCH code has length
1023, dimension 1013, and minimum Hamming distance
3. This choice of a code results in a binary 1014WMU code with minimum Hamming distance 3, and
information rate 0.9902, while the optimal binary 1014WMU code has information rate greater than 0.9919.
(ii) m = 10, t = 3: In this case our BCH code has length
1023, dimension 993, and minimum Hamming distance 7.
This choice of a code results in a binary 994-WMU code
with minimum Hamming distance 7, and information rate
0.9707, while the optimal binary 994-WMU code has
information rate greater than 0.9903.
(iii) m = 10, t = 5: In this case our BCH code has length
1023, dimension 973, and minimum Hamming distance
11. This choice of a code results in a binary 974WMU code with minimum Hamming distance 11, and
information rate 0.9511, while the optimal binary 974WMU code has information rate greater than 0.9896.
Next, we present a construction for MU ECC codes of
length n, minimum Hamming distance 2t + 1 and of size
roughly (t + 1) log n. This construction outperforms the previous approach for codes of large rate, whenever t is a small
constant.
Assume that one is given a linear code of length n0 and
minimum Hamming distance dH = 2t + 1, equipped with
0
a systematic encoder EH (n0 , t) : {0, 1}κ → {0, 1}n −κ which
inputs κ information bits and outputs n0 −κ parity bits. We feed
into the encoder EH sequences u ∈ {0, 1}κ that do not contain
runs of zeros of length ` − 1 or more, where ` = log(4n0 ). Let
p = d n0κ−κ e > `. The MU ECC codesequences are of length
n = n0 + ` + 2, and obtained according to the constrained
information sequence u as:
2p
1
2
(0, 0 . . . , 0, 1, up
1 ,EH (u)1 , up+1 , EH (u)2 ,
0
0
n −κ
3
n
u3p
2p+1 ,EH (u)3 . . . , u(n0 −κ−1)p+1 , EH (u)n0 −κ , 1).
The codesequences start with the 0` 1 substring, and are
followed by sequences u interleaved with parity bits, which
are inserted every p > ` positions. Notice that the effect of the
inserted bits is that they can extend the lengths of existing runs
of zeros in u by at most one. Since u has no runs of lengths
` − 1 or more this means that we do not see any runs of zeros
of length ≥ ` in the last n − ` − 1 bits of x. This implies
that the underlying code is MU, while the ECC properties are
inherited from the initial linear code.
5. BALANCED κ-WMU C ODES
In what follows, we focus on the analysis of balanced κWMU codes, and start with a review of known bounds on the
number of balanced binary sequences.
Let Ad−HD_2_n denote the maximum size of a binary code
of length n and minimum Hamming distance d, and let
Aw−CST_d−HD_2_n denote the maximum cardinality of a binary
code with constant weight w, length n and even minimum
Hamming distance dH . Clearly,
n
n
A 2 −CST_2−HD_2_n = n .
2
Gyorfi et al. [27] derived several bounds for the more general
function Aw−CST_d−HD_2_n based on Ad−HD_2_n .
Theorem 5. For even integer d, 0 ≤ d ≤ n, and every w,
0 ≤ w ≤ n,
n
w
2n−1
Ad−HD_2_n ≤ Aw−CST_d−HD_2_n .
9
We present next our first construction of balanced κ-WMU
codes.
Construction 6. (BAL_κ − WMU_4_n Codes) Form a code C ∈
n
{A, T, C, G} using the decoupled construction with component
codes C1 and C2 chosen according to the following rules:
n
• Let C1 ⊆ {0, 1} be a balanced code of size equal to
n
A 2 −CST_2−HD_2_n .
n
• Let C2 ⊆ {0, 1}
be a κ-WMU code; one may use
Construction 4 to generate C2 .
n
Lemma 4. Let C ∈ {A, T, C, G} denote the code generated
by Construction 6. Then,
(i) C is a κ-WMU code.
(ii) C is balanced.
Proof:
(i) Since C2 is a κ-WMU code, property ii) of Lemma 2
ensures that C is also a κ-WMU code.
(ii) Since C1 is balanced, property i) of Lemma 2 ensures that
C is a balanced binary code.
This completes the proof.
We discuss next the cardinality of the code C generated
by Construction 6. According to Theorem
3, one has |C2 | =
2n
. In addition, |C1 | = nn . Hence, the size of C is
c2 n−κ+1
2
bounded from below by:
n
n
n 2
2
c2
.
n−κ+1
The following Theorem proves that both Construction 1 and
6 are order optimal, in the sense that they produce codes with
cardinality within a constant factor away from the maximal
achievable value.
Theorem 6. Let ABAL_κ−WMU_q_n denote the maximum size of
a balanced κ-WMU code over Fnq , for n ≥ 2 and q ∈ {2, 4}.
Then,
(i)
n
n
n
n
n 2
n 2
2
2
c2
≤ ABAL_κ−WMU_4_n ≤
.
n−κ+1
n−κ+1
k
j
n
pairs (a, i1 ) , . . . , a, ib n c ∈ X.
are at most n−κ+1
n−κ+1
This implies that
n nn ( 2q )n
2
|X| ≤
.
n−κ+1
( nn2 )( q2 )n
Therefore, |C| ≤ n−κ+1
.
The lower bound in (i) can be achieved through Construction 6, while the lower bound in (iii) can be met using
Construction 1.
We complete our discussion by briefly pointing out how to
use the balanced MU code Construction 1 to derive a balanced
n
κ-WMU code C ∈ {A, T, C, G} that has the prefix balancing
property with parameter D. For this purpose, we generate C
according to the balanced WMU Construction 6. We set C2 =
n
κ−1
{0, 1} and construct C1 by concatenating C10 ⊆ {0, 1}
and
n−κ+1
00
0
00
C1 ⊆ {0, 1}
. Here, C1 is balanced and C1 is a balanced
WMU code with parameter D. It is easy to verify that C is a
balanced κ-WMU DNA code with prefix-balancing parameter
D and of cardinality
n−κ
κ−1
) Dyck(
, D) 2n
|C| =|C10 | |C100 | |C2 | = A(κ − 1, 2,
2
2
π
π
4n tan2 D+1
cosn−κ D+1
∼
.
√
1
2 π (D + 1) (κ − 1) 2
6. APD-MU C ODES
Our next goal is to provide constructions for κ-WMU codes
that do not form primer dimer byproducts.
We first discuss a construction of binary MU codes with the
APD property.
Construction 7. (f − APD_MU_2_n) Let n, f, `, p be positive
integers such that n = pf and ` + 3 ≤ f2 . Let
C = {a1 a2 . . . a2p | a ∈ C1 , a2 , . . . , a2p ∈ C2 }
f
where C1 ⊆ F22 is the set of binary sequences a =
(a1 , . . . , a f ) such that:
2
•
•
(ii)
n
ABAL_κ−WMU_2_n ≤
n
2
f
n−κ+1
.
(iii)
n
n
2
n
2(n − 1)
≤ ABAL_MU_2_n ≤
The sequence a starts with 0` 1 and ends with 1;
f
2
The substring a`+1
does not contain 0` as a substring,
n
2
n
.
Proof: To prove the upper bounds, we use the same
technique as that described in Theorem 3. Assume that C ⊆ Fnq
is a balanced κ-WMU code, for q ∈ {2, 4}, and consider the
set X of pairs (a, i) where a ∈ Fnq , i ∈ {1, . . . , n}, and the
cyclic shift of the sequence a starting at position i belongs to
C. One may easily verify that |X| = n |C|. On the other hand,
if (a, i) ∈ X, then a is balanced itself and there are nn ( 2q )n
2
balanced sequences to select from. Moreover, (a, j) ∈
/ X,
for j ∈
/ {i ± 1, . . . , i ± (n − κ)}mod n due to the κ-WMU
property. Hence, for a fixed balanced sequence a ∈ Fnq , there
and where C2 ⊆ F22 is the set of binary sequences a =
(a1 , . . . , a f ) such that:
2
• The sequence a ends with 1;
`
• The sequence a contains 01 0 as a substring.
`
• The sequence a does not contain 0 as a substring.
n
Lemma 5. Let C ∈ {0, 1}
Construction 7. Then,
(i) C is an MU code.
(ii) C is an f -APD code.
denote the code generated by
Proof: The proof follows from two observations, namely
(i) The code C satisfies the constraints described in Construction 2, and is hence an MU code.
(ii) Any substring of length f of any sequence in C contains
an element from C2 as a substring. Hence, any substring
of length f in C contains 01` 0 as a substring, and so
10
the reverse and forward complement sequence contains
10` 1. Furthermore, no proper substring of length f in C
contains 10` 1 as a substring. Hence, C is also an f -APD
code.
Next, we use Lemma 1 to derive a lower bound on the size
of the codes C1 and C2 in Construction 7, and a lower bound
on the size of the code C. First, notice that
!
f
f
f
22
f
22
2 −`−2
≥ `+2 1 − `+1 ,
|C1 | ≥ `+2 1 −
2
2`
2
2
which follows from Lemma 1, with n = f2 −`−2, ns = `, t =
1. To bound the cardinality of C2 we define an auxiliary code
f
C3 ⊆ {0, 1} 2 −`−3 such that sequences in C3 avoid 0`−1 , 1`−1
as a substring. One can once more apply Lemma 1 with n =
f
2 − ` − 3, ns = ` − 1, t = 2, to obtain
!
f
f
4( f2 − ` − 3)
22
22
f
|C3 | ≥ `+3 1 −
≥
(1 − `−1 ).
2
2`
2`+3
2
Notice that by inserting 01` 0 into sequences in C3 at any of
the f2 − ` − 2 allowed positions, and then appending 1 to the
newly obtained sequence, we obtain a subset of C2 of size
( f2 − ` − 2)|C3 |. Therefore,
f
22
f
f
−`−2
(1 − `−1 ).
|C2 | ≥
2
2`+3
2
For ` = dlog2 (3f )e, one can verify that the size of the code C1
f
is within a constant factor of
21
f
, and the size of C2 is within
f
2
a constant factor of 2 . In the last step, we use the fact that
|C| = |C1 ||C2 |2p−1 to show that |C| is within a constant factor
n
of 2n . Therefore, Construction 7 produces an order-optimal
f -APD MU binary codes. The result is summarized in the
following theorem.
Theorem 7. Let Af−APD_MU_2_n denote the maximum size of
an f − APD_MU_2_n code, for positive integers n = pf such
that p is a constant factor. Then, there exist constants c3 > 0
such that
2n
2n
≤ Af−APD_MU_2_n ≤ .
c3
n
n
Proof: The lower bound is a direct consequence of Construction 7, while the upper bound follows from Theorem 1,
and the fact that any f − APD_MU_2_n code is also an MU_2_n
code.
7. APD, BALANCED , E RROR -C ORRECTING AND WMU
C ODES
In what follows, we describe the main results of our work:
Constructions of APD, balanced, error-correcting κ-WMU
codes. The gist of our approach is to use the decoupling
principle along with a pair of binary codes that satisfy one or
two of the desired binary primer constraints in order to obtain
a large set of proper address/primer sequences. In addition to
constructions based on the decoupling procedure, we introduce
a number of other constructions that directly produce the
desired q-ary codes with large codebooks, or allow for simple
encoding and decoding.
Recall Construction 5, which we showed results in an errorcorrecting κ-WMU DNA code. Map the elements in F4 to
{A, T, C, G} according to:
0 7→ A, 1 7→ C, ω 7→ T, ω + 1 7→ G,
where ω is a primitive element of the field F4 .
Let a be a sequence of length n. Then it is straightforward to see that the sequence (a, a + 1n ) is balanced, for
1n = (1, . . . , 1). These observations lead to the simple primer
construction described next.
Construction 8. (V1 : BAL_2d − HD_κ − WMU_4_n Codes) Let
C be an [ n2 , κ − 1, d] cyclic code over F4 that contains the all
ones vector 1. Then
n
{(c + e, c + 1 2 + e) : c ∈ C}
is a GC balanced, κ-WMU code with minimum Hamming
distance 2d.
The next construction follows by invoking the decoupling
principle with binary error-correcting WMU codes constructed
in Section 4 and codes meeting the bound of Theorem 5.
Construction 9. (V2 : BAL_d − HD_κ − WMU_4_n Codes)
n
Construct a code C ∈ {A, T, C, G} via the decoupled construction of Lemma 2 involving two codes:
(i) A balanced code C1 of length n, with minimum Hamming
distance d and of size A 2n −CST_d−HD_2_n .
n
(ii) A κ-WMU code C2 ⊆ {0, 1} of length n and minimum
Hamming distance d, described in Section 4.
n
Lemma 6. Let C ∈ {A, T, C, G} denote the code generated
by Construction 9. Then,
(i) C is a κ-WMU code.
(ii) C is balanced.
(iii) The minimum Hamming distance of C is at least d.
Example 1. The size of the code C obtained from Construction 9 equals
|C| =|C1 | |C2 |
2n A 2n −CST_d−HD_2_n
(n − κ + 1) (L0 − L1 − L2 )
n
n Ad−HD_2_n
2
≥ 0.09376
.
(n − κ + 1) (L0 − L1 − L2 )
≥ c2
(10)
The last two inequalities follow from the lower bounds of
Lemma 4 and Theorem 5, respectively.
Figure 2 plots the lower bound on the maximum achievable
rate for error-correcting κ-WMU codes (5), balanced errorcorrecting κ-WMU codes (10), and for comparison, the best
known linear error-correcting codes over quaternary alphabets.
The parameters used are n = 50, κ = 25.
The next result shows that Construction 7 may be used to
devise sequences that are balanced, MU and do not form any
PDs.
11
Error-correcting linear code
Error-correcting WMU code
Balanced error-correcting WMU code
1.0
Relative rate
0.8
0.6
0.4
0.2
0.0
0
10
20
30
Hamming distance
40
50
Figure 2. Comparison of three different lower bounds for quaternary codes: Balanced error-correcting κ-WMU codes (inequality (10) in Example 1),
error-correcting κ-WMU codes (inequality (5) in Theorem 4) and the best known linear error-correcting codes; n = 50, κ = 25.
Construction 10. (f − APD_BAL_MU_4_n Codes) Using the
decoupled code construction in Lemma 2, a balanced, MU
code C ∈ Fn4 that avoids PDs may be obtained by choosing
C1 ⊆ Fn2 to be an BAL_2_n code, and C2 ⊆ Fn2 to be an
f − APD_MU_2_n code.
It is straightforward to see that |C1 | = nn and that |C2 | ≥
2
( nn ) 2n
2n
c3 n . Therefore, the size of C is at least c3 2 n .
Theorem 8. Let Af−APD_BAL_MU_4_n denote the maximum size
of a f − APD_BAL_MU_4_n code. Then
n
n
n
n
n 2
n 2
2
2
c3
≤ Af−APD_BAL_MU_4_n ≤
.
n
n
Proof: The lower bound is the direct consequence of
Construction 10. To prove the upper bound, observe that
any f − APD_BAL_MU_4_n code is also a valid BAL_MU_4_n
code. The upper bound on the cardinality of an BAL_MU_4_n
code may be obtained from the upper bound of Theorem 6,
pertaining to a BAL_WMU_4_n code, by setting κ = 1.
Next, we discuss an iterative construction based on an APD,
balanced, error-correcting and κ-WMU seed code.
Construction 11. For a given integer s ≥ 1, let C0 be a set
of sequences in Fsq . Let
(i)
(ii)
(iii)
(iv)
C
C
C
C
is 2f -APD if C0 is f -APD.
is balanced if C0 is balanced.
and C0 have the same minimum Hamming distance.
is κ-WMU if C0 is κ-WMU.
Proof:
(i) Any proper substring of length 2f of any codesequence
in C contains a proper substring of length f of a codesequence in C0 . Then, C is 2f -APD if C0 is f -APD.
(ii) Codesequences in C form by concatenating codesequences in C0 . If C0 is balanced then each codesequences
in C is also balanced.
(iii) Again, any two distinct codesequences in C differ in at
least one of the concatenated codesequences from C0 .
Therefore, C and C0 have identical minimum Hamming
distance.
(iv) For any pair of not necessarily distinct a, b ∈ C and for
κ ≤ l < n, we show that al1 and bnn−l+1 cannot be
identical. This establishes that the constructed concate
nated code is WMU. Let l = is + j, where i = sl and
0 ≤ j < s. We consider three different scenarios for the
index j:
•
C = {a1 . . . am | ai ∈ Ci for 1 ≤ i ≤ m} ,
where the subset codes C1 , . . . , Cm ⊆ C0 are chosen according
to:
•
C1 ∩ C m = ∅
and (C1 ∩ Cm−1 = ∅) or (C2 ∩ Cm = ∅)
..
.
and (C1 ∩ C2 = ∅) or . . . or (Cm−1 ∩ Cm = ∅).
Lemma 7. Let C ⊆ Fnq be a code generated according to the
Construction 11. Then
•
j = 0; In this case, 1 ≤ i < m. Therefore, (C1 ∩
Cm−i+1 = ∅) or . . . or (Ci ∩ C1 = ∅) implies that
al1 6= bnn−l+1 .
0 < j < κ; Again, one can verify that 1 ≤ i < m. It
is easy to show that al−j
l−s+1 is a suffix of length s − j
of a sequence in C0 and bn−j
n−s+1 is a prefix of length
s − j of an element in C0 . Since κ < s − j < s, one
n−j
l
n
has al−j
l−s+1 6= bn−s+1 . Hence, a1 6= bn−l+1 .
l
κ ≤ j < s; In this case, al−j+1 is a proper prefix of
length j of a sequence in C0 , and bnn−j+1 is a proper
suffix of length j of an element in C0 . Since κ ≤ j <
s, one has all−j+1 6= bnn−j+1 and al1 6= bnn−l+1 .
12
8. I NFORMATION E NCODING WITH WMU ADDRESSES
In order to store user data in DNA, one needs to encode
the binary information into relatively short sequences of nucleotide, each of which is equipped with a unique address
sequence that satisfies the constraints outlined in the previous
section. As already described, in order to enable accurate
random access via PCR, the information bearing content of
the sequences has to avoid the set of address sequences. This
leads to the following problem formulation.
Given a set of sequences A ⊆ Fnq , let CA (N ) ⊆ FN
q denote
another collection of sequences that avoid members of A as
substrings, i.e., a 6= bn+i−1
for every a ∈ A, b ∈ CA (N ),
i
1 ≤ i ≤ N − n + 1. We refer to A as the set of addresses and
CA (N ) as the set of address-avoiding information blocks.
We discuss next three different schemes for constructing an
information codebook CA (N ) of sequences of length N for
particular sets of address sequences A.
Let C be an κ-WMU code over Fnq , for κ ≤ n2 , and let
A ⊂ C. For a given integer s ≥ 1, let N = s n and define
N
CA (N ) ⊆ FN
q as the collection of all sequences b ∈ Fq of
the form
b = b1 . . . bs ,
where bi ∈ C − A, for 1 ≤ i ≤ s. This construction is
illustrated in Figure 3. We show next that no b ∈ CA (N )
contains any a ∈ A as a substring.
The proof follows by contradiction. Assume that a appears
as substring in bi bi+1 , for some 1 ≤ i < s. Since a ∈ A and
bi , bi+1 ∈ C − A, a may be written as a = sp, where s is a
proper suffix of bi and p is a proper prefix of bi+1 . Then one
of the two strings p or s has length greater than or equal to
n
2 ≥ κ, which contradicts the fact that C is an κ-WMU code.
The previously described construction may be easily extended to obtain error-correcting information blocks CA (N ).
We start by identifying a bijection M from C − A to a finite
field Fpt with appropriate prime parameter p and t ≥ 1; for
this purpose, we expurgate codesequences from the set C so
that |C| − |A| = pt .
The bijection M is used to convert every sequence b =
b1 . . . bs in CA (N ) to a sequence v = v1 . . . vs ∈ Fspt , where
vi = M(bi ), for 1 ≤ i ≤ s. The sequence v is encoded
using an [r, s, r −s+1]pt Reed-Solomon (RS) error correcting
code to arrive at a codesequence w = w1 . . . wr ∈ Frpt , where
wi ∈ Fpt for 1 ≤ i ≤ r. Since M is a bijection, one can apply
M−1 to w to reconstruct c = c1 . . . cr ∈ Fsq r , where ci =
M−1 (wi ), for 1 ≤ i ≤ r. Since c is obtained by concatenating
elements from C − A, it is easy to verify that c does not
contain any element of A as a substring. Moreover, the RS
code guarantees that given a sequence c with at most b r−s
2 c
errors, one can still fully recover b.
For the second scheme, assume that C1 , C2 ⊆ Fn2 are two
disjoint collections of binary sequences of length n such that
for all a ∈ C1 , the cyclic shifts of a do not belong to C2 , i.e.,
for all a ∈ C1 , ani ai−1
∈
/ C2 for all 1 ≤ i ≤ n.
1
Now given C1 and C2 , define the set of addresses A ⊆ F2n
4
as
A = Ψ(c, aa) | a ∈ C1 , c ∈ F2n
2
where Ψ was introduced in (4). To construct CA (N ), let s ≥ 1
be an integer such that N = s n. We define CA (N ) ⊆ FN
4 as
the collection of all sequences b = b1 . . . bs ∈ FN
4 where
bi ∈ Fn4 that can be written as bi = Ψ(fi , gi ), for some
gi ∈ C2 , fi ∈ Fn2 and 1 ≤ i ≤ s. We claim that CA (N ) does
not contain any element of A a as substring.
If Ψ(c, aa) ∈ A appears as a substring in a sequence b ∈
CA (N ), then there exists an index 1 ≤ i ≤ s − 2 such that
Ψ(c, aa) is a substring of bi bi+2 bi+3 . Since Ψ is a bijection
one can verify that aa appears as a substring in gi gi+1 gi+2 ,
for a ∈ C1 and gi , gi+1 , gi+2 ∈ C2 . In addition, C1 ∩ C2 = ∅
implies that aa can be written as aa = sgi+1 p, where s is a
proper suffix of gi and p is a proper prefix of gi+2 . It is clear
that a = sp and gi+1 = ps; hence, gi+1 ∈ C2 is a cyclic
shift of a ∈ C1 , which contradicts the fact that C2 contains no
cyclic shifts of elements in C1 .
The last information block design scheme we present is
endowed with a simple encoding and decoding procedure.
Let A ⊆ Fnq be a collection of sequences of length n such
that e ∈
/ A, where e = (0, . . . , 0, 1). For the purpose of
information block encoding, we may assume that A is a κWMU code with desired primer properties, constructed using
cyclic error-correcting codes of minimum distance at least
three, as described in Constructions 8 and 9. Let N > n
N −n+1
and define I , {a|an−1
∈ Fn−1
, aN
}, so that
q
n ∈ Fq−1
1
|I| = q n−1 (q − 1)N −n+1 . There is an efficient encoding
scheme that maps elements of I to a set of sequences CA (N )
of length N that avoid all codesequences in A.
Let H be a parity-check matrix of A. Hence, a sequence c
belongs to A if and only if cH = 0. Also, since e ∈
/ A, one
has eH 6= 0.
To describe the encoding procedure, we define the following
× {0, 1, . . . , q − 2} → Fq . Given a ∈ Fn−1
function φ : Fn−1
q
q
and 0 ≤ i ≤ q − 2, let an = φ(a, i) be the i smallest element
in Fq such that (a, an )H 6= 0. For this function to be welldefined, it suffices to demonstrate that there are at least q − 1
elements in Fq such that appending one of them to a yields a
decoding syndrome not equal to 0. Suppose otherwise. Then
there exist distinct u, u0 such that (a, u)H = (a, u0 )H = 0.
The last equality may be rewritten as (0, u − u0 )H = (u −
u0 )eH = 0, contradicting the starting assumption.
Encoding a sequence a results in a sequence b obtained by
concatenating the following sequences:
(
ai
if 1 ≤ i ≤ n − 1
bi =
i−1
φ(bi−n+1 , ai ), otherwise.
It is straightforward to see that sequences obtained via this
encoding method avoid all elements of the codebook A.
9. C ONCLUSIONS
Motivated by emerging code design problems for DNAbased data storage, we introduced the problem of address/primer sequence design. The address design problem
reduces to constructing sequences that satisfy a new form
of mutual uncorrelatedness and in addition, are balanced, at
sufficient Hamming distance from each other and such that
they avoid primer dimers which arise if a substring of an
0𝑙
Avoid 0𝑙
≠0
≠0
13
WMU Code Partition
Part 1
Address
Part 2
Sub-block 1
Sub-block 2
…
Figure 3. Concatenation construction for information blocks avoiding κ-WMU primer sequences. The gist of the approach is to use a subset of address
sequences for actual addressing, and the remaining sequences as blocks to be concatenated.
Table I
S UMMARY OF THE OPTIMAL CODE CONSTRUCTIONS FOR VARIOUS CONSTRAINED WMU CODES .
Construction No.
1
Name
BAL_MU_2_n
2
4
MU_q_n
WMU_q_n
6
BAL_κ − WMU_4_n
7
f − APD_MU_2_n
10
f − APD_BAL_MU_4_n
Rate
n
1
2(n−1) n
2
n
cq qn
qn
cq n−κ+1
n
n
n 2
2
c2 n−κ+1
n
c3 2n
n
n
n 2
c3 2 n
Features
Binary, Balanced, MU
Comment
q-ary, MU
q-ary, κ-WMU
q ∈ {2, 4}, c2 = 0.04688, c4 = 0.06152
q ∈ {2, 4}, c2 = 0.04688, c4 = 0.06152
4-ary, Balanced, κ-WMU
c2 = 0.04688
Binary, f -APD, MU
For some constant c3 > 0
4-ary, f -APD, Balanced, MU
For some constant c3 > 0
address sequence is also a substring of the reverse complement
sequence of the same or another address sequence. Our main
results are listed in Table I. Given the constructed address sequences, we also described information encoding methods for
sequences endowed with addresses, such that they avoid any
address as a proper substring. This address avoidance property
allows one to randomly access desired DNA sequences via
simple and inexpensive PCR reactions.
R EFERENCES
[1] V. Levenshtein, “Decoding automata, invariant with respect to the initial
state,” Problemy Kibernet, vol. 12, pp. 125–136, 1964.
[2] A. J. De Lind Van Wijngaarden and T. J. Willink, “Frame synchronization using distributed sequences,” Communications, IEEE Transactions
on, vol. 48, no. 12, pp. 2127–2138, 2000.
[3] D. Bajić and J. Stojanović, “Distributed sequences and search process,”
in Communications, 2004 IEEE International Conference on, vol. 1.
IEEE, 2004, pp. 514–518.
[4] S. Bilotta, E. Pergola, and R. Pinzani, “A new approach to cross-bifixfree sets,” IEEE Transactions on Information Theory, vol. 6, no. 58, pp.
4058–4063, 2012.
[5] S. R. Blackburn, “Non-overlapping codes,” IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4890–4894, 2015.
[6] G. M. Church, Y. Gao, and S. Kosuri, “Next-generation digital information storage in DNA,” Science, vol. 337, no. 6102, pp. 1628–1628,
2012.
[7] N. Goldman, P. Bertone, S. Chen, C. Dessimoz, E. M. LeProust,
B. Sipos, and E. Birney, “Towards practical, high-capacity, lowmaintenance information storage in synthesized DNA,” Nature, 2013.
[8] S. Yazdi, Y. Yuan, J. Ma, H. Zhao, and O. Milenkovic, “A rewritable,
random-access DNA-based storage system,” Scientific Reports, vol. 5,
no. 14138, 2015.
[9] S. H. T. Yazdi, R. Gabrys, and O. Milenkovic, “Portable and error-free
DNA-based data storage,” Scientific Reports, vol. 7, 2017.
[10] H. M. Kiah, G. J. Puleo, and O. Milenkovic, “Codes for DNA sequence
profiles,” IEEE Transactions on Information Theory, vol. 62, no. 6, pp.
3125–3146, 2016.
[11] R. Gabrys, E. Yaakobi, and O. Milenkovic, “Codes in the Damerau
distance for DNA storage,” in Information Theory (ISIT), 2016 IEEE
International Symposium on. IEEE, 2016, pp. 2644–2648.
[12] R. Gabrys, H. M. Kiah, and O. Milenkovic, “Asymmetric Lee distance
codes for DNA-based storage,” IEEE Transactions on Information
Theory, 2017.
[13] S. Yazdi, H. M. Kiah, E. R. Garcia, J. Ma, H. Zhao, and O. Milenkovic,
“DNA-based storage: Trends and methods,” Molecular, Biological, and
Multi-Scale Communications, IEEE Transactions on, to appear.
[14] S. H. T. Yazdi, R. Gabrys, and O. Milenkovic, “Portable and error-free
DNA-based data storage,” bioRxiv, p. 079442, 2016.
[15] P. Yakovchuk, E. Protozanova, and M. D. Frank-Kamenetskii, “Basestacking and base-pairing contributions into thermal stability of the DNA
double helix,” Nucleic acids research, vol. 34, no. 2, pp. 564–574, 2006.
[16] P. M. Vallone, J. M. Butler et al., “AutoDimer: a screening tool for
primer-dimer and hairpin structures,” Biotechniques, vol. 37, no. 2, pp.
226–231, 2004.
[17] K. A. S. Immink, Codes for mass data storage systems. Shannon
Foundation Publisher, 2004.
[18] M. Levy and E. Yaakobi, “Mutually uncorrelated codes for DNA storage,” in Information Theory (ISIT), 2017 IEEE International Symposium
on. IEEE, 2017, pp. 3115–3119.
[19] O. Milenkovic and N. Kashyap, “On the design of codes for DNA
computing,” in Coding and Cryptography. Springer, 2006, pp. 100–119.
[20] ——, “DNA codes that avoid secondary structures,” in Information
Theory, 2005. ISIT 2005. Proceedings. International Symposium on.
IEEE, 2005, pp. 288–292.
[21] E. Gilbert, “Synchronization of binary messages,” Information Theory,
IRE Transactions on, vol. 6, no. 4, pp. 470–477, 1960.
[22] L. J. Guibas and A. M. Odlyzko, “Maximal prefix-synchronized codes,”
SIAM Journal on Applied Mathematics, vol. 35, no. 2, pp. 401–418,
1978.
[23] N. de Bruijn, D. Knuth, and S. Rice, “The average height of planted
plane trees,” Graph Theory and Computing/Ed. RC Read, p. 15, 1972.
14
[24] E. N. Gilbert, “A comparison of signalling alphabets,” Bell System
Technical Journal, vol. 31, no. 3, pp. 504–522, 1952.
[25] R. Varshamov, “Estimate of the number of signals in error correcting
codes,” in Dokl. Akad. Nauk SSSR, vol. 117, no. 5, 1957, pp. 739–741.
[26] S. Tavares, “A study of synchronization techniques for binary cyclic
codes,” Ph.D. dissertation, Thesis (Ph. D.)–McGill University, 1968.
[27] L. Gyorfi, J. Massey et al., “Constructions of binary constant-weight
cyclic codes and cyclically permutable codes,” IEEE Transactions on
Information Theory, vol. 38, no. 3, pp. 940–949, 1992.
| 7cs.IT
|
A NEW OUTLOOK ON COFINITENESS
KAMRAN DIVAANI-AAZAR, HOSSEIN FARIDIAN AND MASSOUD TOUSI
Abstract. Let a be an ideal of a commutative noetherian (not necessarily local) ring
arXiv:1701.07716v2 [math.AC] 15 Nov 2017
R. In the case cd(a, R) ≤ 1, we show that the subcategory of a-cofinite R-modules is
abelian. Using this and the technique of way-out functors, we show that if cd(a, R) ≤ 1,
or dim(R/a) ≤ 1, or dim(R) ≤ 2, then the local cohomology module Hai (X) is a-cofinite
for every R-complex X with finitely generated homology modules and every i ∈ Z. We
further answer Question 1.3 in the three aforementioned cases, and reveal a correlation
between Questions 1.1, 1.2, and 1.3.
1. Introduction
Throughout this paper, R denotes a commutative noetherian ring with identity and M(R)
flags the category of R-modules.
In 1969, Hartshorne introduced the notion of cofiniteness for modules and complexes; see
[Ha1]. He defined an R-module M to be a-cofinite if SuppR (M ) ⊆ V(a) and ExtiR (R/a, M )
is finitely generated for every i ≥ 0. Moreover, in the case where R is an a-adically complete
regular ring of finite Krull dimension, he defined an R-complex X to be a-cofinite if X ≃
R HomR Y, RΓa (R) for some R-complex Y with finitely generated homology modules. He
then proceeded to pose three questions in this direction which we paraphrase as follows.
Question 1.1. Is the local cohomology module Hai (M ), a-cofinite for every finitely generated
R-module M and every i ≥ 0?
Question 1.2. Is the category M(R, a)cof consisting of a-cofinite R-modules an abelian
subcategory of M(R)?
Question 1.3. Is it true that an R-complex X is a-cofinite if and only the homology module
Hi (X) is a-cofinite for every i ∈ Z?
By providing a counterexample, Hartshorne showed that the answers to these questions
are negative in general; see [Ha1, Section 3]. However, he established affirmative answers
to these questions in the case where a is a principal ideal generated by a nonzerodivisor
and R is an a-adically complete regular ring of finite Krull dimension, and also in the case
where a is a prime ideal with dim(R/a) = 1 and R is a complete regular local ring; see [Ha1,
Propositions 6.1 and 6.2, Corollary 6.3, Theorem 7.5, Proposition 7.6 and Corollary 7.7].
Since then many papers are devoted to study his first two questions; see for example [HK],
2010 Mathematics Subject Classification. 13D45; 13D07; 13D09.
Key words and phrases. Abelian category; cofinite module; cohomological dimension; derived category;
dualizing complex; local cohomology module; local homology module.
The research of the first author is supported by a grant from IPM (No. 95130212).
1
2
K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI
[DM], [Ka1], [Ka2], [Me1], [Me2]. These results were extended in several stages to take the
following form:
Theorem 1.4. Let a be an ideal of R such that either ara(a) ≤ 1, or dim(R/a) ≤ 1, or
dim(R) ≤ 2. Then Hai (M ) is a-cofinite for every finitely generated R-module M and every
i ≥ 0, and M(R, a)cof is an abelian subcategory of M(R).
For the case ara(a) ≤ 1, refer to [Ka2, Theorem 1] and [Ka1, Theorem 2.1]. For the case
dim(R/a) ≤ 1, see [Me1, Theorem 2.6 and Corollary 2.12], [BNS, Corollary 2.8], and [BN,
Corollary 2.7]. For the case dim(R) ≤ 2, observe [Me2, Theorem 7.10] and [Me2, Theorem
7.4].
The significance of cofiniteness of the local cohomology modules mainly stems from the
fact that if an R-module M is a-cofinite, then its set of associated primes is finite as well as
all its Bass numbers and Betti numbers with respect to every prime ideal of R. It is worth
mentioning that the investigation of such finiteness properties is a long-sought problem in
commutative and homological algebra; see e.g. [HS] and [Ly].
In this paper, we deal with the above three questions. Theorems 2.2, 3.3, 3.5 and 4.3 are
our main results.
In [PAB, Question 1], the authors asked: Is M(R, a)cof an abelian subcategory of M(R)
for every ideal a of R with cd(a, R) ≤ 1? We answer this question affirmatively by deploying the theory of local homology; see Theorem 2.2. Note that there exists an inequality
cd(a, R) ≤ ara(a) that can be strict; see Example 2.3.
It turns out that to establish the cofiniteness of Hai (X) for any R-complex X with finitely
generated homology modules, all we need to know is the cofiniteness of Hai (M ) for any
finitely generated R-module M and the abelianness of M(R, a)cof ; see Theorem 3.3. The
crucial step to achieve this is to recruit the technique of way-out functors.
To be consistent in both module and complex cases, we define an R-complex X to be
a-cofinite if SuppR (X) ⊆ V(a) and R HomR (R/a, X) has finitely generated homology modules. Corollary 4.2 indicates that, for homologically bounded R-complexes, this definition
coincides with that of Hartshorne.
Questions 1.1 and 1.2 have been high-profile among researchers, whereas not much attention has been brought to Question 1.3. The most striking result on this question is [EK, Theorem 1] which confines itself to complete Gorenstein local domains and the case dim(R/a) = 1.
We answer Hartshorne’s third question in the cases cd(a, R) ≤ 1, dim(R/a) ≤ 1, and
dim(R) ≤ 2 with no extra assumptions on R; see Corollary 3.6 (ii). Having the results
thus far obtained at our disposal, we show that the answers to Questions 1.1 and 1.2 are
affirmative if and only if the answer to Question 1.3 is affirmative for all homologically
bounded R-complexes; see Theorem 4.3.
2. Question 1.2
We need to work in the framework of the derived category D(R). For more information,
refer to [AF], [Ha2], [Fo], [Li], and [Sp].
We let D❁ (R) (res. D❂ (R)) denote the full subcategory of D(R) consisting of R-complexes
X with Hi (X) = 0 for i ≫ 0 (res. i ≪ 0), and let D (R) := D❁ (R) ∩ D❂ (R). We further
A NEW OUTLOOK ON COFINITENESS
3
let Df (R) denote the full subcategory of D(R) consisting of R-complexes X with finitely
generated homology modules. We also feel free to use any combination of the subscripts
f
and the superscript as in D
(R), with the obvious meaning of the intersection of the two
subcategories involved.
Lemma 2.1. Let a be an ideal of R and X ∈ D (R). Then the following conditions are
equivalent:
f
(i) R HomR (R/a, X)
∈ D (R).
ba .
(ii) LΛa (X) ∈ Df R
Proof. See [WW, Propositions 7.4].
In this section, we show that given an ideal a of R with cd(a, R) ≤ 1, the subcategory
M(R, a)cof of M(R) is abelian. This fact is proved in [PAB, Theorem 2.4], under the
extra assumption that R is local. Here we relax this assumption. The tool here is the local
homology functors.
Recall that the local homology functors are the left derived functors of the completion
ca =
functor. More precisely, Hia (−) := Li Λa (−) for every i ≥ 0, where Λa (M ) := M
lim(M/an M ) for any R-module M . Further, we remind the cohomological dimension of M
←
−
n
with respect to a as
n
o
cd(a, M ) := sup i ∈ Z Hai (M ) 6= 0 .
Theorem 2.2. Let a be an ideal of R. Then the following assertions hold:
(i) An R-module M with SuppR (M ) ⊆ V (a) is a-cofinite if and only if Hia (M ) is a
ba -module for every 0 ≤ i ≤ cd(a, R).
finitely generated R
(ii) If cd(a, R) ≤ 1, then M(R, a)cof is an abelian subcategory of M(R).
Proof. (i): By [GM, Theorem 2.5 and Corollary 3.2], Hia (M ) = 0 for every i > cd(a, R).
Therefore, the assertion follows from Lemma 2.1.
(ii): Let M and N be two a-cofinite R-modules and f : M → N an R-homomorphism.
The short exact sequence
(2.2.1)
0 → ker f → M → im f → 0,
gives the exact sequence
H0a (M ) → H0a (im f ) → 0,
ba -module since H a (M ) is so. The
which in turn implies that H0a (im f ) is finitely generated R
0
short exact sequence
(2.2.2)
0 → im f → N → coker f → 0,
gives the exact sequence
(2.2.3)
H1a (N ) → H1a (coker f ) → H0a (im f ) → H0a (N ) → H0a (coker f ) → 0.
ba -modules, the exact sequence
As H0a (N ), H0a (im f ), and H1a (N ) are finitely generated R
a
a
b a -modules, and
(2.2.3) shows that H (coker f ) and H (coker f ) are finitely generated R
0
1
thus coker f is a-cofinite by (i). From the short exact sequence (2.2.2), we conclude that
4
K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI
im f is a-cofinite, and from the short exact sequence (2.2.1), we infer that ker f is a-cofinite.
It follows that M(R, a)cof is an abelian subcategory of M(R).
It is well-known that cd(a, R) ≤ ara(a). On the other hand, the following example shows
that an ideal a of R with cd(a, R) = 1 need not have ara(a) = 1. Hence Theorem 2.2 (ii)
genuinely generalizes Theorem 1.4.
Example 2.3. Let k be a field and S = k[[X, Y, Z, W ]]. Consider the elements f = XW −
Y Z, g = Y 3 − X 2 Z, and h = Z 3 − Y 2 W of S. Let R = S/f S, and a = (f, g, h)S/f S. Then
R is a noetherian local ring of dimension 3, cd(a, R) = 1, and ara(a) ≥ 2. See [HeSt, Remark
2.1 (ii)].
3. Question 1.3
In this section, we exploit the technique of way-out functors as the main tool to depart
from modules to complexes.
Definition 3.1. Let R and S be two rings, and F : D(R) → D(S) a covariant functor. We
say that
(i) F is way-out left if for every n ∈ Z, there is an m ∈ Z, such that for any R-complex
X with sup X ≤ m, we have sup F (X) ≤ n.
(ii) F is way-out right if for every n ∈ Z, there is an m ∈ Z, such that for any R-complex
X with inf X ≥ m, we have inf F (X) ≥ n.
(iii) F is way-out if it is both way-out left and way-out right.
The Way-out Lemma appears in [Ha2, Ch. I, Proposition 7.3]. However, we need a
refined version which is tailored to our needs. Since the proof of the original result in [Ha2,
Ch. I, Proposition 7.3] is left to the reader, we deem it appropriate to include a proof of our
refined version for the convenience of the reader as well as bookkeeping.
Lemma 3.2. Let R and S be two rings, and F : D(R) → D(S) a triangulated covariant
functor. Let A be an additive subcategory of M(R), and B an abelian subcategory of M(S)
which is closed under extensions. Suppose that Hi F (M ) ∈ B for every M ∈ A and every
i ∈ Z. Then the following assertions hold:
(i) If X ∈ D (R) with Hi (X) ∈ A for every i ∈ Z, then Hi F (X) ∈ B for every
i ∈ Z.
(ii) If F is way-out left and X ∈ D❁ (R) with Hi (X) ∈ A for every i ∈ Z, then
Hi F (X) ∈ B for every i ∈ Z.
(iii) If F is way-out right and X ∈ D❂ (R) with Hi (X) ∈ A for every i ∈ Z, then
Hi F (X) ∈ B for every i ∈ Z.
(iv) If F is way-out and X ∈ D(R) with Hi (X) ∈ A for every i ∈ Z, then Hi F (X) ∈ B
for every i ∈ Z.
Proof. (i): Let s = sup(X). Since amp(X) < ∞, we argue by induction on n = amp(X).
If n = 0, then X ≃ Σs Hs (X). Therefore,
Hi F (X) ∼
= Hi−s F Hs (X) ∈ B,
= Hi F Σs Hs (X) ∼
A NEW OUTLOOK ON COFINITENESS
5
as Hs (X) ∈ A. Now, let n ≥ 1 and assume that the result holds for amplitude less than n.
Since X ≃ Xs⊂ , there is a distinguished triangle
(3.2.1)
Σs Hs (X) → X → Xs−1⊂ → .
It is clear that the two R-complexes Σs Hs (X) and Xs−1⊂ have all their homology modules
in A
are less
the induction hypothesis implies that
than n. Therefore,
and their amplitudes
s
Hi F Σ Hs (X) ∈ B and Hi F Xs−1⊂ ∈ B for every i ∈ Z. Applying the functor F
to the distinguished triangle (3.2.1), we get the distinguished triangle
F Σs Hs (X) → F (X) → F (Xs−1⊂ ) →,
which in turn yields the long exact homology sequence
· · · → Hi+1 F (Xs−1⊂ ) → Hi F Σs Hs (X) → Hi F (X) →
Hi F (Xs−1⊂ ) → Hi−1 F Σs Hs (X) → · · · .
We break the displayed part of the above exact sequence into the following exact sequences
Hi+1 F (Xs−1⊂ ) → Hi F Σs Hs (X) → K → 0,
0 → K → Hi F (X) → L → 0,
0 → L → Hi F (Xs−1⊂ ) → Hi−1 F Σs Hs (X) .
Since the subcategory B is abelian, we conclude from the first and the third exact sequences
above that K, L ∈ B. Since B is closed under extensions, the second exact sequence above
implies that Hi F (X) ∈ B for every i ∈ Z.
(ii): Let i ∈ Z. Since F is way-out left, we can choose an integer j ∈ Z corresponding to
i − 1. Apply the functor F to the distinguished triangle
X⊃j+1 → X → Xj⊂ →,
to get the distinguished triangle
F (X⊃j+1 ) → F (X) → F (Xj⊂ ) → .
From the associated long exact homology sequence, we get
0 = Hi+1 F (Xj⊂ ) → Hi F (X⊃j+1 ) → Hi F (X) → Hi F (Xj⊂ ) = 0,
where the vanishing is due to the choice of j. Since X⊃j+1 ∈ D (R) with Hi (X⊃j+1 ) ∈ A
for every i ∈ Z, it follows from (i) that Hi F (X⊃j+1 ) ∈ B for every i ∈ Z, and as a
consequence, Hi F (X) ∈ B for every i ∈ Z.
(iii): Given i ∈ Z, choose the integer j corresponding to i + 1. The rest of the proof is
similar to (ii) using the distinguished triangle
X⊃j → X → Xj−1⊂ → .
(iv): Apply the functor F to the distinguished triangle
X⊃1 → X → X0⊂ →,
to get the distinguished triangle
F (X⊃1 ) → F (X) → F (X0⊂ ) → .
6
K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI
Since X0⊂ ∈ D❁ (R) and X⊃1 ∈ D❂ (R) with Hi (X0⊂ ), Hi (X⊃1 ) ∈ A for every i ∈ Z, we
deduce from (ii) and (iii) that Hi F (X0⊂ ) , Hi F (X⊃1 ) ∈ B for every i ∈ Z. Using the
associated long exact homology sequence, an argument similar to (i) yields that Hi F (X) ∈
B for every i ∈ Z.
The next result provides us with a suitable transition device from modules to complexes
when dealing with cofiniteness.
Theorem 3.3. If a is an ideal of R, then the functor RΓa (−) : D(R) → D(R) is triangulated
and way-out. As a consequence, if Hai (M ) is a-cofinite for every finitely generated R-module
M and every i ≥ 0, and M(R, a)cof is an abelian category, then Hai (X) is a-cofinite for
every X ∈ Df (R) and every i ∈ Z.
Proof. By [Li, Corollary 3.1.4], the functor RΓa (−) : D(R) → D(R) is triangulated and
way-out. Now, let A be the subcategory of finitely generated R-modules, and let B :=
M(R, a)cof . It can be easily seen that B is closed under extensions. It now follows from
Lemma 3.2 that Hai (X) = H−i RΓa (X) ∈ B for every X ∈ Df (R) and every i ∈ Z.
Lemma 3.4. Suppose that R admits a dualizing complex D, and a is an ideal of R. Further,
f
f
suppose that Hai (Z) is a-cofinite for every Z ∈ D❁
(R) and every i ∈ Z. Let Y ∈ D❂
(R),
and X := R HomR Y, RΓa (D) . Then Hi (X) is a-cofinite for every i ∈ Z.
f
Proof. Set Z := R HomR (Y, D). Then clearly, Z ∈ D❁
(R). Let Č(a) denote the Čech
complex on a sequence of elements a = a1 , ..., an ∈ R that generates a. For any R-complex
W , [Li, Proposition 3.1.2] yields that RΓa (W ) ≃ Č(a) ⊗L
R W . Now, by applying the Tensor
Evaluation Isomorphism, we get the following display:
X = R HomR Y, RΓa (D)
≃ Č(a) ⊗L
R R HomR (Y, D)
≃ Č(a) ⊗L
RZ
≃ RΓa (Z).
Hence Hi (X) ∼
= Ha−i (Z) for every i ∈ Z, and so and the conclusion follows.
The next result answers Hartshorne’s third question.
Theorem 3.5. Let a be an ideal of R and X ∈ D❁ (R). Then the following assertions hold:
(i) If Hi (X) is a-cofinite for every i ∈ Z, then X is a-cofinite.
(ii) Assume that R admits a dualizing complex D, a is contained in the Jacobson radical
f
of R, and Hai (Z) is a-cofinite for every Z ∈ D❁
(R) and every i ∈ Z. If X is
a-cofinite in the sense of Hartshorne, then Hi (X) is a-cofinite for all i ∈ Z.
Proof. (i) Suppose that Hi (X) is a-cofinite for all i ∈ Z. The spectral sequence
2
Ep,q
= ExtpR R/a, H−q (X) ⇒ Extp+q
R (R/a, X)
p
2
from the proof of [Ha1, Proposition 6.2], together with the assumption that Ep,q
is finitely
generated for every p, q ∈ Z, conspire to imply that Extp+q
R (R/a, X) is finitely generated.
A NEW OUTLOOK ON COFINITENESS
7
On the other hand, one has
SuppR (X) ⊆
[
SuppR (Hi (X)) ⊆ V(a).
i∈Z
Thus X is a-cofinite.
(ii) Suppose that X is a-cofinite in the sense of Hartshorne. Then by definition, there
is Y ∈ Df (R) such that X ≃ R HomR Y, RΓa (D) . Now, the Affine Duality Theorem [Li,
Theorem 4.3.1] implies that
ba
Y ⊗L
R R ≃ R HomR X, RΓa (D) .
Since idR (RΓa (D)) < ∞ and X ∈ D❁ (R), we conclude that R HomR X, RΓa (D) ∈
b a : M(R) −→ M(R) is faithfully flat, it turns out that
D❂ (R). As the functor − ⊗R R
f
Y ∈ D❂
(R). Now, the claim follows by Lemma 3.4.
Corollary 3.6. Let a be an ideal of R such that either cd(a, R) ≤ 1, or dim R/a ≤ 1, or
dim(R) ≤ 2. Then the following assertions hold:
(i) Hai (X) is a-cofinite for every X ∈ Df (R) and every i ∈ Z.
(ii) Assume that R admits a dualizing complex D and a is contained in the Jacobson
radical of R. If X ∈ D❁ (R) is a-cofinite in the sense of Hartshorne, then Hi (X) is
a-cofinite for all i ∈ Z.
Proof. (i) Follows from Theorem 1.4, [Me2, Corollary 3.14], Theorem 2.2 (ii) and Theorem
3.3.
(ii) Follows by (i) and Theorem 3.5 (ii).
4. Correlation between Questions 1.1, 1.2 and 1.3
In this section, we probe the connection between Hartshorne’s questions as highlighted
in the Introduction.
Some special cases of the following result is more or less proved in [PSY, Theorem 3.10
and Proposition 3.13]. However, we include it here with a different and shorter proof due
to its pivotal role in the theory of cofiniteness.
Lemma 4.1. Let a be an ideal of R and X ∈ D (R). Then the following assertions are
equivalent:
(i) R HomR (R/a, X) ∈ Df (R).
f
ba .
(ii) RΓa (X) ≃ RΓa (Z) for some Z ∈ D
R
f
b a , provided that R
ba enjoys
(iii) RΓa (X) ≃ R HomRba Y, RΓa (D) for some Y ∈ D
R
a dualizing complex D.
f
ba . Then by [AJL, Corollary
Proof. (i) ⇒ (ii): By Lemma 2.1, Z := LΛa (X) ∈ D
R
after (0.3)∗ ], we have
RΓa (Z) ≃ RΓa LΛa (X) ≃ RΓa (X).
(ii) ⇒ (iii): Set Y := R HomRba (Z, D). If idRba (D) = n, then there is a semi-injective
≃
resolution D −
→ I of D such that Ii = 0 for every i > sup D or i < −n. In particular, I
8
K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI
f
ba -complex Z ′ such
ba , so there is a bounded R
is bounded. On the other hand, Z ∈ D
R
that Z ≃ Z ′ . Therefore,
Y = R HomRba (Z, D) ≃ R HomRba (Z ′ , D) ≃ HomRba (Z ′ , I).
f
ba .
But it is obvious that HomRba (Z ′ , I) is bounded, so Y ∈ D
R
Now, let Č(a) denote the Čech complex on a sequence of elements a = a1 , ..., an ∈ R that
generates a. We have
RΓa (X) ≃ RΓa (Z)
≃ RΓa R HomRba R HomRba (Z, D), D
≃ RΓa R HomRba (Y, D)
≃ Č(a) ⊗L
ba (Y, D)
R R HomR
≃ R HomRba Y, Č(a) ⊗L
D
R
≃ R HomRba Y, RΓa (D) .
ba -module, and the fifth
The second isomorphism is due to the fact that D is a dualizing R
isomorphism follows from the application of the Tensor Evaluation Isomorphism. The other
isomorphisms are straightforward.
(iii) ⇒ (i): Similarto
the argument of the implication (ii) ⇒ (iii), we conclude that
f
a
b
R HomRba (Y, D) ∈ D R . We further have
LΛa (X) ≃ LΛa RΓa (X)
≃ LΛa R HomRba Y, RΓa (D)
≃ LΛa RΓa R HomRba (Y, D)
≃ LΛa R HomRba (Y, D)
f
ba .
≃ R HomRba (Y, D) ∈ D
R
The first and the fourth isomorphisms use [AJL, Corollary after (0.3)∗ ], the third isomorphism follows from the application of the Tensor Evaluation Isomorphism just as in the previous paragraph, and the fifthisomorphism follows from [PSY, Theorem 1.21], noting that
f
b a -modules.
ba , its homology modules are a-adically complete R
as R HomRba (Y, D) ∈ D
R
Now, the results follows from Lemma 2.1.
Corollary 4.2. Let a be an ideal of R for which R is a-adically complete and X ∈ D (R).
Then the following assertions are equivalent:
(i) X is a-cofinite.
f
(ii) X ≃ RΓa (Z) for some Z ∈ D
(R).
f
(R), provided that R enjoys a dualizing
(iii) X ≃ R HomR Y, RΓa (D) for some Y ∈ D
complex D.
A NEW OUTLOOK ON COFINITENESS
9
f
Proof. For any two R-complexes V ∈ D
(R) and W ∈ D (R), one may easily see that
SuppR R HomR V, RΓa (W ) ⊆ V (a).
Also, for any U ∈ D(R), [Li, Corollary 3.2.1] yields that SuppR (U ) ⊆ V (a) if and only if
RΓa (U ) ≃ U . Hence the assertions follow from Lemma 4.1.
The next result reveals the correlation between Hartshorne’s questions.
Theorem 4.3. Let a be an ideal of R. Consider the following assertions:
(i) Hai (M ) is a-cofinite for every finitely generated R-module M and every i ≥ 0, and
M(R, a)cof is an abelian subcategory of M(R).
(ii) Hai (X) is a-cofinite for every X ∈ Df (R) and every i ∈ Z.
(iii) An R-complex X ∈ D (R) is a-cofinite if and only if Hi (X) is a-cofinite for every
i ∈ Z.
Then the implications (i) ⇒ (ii) and (iii) ⇒ (i) hold. Furthermore, if R is a-adically
complete, then all three assertions are equivalent.
Proof. (i) ⇒ (ii): Follows from Theorem 3.3.
(iii) ⇒ (i): Let M be a finitely generated R-module. Since Hai (M ) = 0 for every i < 0 or
i > ara(a), we have RΓa (M ) ∈ D (R). However, [Li, Proposition 3.2.2] implies that
R HomR R/a, RΓa(M ) ≃ R HomR (R/a, M ),
showing that RΓa (M ) is a-cofinite.
The hypothesis now implies that Hai (M ) =
H−i (RΓa M ) is a-cofinite for every i ≥ 0.
Now, let M and N be two a-cofinite R-modules and f : M → N an R-homomorphism.
1M
f
Let ϕ : M → N be the morphism in D(R) represented by the roof diagram M ←−− M −
→ N.
From the long exact homology sequence associated to the distinguished triangle
ϕ
(4.3.1)
we deduce that SuppR
M−
→ N → Cone(f ) →,
Cone(f )
⊆ V(a).
In addition, applying the functor
R HomR (R/a, −) to (4.3.1), gives the distinguished triangle
R HomR (R/a, M ) → R HomR (R/a, N ) → R HomR R/a, Cone(f ) →,
whose associated long exact homology sequence shows that
R HomR R/a, Cone(f ) ∈ Df (R).
Hence, the R-complex Cone(f ) is a-cofinite. However, we have
f
Cone(f ) = · · · → 0 → M −
→ N → 0 → ··· ,
so Cone(f ) ∈ D (R). Thus the hypothesis implies that Hi Cone(f ) is a-cofinite for every
i ∈ Z. It follows that ker f and coker f are a-cofinite, and as a consequence M(R, a)cof is
an abelian subcategory of M(R).
Now, suppose that R is a-adically complete.
(ii) ⇒ (iii): Let X ∈ D (R). Suppose that Hi (X) is a-cofinite for every i ∈ Z. Then
Theorem 3.5 (i) yields that X is a-cofinite.
10
K. DIVAANI-AAZAR, H. FARIDIAN AND M. TOUSI
Conversely, assume that X is a-cofinite. Then by Corollary 4.2, X ≃ RΓa (Z) for some
f
Z ∈ D
(R). Thus the hypothesis implies that
is a-cofinite for every i ∈ Z.
Hi (X) ∼
= Hi RΓa (Z) = Ha−i (Z)
In view of Corollary 4.2, the next result answers Hartshorne’s third question for homologically bounded R-complexes.
Corollary 4.4. Let a be an ideal of R for which R is a-adically complete. Suppose that
either cd(a, R) ≤ 1, or dim(R/a) ≤ 1, or dim(R) ≤ 2. Then an R-complex X ∈ D (R) is
a-cofinite if and only if Hi (X) is a-cofinite for every i ∈ Z.
Proof. Obvious in light of Corollary 3.4 and Theorem 4.3.
Acknowledgement . The authors are deeply grateful to Professor Robin Hartshorne for
his invaluable comments on an earlier draft of this paper.
References
[AJL] L. Alonso Tarrı́o, A. Jeremı́as López and J. Lipman, Local homology and cohomology on schemes,
Ann. Sci. École Norm. Sup., (4), 30(1), (1997), 1-39.
[AF] L. Avramov and H-B. Foxby, Homological dimensions of unbounded complexes, J. Pure Appl. Algebra,
71(2-3), (1991), 129-155.
[BNS] K. Bahmanpour, R. Naghipour and M. Sedghi, On the category of cofinite modules which is abelian,
Proc. Amer. Math. Soc., 142(4), (2014), 1101-1107.
[BN] K. Bahmanpour and R. Naghipour, Cofiniteness of local cohomology modules for ideals of small dimension, J. Algebra, 321(7), (2009), 1997-2011.
[DM] D. Delfino and T. Marley, Cofinite modules and local cohomology, J. Pure Appl. Algebra, 121(1),
(1997), 45-52.
[EK] K. Eto and K. Kawasaki, A characterization of cofinite complexes over complete Gorenstein domains,
J. Commut. Algebra, 3(4), (2011), 537-550.
[Fo] H-B. Foxby, Hyperhomological algebra and commutative rings, notes in preparation.
[GM] J. P. C. Greenlees and J. P. May, Derived functors of I-adic completion and local homology, J. Algebra,
149(2), (1992), 438-453.
[Ha1] R. Hartshorne, Affine duality and cofiniteness, Invent. Math., 9, (1969/1970), 145-164.
[Ha2] R. Hartshorne, Residues and duality, Lecture notes in mathematics, 20, (1966).
[HeSt] M. Hellus and J. Strükard, Local cohomology and Matlis duality, Univ. Iagel. Acta Math., 45, (2007),
63-70.
[HK] G. Huneke and J. Koh, Cofiniteness and vanishing of local cohomology modules, Math. Proc. Camb.
Phil. Soc., 110(3), (1991), 421-429.
[HS] G. Huneke and R.Y. Sharp, Bass numbers of local cohomology modules, Trans. Amer. Math. Soc.,
339(2), (1993), 765-779.
[Ka1] K. Kawasaki, On the category of cofinite modules for principal ideals, Nihonkai Math. J., 22(2),
(2011), 67-71.
[Ka2] K. Kawasaki, Cofiniteness of local cohomology modules for principal ideals, Bull. London Math. Soc.,
30(3), (1998), 241-246.
[Li] J. Lipman, Lectures on local cohomology and duality, Local cohomology and its applications, Lecture
notes in pure and applied mathematics, 226, (2012), Marcel Dekker, Inc.
[Ly] G. Lyubeznik, Finiteness properties of local cohomology modules (an application of D-modules to commutative algebra), Invent. Math., 113(1), (1993), 41-55.
A NEW OUTLOOK ON COFINITENESS
11
[Me1] L. Melkersson, Cofiniteness with respect to ideals of dimension one, J. Algebra, 372, (2012), 459-462.
[Me2] L. Melkersson, Modules cofinite with respect to an ideal, J. Algebra, 285(2), (2005), 649-668.
[PAB] G. Pirmohammadi, K. Ahmadi Amoli and K. Bahmanpour, Some homological properties of ideals
with cohomological dimension one, Colloq. Math., to appear.
[PSY] M. Porta, L. Shaul and A. Yekutieli, Cohomologically cofinite complexes, Comm. Algebra, 43(2),
(2015), 597-615.
[Sp] N. Spaltenstein, Resolutions of unbounded complexes, Compositio Math., 65(2), (1988), 121-154.
[WW] S. Sather-Wagstaff and R. Wicklein, Support and adic finiteness for complexes, Comm. Algebra,
45(6), (2017), 2569-2592.
K. Divaani-Aazar, Department of Mathematics, Alzahra University, Vanak, Post Code 19834,
Tehran, Iran-and-School of Mathematics, Institute for Research in Fundamental Sciences (IPM),
P.O. Box 19395-5746, Tehran, Iran.
E-mail address: [email protected]
H. Faridian, Department of Mathematics, Shahid Beheshti University, G.C., Evin, Tehran, Iran,
Zip Code 1983963113.
E-mail address: [email protected]
M. Tousi, Department of Mathematics, Shahid Beheshti University, G.C., Evin, Tehran, Iran,
P.O. Box 19395-5746.
E-mail address: [email protected]
| 0math.AC
|
Sync-DRAW: Automatic Video Generation using Deep Recurrent
Attentive Architectures
Gaurav Mittal∗
[email protected]
Tanya Marwah∗
IIT Hyderabad
[email protected]
Vineeth N Balasubramanian
IIT Hyderabad
[email protected]
arXiv:1611.10314v4 [cs.CV] 21 Oct 2017
ABSTRACT
This paper introduces a novel approach for generating videos called
Synchronized Deep Recurrent Attentive Writer (Sync-DRAW). SyncDRAW can also perform text-to-video generation which, to the best
of our knowledge, makes it the first approach of its kind. It combines a Variational Autoencoder (VAE) with a Recurrent Attention
Mechanism in a novel manner to create a temporally dependent
sequence of frames that are gradually formed over time. The recurrent attention mechanism in Sync-DRAW attends to each individual
frame of the video in sychronization, while the VAE learns a latent
distribution for the entire video at the global level. Our experiments
with Bouncing MNIST, KTH and UCF-101 suggest that Sync-DRAW
is efficient in learning the spatial and temporal information of the
videos and generates frames with high structural integrity, and can
generate videos from simple captions on these datasets.1
CCS CONCEPTS
•Computing methodologies → Computer vision; Neural networks;
KEYWORDS
Deep Learning, Video Generation, Text-to-Video Generation
1
INTRODUCTION
Over the years, several generative methods have been proposed to
capture and model the latent representations of high-dimensional
data such as images and documents. In recent years, with the success of deep learning methods, Variational Auto-Encoders (VAEs) [11]
and Generative Adversarial Networks (GANs)[4] have emerged to
be the most promising deep learning-based generative methods for
performing tasks such as image generation [6, 16].
Existing efforts (discussed in Section 2) in the last couple of
years have primarily focused on generation of images using the
aforementioned methods, by modeling the spatial characteristics
of a given training dataset [6, 15, 24], as well as extending these
methods to more novel applications such as adding texture/style
to images [3]. However, there has been very little effort in the
∗ Equal
Contribution
in ACM Multimedia 2017 to be held at Mountain View, CA, USA.
1 Accepted
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
MM’17, October 23–27, 2017, Mountain View, CA, USA.
© 2017 ACM. ISBN 978-1-4503-4906-2/17/10. . . $15.00
DOI: http://dx.doi.org/10.1145/3123266.3123309
Figure 1: Videos generated automatically by proposed SyncDRAW for Single-Digit Bouncing MNIST, Two-Digit Bouncing MNIST, and KTH Dataset.
automated generation of videos. While there have been a few efforts
in video prediction [22], the recent work by Vondrick et al. [25] was
the first to generate videos in an unsupervised manner using GANs.
Despite acceptable performance, the generated videos had several
drawbacks, as highlighted later in this work. Our work is an attempt
to provide a different perspective to video generation using VAEs,
which overcomes a few drawbacks of [25]; and more importantly,
provides a methodology to generate videos from captions for the
first time.
We propose a novel network called Sync-DRAW, which uses a
recurrent VAE to automatically generate videos. It utilizes a local
attention mechanism which attends to each frame individually in
‘synchronization’ and hence, the name Sync-DRAW (Synchronized
Deep Recurrent Attentive Writer). Our experiments show that the
proposed attention mechanism in Sync-DRAW plays a significant
role in generating videos that maintain the structure of objects to
a large extent. Sync-DRAW also takes a step further by learning
to associate videos with captions, and thus learning to generate
videos from just text captions. To the best of our knowledge, this
work is the first effort to generate video sequences from captions,
and is also the first to generate videos using VAEs. Figure 1 shows
examples of video frames generated by trained Sync-DRAW models
on different datasets.
The key contributions of this paper lie in: (i) the design of an
efficient and effective deep recurrent attentive architecture to generate videos that preserves the structural integrity of objects in each
frame; (ii) the adaptation of the proposed architecture to generate
videos from just text captions; and (iii) a comprehensive review
and experimental study of video generations on datasets of varying
complexity. We now discuss earlier efforts related to this work.
2
BACKGROUND AND RELATED WORK
In order to effectively generate meaningful structured data such
as an image, a learning model should be capable of learning the
latent representations for the given data, thus explaining the success of deep architectures [1], which are today synonymous with
representation learning, as generative models. Initial efforts in
generating such data using deep architectures were based on Deep
Belief Networks [7] and Deep Boltzmann Machines [18], which
contained many layers of latent variables and millions of parameters. However, their overwhelming dependence on Markov Chain
Monte Carlo-based sampling methods made them difficult to scale.
Over the last few years, newer deep learning approaches such as
Generative Adversarial Networks (GANs) [4] and Variational AutoEncoders (VAEs) [11] have been proven to perform quite effectively
on generative tasks, and have been shown to scale to large datasets.
The Deep Recurrent Attentive Writer (DRAW) [6] was the earliest work to utilize a Recurrent-VAE (R-VAE) to learn to generate
images by progressively refining an image canvas over time using
a sequence of samples generated from a learnt distribution. DRAW
further combines this R-VAE with an attention mechanism [14],
which allows the generated image to focus on certain parts of the
image at each timestep. This notion of attention resembles human
visual perception, and has been used recently for related applications such as generating captions for images [27] or even generating
images from captions [15, 17]. However, spatial attention differs
from spatiotemporal attention, and there has been very little effort
on using spatio-temporal latent representations to generate image
sequences or videos, which we address in this work. Further, to the
best of our knowledge, there has been no prior work in text-to-video
generation, which is one of the key objectives of this work.
The state-of-the-art in the domain of video generation is a recently proposed method called VGAN by Vondrick et al. [25], which
attempts to generate videos using a spatio-temporal GAN. This
GAN employs a two-stream strategy with one stream focusing on
the foreground, and another on the static background. While the
method delivers promising results, closer observation shows that
its generations are fairly noisy as well as lack ‘objectness’ (the structural integrity of the object), as shown in Section 4.7. In this work,
we propose a new and different perspective to video generation
based on Recurrent VAEs (instead of GANs), which uses a novel
attention mechanism to generate videos. We show in this work
that the videos generated by the proposed approach are perceived
well by human users, as well as maintain the objects’ structural
integrity to a significant extent on visual inspection. Moreover, we
extend the R-VAE to perform text-to-video generation, which to
the best of our knowledge, is the first effort to do so.
Other efforts that can be considered as related to the proposed
work include efforts in the unsupervised domain that have attempted the task of video prediction (predict a future frame given a
video sequence). One of the first efforts in this regard, [22], seeks to
learn unsupervised video representations using Long Short-Term
Memory units (LSTMs) [8] to predict future frames in videos. However, such efforts are fundamentally different from the objectives
of this work, since they do not attempt to generate complete videos
from scratch. We now present the proposed methodology.
3
SYNC-DRAW METHODOLOGY
Simply speaking, a video sequence can be perceived as comprising
of objects undergoing/performing action(s) across multiple frames
over a background. Hence, we primarily require our model to: (i)
generate a video sequence; (ii) model individual objects in the video
sequence; and (iii) capture the motion of the objects in the sequence.
To generate a video as a combination of several objects and to
model their motion separately, it seems intuitive to generate the
video incrementally with the network focusing and forming objects
one at a time. A recurrent visual attention mechanism can prove to
be an effective tool to attend to relevant parts of a video sequence,
thus allowing the network to learn latent representations of coherent parts of spatio-temporal data (objects). A video comprises of
unique artifacts that are not associated with images (such as camera
motion, e.g, zoom in/out), which have hitherto not been considered
in image generation efforts. We hence propose a new read/write
attention mechanism which operates at a frame level, and uses a
grid of Gaussian filters with learnable variance and stride in each
frame, which allows the network to automatically learn coherent
regions of video sequences (inspired from [5, 6]). We also use a
Recurrent VAE (R-VAE), which has been used for image generation in [6] (but not video generation), to embed this frame-wise
attention mechanism and generate a video over a set of time steps.
A trivial approach to extend the way R-VAE is used for image
generation in [6] to video generation would be to have a separate
R-VAE for generating each frame. However, such an approach ignores the temporal relationship between frames, and the number of
parameters to be learnt across the VAEs may explode exponentially
with increasing number of frames. Therefore, to learn the video
data distribution efficienctly but effectively, the proposed SyncDRAW uses a single R-VAE for the entire video (Figure 2). This
global R-VAE, firstly, allows us to model the temporal relationships
between the generated video frames. Secondly, it also allows us
to condition the generation of the video on captions to effectively
perform text-to-video generation (this would not have been easy
if we trivially extended the image R-VAE to videos). Moreover,
while it is possible to define attention as a spatio-temporal cuboid
(3-D grid of Gaussian filters) across frame blocks, we instead define a separate individual attention mechanism for each frame of a
video, each of which acts simultaneously across all frames, so as
to learn latent spatio-temporal representations of video data. We
found this proposed strategy of using a global R-VAE with a local
frame-wise attention mechanism to be key in the results that we obtained. This approach introduces smoothness in the characteristics
of objects across the frames in comparison to 3-D spatio-temporal
approaches [25], which seem to have jitters in the generations, as
highlighted in the experiments section (Section 4).
3.1
Sync-DRAW Architecture
Let X = {x 1 , x 2 , · · · , x N } be a video comprising of frames x i , i =
1, · · · , N where N is the number of frames in the video. Let the
dimensions for every frame be denoted by A × B. We generate X
over T timesteps, where at each timestep t, canvases for all frames
are generated in synchronization. The Sync-DRAW architecture
comprises of: (i) a read mechanism which takes a region of interest
(RoI) from each frame of the video; (ii) the R-VAE, which is responsible to learn a latent distribution for the videos from these RoIs;
t=1
t=2
t=T
(c11, c12,..., c1n) (c21, c22,..., c2n)
write, wt
...
LSTMdec
S
Skip-Thought
Vectors (Pre-Trained)
SKpre
"Digit 0 is moving up
and down"
h1dec
z1
Q(Z1|X)
S
LSTMenc
h
1
read, rt
...
(x1, x2,..., xN)
write, wt
...
write, wt
...
LSTMdec
LSTMdec
z2
2|X, Z1)
Q(Z
dec
h1enc
(cT1, cT2,..., cTn)
...
LSTMenc
read, rt
read, rt
...
(x1, x2,..., xN)
X - input GIF
(b)
P(X|Z1..T)
zT
Q(ZT|X, Z1..T-1)
LSTMenc
...
(x1, x2,..., xN)
σ(CT)
Generated GIF
(a)
(c)
Figure 2: Sync-DRAW architecture. (a) The read-write mechanisms and the R-VAE; (b) Conditioning the R-VAE’s decoder on
text features extracted from captions for text-to-video generation; (c) Canvases generated by Sync-DRAW over time (each row
is a video at a particular time step, last row is the final generated video).
and (iii) a write mechanism which generates a canvas focusing on a
RoI (which can be different from the reading RoI) for each frame.
During training, at each time step, a RoI from each frame of the
original video is extracted using the read mechanism and is fed
to the R-VAE to learn the latent distribution, Z , of the video data.
Then, a random sample from this distribution, Z , is used to generate
the frames of the video using the frame-wise write mechanisms.
At test time, the read mechanism and the encoder of the R-VAE
are removed; and at each time step, a sample is drawn from the
learned Z distribution to generate a new video through the write
mechanism. We now describe each of these components.
3.1.1 Read Mechanism. The read attention mechanism in SyncDRAW is responsible for reading a region of interest (RoI) from
each frame x i at every timestep t. As mentioned earlier, the RoI
is defined by a K × K grid of Gaussian filters, where the grid’s
center, grid’s stride and the Gaussian’s variance (which is the same
across all grid points) are all learned while training the network.
Varying these learned parameters allows us to vary the RoI read
at every time step. In particular, due to the separability of the 2-D
Gaussian filter, the RoI patch is read by dynamically computing
1-D Gaussian filters Fitp and Fitq , which correspond to a set of size
K (a user-defined parameter for the grid size) of 1 × A and 1 ×
B-dimensional Gaussian filters respectively, for each frame x i at
timestep t, with ip and iq being the two spatial dimensions of frame
x i . (For convenience, we will refer to Fitp and Fitq as being of sizes
K ×A and K ×B respectively.) These filters are evaluated together on
a K ×K grid which defines the RoI of the frame to attend to. In order
to compute these filters, we learn a set of read attention parameters
for each frame: д̃itp , д̃itq , σit , δ˜it , βit where i ∈ {1, · · · , N }. д̃itp and
д̃itq correspond to the grid center coordinates along the two frame
dimensions respectively; and δ˜it corresponds to the stride between
the points in the grid. Evidently, we propose to learn a separate set
of these parameters for each frame in the video. In order to ensure
that these parameters lie within the frame dimensions, they are
slightly modified using:
дitp =
A+1 t
B+1 t
(д̃ip + 1); дitq =
(д̃i q + 1)
2
2
max(A, B) − 1 ˜t
δi
N −1
These new parameters дitp and дitq are then used to calculate the
centers for the horizontal and vertical filterbanks using:
δit =
µ itp = дitp + (u − N /2 − 0.5)δit
(1)
µ itq
v
(2)
u
= дitq
+ (v
− N /2 − 0.5)δit
for u, v ∈ {1, · · · , K }. σit serves as the standard deviation for all
filterbanks at timestep t on x i , the i th frame. Fitp and Fitq are then
obtained finally as follows:
Fitp [u, a] =
Fitq [v, b]
(a − µ it )2
1
pu
exp −
Zip
2(σit )2
(b − µ it )2
1
qv
exp −
=
Ziq
2(σit )2
(3)
(4)
where a ∈ {1, · · · , A}, b ∈ {1, · · · , B}, u, v ∈ {1, · · · , K } and Z ip ,
Z i q are the normalization constants.
The last parameter, βit , allows the network to learn the temporal
relationships between the patches read from the frames. It lets the
model decide the level of importance to be given to each frame for
generating the video at any time step. Before feeding to the R-VAE,
the patch read from each frame of the input video is scaled by its
respective βit , i ∈ {1, · · · , N } as follows:
read(x i ) = βit (Fitp )x i (Fitq )T
(5)
where read(x i ) is of size K × K. This learned set of parameters,
β, allows Sync-DRAW to selectively focus on one (or a subset) of
frames of the video at a given timestep if required.2
3.1.2 R-VAE. The R-VAE is responsible to generate the video
sequence by sampling from the latent distribution learnt by the
VAE at each time step. The core components of a standard R-VAE
are the encoder LSTM, LST Menc (which outputs henc ), the latent
representation, Z , and the decoder LSTM, LST Mdec (which outputs
hdec ) [2]. The R-VAE runs for T time steps (user-defined) and
generates a set of canvases C t = {c 1t , c 2t , · · · , c tN } at every timestep
t, where σ (C t ) is the video generated after t timesteps. Since the
R-VAE works at the global video level, the canvases for all the
frames in the video are generated in synchronization, which by
our observation, preserve the inter-frame temporal relationships.
At every t, we define a new quantity, X̂ t , which represents the
video-level error, as follows:
X̂ t = X − σ (C t −1 )
t
hdec
is used to compute the write attention mechanism parameters
as described below. We note that the read attention parameters
t −1 and the input X ,
at time t are learned as a linear function of hdec
whose weights are learned during training in the read block.
3.1.3 Write Mechanism. As part of the write mechanism, we
need two things per frame: what to write, and where to write.
The former is obtained using an attention window, w t , which is
t , whose weights are learnt
computed as a linear function of hdec
during training. The attention window is, once again, defined by
an equivalently similar set of parameters as the read mechanism,
t
t −1 and X
which are now computed using hdec
(as against using hdec
for the read parameters). Next, similar to the read mechanism, a set
of filterbanks Fˆitp and Fˆitq are computed using these write attention
parameters, defining the RoI to be attended to while writing into
each frame. Finally, the canvas c it corresponding to every frame i
at time step t is created as follows:
1 ˆt T t ˆt
t
(Fip ) w i (Fi q )
write(hdec
)=
(9)
βˆt
i
= c it −1
t
+ write(hdec
)
(10)
The canvasses are accumulated over timesteps T, denoted by
cT and the final video generated is computed as σ (cT ). By using
2σ ,
3.1.4 Sync-DRAW with captions. To generate videos from captions, we use a pre-trained model of skip-thought vectors, SKpr e [13],
and pass the caption, Y , through this model to generate a latent
representation for the caption, S.
S = SKpr e (Y )
(11)
We then condition LST Menc and LST Mdec on S [20] to modify
equations 7 and 8, and generate corresponding hidden representations as:
(6)
where σ is the sigmoid function, and X is the input video. The
LSTM-encoder at time t is then processed as follows:
−1 t t −1
htenc = LST Menc htenc
, R , hdec
(7)
t with r t = [read(x ), read(x̂ t )]. h t
where R t = r 1t , r 2t , · · · , r N
i
enc
i
i
is then used to estimate the parameters of latent variable
Z t , which
characterizes the approximate posterior Q Z t |htenc that captures
the latent representation. This is done using the reparameterization
technique described in [12]. A sample z t ∼ Q Z t |htenc is then
t :
obtained and fed to the LSTM-decoder, LST Mdec , producing hdec
t
t −1 t
hdec
= LST Mdec hdec
,z
(8)
c it
sigmoid function over cT , we can consider the output as the emission probabilities making it equivalent to P(X |Z 1 ...T ). In Figure 2,
the final arrow is used to represent the connection between the
technical implementation of the algorithm and the mathematical
interpretation of the underlying model.
δ̃ , and β are defined in the logarithm scale to ensure that values are always
positive.
htenc
=
t
hdec
=
−1 t t −1
LST Menc htenc
, R , hdec , S
t −1 t
LST Mdec hdec
, z ,S
(12)
(13)
At test time, when the R-VAE’s encoder and read mechanisms are
removed, a caption Y is provided as input to the R-VAE’s decoder
to condition the generation on the given caption, Y .
3.1.5 Loss function. The loss function for Sync-DRAW is composed of two types of losses (similar to a standard VAE [12]), both
of which are computed at the video level. The first is the reconstruction loss, L X , computed as the binary pixel-wise cross-entropy
loss between the original video X and the generated video, σ (CT ).
The second is the KL-divergence loss, L Z , defined between a latent
prior P(Z t ) and Q(Z t |htenc ) ∼ N (µ t , (σ t )2 ) and summed over all T
timesteps. We assume prior P(Z t ) as a standard normal distribution
and thus, L Z is given by:
!
T
1 Õ 2
2
2
LZ =
µ + σt − log σt − T /2
(14)
2 t =1 t
The final loss is the sum of the two losses, L X and L Z .
3.1.6 Testing. During the testing phase, the encoder is removed
from Sync-DRAW and due to the reparametrization trick of the VAE
[12], z is sampled from N (0, I ), scaled and shifted by the learned
µ t and (σ t )2 , to generate the final videos.
4
EXPERIMENTS AND RESULTS
We studied the performance of Sync-DRAW on the following datasets
with varying complexity: (i) Single-Digit Bouncing MNIST (which
has been used in similar earlier efforts [9, 22, 26]), (ii) Two-digit
Bouncing MNIST; and (iii) KTH Human Action Dataset [19]. Figure 3 shows sample videos from these datasets. Considering this
is the first work in text-to-video and there is no dataset yet for
such a work, we chose these datasets since they provide different
complexities, and also allow for adding captions3 . We manually
created text captions for each of these datasets (described later) to
demonstrate Sync-DRAW’s ability to generate videos from captions.
We varied the number of timesteps T and K for read and write attention parameters across the experiments based on the size of the
3 The codes, the captioned datasets and other relevant materials are available at https:
//github.com/Singularity42/Sync-DRAW
Figure 3: A few sample videos from each of the dataset used
for evaluation. (a) Single-Digit Bouncing MNIST. (b) TwoDigit Bouncing MNIST. (c) KTH Dataset.
frame and complexity of the dataset (grayscale or RGB). Stochastic
Gradient Descent with Adam [10] was used for training with initial
learning rate as 10−3 , β 1 as 0.5 and β 2 as 0.999. Additionally, to
avoid gradient from exploding, a threshold of 10.0 was used.
4.1
Baseline Methodology
For performance comparison and to highlight the significance of
having a separate set of attention parameters for each frame of the
video, we designed another methodology to extend [6] to generate videos, by modeling attention parameters as spatio-temporal
cuboids and adding a set of filterbanks F Zt of size K × N to operate
over the temporal dimension (in addition to the two filterbanks in
the spatial dimensions). We use this methodology as our baseline
for comparison. We tried on several settings of parameters and
present the best results for the baseline methodology in this paper.
Figure 4: Single-Digit Bouncing MNIST results for (a) Baseline method and (b) Sync-DRAW
4.2
Results on Single-Digit Bouncing MNIST
As in earlier work [9, 22, 26], we generated the Single-Digit Bouncing MNIST dataset by having the MNIST handwritten digits move
over time across the frames of the sequence (Figure 3a). Each video
contains 10 frames each of size 64 × 64 with a single 28 × 28 digit
either moving left and right or up and down. The initial position
Figure 5: Two-Digit Bouncing MNIST results for (a) Baseline
method and (b) Sync-DRAW
for the digit in each video is chosen randomly in order to increase
variation among the samples. The training set contains 12, 000
such videos. The results of Sync-DRAW on Single Digit MNIST are
shown in Figures 2(c) and 4(b). The figures illustrate the usefulness
of the proposed methodology in gracefully generating the final
video as a sequence of canvases. When compared to the baseline
methodology results, as shown in Figure 4(a), the quality of the generated digits is clearly superior with the digits having well-defined
structure and boundaries. An interesting observation in Figure 2(c)
is that while each frame has its own attention mechanism in the
proposed framework, it can be seen that the same region of the
digit is being attended to at every timestep t, even though they are
present at different pixel locations in each frame, thus validating
the proposed approach to video generation.
4.3
Results on Two-Digit Bouncing MNIST
Extending the Bouncing MNIST dataset, we generated the twodigit Bouncing MNIST dataset where two digits move independent
of one another, either up and down or left and right, as shown in
Figure 3(b). The dataset consists of a training set of 12, 000 videos,
with each video containing 10 frames of size 64 × 64 with two
28 × 28 digits. In order to ensure variability, the initial positions
for both the digits were chosen randomly. In case of an overlap,
the intensities are added, clipping the sum if it goes beyond 1. The
results of applying Sync-DRAW to this two-digit Bouncing MNIST
dataset are shown in Figures 5(b) and 6(a). Once again, the baseline
method performs rather poorly as shown in Figure 5(a). Figure
6(a) also shows that Sync-DRAW attends to both the digits at every
time step simultaneously. In the initial time steps, a single structure
is formed which then breaks down to give the two digits in the
subsequent time steps. We believe that this is the reason that though
the generated digits have a well defined structure and a boundary,
they are still not as clear as when compared to results on SingleDigit Bouncing MNIST. We infer that there is a need for a “stimulus”
for attention mechanism to know that there are two digits that need
to be attended to. This claim is substantiated in subsequent sections
where we include alignment with captions in Sync-DRAW, giving
the attention mechanism this required stimulus.
4.4
Results on KTH dataset
We evaluated the performance of Sync-DRAW on the KTH Human
Action Database [19] to benchmark the approach on a more real
Figure 6: (a) Sync-DRAW results on Two-Digit Bouncing MNIST; (b) Sync-DRAW results on Two-Digit Bouncing MNIST videos
when captions are included. Clearly, captions improve generation of ‘objectness’ of the digits.
Figure 7: Videos generated by Sync-DRAW for KTH Human
Action Dataset without captions.
dataset. We chose KTH dataset over other video datasets such
as UCF as the videos from KTH were accompanied with metadata which helped us to create meaningful captions for the videos
and experiment Sync-DRAW with captions on this dataset. The
KTH dataset consists of over 2000 videos of 25 subjects performing
six different actions - walking, running, jogging, hand-clapping,
hand-waving and boxing. We resized the frames to 120 × 120 and
performed generation for 10 frames. Given the complexity of the
scene and increased frame size, we increased K to 12 and T to 32 to
obtain videos with better resolution.
Figure 7 shows some test videos generated for the KTH dataset.
The clarity of the person in the generated scenes suggests that
Sync-DRAW is able to perform equally well on a real-world dataset.
4.5
Figure 8: Sync-DRAW generates videos from just captions
on the Single-Digit Bouncing MNIST: Results above were automatically generated by the trained model at test time.
Sync-DRAW with captions
As discussed in Section 3.1.4, the proposed Sync-DRAW methodology can be used to generate videos from captions.
4.5.1 Single-Digit Bouncing MNIST. For every video in the bouncing MNIST dataset, a sentence caption describing the video was
included in the dataset. For Single-Digit Bouncing MNIST, the concomitant caption was of the form ’digit 0 is moving left and right’ or
’digit 9 is moving up and down’. Hence, for the single-digit dataset,
we have 20 different combinations of captions. In order to challenge Sync-DRAW, we split our dataset in such a way that for all
the digits, the training and the test sets contained different motions
Figure 9: Sync-DRAW generates videos from just captions
on the Two-Digit Bouncing MNIST: Results above were automatically generated by the trained model at test time.
for the same digit, i.e. if a digit occurs with the motion involving up
and down in the training set, the caption for the same digit with the
motion left and right (which is not used for training) is used in the
testing phase. Figure 8 shows some of the videos generated from
captions present in the test set. It can be observed that even though
the caption was not included in the training phase, Sync-DRAW
the spatial and temporal relationships to be learned at the global
level (called Global in table below). The results are presented in
Table 1. From the losses, we can clearly infer that Sync-DRAW
performs significantly better than the other two approaches.
Figure 10: Sync-DRAW generates videos from just captions
on KTH dataset.
is able to capture the implicit alignment between the caption, the
digit and the movement fairly well.
4.5.2 Two-Digit Bouncing MNIST. We conducted similar experiments for the Two-Digit Bouncing MNIST, where the captions
included the respective motion information of both the digits, for
example ’digit 0 is moving up and down and digit 1 is moving left
and right’. Figure 9 shows the results on this dataset, which are
fairly clear and good on visual inspection (we show quantitative
results later in Section 4.6). Interestingly, in Figure 6(b), we notice
that when Sync-DRAW is conditioned on captions, the quality of
the digits is automatically enhanced, as compared to the results in
Section 4.3 (Figure 6(a)). These results give the indication that in the
absence of captions (or additional stimuli), the attention mechanism
in Sync-DRAW focuses on a small patch of a frame at a time, but
possibly ignores the presence of different objects in the scene and
visualizes the whole frame as one entity. However, by introducing captions, the attention mechanism receives the much needed
“stimulus” to differentiate between the different objects and thereby
cluster their generation, resulting in videos with better resolution.
This is in concurrence with the very idea of an attention mechanism, which when guided by a stimulus, learns the spatio-temporal
relationships in the video in a significantly better manner.
4.5.3 KTH Dataset. As mentioned in Section 4.4, we were able
to generate descriptive captions for the videos in the KTH dataset by
using the metadata which included the person and the corresponding action. We carried out our experiments on videos for walking
and running as it further helped to deterministically introduce the
notion of direction. Some examples of the captions are ’person 1 is
walking right to left’ and ’person 3 is running left to right’. Figure 10
shows some of the videos generated by Sync-DRAW using just the
captions for KTH dataset. The generated videos clearly demonstrate
Sync-DRAW’s ability to learn the underlying representation of even
real-world videos and create high quality videos from text.
4.6
Quantitative analysis
4.6.1 Reconstruction Loss. While quantitative analysis is difficult in image/video generation methods (due to lack of ground
truth for the generations), we analyzed the quality of the videos
generated by Sync-DRAW by computing the Negative Log Likelihood (NLL) of the generated samples (as recommended by Theis
et al. in [23] for evaluating generative models). We compared the
NLL values at convergence against the baseline approach, and a
setup where, instead of a hierarchical approach, we allowed both
Experiments
One Digit
MNIST
One Digit
MNIST*
Two Digit
MNIST
Two Digit
MNIST*
Sync-DRAW
Global
Baseline
340.39
500.01
3561.23
327.11
512.46
3478.26
639.71
899.06
5240.65
524.41
860.54
5167.94
Table 1: Negative Log Likelihoods at convergence for SyncDRAW, Baseline and Global methods. * = with captions
(Lower is better).
4.6.2 Psychophysical Analysis. In order to quantify the visual
quality of the generated videos, we further performed a psychophysical analysis where we asked a group of human subjects to rate the
videos generated by Sync-DRAW for different datasets. 37 subjects
(each ignorant of this work) were given a set of 10 generated videos
from each experiment we conducted with Sync-DRAW, and were
asked to rate the perceived visual quality of a video on a scale of
1 − 10 (with 10 being the highest score, and also corresponded to
the score for original videos from the respective datasets shown to
the subjects). The statistics of this analysis are presented in Tables 2
and 3. It can be observed that the average rating for Single-Digit
Bouncing MNIST (with and without captions), Two-Digit Bouncing
MNIST (with captions) and KTH (with captions) is very high which
correlates well with the qualitative results. The scores for Two-Digit
Bouncing MNIST and KTH without captions were slightly lower
(although not unacceptable) due to the reduction in clarity. Generations on these datasets, however, improved with the availability of
a stimulus in the form of captions (as explained before in Figure 6).
4.7
Qualitative comparison with VGAN [25]
To compare our results with the recently proposed VGAN method
in [25], which is the only earlier effort for video generation from
scratch, we ran a comprehensive set of experiments. We first studied
the performance of VGAN’s [25] code on the Bouncing MNIST
dataset. In order to align with VGAN’s requirements, we modified
the Bouncing MNIST dataset to comprise of videos containing 32
Datasets
One Digit
MNIST
Two Digit
MNIST
KTH Dataset
Avg. Video
Quality Score
9.37 ± 0.63
7.86 ± 0.75
7.27 ± 0.80
Table 2: Average score ± Standard Deviation given to the
videos generated by Sync-DRAW without captions for different datasets. Baseline: low score (2.7 ± 0.53) for all datasets.
Datasets
One Digit
MNIST
Two Digit
MNIST
KTH Dataset
Avg. Video
Quality Score
9.43 ± 0.60
8.97 ± 0.83
9.10 ± 0.77
Table 3: Average score ± Std Deviation given to videos generated by Sync-DRAW with captions for different datasets.
Figure 11: Qualitative comparison of video generation on
MNIST dataset between VGAN and Sync-DRAW. First 10
frames generated by both approaches are shown for brevity.
Figure 13: Qualitative comparison of video generation on
UCF101 dataset between VGAN and Sync-DRAW. The first
10 frames generated by both approaches are shown here for
brevity. On the right, a sample frame of each video is shown
magnified for better comparison.
Figure 12: Qualitative comparison of video generation on
dataset in [25] between VGAN and Sync-DRAW. (a) depicts
the videos generated by VGAN model we trained. (b) depicts
the videos generated by Sync-DRAW. The first 10 frames generated by both approaches are shown here for brevity.
frames in RGB, and then trained VGAN on this modified Bouncing
MNIST dataset. To ensure an equitable comparison, we ran SyncDRAW on the same dataset as well (note that our earlier results had
different settings on this dataset). The results of the experiments
are shown in Figure 11. Next, we ran Sync-DRAW on the dataset
made available in VGAN’s work [25]. We changed Sync-DRAW’s
parameters to support generation of videos containing 32 frames.
The results can be seen in Figure 12. Lastly, in order to have a fair
comparison, we ran both the codes on a dataset that they were
never run on before, the UCF-101 dataset [21]. Each video in the
training dataset from UCF-101 contained 32 colored frames. 4 These
results can be seen in Figure 13.
From our experiments, we notice that there are significant differences between Sync-DRAW and VGAN results. While VGAN gives
an overall semblance of sharper generations, on closer look, the
generations are noisy with poor objectness. (While [25] reported
4 VGAN
[25] uses UCF-101 to show their network’s capability to learn representations
for action classification but has shown no generation result on UCF-101
results that look better, we found this to be true on closer observation for many results there too). On the other hand, Sync-DRAW’s
generations have a smoothness to them and are fairly noise-free in
comparison, although they are a bit blurry. The results of VGAN
on Bouncing MNIST highlight this issue of poor objectness further.
Similar observations can also be made on the results generated
from training on VGAN [25]’s own dataset. The results on UCF-101
serve as a fair comparison between the two methods because of
the lack of any bias in the dataset used to train the two models. We
also conducted a psychophysical analysis on the videos generated
by VGAN, and found the scores on VGAN to be comparable to
that of Sync-DRAW. Sharpening the generations of Sync-DRAW on
real-world datasets, while maintaining its overall smoothness, is
an important direction of our future work.
5
CONCLUSION AND FUTURE WORK
This paper presents Sync-DRAW, a new approach to automatically
generate videos using a Variational Auto-Encoder and a Recurrent Attention Mechanism combined together. We demonstrate
Sync-DRAW’s capability to generate increasingly complex videos
starting from Single-Digit Bounding MNIST to more complex videos
from KTH and UCF101 datasets. We show that our approach gives
adequate focus to the objects via the attention mechanism and generates videos that maintain the structural integrity of objects. We
also demonstrated Sync-DRAW’s ability to generate videos using
just captions, which is the first of its kind. As evident from the
results, our approach is highly promising in the domain of video
generation. Our ongoing/future efforts are aimed at improving
the quality of the generated videos by reducing blurriness and
generating videos from even more complex captions.
REFERENCES
[1] Yoshua Bengio. 2009. Learning deep architectures for AI. Foundations and trends®
in Machine Learning 2, 1 (2009), 1–127.
[2] Otto Fabius and Joost R van Amersfoort. 2014. Variational recurrent autoencoders. arXiv preprint arXiv:1412.6581 (2014).
[3] Leon A Gatys, Alexander S Ecker, and Matthias Bethge. 2015. A neural algorithm
of artistic style. arXiv preprint arXiv:1508.06576 (2015).
[4] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley,
Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial
nets. In Advances in Neural Information Processing Systems. 2672–2680.
[5] Alex Graves, Greg Wayne, and Ivo Danihelka. 2014. Neural turing machines.
arXiv preprint arXiv:1410.5401 (2014).
[6] Karol Gregor, Ivo Danihelka, Alex Graves, Danilo Jimenez Rezende, and Daan
Wierstra. 2015. DRAW: A recurrent neural network for image generation. arXiv
preprint arXiv:1502.04623 (2015).
[7] Geoffrey E Hinton, Simon Osindero, and Yee-Whye Teh. 2006. A fast learning
algorithm for deep belief nets. Neural computation 18, 7 (2006), 1527–1554.
[8] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural
computation 9, 8 (1997), 1735–1780.
[9] Samira Ebrahimi Kahou, Vincent Michalski, and Roland Memisevic. 2015. RATM:
Recurrent Attentive Tracking Model. arXiv preprint arXiv:1510.08660 (2015).
[10] Diederik Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In International Conference on Learning Representations (ICLR).
[11] Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes.
International Conference on Learning Representations (2013).
[12] Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes.
arXiv preprint arXiv:1312.6114 (2013).
[13] Ryan Kiros, Yukun Zhu, Ruslan R Salakhutdinov, Richard Zemel, Raquel Urtasun,
Antonio Torralba, and Sanja Fidler. 2015. Skip-thought vectors. In Advances in
neural information processing systems. 3294–3302.
[14] Hugo Larochelle and Geoffrey E Hinton. 2010. Learning to combine foveal
glimpses with a third-order Boltzmann machine. In Advances in neural information processing systems. 1243–1251.
[15] Elman Mansimov, Emilio Parisotto, Jimmy Lei Ba, and Ruslan Salakhutdinov.
2016. Generating images from captions with attention. International Conference
on Learning Representations (2016).
[16] Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks.
International Conference on Learning Representations (2015).
[17] Scott Reed, Zeynep Akata, Xinchen Yan, Lajanugen Logeswaran, Bernt Schiele,
and Honglak Lee. 2016. Generative adversarial text to image synthesis. In
Proceedings of The 33rd International Conference on Machine Learning, Vol. 3.
[18] Ruslan Salakhutdinov and Geoffrey E Hinton. 2009. Deep Boltzmann Machines..
In AISTATS, Vol. 1. 3.
[19] Christian Schuldt, Ivan Laptev, and Barbara Caputo. 2004. Recognizing human actions: A local SVM approach. In Pattern Recognition, 2004. ICPR 2004. Proceedings
of the 17th International Conference on, Vol. 3. IEEE, 32–36.
[20] Kihyuk Sohn, Honglak Lee, and Xinchen Yan. 2015. Learning structured output
representation using deep conditional generative models. In Advances in Neural
Information Processing Systems. 3483–3491.
[21] Khurram Soomro, Amir Roshan Zamir, and Mubarak Shah. 2012. UCF101: A
dataset of 101 human actions classes from videos in the wild. arXiv preprint
arXiv:1212.0402 (2012).
[22] Nitish Srivastava, Elman Mansimov, and Ruslan Salakhutdinov. 2015. Unsupervised learning of video representations using LSTMs. In International Conference
on Machine Learning (ICML).
[23] Lucas Theis, Aäron van den Oord, and Matthias Bethge. 2015. A note on the
evaluation of generative models. arXiv preprint arXiv:1511.01844 (2015).
[24] Aaron van den Oord, Nal Kalchbrenner, and Koray Kavukcuoglu. 2016. Pixel
Recurrent Neural Networks. arXiv preprint arXiv:1601.06759 (2016).
[25] Carl Vondrick, Hamed Pirsiavash, and Antonio Torralba. 2016. Generating videos
with scene dynamics. In Advances In Neural Information Processing Systems. 613–
621.
[26] SHI Xingjian, Zhourong Chen, Hao Wang, Dit-Yan Yeung, Wai-kin Wong, and
Wang-chun Woo. 2015. Convolutional LSTM network: A machine learning approach for precipitation nowcasting. In Advances in Neural Information Processing
Systems. 802–810.
[27] Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron Courville, Ruslan
Salakhudinov, Rich Zemel, and Yoshua Bengio. 2015. Show, Attend and Tell:
Neural Image Caption Generation with Visual Attention. In Proceedings of the
32nd International Conference on Machine Learning (ICML-15). 2048–2057.
| 7cs.IT
|
Optimal rates of estimation for
multi-reference alignment
Afonso S. Bandeira∗ , Philippe Rigollet† , and Jonathan Weed‡
arXiv:1702.08546v1 [math.ST] 27 Feb 2017
Courant Institute of Mathematical Sciences, New York University
Massachusetts Institute of Technology
Massachusetts Institute of Technology
Abstract. This paper describes optimal rates of adaptive estimation of
a vector in the multi-reference alignment model, a problem with important applications in fields such as signal processing, image processing,
and computer vision, among others. We describe how this model can
be viewed as a multivariate Gaussian mixture model under the constraint that the centers belong to the orbit of a group. This enables us
to derive matching upper and lower bounds that feature an interesting
dependence on the signal-to-noise ratio of the model. Both upper and
lower bounds are articulated around a tight local control of KullbackLeibler divergences that showcases the central role of moment tensors
in this problem.
AMS 2000 subject classifications: Primary Statistics; secondary Invariant Theory, Signal Processing.
Key words and phrases: Multi-reference alignment, Orbit retrieval, Mixtures of Gaussians.
1. INTRODUCTION
The multi-reference alignment problem and its variants arise in various scientific and engineering applications such as structural biology [SVN+ 05, TS12,
Sad89], image recognition [Bro92], and signal processing [ZvdHGG03]. A striking
feature of this class of problems is that each observation is not only observed in a
noisy setting but is also altered by an latent transformation that reflects underlying heterogeneity of the data. The precise nature of this transformation depends
on the specific application, but it can often be characterized as the action of the
unknown element of a known group.
1.1 The multi-reference alignment problem
Consider the multi-reference alignment problem on IRd under cyclic shifts [BCSZ14].
The goal in this problem is to produce an estimate of a vector θ ∈ IRd (of∗
Part of this work was done while A. S. Bandeira was with the Mathematics Department at
MIT and supported by NSF Grant DMS-1317308.
†
This work was supported in part by NSF CAREER DMS-1541099, NSF DMS-1541100,
DARPA W911NF-16-1-0551, ONR N00014-17-1-2147 and a grant from the MIT NEC Corporation.
‡
This work was supported in part by NSF Graduate Research Fellowship DGE-1122374.
1
2
BANDEIRA, RIGOLLET AND WEED
ten thought of as a signal) from noisy cyclic shifted observations. More concretely, one observes n independent random vectors Y1 , . . . , Yn ∈ IRd given by
Yi = R`i θ + σξi , where `i is an unknown parameter (shift) in [d] := {1, . . . , d};
R`i is a latent cyclic shift by `i coordinates: the jth coordinate of R`i θ ∈ IRd is
given by R`i θ)j = θj+`i (mod d) ; and ξi ∼ N (0, Id ), i.i.d.
Note that R`i is a linear operator from IRd to IRd that can be represented by
a matrix. For example when d = 3, we have
0 1 0
0 0 1
1 0 0
R1 = 0 0 1 , R2 = 1 0 0 , and R3 = 0 1 0
1 0 0
0 1 0
0 0 1
However, since cyclic shifts in IRd form a group isomorphic to quotient ring Zd :=
Z/dZ of integers modulo d, we write R`i ∈ Zd for simplicity.
The action of Zd on IRd also has a simple representation in the Fourier domain,
where the group acts on the phases of the Fourier coefficients. Denoting by θ̂ the
discrete Fourier transform of the vector θ, we obtain that the rotated vector R` θ
satisfies
(1.1)
2πj`i/d
d
R
θ̂j
` θj = e
for −bd/2c ≤ j ≤ dd/2e.
In practical applications, the signal θ arises as the discretization of some underlying continuous signal. Therefore, instead of focusing on the group Zd , we consider
instead the action of the circle group U (1) of unit-norm complex numbers, where
given z ∈ U (1) we define the operator Rz on IRd by its action on the Fourier
transform θ̂:
(1.2)
j
d
R
z θ j = z θ̂j
for −bd/2c ≤ j ≤ bd/2c.
We define the group of such operators by F and call Rz a fractional cyclic shift.
We assume throughout that d is odd, since for real signals not all fractional cyclic
shifts are well defined when j = d/2. This group is both slightly easier to analyze
and better corresponds to the situation in practice. Moreover, a comparison of
Equations 1.1 and 1.2 shows when d is large the groups Zd and F are essentially
equivalent. For the sake of exposition, in the sequel, we will focus on F and omit
the adjective “fractional” when referring to shifts.
Multi-reference alignment is directly used in structural biology [Dia92, TS12];
radar [ZvdHGG03]; crystalline simulations [SSK13]; and image registration in a
number of important contexts, such as in geology, medicine, and paleontology
[SSK13, FZB02]. As a result, variants of this problem for groups other than F
have received some attention, but rarely in statistics. We note parallel research
efforts that have investigated a Boolean version of this problem [APS17].
Another important related problem is that of molecule reconstruction in CryoElectron Microscopy (Cryo-EM). Cryo-EM is an important technique used to
determine three-dimensional structures of biological macromolecules. (It was considered the Nature method of the year in 2015 [Edi15, Nog15]). As in the multireference alignment problem described above, one of the main difficulties with
this imaging technique is that these molecules are imaged at different unknown
orientations and each molecule can only be imaged once due to the destructive nature of the process. More precisely, each measurement consists of a tomographic projection of a rotated (by an unknown rotation in SO(3)) copy of
OPTIMAL RATES FOR MRA
3
the molecule. The task is then to reconstruct the molecule density from many
such measurements. This reconstruction problem has also received significant attention, primarily from computational perspectives, but its statistical properties
remain largely unexplored.
We present in this paper the first statistical analysis for Euclidean MRA and
describe natural classes of signals whose complexity spans the spectrum of statistical rates achievable in this context. Although we focus on F or its subgroups
rather than SO(3), the two frameworks share many features. In particular, our
results exhibit non-trivial minimax rates that are inherent to this class of problems.
1.2 The Synchronization Approach
The difficulty of the multi-reference alignment problem resides in the fact that
both the signal θ ∈ IRd and the shifts z1 , . . . , zn ∈ F are unknown and the
latter are therefore latent variables. If the shifts were known, one could easily
estimate θ by taking the average of Rz−1
Yi , i = 1, . . . , n. In fact, this simple obi
servation is the basis of the leading current approach called the “synchronization
approach” [BCSZ14, BCS15] to this problem. Specifically, synchronization aims
at recovering the latent variables Rzi by solving a problem of the form
X
2
−1
(1.3)
min
Rz−1
.
0 Yi − Rz 0 Yj
0
0 ∈U (1)
z1 ,...,zn
1≤i,j≤n
i
j
Denoting by R̂zi the solutions of (1.3), one can then estimate θ by the average
of R̂z−1
Yi , i = 1, . . . , n.
i
Synchronization problems can be formulated as estimation problems on a
graph. More precisely, one can associate each observation Yi to a graph node,
each of which has a hidden label gi ∈ G for some group G of transformations.
(In our case, G ∼
= F.) The pairwise data, which we identify with edges of the
graph, reveals information about ratios gi (gj )−1 . In the the context of (1.3), this
−1
2
information is simply kR`−1
0 Yi −R`0 Yj k . Despite synchronization problems being
i
j
computationally hard in general, certain theoretical guarantees have been derived
under specific noise models that are unfortunately not realistic for the problems of
interest in this paper. For example, it is often assumed that the edge observations
are independent instead of the more relevant independence of vertices. Among
the most prominent methods are spectral methods [Sin11, BSS11], semidefinite
relaxations [BCSZ14, BCS15, ABBS14, BBS16, JMRT16, BBV16], and methods
based on Approximate Message Passing [PWBM16] and other modified power
methods [Bou16, CC16]. Synchronization also enjoyed many interesting connections with geometry (see [GBM16] for an example).
When the noise is smaller entrywise than the signal θ, synchronization approach yields acceptable results because macroscopic features underlying signal
are still visible. However, in applications, the noise level is often significantly
larger than signal, and it is on this regime that we focus our attention. An illustration of the difference between these regimes appears in Figure 1.
Unfortunately, for the high noise regimes we are interested here the shifts are
impossible to reliably estimate, regardless of the number of samples [ADBS16,
WW84]. In fact, it is not difficult to see that even if we had access to θ, one would
still not be able to reliably estimate the shifts in a high noise regime.
4
BANDEIRA, RIGOLLET AND WEED
2
1
0
1
2
2
1
0
1
2
2
1
0
1
2
15
10
5
0
5
10
15
15
10
5
0
5
10
15
15
10
5
0
5
10
15
Figure 1: Instances of the multi-reference alignment problem, at low (left column)
and high (right column) noise levels. The true underlying signal appears in gray,
and the noised version appears in red. When the noise level is low, large features
of the signal are still visible despite the noise; in the presence of large noise,
however, the signals cannot reliably be synchronized.
1.3 Notation
Denote by W ∈ C d×d the discrete Fourier transform matrix, with entries given
by
1
Wjk = √ exp(2πijk/d) ,
1 ≤ j, k ≤ d .
d
√
The normalization factor 1/ d is chosen so that the resulting matrix W is unitary.
Given θ ∈ IRd , let θ̂ = W θ be its Fourier transform. We will index θ̂ from
−bd/2c to bd/2c.
The symbol k · k denotes the `2 norm on IRd . For any positive integer d, we
write [d] = {1, . . . , d}.
Given a vector t, let t⊗k denote the order-k tensor formed by taking the kfold tensor product of t with itself. Denote by kAk the Hilbert-Schmidt norm of
a tensor A, defined by kAk2 = hA, Ai, where h·, ·i denotes the entrywise inner
product.
A tensor A is symmetric if Ai1 ...ik = Aiπ(1) ...iπ(k) for any permutation π of [k].
For such tensors, the value Ai1 ...ik depends only on the multiset {i1 , . . . , ik }.
We define a cyclic shift of θ ∈ IRd by a unit-norm complex number z by
OPTIMAL RATES FOR MRA
5
specifying its action on the Fourier transform of θ:
k
\
R
z (θ)k = z θ̂k for k = −bd/2c, . . . , bd/2c.
The group of cyclic shifts is known as the circle group and we denote it by F.
Note that it is isomorphic to several well known groups such as SO(2) and IR/Z.
Recall that the Kullback-Leibler (KL) divergence between two distributions P
and Q such that P Q is given by
Z
dP
D(P k Q) = log
dP .
dQ
It is well known that D(P k Q) ≥ 0, with equality holding iff P = Q almost surely.
1.4 Organization of the paper
In Section 2, we propose a new approach to MRA using Gaussian mixture models. Then, in Section 3 we present our main result, Theorem 1, providing minimax
rates for the multi-reference alignment problem under cyclic shifts. In Section 4
we draw precise connections between the Kullback-Leibler (KL) divergence of
sampled distributions from two different signals and the distance between their
invariant moment tensors. This relation does not depend on the precise nature
of the cyclic shifts and holds for any compact subgroup of the orthogonal group.
In Section 5 we give guarantees for the maximum likelihood estimator (MLE):
Theorem 4 gives a general guarantee for the MLE under conditions on the KL
divergence that were obtained in Section 4 and in Section 5.2 a modified MLE
is developed for the specific problems of shifts. This modified MLE provides the
upper bounds in Theorem 1. Section 6 concludes by establishing the lower bound
in Theorem 1; the proof involves finding pairs of different signals with several
matching invariant moment tensors.
2. GAUSSIAN MIXTURE MODEL
We propose an alternative to the synchronization approach discussed above
that completely bypasses the estimation of the shifts `1 , . . . , `n in favor of estimating θ directly. To do so, we recast our model as a continuous mixture of
Gaussians whose centers are algebraically constrained. Since the Gaussian distribution is invariant under cyclic shift, we can without loss of generality assume
that the shifts R`i are independent and uniformly distributed over F. Indeed, to
achieve this setup, we transform the observations Yi into RUi Yi , where Ui is uniformly distributed over U (1) and independent of all other random variables. Since
Ui + `i is also uniformly distributed over U (1), these new observations are drawn
from a mixture of Gaussians with uniform mixing weights and centers given by
R` θ, ` ∈ U (1). In particular, these centers are linked together by a rigid algebraic
structure: they are the orbit of θ ∈ IRd under the action of F. We summarize this
observation into our basic model.
Let Y1 , . . . , Yn ∈ IRd be n independent copies of Y ∈ IRd where
(2.1)
Y = Rθ + σξ,
where θ ∈ IRd is the unknown parameter of interest, R is drawn uniformly (i.e.,
according to the Haar probability measure) from F and ξ ∼ N (0, Id ) is independent Gaussian noise. Denote by Pθ the distribution of a random variable Y that
satisfies (2.1).
6
BANDEIRA, RIGOLLET AND WEED
Define the maximum likelihood estimator (MLE) θ̃n by
(2.2)
θ̃n = argmax
θ∈IRd
n
X
i=1
1
log IER exp − 2 kYi − Rθk2 .
2σ
We postpone the discussion of computational efficiency to a companion paper [PWB+ 17] and focus here on the statistical properties of this estimator. In
particular, we show that a small modification of it optimally solves the multireference alignment problem in a certain sense.
Although the goal of this problem is to recover the unknown parameter θ, it
is not hard to see that we can only hope to identify θ up to a global cyclic shift.
We therefore define a (pseudo-)metric on IRd that deems two vectors θ, φ ∈ IRd
to be close if they are close up to some element of F. To this end, define
ρ(θ, φ) = min kθ − Rφk .
R∈F
We assume throughout that the noise variance σ 2 is known. This assumption is
realistic in many applications such as imaging or signal processing. In other circumstances, it may be calibrated using cross-validation, for example. Throughout
this paper, we assume that c ≤ kθk ≤ 1, where c > 0 is a universal constant so
that σ captures entirely the (inverse) signal-to-noise ratio. We note that, comparatively, IEkσξi k2 = σ 2 d.
Gaussian mixture models have been extensively studied in the statistical literature since their introduction by Pearson [Pea94] in the nineteenth century
(see e.g. [MP00] for an overview). As illustrated by the extant literature, mixture
models are quite rich and broadly applicable to a variety of statistical problems
ranging from clustering to density estimation. As a result, various statistical perspectives may apply when studying the performance of estimators. In the context
of multi-reference alignment, we are naturally interested in estimating θ or, equivalently, the centers. It has been established that in general, the rate of estimation
of the centers may scale like n−C/d for d centers that can be arbitrarily close
(see for example [MV10] and more recently [HK15] for an interesting explanation
from the point of view of model misspecification). This curse of dimensionality
arises from the minimax point of view where centers may be arbitrarily close,
with a distance that may depend on the number of observations, thus leading to
nonparametric rates of estimation. Instead, when the centers are well separated,
the general conditions of [Wal49] are satisfied so that the MLE converges at the
√
parametric rate 1/ n . In our case, when the mixture is continuous, Assumption 1, below, plays an analogous role in ensuring convergence at the parametric
rate. When such conditions are met, the Fisher information determines how the
statistical performance of the MLE scales with the noise level σ. This question
is central to signal processing problems such as multi-reference alignment, where
σ is quite large, since it determines the order of magnitude of the sample size n
required to achieve a certain accuracy.
Exact computation of the Fisher information matrix in this model is out of
√
reach and instead, we focus on the scaling of the quantity nρ(θ̃n , θ) with the
signal-to-noise ratio of the problem, where θ̃n is the MLE (2.2).
OPTIMAL RATES FOR MRA
7
3. MAIN RESULTS
√
As mentioned above, nρ(θ̃, θ) depends asymptotically on the Fisher information of the model, which can be related to the curvature of the KullbackLeibler divergence around its minimum. Conversely, (lack of) curvature of the
Kullback-Leibler divergence around its minimum is what controls minimax lower
bounds. To address both problems at once, we follow an idea originally introduced in [LNS99] in the context of functional estimation and further developed
by [CL11, WY16]. In the multi-reference alignment model, this approach allows
us to relate Kullback-Leibler divergence to moment tensors, which can in turn
be controlled using Fourier-theoretic arguments. It will follow from this analysis
that the difficulty of estimating a particular signal θ depends on the support of
the Fourier transform θ̂ of θ. In particular, define the positive support psupp(θ̂)
of θ̂ by
psupp(θ̂) = {j | j ∈ {1, . . . , d/2}, θ̂j 6= 0} .
We make the following assumption, which guarantees that the MLE converges
at a parametric rate.
Assumption 1. There exists an absolute constant c > 1, not depending on
n, such that c−1 ≤ |θ̂j | ≤ c for all j ∈ psupp(θ̂). We denote by T the set of such
vectors.
We emphasize that this is the situation of most interest to practitioners: the
existence of very small, but non-zero, coordinates whose values approaches 0
with n should rightly be considered pathological. In a way, Assumption 1 rules
out certain artificial difficult situations analogous to classical difficulties arising in
estimating mixtures of Gaussians, such as distinguishing the mixture .5N (+ε, 1)+
.5N (−ε, 1) from the single Gaussian N (0, 1) for very small ε. Moreover, it enables
us to restrict our attention to a compact set of parameters and bypass some
technical complications.
The following theorem reveals a surprising phenomenon: even under Assumption 1, the multi-reference alignment problem suffers from the curse of dimensionality.
Theorem 1. Let 2 ≤ s ≤ bd/2c. Let Ts be the set of vectors θ ∈ T satisfying
Assumption 1 and psupp(θ̂) ⊂ [s]. Then,
(3.1)
σ 2s−1
inf sup IEθ [ρ(Tn , θ)] √ (1 + on (1)) ,
Tn θ∈Ts
n
where the infimum is taken over all estimators Tn of θ and where the symbol
hides constants depending on d but on no other parameter. A modified MLE θ̌n
defined in (5.11) achieves this rate.
A few remarks are in order. Note first that the curse of dimensionality is inherent to the minimax paradigm. Indeed, our proof of the lower bound describes
a class of signals that satisfy Assumption 1 but have a very specific Fourier spec√
trum. Such signals drive the worst case bound of order σ 2s−1 / n. This limitation
is overcome in a companion paper [PWB+ 17], where we show that even Fourier
dense signals θ may be estimated as the same rate as signals in T2 as long as they
8
BANDEIRA, RIGOLLET AND WEED
are generic enough. Second, our proof techniques do not allow us to remove the σ
dependence of the term on (1). In particular, for small values of n, this term may
actually dominate the upper bound. We conjecture that this issue is an artifact
of the proof technique and note that preliminary numerical results in [PWB+ 17]
support this claim.
The rest of this paper is devoted to the proof of the main results in Theorem 1.
4. INFORMATION GEOMETRY
In this section, we develop several new tools to obtain precise bounds on the
divergence D(Pθ k Pφ ) for pairs of signals θ and φ. On the one hand, it is well
known that upper bounds on the divergence translate into minimax lower bounds
using LeCam’s method [LeC73]. On the other hand, we also show how to transform lower bounds on D(Pθ k Pφ ) into uniform upper bounds on the performance
of the MLE. Note that this analysis departs from the classical pointwise rate of
convergence for MLE that guarantees a rate of convergence n−1/2 for each fixed
choice of parameter as n → ∞. Our tools strengthen this result considerably.
Indeed, we show that for reasonable choices of θ, the MLE achieves a rate of
n1/2 uniformly over all choices of θ. We refer the reader to [HK15] for examples
of other Gaussian mixture problems where the pointwise and uniform rates of
estimation differ.
For convenience, we abbreviate D(Pθ k Pφ ) by D(θ k φ). The following Lemma
collects several useful facts about the function D(θ k φ). A proof appears in Appendix A.
Lemma 2. Let R have uniform distribution over any subgroup G of the orthogonal group in d dimensions. Fix θ, φ ∈ IRd . The following holds
(i) If ϑ = θ − IERθ and ϕ = φ − IERφ, then
D(θ k φ) = D(ϑ k ϕ) +
1
kIE[Rθ] − IE[Rφ]k2 .
2σ 2
(ii) If ρ(θ, φ) = ε and kθk, kφk ≤ 1, then
D(θ k φ) =
1
1
O(ε2 )
2
⊗2
⊗2 2
kIE[Rθ]
−
IE[Rφ]k
+
kIE[(Rθ)
]
−
IE[(Rφ)
]k
+
,
2σ 2
4σ 4
σ6
where O(ε2 ) hides a constant, which may depend on d but is otherwise independent
of θ, φ, and σ.
The following Theorem provides a tight bound on the quantity D(θ k φ) in
terms of Hilbert-Schmidt distance between the moment tensors IE[(Rθ)⊗k ] and
IE[(Rφ)⊗k ]. Specifically, we show that the divergence D(θ k φ) is of order σ −2k ε2
where k is the smallest natural number such that the moment tensors IE[(Rθ)⊗k ]
and IE[(Rφ)⊗k ] differ significantly. This theorem is not specific to cyclic shifts
and holds for any compact subgroup of the orthogonal group.
Theorem 3. Let θ be a fixed vector in IRd such that kθk ≤ 1. Let φ ∈ IRd
be such that ρ(θ, φ) = ε ≤ kθk. Let R be a random element drawn according to
the Haar probability measure on any compact subgroup G of the orthogonal group
9
OPTIMAL RATES FOR MRA
in d dimensions. For all m ≥ 1, let ∆m = IE[(Rθ)⊗m − (Rφ)⊗m ]. If there exists
k ≥ 1 such that, as ε → 0,
k∆m k = o(ε) for m = 1, . . . , k − 1,
k∆k k = Ω(ε) ,
and
then k∆k k = Θ(ε). Moreover, for σ ≥ 1 there exist universal constants c and C̄
and constant C d that depends only on d, all positive and such that
ck
σ 2k k!
k∆k k2 − C d
ε2
σ 2k+2
≤ D(θ k φ) ≤
2
σ 2k k!
k∆k k2 + C̄
ε2
σ 2k+2
.
In particular, there exists positive σ0 , ε0 that depend on d such that for all
σ ≥ σ0 , and θ, φ such that kθk ≤ 1, ρ(θ, φ) ≤ ε0 , it holds
D(θ k φ) σ −2k ρ2 (θ, φ) ,
where the symbol hides constants depending on d but on no other parameters.
Proof. The divergence D(θ k φ) and the tensors IE[(Rφ)⊗m ] are unaffected
if we replace φ by Rφ for any R ∈ G. Hence without loss of generality, we can
assume that kθ − φk = ρ(θ, φ) = ε.
We first establish that for any m ≥ 1, the quantities k∆m k are indeed of order
at most ε. Specifically, we prove that
(4.1)
kIE[(Rθ)⊗m − (Rφ)⊗m ]k2 ≤ m2 2m−1 ε2
for all m ≥ 1 and ε ∈ (0, 1). This implies that k∆k k = Θ(ε).
To prove (4.1), note that by Jensen’s inequality,
kIE[(Rθ)⊗m − (Rφ)⊗m ]k2 ≤ IEk(Rθ)⊗m − (Rφ)⊗m k2 = kθ⊗m − φ⊗m k2 .
Expanding the norm yields
kθ⊗m − φ⊗m k2 = kθk2m − 2hθ, φim + kφk2m
= kθk2m (1 − 2(1 + γ)m + (1 + 2γ + δ 2 )m ) ,
where δ = ε/kθk and γ = hθ, φ − θi/kθk2 is such that |γ| ≤ δ by Cauchy-Schwarz.
Using Lemma B.1 in the Supplementary Materials, we conclude that
kθk2m − 2hθ, φim + kφk2m ≤ kθk2m m2 2m−1 δ 2 ≤ m2 2m−1 ε2 ,
as desired.
If k < 3, then the claim follows directly from Lemma 2 (ii).
We therefore assume k ≥ 3. Then kIE[Rθ−Rφ]k = o(ε), so Lemma 2 (i) implies
D(θ k φ) = o(ε2 ) + D(ϑ k ϕ) ,
where ϑ = θ − IERθ and ϕ = φ − IERφ. Hence we can replace θ and φ by ϑ and ϕ
without affecting D(θ k φ) by more than o(ε2 ). We therefore assume without loss
of generality that IERθ = IERφ = 0.
10
BANDEIRA, RIGOLLET AND WEED
We first show the upper bound. Denote by g the density of a standard ddimensional Gaussian random variable. For all ζ ∈ IRd , let fζ denote the density
of Pζ . Then
kζk2
y > Rζ
1
1
fζ (y) = IER g(σ −1 (y − Rζ)) = g(σ −1 y)e− 2σ2 IER e σ2 .
σ
σ
Let χ2 (θ, φ) denote the χ2 -divergence between Pθ and Pφ , defined by
Z
2
χ (θ, φ) =
(fθ (y) − fφ (y))2
dy .
fθ (y)
Since IERθ = 0 by assumption, Jensen’s inequality implies
fθ (y) ≥
kθk2
kθk2
y > Rθ
1
1
g(σ −1 y)e− 2σ2 eIER σ2 = g(σ −1 y)e− 2σ2 .
σ
σ
Hence
kθk2
kθk2
kφk2
y > Rθ
y > Rφ 2 1
(fθ (y) − fφ (y))2
≤ e 2σ2 e− 2σ2 IER e σ2 − e− 2σ2 IER e σ2
g(σ −1 y) .
fθ (y)
σ
Integrating this quantity with respect to y yields a bound on the χ2 divergence.
Let ξ ∼ N (0, Id ) and observe that
i
h kθk2
kθk2
kφk2
σξ> Rθ
σξ> Rφ 2
χ2 (θ, φ) ≤ IEξ e 2σ2 e− 2σ2 IER e σ2 − e− 2σ2 IER e σ2
h kθk2
kθk2 ξ> (R+R0 )θ
kθk2 +kφk2 ξ> (Rθ+R0 φ)
σ
σ
= IEξ,R,R0 e 2σ2 e− σ2 e
− 2e− 2σ2 e
kφk2 ξ> (R+R0 )φ i
σ
+ e− σ2 e
,
where R and R0 are independent elements selected uniformly from G.
Taking expectations with respect to ξ yields
θ > Rφ
φ> Rφ
θ> Rθ
χ2 (θ, φ) ≤ 2IER e σ2 − 2e σ2 + e σ2 ,
2
2
Where we used that ekθk /(2σ ) ≤ 2 for σ ≥ 1 and kθk2 ≤ 1.
The random variables Rθ and Rφ have moment generating functions that
converge in a neighborhood of the origin, hence
h
i
X
2
>
m
>
m
>
m
χ2 (θ, φ) ≤
IE
(θ
Rθ)
−
2(θ
Rφ)
+
(φ
Rφ)
R
σ 2m m!
m≥0
X
2
k∆m k2
=
σ 2m m!
m≥0
≤
≤
2
σ 2k k!
k∆k k2 + ε2
X
m≥k+1
ε2
2m2
+ o(ε2 )
σ 2m m!
2
k∆k k2 + C̄ 2k+2 .
σ 2k k!
σ
The upper bound then follows from the inequality D(θ k φ) ≤ χ2 (θ, φ) [Tsy09].
OPTIMAL RATES FOR MRA
11
We now turn to the lower bound. As before, we assume that k ≥ 3 and define
Z
d1 (θ, φ) = |fθ (y) − fφ (y)| dy .
Recall that by Pinsker’s Inequality, we have D(θ k φ) ≥ 12 d21 (θ, φ). Moreover,
Z
ky−Rθk2
ky−Rφk2
1
−
−
2σ 2
2σ 2
d1 (θ, φ) =
IEe
−
IEe
dy
(2π)d/2 σ
2σξ> Rφ−kφk2
2σξ> Rθ−kθk2
2σ 2
2σ 2
ξ ∼ N (0, Id )
ξ − IER e
ξ ,
= IEξ IER e
2
2
2
kφk
ξ> Rθ kφk −kθk
ξ> Rφ
= e− 2σ2 IEξ IER e σ ξ e 2σ2
− IER e σ ξ .
We now show that |kθk2 − kφk2 | = o(ε). Indeed
kθk2 − kφk2 = IE
d
X
(Rθ)2i − (Rφ)2i
i=1
≤
≤
d
X
i=1
d
X
IE[(Rθ)2i ] − IE[(Rφ)2i ]
IE[(Rθ)i (Rθ)j ] − IE[(Rφ)i (Rφ)j ]
i,j=1
≤ dkIE(Rθ)⊗2 − (Rφ)⊗2 k = dk∆2 k = o(ε) ,
where we applied Cauchy-Schwarz to get the second inequality and last equality
follows from the assumption of the theorem when k ≥ 3. Since kθk ≤ 1 and σ ≥ 1,
we have
kφk2 −kθk2
kφk2
= 1 + o(ε) and
≤1
e 2σ2
2σ 2
for ε small enough. It yields
ξ> Rθ
ξ> Rφ
d1 (θ, φ) ≥ e−1 IEξ IER e σ ξ 1 + o(ε) − IER e σ ξ
kθk2
ξ> Rθ
ξ> Rφ
≥ e−1 IEξ IER e σ ξ − IER e σ ξ − e 2σ2 −1 o(ε)
X 1
= e−1 IEξ
h∆m , ξ ⊗m i − o(ε)
σ m m!
m≥1
X
1
1
≥ e−1 IEξ k h∆k , ξ ⊗k i − e−1
IEξ m h∆m , ξ ⊗m i − o(ε)
σ m!
σ k!
m6=k
p
X (d + m)m
ck
≥ √ k∆k k − e−1
k∆m k − o(ε)
σ m m!
σ k k!
m6=k
≥
ck
σk
ε
√ k∆k k − Cd k+1
σ
k!
where in the penultimate inequality, we employ a Khinchine-type inequality due
to [Bob00], details of which appear as Lemma B.2 in the Supplementary Materials.
Together with Pinsker’s inequality and the fact that k∆k k = Θ(ε) where ε =
ρ(θ, φ), this completes the proof of the lower bound.
12
BANDEIRA, RIGOLLET AND WEED
5. MAXIMUM LIKELIHOOD ESTIMATION
Let Y1 , . . . , Yn be i.i.d observations from the model (2.1) and consider the MLE
θ̃n that was defined in (2.2). In this section, we prove our main statistical result,
that is a uniform upper bound on the rate of convergence of the MLE.
Our proof technique extends beyond the framework of the MRA model and
can be broadly applied to derive uniform rates of convergence for the MLE from
tight bounds on the KL divergence like Theorem 3. While similar ideas are often
employed to obtain pointwise rates of convergence, extension to uniform rates
requires novel elements. From here on, positive constants may depend on d unless
noted otherwise.
We first establish an upper bound for the MLE under a general lower bound for
the KL divergence. Then we specialize this result to obtain the minimax upper
bounds over Ts that are presented in Theorem 1.
5.1 A general upper bound
Theorem 4. Let R be a random element drawn according to the Haar probability measure on any compact subgroup G of the orthogonal group in d dimensions. Assume that there exist k ≥ 1 and positive σ0 , ε0 , c0 that depend on d such
that the following hold: for all σ ≥ σ0 , and θ, φ such that θ ∈ T ,
(5.1)
D(θ k φ) ≥ Cσ −2k ρ2 (θ, φ)
∀ φ ∈ IRd ρ(θ, φ) ∈ [0, ε0 ) ,
(5.2)
D(θ k φ) ≥ Cσ −`
∀ φ ∈ IRd ρ(θ, φ) ∈ [ε0 , c0 σ) ,
(5.3)
D(θ k φ) ≥ Cσ −2k ρ2 (θ, φ)
∀ φ ∈ IRd ρ(θ, φ) ∈ [c0 σ, ∞) .
Then the MLE θ̃n satisfies uniformly over such θ,
log n
σk
,
IEθ [ρ(θ̃n , θ)] ≤ C √ + Cσ
n
n
(5.4)
where Cσ ≤ Cσ 2`+10k .
Proof. The symbols c and C denote constants whose value may change from
line to line. In the rest of this proof, we write θ̃ = θ̃n to denote the MLE.
The main goal of the proof is to combine control of the curvature of the function
D with control of the deviations of the log-likelihood function.
Define the event E = {ρ(θ̃, θ) ≤ ε} where ε ≤ ε0 . Since D is invariant under
the action of G, we can assume without loss of generality that ρ(θ̃, θ) = kθ̃ − θk.
We first establish that on this event kθ̃ − θk can be controlled in terms of the
metric induced by the Hessian of D at θ.
Fix θ ∈ IRd and denote by H the Hessian of √
the function φ 7→ D(θ k φ) evalud
ated at φ = θ. For any u ∈ IR , define kukH = u> Hu.
On E, D(θ k θ̃) ≥ Cσ −2k ρ2 (θ, θ̃) and ρ(θ, θ̃) = kθ̃ − θk so using a third order
Taylor expansion, we get
1
kθ̃ − θk3
D(θ k θ̃) − kθ̃ − θk2H ≤ C
≤ Cεσ 2k−3 kθ̃ − θk2H .
2
σ3
Therefore, there exists a C such that if ε < Cσ 3−2k , we get
(5.5)
1
D(θ k θ̃) ≥ kθ̃ − θk2H ≥ Cσ −2k kθ̃ − θk2 .
4
OPTIMAL RATES FOR MRA
13
We now control the geometry of the log-likelihood function near θ. Define
n
Dn (θ k φ) =
fθ
1X
log (Yi ) ,
n
fφ
i=1
where Yi are i.i.d from Pθ and we recall that fζ is the density of Pζ , ζ ∈ IRd . Note
that Dn (θ k θ) = 0, so Dn (θ k θ̃) ≤ 0.
Since θ is held fixed throughout the proof, we abbreviate D(θ k φ) and Dn (θ k φ)
as D(φ) and Dn (φ), respectively.
Using a second order Taylor expansion, we get
1
D(θ̃) − Dn (θ̃) = −∇Dn (θ)> h + h> ∇2 (D − Dn )(θ̄)h ,
2
where h = θ̃ − θ and θ̄ lies on a segment between θ̃ and θ.
For all ζ ∈ T , write Hn (ζ) for the Hessian of Dn (φ) evaluated at φ = ζ, and
similarly let H(ζ) be the Hessian of D(φ) evaluated at φ = ζ. We obtain
(5.6)
1
1
khk2H ≤ D(θ̃) − Dn (θ̃) ≤ −∇Dn (θ)> h + h> (H(θ̄) − Hn (θ̄))h .
4
2
For the first term, we note that if H were invertible (and hence k · kH a genuine
metric), then it is well known (see, e.g. [HUL01]) that
sup
−∇Dn (θ)> u = k∇Dn (θ)k∗H = k∇Dn (θ)kH −1 ,
u:kukH =1
where k · k∗H , the dual norm to k · kH , is such that k · k∗H = k · kH −1 . In general,
H is not invertible, but we still have k · k∗H = k · kH † , where H † denotes the
Moore-Penrose pseudo-inverse of the matrix H.
To control the second, note first that by (5.5), it holds khk ≤ Cσ k khkH . Therefore,
h> (H(θ̄) − Hn (θ̄))h ≤ Cσ k khkH khk sup kH(φ) − Hn (φ)kop ,
φ∈Bε
IRd
where Bε := {φ ∈
: ρ(φ, θ) ≤ ε}.
Combining the above three bounds and dividing by khkH , we get that on E,
1
khkH ≤ kDn (θ)kH † + Cσ 2k sup kH(φ) − Hn (φ)k2op + khk2 ,
4
φ∈Bε
where we applied Young’s inequality.
On the other hand, using (5.5), we have khkH ≥ Cσ −k ρ(θ̃, θ). Therefore, applying the Cauchy-Schwarz inequality and Chebyshev’s inequality, we get
IE[ρ(θ̃, θ)] = IE[ρ(θ̃, θ)1IE ] + IE[ρ(θ̃, θ)1IE c ]
1/2
1/2
≤ Cσ k IE[khkH 1IE ] + IE[ρ2 (θ̃, θ)]
IP(E c )
≤ Cσ k IE[khkH 1IE ] + ε−1 IE[ρ2 (θ̃, θ)] .
Thus,
(5.7)
IE[ρ(θ̃, θ)] ≤ C σ k IEkDn (θ)kH † +σ 3k IE sup kH(φ)−Hn (φ)k2op +(σ k +ε−1 )IE[ρ2 (θ̃, θ)]
φ∈Bε
14
BANDEIRA, RIGOLLET AND WEED
It suffices to control the right side of the above inequality. The main term is
the first one: Jensen’s inequality and the second Bartlett identity imply
r
r
q
1
d
†
>
†
tr(H H) ≤
.
(5.8)
IEkDn (θ)kH † ≤ tr(H IE[Dn (θ)Dn (θ) ]) =
n
n
Standard matrix concentration bounds can be applied to show
IE sup kH(φ) − Hn (φ)k2op ≤ C
(5.9)
φ∈Bε
log n
.
nσ 4
A proof of (5.9) appears as Lemma B.4 in the Supplementary Materials.
Likewise, a standard slicing argument, Lemma B.5 in the Supplementary Materials, implies
IE[ρ2 (θ̃, θ)] ≤ C
(5.10)
σ (8k−4)∧(2`+2)
.
n
Plugging (5.8), (5.9), and (5.10) into (5.7), we get
σk
σ 5k−4 log n σ (9k−4)∧(2`+k+2)
IE[ρ(θ̃, θ)] ≤ C √ +
+
,
n
nε
n
as desired.
5.2 A modified MLE
The MLE itself may not achieve the optimal rate of convergence because the
lower bound (5.1) may not be satisfied with the optimal choice of k when φ
is a specific perturbation of θ. Namely, in the specific case of cyclic shifts, the
divergence D(φ) is not curved enough in directions that perturb a null Fourier
coefficient of θ. To overcome this limitation, we split the sample Y1 , . . . , Yn into
two parts: with the first part we estimate the support of θ̂ under Assumption 1 and
with the second part, we compute a maximum likelihood estimator constrained
to have the estimated support.
Specifically, assume for simplicity that we have a sample Y1 , . . . , Y2n of size
2n and split it into two samples Y1 = {Y1 , . . . , Yn } and Y2 = {Yn+1 , . . . , Y2n } of
equal size.
5.2.1 Fourier support estimation We use the first subsample Y1 to construct a
set S̃ that coincides with psupp(θ̂) with high probability. For any j = −bd/2c, . . . , bd/2c,
define,
n
1X d 2
Mj =
|(Yi )j | − σ 2 .
n
i=1
Define the set S̃ by
r
n
log n o
2
S̃ = j ∈ {−bd/2c, . . . , bd/2c} : Mj ≥ Cσ
n
The following proposition shows that S̃ = psupp(θ̂) with high probability.
OPTIMAL RATES FOR MRA
Proposition 5.
15
Fix θ ∈ IRd . Assume that n/(log n) ≥ Cσ 4 . Then
IP[S̃ 6= psupp(θ̂)] ≤ C
σ4
.
n
Proof. This follows from standard concentration arguments. A full proof appears in the Supplementary Materials.
5.2.2 Constrained MLE We use the second sample to construct a constrained
MLE. To that end, for any S ⊂ {1, . . . , bd/2c}, define the projection PS by
φ̂j if j ∈ S ∪ −S
\
P
(φ)
=
φ̂
if j = 0
S
j
0
0
otherwise.
The image of PS is a (2|S| + 1)-dimensional real vector space. For convenience,
write φS = PS φ for any vector φ ∈ IRd .
Recall that Y2 = {Yn+1 , . . . , Y2n } denotes the second subsample and define
Y1S , . . . , YnS by
YiS = PS Yn+i + σ(I − PS )ξi
i = 1, . . . , n .
where the ξi ∼ N (0, Id ) are i.i.d, independent from Y2 .
Define the modified MLE θ̌n by
n
1X
θ̌n = argmax
log fφ (YiS̃ ) .
φ∈Im(PS̃ ) n
(5.11)
i=1
Proposition 6. Fix 2 ≤ s ≤ bd/2c, θ ∈ Ts and let S = psupp(θ̂). Then,
there exist positive σ0 , ε0 , c0 that depend on d such that the following hold: for all
σ ≥ σ0 ,
(5.12)
D(θ k φ) ≥ Cσ −4s+2 ρ2 (θ, φ)
−4s+2
(5.13)
D(θ k φ) ≥ Cσ
(5.14)
D(θ k φ) ≥ Cσ −2 ρ2 (θ, φ)
∀ φ ∈ Im(PS ) ρ(θ, φ) ∈ [0, ε0 ) ,
∀ φ ∈ Im(PS ) ρ(θ, φ) ∈ [ε0 , c0 σ) ,
∀ φ ∈ Im(PS ) ρ(θ, φ) ∈ [c0 , ∞) .
A proof appears in Appendix A.
5.3 Proof of upper bound in Theorem 1
Define R = {S̃ = psupp(θ̂)} and observe that
IE[ρ(θ̌n , θ)] ≤ IE[ρ(θ̌n , θ)1IR ] + IE[ρ(θ̌n , θ)1IRc ] .
The first term is controlled by combining Proposition 6 and Theorem 4 to get
σ 2s−1
log n
IE[ρ(θ̌n , θ)1IR ] ≤ C √ + Cσ
,
n
n
where Cσ ≤ Cσ 28s−14 .
16
BANDEIRA, RIGOLLET AND WEED
To bound the second term, we use the Cauchy-Schwarz inequality and Proposition 5 to get
q
σ2
IE[ρ(θ̌n , θ)1IRc ] ≤ C √
IE[ρ(θ̌n , θ)2 ]
n
We now show that IE[ρ(θ̌n , θ)2 ] is bounded uniformly over all choices of S̃ by a
constant multiple of σ 2 using a similar slicing argument as the one employed in
the proof of Lemma B.5 in the Supplementary Materials.
By the triangle inequality,
ρ(θ̌n , θ) ≤ ρ(θ̌n , θS̃ ) + ρ(θS̃ , θ) ≤ ρ(θ̌n , θS̃ ) + 1 .
In view of (5.14), we have
ρ(θ̌n , θS̃ )2 ≤ (c0 σ)2 + Cσ 2 D(θS̃ k θ̌n ) ≤ (C ◦ σ)2 (1 + Gn (θS̃ k θ̌n )) ,
for some constant C ◦ , where
Gn (θS̃ k θ̌n ) = D(θS̃ k θ̌n ) − Dn (θS̃ k θ̌n ) .
For j ≥ 0, define Sj = {φ ∈ IRd : 2j σ ≤ ρ(φ, θS̃ ) ≤ 2j+1 σ} and let J be such
that C ◦ ≤ 2J ≤ 2C ◦ . Observe that
X
IE[ρ(θ̌n , θS̃ )2 ] ≤ 4(C ◦ σ)2 +
IE[ρ(θ̌n , θS̃ )2 1I(θ̌n ∈ Sj )]
j≥J
≤ 4(C ◦ σ)2 + σ 2
X
22j+2 IP[ sup Gn (θS̃ k φ) > C
j>J
≤ 4(C ◦ σ)2 + Cσ 2
X
φ∈Sj
22j
]
n
22j exp(−C22j ) ≤ Cσ 2 ,
j≥0
where we used (B.7) from the Supplementary Materials in the third inequality.
We obtain
IE[ρ(θ̌n , θ)2 ] ≤ 2IE[ρ(θ̌n , θS̃ )2 ] + 2 ≤ Cσ 2 .
We have established that
IE[ρ(θ̌n , θ)] ≤ C
σ 2s−1
log n σ 3
√ + σ 26s−13
+
,
n
n
n
which completes the proof of Theorem 1.
6. MINIMAX LOWER BOUNDS
Our minimax lower bounds rely ultimately on Le Cam’s classical two-point
testing method [LeC73]. In particular, the version that we use requires an upper
bound on the KL divergence, which can be obtained using Theorem 3 and a
moment matching argument.
17
OPTIMAL RATES FOR MRA
6.1 Moment matching
The lower bound of Theorem 1 follows from Proposition 7.
Proposition 7.
Fix 2 ≤ s ≤ bd/2c and let θ, φ ∈ IRd satisfy
θ̂m = φ̂m = 0
for m ∈
/ {±(s − 1), ±s}
and
|θ̂m | = |φ̂m |
for m ∈ {±(s − 1), ±s}.
If R is drawn uniformly from F, then for any m = 1, . . . , 2s − 2, it holds
IER [(Rθ)⊗m ] = IER [(Rφ)⊗m ]
Proof. Fix m ≤ 2s − 2. Since IER [(Rθ)⊗m ] and IER [(Rφ)⊗m ] are symmetric
tensors, to show that they are equal it suffices to show that
hIER [(Rθ)⊗m ], u⊗m i = hIER [(Rφ)⊗m ], u⊗m i
∀ u ∈ IRd
or equivalently, that
(6.1)
IER [(u> Rθ)m ] = IER [(u> Rφ)m ]
∀ u ∈ IRd .
Consider the set P = {ζ : |ζ̂j | = |θ̂j | , ∀ j} and note that θ, φ ∈ P. We show
that the function ζ 7→ IER [(u> Rζ)m ] is constant on P, which readily yields (6.1).
For a fixed shift Rz ∈ F, we obtain
bd/2c
X
d
u> Rz ζ = hû, R
z ζi =
û−j ζ̂j z j ,
j=−bd/2c
so
bd/2c
X
(u> Rz ζ)m =
z j1 +···+jm
m
Y
û−jn ζ̂jn .
n=1
j1 ,...,jm =−bd/2c
Taking expectations with respect to a uniform choice of z yields
(6.2)
IER [(u> Rζ)m ] =
X
m
Y
û−jn ζ̂jn ,
j1 +···+jm =0 n=1
where the sums are over all choices of coordinates j1 , . . . , jm ∈ {−bd/2c, . . . , bd/2c}
whose sum is 0.
The Fourier transform of ζ is supported only on coordinates ±(s − 1) and
±s, so we may restrict our attention to sums involving only those coordinates.
Suppose j1 + · · · + jm = 0. Define
α = |{i : ji = s − 1}|
β = |{i : ji = −(s − 1)}|
γ = |{i : ji = s}|
δ = |{i : ji = −s}|
By assumption j1 + · · · + jm = 0, so the tuple (α, β, γ, δ) is a solution to
α(s − 1) + β(−(s − 1)) + γ(s) + δ(−s) = 0
18
BANDEIRA, RIGOLLET AND WEED
or, equivalently,
(α − β)(s − 1) + (γ − δ)s = 0
Since s − 1 and s are coprime, (α − β) and (γ − δ) must be multiples of s and
s − 1, respectively. Since |α − β| + |γ − δ| ≤ m < 2s − 1, in fact α − β = γ − δ = 0.
Therefore the only m-tuples (j1 , . . . , jm ) that appear in the sum on the righthand side of (6.2) are those in which +(s − 1) and −(s − 1) occur an equal
number of times and
Q +s and −s occur an equal number of times. For such mtuples, the product m
n=1 û−jn ζ̂jn can be reduced to a product of terms of the form
û−(s−1) ûs−1 ζ̂s−1 ζ̂−(s−1) and û−s ûs ζ̂s ζ̂−s . Since u and ζ are real vectors, ûj û−j =
|uj |2 and ζ̂j ζ̂−j = |ζ̂j |2 for all j = −bd/2c, . . . , bd/2c, so
m
Y
û−jn ζ̂jn = (|ûs−1 |2 |ζ̂s−1 |2 )a (|ûs |2 |ζ̂s |2 )b ,
n=1
where a and b are the number of occurrences of the pairs ±(s − 1) and ±s,
respectively. This quantity depends only on the moduli |ζ̂s | and |ζ̂s−1 |, hence it is
the same for all ζ ∈ P. This completes the proof of (6.1) and therefore the proof
of the proposition.
6.2 Proof of lower bound in Theorem 1
√
Fix z = eiδ for δ = c1 σ 2s−1 / n for some constant c1 > 0. Let τ be given by
1/2 if |j| = s − 1 or s,
τ̂j =
0
otherwise.
Let φn be given by
1/2 if |j| = s − 1,
z/2
if j = s,
cn =
φ
j
∗
z /2 if j = −s,
0
otherwise.
cn and τ̂ lies in [−s, s] and that kφn − τ k and ρ(φn , τ )
Note that the support of φ
√
are both bounded by c2 σ 2s−1 / n, where c2 can be made arbitrarily small by
taking c1 small enough.
Theorem 3 and Proposition 7 imply that
D(Pnτ k Pnφn ) ≤ Cnσ −4s+2 ρ2 (φn , τ ) ≤ c3 ,
for a positive constant c3 that can be made arbitrarily small by taking c1 small
enough. Using standard minimax lower bounds techniques [Tsy09], we get the
desired result.
APPENDIX A: OMITTED PROOFS
Proof of Lemma 2. We first prove the following simple expression:
1
>
1
IE[e σ2 (θ+σξ) Rθ | ξ]
2
2
,
D(Pθ k Pφ ) = D(θ k φ) = 2 (kφk − kθk ) + IE log
1
>
2σ
IE[e σ2 (θ+σξ) Rφ | ξ]
19
OPTIMAL RATES FOR MRA
where ξ ∼ N (0, Id ).
This claim follows directly from the definition of divergence. Denoting by g(y)
the density of a standard Gaussian random variable with respect to the Lebesgue
measure on IRd , we can write
dPθ
IE[g((y − Rθ)/σ)]
(y) =
dPφ
IE[g((y − Rφ)/σ)]
IE exp − 2σ1 2 (kyk2 − 2y > Rθ + kRθk2 )
=
IE exp − 2σ1 2 (kyk2 − 2y > R0 φ + kR0 φk2 )
IE exp σ12 y > Rθ
1
2
2
,
= exp
(kφk − kθk )
2σ 2
IE exp σ12 y > R0 φ
since R is orthogonal. Hence
D(θ k φ) = IEY ∼Pθ log
dPθ
(Y )
dPφ
1
>
IE[e σ2 Y Rθ | Y ]
1
.
= 2 (kφk2 − kθk2 ) + IEY ∼Pθ log
1
>
2σ
IE[e σ2 Y Rφ | Y ]
When Y ∼ Pθ , we can write Y = R0 θ + σξ for a standard Gaussian vector
ξ and rotation R0 independent of R. Since R0 is orthogonal, this has the same
distribution as R0 (θ +σξ). If R and R0 are independent and uniform, then (R0 )> R
has the same distribution as R, so
Y > Rθ =d (θ + σξ)> Rθ .
Therefore
1
(A.1)
>
1
IE[e σ2 (θ+σξ) Rθ | ξ]
2
2
D(θ k φ) = 2 (kφk − kθk ) + IEξ log
.
1
>
2σ
IE[e σ2 (θ+σξ) Rφ | ξ]
We now prove both parts of the Lemma
(i) For convenience write θ̄ = IERθ and φ̄ = IERφ. These vectors satisfy Rθ̄ = θ̄
and Rφ̄ = φ̄ for all R. Hence
(θ + σξ)> Rθ = (θ̄ + ϑ + σξ)> R(θ̄ + ϑ)
= (ϑ + σξ)> Rϑ + (θ̄ + σξ)> θ̄ ,
and similarly
(θ + σξ)> Rφ = (ϑ + σξ)> Rϕ + (θ̄ + σξ)> φ̄ .
Plugging these quantities into the expression for D(θ k φ) yields
1
>
>
1
IE[e σ2 (ϑ+σξ) Rϑ+(θ̄+σξ) θ̄ | ξ]
D(θ k φ) = 2 (kφk2 − kθk2 ) + IEξ log
1
>
>
2σ
IE[e σ2 (ϑ+σξ) Rϕ+(θ̄+σξ) φ̄ | ξ]
1
>
1
1
IE[e σ2 (ϑ+σξ) Rϑ | ξ]
= 2 (kφk2 − kθk2 ) + 2 IEξ (θ̄ + σξ)> (θ̄ − φ̄) + IEξ log
1
>
2σ
σ
IE[e σ2 (ϑ+σξ) Rϕ | ξ]
1
1
= 2 (kφ̄k2 − kθ̄k2 ) + 2 (kθ̄k2 − θ̄> φ̄) + D(ϑ k ϕ)
2σ
σ
1
= 2 kIE[Rθ − Rφ]k2 + D(ϑ k ϕ) .
2σ
20
BANDEIRA, RIGOLLET AND WEED
(ii) The previous claim implies that it suffices to show
1
kIE[(Rθ)⊗2 − (Rφ)⊗2 ]k2 + σ −6 O(ε2 )
4σ 4
for θ and φ satisfying IERθ = IERφ = 0.
We accomplish this by expanding the expression for D(θ k φ) given above as a
power series in σ −1 . Recall
D(θ k φ) =
1
>
1
IE[e σ2 (θ+σξ) Rθ | ξ]
D(θ k φ) = 2 (kφk2 − kθk2 ) + IEξ log
.
1
>
2σ
IE[e σ2 (θ+σξ) Rφ | ξ]
Given a random variable X, write
KX (t) = log IE exp(t> X)
for the cumulant generating function of X. Then
1
>
IE[e σ2 (θ+σξ) Rθ | ξ]
1
1
log
= KRθ
(θ − σξ) − KRφ
(θ − σξ) .
1
>
σ2
σ2
IE[e σ2 (θ+σξ) Rφ | ξ]
Denote by κm and λm the mth cumulant tensors of Rθ and Rφ respectively. Then
X
1
1
D(θ k φ) = 2 (kφk2 − kθk2 ) + IE
hκm − λm , (θ − σξ)⊗m i .
2m
2σ
σ m!
m≥1
Since κ1 = IERθ and λ1 = IERφ,
κ1 − λ1 = IERθ − IERφ = 0 ,
so the first term in the sum vanishes. Moreover, since ξ is a standard Gaussian,
IE[ξ ⊗m ] = 0 for all odd m.
Rearranging to collect powers of σ −1 yields
D(θ k φ) =
1
1
T2 + 4 T4 + o(σ −4 ) ,
σ2
σ
where
1
T2 = (kφk2 − kθk2 + IEhκ2 − λ2 , ξ ⊗2 i)
2
1
1
1
T4 = hκ2 − λ2 , θ⊗2 i + IEhκ3 − λ3 , θ ⊗ ξ ⊗2 i + IEhκ4 − λ4 , ξ ⊗4 i .
2
2
4!
Straightforward calculation yields
IEhκ2 − λ2 , ξ ⊗2 i = kθk2 − kφk2
hκ2 − λ2 , θ⊗2 i = IE[(θ> Rθ)2 − (φ> Rθ)2 ]
IEhκ3 − λ3 , θ ⊗ ξ ⊗2 i = 0
IEhκ4 − λ4 , ξ ⊗4 i = 6IE[(φ> Rφ)2 − 6(θ> Rθ)2 ] .
Combining the above two displays, we conclude
T2 = 0
1
1
T4 = IE[(θ> Rθ)2 − 2(φ> Rθ)2 + (φ> Rφ)] = kIE[(Rθ)⊗2 − (Rφ)⊗2 ]k2 ,
4
4
and the claim follows.
OPTIMAL RATES FOR MRA
21
Proof of Proposition 6. We first suppose ρ(θ, φ) ≤ ε0 .
For any φ ∈ IRd , we have IE[Rφ] = d−1/2 φ̂0 1, where 1 is the all-ones vector
of IRd and φ̂0 is known as the DC component of φ. Therefore ϕ = φ − IE[Rφ]
has Fourier transform ϕ
b = φ̂ − φ̂0 d−1/2 W 1 = φ̂ − φ̂0 e0 , where e0 is the vector of
d
IR indexed over {−bd/2c, . . . , bd/2c} with 1 on the 0 coordinate and 0 on other
coordinates. In other words, the Fourier transform of ϕ is the same as that of φ
except that its DC component ϕ
b0 is set to 0. Similarly, the Fourier transform of
ϑS is the same as that of θ except that its DC component ϑb0 is set to 0.
By Part (i) of Lemma 2,
(A.2)
D(φ) =
1
kIE[Rθ − Rφ]k2 + D(ϑ k ϕ) ,
2σ 2
Write ρ(θ, φ) = ε and suppose first that |θ̂0 − φ̂0 | ≥ 21 ε. Then (A.2) implies
D(φ) ≥
1
ε2
1
kIE[Rθ − Rφ]k2 = 2 (θ̂0 − φ̂0 )2 ≥
≥ Cσ −4s+2 ε2 .
2
2σ
2σ
8dσ 2
Next, if |θ̂0 − φ̂0 | < 21 ε, then
ρ(ϑS , ϕ)2 = ρ(θS , φ)2 − |θ̂0 − φ̂0 |2 ≥ 3ε2 /4 .
Thus, it suffices to show that
D(ϑ k ϕ) ≥ Cσ −4s+2 ρ(ϑ, ϕ)2 .
There are two cases: either ϑS and ϕ have essentially the same power spectrum
(i.e., |ϑ̂k | ≈ |ϕ̂k | for all k) or their power spectra are very different. We will treat
these two cases separately.
Recall that for each j ∈ S, by assumption c−1 ≤ |ϑ̂j | ≤ c. Consider the polar
form ϕ̂j /ϑ̂j = mj eiδj , where mj ≥ 0. Since D(ϕ) = D(Rϕ) for all cyclic shifts,
we may assume that kϑ − ϕk = ε, so that |1 − mj | ≤ Cε for all j.
Suppose first that |1 − mj | ≥ Cε for some j ∈ S. Lemma 2 (ii) yields
1
ε2
⊗2
⊗2 2
kIE[(Rϑ)
−
(Rϕ)
]k
+
C
4σ 4
σ6
2
1
ε
≥ 4 (|ϑ̂j |2 − |ϕj |2 )2 + C 6
4σ
σ
2
ε
c−2
≥ 4 |ϑ̂j |2 (1 − mj )2 + C 6
4σ
σ
2
c−4
ε
≥ 4 (1 − mj )2 − C 6 ≥ Cσ −4 ε2 .
4σ
σ
D(ϕ) =
Hence D(ϕ) ≥ Cσ −4s+2 ε2 .
Next, suppose on the contrary that |1−mj | = o(ε) for all j ∈ S. Since kϑ−ϕk =
ε, we can take the relative phase δj in the polar form to be such that δj ≤ Cε for
all j. By Theorem 3, it is enough to show that there exists an m ≤ 2s − 1 such
that
kIE[(Rϑ)⊗m − (Rϕ)⊗m ]k2 = Ω(ε2 ) .
22
BANDEIRA, RIGOLLET AND WEED
Denote by p the smallest integer in S and observe that
bd/2c
X
ε2 = ρ(ϑ, ϕ)2 = min
z:|z|=1
|1 − mj z j eiδj |2 |ϑ̂j |2 ≤ C
X
|1 − mj e−jδp /p eiδj |2 .
j∈S
j=−bd/2c
Therefore, there exists a coordinate ` ∈ S \ {p} such that
|1 − ei(pδ` −`δp )/p |2 = |1 − m` ei(pδ` −`δp )/p |2 + o(ε2 ) ≥ Cε2 .
(A.3)
Choose m = ` + p. Since `, p ∈ S ⊆ [s] and ` 6= p, the bound m ≤ 2s − 1 holds.
As in the proof of Proposition 7, we have that
kIE[(RϑS )
⊗m
⊗m
− (Rϕ)
m
Y
X
2
]k =
ϑ̂jn −
j1 +···+jm =0 n=1
X
=
2
ϕ̂jn
n=1
m
Y
1−
j1 +···+jm =0
m
Y
mjn e
i
Pm
n=1 δjn
2 m
Y
|ϑ̂jn |2 .
n=1
n=1
Each term in the above sum is positive. One valid solution to the equation j1 +
· · · + jm = 0 is j1 = · · · = j` = −p and j`+1 = · · · = jm = `. We obtain
⊗m
kIE[(RϑS )
⊗m
− (Rϕ)
2
]k ≥ C 1 −
= |1 − e
m
Y
2
i(pδ` −`δp )
mjn e
n=1
i(pδ` −`δp ) 2
| + o(ε2 ) .
Observe that for δ` and δp small enough, it holds
|1 − ei(pδ` −`δp ) |2 ≥ |1 − ei(pδ` −`δp )/p |2 ≥ Cε2
where the last inequality follows from (A.3). Combining the above two displays
proves (5.12).
Now suppose ρ(θ, φ) ≥ ε0 . To show that D(θ k φ) ≥ Cσ −4s+2 , it suffices to
show by the chain rule for divergence that
D(PθN k PφN ) ≥ c for some N ≤ Cσ 4s−2 ,
where c and C are positive constants. We will show the existence of a test which
correctly distinguishes PθN from PφN with probability at least 2/3; the claim will
then follow from the Neyman-Pearson lemma and Pinsker’s inequality.
We first show the existence of such a test when kφk2 ≥ 2. Let N = γσ 4 ≤
γσ 4s−2 for s ≥ 2, with γ > 0 to be chosen later. Let {Yi }N
i=1 be samples from
N
N
d×N
either Pθ or Pφ , and define a test ψ : R
→ {θ, φ} by
P
2
2
θ if N1 N
i=1 kYi k ≤ σ + 1.5
ψ(Y1 , . . . , YN ) =
φ otherwise.
An easy computation shows that
N
1 X
IEθ [
kYi k2 ] = σ 2 + kθk2 ≤ σ 2 + 1
N
varθ [
1
N
i=1
N
X
i=1
kYi k2 ] ≤
4σ 2
+
N
2σ 4
≤
C
γ
N
1 X
IEφ [
kYi k2 ] = σ 2 + kφk2
N
varφ [
1
N
i=1
N
X
i=1
kYi k2 ] ≤
C −2
(σ kφk2 + 1) .
γ
OPTIMAL RATES FOR MRA
23
Together with Chebyshev’s inequality, we get that that for kφk2 ≥ 2,
Pθ (ψ = φ) + Pφ (ψ = θ) ≤
C
≤ 1/3 ,
γ
For γ large enough, as desired.
Next, suppose that kφk2 ≤ 2. For positive integers j, k, denote by (j, k) their
greatest common divisor. Given a vector ζ ∈ Rd , denote by P the following set
of polynomials in the entries of ζ̂:
p0 (ζ) = ζ̂0 ,
pj (ζ) = kζ̂j k2
for 1 ≤ j ≤ bd/2c,
j/(j,k) k/(j,k)
ζ̂j
for
pjk (ζ) = ζ̂−k
1 ≤ j, k ≤ bsc.
If ρ(θ, φ) > 0, then by [KI93, Corollary 2], there exists at least one polynomial
p ∈ P such that
p(θ) 6= p(φ) .
It is easy to see that all the polynomials in P are invariant under the group
action; that is,
p(ζ) = p(Rζ)
for any R ∈ F and p ∈ P. This implies that, given a p ∈ P, the value p(ζ)
can be computed from the moment tensors IE[(Rζ + σξ)⊗k ] for 1 ≤ k ≤ 2s − 1.
Indeed, the entries of IE[(Rζ + σξ)⊗k ] for 1 ≤ k ≤ 2s − 1 generate the ring of
invariant polynomials in the entries of ζ̂ of degree at most 2s − 1, which includes
the set P. Given samples Y1 , . . . , Yn from Pζ , the tensor IE[(Rζ + σξ)⊗k ] can be
consistently estimated by computing the empirical moment tensors. We obtain
that there exists a constant M , depending on s but not on σ, such that for any
p ∈ P there exists an unbiased estimator p̃(ζ) for p(ζ) with variance at most
M σ 4s−2 /N for any ζ ∈ {θ, φ}.
For all θ ∈ Rd , define Bθ,ε0 = {φ : ρ(θ, φ) ≤ ε0 , kφk2 ≤ 2}. It is clear that Bθ,ε0
is compact so that
δ=
inf
inf
min
θ:kθk2 ≤1 φ∈Bθ,ε0 p∈P:p(φ)6=p(θ)
|p(φ) − p(θ)| > 0 .
Note that δ does not depend on θ or φ. Set N = γδ −2 M σ 4s−2 , where γ is to be
chosen later. Since ρ(θ, φ) ≥ ε0 by assumption, there exists a p ∈ P such that
|p(φ) − p(θ)| ≥ δ.
Let ψ : Rd×N → {θ, φ} be the test
ψ(Y1 , . . . , Yn ) = argmin |p̃(ζ) − p(ζ)| .
ζ∈{θ,φ}
By Chebyshev’s inequality, we have
Pθ (ψ = φ) + Pφ (ψ = θ) ≤
for γ sufficiently large.
C
≤ 1/3 ,
γ
24
BANDEIRA, RIGOLLET AND WEED
To conclude the proof, observe that by the chain rule, Pinsker’s inequality, and
the Neyman-Pearson lemma respectively, we get
D(θ k φ) =
1
C
D(PθN k PφN ) ≥
≥ Cσ −4s+2 .
N
N
The desired result (5.13) follows.
√
Finally, let ρ(θ, φ) ≥ c0 σ where c0 = 32 2d. By (A.1), since kθk ≤ 1, we have
1
>
1
IE[e σ2 (θ+σξ) Rθ | ξ]
D(φ) ≥ 2 (kφk2 − 1) + IEξ log
,
1
>
2σ
IE[e σ2 (θ+σξ) Rφ | ξ]
where ξ ∼ N (0, Id ). Next, using the Cauchy-Schwarz inequality and Jensen’s
inequality, we get
1
IEξ log
> Rθ
IE[e σ2 (θ+σξ)
IE[e
1
(θ+σξ)> Rφ
σ2
| ξ]
| ξ]
≥−
1 + kφk
1 + kφk p
IEkθ + σξk ≥ −
1 + dσ 2
2
σ
σ2
√
Hence, for kφk ≥ 16σ 2d, we get D(φ) ≥ kφk2 /(8σ 2 ). Moreover, by the triangle
inequality, kφk/2 ≤ ρ(φ, θ) ≤ 2kφk for all such φ. We obtainthat for all φ ∈ IRd
such that ρ(φ, θ) ≥ c0 σ, it holds D(φ) ≥ kφ − θk2 /(32σ 2 ), which implies the
desired result (5.14).
APPENDIX B: SUPPLEMENTARY MATERIALS
Lemma B.1.
For any δ ∈ (0, 1), γ ∈ [−δ, δ], it holds
1 − 2(1 + γ)m + (1 + 2γ + δ 2 )m ≤ m2 2m−1 δ 2
Proof. Fix δ ∈ (0, 1) and consider the function γ 7→ f (γ, δ) = 1 − 2(1 + γ)m +
(1+2γ +δ 2 )m . Computing the derivative of f , it is easy to see that f is decreasing
on (−δ, −δ 2 ) and increasing on (−δ 2 , δ) so that it achieves its maximum either
at −δ or at δ.
Consider the function δ 7→ g(δ) = f (δ, δ) = 1 − 2(1 + δ)m + (1 + δ)2m and
observe that g(−δ) = f (−δ, δ). Since g(0) = g 0 (0) = 0, and
g 00 (δ) = 2m(1 + δ)m−2 [(2m − 1)(1 + δ)m − (m − 1)] ≤ m2 2m
∀ δ ∈ [−1, 1] ,
it follows from a second order Taylor expansion that
g(δ) ≤ m2 2m−1 δ 2
Lemma B.2. Let ξ ∼ N (0, Id ) be a standard d-dimensional Gaussian. Then
m
for any symmetric order-m tensor and A ∈ IRd there exists constant c = c(A),
independent of m and d, such that
p
√
cm m!kAk ≤ IE|hA, ξ ⊗m i| ≤ (d + m)m kAk .
OPTIMAL RATES FOR MRA
25
Proof. Assume without loss of generality that kAk = 1. The upper bound
follows readily from the Cauchy-Schwarz inequality and the fact that kξk2 ∼ χ2d ,
IEξ |hA, ξ ⊗m i| ≤ IEξ kξ ⊗m k = IEξ kξkm ≤ (d + m)m/2 .
To prove the lower bound, we first show that
IEξ [hA, ξ ⊗m i2 ] ≥ m! .
(B.1)
We do so by expressing the left side in terms of multivariate Hermite polynomials.
Recall that the Hermite polynomials {hk (x)}k≥0 can be normalized to satisfy
the following two properties:
√
1. The function hk (x) is a polynomial with leading term xk / k!,
2. The functions {hk }k≥0 form an orthonormal basis of of L2 (µ), where µ
denotes the standard Gaussian measure on IR.
Given a multi-index α ∈ INd , define the multivariate Hermite polynomial hα
by
hα (x1 , . . . , xd ) =
d
Y
hαi (xi ) .
i=1
The multivariate Hermite polynomials form an orthonormal basis for the space
IR[x1 , . . . , xd ] of d-variate polynomial functions with respect to the inner product
over L2 (µ⊗d ).
Multivariate Hermite polynomials satisfy the following useful property: Given
two multi-indices α, β ∈ INd such that |α| = |β|, we now show that
√
(B.2)
hxβ , hα i = α!δαβ ,
where δ denotes the Kronecker symbol. Indeed, on the one hand if α 6= β, then
since |α| = |β| there exists an index i such that αi > βi . By the definition of
the univariate Hermite polynomials, xβi ∈ span(h1 (x), . . . , hβi (x)), hence orthogonality of the polynomials hαi and hj for 1 ≤ j ≤ βi implies
hxβ , hα i =
d
Y
hxβi , hαi i = 0 .
i=1
On the other hand, if α = β, then
hxα , hα i =
d
d p
Y
Y
√
hxαi , hαi i =
αi ! = α! .
i=1
i=1
The order-m tensor A can be identified with a multilinear—thus polynomial—
map from IRd to IR:
X
X
m!
A(x1 , . . . , xd ) =
Ai1 ...im xi1 . . . xim =
Aα x α ,
α!
d
i1 ,...,im
α∈IN :|α|=m
where in the second equality, we used the fact that A is symmetric. Together
with (B.2), it yields that for any |α| = m,
m!
hA, hα i = √ Aα .
α!
26
BANDEIRA, RIGOLLET AND WEED
Moreover, since kAk = 1, we also have
X
α∈INd :|α|=m
m! 2
A = 1,
α! α
so that
X
hA, hα i2 = m! .
α∈INd :|α|=m
Therefore, using Plancherel’s formula, we get that for any m ≥ 0,
X
X
hA, hα i2 = m! ,
hA, hα i2 ≥
IEξ [hA, ξ ⊗m i2 ] = hA, Ai =
α∈INd :|α|=m
α∈INd
as claimed.
To prove the claimed lower bound on IEξ |hA, ξ ⊗m i|, we employ the following
Khinchine-type inequality:
Theorem B.3 ([Bob00, Theorem 2]). Let f = f (x1 , . . . , xm ) be a degree m
polynomial and let X ∼ N (0, Im ) be a standard Gaussian vector in IRm . Then
there exists a universal constant c such that
p
IE[f (X)2 ] ≤ cm IE[|f (X1 , . . . , Xm )|] .
Applying Theorem B.3 to (B.1) yields the claim.
Lemma B.4. Let H(ζ) and Hn (ζ) be the Hessians of D(φ) and Dn (φ), respectively, evaluated at φ = ζ. If Bε := {φ ∈ IRd : ρ(φ, θ) ≤ ε}, then
IE sup kH(φ) − Hn (φ)k2op ≤ C
φ∈Bε
log n
.
nσ 4
Proof. The matrix Hn (φ) can be written as a sum of independent random
matrices:
n
pθ
1X
Hn (φ) =
Hi (φ) ,
Hi (φ) = ∇2φ log (Yi ) .
n
pφ
i=1
Using symmetrization, we get
(B.3)
IE sup kH(φ) − Hn (φ)k2op ≤
φ∈Bε
n
X
4
IE
sup
εi Hi (φ)
n2 φ∈Bε
2
,
op
i=1
where ε1 , . . . , εn are i.i.d Rademacher random variables that are independent of
the observations Y1 , . . . , Y1 and IEHn (φ) = H(φ).
Using a third order derivative calculation, we find that φ 7→ Hi (φ) satisfies
the following Lipschitz property. For any u, φ, η ∈ IRd , such that kuk = 1 and
φ, η ∈ Bε , we have
|u> Hi (φ)u − u> Hi (η)u| ≤ C
where ξi is the noise in (2.1).
1 + |ξi |3
kφ − ηk
σ3
27
OPTIMAL RATES FOR MRA
Fix γ ∈ (0, ε) and le Z be a γ-net of Bε . In other words, we require that
max min kη − φk ≤ γ .
φ∈Bε η∈Z
We can always choose Z to have cardinality |Z| ≤ (Cε/γ)d for some universal
constant C > 0. Then, by Young’s inequality, we get
(B.4)
sup
φ∈Bε
n
X
2
op
εi Hi (φ)
≤C
i=1
n
n
X
γ 2 X 3 2
|ξ
|
+
C
max
εi Hi (φ)
i
φ∈Z
σ6
i=1
2
op
i=1
The expectation of the first term is controlled using the fact that
(B.5)
IE
n
X
|ξi |3
2
i=1
=
n
X
IE[|ξi ξj |3 ] ≤ Cn2 .
i,j=1
For second term, we employ a standard matrix concentration bound [Tro15, Theorem 4.6.1] to get that
n
n
X
t2 X
k
Hi (φ)2 kop .
IE exp tk
εi Hi (φ)k2op Y1 , . . . , Yn ≤ d exp
2
i=1
i=1
Using standard arguments (see, e.g., [BLM13]), this implies
n
X
IE max
εi Hi (φ)
φ∈Z
2
op
≤ C(log |Z|)IE max
φ∈Z
i=1
n
X
Hi (φ)2
op
i=1
≤ C(log |Z|)nIE max kH1 (φ)2 kop
φ∈Z
As before, computing a second order derivative, we can show that
kH1 (φ)2
op
2
op
≤ kH1 (φ)
≤ C(1 + |ξ|4 )/σ 4 .
The above two displays yield
n
X
IE max
εi Hi (φ)
φ∈Z
2
op
≤C
i=1
log(ε/γ)
n
σ4
Combining the last display with (B.3), (B.4), and (B.5), we get
(B.6)
IE sup kH(φ) − Hn (φ)k2op ≤ C
φ∈Bε
γ2
σ6
+
log(ε/γ)
log n
≤C
,
4
nσ
nσ 4
for γ = n−1/2 .
Lemma B.5.
satisfies
Assume the conditions of Theorem 4 hold. Then the MLE θ̃n
IE[ρ(θ̃, θ)2 ] ≤ C
σ (8k−4)∧(2`+2)
.
n
28
BANDEIRA, RIGOLLET AND WEED
Proof. As in the proof of Theorem 4, since θ is fixed, we simply write D(φ) =
D(θ k φ) and define
n
fθ
1X
log (Yi ) ,
Dn (φ) =
n
fφ
i=1
where Yi are i.i.d from model (2.1) and we recall that fζ is the density of Pζ , ζ ∈
IRd .
We first establish using Lemma B.7 that the process {Gn (φ)}φ∈IRd defined by
Gn (φ) = D(φ) − Dn (φ) is a subgaussian process with respect to the Euclidean
distance with variance proxy cσ 2 /n for some constant c > 0, i.e., that for any
λ ∈ IR, we have
IE[exp(λ(Gn (φ) − Gn (ζ)))] ≤ exp c
λ2 σ 2
kφ − ζk2 .
n
We then apply the following standard tail bound.
Proposition B.6 ([Ver17, Theorem 8.5.4]). If {Xφ }φ is a (standard) subgaussian process on IRd with respect to the Euclidean metric and Bδ (θ) is a ball
of radius δ around θ, then
2 /δ 2
IP[ sup (Xφ − Xθ ) ≥ Cδ + x] ≤ Ce−Cx
.
φ∈Bδ (θ)
√
The rescaled process σ nGn is standard subgaussian process with respect to
the Euclidean metric, so applying Proposition B.6 and noting that Dn (θ) = 0
yields
"
#
δ
nσ 2 x2
(B.7)
IP sup Gn (φ) ≥ C √ + x ≤ C exp − C
.
δ2
σ n
φ∈Bδ (θ)
√
For convenience, write vn = n(θ̃ − θ), where θ̃ is a MLE satisfying kθ̃ − θk =
ρ(θ̃, θ). We wish to show that IE[kvn k2 ] is bounded by a constant that depends
on σ but not on n.
Define E to be the compact subset of IRd defined by
E = φ ∈ IRd : ε0 ≤ ρ(θ, φ) ≤ c0 σ ,
where c0 and ε0 are defined in Theorem 4. In particular, for any φ ∈
/ E, it holds
−2k
2
D(φ) ≥ Cσ ρ(θ, φ) .
We employ the so-called slicing (a.k.a peeling) method. Define the sequence
{αj }j≥0 where α0 = 0 and αj = Cσ j(2k−1) for j ≥ 1 for some large enough
√
constant C > 0. For any j ≥ 0, define Sj = {φ ∈ IRd : αj ≤ nρ(φ, θ) ≤
αj+1 } \ E and observe that
X
IE[kvn k2 ] = IE[kvn k2 | θ̃ ∈ E]IP[θ̃ ∈ E] +
IE[kvn k2 | θ̃ ∈ Sj ]IP[θ̃ ∈ Sj ]
j≥0
(B.8)
≤
c20 σ 2 IP[θ̃
∈ E] + Cσ
8k−4
+
X
2
αj+1
IP[θ̃ ∈ Sj ] .
j≥2
We now show that if θ̃ ∈ Sj , j ≥ 2, then Gn (θ̃) = D(θ̃) − Dn (θ̃) is large.
To that end, observe that on the one hand, by definition of the MLE, we have
OPTIMAL RATES FOR MRA
29
Dn (θ̃) ≤ Dn (θ) = 0. On the other hand, D(θ̃) ≥ Cσ −2k ρ(θ̃, θ)2 . Hence, if θ̃ ∈ Sj ,
then Gn (θ̃) ≥ Cσ −2k ρ(θ̃, θ)2 ≥ Cσ −2k αj2 /n. It yields
αj2
αj2
≤ IP
sup
Gn (φ) ≥ Cσ −2k
.
IP[θ̃ ∈ Sj ] ≤ IP sup Gn (φ) ≥ Cσ −2k
n
n
φ∈Sj
φ∈B αj+1 (θ)
√
n
Recall αj = Cσ j(2k−1) so that σ −2k αj2 ≥ Cαj+1 /σ, j ≥ 2 and apply (B.7) with
√
δ = αj+1 / n and x = Cσ −2k αj2 /n to get
IP
Gn (φ) ≥ Cσ
sup
−2k
φ∈B αj+1 (θ)
√
αj2
αj4
≤ C exp − C 2
n
αj+1 σ 4k−2
n
≤ C exp − Cσ 2j(2k−1) .
It yields
(B.9)
X
2
αj+1
IP[θ̃ ∈ Sj ] ≤ C
j≥2
X
σ 4j(2k−1) exp − Cσ 2j(2k−1) ≤ C .
j≥2
When θ̃ ∈ E, we use (5.2) to conclude that if n ≥ σ 2` then
IP[θ̃ ∈ E] ≤ IP sup Gn (φ) ≥ Cσ −` ≤ C exp − Cnσ −2` ,
φ∈E
where in the last inequality, we used (B.7). Together with (B.8) and (B.9), it
implies the desired result.
Lemma B.7. The process {Gn (φ)}φ∈IRd defined by Gn (φ) = D(φ) − Dn (φ) is
a subgaussian process with respect to the `2 distance on IRd with variance proxy
c/(nσ 2 ) for some constant c > 0, i.e., that for any λ ∈ IR, we have
IE[exp(λ(Gn (φ) − Gn (ζ)))] ≤ exp λ2
c
kφ − ζk2 .
2
nσ
Proof. By definition of Gn and the densities fζ and fφ , we have
Gn (φ)−Gn (ζ) = D(φ) − D(ζ) − Dn (φ) + Dn (ζ)
n
1X
= IE[log fζ (Y ) − log fφ (Y )] −
[log fζ (Yi ) − log fφ (Yi )]
n
h
= IE log
h
= IE log
i=1
kY −Rζk2 i
−Rζk2
n
IER exp(− 2σ2 )
IER exp(− kYi 2σ
)
1X
2
−
log
2
kY −Rφk2
kY
−Rφk
i
n
IER exp(− 2σ2 )
IER exp(− 2σ2 )
i=1
n
IER exp(Y > Rζ/σ 2 ) i 1 X
IER exp(Yi> Rζ/σ 2 )
log
−
n
IER exp(Y > Rφ/σ 2 )
IER exp(Yi> Rφ/σ 2 )
i=1
n
= IE[∆(Y )] −
1X
∆(Yi ) ,
n
i=1
where
∆(Y ) = log
IER exp(Y > Rζ/σ 2 )
.
IER exp(Y > Rφ/σ 2 )
30
BANDEIRA, RIGOLLET AND WEED
Next, using a standard symmetrization argument, we get
(B.10)
IE[exp(λ(Gn (φ) − Gn (ζ)))] ≤
n
Y
IE[exp(
i=1
2λ
εi ∆(Yi ))] ,
n
where ε1 , . . . , εn are i.i.d Rademacher random variables that are independent of
the sample Y1 , . . . , Yn . Next, observe that using the Cauchy-Schwarz inequality,
we get that the function ζ 7→ log IER exp(Yi> Rζ/σ 2 ) is kYi k/σ 2 -Lipschitz with
respect to the Euclidean distance. Hence |∆(Yi )| ≤ kYi kkφ − ζk/σ 2 . Moreover,
it follows from (2.1) that conditionally on R`i , the random variable kYi k2 /σ 2 ∼
χ2d (1/σ 2 ) follows a noncentral χ2 distribution with d degrees of freedom and
noncentrality parameter kθk2 /σ 2 = 1/σ 2 ≤ 1. In particular kYi k2 /σ 2 has a finite
moment generating function in the neighborhood of the origin, and we obtain for
some constant c small enough that
σ 2 (εi ∆(Yi ))2
kYi k2
IE exp c
≤
IE
exp
c
≤ e.
kφ − ζk2
σ2
It implies (see, e.g., [Ver17] proposition 2.5.2) that
c
2λ
IE exp( εi ∆(Yi )) ≤ exp(λ2 2 2 kφ − ζk2 )
n
n σ
for all λ ∈ IR. Together with (B.10), this yields the desired result.
Lemma B.8. Fix θ ∈ IRd . Assume that n/(log n) ≥ Cσ 4 . For any j =
−bd/2c, . . . , bd/2c, define,
n
1X d 2
|(Yi )j | − σ 2 .
Mj =
n
i=1
Define the set S̃ by
r
n
log n o
S̃ = j ∈ {−bd/2c, . . . , bd/2c} : Mj ≥ Cσ 2
n
Then
IP[S̃ 6= psupp(θ̂)] ≤ C
σ4
.
n
Proof. It is straightforward to check that IE[Mj ] = |θ̂k |2 . To calculate the
variance, we note that
2
2
2
2 d 2
d
\ d
|(Y
i )k | − |θ̂k | − σ = 2σ<((Ri θ)k (ξi )k ) + σ (|(ξi )k | − 1) .
2
2
4
4
d
Hence var[|(Y
i )k | − σ ] ≤ Cσ , and var[Mj ] ≤ Cσ /n.
2
2
2
d
Moreover, the random variable |(Y
i )k | − σ is a σ -subexponential random
variable. Indeed,
2
2
2
2 d 2
2 d 2
2
d
d
|(Y
i )k | − |θ̂k | − σ ≤ 2σ|(ξi )k | + σ (|(ξi )k | − 1) ≤ 2σ (|(ξi )k | − 1) + σ + 1 .
31
OPTIMAL RATES FOR MRA
d
d
The variable (ξ
i )0 is a standard Gaussian, and for k 6= 0 the variable (ξi )k is a
2
2
d
standard complex Gaussian, hence |(ξ
i )k | is a rescaled χ random variable with
2
d
at most 2 degrees of freedom. Hence |(ξ
i )k | is sub-exponential with constant
2
2
2
d
variance proxy, so that |(Y
i )k | − σ is σ -subexponential.
If j ∈ psupp(θ̂), then by Chebyshev’s inequality
r
σ4
log n
σ4
2
q
≤C
.
≤
C
IP[j ∈
/ S̃] = IP Mj ≤ Cσ
2
n
n
n |θ̂ |2 − Cσ 2 log n
j
n
On the other hand, if j ∈
/ psupp(θ̂), then IE[Mj ] = 0 and by Bernstein’s
inequality
r
log n
C
2
IP[j ∈ S̃] = IP[Mj ≥ Cσ
]≤ .
n
n
The proof follows using a union bound.
REFERENCES
[ABBS14]
[ADBS16]
[APS17]
[BBS16]
[BBV16]
[BCS15]
[BCSZ14]
[BLM13]
[Bob00]
E. Abbe, A. S. Bandeira, A. Bracher, and A. Singer. Decoding
binary node labels from censored edge measurements: Phase transition and efficient recovery. Network Science and Engineering,
IEEE Transactions on, 1(1):10–22, Jan 2014.
Cecilia Aguerrebere, Mauricio Delbracio, Alberto Bartesaghi, and
Guillermo Sapiro. Fundamental limits in multi-image alignment.
Available online at arXiv:1602.01541 [cs.CV], 2016.
Emmanuel Abbe, Joao Pereira, and Amit Singer. Sample complexity of the boolean multireference alignment problem. Available
online at arXiv:1701.07540 [cs.IT], 2017.
Afonso S. Bandeira, Nicolas Boumal, and Amit Singer. Tightness
of the maximum likelihood semidefinite relaxation for angular synchronization. Mathematical Programming, pages 1–23, 2016.
A. S. Bandeira, N. Boumal, and V. Voroninski. On the low-rank
approach for semidefinite programs arising in synchronization and
community detection. COLT, 2016.
A. S. Bandeira, Y. Chen, and A. Singer. Non-unique games over
compact groups and orientation estimation in cryo-em. Available
online at arXiv:1505.03840 [cs.CV], 2015.
Afonso S. Bandeira, Moses Charikar, Amit Singer, and Andy
Zhu. Multireference alignment using semidefinite programming.
In ITCS’14—Proceedings of the 2014 Conference on Innovations
in Theoretical Computer Science, pages 459–470. ACM, New York,
2014.
S. Boucheron, G. Lugosi, and P. Massart. Concentration inequalities. Oxford University Press, Oxford, 2013. A nonasymptotic
theory of independence, with a foreword by Michel Ledoux.
S. G. Bobkov. Remarks on the growth of Lp -norms of polynomials.
In Geometric aspects of functional analysis, volume 1745 of Lecture
Notes in Math., pages 27–35. Springer, Berlin, 2000.
32
[Bou16]
[Bro92]
[BSS11]
[CC16]
[CL11]
[Dia92]
[Edi15]
[FZB02]
[GBM16]
[HK15]
[HUL01]
[JMRT16]
[KI93]
[LeC73]
[LNS99]
[MP00]
[MV10]
[Nog15]
BANDEIRA, RIGOLLET AND WEED
Nicolas Boumal. Nonconvex phase synchronization. SIAM Journal
of Optimization, to appear, 2016.
Lisa Gottesfeld Brown. A survey of image registration techniques.
ACM computing surveys (CSUR), 24(4):325–376, 1992.
A. S. Bandeira, A. Singer, and D. Spielman. The so(3) cheeger
inequality. Unpublished Draft, 2011.
Yuxin Chen and Emmanuel Candes. The projected power method:
An efficient algorithm for joint alignment from pairwise differences.
Available online at arXiv:1609.05820 [cs.IT], 2016.
T. Tony Cai and Mark G. Low. Testing composite hypotheses,
hermite polynomials and optimal estimation of a nonsmooth functional. Ann. Statist., 39(2):1012–1041, 04 2011.
R. Diamond. On the multiple simultaneous superposition of molecular structures by rigid body transformations. Protein Science,
1(10):1279–1287, October 1992.
Editorial. Method of the year 2015. Nature Methods, 13:1, 2015.
H. Foroosh, J. B. Zerubia, and M. Berthod. Extension of phase
correlation to subpixel registration. IEEE Transactions on Image
Processing, 11(3):188–200, 2002.
Tingran Gao, Jacek Brodzki, and Sayan Mukherjee. The geometry
of synchronization problems and learning group actions. Available
online at arXiv:1610.09051 [math.ST], 2016.
Philippe Heinrich and Jonas Kahn. Optimal rates for finite mixture
estimation. arXiv:1507.04313, 2015.
Jean-Baptiste Hiriart-Urruty and Claude Lemaréchal. Fundamentals of convex analysis. Grundlehren Text Editions. SpringerVerlag, Berlin, 2001. Abridged version of ıt Convex analysis and
minimization algorithms. I [Springer, Berlin, 1993; MR1261420
(95m:90001)] and ıt II [ibid.; MR1295240 (95m:90002)].
A. Javanmard, A. Montanari, and F. Ricci-Tersenghi. Phase transitions in semidefinite relaxations. Proceedings of the National
Academy of Sciences of the United States of America (PNAS),
2016.
R. Kakarala and G. J. Iverson. Uniqueness of results for multiple
correlations of periodic functions. Oct. Soc. Am. A, 10:1517–1528,
1993.
L. LeCam. Convergence of estimates under dimensionality restrictions. Ann. Statist., 1:38–53, 1973.
O. Lepski, A. Nemirovski, and V. Spokoiny. On estimation of the
l r norm of a regression function. Probability Theory and Related
Fields, 113(2):221–253, 1999.
Geoffrey McLachlan and David Peel. Finite mixture models. Wiley Series in Probability and Statistics: Applied Probability and
Statistics. Wiley-Interscience, New York, 2000.
Ankur Moitra and Gregory Valiant. Settling the polynomial learnability of mixtures of gaussians. Arxiv:1004.4223v1, 2010.
Eva Nogales. The development of cryo-em into a mainstream structural biology technique. Nature Methods, 13:24–27, 2015.
OPTIMAL RATES FOR MRA
[Pea94]
33
Karl Pearson. Contributions to the mathematical theory of evolution. Philosophical Transactions of the Royal Society of London
A: Mathematical, Physical and Engineering Sciences, 185:71–110,
1894.
[PWB+ 17] A. Perry, J. Weed, A. S. Bandeira, P. Rigollet, and A. Singer. The
sample complexity of multi-reference alignment. Manuscript, 2017.
[PWBM16] A. Perry, A. S. Wein, A. S. Bandeira, and A. Moitra. Messagepassing algorithms for synchronization problems over compact
groups. arXiv:1610.04583, 2016.
[Sad89]
B. M. Sadler. Shift and rotation invariant object reconstruction
using the bispectrum. In Workshop on Higher-Order Spectral Analysis, pages 106–111, Jun 1989.
[Sin11]
A. Singer. Angular synchronization by eigenvectors and semidefinite programming. Appl. Comput. Harmon. Anal., 30(1):20–36,
2011.
[SSK13]
B. Sonday, A. Singer, and I. G. Kevrekidis. Noisy dynamic simulations in the presence of symmetry: Data alignment and model reduction. Computers & Mathematics with Applications, 65(10):1535
– 1557, 2013.
+
[SVN 05]
Sjors H.W. Scheres, Mikel Valle, Rafael Nuñez, Carlos O.S.
Sorzano, Roberto Marabini, Gabor T. Herman, and Jose-Maria
Carazo. Maximum-likelihood multi-reference refinement for electron microscopy images. Journal of Molecular Biology, 348(1):139
– 149, 2005.
[Tro15]
Joel A. Tropp. An introduction to matrix concentration inequalities. Foundations and Trends R in Machine Learning, 8(1-2):1–230,
2015.
[TS12]
D. L. Theobald and P. A. Steindel. Optimal simultaneous superpositioning of multiple structures with missing data. Bioinformatics,
28(15):1972–1979, 2012.
[Tsy09]
Alexandre B. Tsybakov. Introduction to nonparametric estimation.
Springer Series in Statistics. Springer, New York, 2009. Revised and
extended from the 2004 French original, Translated by Vladimir
Zaiats.
[Ver17]
Roman Vershynin. High-Dimensional Probability. Cambridge University Press (to appear), 2017.
[Wal49]
Abraham Wald. Note on the consistency of the maximum likelihood
estimate. Ann. Math. Statistics, 20:595–601, 1949.
[WW84]
E. Weinstein and A. J. Weiss. Fundamental limitations in passive timedelay estimationpart ii: Wide-band systems. IEEE Trans.
Acoust., Speech, Signal Process., 32(5):1064–1078, 1984.
[WY16]
Y. Wu and P. Yang. Minimax rates of entropy estimation on large
alphabets via best polynomial approximation. IEEE Transactions
on Information Theory, 62(6):3702–3720, June 2016.
[ZvdHGG03] J. P. Zwart, R. van der Heiden, S. Gelsema, and F. Groen. Fast
translation invariant classification of hrr range profiles in a zero
phase representation. Radar, Sonar and Navigation, IEE Proceedings, 150(6):411–418, 2003.
34
BANDEIRA, RIGOLLET AND WEED
Afonso S. Bandeira
Department of Mathematics
Courant Institute of Mathematical Sciences
Center for Data Science
New York Univeristy,
New York, NY 10012, USA
([email protected])
Philippe Rigollet
Department of Mathematics
Massachusetts Institute of Technology
77 Massachusetts Avenue,
Cambridge, MA 02139-4307, USA
([email protected])
Jonathan Weed
Department of Mathematics
Massachusetts Institute of Technology
77 Massachusetts Avenue,
Cambridge, MA 02139-4307, USA
([email protected])
| 10math.ST
|
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
1
Online Tool Condition Monitoring Based on
Parsimonious Ensemble+
Mahardhika Pratama, Member, IEEE, Eric Dimla, Member, IEEE, Edwin Lughofer, Witold Pedrycz,
Fellow, IEEE, Tegoeh Tjahjowidodo
Abstract— Tool condition monitoring plays a vital role to reduce
maintenance cost in manufacturing industry. It generates
information about possible unsafe states of machining process
before they occur such that faults of component can be predicted
early to support management of its life-cycle. The faults could be
isolated to minimize catastrophic effects leading to a complete
shutdown of overall production process. Accurate diagnosis of tool
wear in metal turning process remains an open challenge for both
scientists and industrial practitioners because of inhomogeneities
in work-piece material, non-stationary machining settings to suit
production requirements, and non-linear relations between
measured variables and tool wear. Common methodologies for
tool condition monitoring still rely on batch approaches which
cannot cope with a fast sampling rate of metal cutting process.
Furthermore they require a retraining process to be completed
from scratch when dealing with a new set of machining
parameters. This paper presents an online tool condition
monitoring approach based on Parsimonious Ensemble+
(pENsemble+). The unique feature of pENsemble+ lies in its highly
flexible principle where both ensemble structure and baseclassifier structure can automatically grow and shrink on the fly
based on the characteristics of data streams. Moreover, the online
feature selection scenario is integrated to actively sample relevant
input attributes. The paper presents advancement of a newly
developed ensemble learning algorithm, pENsemble, where online
active learning scenario is incorporated to reduce operator’s
labelling effort. The ensemble merging scenario is proposed which
allows reduction of ensemble complexity while retaining its
diversity.
Experimental
studies
utilising
real-world
manufacturing data streams and comparisons with well-known
algorithms were carried out. Furthermore, the efficacy of
pENsemble+ was examined using benchmark concept drift data
streams. It has been found that pENsemble+ incurs low structural
complexity and results in a significant reduction of operator’s
labelling effort.
Index Terms— Prognostic Health Management, Online
Learning, Ensemble Classifier, Lifelong Learning, Nonstationary
Environments, Concept Drifts
I. INTRODUCTION
T
OOL condition monitoring (TCM) aims to feed real-time
information of tool condition for the so-called maintenance
The first author acknowledges the support of NTU start-up grant. The third
author acknowledges the support of the Austrian COMET-K2 programme of
the Linz Center of Mechatronics (LCM), funded by the Austrian federal
government and the federal state of Upper Austria. The fourth author
acknowledges the support of the Natural Sciences and Engineering Research
Council of Canada (NSERC) and Canada Research Chair (CRC) in
Computational Intelligence. Mahardhika Pratama is with School of Computer
Science and Engineering, Nanyang Technological University (e-mail:
[email protected]). Eric Dimla is with the Mechanical Engineering
on-demand framework where tool is replaced at the right time
only [1]. This paradigm brings significant cost saving to the
industry because replacing sharp tools too early and too often
incurs frequent shutdown of the machining process and leads to
a dramatic increase of tool costs whereas worn tool potentially
damages the surface finishing and dimensional integrity of
work piece [2] and intensifies vibration level of the cutting
process. When the tool is no longer at desired functionality or
blunt, it entails high cutting force resulting in expensive energy
cost [3]. In a nutshell, the success of TCM allows advanced
scheduling of maintenance activities, proactive allocation of
replacement parts and enhanced fleet deployment decisions
based on the estimated progression of component life
consumption.
The TCM usually involves two tasks, namely sensing and
monitoring [5]. Sensing is a phase used to capture cutting
signals from a set of sensors in the TCM. Sensing itself can be
further classified into two types of modes, namely direct and
indirect. Indirect sensing is committed after completing the
cutting process through optical measurement, surface-finishing
measurement, and chip-size measurement, etc. The indirect
sensing is, nevertheless, not compatible with the online tool
condition monitoring which must take place while engaging the
cutting process without intermittent stoppage only because it
imposes unavoidable time loss for the sake of measurement and
does not prevent production waste [6]. The direct sensing, on
the other hand, relies on correlated process variables such as:
vibration, spindle current, acoustic emission, and force to
determine tool wear. All of which can be collected directly
through sensor and data acquisition unit installation at the
correct position [5]. Among the other three, the force signal is
well-known to be the most-correlated variable to the tool wear
because a higher cutting force is required when the tool is blunt.
The second phase, namely monitoring, aims to perform
predictive analytics from the measured signals. Existing
monitoring approaches are categorized into three groups [4],
namely first principle, data-driven and hybrid. The first
Department, Faculty of Engineering, Boulder, University Teknologi Brunei,
Brunei Darussalam (e-mail: [email protected]). Edwin Lughofer is with the
Department of Knowledge-Based and Mathematical Systems, Johanes Kepler
University (email: [email protected]). Witold Pedrycz is with the
Department of Electrical and Computer Engineering, University of Alberta,
Canada (email: [email protected]). Tegoeh Tjahjowidodo is with School
of Mechanical and Aerospace Engineering, Nanyang Technological University,
Singapore (email: [email protected]).
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
principle approach usually derives the exact mathematical
model of a degrading system including its component. This
approach is, however, problem-specific and sometimes it is too
hard to be applied due to intricate and inter-related nature of a
manufacturing system. This approach is impractical because of
the fact that machining process is highly influenced by a
number of dynamic factors: temperature, cutting fluids, chip
formation, workpiece and tool materials, etc. [1]. Data-driven
approach offers an alternative of the former one where
predictive analytics is purely done using input/output data
recorded by a number of sensors and a set of data acquisition
unit. This approach makes use of intelligent techniques which
emulate dynamics of tool condition through a “learning”
process of manufacturing data. Tool wear progression is
measured by considering the plane-faced tool geometry
approach with flank wear as the underlying variable of the tool
life. The intelligent approaches feature generalization capability
where it can be deployed to monitor tool condition in the realtime mode while engaging the cutting process once a model has
been created from the learning process. The hybrid approach
combines both the first-principle and data-driven approaches
where the two are executed in parallel to take advantages of the
strength of both approaches. The downside of this approach is
obvious because of its expensive computational cost [6].
Recent progress in the TCM research has reported that the
data-driven approach has gained increasing popularity in the
community [12]-[15] because it can be deployed with a verylittle capital expenditure [12]. It is done using exclusively
sensory data and does not require complicated pre-setting
requirements or assumption and/or simplification which is
inherent in the first principle approach. The data-driven TCM
method still requires more advanced data analytics because of
at least three reasons: 1) existing approaches rely on a batch
learning approach which is not fully compatible for online realtime processing. It requires a complete dataset covering all
possible situations in the monitoring process and a complete
retraining from scratch when observing a new pattern in the
monitoring process; 2) existing approaches are constructed
under a static structure predetermined before process runs. Such
approaches are not self-adaptive, thereby being unable to adapt
to variations of machining parameters. It is also evident that the
machining process is often affected by external disturbances
which lead to previously learned concept to be invalid; 3)
existing approaches are mostly designed under crisp and certain
hidden nodes which do not cope with imprecision, uncertainty
and a noisy nature of machining processes.
As more and more industries have integrated the so-called
Internet-of-Things (IoT) in the current trend of automation and
data exchange in the so called Industry 4.0 (4 th industrial
revolution), this calls for advancements of existing predictive
maintenance to cope with online and dynamic characteristics of
machining process [12]. The concept of Evolving Intelligent
Systems (EIS) [42], [43] provides promising approach for
online predictive maintenance because it features two important
properties: online learning, dynamic and evolving structure.
This trait is appealing because it is suitable for real-time
deployment under modest computational resources. The
2
dynamic and evolving structure of EIS is capable of tracking
any variation of data streams, which prevents loss of
generalization capabilities in the presence of shift or drift in data
streams. The EIS research area has grown rapidly as manifested
by extensions and variations of EISs encountered in the
literature [44]-[50]. Vast majority of existing EISs are
constructed under a single base-model where the evolving
nature is generated from automatic partitioning of input and
output space with fuzzy rule, neuron, etc [44]-[50]. It is
understood that the ensemble paradigm is capable of improving
model’s generalization because the classification decision is
drawn from a collection of local experts. The ensemble method
handles the bias-variance dilemma better than its single model
counterpart provided that local experts exhibit good diversity.
This advantage is normally achieved when incorporating weak
local experts. Despite being already mature as reported in the
literature [51]-[53], most works in the ensemble learning
scenario utilize non-evolving or even batched base classifier.
This results in costly computational overhead and memory
burdens. The use of evolving base-classifier helps the ensemble
classifier to be more robust to deal with the local concept drift
because it offers better exploration in the local region than those
static classifiers. The local concept drift refers to a situation
where drift only occurs in some local regions only with
different intensities and speeds. Few works in the literature
[47]-[50] have incorporated evolving base classifiers under
different ensemble configurations: bagging, boosting and
stacking. These works are, however, crafted under a static
ensemble structure which cannot adapt to the concept drift.
Moreover, they suffer from the absence of drift detection
scenario which identifies the presence of concept drift. It is
worth noting that drift detection becomes vital in practice
because not only the algorithm has to adapt to the drift but also
it has to inform when the change occurs to allow in-depth
analysis of system’s behavior.
This paper presents a novel data-driven tool condition
monitoring methodology benefiting from recent progress in the
area of data stream analytics. An evolving ensemble classifier,
namely Parsimonious Classifier+ (pENsemble+) is put forward.
pENsemble+ handles aforementioned limitations because of the
fact that it works fully in the single-pass fashion where data are
directly discarded once learned without the requirement of
secondary memory or archival storage. Furthermore, it adopts a
fully evolving working scenario where both ensemble structure
and base-classifier structure can be automatically generated and
pruned from data streams. Moreover, the underlying innovation
of pENsemble+ compared to its root, pENsemble [9] is implied
by two facts: 1) pENsemble+ is equipped by the online active
learning scenario which actively selects the training samples for
model updates. This trait is vital for online tool condition
monitoring because it relieves operator’s annotation effort; 2)
pENsemble+ introduces the notion of “ensemble merging
scenario” which aims to maintain ensemble complexity in the
low level while improving diversity of the ensemble classifier.
This strategy enhances the significance-based pruning
technique existing in the literature [10] which often
compromises the model’s diversity.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
pENsemble+ is constructed with a generalized version of
Dynamic Weighted Majority [11] which puts forward an open
ensemble structure. Unlike the original DWM [11] and its
extension in [41], pENsemble+ is equipped by an online active
learning scenario which automatically selects training samples
for model updates based on the Bayesian conflict measure
which analyses conflict level in both feature space and target
space. The online active learning scenario utilizes a dynamic
threshold mechanism which copes with rapidly changing
environments. In realm of tool condition monitoring problem,
the online active learning scenario resolves the major
bottleneck of supervised learner which happens to be overdependent on operator’s feedback. pENsemble+’s structure is
automatically generated using the drift detection method
devised with the concept of Hoeffding bound [16].
pENsemble+ adopts the penalty and reward scenario where the
base-classifier is punished when making misclassification,
whereas a reward is granted provided it returns correct
prediction. The reward scenario is an additional phase in respect
to the original DWM which is meant to retain diversity of
ensemble classifier. It is worth-noting that the strength of
ensemble classifier compared to the single classifier lies in the
diversity aspect which addresses the bias and variance dilemma
better than the single classifier and is more robust against
various forms of uncertainty such as noise, etc. This case,
however, must be interpreted with care in the data stream
context which happens to be non-stationary because outdated
or irrelevant classifier undermines final predictive decision.
Complexity reduction scenario is incorporated with the
ensemble merging scenario which focuses on the redundancy
issue. The redundancy issue is analyzed by inspecting the
mutual information of base-classifiers. Two classifiers having
significant amount of mutual information are merged. The
ensemble merging scenario offers plausible tradeoff between
diversity and simplicity since it does not scan through poor
classifiers rather focus on those redundant classifiers. Another
unique feature of pENsemble+ is shown in its online feature
selection scenario [17] which dynamically samples relevant
input attributed during the training process. This mechanism
assigns numeric weight (0 or 1) for every input attribute in
every training observation and allows to arrive at different
subsets of input attributes in the training process. pENsemble+
deploys an evolving fuzzy classifier, namely pClass as a local
expert [18] which adopts an open structure. This provides
additional flexibility in the base-classifier level. Furthermore,
pENsemble+ will be implemented under the two variants of
pClass, namely axis-parallel and multivariate. The difference
between the two lies in the rule premise where the axis-parallel
rule only exploits the Gaussian rule with diagonal inverse
covariance matrix, while the multivariate rule features more
advanced version than the former one with a non-diagonal
inverse covariance matrix.
The major contributions of this paper are outlined as follows:
1) the paper puts forward a new perspective for online tool
condition monitoring approach based on a novel evolving
ensemble classifier. The unique features of our approach are
seen in its capabilities in handling the three bottlenecks of
3
existing data-driven TCM, time and space complexity, concept
drifts, and data uncertainty;
2) A novel ensemble classifier, namely pENsemble+, is
proposed. This algorithm goes one step ahead when compared
to existing ensemble classifier where an evolving classifier is
deployed as a base-classifier. Two variants of pClass, namely
axis-parallel and multivariate, are used as the base-classifier;
3) pENsemble+ also features online feature selection which is
capable of extracting relevant input attributes on demand;
4) Another unique feature of pENsemble+ is shown in the
online active learning scenario automatically sampling relevant
samples for model updates and the ensemble merging scenario
offering complexity reduction without compromising diversity
of the ensemble classifier;
5) A real-world experiment in the metal-turning process was
carried out where real-world manufacturing data were collected
and preprocessed.
It turns out that the flank-wear is not the only factor
affecting tool life [5] and the use of chip-breaker geometry
inserts greatly affects the mechanics of machining. Our
experiment was done with two types of tool inserts with chip
breaker geometry, coated and uncoated grades. These tools
were utilized in cutting EN24T steel while predictive analytics
of tool condition were undertaken with three sensory variables,
cutting force, dynamic cutting force and vibration. The
underlying goal was to identify cutter condition on the fly. Our
experiment used a fresh insert and continued until the worn
state without artificial actions to wear the tool. The efficacy of
pENsemble+ was experimentally validated in the online tool
condition monitoring of the metal cutting process and was
compared with a number of recently published algorithms:
Learn++.NSE [19], Learn++.CDS [20], pENsemble [9] and
pClass [18]. Additional numerical results were also served
using popular concept drift problems in the literature. The
advantage of pENsemble+ was evident in our experimental
study where it attained significant improvement in time, space
and sample complexity even compared to a single classifier
without substantial compromise on accuracy.
The paper is structured as follows: Section 2 encompasses
learning policy of pENsemble+ and learning procedure of its
base classifier, pClass; Section 3 outlines experimental
procedure and machining setup; Section 4 elaborates on
numerical results; and some concluding remarks are drawn in
the last section of the paper.
II. LEARNING POLICY OF PENSEMBLE+
This section elaborates on fundamental working principle of
pENsemble+ including ensemble learning mechanism and
learning scenario of the base-classifier. An Overview of
pENsemble+ learning mechanism is depicted in Fig. 1.
pENsemble+ executes data streams on a chunk by chunk basis
where each data chunk is fed to the online active learning
scenario which is meant to shrink data chunk size and to relieve
operator’s labelling effort. The learning process continues with
the online feature selection scenario which assigns numeric
feature weights (0 or 1) for every input attributes. The
performance of base classifier is evaluated based on its
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
predictive performance reported on a new observation where
misclassification triggers a penalty reducing its voting’s weight
while reward augments it. The complexity reduction scenario is
4
implemented through the ensemble merging scenario. The drift
detection scenario determines the learning stage which governs
the stability and plasticity of the ensemble classifier,
Fig. 1 Learning Policy of pENsemble+
A. Parsimonious Classifier (pClass)
pENsemble+ deploys a newly developed evolving classifier,
namely pClass as a base-classifier in order to attains greater
flexibility in handling concept drift in individual local regions.
This phenomenon is known as the local concept drift in the
literature. It is evident that concept change applies to particular
input regions only with different rates and severities.
Fuzzy Rule of pClass: pClass is a class of first-order evolving
fuzzy classifiers constructed with Takagi Sugeno Kang (TSK)
fuzzy system where the rule consequent implements a firstorder linear function while the rule premise is built upon the
multivariate Gaussian function generating non-axis-parallel
ellipsoidal clusters. Although the original pClass utilizes the
multivariate Gaussian function with a non-diagonal inverse
covariance matrix, the simplified version of pClass is also
realized in pENsemble+ where a diagonal covariance matrix is
used. This comparison aims to provide an overview of
ensemble performance under two different base-classifiers.
Rule Growing Strategy of pClass: pClass makes use of three
rule growing modules, namely Datum Significance (DS), Data
Quality (DQ), volume measure. The datum significance (DS)
method is derived from the theory of statistical contribution
presented in [21], [22]. This method aims to estimate the
potential contribution of a rule or a data point during its
lifespan. This method assumes that data samples are uniformly
distributed and the statistical contribution is estimated using the
Gaussian function as the kernel function. Because the DS
method utilizes the uniform distribution assumption, it loses
spatial information of data streams. This drawback is addressed
in [23] by introducing the sliding-window-based approach
where it calculates the accumulated firing strengths across data
points in the sliding window. The size of sliding window is
often problem-dependent. The DQ method is introduced to
answer this bottleneck where it aims to extract density
information of data samples. This strategy is inspired by the
notion of recursive density estimation (RDE) in [24]. pClass
extends this method for the multivariate Gaussian function and
integrates the weighting function to cope with the outlier
drawback [25]. Furthermore, the third rule growing module
checks the volume of winning rule. It aims to limit the size of
the fuzzy rules because the over-sized rules risks on the socalled cluster delamination problem. That is, one cluster may
cover one or more distinct data distributions [26]. It must be
noted that, as with pENsemble+, pClass is also implemented
under the axis-parallel ellipsoidal rule in pENsemble+ to
analyze the effect of two different base-classifiers. The same
formulas as in the original pClass can be used except that the
diagonal covariance matrix is deployed instead of the nondiagonal version.
Rule Pruning and Recall Strategy of pClass: pClass is
equipped by two rule pruning scenarios, namely Extended Rule
Significance (ERS) and Potential+ (P+) methods. The ERS
approach shares the same principle as the DQ method except
the statistical contribution of a fuzzy rule is estimated instead
of a data point. This component aims to scan through
inconsequential rules which do not play significant role during
its lifespan. Such rules can be pruned without compromising
generalization performance. The P+ method, on the other hand,
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
functions to capture outdated rules which are no longer relevant
to represent current data distribution. This trait is made possible
by inspecting the density evolution of fuzzy rules. The P+
method presents a modification of potential method in [27]. The
potential method is used for the rule pruning scenario in [28]
but the P+ method differs from this approach because it is based
on the inverse multi-quadratic function in lieu of the Cauchy
function. In addition, pClass incorporates the so-called rule
5
recall scenario. This scenario allows previously pruned rules to
be reactivated again in the future. This scenario refers to a case
where old concept reappears again in the future. One can
consider to introduce a new rule to overcome this situation but
this strategy catastrophically erases past learning history. This
situation is undesired because learning a local region must be
restarted from scratch again.
Algorithm 1. Pseudocode of pENsemble+
Algorithm 1: Parsimonious Ensemble+ (pENsemble+)
Given a data chunk D
factor
( X Pn , T PO ) where P, n, O are chunk size, the number of input dimension, the number of output dimension; set the adjustment
pi , the pruning threshold ;
C , , 1O
are global and local predictions, sum of weighted predictions for each class
D ( nO) is received
For t 1,..., // loops over all examples in the data chunk
a data chunk
IF the ensemble network is empty
M 1 // create the first local expert, i 1 // initialize the weight of a local expert
End
0
Execute the online active learning (1)-(4)
IF P( y0
X )input OR P( y0 X )output
Discard the data sample
ELSE
Accept and label the data sample for model update
Execute the feature selection mechanism (7)-(9)
1,..., M // loop over local experts
max ( yi , j ) // elicits the local prediction
For i
j 1,...,O
IF (
Ct )
yi i yi
// decreases the weight of a local expert when it predicts incorrectly
i i p
Else
i min( i (2 p ),1)
End
yi
End
C max( ) // Produces the global prediction, i
1,...,O
For
i 1,..., M
i
// normalizes the weight
M
i 1
i
Undertake the ensemble merging procedure based on the maximum correlation index
IF (12)
Discard i-th local expert
End
End
Undertakes the drift detection method (13),(14)
IF Drift
Introduces a new base classifier
ElseIF Warning
Do nothing and prepare for possible drift in the next observation
ElseIF Stable
Train the winning Classifier
End
End
Parameter Learning Scenario: pClass utilizes the fuzzily
weighted generalized recursive least square (FWGRLS)
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
method which presents a weight decay term to retain small and
bounded weight vector. This strategy is inspired by the concept
of Generalized Recursive Least Square [29] which incorporates
the weight decay term in the cost function of RLS [30]. The
FWGRLS can be also seen as a variation of the fuzzily weighted
recursive least square method [31] with addition of the weight
decay term. The advantage of weight decay term is to safeguard
the weight vector to keep its values small. It is worth noting that
we adopt the simplified form of GRLS method where the
second term is ignored. This leads to similar formulas of
FWRLS method except the presence of weight decay term. This
strategy is meant to improve the model’s generalization and
compactness of the rule base since a rule with a very small
weight vector can be easily detected by the ERS method. There
exist several types of weight decay term, say quadratic, quartic,
multimodal, etc. The quadratic weight decay term is selected in
the pClass since the weight vector proportionally decreases to
their initial values.
B. Ensemble Learning Scenario
pENsemble+ is developed with a generalized version of
DWM which adopts an open structure paradigm. This learning
scenario clearly differs from original DWM at least in 4
facets:1) the voting weight is given a chance to increase and this
strategy aims to retain diversity of ensemble classifier; 2) the
drift detection strategy is deployed to introduce a new baseclassifier whereas, in the original DWM, a new base-classifier
is added when the global prediction returns misclassification;
3) the ensemble merging scenario based on the maximum
information compression and the online feature selection
scenario are absent from the original DWM. Algorithm 1
illustrates the fundamental working principle of pENsemble+.
pENsemble+ works on a chunk-by-chunk basis and if no
base classifier exists, the first classifier is created using the first
data chunk. The learning procedure starts with the online active
learning scenario evaluating sample’s contribution whether it
deserves a learning process. The Bayesian conflict measure is
deployed to measure conflicts in the input and output space. A
sample is accepted for model updates provided that it satisfies
dynamic sampling criteria. If a data sample meets the dynamic
sampling criteria, the learning process continues with the
labelling process followed by the online feature selection
scenario. The online feature selection selects relevant input
features by assigning crisp weights (0 or 1) and makes possible
to arrive at different combinations of feature subsets in every
training episode. The predictive performance of each base
classifier is examined afterward where a classifier returning
misclassification is penalized by decreasing its voting weight
whereas a reward is given by increasing the voting weight when
correct prediction is made The decreasing and reward factor, p,
is selected at 0.5. The global prediction of ensemble classifier
is inferred from a weighted sum of each class. The voting
weight of each base classifier is normalized to allow
proportional voting weights among each local experts. A class
with the maximum weight is chosen as the predicted class. This
procedure is followed by the ensemble merging procedure
which is meant to capture redundant classifiers. Two classifiers
with high mutual information are coalesced. The last phase of
the training procedure is the drift detection scenario
6
categorizing dynamic of data streams into three conditions,
stable, warning and drift. When a drift is signaled, a new baseclassifier is introduced. No action is performed during the
warning condition since this phase depicts a transition period
before a drift is confirmed. Such situation usually occurs in the
presence of gradual drift. The winning classifier is updated
using the newest data chunk during the stable phase to keep upto-date with the most recent concept and to prevent over-fitting.
The winning classifier is selected from that having the lowest
predictive error – MSE. The learning components of
pENsemble+ are detailed as follows:
Online Active Learning Strategy: online active learning
scenario is urgently required in the complex manufacturing
process because of the cost in obtaining the true class label. This
usually requires a complete shutdown in the machining process
since the flank wear has to be evaluated through visual
inspection or at least some delay is expected to receive the true
class label. pENsemble+ features an online active learning
scenario based on the extended conflict ignorance (ECI)
paradigm [32] which evaluates conflict in both feature and
target domain. This strategy was derived from the conflict and
ignorance method for the conventional TSK fuzzy classifier
[33] where the underlying difference lies in the use of a
dynamic sampling paradigm [34] and Bayesian posterior
probability estimation in both input and output space. None of
these works, however, investigate the ECI method within the
context of ensemble classifier. As a matter of fact, the ensemble
learning scenario requires an innovation for sample evaluation
strategy since it consists of a collection of local experts evolved
from different data space. One must start from the fact that a
data sample may incur different conflict degrees in different
local experts. Although the sample evaluation strategy should
take place at the local level, a centralistic sample evaluation
strategy where all base classifiers are put together under one
roof to produce the predicted class label is formed. This strategy
is chosen to suit the online feature selection module of
pENsemble+ which also adopts the centralistic feature selection
scenario. Moreover, it is found that this does not make
substantial difference since the maximum operator has to be
ultimately committed when performing local sample evaluation
to analyze the confidence of ensemble classifier.
The Bayesian conflict measure in both input and target
space is utilized to evaluate conflict level for each local expert.
The Bayesian approach is preferred over a standard distance or
firing strength measure because it encompasses the prior
probability and the joint –category and class probability. A
sample is conflicting not only because it is out of scope of a
current fuzzy rule but also if it occupies “unclean” region shared
different class samples. Moreover, the prior probability is
required to take into account the cluster’s population since a
highly populated cluster tends to be “frozen”. That is, it is no
longer responsive to accept new training stimuli due to the
characteristic of rule premise update affected by the cluster’s
support. The conflict in the output space, on the other hand, is
measured from the classifier’s truncated output. The classifier’s
output here is taken from the preference degree [32] determined
with respect to the two most dominant classes since it
intuitively informs about the degree of closeness to the decision
boundary. A sample is conflicting if it falls near two-decision
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
boundary and results in the preference degree with the value
around 0.5.
The Bayesian conflict measure formed in the input space is
expressed as follows:
R
P( yo X )
P( y
o
j
Ri ) P ( X Ri ) P ( Ri )
i 1
R
P( y
(1)
j
Ri ) P ( X Ri ) P ( Ri )
j 1 i 1
where P( y o
X ), P( X R i ), P( X R i ), P( Ri ) respectively
stand for the joint-class and category probability, the upper
likelihood function, the lower likelihood function and the prior
probability. The joint-class and category probability and the
prior probability are defined as follows:
Ni , j
N
P ( Ri ) R i , P( yo Ri ) o
(2)
N
i 1
i
N
i, j
j 1
where N i , N i , j stand for the support of i-th rule and the support
of the j-th class of the i-th cluster. (2), (3) can be softened by
adding the log operation. This approach is useful in the category
choice phase because it provides higher likelihood for a newly
created cluster to be selected as the winning rule. The joint-class
and category probability is estimated by the number of j-th class
of the i-th rule which signifies the purity degree of a fuzzy rule
[18]. The class overlapping condition is most likely to be found
in the case of unpurified cluster. The likelihood function can be
defined in the similar way as their crisp version using the
Mahalanobis distance as follows:
1
P( X Ri )
exp(( X Ci )i1 ( X Ci )T )
(3)
1/2
(2 Vi )
1
where Ci , i denote the Center and inverse covariance matrix
of the i-th rule while Vi stands for the volume of i-th rule. The
advantage of Bayesian approach is also clear when fuzzy rules
occupy in almost similar proximity to a data sample because of
its prior probability. The volume of fuzzy rules can be obtained
with ease with the determinant operator. If a precise estimation
is required, it can be calculated as shown in [18] where the
Gamma function and the eigenvalue are utilised. Note that the
determinant may return negative volumes as per its definition
as the signed volume.
The conflict in the output space is evaluated from the
classifier’s truncated output to guarantee that it lies in in the
interval [0,1] as follows:
y1
P( yo X ) min(max(conf , 0),1), conf
(4)
y1 y2
where y1 , y2 stand for the most and second most dominant
classes which can be obtained from the highest and second
highest outputs of pClass. It is worth mentioning that pClass
characterizes the regression-based classifier constructed under
the MIMO architecture which scatters rule consequent for each
output. It is evident that this formula portrays the classifier’s
confusion perfectly because a significant conflict is indicated
when a classifier does not produce a conclusive prediction –
7
two outputs have about the same values. This situation may
occur when a data sample is geometrically close to the decision
boundary separating the two classes. Suppose that
P( y0 X ) input , P( y0 X ) output are
the estimate of posterior
probability in input space and output space, the condition of
sample acceptance is formalized as follows:
( P( y 0
X ) input or P( y0 X ) output )
(5)
where is the conflict threshold. The higher the value of this
parameter the higher the number of training samples are
accepted for model updates, whereas the lower the value of this
parameter the fewer the number of training samples are
discarded for model updates. A sample is supposed to be a good
candidate for model updates, if it results in significant conflict
for all base classifiers. This strategy aims to enhance the
diversity of the ensemble classifier by preventing redundant
samples to be learned. Furthermore, a budget [34] controlling
the maximum labelling cost can be inserted in (5)-(7). This
approach is useful when the true class label is too expensive to
be obtained such as in the bioinformatics applications. The
online active learning can also function to address the class
imbalance issue. First, the imbalance factor is estimated to find
the minority and majority classes. The online active learning is
set loose for minority class samples up to a point where a
balanced proportion of target classes has been achieved. That
is, minority class samples are always sampled to attain equal
class distribution. Since the true class label is unknown in realm
of online active learning scenario, it is estimated with the
posterior probability in the input and output space (1), (4). Both
class imbalanced and budget scenarios are already actualized in
[12]. It is omitted here to keep the presentation concise.
Online Feature Selection Scenario: the online feature
selection scenario is based on the OFS method in [17]. The OFS
method is generalized here to be well suited to the ensemble
working scenario since the original version only covers its
implementation to the single linear regression. The unique
feature of this approach lies in the fact that it makes possible to
arrive at different subsets of input attributes by assigning binary
weights (0 or 1). In other words, it removes the risk of
discontinuity because it provides likelihood for every input
feature to be selected in every observation. The OFS method
cannot be directly implemented in the ensemble learning
scenario because sensitivity of input attributes should be
analyzed with respect to all base classifiers. This issue leads to
carry out this scenario in a centralistic manner. That is, all fuzzy
rules of base-classifiers are put together to perform the OFS
procedure. Note that this mechanism is made possible by the
fact that pClass adopts a local learning scenario where every
rule is loosely coupled and has its own output covariance
matrix. Let’s recall the fuzzy rule of pClass comes as follows:
1
o
o
(6)
Ri : IF X n is N ( X ; Ci , i ) THEN yi xeWi
where Ci is the numeric center of the multivariate
Gaussian function and u is the number of input variables.
u
i1 u u is the interval-valued inverse covariance matrix,
xe (u 1) is the extended input vector, Wio (u 1) is the
interval-valued output weight vector.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
The OFS procedure starts by examining the prediction of a
single pClass created by all rules of ensemble classifiers – all
fuzzy rules are put together to construct a single classifier. The
OFS method only takes place when a model returns
misclassification C Cˆ to save computational cost because the
OFS method is meant to recover predictive quality of the model
by getting rid of the influence of poor features. The output
o
weight vector Wi is adjusted using the stochastic gradient
descent approach as follows:
Wi Wi Wi
where , are
learning
E
Wi
rate
and
(7)
regularization
factor,
E
can be derived with ease
W
for upper and lower output weight vector by applying the
standard MSE as the cost function. The stochastic gradient
descent is utilized to adjust the output weight rather than the
FWGRLS method as pClass, since the OFS method is
undertaken in the centralistic manner having different
optimization objective from that of the base-classifier level.
Moreover, the stochastic gradient descent is much easier to be
executed than that of the FWGRLS method because no output
covariance matrix has to be assigned when performing the OFS
scenario.
To guarantee a bounded norm, the output weight vector is
projected to the L2 ball as follows:
respectively. The gradient term
1
Wi min(1,
Wi
)Wi
(8)
2
This strategy is also required to examine whether values of the
output weight vector is concentrated within the L2 ball and thus
pruning small values, being remote from the L2 ball center, does
not compromise the model’s generalization. The contribution
of input attribute is informed from its dominance in the output
weight vector. In realm of the TSK fuzzy system, the rule
consequent or the output weight vector steers the direction or
the tendency of a rule in the output space. In addition, the output
weight vector is more stable than the gradient information
(changing in each observation) during the sensitivity analysis.
The contribution of input attribute is expressed in the form:
R
Ij
W
j ,i
i 1
u R
W
(9)
j ,i
j 1 i 1
where I j is the sensitivity of j-th input feature and R is a total
number of fuzzy rules across all base-classifiers. Note that the
data standardization must be performed in this context because
different input ranges obscure the true contribution of input
attributes. Suppose that B is the desired input dimensionality
and B is smaller than the original input dimension u, the input
attributes with the B largest input contributions I j are picked up
in every observation and the remainder of input attributes are
ruled out from the training process by assigning 0 weights.
8
Input attributes are not permanently forgotten and are
reactivated in the future whenever they are called for the current
data distribution – cyclic drift. The OFS method also covers the
case of partial input information required when the cost of
feature extraction is too costly. Because the partial input
information is similar to that of full input version, it is not
recounted in this paper. The sensitivity measure (9) is also used
in eTS+ [55]. Nonetheless, eTS+ adopts the hard input pruning
mechanism where superfluous features are permanently
discarded without any opportunity to be picked up again.
Ensemble Pruning Scenario: The main bottleneck of
ensemble classifier for data stream application is found in the
issue of computational and space complexity because it incurs
considerable complexity if it consists of a large collection of
base classifiers. Nonetheless, the ensemble pruning scenario is
often counterproductive for classifier’s accuracy since it limits
the diversity of the ensemble classifier [35] – the underlying
strength of the ensemble classifier. The ensemble pruning
scenario discards superfluous classifiers – either poor classifier
or outdated classifier. Although such classifiers play little
during their lifespan, they remain important to generate diverse
output space. In realm of dynamic and evolving learning
environments, significance of base classifiers usually changes
rapidly in accordance to the context. When using the ensemble
pruning scenario, it is necessary to integrate the recall capability
because already pruned classifiers may turn out to be useful
again to cover future data distribution. The most plausible
approach to complexity reduction of ensemble classifier is by
putting forward the ensemble merging scenario. That is, it
analyses mutual information of base classifiers and base
classifiers featuring strong mutual information are merged to be
a single classifier. The mutual information is quantified by
comparing the classification output of two classifiers. The
mutual information is relatively more stable than the
significance-based criterion because it measures correlation
between two base classifiers.
An Analysis of mutual information can be performed using any
correlation measure provided that they satisfy the online
learning requirements. Nonlinear correlation measure is often
more accurate than linear correlation measure but it is not
scalable for online real-time processing and requires simplified
assumptions such as training samples follow normal
distribution [36]. pENsemble+ utilizes the maximal
compression index (MCI) to measure correlation of two base
classifiers. This approach is more robust than conventional
Pearson correlation index since it is insensitive to rotation and
translation [37]. It calculates the amount of information loss
when ignoring one of the base classifier and if no significant
difference exists or MCI is small, the information of ignored
base classifier is already covered by its pair. The MCI is
expressed as follows:
1
( y1 , y 2 ) (var( y1 ) var( y 2 )
2
(var( y1 ) var( y 2 )) 2 4 var( y1 ) var( y 2 )(1 ( y1 , y 2 ) 2 )
(10)
( y1 , y 2 )
cov( y1 , y 2 )
var( y1 ) var( y 2 )
(11)
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
where cov( y1 , y 2 ), var( y1 ), var( y 2 ) , ( y1 , y 2 ) denote the
covariance
of
classifier’s
outputs
y1 , y 2 ,
variance
of
classifier’s output y1 , variance of classifier’s output y 2 , and
the Pearson correlation index, respectively. The variance and
covariance can be calculated recursively with ease. It is worth
mentioning that the MCI satisfies the following properties: 1)
0 ( y1 , y 2 ) 0.5(var( y1 ) var( y 2 )) ; 2) the maximum
correlation
is
attained
when ( y1 , y 2 ) 0 ;
3)
( y1 , y 2 ) ( y 2 , y1 ) ; 4) it is insensitive against the
translation because mean expression is nowhere in (6); 5) it is
insensitive to rotation because a perpendicular distance of a
point to a line is not dependent on rotation. The ensemble
merging condition is set as follows:
( y1 , y 2 )
where is a merging
(12)
threshold. The lower the value of this
threshold implies less merging process to be performed in the
training process, whereas the higher the value of this threshold
induces more aggressive merging process is committed during
the training process. Once a merging decision is taken, one of
the two classifiers is discarded. The classifier with a lower
accuracy is selected for the pruning process while another one
is retained.
Drift Detection Scenario: the dynamic of pENsemble+ is
controlled by a drift detection scenario, which aims to discover
abnormal patterns leading to possible change of data stream
dynamics. The drift detection is based on the Hoeffding’s
inequalities [16] which classifies dynamics of data streams into
three categories, namely normal, warning and drift. The normal
phase means no variation in data streams is found, while change
still needs for further investigation in the warning phase. The
drift phase means that change is certain in data streams. The
advantage of this method lies in assumption-free for the
probability density function. It assumes data streams as
independent and bounded random variables.
The drift detection scenario is carried out by inspecting
statistics of data streams – moving average - without any
weight. Although its weighted moving average variant does
also exist in [16], the standard moving average is deployed here
since it is more sensitive to abrupt change than the weighted
version and also is easy-to-use because it does not call for
specific tuning scenario for weight adjustment. The statistics of
data
streams
is
computed
as
X t t X t , t 1 , X X . Note that its recursive
t 1
version can be derived with ease. The drift detection strategy
adopts similar concept as the statistical process control except
the assumption of normal distribution is removed. The standard
deviation in the confidence interval is replaced with the
significance level . Two significance levels are implemented
to determine the conflict level in data streams. They correspond
to two levels of the drift detection scenario, namely the warning
level ( W ) and to the drift level ( D ).
9
This strategy partitions a data chunk into three groups,
u
namely X [ x1 , x2 ,..., x ] ,
Y [ xcut 1 , xcut 2 ,..., x ] cut 1u ,
Z [ x1 , x2 ,..., xcut ] cut u where
X , Y , Z are
statistics
computed from these three data groups. Each group is assigned
with a Hoeffding’s error bound X , Y , Z to set proper conflict
levels which signify the status of data streams. The error bounds
are allocated as follows:
(m)
1
(13)
(b a)
ln( )
2cut (m cut )
where [a, b] are the minimum and maximum values of input
attributes and is the significance level. Note that the
significance level has a clear statistical interpretation which
corresponds to the confidence level of the Hoeffding’s bounds
1 .
The drift detection starts by finding the cutting point which
pinpoints a switch point of two data distributions and in turn
partitions the data chunk into the three groups. The switch point
does not signal directly drift condition to prevent the outlier’s
effects rather in-depth investigations must be performed to
ascertain the status of data distribution – whether a drift really
presents. It is in line with the fact of gradual drift where three
exists a transition period that depicts a mix between two
distributions. A data point is said to be a cut point given that the
following condition is met.
Zt Z X t X
(14)
t
t
The next step is to determine the status of data streams by
formulating a hypothesis test. If null hypothesis is rejected with
size D , a drift’s status is returned, whereas a warning status
is indicated, if null hypothesis is rejected with size D , W . In
other words, D , W correspond to the confidence level of
Hoeffding’s inequality for warning different stages:
(warning),
1 W
1 D (drift). The lower the value of D ,W the
lower the confidence level of Hoeffding’s bound is – more
examples are considered to be a drift. This implies to more baseclassifiers to be added during the training process and vice
versa. The null hypothesis is formed as H 0 : E ( X )
while its alternative is defined as H1 : E ( X )
E (Y ) ,
E (Y ) . Since
the weight is excluded here, this hypothesis is analyzed as
X Y where is found from (10) by applying a
specific significance levels D , W which correspond to either
drift or warning. This hypothesis inspects the dynamic of data
streams after a switching point. This is meant to substantiate the
presence of drift in data streams. If the null hypothesis happens
to be maintained, the stable condition is signaled.
III. EXPERIMENTAL SET-UP & DATA COLLECTION
The set-up consisted of a Lang Swing J6 centre-lathe, onto
which a Kistler tool-post dynamometer platform (type 9263A)
was mounted to measure three mutually perpendicular
components of cutting force. A Kistler tri-axial accelerometer
(type 8730A) was used to measure three mutually perpendicular
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
components of vibration from the underside of the tool holder.
A Kistler charge amplifier (type 5006) and a Kistler power
supply/coupler (type 5134) were used to amplify and decouple
the cutting force and acceleration signals. Dry cutting was
carried out on EN24T BS 970 817M40 alloy steel work-piece
of Brinell hardness 255 of composition: 0.4% C, 0.28% Si,
0.27% Mo, 1.18% Cr, 0.5 % Mn and 1.4% Ni. The tool holder
was Sandvik SSBCR 2020 K12 and the throwaway inserts were
Sandvik Coromant of type SCMT 12 04 08 UM and material
P25 4025 and P15 4015. Three cutting speeds (m/min) and
feed-rates (mm/rev) of 275, 300, 350 and 0.1, 0.2 & 0.3
respectively were used at a constant depth of cut of 2 mm. Six
signals were recorded using an Amplicon PC-30 data
acquisition card mounted in a personal computer, at 4096 (N)
samples per channel, a sampling rate of 30 kHz, and recorded
on computer for analysis.
10
The flank wear values are determined from its effect to the
surface quality and other equipment. It is well-known that blunt
tool imposes higher cutting force which leads to costly scrap
and even damages made to the machine.
The cutting conditions were incorporated to the input vector
sets to assure that the underlying process parameters would be
less sensitive to changes in the cutting conditions (cutting
speed, feed rate and depth of cut). In total, 12 input time-domain
and frequency-domain attributes are collected to identify the
five conditions of the tool.
IV. DATA PROCESSING AND SENSOR FUSION
Any typical sensor is used to measure one desired parameter
and any other parameters influencing the measurement are
considered to be interfering with the measurement. For
example, a dynamometer is often used in measuring cutting
forces (or thereof moments) which are then correlated to the
process of interest. Because of the complex and non-linear
nature of the cutting process, sensor co-operation is not only
desired but also necessary. Essentially, sensor fusion relies on
the fact that the fusion of different source signals of probable
mediocre quality, yields better results than when only one such
a signal is used [1] [2]. A comprehensive review of the
synergistic integration of multi-sensor information can be found
in [3] with typical application scenarios in TCM found in [4-6]
[7]. Sensor fusion traditionally has been performed through
application of statistical methods such as PCS or regression
analyses [8] or a set of heuristic rules, but machine learning
approach has recently gained popularity for TCM.
Fig. 1 evolution of ensemble structure
In most metal turning processes, flank and crater wear are
usually the more prevalent forms of tool wear when cutting with
plane-faced geometry inserts, and their occurrence are
unavoidable. A judicious choice of cutting conditions can
remedy other forms of wear such as frittering, notch and nose.
In this investigation, coated (P15) and un-coated (P25) carbide
inserts with chip breaker geometry to reduce chip/tool contact
were utilized in order to minimize crater wear. The process was
interrupted occasionally to record the flank/nose wear lengths
measured with the aid of a Tool Maker’s Microscope. The ISO
3685 wear criterion was used as a guide but not strictly applied.
The decision for percentage wear on the cutting tool used as the
classification benchmark as either worn or sharp was rather
subjective. This was because each test cut began with a fresh
tool insert and cutting continued until either the tool failed or
flank/ nose wear had accumulated excessively. The following
guideline was employed in determining the tool class:
i. fresh (sharp), flank wear < 0.1 mm;
ii. nominally sharp, 0.1 mm flanks wear < 0.1 mm;
iii. partly worn, , 0.12 mm flanks wear < 0.15;
iv. worn, 0.15 mm flanks wear < 0.17mm;
v. severely worn, flanks wear 0.17 mm.
Fig. 2 Fuzzy Rule Evolution
The instrumentation set-up did not allow simultaneous
recording of the static and dynamic cutting forces. The
parameters were mathematically extracted from the recorded
cutting force signals. The dynamic forces were found by
calculating the oscillatory part of the sampled force signals,
meanwhile the arithmetic mean of the sampled cutting force
signals were taken to represent the static cutting force
components. The obtained dynamic data (dynamic force and
vibration) were passed through a forward FFT, and the DC
component of the dynamic force eliminated. The sum total
power contained in the FFT spectrum (N/2) was taken for each
cut and the values from this calculation together with the static
forces formed the input data samples. In total, there were 157
data samples of which less than 10% could be said to represent
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
the worn tool – partly worn, worn, severely word, while the rest
were for a nominally sharp tool – fresh and nominally sharp.
The obtained data were normalized such that the distribution for
Algorithms
pENsemble+
(axis-parallel)
pENsemble+
(multivariate)
pENsemble
pENsemble+
(axis-parallel)
pENsemble+
(multivariate)
pENsemble
Case
Binary
Multiclass
1)
each signal was positioned within the 0.1-0.9 range, had zero
mean with an equal variance distribution for similar learning
rates and weight convergence.
CR
0.61±0.18
Table 1. Numerical Results
FR
BC
NP
2.8±1
1.1±0.3 28±10.3
IA
2
TS
46.4±1.8
RT
0.01±0.004
0.65±0.12
1.2±0.63
1.1±0.3
14.4±7.6
2
44.7±1.6
0.02±0.004
0.52±0.12
0.81±0.15
3.2±1.7
1
1.1±3
1
32±18.8
16
2
2
63
92±3.97
0.01±0.005
0.01±0.002
0.77±0.12
1
1
18
2
91.8±3.9
0.04±0.009
0.85±0.11
1
1
16
2
107
0.01±0.002
V. PREDICTION PHASE
Two cases, namely binary and multi-class, were simulated
in the prediction phase. The binary case was formed by
grouping fresh and nominally sharp as one group, while the
other three were assigned as another group. The multi-class
case consists of 4 classes which represents the following toolcondition.
Flank wear mark value ≤ 0.15mm, tool insert
nominally sharp
Flank wear mark value > 0.15mm, tool insert worn
(high flank)
Nose wear length ≤ 0.2mm, nominally sharp
Nose wear length > 0.2mm, tool worn (nose fractured
/ chipped)
The experimental procedure follows the 10-fold cross
validation (CV). The CV procedure, on the other hand, is meant
to avoid the data order dependency problem and utilizes 10-fold
process where all data are distributed into 10 mutually exclusive
bins. The first bin is used to test the generalization power of the
model, while the remainder bins were exploited to evolve the
model. This process moves to the next bin as the testing samples
while others are used as the training samples. It is repeated until
all bins have been used to examine the accuracy of the model.
Data stream environment is created by presenting the data in
small batches during the training process. Table 3 summarizes
details of our numerical study including characteristics of
datasets and the experimental procedure.
pENsemble+ was benchmarked against pENsemble which
happens to be predecessor of our proposed algorithm to exhibit
to what extent the proposed methodologies in this paper are
capable of improving numerical results of pENsemble.
pENsemble characterizes a fully evolving fuzzy classifier using
pClass [18] as a base classifier. It, however, suffers from the
absence of online active learning scenario and still utilizes the
generalization-based ensemble pruning scenarios. pENsemble+
is implemented with two types of pClass, axis-parallel and
multivariate, to perceive the effect of base-classifier to the
overall learning performance. The difference between the two
is seen in the rule premise from which two different ellipsoidal
clusters are generated automatically. Our simulation is carried
out in MATLAB under a laptop with Intel Core i7-6500U CPU
and 16 GB of RAM. The MATLAB codes of pENsemble+ are
provided in1). Two benchmarked algorithms are evaluated in 5
criteria: classification rate (CR), Fuzzy Rule (FR), base
classifier (BC), network parameters (NP), input attribute (IA),
https://www.dropbox.com/s/ve11dbgz87ydn08/pENsembleplus.zip?dl=0
11
training samples (TS), and runtime (RT). Numerical results are
tabulated in Table 1.
It is seen from Table 1 that pENsemble+ is capable of
delivering competitive accuracy with less training samples than
that pENsemble. In the context of binary classification problem,
pENsemble+ even beats pENsemble in almost all criteria. It is
also confirmed that pENsemble+ saves around 30% of total
training samples. The multivariate Gaussian function
contributes to the lowering of the fuzzy rule requirement.
VI. NUMERICAL STUDY WITH BENCHMARK PROBLEMS
This section elaborates on numerical study using three
popular concept drift problems, namely hyperplane, SEA and
SUSY. pENsemble+ is compared with the same set of
algorithms and is evaluated with the same performance metrics.
The experimental procedure follows the periodic hold-out
process where the training process is carried out using the odd
data streams, while the testing phase utilizes the even data
stream. This procedure simulates real data stream environments
where past samples are discarded once seen. Table 2 shows
numerical results of the consolidated algorithms.
A) Hyperplane Problem: this problem is obtained from the
data stream generator of massive online analysis (MOA) [38].
It features a binary classification problem where the main task
is to classify a data point into two classes with respect to the
random hyperplane in the d-dimensional feature space. A class
d
is classified as the positive class if
w x w
i i
0
, whereas the
i 1
d
negative class is resulted from
w x w
i i
0
. The unique
i 1
property of this problem lies in the gradual concept drift where
at first data are drawn from one distribution with probability
one. This concept gradually shifts to another data distribution
up to the point where the second concept completely replaces
the first concept. This problem consists of 120 K data samples
and the concept drift occurs after 40K-th samples. This problem
is simulated using the periodic hold-out scenario with 1,000
time stamps. Each time stamp involves 1,200 samples where
1,000 samples are used to train the model and the remainder
200 samples serve as the validation samples. The numerical
results are presented as the average of 1,000 time stamps.
pENsemble+ delivered encouraging numerical results
where it characterizes low sample consumption while
producing comparable accuracy. The online active learning
scenario is capable of significantly reducing the number of
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
training samples where pENsemble+ only attracts 30% of the
total training samples for training process. Moreover, the
ensemble merging strategy relieves computational and space
complexity by getting rid of redundant classifiers. That is, a
classifier sharing strong mutual information with other
classifiers can be discarded without substantial loss of
generalization power. It is also observed that pENsemble+ with
Numerical Example
SEA
Hyperplane
SUSY
Evaluation Criteria
Classification Rate
Fuzzy Rule
Input Attribute
Network Parameters
Execution Time
Training Samples
Ensemble Size
Classification Rate
Fuzzy Rule
Input Attribute
Network Parameters
Training Samples
Execution Time
Ensemble Size
Classification Rate
Fuzzy Rule
Input Attribute
Network Parameters
Training Samples
Execution Time
Ensemble Size
the multivariate Gaussian rule achieves comparable numerical
result as that the axis-parallel Gaussian rule. The advantage is
seen in terms of the fuzzy rule where the multivariate Gaussian
function leads to a more compact and parsimonious rule base
than the axis-parallel rule. Nonetheless, the use of multivariate
Gaussian function causes slightly higher network parameters to
be stored in the memory.
Table 2. Numerical Results of Consolidated Algorithms
pENsemble Learn++.NSE Learn++.cde pClass
0.97±0.02
4.1±1.8
2
65.2±24.7
1.14±0.2
500
2.03±0.9
0.92±0.02
3.74±0.7
2
44.8±8.2
1000
1.5±0.45
1.87±0.34
0.77±0.04
3.8±1.5
1
22.9±9.1
400
0.29±0.08
1.9±0.7
0.93±0.02
N/A
3
N/A
1804.2
500
200
0.91±0.02
N/A
4
N/A
1000
926.04
100
B)SEA problem: The SEA problem was developed by Street
and Kim [39] and is a popular benchmark problem for concept
drift. This problem presents a sudden drift and consists of two
input attributes x1 , x 2 . If the sum of the two attributes fall
below the threshold, a sample is classified to class 2, whereas a
class 1 is assigned to those higher than the threshold. The
concept drift is induced by dramatically changing the thresholds
three times during the experiment ( 4 7 4 7 ) and
data samples are uniformly drawn from the range of [0,10]. In
our experiment, we use the imbalanced version of this problem
introduced by Ditzler and Polikar [17] where the minority class
is around 25% of the total data samples. The experiment was
carried out in the chunk by chunk mode where each chunk
comprises 1000 data samples. The number of chunk is 200 and
the drift is applied in every 50 chunk. The dynamic behavior of
ensemble structure is depicted in Fig. 1, while Fig. 2 portrays
the trace of fuzzy rules. Fig. 3 visualizes the dynamic feature
selection mechanism of pENsemble+ while Fig. 4 exhibits the
trace of training samples.
SEA problem illustrates that although pENsemble+’s accuracy
is slightly more inferior than pENsemble, it attains much lower
sample consumption and comparable structural complexity.
Moreover, pENsemble+ is unlike pENsemble which fully
operates in the fully supervised manner which demands high
operator labelling efforts. pENsemble+ produces similar
performance with two different base-classifiers.
It is observed from Fig. 1 where pENsemble+ features a fully
open structure where its ensemble structure grows and shrinks
dynamically from data streams. The local expert can be
automatically generated on the fly when a concept drift is
detected in data streams. Fig. 1 also confirms that pENsemble+
12
0.93±0.02
N/A
3
N/A
2261.1
500
200
0.9
N/A
4
N/A
1000
2125.5
100
Terminated
0.89±0.1
6.6±4.2
3
157.3±101.9
0.42±0.3
500
N/A
0.91±0.02
3.8±1.7
4
114.9±52.6
1000
2.7±1.4
N/A
0.73±0.06
1.96±0.26
18
748±33.3
400
0.79±0.3
N/A
pENsemble+
(axis-parallel)
0.97±0.03
3.4±1.3
2
20.3±7.5
0.26±0.04
104.1±21.03
1.7±0.6
0.94±0.02
2
2
12
241.9±129.6
0.22±0.09
1
0.76±0.04
6.6±2.4
1
39.5±14.5
236.5±18.8
0.49±23.4
3.2±1.2
pENsemble+
(multivariate)
0.97±0.03
2.96±1.1
2
35.2±12.7
0.27±0.09
113.6±26.01
1.48±0.5
0.94±0.02
1
2
12
248.9±125.7
0.24±0.1
1
0.76±0.04
1.95±0.46
1
214.6±50.6
248.6±25.7
0.33±0.13
1.0±0.05
provides timely response to the concept drifts. It is understood
that the SEA problem characterizes three shifts (
4 7 4 7 ) and these drifts can be properly identified
by the drift detection scenario of pENsemble+ by integrating
new local experts. The efficacy of ensemble merging scenario
is also evident from Fig. 1 where a classifier with strong
redundancy are gotten rid of without compromise to the
classifier’s generalization. Unlike existing variants of ensemble
learners, pENsemble+ deploys a fully evolving local expert,
pClass. This facet is substantiated by Fig. 2 where fuzzy rules
are added and pruned on demand. This trait helps to handle
concept drift better than a static classifier since its network
structure can be expanded when a data point carries significant
novelty to the training process. Moreover, inactive rules are
pruned and this aspect is a key to alleviate the issue of
overfitting. Another unique property of pENsemble+ is found
in its dynamic feature selection scenario where different subsets
of input attributes can be fed to pENsemble+. This salient
characteristic is visualized by Fig. 3 which exhibits the number
of times input attributes have been activated. Fig. 3 also implies
that input features are activated and deactivated on demand
during the training process. The efficacy of online active
learning scenario is shown in Fig. 4. It contributes to
dramatically lower the number of training samples for model
updates. At first, pENsemble+ calls for more samples to be
labelled and learned during the training process. This figure
gradually decreases when pENsemble+ gets more mature by
seeing past training samples. Note that sample significance is
examined with the absence of true class labels.
C)Susy problem: Susy problem is a popular big dataset. It
presents a binary classification problem which aims to classify
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
a signal process that produces supersymmetric particles [40]
and a background process which does not. This problem has 18
input features in which the first 8 input features are the
kinematic properties and the last 10 features are simply the
function of the first 10 attributes. It consists of 5-millions data
samples where 4.5-millions samples are reserved for the
training samples, while the last 500 K samples are used for the
testing samples. To simulate data stream environments, data
come in batches with 10000 timestamps.
This case study demonstrates the scalability of pENsemble+ for
large-scale applications. It exhibits significant improvement
over its predecessor, pENsemble, in terms of runtime. It is
attributed by the online active learning scenario which brings
down the sample consumption to a low level. Local experts can
be added and removed on demand and on the fly. Although
pENsemble+ works on the chunk by chunk basis, it does not
revisit previously acquired data chunk. The memory demand
hence remains independent from the total number of data
chunks. Furthermore, the ensemble merging scenario reduces
the memory complexity and from our numerical examples one
can perceive that pENsemble+ has parsimonious and compact
network structure. The use of multivariate Gaussian function
Data stream
SEA
Hyperplane
Susy
TCM(binary)
TCM(multi-class)
IA
3
4
18
12
12
13
brings positive effect to alleviate computational and structural
burdens of pENsemble+. This result, however, comes at the
cost of a slight deterioration of the predictive performance.
Fig. 3 Dynamic Feature Selection
Table 3 Experimental Procedure
C
DP
TS
TRS
2
100000
200
250
2
120 K
100
1000
2
5M
10000
400
2
69
5
63
4
119
4
107
TES
250
250
100
6
12
Scenario
Holdout
Holdout
Holdout
10-fold CV
10-fold CV
IA: Input Attributes, C: Classes, DP: Data Points, TS: Time Stamps, TRS: Training Samples, TES: Testing Samples
attaining tradeoff between accuracy and complexity. Future
work will be directed to study a stacking ensemble architecture
for regression problems.
REFERENCES
1.
Fig. 4 Evolution of Training Samples
VII. CONCLUSION
This paper proposes the novel tool condition monitoring
methodology taking advantage of an evolving ensemble fuzzy
classifier, pENsemble+. pENsemble+ offers an extension of
pENsemble by integrating online active learning scenario and
ensemble merging scenario. These two learning components
improve the viability of pENsemble for real-world deployment
because it can reduce sample consumption, labelling effort and
ensemble complexity to modest level. Real-world experiments
were carried out where real-world manufacturing data from
metal turning process were collected. In addition, numerical
examples using well-known data streams are provided. It is
shown that pENsemble+ delivers encouraging performance in
Dornfeld D. A. (1990), "Neural network sensor fusion for tool condition
monitoring" Annals of the CIRP, Vol. 39/1, pp. 101-105
2. Holmbom P., pedersen O. Sandell B. and Lauber A. (1989), “Fusing sensor
systems: promises and problems”, Sensor Review, Vol. 9, No. 3, pp 143152
3. Luo R. C. and Kay M. G. (1989), “ Multisensor Integration and Fusion in
Intelligent Systems”, IEEE Trans. Systems, Man and Cybernatics, Vol. 19,
No. 5, pp 901-931
4. Balakrishnan P., Kannatey-Asibu, Jr. E., Trabelsi H. and Emel E, (1989),
“A sensor fusion approach to cutting tool monitoring”, Proc. 15th NSF
Conf. on Production Research & Technology, ASME Publication, Univ.
California at Berkely, USA, pp. 101-109
5. Dimla, Jnr. D. E., Lister P. M. and Leighton N. J., “A Multi-sensor
integration method of signals in a metal cutting operation via application
of multi-layer perceptron neural networks”
5th IEE International
Conference on Artificial Neural Networks, July 1997 Cambridge, UK,
6. Dimla, Jnr. D. E., Lister P. M. and Leighton N. J., “Sensor fusion for
cutting tool state identification in metal turning through application of
perceptron neural networks” IFAC’s SAFEPROCESS ‘97 August, Hull
UK
7. Kim J-D. and Choi I-H., (1996), "Development of a tool failure detection
system using multi-sensors", Int. J. Mach. Tools Manufact., Vol. 36, No.
8, pp. 861-870
8. Beale R and Jackson, T. (1990), "Neural Computing: An Introduction" IOP
Publishing Ltd., Bristol, UK
9. M. Pratama, W. Pedrycz, E. Lughofer, “ Evolving Ensemble Fuzzy
Classifier”, arXiv preprint arXiv:1705.06460, 2017
10. G. D. C. Cavalcanti, L. S. Oliviera, T. J. M. Moura, G. V. Calvarho, “
Combining diversity measures for ensemble pruning”, Pattern Recognition
Letters, Vol. 74, pp. 38-45, 2016
11. J. Kolter and M. Maloof. Dynamic weighted majority: An ensemble
method for drifting concepts. Journal of Machine Learning Research, Vol.
8, pp. 2755–2790, 2007
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
12. M. Pratama, E. Dimla, CY. Lai, E. Lughofer, “ Metacognitive Learning
Approach for Online Tool Condition Monitoring”, Journal of Intelligent
Manufacturing, 2017
13. S. Silva, P. Costa, M. Gouvea, A. Lacerda, F. Alves, D. Leite, “ High
impedance fault detection in power distribution systems usingwavelet
transform and evolving neural network”, Electric Power Systems Research,
Vol. 154, pp. 474-483, 2018
14. B. S. J. Costa, P. P. Angelov, L. A. Guedes, “ Fully unsupervised fault
detection and identification based on recursive density estimation and selfevolving cloud-based classifier”, Neurocomputing, Vol. 150, pp. 289-303,
2015
15. A. Lemos, W. Caminhas, F. Gomide, “ Adaptive fault detection and
diagnosis using an evolving fuzzy classifier”, Information Sciences, Vol.
220, pp. 64-85, 2013
16. I. Frias-Blanco, J. D. Campo-Avilla, G. Ramos-Jimenes, R. MoralesBueno, A. Ortiz-Diaz, Y. Caballero-Mota, “Online and Non-Parametric
Drift Detection Methods Based on Hoeffding’s Bounds”, IEEE
Transactions on Knowledge and Data Engineering, Vol. 27(3), pp. 810823, 2015
17. J. Wang, P. Zhao, S. Hoi, R. Jin, “ Online Feature Selection and Its
Applications”, IEEE Transactions on Knowledge and Data Engineering,
Vol. 26(3), pp. 698-710, 2014
18. M. Pratama, S.G. Anavatti, M.J. Er and E. Lughofer, pClass: An Effective
Classifier for Streaming Examples, IEEE Transactions on Fuzzy Systems,
vol. 23 (2), pp. 369--386, 2015
19. R. Elwell and R. Polikar. Incremental learning of concept drift in
nonstationary environments. IEEE Transactions on Neural Networks, Vol.
22(10), pp. 1517–1531, 2011
20. G. Ditzler and R. Polikar,“Incremental learning of concept drift from
streaming imbalanced data,” in IEEE Transactions on Knowledge & Data
Engineering, vol. 25(10), pp. 2283–2301, 2013
21. H. J. Rong, N. Sundararajan, G. B. Huang, and P. Saratchandran,
“Sequential adaptive fuzzy inference system (SAFIS) for nonlinear system
identification and time series prediction,” Fuzzy Sets and Systems, vol.
157(9), pp. 1260–1275, 2006
22. G.-B. Huang, P. Saratchandran, and N. Sundararajan, “A generalized
growing and pruning RBF (GGAP-RBF) neural network for function
approximation,” IEEE Transactions on Neural Networks, vol. 16(1), pp.
57–67, 2005
23. H.-J. Rong, N. Sundarajan, G.-B. Huang, and G.-S. Zhao, “Extended
sequential adaptive fuzzy inference system for classification problems,”
Evolving Systems, vol. 2(2), pp. 71–82, 2011
24. P. Angelov, “ Autonomous Learning Systems: From Data Streams to
Knowledge in Real-time”, John Wiley and Sons Ltd., 2012
25. L. Wang, H.-B. Ji, and Y. Jin, “Fuzzy passive-aggressive classification: A
robust and efficient algorithm for online classification problems,”
Information Sciences, vol. 220, pp. 46–63, 2013
26. E. Lughofer, “A dynamic split-and-merge approach for evolving cluster
models,” Evolving Syst., vol. 3, no. 3, pp. 135–151, 2012
27. P.Angelov and D. Filev, "An approach to online identification of TakagiSugeno fuzzy models," IEEE Transactions on Systems, Man, and
Cybernetics, Part B. vol. 34, pp. 484-498. 2004
28. J.-C. de Barros and A. L. Dexter, “On-line identification of computationally
undemanding evolving fuzzy models,” Fuzzy Sets and Systems, vol. 158,
pp. 1997–2012, 2007
29. Y. Xu, K. W. Wong, and C. S. Leung, “Generalized recursive least square
to the training of neural network,” IEEE Transactions on Neural Networks,
vol. 17(1), pp. 19–34, 2006
30. L. Ljung, System Identification: Theory for the User. Upper Saddle River,
NJ: Prentice-Hall, 1999
31. P.Angelov et al, “Evolving fuzzy rule-based classifiers from data streams,”
IEEE Transactions on Fuzzy Systems, vol. 16(6), pp. 1462–1475, 2008
32. E. Lughofer, Single-Pass Active Learning with Conflict and Ignorance,
Evolving Systems, vol. 3,no.4, pp. 251-271, 2012
33. M.Pratama, S.Anavatti, J.Lu, Recurrent Classifier Based on an Incremental
Meta-cognitive-based Scaffolding Algorithm, IEEE Transactions on Fuzzy
Systems, Vol.23(6), pp. 2048-2066, 2015
34. I.Zliobaite, A.Bifet, B.Pfahringer, G.Holmes, ― Active Learning with
Drifting Streaming Data‖, IEEE Transactions on Neural Networks and
Learning Systems, Vol.25,no.1, pp.27-39, 2014
35. G. D. C. Cavalcanti, L. S. Oliviera, T. J. M. Moura, G. V. Calvarho, “
Combining diversity measures for ensemble pruning”, Pattern Recognition
Letters, Vol. 74, pp. 38-45, 2016
14
36. A. V. Lazo and P. Rathie, “On the entropy of continuous probability
distributions,” IEEE Trans. Inf. Theory, vol. 24, no. 1, pp. 120–122, Jan.
1978
37. P. Mitra, C. A. Murthy, and S. K. Pal, “Unsupervised feature selection
using feature similarity,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 24,
no. 3, pp. 301–312, Mar. 2002
38. A. Bifet, G. Holmes, R. Kirkby, and B. P. Fahringer, “MOA: Massive
online analysis,” Journal of Machine Learning Research, vol. 11, pp. 1601–
1604, May 2010
39. W. N. Street and Y. Kim, “A streaming ensemble algorithm (SEA) for
large-scale classification,” in Proceeding of 7th ACM SIGKDD, San
Francisco, CA, USA, 2001, pp. 377–38
40. P. Baldi, P. Sadowski, and D. Whiteson. “Searching for Exotic Particles in
High-energy Physics with Deep Learning.” Nature Communications, 5,
2014
41. A. Bouchachia, et al, DELA: A Dynamic Online Ensemble Learning
Algortihm, in European Symposium on Artificial Neural Networks,
Computational Intelligence and Machine Learning, pp. 491- 496, 2014
42. P. Angelov, R. Buswell, “ Identification of Evolving Fuzzy Rule-Based
Models”, IEEE Transactions on Fuzzy Systems, Vol. 10(5), pp. 667-677,
2002
43. N. Kasabov, and Q. Song, DENFIS: dynamic evolving neural-fuzzy
inference system and its application for time series prediction, IEEE
Transactions on Fuzzy Systems .vol10 (2).pp. 144–154. (2002)
44. P. Angelov, N. Kasabov, “Evolving Intelligent Systems, eIS”, IEEE SMC
eNewsletter, Vol.15, pp. 1-13, 2006
45. M.Pratama, S.Anavatti, E.Lughofer, GENEFIS: Towards an Effective
Localist Network, IEEE Transactions on Fuzzy Systems, Vol.2(3), pp.547562, (2014)
46. A. Lemos, W. Caminhas and F. Gomide, Multivariable Gaussian Evolving
Fuzzy Modeling System, IEEE Transactions on Fuzzy Systems, vol. 19 (1),
pp. 91--104, 2011
47. D. Dovzan, V. Logar and I. Skrjanc, Implementation of an Evolving Fuzzy
Model (eFuMo) in a Monitoring System for a Waste-Water Treatment
Process, IEEE Transactions on Fuzzy Systems, vol. 23 (5), pp. 1761--1776,
2015
48. J. A. Iglesias, A. Ledezma, A. Sanchis, “An ensemble method based on
evolving classifiers: eStacking ”, in IEEE Symposium on Evolving and
Autonomous Learning System, pp. 124-131, 2014
49. J.A Iglesias, A. Ledezma, A. Sanchiz, “Ensemble Method Based on
Individual Evolving Classifiers”, in 2013 Evolving and Adaptive
Intelligent Systems, pp. 78-83, 2013
50. L. Bueno, P. Costa, I. Mendes, E. Cruz, D. Leite, “Evolving ensemble of
fuzzy models for multivariate time series prediction”, FUZZ-IEEE 2015:
1-6
51. A. Bifet, G. Holmes, B. Pfahringer, R. Kirkby, R. Gavalda, “New ensemble
methods for evolving data streams”, Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data
mining, 2009
52. A. Fern, R. Givan, “Online Ensemble Learning: An Empirical Study”,
Machine Learning, Vol. 23(1)-(3), pp. 71-109, 2003
53. E. Ikomomovska, J. Gama, S. Dzeroski, “Online tree-based ensembles and
option trees for regression on evolving data streams”, Neurocomputing,
Vol. 150, pp. 458-470, 2015
| 2cs.AI
|
arXiv:1710.01612v2 [math.ST] 6 Jan 2018
Sensitivity of the Hermite rank
Shuyang Bai
Murad S. Taqqu
University of Georgia
Boston University
January 9, 2018
Abstract
The Hermite rank appears in limit theorems involving long memory. We show that an Hermite rank higher
than one is unstable when the data is slightly perturbed by transformations such as shift and scaling.
We carry out a “near higher order rank analysis” to illustrate how the limit theorems are affected by a
shift perturbation that is decreasing in size. We also consider the case where the deterministic shift is
replaced by centering with respect to the sample mean. The paper is a companion of Bai and Taqqu [2]
which discusses the instability of the Hermite rank in the statistical context.
1
Introduction
A stationary sequence {X(n)} with finite variance is said to have long memory or long-range dependence, if
Cov[X(n), X(0)] ≈ n2H−2
(1)
as n → ∞, where ≈ means asymptotic equivalence up to a positive constant1 , the parameter H ∈ (1/2, 1) is
called the Hurst index. See, e.g., the recent monographs Giraitis et al. [9], Beran et al. [3], Samorodnitsky
[22] and Pipiras and Taqqu [19] for more information on the notion long memory.
The study of the asymptotic behavior of partial sums of long-memory sequences has been of great interest
in probability and statistics. In particular, complete results have been obtained for the following class of
models called Gaussian subordination. Let {Y (n)} be a stationary Gaussian process with long memory in
the sense of (1), which we suppose to have mean 0 and variance 1 without loss of generality. Now consider
Key words: Long-range dependence; Long memory; Hermite rank; power rank; limit theorem; instability;
2010 AMS Classification: 62M10, 60F05
1 In
general, we can allow inserting a slowly varying factor (Bingham et al. [4]), e.g., a logarithmic function, in the asymptotic
relation (1), but we shall not do that for simplicity.
1
the transformed process
X(n) = G(Y (n)),
(2)
where G(·) : R → R is a function such that EX(n)2 = EG(Y (n))2 < ∞. The goal is to establish limit
theorems for the normalized sums of X(n), the transformed stationary process.
To develop the limit theorems, one has to use the notion of Hermite rank, which is an integer attached
to the function G(·). It is defined as follows. Let Z denote a standard Gaussian random variable and
let γ(dx) = φ(x)dx := (2π)−1/2 e−x
2
/2
dx denote its distribution. The Hermite rank is associated with the
orthogonal decomposition of G(·) in the space
Z
2
G(z) φ(z)dz < ∞
L (γ) = L (φ) = {G(·) : EG(Z) < ∞} = G(·) :
2
2
2
R
into Hermite polynomials, which are defined as H0 (x) = 1, H1 (x) = x, H2 (x) = x2 − 1, and more generally,
Hm (x) = (−1)m ex
2
/2
d −x2 /2
e
dxm
for
m ≥ 1.
(3)
Then { √1m! Hm (·), m ≥ 0} forms an orthonormal basis of L2 (γ) (see Pipiras and Taqqu [19], Proposition
5.1.3).
Definition 1.1. The Hermite rank k of G(·) ∈ L2 (γ) is defined as
Z
k = inf m ≥ 1 : EG(Z)Hm (Z) =
G(x)Hm (x)γ(dx) 6= 0 ,
(4)
R
where Hm (·) is the m-th order Hermite polynomial. Equivalently, k is the order of the first nonzero coefficient
in the L2 (γ)-expansion:
G(·) − EG(Z) =
that is, cm = 0 for m < k and ck 6= 0 where
cm =
∞
X
cm Hm (·),
m=k
E[G(Z)Hm (Z)]
m!
k ≥ 1,
(5)
for m ≥ 0.
(6)
The following celebrated results due to Dobrushin and Major [7], Taqqu [24] and Breuer and Major [5]
have been established involving the Hermite rank.
Theorem 1.2. Suppose that G(·) ∈ L2 (γ) has Hermite rank k ≥ 1. Then the following conclusions hold.
• Central limit case: suppose that 1/2 < H < 1 −
memory in the sense that
2
σ :=
∞
X
1
2k
(this implies k ≥ 2). Then {G(X(n))} has short
Cov[G(X(n)), G(X(0))]
n=−∞
converges absolutely and
1
N 1/2
[N t]
X
n=1
f.d.d.
G(X(n)) − EG(X(n)) −→ σB(t),
2
t ≥ 0,
(7)
f.d.d.
where −→ denotes convergence of the finite-dimensional distributions and B(t) is the standard Brownian
motion.
• Non-central limit case: suppose that 1 −
1
2k
< H < 1. {G(X(n))} has long memory with Hurst index:
1
,1 .
(8)
HG = (H − 1)k + 1 ∈
2
Furthermore, as N → ∞, we have2
1
N HG
[N t]
X
n=1
for some c 6= 0, and
ZH,k (t) =
Z
′
Rk
f.d.d.
G(X(n)) − EG(X(n)) −→ cZH,k (t),
Z
k
tY
0 j=1
H−3/2
(s − xj )+
is the so-called k-th order Hermite process, where
R′
Rk
ds B(dx1 ) . . . B(dxk ),
(9)
(10)
· B(dx1 ) . . . B(dxk ) denotes the k-tuple Wiener-Itô
integral with respect to the standard Brownian motion B(·) (Major [15]).
Bai and Taqqu [2] point out that despite the probabilistic interest of Theorem 1.2, its straightforward
application to large-sample statistical theories can be problematic. This is due to a strong instability feature
in the notion Hermite rank. This paper can be viewed as a technical companion to Bai and Taqqu [2]
containing some mathematical characterization of such instability and related problems. In particular, the
paper contains the following results:
1. The instability of the Hermite rank with respect to transformations including shift, scaling, etc.
2. A “near higher order rank” analysis of Theorem 1.2 perturbed by a diminishing shift.
3. Coincidence of Hermite rank and power rank (Ho and Hsing [11]) in the Gaussian case.
The third result is not closely related to the first two, but it is obtained as a direct byproduct of the analysis of
the instability problems. The paper is organized as follows: the results described above are stated in Sections
2, 3 and 4. Section 5 contain some auxiliary results involving analytic function theory. The theorems are
proved in Section 6.
Throughout the paper, aN ≪ bN means as N → ∞, aN /bN → 0, and aN ≈ bN means aN /bN → c for
some positive constant c > 0.
2
How a transformation affects the Hermite rank
First we state the results regarding the instability of the Hermite rank under transformation. Their relevance
is explained in Remark 2.4 which follows. The proofs are given in Section 6.
2 In
fact, we have weak convergence in the space D[0, 1] with uniform metric.
3
Recall that x is an accumulation point or limit point of a set E ⊂ Rp , if every neighborhood of x contains
an infinite number of elements of E. The so-called derived set E ′ consists of all the accumulation points of
E. For example, if E = {0} ∪ [1, 2), then E ′ = [1, 2].
Theorem 2.1 (Instability with respect to shift). Suppose that the measurable function G(·) : R → R is not
a.e. constant and G(· ± M ) ∈ L2 (γ) for some M > 0. Then G(· + x) ∈ L2 for all x ∈ [−M, M ], and the
interval (−M, M ) contains no accumulation point of the set
E = {x ∈ (−M, M ) : G(· + x) has Hermite rank ≥ 2},
namely, E ′ ∩ (−M, M ) = ∅.
Theorem 2.2 (Instability with respect to scaling). Suppose that the measurable function G : R → R is not
a.e. symmetric and G(· × M ) ∈ L2 (γ) for some M > 1. Then G(· × y) ∈ L2 for all y ∈ (0, M ], and the
interval (0, M ) contains no accumulation point of the set
E = {y ∈ (0, M ) : G(· × y) has Hermite rank ≥ 2},
namely, E ′ ∩ (0, M ) = ∅.
Remark 2.3. The requirement of G being non-symmetric in Theorem 2.2 is essential because any non-zero
symmetric function f ∈ L2 (γ) has Hermite rank 2 since due to the symmetry of the measure γ
Z
Z
f (z)zγ(dz) = 0,
f (z)H1 (z)γ(dz) =
R
R
while
Z
R
due to symmetry of γ.
2
f (z)(z − 1)γ(dz) =
Z
f (z)H2 (z)γ(dz) = 2
Z
∞
f (z)z 2 γ(dz) > 0
0
R
Remark 2.4. The preceding two theorems point to the instability of the Hermite rank. They imply, for
example, that the particular values x = 0 in Theorem 2.1 or y = 1 in Theorem 2.2 cannot be an accumulation
point of the set E with Hermite rank greater or equal to 2. Hence some neighborhood of x = 0 or y = 1
contains at most one point (x = 0 or y = 1) with Hermite rank k ≥ 2. This means that a slight level shift or
scale change (when the original transformation is non-symmetric) will force the rank to change from perhaps
being ≥ 2 to being 1. In the case of shift, this is stated as Theorem 2.14 in Bai and Taqqu [2]. Note that
the rank 2 of a non-constant symmetric function in Remark 2.3 is still unstable with respect to a level shift
by Theorem 2.1.
In addition, one can consider the shift and scaling joint together, namely, deal with an affine transformation.
Theorem 2.5 (Instability with respect to affine transformation). Suppose that the measurable G(·) is not
constant a.e. and G(±M1 + · × M2 ) ∈ L2 (γ). Then the set
E = {(x, y) ∈ (−M1 , M1 ) × (0, M2 ) : G(x + · × y) has Hermite rank ≥ 2}
4
has Hausdorff dimension (see Falconer [8], Section 2.2) not exceeding 1. So in particular, E has 0 twodimensional Lebesgue measure.
To illustrate Theorem 2.5, consider the function G(z) = z 2 = 1 + H2 (z) which has Hermite rank 2.
Suppose that it is perturbed by an affine transformation involving a shift x and a scale y and becomes
(x + zy)2 = x2 + 2xyz + y 2 z 2 = x2 + y 2 + (2xy)z + y 2 (z 2 − 1) = x2 + y 2 + (2xy)H1 (z) + y 2 H2 (z).
After centering, the centered function in z becomes (2xy)H1 (z) + y 2 H2 (z), which has Hermite rank 1 if and
only if x 6= 0 (it no longer has Hermite rank 2 as G(z) does) . The set E in Theorem 2.5 corresponds to the
one-dimensional line {(x, y) : x = 0} which has Lebesgue measure zero.
Finally, we can formulate an abstract result about the instability with respect to general nonlinear
transformations.
Theorem 2.6. Suppose that G ∈ L2 (γ) and let Fθ be a family of transformations parameterized by θ ∈ D ⊂
Rp , where D is an open region containing the origin 0 = (0, . . . , 0) and let F0 be the identity transformation.
Suppose that G is perturbed and becomes G ◦ Fθ .
Assume that G ◦ Fθ ∈ L2 (φ) for all θ ∈ D, Z is a standard normal random variable, and let
U (θ) := E[(G ◦ Fθ )(Z) × H1 (Z)] = E[(G ◦ Fθ )(Z) × Z].
be the first coefficient of the Hermite expansion of G ◦ Fθ , and assume that the following properties hold:
(a) U (θ) is real analytic in θ ∈ D;
(b) If U (θ) = 0 holds for all θ ∈ D, then G is constant a.e..
Then either G is constant a.e., or if not, then the set
E = {θ ∈ D : G ◦ Fθ has Hermite rank ≥ 2} = {θ ∈ D : U (θ) = 0}
has Hausdorff dimension not exceeding p − 1. In particular, E has zero p-dimensional Lebesgue measure.
Remark 2.7. Here is a more informative description of the set E in Theorem 2.5 and 2.6 above. First, E
is called the zero set of U if it consists of all θ ∈ D such that U (θ) = 0. Second, the zero set E = {θ ∈
D : U (θ) = 0} of a (multivariate) real analytic function U is called a real analytic variety. According to
Lojasiewicz’s Structure Theorem (Theorem 6.3.3 of Krantz and Parks [13]), E ⊂ Rp can be expressed as
a union of submanifolds of dimensions 0, 1, . . . , p − 1. We state here the results in terms of the Hausdorff
dimension for simplicity.
3
Being near a higher order Hermite rank
In the so-called near integration analysis of unit root (e.g., Phillips [18]), one studies the asymptotic behavior
of an autoregressive model when the autoregression coefficient tends to 1 (unit root) as the sample size
5
increases. Such analysis sheds lights on the situation where the coefficient is close to but not exactly 1. Here
in a similar spirit, we carry out a “near higher order rank” analysis for Theorem 2.1 regarding the limit
PN
theorem for the sum n=1 G(Y (n) + xN ), where the shift xN → 0 as the number of summands N → ∞.
The result is given in the following theorem, where c, ci ’s denote constants whose value can change from line
to line.
Theorem 3.1. Let {Y (n)} be a standardized stationary Gaussian process whose covariance satisfies (1) with
Hurst index H ∈ (1/2, 1). Suppose that the function G(·) is not constant a.e., G(· ± M ) ∈ L2 (γ) for some
M > 0, and has an Hermite rank k ≥ 1. Set
SN (xN ) =
N h
X
n=1
i
G(Y (n) + xN ) − EG(Y (n) + xN ) ,
where xN → 0.
• Central limit case: suppose that 1/2 < H < 1 −
1
2k
N (1/2−H)/(k−1) → 0 and
(if k = 1 this case does not exist). Then as N → ∞,
(a) if xN ≪ N (1/2−H)/(k−1) :
N −1/2 S[N t] (xN )
(b) if xN ≈ N
N
(1/2−H)/(k−1)
:
(c) if N (1/2−H)/(k−1) ≪ xN → 0:
(11)
−1/2
S[N t] (xN )
f.d.d.
−→ cB(t);
f.d.d.
−→ c1 ZH,1 (t) + c2 B(t);
f.d.d.
N −H x1−k
N S[N t] (xN ) −→ cZH,1 (t);
where the fractional Brownian motion ZH,1 (t) and the Brownian motion B(t) are independent.
• Non-central limit case: suppose that 1 −
1
2k
< H < 1. Let HG be as in (8). Then as N → ∞, N H−1 → 0,
and
(a) if 0 < xN ≪ N H−1 :
N −HG S[N t] (xN )
(b) if xN ≈ N
N
H−1
:
(c) if N H−1 ≪ xN → 0:
−HG
S[N t] (xN )
f.d.d.
−→ cZH,k (t);
Pk
−→
m=1 cm ZH,m (t);
f.d.d.
f.d.d.
N −H x1−k
N S[N t] (xN ) −→ cZH,1 (t);
where the Hermite processes ZH,m (t)’s are defined through the same Brownian motion in (10).
The terms ”central limit case” and ”non-central limit case” in the preceding theorem refer to the terminology used in Theorem 1.2 and thus to the type of limits one obtains when there is no shift, that is when
xN = 0.
Remark 3.2. Theorem 3.1 has some interesting implications. In the central limit case, the critical order
N (1/2−H)/(k−1) depends negatively on H. The larger H, the smaller the critical order. Thus the larger H
(but below 1 − 1/(2k)) is, the more easily the effect of a higher-order rank in the limit theorem gets surpassed
by a shift perturbation. In the non-central limit case, however, the relation is reversed since the critical order
N H−1 depends positively on H. Note that in the non-central limit case, the order N H−1 determining the
border of the regimes does not depend on the rank k
6
In Theorem 3.3 below, we provide a result on the non-centered sum
PN
n=1
G(Y (n) + xN ), assuming that
EG(Y (n)) = 0. It is expected that if xN tends to 0 too slowly, then a deterministic trend will appear in the
limit.
Theorem 3.3. Under the assumptions of Theorem 3.1, if in addition EG(Y (n)) = 0 and SN is replaced by
then the following conclusions hold:
SeN (xN ) =
• Central limit case: suppose that H < 1 −
1
2k .
(b) if xN ≈ N
G(Y (n) + xN ),
N −1/2 Se[N t] (xN )
:
(c) if N 1−1/(2k) ≪ xN → 0:
where ZH,k (t) and B(t) are independent.
• Non-central limit case: suppose that H > 1 −
N −1/2 Se[N t] (xN )
1
2k .
−→ cB(t)
f.d.d.
−→ c1 t + c2 B(t);
ct;
Let HG be as in (8). Then as N → ∞:
N −HG Se[N t] (xN )
(b) if xN ≈ N H−1 :
f.d.d.
f.d.d.
e
N −1 x−k
N S[N t] (xN ) −→
N −HG Se[N t] (xN )
(a) if 0 < xN ≪ N H−1 :
(12)
n=1
Then as N → ∞:
(a) if xN ≪ N −1/(2k) :
1−1/(2k)
N
X
f.d.d.
−→ cZH,k (t);
Pk
−→ c0 t + m=1 cm ZH,m (t);
f.d.d.
f.d.d.
e
N −1 x−k
N S[N t] (xN ) −→ ct;
(c) if N H−1 ≪ xN → 0:
where the Hermite processes ZH,m (t)’s are defined through the same Brownian motion in (10).
In the next theorem the argument xN in Theorem 3.3 is replaced by a subtracted sample mean.
Theorem 3.4. Under the assumptions of Theorem 3.3, assume in addition that G(·) is a polynomial. Let
PN
ȲN = N −1 n=1 Y (n). Then the following conclusions hold:
• Central limit case: suppose that H < 1 −
1
2k .
Then as N → ∞,
f.d.d.
N −1/2 Se[N t] (−ȲN ) −→ cB(t)
• Non-central limit case: suppose that H > 1 −
N
−HG
1
2k .
Let HG be as in (8). Then as N → ∞,
f.d.d.
Se[N t] (−ȲN ) −→
k
X
cm ZH,m (t)
m=1
where the Hermite processes ZH,m (t) ’s are defined through the same Brownian motion in (10).
Remark 3.5. As an example, one may take G(z) = z 2 in (12), which leads to the sample variance as
considered in Hosking [12] and Dehling and Taqqu [6]. See also Section 3.1 of Bai and Taqqu [2]. Comparing
Theorem 3.4 with Theorem 1.2, centering {Y (n)} by subtracting the sample mean may not affect the
fluctuation order of the sum, but can change the limit distribution.
The proofs of Theorem 2.1, 2.2, 2.5 and Theorems 3.1, 3.3 and 3.4 can be found in Section 6, and are all
based on the analysis of analytic functions.
7
4
On the coincidence of Hermite and power ranks
The Hermite rank has been defined in (4). We now define the power rank which is used in the approach of
Ho and Hsing [11] for limit theorems for transformations of long-memory moving-average processes. Given
a function G(·) and a random variable Y satisfying EG(Y )2 < ∞, let
G∞ (y) = EG(Y + y)
(13)
given that the expectation exists and suppose that G∞ (·) has derivatives of order sufficiently high. The
power rank of G(·) with respect to Y is defined as
inf{m ≥ 1 : G(m)
∞ (0) 6= 0},
(14)
(m)
where G∞ (y) denotes the m-th derivative of G∞ (y). The following fact was stated in Ho and Hsing [11]
without a detailed proof. It was proved by Lévy-Leduc and Taqqu [14] in the case where G(·) is a polynomial.
Proposition 4.1. Suppose that G(·) ∈ L2 (γ). Then the power rank in (14) coincides with the Hermite rank
(4) if Y is Gaussian.
Proof. Proposition 4.1 is a direct consequence of (17) below, namely,
∞
∞
(m)
X
X
G∞ (0) m
E[G(Z)Hm (Z)] m
x =
x ,
m!
m!
m=0
m=0
5
Auxiliary results
We prove here some auxiliary results involving the Weierstrass transform and analytic function theory.
Let Z denote throughout a standard Gaussian random variable and let φ = dγ/dx = (2π)−1/2 e−x
2
/2
denote its density. Define the function
G∞ (x) = EG(Z + x) =
Z
G(z + x)φ(z)dz =
Z
R
R
G(z)φ(z − x)dz,
(15)
whenever the integrability holds. The function G may not be smooth, but the function G∞ is smooth due
to the convolution with the smooth φ(z). G∞ is called the Weierstrass transform of G (see Hirschman and
Widder [10], Chapter VIII).
First we state some preliminary facts. Recall that a function f : Rp → R is real analytic over an open
domain D ⊂ Rp , if at every point y = (y1 , . . . , yp ) ∈ D, there exists a neighborhood B ⊂ D of y, such that
f (x1 , . . . , xp ) =
∞
X
i1 ,...,ip =1
ai1 ,...,ip (x1 − y1 )i1 . . . (xp − yp )ip
for some coefficient a(i1 , . . . , ik ), where the series converges absolutely in B. It is well-known that f is
infinitely differentiable, and common elementary operations including composition, affine transform, multiplication preserve analyticity. See, e.g., Krantz and Parks [13], Chapter 1.
8
Lemma 5.1.
(a) If g(· + a), g(· + b) ∈ L1 (φ), a < b, then
(a1) g(· + x) ∈ L1 (φ) for any a < x < b;
(a2) the Weierstrass transform Eg(Z + x) is a real analytic function in x ∈ (a, b).
(b) If g(· × c) ∈ L1 (φ), then g(· × y) ∈ L1 (φ) for any 0 < y < c.
Proof. (a) The first statement (a1) follows from the fact that φ(z − x) ≤ Aφ(z − a) + Bφ(z − b) for some
sufficiently large constants A, B > 0 by exploring the shape of φ. To obtain statement (a2), first as in item
2.2 of Hirschman and Widder [10] Chapter VIII, the Weierstrass transform (Wg)(x) := Eg(Z +x) = (g ∗φ)(x)
R
can be expressed by a bilateral Laplace transform (Lg)(x) := R e−zx g(z)dz as
1
(Wg)(x) = √
2π
Z
where g(z) = f (z)e−z
2
f (z)e−(x−z)
R
2
/2
2
/2
e−x /2
dz = √
2π
. Note that e−x
2
/2
Z
2
e(−x)(−z) [f (z)e−z
2
/2
R
e−x /2
(Lg)(−x),
]dz = √
2π
(16)
is analytic. Then the analyticity of Wg follows from the
analyticity of the bilateral Laplace transform Lg. See Widder [25] Chapter VI, p.140. The statement (b)
R
follows from φ(x/y) ≤ Cφ(x/c) for some sufficiently large constant C > 0, because R |g(xc)|φ(x)dx =
R
c−1 R |g(x)|φ(x/c)dx < ∞
Lemma 5.2. Suppose G ∈ L2 (φ). Then E|G(Z + x)| < ∞, namely, G(x + ·) ∈ L1 (φ), for all x ∈ R.
Furthermore, G∞ (x) in (15) admits the analytic expansion
G∞ (x) =
∞
∞
(m)
X
X
G∞ (0) m
x =
cm xm ,
m!
m=0
m=0
(17)
(m)
where G∞ is the m-th derivative of G∞ and
cm =
E[G(Z)Hm (Z)]
m!
are the coefficients of the Hermite expansion in (6).
If in addition, G(· ± M ) ∈ L2 (φ), M > 0, then
G(m)
∞ (x) = E[G(Z + x)Hm (Z)],
|x| < M,
m = 0, 1, 2, . . . .
(18)
Proof. Let Hm (x)’s be the Hermite polynomials defined in (3). Then by the Cauchy-Schwartz inequality
and Corollary 5.1.2 of Pipiras and Taqqu [19], one has for any x ∈ R that
Z
∞
∞
∞
X
X
X
|x|m
|x|m
|x|m
√
kGkL2 (φ) kHm kL2 (φ) = kGkL2 (φ)
|G(z)Hm (z)|φ(z)dz ≤
<∞
m! R
m!
m!
m=1
m=1
m=1
since kHm kL2 (φ) =
√
m!. By Proposition 1.4.2 of Nourdin and Peccati [17], one has
∞
X
xm
Hm (z) = exp(−(z − x)2 /2 + z 2 /2).
m!
m=0
9
(19)
So
Z
Z
Z
∞
X
xm
−(z−x)2 /2+z 2 /2
G(z)φ(z − x)dz = G∞ (x),
G(z)e
φ(z)dz =
G(z)Hm (z)φ(z)dz =
m! R
R
R
m=0
where the change of the order between the sum and the integral in the first equality can be justified by (19)
and Fubini’s Theorem. This shows that G∞ has the desired expansion (17). Note that the same computation
R
as above with G replaced by |G| shows that E|G(Z + x)| = R |G(z)|φ(z − x)dz < ∞ by (19).
The formula (18) follows from
Z
Z
Z
d
d
(m)
G∞ (x) = m
G(z) m φ(z − x)dz = G(z)Hm (z − x)φ(z − x)dx
G(z)φ(z − x)dz =
dx
dx
R
R
by (3), where the differentiation under the integral can be justified by the Dominated Convergence Theorem
and the Mean Value Theorem as in the proof of Lemma 5.5 below.
Lemma 5.3 (Uniqueness of Weierstrass transform). If f ∈ L1 (φ) and the convolution f ∗ φ = 0 a.e., then
f = 0 a.e..
Proof. First, express as in (16) the Weierstrass transform by a bilateral Laplace transform. Then the
conclusion follows from the uniqueness of the bilateral Laplace transform. See Widder [25] Chapter VI,
Theorem 6b.
Lemma 5.4. Suppose that G(· × M ) ∈ L2 (φ) for some M ∈ (1, +∞). Then E|G(yZ)Z| < ∞ and
F (y) := EG(yZ)Z
is an analytic function in y ∈ (0, M ).
Proof. Since φ(t/y) ≤ cφ(t/M ) for some constant c > 0,
Z
Z
Z
1
E|G(yZ)Z| =
|G(yz)z|φ(z)dz = 2
|G(t)t|φ(t/y)dt ≤ C
|G(M z)z|φ(z)dz,
y R
R
R
and hence by Cauchy-Schwartz,
E|G(yZ)Z| ≤ CkG(· × M )kL2 (φ) < ∞
for some constant C > 0 depending only on y. Next applying the change of variable u = (yz)2 on z ≥ 0 and
on z < 0, we have
F (y) = EG(yZ)Z =
Z
2
1
e−z /2
√
dz =
zG(yz) √
2π
2y 2 2π
R
Z
0
∞
[G(u1/2 ) − G(−u1/2 )] exp[−u(2y 2 )−1 ]du . (20)
The integral in (20) is a Laplace transform evaluated at (2y 2 )−1 . The Laplace transform is real analytic
over the the open half interval where the integrability holds (Widder [25] Chapter II, Theorem 5a). The
function y −2 is also analytic in y ∈ (0, M ). The conclusion then follows since elementary operations preserve
analyticity.
10
Lemma 5.5. Let D = (−M1 , M1 ) × (0, M2 ), M1 > 0, M2 > 1. Suppose that g is a measurable function
such that g(±M1 + · × M2 ) ∈ L2 (φ). Then the function
Z
(u − x)2
g(u) exp −
f (x, y) :=
du
2y 2
R
is real analytic over (x, y) ∈ D.
Proof. The assumption implies that
g(x + · × y) ∈ L2 (φ)
(21)
for all (x, y) ∈ D by Lemma 5.1. By Theorem 1 of Siciak [23], one needs to show that
(1) f is C ∞ (infinitely smooth);
(2) f is univariately analytic along any direction at an arbitrary point (x0 , y0 ) ∈ D.
For part (1), we need to check that the partial derivatives of all orders of f (x, y) exist and are continuous.
First, the derivatives with respect to x and y can be taken under the integral sign by applying the Dominated
Convergence Theorem and the Mean Value Theorem with the help of the following facts which are justified
afterwards:
1. For any integers i, j ≥ 0,
(u − x)2
(u − x)2
∂ i+j
−1
exp(−
)
=
Q(u,
x,
y
)
exp(−
)
∂xi ∂y j
2y 2
2y 2
for some trivariate polynomial Q(x1 , x2 , x2 ).
2. For any x0 ∈ R and small δ > 0, there exists a polynomial Q∗ with non-negative coefficient such that
sup
|x−x0 |≤δ
|Q(u, x, y −1 )| ≤ Q∗ (|u|, |y|−1 );
A similar bound holds for sup|y−y0 |≤δ |Q(u, x, y −1 )|.
2
3. If δ is chosen sufficiently small so that exp(− 4δ
y 2 ) ≥ 1/2, then
sup
|x−x0 |≤δ
exp(−
(u − x0 + δ)2
(u − x0 − δ)2
(u − x)2
)
≤
exp(−
)
+
exp(−
),
2y 2
2y 2
2y 2
and for any δ > 0,
sup
|y−y0 |≤δ
exp(−
(u − x + δ)2
(u − x + δ)2
)
=
exp(−
).
2y 2
2(y0 + δ)2
4. For any integer n ≥ 0 and polynomial Q,
Z
(u − x)2
|g(u)|Q(|u|) exp(−
)du < ∞
2y 2
for all (x, y) ∈ D.
11
Item 1 can be verified easily by induction and the elementary differentiation rules.
To see Item 2, write the polynomial as Q(u, x, v) = a0 (x) + a1 (x)u + a2 (x)v + . . .. So |Q(u, x, v)| ≤
|a0 (x)| + |a1 (x)u| + |a2 (x)v| + . . .. Note that each coefficient |ai (x)| is a continuous function. Over a compact
interval [x0 − δ, x0 + δ], each |ai (x)| is bounded by a positive constant. Replacing |ai (x)|’s by these constants
yields the conclusion.
2
For Item 3, the maximum of the function exp(− (u−x)
2y 2 ) in x over the interval [x0 − δ, x0 + δ] can be either
2
1 if u ∈ [x0 − δ, x0 + δ], or exp(− (u−x2y02±δ) ) otherwise. In the case where u ∈ [x0 − δ, x0 + δ], by the choice
of δ described in Item 3 and |u − x0 ± δ| ≤ 2δ, we have
exp(−
(u − x0 + δ)2
(u − x0 − δ)2
) + exp(−
) ≥ 1/2 + 1/2 ≥ 1;
2
2y
2y 2
2
2
(u−x0 +δ)
0)
in the case where u ∈
/ [x0 − δ, x0 + δ], e.g., if u < x0 − δ, then one has exp(− (u−x
) by
2y 2 ) ≤ exp(−
2y 2
monotonicity. The second inequality follows easily from monotonicity.
To obtain Item 4, by Cauchy-Schwartz and (21), we have
Z
(u − x)2
)du ≤ y(2π)1/2 [Eg(x + yZ)2 ]1/2 [EQ(|x + yZ|)2 ]1/2 < ∞
|g(u)|Q(|u|) exp(−
2y 2
Continuity of f (x, y) can as well be verified using Dominated Convergence and the facts 2∼4 above.
To check claim (2), set x(t) = x0 + at, y = y0 + bt where (a, b) ∈ R2 satisfying a2 + b2 = 1. Suppose that
(x(t), y(t)) ∈ D when |t| < δ , where δ > 0 will be adjusted smaller if necessary later. We want to check the
real analyticity of
(u − x0 − at)2
f (t) := f (x(t), y(t)) =
g(u) exp −
du.
2(y0 + bt)2
R
Z
(22)
at t = 0. Note that the function
(u − x0 − az)2
h(u, z) := exp(A(u, z)) := exp −
2(y0 + bz)2
is complex analytic in z ∈ Bδ := {z ∈ C : |z| < δ} for each fixed u ∈ R since y0 + bz 6= 0. Next, by choosing
δ small enough, one can ensure that for some constant c, µ > 0 sufficiently large and σ ∈ (0, M2 ), such that
Re[A(u, z)] = −
−y02 u2 + Re[. . .]
−u2 + Re[. . .]
Re[(u − x0 − az)2 (y0 + bz̄)2 ]
=
=
.
1/2
1/2
2|y0 + bz|4
2|y0 + bz|4
2|y0 + bz/y0 |4
(23)
Since y0 ∈ (0, M2 ) and |z| < δ where δ is sufficiently small, there exists σ ∈ (0, M2 ), so that
1/2
|y0
1/2
+ bz/y0 |4 ≥ σ 2
(24)
for all |z| < δ. On the other hand, the bracket [. . .] in (23) is of the form
c1 (z, z̄, x0 )u + c0 (z, z̄, x0 ),
where c1 and c0 are polynomials. For all |z| < δ, one has for some large µ, c > 0 that
Re[. . .] ≤ |c1 (z, z̄, x0 )||u| + |c0 (z, z̄, x0 )| ≤ 2µ|u| − µ2 + 2σ 2 c
12
(25)
Combining (23), (24) and (25), one has
Re[A(u, z)] ≤
−u2 + 2µ|u| − µ2
+c
2σ 2
Hence for some constant C > 0,
In
R
|h(u, z)| = exp(Re[A(u, z)]) ≤ C[exp −(u2 + µ)2 /(2σ 2 ) + exp −(u2 − µ)2 /(2σ 2 ) ],
R
z ∈ Bδ .
(26)
|g(u)h(u, z)|du, replace |h(u, z)| by the preceding bound (26), and note that g(±µ + · × σ) ∈ L1 (φ) for
any µ ∈ R and σ ∈ (0, M ) by Lemma 5.1 (b) and Lemma 5.2. Then one deduces that
Z
sup
|g(u)h(u, z)|du < ∞.
z∈Bδ
R
This fact with Fubini’s Theorem justifies the following order change of integrals:
I
I
Z
Z
I
f (z)dz =
dz g(u)h(u, z)du =
g(u)du
h(u, z)dz = 0,
∆
∆
R
R
∆
where ∆ is a closed triangle within Bδ , and the last equality is due to Cauchy’s theorem since h(u, z) is
complex analytic in z ∈ Bδ . Then the complex analyticity of f (z) over Bδ follows from Morera’s Theorem
(Theorem 10.17 of Rudin [21]). Restricting Bδ to Im(z) = 0 yields the real analyticity.
6
Proof of the theorems
We prove here Theorems 2.1, 2.2, 2.5 involving the instability of the Hermite rank and and Theorems 3.1,
3.3 and 3.4 involving ”near higher order rank”.
Proof of Theorem 2.1. Suppose that the function G is not a.e. constant. Define E = {x ∈ (−M, M ) : G(· +
x) has Hermite rank ≥ 2}. Note first that we have E = {x ∈ (−M, M ) :
(1)
G∞ (x) = 0} in view of
Lemma 5.2 applied to G(· + x). Indeed, since the Hermite rank of G(· + x) is greater than 1, we have
(1)
G∞ (x) = EG(Z + x)H1 (Z) = 0. Now suppose by contradiction that E has an accumulation point in
(1)
(−M, M ). Since G∞ is analytic by Lemma 5.2, so is the derivative G∞ (x). By Rudin [20] Theorem 8.5,
(1)
G∞ is identically zero on (−M, M ) and hence G∞ is a constant on (−M, M ). But by (15), G∞ = G ∗ φ.
By Lemma 5.3 and linearity, G is a.e. a constant as well which contradicts the theorem assumption.
Proof of Theorem 2.2. Suppose that the function G is not a.e. symmetric. Now the set with Hermite rank
≥ 2 is E = {y ∈ (0, M ) : F (y) := EG(yZ)Z = 0}. The proof is similar to that of Theorem 2.1 above.
Suppose by contradiction that E has an accumulation point in (0, M ). Since F is analytic on (0, M ) by
Lemma 5.4, so F (y) is identically zero on (0, M ). Then we apply the uniqueness of the Laplace transform
(Widder [25] Chapter II, Theorem 6.3) to relation (20) to conclude that G(z) = G(−z) a.e., which contradicts
the assumption.
13
Proof of Theorem 2.5. Define
F (x, y) = E[ZG(x + yZ)].
As before E = {(x, y) ∈ D : F (x, y) = 0}. By a change of variable z = (u − x)/y we can write
Z
1
(u − x)2
F (x, y) = √
(u − x)G(u) exp −
du.
2y 2
y 2 2π R
(27)
Then F (x, y) is a bivariate real analytic function by Lemma 5.5 since (±M1 + M2 u)G(±M1 + M2 u) ∈ L2 (φ)
by Cauchy-Schwartz. If F (x, y) ≡ 0, which implies F (x, 1) ≡ 0, then the Hermite rank of G(· + x) is greater
than 1 for all x ∈ (−M1 , M1 ), which contradicts Theorem 2.1. So F (x, y) is not identically zero. The claimed
properties of E, the zero set of the analytic F , then follow from Mityagin [16] (see also Krantz and Parks
[13], Section 4.1).
Proof of Theorem 2.6. If G is not a constant a.e., by assumption (b), the analytic U (θ) is not identically
zero on D. So taking into account assumption (a), the zero set E has the claimed properties by Mityagin
[16].
Proof of Theorem 3.1. First by the Hermite expansion (5) we can write:
∞
X
G(Z + xN ) =
cm (xN )Hm (Z),
(28)
m=0
We set as in (15) that G∞ (xN ) = EG(Z + xN ), where Z ∼ N (0, 1). In view of Lemma 5.2, we have
cm (xN ) =
1
1 (m)
EG(Z + xN )Hm (Z) =
G (xN ).
m!
m! ∞
and
F∞ (xN ) := EG(Z + xN )2 =
∞
X
cm (xN )2 EHm (Z)2 =
m=0
∞
X
cm (xN )2 m!.
(29)
m=0
(1)
k−1
Since G has Hermite rank k, in view of Lemma 5.2 we have G∞ (0) = . . . = G∞
(0) = 0 6= Gk∞ (0). By
the analytic expansion,
(k)
G∞ (xN ) =
and
G(m)
∞ (xN ) =
where
G∞ (0) k
xN + O(xk+1
N )
k!
dm G
1
k−m
(xN ) =
gk xN
+ O(xk−m+1
),
N
m
dx
(k − m)!
m = 1, . . . , k,
gk = G(k)
∞ (0).
Then
S[N t] (xN ) =
[N t] h
X
n=1
i
G(Y (n) + xN ) − EG(Y (n) + xN )
= AN (t) + BN (t) + CN (t) + DN (t) + H.O.T. = AN (t) + BN (t) + RN (t) + H.O.T.
14
(30)
In (30),
[N t]
k−1
X
X
X
gk
gk
k−1 H
k−m H[m]
1
1
AN (t) = (xN
N )
Hk (Y (n))
Y (n) , BN (t) =
(xN
N
)
(k − 1)! N H n=1
(k
−
m)!
N H[m] n=1
m=2
[N t]
[N t]
∞
X
X
X
1
gk
CN (t) = N H[k] H[k]
Hk (Y (n)) , DN (t) =
cm (xN )
Hm (Y (n)), RN (t) = CN (t) + DN (t),
k! N
n=1
n=1
m=k+1
[N t]
(31)
where
Pb
m=a
H[m] = max (H − 1)m + 1, 1/2 ,
(32)
. . . is understood as zero if a > b, and H.O.T. stands for a higher-order term that will be asymptotically
negligible as N → ∞ after suitable normalization. In (31), the expressions within a bracket [ · ] converge
in distribution and their variances also converge. See, e.g., Pipiras and Taqqu [19], Chapter 5. The term
AN (t) involves the first Hermite polynomial since H1 (Y ) = Y ; the term BN (t) involves the second up to
the (k − 1)th Hermite polynomial; the term CN (t) involves the kth Hermite polynomial; the term DN (t)
involves all the Hermite polynomials of orders higher than k. RN (t) involves the terms m ≥ k in (28).
We assume for simplicity that H 6= 1/(2m), m = 1, . . . , k. Otherwise the proof undergoes a slight
P[N t]
modification involving an logarithmic factor. We have to consider the behavior of n=1 Hm (Y (n)) for all
m ≥ 1. Let
k0 = sup{m ∈ Z+ : H > 1 − 1/(2m)}.
(33)
In view of (33), when m > k0 the central limit theorem in Theorem 1.2 holds and when m < k0 it is the
non-central limit theorem that holds. Alternatively, the central limit theorem holds when H < 1 − 1/(2k)
and the non-central limit theorem holds when H > 1 − 1/(2k).
• Consider first the central limit case where H < 1 − 1/(2k).
k−1 H
In this case, AN (t) is associated with the order xN
N and RN (t) is associated with the order N 1/2 .
We now focus on BN (t) and claim that it is asymptotically negligible compared with either AN (t) or RN (t),
namely,
k−m H[m]
k−1 H
xN
N
≪ max(xN
N , N 1/2 ),
m = 2, . . . , k − 1.
(34)
Indeed, when m > k0 , this is obvious since H[m] = 1/2; Suppose now m ≤ k0 . In this case, H[m] =
k−m H[m]
(H − 1)m + 1. However, in cases (a) and (b), where xN ≪ or ≈ N (1/2−H)/(k−1) , the factor xN
N
has
an exponent bounded by
(m − 1)k
k + m − 2km
1
(1/2 − H)(k − m)
+ (H − 1)m + 1 =
H+
+1< ,
k−1
k−1
2(k − 1)
2
(35)
where the last inequality can be obtained by plugging in the inequality H < 1 − 1/(2k) and some elementary computation. Hence in cases (a) and (b), the relation (34) is proved. In the case (c) where xN ≫
15
k−m (H−1)m+1
k−1 H
N (1/2−H)/(k−1) , it can be checked that xN
N
≪ xN
N using the inequality
1/2−H
k−1
> H − 1,
and the latter inequality follows from H < 1 − 1/(2k). We have thus proved (34) and hence BN (t) is
asymptotically negligible. We are left with AN (t) and RN (t).
The different asymptotic regimes in the central limit case in Theorem 3.1 come about when comparing
k−1 H
the order xN
N of AN (t) with the order N 1/2 of RN (t) = CN (t) + DN (t). But we also have to deal with
the convergence of the processes. By Bai and Taqqu [1], we have the joint convergence
[N t]
[N t] ∞
X
X X gm
1
1
f.d.d.
Y (n), 1/2
Hm (Y (n)) −→ (c1 ZH,1 (t), c2 B(t))
H
N n=1
m!
N
n=1
(36)
m=k
where the fractional Brownian motion ZH,1 (t) and the Brownian motion B(t) are independent. From (36)
we set
′
RN
(t) =
[N t] ∞
XX
n=1 m=k
gm
Hm (Y (n)),
m!
which is RN (t) with xN = 0.
′
We cannot use (36) directly because we have RN (t) instead of RN
(t). We thus need to compare them
first. Since Y (n) is standardized, we have |γY (n)|m ≤ |γY (n)|k if m ≥ k, where γY (n) = Cov[Y (n), Y (0)].
Thus by a computation similar to those on p.299 of Pipiras and Taqqu [19] using the orthogonality of the
Hermite polynomials,
′
E|RN (t) − RN
(t)|2 =
X
m>K
≤ (N t)
m!(cm (xN ) − cm (0))2
∞
X
n=−∞
|γY (n)|k
!
X
([N t] − |n|)γY (n)m
|n|<[N t]
∞
X
m=k
m!(cm (xN ) − cm (0))2 .
(37)
Note that for a K > k,
∞
X
m=k
m!(cm (xN ) − cm (0))2 ≤
Recall F∞ (x) =
P∞
m=0
K
X
m=k
m!(cm (xN ) − cm (0))2 + 2
X
m!(cm (xN )2 + cm (0)2 ).
(38)
m>K
m!cm (x)2 in (29), which is analytic in view of Lemma 5.1. Hence
X
m>K
2
m!cm (xN ) = F∞ (xN ) − F∞ (0) + F∞ (0) −
K
X
m!cm (xN )2 .
m=0
(m)
As N → ∞, by the continuity of F∞ and cm (x) = G∞ (x)/m!, we have
X
m>K
m!cm (xN )2 →
X
m!cm (0)2 .
(39)
m>K
Take the limit N → ∞ in (38) using (39) and the continuity of cm , the right-hand side of (38) is only left
P
with the term 2 m>K m!cm (0)2 , which tends to 0 as K → ∞. Combining this with (37), we have
′
lim N −1 E|RN (t) − RN
(t)|2 = 0.
N →∞
16
(40)
It thus follows from (36) that
[N t]
[N t]
X
X
1
1
f.d.d.
Y (n), 1/2
RN (t) −→ (c1 ZH,1 (t), c2 B(t)) .
N H n=1
N
n=1
k−1 H
In case (a), we have xN
N ≪ N 1/2 and thus as N → ∞, AN (t) is negligible compared to RN (t) and
f.d.d.
k−1 H
thus we get N −1/2 RN (t) −→ c2 B(t). In case (c), xN
N ≫ N 1/2 and the limit is c1 ZH,1 (t). In case (b),
k−1 H
where xN
N ≈ N 1/2 , both limits appear. Finally, note that N −H x1−k
N AN (t) is proportional to the first
component on the left-hand side of (36), while by (40), the term N −1/2 RN (t) can be asymptotically replaced
′
by N −1/2 RN
(t), which is the second component on the left-hand side of (36). The rest of the proof in the
central limit case can be carried out easily.
1
2k .
• Now we consider the non-central limit case where H > 1 −
P[N t]
of n=1
Hm (Y (n)) for all m ≥ 1.
We have to study, as before, the behavior
We first consider the terms AN (t), BN (t) and CN (t) which involve m ≤ k. In this case, we have the
following relation: any n, m ∈ Z+ ,
k−m (H−1)m+1
k−n (H−1)n+1
xN
N
≪ xN
N
⇐⇒ xN ≪ N H−1 ,
which holds with ≪ replaced by ≈ or ≫ as well.
Hence in case (a), the term AN (t) in (30) contributes; in case (b), the terms AN (t), BN (t) and CN (t) all
contribute; in case (c), the term CN (t) contributes.
We shall show below that the term DN (t), which involves m > k, is negligible. Set γY (n) = Cov(Y (n), Y (0)) ≈
n2H−2 . By a similar computation as in (37),
EDN (t)2 =
X
m!cm (xN )2
m>k
X
([N t] − |n|)γY (n)m .
(41)
X
n(2H−2)(k+1) ≤ c2 (N t)2H[k+1] ,
(42)
|n|<[N t]
For an arbitrarily small ǫ > 0, we have for m > k that
X
([N t] − |n|)γY (n)m ≤ c1 (N t)
|n|<[N t]
|n|<[N t]
for some constants c1 , c2 > 0. where H[m] is as in (32). Since H[k + 1] < H[k] when H > 1 − 1/(2k), in
view of (41), (42) and (29),
EDN (t)2 ≤ c2 (N t)2H[k+1] F∞ (xN ) ≪ N 2H[k] ≈ ECN (t)2 .
So the order of DN (t) is always dominated by that of CN (t). So we only need to focus on AN (t), BN (t) and
CN (t). Then the rest of the proof can be carried out using the following consequence of Bai and Taqqu [1]:
[N t]
X
1
f.d.d.
H
(Y
(n)),
m
=
1,
.
.
.
,
k
−→
c
Z
(t),
m
=
1,
.
.
.
,
k
(43)
m
m H,m
N (H−1)m+1 n=1
where the Hermite processes ZH,m (t)’s are defined through the same Brownian motion in (10).
17
Proof of Theorem 3.3. The proof is done as the proof of Theorem 3.1 based on (36) and (43), and we thus
only provide an outline. By Taylor expansion of G∞ in (17), and since EG(Y (n)) = g0 = G∞ (0) = 0 and
the Hermite rank is k, we have
EG(Y (n) + xN ) = G∞ (xN ) =
gk k
x + O(xk+1
N ).
k! N
Adding the leading term above to (30), we have
Se[N t] (xN ) = ZN (t) + AN (t) + BN (t) + CN (t) + DN (t) + H.O.T. = ZN (t) + AN (t) + BN (t) + RN (t) + H.O.T.
(44)
where
ZN (t) =
gk k
(x [N t]) + H.O.T.
k! N
In the central limit case where H < 1 − 1/(2k), the term BN (t) is negligible compared to AN (t) and
k−1 H
RN (t) as in the proof of Theorem 3.1 above. We thus compare the orders xkN N of ZN (t), xN
N of AN (t)
k−1 H
and N 1/2 of RN (t). Indeed, if xN ≪ N −1/(2k) , then xkN N ≪ N 1/2 and xN
N ≪ N 1/2 , so only RN (t)
contributes; if xN ≈ N −1/(2k) , then xkN N ≈ N 1/2 and xkN N ≪ N 1/2 , so ZN (t) and RN (t) contribute; if
k−1 H
xN ≫ N −1/(2k) , then xkN N ≫ N 1/2 and xkN N ≫ xN
N , so only ZN (t) contributes.
A similar analysis can be carried out in the non-central limit case. As in the proof of Theorem 3.1,
the term BN (t) only contributes in the case xN ≈ N H−1 . The asymptotic regimes in the other cases are
k−1 H
determined by comparing the orders xkN N of ZN (t), xN
N of AN (t) and N (H−1)k+1 of CN (t).
Proof of Theorem 3.4. The proof is again similar to those of Theorem 3.1 and 3.3, and we thus only provide
an outline. Since G(·) is a polynomial, in (31) the ∞ in the sum defining DN (t) is replaced by a finite
integer. This is important since the arguments leading to (40) can no longer be applied.
The key is to note that −ȲN is associated with the order N H−1 , which replaces xN in all the terms
in (44). More precisely, in the central limit case where H < 1 − 1/(2k), comparing the order N k(H−1) of
ZN (t), the order N (k−m)(H−1)+H[m] of AN (t) and BN (t), 0 < m < k, and the order N 1/2 of RN (t), where
H[m] is as in (32), one can find that RN (t) is the contributing term. The conclusion then follows from (36)
and the Slutsky Lemma using the continuity of the coefficients cm (·). In the non-central limit case where
H > 1 − 1/(2k), we compare the order N k(H−1) of ZN (t), the order N k(H−1)+1 of AN (t), BN (t), CN (t),
0 < m ≤ k, and the order N H[k+1] of DN (t). In this case, the terms AN (t) and BN (t) contribute.
Acknowledgment. This work was partially supported by the NSF grant DMS-1309009 at Boston
University.
18
References
[1] S. Bai and M.S. Taqqu. Multivariate limit theorems in the context of longrange dependence. Journal
of Time Series Analysis, 34(6):717–743, 2013.
[2] S. Bai and M.S. Taqqu. How the instability of ranks under long memory affects large-sample inference.
To appear in Statistical Science, 2017.
[3] J. Beran, Y. Feng, S. Ghosh, and R. Kulik. Long-Memory Processes: Probabilistic Properties and
Statistical Methods. Springer, 2013.
[4] N.H. Bingham, C.M. Goldie, and J.L. Teugels. Regular Variation. Encyclopedia of Mathematics and
Its Applications. Cambridge University Press, 1989.
[5] P. Breuer and P. Major. Central limit theorems for non-linear functionals of Gaussian fields. Journal
of Multivariate Analysis, 13(3):425–441, 1983.
[6] H. Dehling and M.S. Taqqu. Bivariate symmetric statistics of long-range dependent observations. Journal of Statistical Planning and Inference, 28(2):153–165, 1991.
[7] R.L. Dobrushin and P. Major. Non-central limit theorems for non-linear functional of Gaussian fields.
Probability Theory and Related Fields, 50(1):27–52, 1979.
[8] K. Falconer. Fractal geometry: mathematical foundations and applications. John Wiley & Sons, 2004.
[9] L. Giraitis, H.L. Koul, and D. Surgailis. Large Sample Inference for Long Memory Processes. World
Scientific Publishing Company Incorporated, 2012.
[10] I.I. Hirschman and D.V. Widder. The Convolution Transform. Dover Books on Mathematics. Dover
Publications, 2005.
[11] H. Ho and T. Hsing. Limit theorems for functionals of moving averages. The Annals of Probability, 25
(4):1636–1669, 1997.
[12] J.R.M. Hosking. Asymptotic distributions of the sample mean, autocovariances, and autocorrelations
of long-memory time series. Journal of Econometrics, 73(1):261–284, 1996.
[13] S.G. Krantz and H.R. Parks. A Primer of Real Analytic Functions. Birkhäuser Boston, 2nd edition,
2002.
[14] C. Lévy-Leduc and M.S. Taqqu. Long-range dependence and the rank of decompositions. Fractal Geometry and Dynamical Systems in Pure and Applied Mathematics II: Fractals in Applied Mathematics,
601:289, 2013.
19
[15] P. Major. Multiple Wiener-Itô Integrals: With Applications to Limit Theorems. Lecture Notes in
Mathematics. Springer, 2 edition, 2014.
[16] B. Mityagin. The zero set of a real analytic function. arXiv preprint arXiv:1512.07276, 2015.
[17] I. Nourdin and G. Peccati. Normal Approximations With Malliavin Calculus: From Stein’s Method to
Universality. Cambridge Tracts in Mathematics. Cambridge University Press, 2012.
[18] P.C.B. Phillips. Towards a unified asymptotic theory for autoregression. Biometrika, pages 535–547,
1987.
[19] V. Pipiras and M.S. Taqqu. Long-range dependence and self-similarity, volume 45. Cambridge University
Press, 2017.
[20] W. Rudin. Principles of Mathematical Analysis. International series in pure and applied mathematics.
McGraw-Hill, 3 edition, 1976.
[21] W. Rudin. Real and complex analysis. Tata McGraw-Hill Education, 1987.
[22] G. Samorodnitsky. Stochastic Processes and Long Range Dependence. Springer, 2016.
[23] J. Siciak. A characterization of analytic functions of n real variables. Studia Mathematica, 3(35):293–297,
1970.
[24] M.S. Taqqu. Convergence of integrated processes of arbitrary Hermite rank. Probability Theory and
Related Fields, 50(1):53–83, 1979.
[25] D.V. Widder. The Laplace Transform. Dover books on mathematics. Dover Publications, 2010.
Shuyang Bai
Department of Statistics
University of Georgia
Athens, GA 30606
[email protected]
Murad S. Taqqu
Department of Mathematics and Statistics
Boston University
Boston, MA 02215
[email protected]
20
| 10math.ST
|
Submitted to the Annals of Statistics
arXiv: 1607.01434
arXiv:1607.01434v3 [math.ST] 26 Jul 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE
FUNCTION COMBINATIONS INCLUDING NEURAL
NETWORKS
By Jason M. Klusowski and Andrew R. Barron
Yale University
Let f ⋆ be a function on Rd satisfying a spectral norm condition.
1/4
For various noise settings, we show that Ekfˆ − f ⋆ k2 ≤ vf ⋆ logn d
,
where n is the sample size and fˆ is either a penalized least squares
estimator or a greedily obtained version of such using linear combinations of ramp, sinusoidal, sigmoidal or other bounded Lipschitz ridge
functions. Our risk bound is effective even when the dimension d is
much larger than the available sample size. For settings where the dimension is larger than the square root of the sample size this quantity
1/2
is seen to improve the more familiar risk bound of vf ⋆ d log(n/d)
,
n
also investigated here.
1. Introduction. Functions f ⋆ in Rd are approximated using linear combinations of ridge functions with one layer of nonlinearities. These approximations are employed via functions of the form
(1.1)
fm (x) = fm (x, ζ) =
m
X
k=1
ck φ(ak · x + bk ),
which is parameterized by the vector ζ, consisting of ak in Rd , and bk , ck
in R for k = 1, . . . , m, where m ≥ 1 is the number of nonlinear terms.
The functions φ are allowed to be quite general. For example, they can be
bounded and Lipschitz, polynomials with certain controls on their degrees,
or bounded with jump discontinuities. It is useful to view the representation
(1.1) as
X
(1.2)
βh h(x),
h∈H
Primary 62J02, 62G08; secondary 68T05
Keywords and phrases: Nonparametric regression; nonlinear regression; neural networks; penalization; machine learning; high dimensional data analysis; learning theory;
generalization error; supervised learning; greedy algorithms; big data
1
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
2
where H is a library of candidate basis or activation functions of the form
h(x) = φ(θh · x) and the βh are non-negative, where all but finitely many
are zero.
We can reduce (1.1) to (1.2) as follows. Suppose the library is symmetric
H = −H and contains the zero function. Without loss of generality, we
may assume that the ck are non-negative by replacing the associated φ with
φ sgnck , that by assumption also belongs to H. One can assume the internal
parameters ak · x + bk take the form θk · x by appending a one to x and bk
to ak . Note that now x and θk are (d + 1)-dimensional.
Suppose P is an arbitrary probability measure on [−1, 1]d . Let
R k · k be the
L2 (P ) norm induced by the inner product h·, ·i. Define vf ⋆ ,s = Rd kωks1 f˜(ω)dω,
for s ≥ 0.R If f ⋆ has a bounded domain in [−1, 1]d and a Fourier representation
f ⋆ (x) = Rd eiω·x f˜(ω)dω with vf ⋆ ,1 < +∞, it is possible to use approximating functions of the form (1.1) with a single activation function φ. Such
activation functions φ can be be general bounded monotone functions.
The following result from [2] provides a useful starting point for approximating general functions f ⋆ by linear combinations of such objects. Suppose vf ⋆ ,1
is finite. Then by [2], there exists an artificial neural network of the form
(1.1) with φ(x) = sgn(x) with kak k1 = 1 and |bk | ≤ 1 such that
kf ⋆ − fm k2 ≤
4vf2 ⋆ ,1
m
.
If φ has right at left limits −1 and +1, respectively, the fact that φ(τ x) →
sgn(x) as τ → +∞ allows one to use somewhat arbitrary activation functions
as basis elements. It is natural to impose a restriction on the size of the
internal parameters and to also enjoy a certain degree of smoothness not
offered by step functions. Thus we consider the result in [10], which allows
one to approximate f ⋆ by linear combinations of ramp ridge functions (also
known as first order ridge splines or hinging hyper-planes) (x · α − t)+ =
max{0, x · α − t}, with kαk1 = 1, |t| ≤ 1. These functions are continuous and
Lipschitz. In the supplementary material Supplement A we refine a result
from [10]. For an arbitrary target function f ⋆ with vf ⋆ ,2 finite, there exists
an approximation of the form (1.1) activated by ridge ramp functions with
kak k = 1 and |bk | ≤ 1 such that
⋆
2
kf − fm k ≤
16vf2 ⋆ ,2
m
.
The supplement also discusses refinements of these approximation bounds
and how one can reach similar conclusions with second order splines having
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
3
bounded internal parameters. The Lipschitz property of the ramp functions
yields smaller covering numbers and thus improved rates over that which
can be obtained using step functions. We define the set
Hramp = {x 7→ ±(α · x − t)+ : kαk1 = 1, |t| ≤ 1}.
We then set Framp to be the linear span of Hramp . In general, for a symmetric
collection of dictionary elements H = −H containing the zero function, we
let F = FH be the linear span of H. The variation vf = kf kH of f with
respect to H (or the atomic norm of f with respect to H) is defined by
(
)
X
+
lim inf kβk1 : fδ =
,
βh h and kfδ − f k ≤ δ, βh ∈ R
δ↓0 fδ ∈F
h∈H
P
where kβk1 = h∈H βh . For functions in F
PH , this variation picks out the
smallest kβk1 among representations f = h∈H βh h. For functions in the
L2 (P ) closure of the linear span of H, the variation is the smallest limit
of such ℓ1 norms among functions approaching the target. The subspace of
functions with kf kH finite is denoted L1,H .
R
Note that the condition Rd kωk21 |f˜(ω)|dω < +∞ ensures that f ⋆ belongs to
L1,Hramp and kf ⋆ kHramp ≤ vf ⋆ ,2 . Functions with moderate variation are particularly closely approximated. Nevertheless, even when kf ⋆ kH is infinite, we
express the trade-offs in approximation accuracy for consistently estimating
functions in the closure of the linear span of H.
In what follows, we assume h has L∞ norm at most one, h is Lipschitz
with Lipschitz constant at most one, and the internal parameters have ℓ1
norm at most Λ. This control on the size of the internal parameters will be
featured prominently throughout. In the case of ramp activation functions,
we are content with the assumption Λ = 2. Note that if one restricts the
size of the domain and internal parameters (say, to handle polynomials), the
functions h are still bounded and Lipschitz but with possibly considerably
worse constants.
Suppose data {(Xi , Yi )}ni=1 are independently drawn from the distribution of
(X, Y ). To produce predictions of the real-valued response Y from its input
X, the target regression function f ⋆ (x) = E[Y |X = x] is to be estimated.
The function f ⋆ is assumed to be bounded in magnitude by a positive constant B. We assume the noise ǫ = Y − f ⋆ (X) has moments (conditioned
on X) that satisfy a Bernstein condition with parameter η > 0. That is, we
assume
1
k = 3, 4, . . . ,
E(|ǫ|k |X) ≤ k!η k−2 V(ǫ|X),
2
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
4
where V(ǫ|X) ≤ σ 2 . This assumption is equivalent to requiring that E(e|ǫ|/ν |X)
is uniformly bounded in X for some ν > 0. A stricter assumption is that
2
E(e|ǫ| /ν |X) is uniformly bounded in X, which corresponds to an error distribution with sub-Gaussian tails. These two noise settings will give rise to
different risk bounds, as we will see.
The input design X is assumed to be a d-dimensional vector with subGaussian coordinates. This condition implies that kXk2∞ is on average bounded
by a constant multiple of log d. We will see that in our framework, estimators of f ⋆ are functions of training and test data. If one seeks to describe
the error of an estimator for f ⋆ evaluated at a new set of random points distributed according to P , the estimator is allowed to depend on the test data
and the sub-Gaussian coordinates can be shown to affect the rates below
only by a logarithmic factor in d. This paper will focus only on the ability of
an estimator to generalize to a new data set. For ease of analysis, we assume
that X is contained in the hyper-cube [−1, 1]d , i.e. the supremum norm of
X is at most one. No assumption is made about whether the coordinates of
X are independent.
Because f ⋆ is bounded in magnitude by B, it is useful to truncate an estimator fˆ at a level Bn at least B. Depending on the nature of the√noise ǫ,
we will see that Bn will need to be at least B plus a term of order log n or
log n. We define the truncation operator T that acts on function f in F by
T f = min{|f |, Bn }sgnf . Associated with the truncation operator is a tail
quantity
n
X
(|Yi |2 − Bn2 )I{|Yi | > Bn }
Tn = 2
i=1
that appears in the following analysis. Lemma 9 describes the finite sample
behavior of ETn .
The empirical mean squared
error of a function f as a candidate fit to the
P
observed data is (1/n) ni=1 (Yi − f (Xi ))2 . Given the collection of functions
F, a penalty penn (f ), f ∈ F, and data, a penalized least squares estimator
fˆ arises by optimizing or approximately optimizing
(1/n)
n
X
i=1
(Yi − f (Xi ))2 + penn (f )/n.
Our method of risk analysis proceeds as follows. Given a collection F of
candidate functions, we show that there is a countable approximating set F̃
of representations f˜, variable-distortion, variable-complexity cover of F, and
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
5
a complexity function Ln (f˜), with the property that for each f in F, there is
an f˜ in F̃ such that penn (f ) is not less than a constant multiple of γn Ln (f˜)+
∆n (f, f˜), where γn is a constant (depending on B, Bn , σ 2 , and η) and
∆n (f, f˜) is given as a suitable empirical measure of distortion (based on sums
of squared errors). The variable-distortion, variable-complexity terminology
has its origins in [6], [7], and [12]. The task is to determine penalties such
that an estimator fˆ approximately achieving the minimum of kY − f k2n +
penn (f )/n satisfies
(1.3)
EkT fˆ − f ⋆ k2 ≤ c inf {kf − f ⋆ k2 + Epenn (f )/n + EAf },
f ∈F
for some universal c > 1 and positive quantity Af that decays as n grows.
The quantity
inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }.
f ∈F
is an index of resolvability of f ⋆ by functions F with sample size n. We shall
take particular advantage of such risk bounds in the case that penn (f ) does
not depend on X. Our restriction of X to [−1, 1]d is one way to allow the
construction of such penalties.
The following table expresses the heart of our results, expressing valid penalties providing such risk bounds for moderate and high-dimensional situations.
Noise ǫ
λn &
sub-Gaussian / sub-exponential
2
γn
log(d+1)
penn (f )/n &
1/4
n
1/3
γn log(d+1)
n
1/2+1/(2(d+3))
dγn log(n/d+1)
n
zero
sub-Gaussian / sub-exponential
vf λn
(vf )4/3 λn
vf λn
Table 1: Penalties for Theorem 2
The results we wish to highlight are contained in the first two rows of Table
1. The penalties as stated are valid up to modest universal constants and
negligible terms that do not depend on the candidate fit. The quantity γn
is of order log2 n in the sub-exponential noise case, order log n in the subGaussian noise case and of constant order in the zero noise case. This γn (as
defined in Lemma 9) depends on the variance bound σ 2 , Bernstein parameter
η, the upper bound B of kf ⋆ kH , and the noise tail level Bn of the indicated
order.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
6
When f ⋆ belongs to L1,H , a resulting valid risk bound is a constant multiple
4/3
of kf ⋆ kH λn or kf ⋆ kH λn , according to the indicated cases. In this way the
λn expression provides a rate of convergence.
The classical risk bounds for mean squared error, involving d/n to some
power, are only useful when the sample size is much larger than the dimension. Here, in contrast, in the first two lines of Table 1, we see the dependence
on dimension is logarithmic, permitting much smaller sample sizes. The price
we pay for the smaller dependence on dimension is a deteriorated rate with
exponent 1/4 in general and 1/3 under a no noise assumption. The rates in
last row improve upon the familiar exponent of 1/2 to 1/2 + 1/(2(d + 3)).
Note that when d is large, this enhancement in the exponent is negligible.
√
The rate in the first row is better than the third approximately for d > n,
the second is better than the third row approximately for d > n1/3 , and
both of these first two rows have risk tending to zero as long as d < eo(n) .
For functions in L1,Hramp , an upper bound of ((d/n) log(n/d))1/2 for the
squared error loss is obtained in [3]. Using the truncated penalized ℓ1 least
squares estimator (1.3), we obtain an improved rate of order
((dγn /n) log(n/d))1/2+1/(2(d+3)) , where γn is logarithmic in n, using techniques that originate in [15] and [14], with some corrections here. A slightly
better rate with the d + 3 replaced by d + 1 in the denominator of the exponent can be achieved through more technical means, that we choose not
to put in the present paper to keep the length under control.
In an upcoming paper, the authors intend to show that this rate is almost
optimal in the Gaussian noise, uniform design setting, since we provide minimax rates between (1/n)1/2+1/(d+2) and (d/n)1/2+1/2(d+1) for functions in
L1,Hramp . Compare this with [20], where the mini-max L2 risk for functions
in L1,Hstep (i.e. function approximated by linear combinations of step ridge
functions) is determined to be between
(1/n)1/2+1/(2(d+1)) (log n)−(1+1/d)(1+2/d)(1+2/d)(2+1/d) and (log n/n)1/2+1/(2(2d+1)) .
These quantities have the attractive feature that the rate does not deteriorate as the dimension grows. However, they are only useful provided d/n
is small. In high dimensional settings, the available sample size might not
be large enough to ensure this condition. These results are all based on obtaining covering numbers for the library {x 7→ φ(θ · x) : kθk1 ≤ Λ}. If φ
satisfies a Lipschitz condition, these numbers are equivalent to ℓ1 covering
numbers of the internal parameters or of the Euclidean inner product of the
data and the internal parameters. The factor of d multiplying the reciprocal
of the sample size is produced from the order d log(Λ/ǫ) log cardinality of
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
7
the standard covering of the library {θ : kθk1 ≤ Λ}. What enables us to circumvent this polynomial dependence on d is to use an alternative cover of
{x 7→ x·θ : kθk1 ≤ Λ} that has log cardinality of order (Λ/ǫ)2 log(d+1). Misclassification errors for neural networks with bounded internal parameters
have been analyzed in [9] and [18].
In this paper we bound the mean squared error of function estimation, extending the results of [3], [4], [20], [15], [8], [7], [18], [11], [1], [21], [17].
2. Greedy Algorithm. The main difficulty with constructing an estimator that satisfies (1.3) is that it involves a dm-dimensional optimization.
Here, we outline a greedy approach that reduces the problem to performing m d-dimensional optimizations. This construction is based on the ℓ1 penalized greedy pursuit (LPGP) in [15], with the modification that the
penalty can be a convex function of the candidate function complexity.
Greedy strategies for approximating functions in the closure of the linear
span of a subset of a Hilbert space has its origins in [16] and and many of
its statistical implications were studied in [8] and [15].
Let f ⋆ be a function, not necessarily in F. Initialize f0 = 0. For m =
1, 2, . . . , iteratively, given the terms of fm−1 as h1 , . . . , hm−1 and the coefficients of it as β1,m−1
P
Pm, . . . , βm−1,m−1 , we proceed as follows. Let fm (x) =
m
β
h
(x)
=
j,m
j
j=1
j=1 βj,m φ(θhj · x), with the term hm in H chosen to
come within a constant factor c ≥ 1 of the maximum inner product with the
residual f ⋆ − fm−1 ; that is
hhm , f ⋆ − fm−1 i ≥
1
sup hh, f ⋆ − fm−1 i.
c h∈H
Define fm (x) = (1 − αm )fm−1 (x) + βm,m hm (x). Associated P
with this repm
resentation of fm is the ℓ1 norm of its coefficients vm =
j=1 |βj,m | =
(1 − αm )vm−1 + βm,m . The coefficients αm and βm,m are chosen so that
≤
inf
kf ⋆ − (1 − αm )fm−1 − βm,m hm k2 + w(vm )
α∈[0,1], β∈R+
[kf ⋆ − (1 − α)fm−1 − βhm k2 + w((1 − α)vm−1 + β)],
where w : R → R is a real-valued non-negative convex function. In the empirical setting, with Ri = Yi − fm−1 (Xi ), the high-dimensional optimization
task is to find θm such that
n
n
i=1
i=1
1X
1
1X
Ri φ(θm · Xi ) ≥
sup
Ri φ(θ · Xi )
n
c kθk1 ≤Λ n
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
8
One appealing aspect of the slight sub-optimality of θm is that it permits the
use of adaptive annealing techniques developed by the authors in a forthcomingPpaper [5]. The algorithm samples from a distribution proportional
n
1
to et( n i=1 Ri φ(θ·Xi )) p0P
(θ) which has, for t sufficiently large, a mean that is
1
1
at least c supkθk1 ≤Λ n ni=1 Ri φ(θ · Xi ).
Theorem 1. If fm is chosen according to the greedy scheme described
previously, then
4bf
⋆
2
⋆
2
kf − fm k + w(vm ) ≤ inf kf − f k + w(cvf ) +
,
f ∈F
m
where bf = c2 vf2 + 2vf kf ⋆ k(c + 1) − kf k2 . Furthermore,
inf inf
f ∈F δ>0
kf ⋆ − fm k2 + w(vm ) ≤
)
−1 (c + 1)2 v 2
4(1
+
δ)δ
f
,
(1 + δ)kf ⋆ − f k2 + w(cvf ) +
m
(
and hence with δ =
2(c+1)vf
√ ,
kf ⋆ −f k m
kf ⋆ − fm k2 + w(vm ) ≤ inf
f ∈F
(
2(c + 1)vf
√
kf ⋆ − f k +
m
2
Proof. Fix any f in the linear span F, with the form
non-negative βh .
)
+ w(cvf ) .
P
h∈H βh h,
with
em = kf ⋆ − fm k2 − kf ⋆ − f k2 + w(vm ).
Then from the definition of αm and βm,m ,
em = kf ⋆ − (1 − αm )fm−1 − βm,m hm k2 − kf ⋆ − f k2 +
w((1 − αm )vm−1 + βm,m )
≤ kf ⋆ − (1 − αm )fm−1 − αm cvf hm k2 − kf ⋆ − f k2 +
⋆
w((1 − αm )vm−1 + αm cvf )
≤ kf − (1 − αm )fm−1 − αm cvf hm k2 − kf ⋆ − f k2 +
(1 − αm )w(vm−1 ) + αm w(cvf ),
where the last line follows from the convexity of w. Now kf ⋆ −(1−αm )fm−1 −
αm cvf hm k2 is equal to k(1−αm )(f ⋆ −fm−1 )+αm(f ⋆ −chm vf )k2 . Expanding
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
9
this quantity leads to
kf ⋆ − (1 − αm )fm−1 − αm cvf hm k2 = (1 − αm )2 kf ⋆ − fm−1 k2
− 2αm (1 − αm )hf ⋆ − fm−1 , chm vf − f ⋆ i
+ α2m kf ⋆ − chm vf k2 .
Next we add (1 − αm )w(vm−1 ) + αm w(cvf ) − kf ⋆ − f k2 to this expression
to obtain
em ≤ (1 − αm )em−1 + α2m [kf ⋆ − chm vf k2 − kf ⋆ − f k2 ] + αm w(cvf )
− 2αm (1 − αm )hf ⋆ − fm−1 , chm vf − f i
+ αm (1 − αm )[2hf ⋆ − fm−1 , f ⋆ − f i − kf ⋆ − fm−1 k2 − kf ⋆ − f k2 ],
which is further upper bounded by
em ≤ (1 − αm )em−1 + α2m [kf ⋆ − chm vf k2 − kf ⋆ − f k2 ] + αm w(cvf )
− 2αm (1 − αm )hf ⋆ − fm−1 , chm vf − f i
− αm (1 − αm )(kf ⋆ − fm−1 k − kf ⋆ − f k)2 ,
Consider a random variable that equals h with probability βh /vf having
mean f . Since a maximum is at least an average, the choice of hm implies
that hf ⋆ − fm−1 , chm vf i is at least hf ⋆ − fm−1 , f i. This shows that em is
no less than (1 − αm )em−1 + α2m [kf ⋆ − chm vf k2 − kf ⋆ − f k2 ] + αm w(cvf ).
Expanding the squares in kf ⋆ − chm vf k2 − kf ⋆ − f k2 and using the CauchySchwarz inequality yields the bound kchm vf k2 + 2kf ⋆ k(kf − chm vf k)− kf k2 .
Since khm k ≤ 1 and kf k ≤ vf , we find that kf ⋆ − chm vf k2 − kf ⋆ − f k2 is at
most bf = c2 vf2 + 2vf kf ⋆ k(c + 1) − kf k2 . Hence we have shown that
e1 ≤ bf + w(cvf )
and
em ≤ (1 − αm )em−1 + α2m bf + αm w(cvf ).
Choose αm = 2/(m + 1), m ≥ 2 and use an inductive argument to establish the claim. The second statement in the theorem follows from similar
arguments upon consideration of
em = kf ⋆ − fm k2 − (1 + δ)kf ⋆ − f k2 + w(vm ),
together with the inequality a2 − (1 + δ)b2 ≤ (1 + δ)δ−1 (a − b)2 .
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
10
3. Risk bounds. Here we state our main theorem.
Theorem 2. Let f ⋆ be a real-valued function on [−1, 1]d with finite variation vf ⋆ with respect to the library H = {h(x) = φ(θh · x)}. We further
assume that φ is Lipschitz function with kφk∞ ≤ 1 and kθh k ≤ Λ. In the
case that f ⋆ belongs to L1,Hramp , φ is a ramp function with Λ = 2. If fˆ is
chosen to satisfy
)
( n
n
X
1
1X
(Yi − fˆ(Xi ))2 + penn (fˆ)/n ≤ inf
(Yi − f (Xi ))2 + penn (f )/n ,
f ∈F
n
n
i=1
i=1
then for the truncated estimator T fˆ and for penn (f ) depending on vf as
specified below, the risk has the resolvability bound
EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n},
f ∈F
The penalty divided by sample size penn (f )/n is at least
16vf
γn Bn2 Λ2 log(d + 1)
n
1/4
+8
γn Bn2 Λ2 log(d + 1)
n
1/2
+
Tn
n
and
60vf Λ
1 dγn log(n/d + 1) 1/2+1/2(d+3)
dγn log(n/d + 1) 1/2+1/2(d+3)
+ 2
n
Λ
n
1/2+3/2(d+3)
dγn log(n/d + 1)
dγn log(n/d + 1) Tn
+
+
+
,
n
n
n
when d is small compared to n. In the no noise setting, penn (f )/n is at least
4/3
16vf
γn Λ2 log(d + 1)
n
1/3
4/3
+ 4(vf
+ 1)
γn Λ2 log(d + 1)
n
2/3
,
Here γn = (2τ )−1 (1 + δ1 /2)(1 + 2/δ1 )(B + Bn )2 + 2(1 + 1/δ2 )σ 2 + 2(B + Bn )η
and τ = (1 + δ1 )(1 + δ2 ) for some δ1 > 0 and δ2 > 0. Accordingly, if f ⋆
belongs to L1,H , EkT fˆ − f ⋆ k2 is not more than a constant multiple of the
above penalties with vf replaced by kf ⋆ kH .
If fˆm is the LPGP estimator from the previous section, then by Theorem 1,
)
( n
n
X
4b
1
1X
f
,
(Yi − fˆm(Xi ))2 +w(vfˆm ) ≤ inf
(Yi − f (Xi ))2 + w(cvf ) +
f ∈F
n
n
m
i=1
i=1
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
11
where bf is the empirical version of the same quantity in Theorem 1 and
hence the risk has the resolvability bound
EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (cf )/n + 4Ebf /m},
f ∈F
for a penalty, convex in vf , penn (f ) = nw(vf ) as before. If m is chosen
√
to be of order between n and n so as to make the computational effects
negligible, the previously described L2 (P ) rates for estimating f ⋆ in L1,H via
the truncated estimator T fˆm are attainable under the appropriate penalties.
As we have said, where we have d + 3 in the denominator in the exponent, it
is possible to improve it to a d + 1. Such improvements are due to improved
covers for the complexity evaluation. These refinements also hold for the
LPGP estimator, although the number of iterations m needs to be of slightly
higher order than before.
One can also extend these results to include penalties that depend on the
number of terms m in an m-term greedy approximation fˆm to f ⋆ . We take
fˆm to be an m term fit from an LPGP algorithm and choose m̂ among all
m ∈ M (i.e. M = {1, . . . , n}) to minimize
n
1X
(Yi − fˆm (Xi ))2 + penn (fˆm , m)/n.
n
i=1
This approach enables the use of a data-based stopping criterion for the
greedy algorithm. For more details on these adaptive methods, we refer the
reader to [15]. The resolvability risk bound allows also for interpolation rates
between L2 and L1,H refining the results of [8] and in accordance with the
best balance between error of approximation and penalty.
The target f ⋆ is not necessarily in F. To each f in F, there corresponds a
function ρ, which assigns to (X, Y ) the relative loss
ρ(X, Y ) = ρf (X, Y ) = (Y − f (X))2 − (Y − f ⋆ (X))2 .
Let X ′ be an independent copy of the training data X used for testing the
efficacy of a fit fˆ based on X, Y . The relative empirical
loss with respect to
1 Pn
⋆
the training data is denoted by Pn (f ||f ) = n i=1
Pρ(Xi , Yi ) and that with
respect to the independent copy is Pn′ (f ||f ⋆ ) = n1 ni=1 ρ(Xi′ , Yi ). We define
the
empirical squared error by on the training
and test data by Dn (f, f˜) =
P
n
1 Pn
1
2
′
′
˜
˜
˜ ′ 2
i=1 (f (Xi ) − f (Xi )) and Dn (f, f ) = n
i=1 (f (Xi ) − f (Xi )) for all
n
f, f˜ in F. Using the relationship Y = f ⋆ (X) + ǫ, we note that ρ(X, Y ) can
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
12
also be written as (f (X) − f ⋆ (X))2 − 2ǫ(f (X) − f ⋆ (X)) = g 2 (X) − 2ǫg(X),
where g(x) = P
f (x) − f ⋆ (x). Hence we have the relationship Pn (f ||f ⋆ ) =
2
⋆
Dn (f, f ) − n ni=1 ǫi g(Xi ).
The relative empirical loss Pn′ (f ||f ⋆ ) is an unbiased estimate of the risk
Ekfˆ−f ⋆ k2 . Since ǫi has mean zero conditioned on Xi , the mean of Pn′ (f ||f ⋆ )
with respect to X ′ and Y is Ekfˆ−f ⋆ k2 . Such a quantity captures how well the
fit fˆ based on the training data generalizes to a new set of observations. The
goal is to control the empirical discrepancy Pn′ (f ||f ⋆ ) − cPn (f ||f ⋆ ) between
the loss on the future data and the loss on the training data for a constant
τ > 1. Toward this end, we seek a positive quantity penn (f ) to satisfy
E sup Pn′ (f ||f ⋆ ) − τ Pn (f ||f ⋆ ) − τ penn (f )/n ≤ 0,
f ∈F
Once such an inequality holds, the data-based choice fˆ in F yields
EPn′ (fˆ||f ⋆ ) ≤ τ E[Pn (fˆ||f ⋆ ) + penn (f )/n].
If fˆ satisfies
(3.1)
)
( n
n
ˆ)
X
pen
(
f
pen
(f
)
1
1X
n
n
≤ inf
+ Af ,
(Yi −fˆ(Xi ))2 +
(Yi − f (Xi ))2 +
f ∈F
n
n
n
n
i=1
i=1
for some positive quantity Af that decays to zero as the sample size grows,
we see that
EPn′ (fˆ||f ⋆ ) ≤ τ inf E[Pn (f ||f ⋆ ) + penn (f )/n + Af ].
f ∈F
Using EPn′ (fˆ||f ⋆ ) = Ekfˆ − f ⋆ k2 and EPn (f ||f ⋆ ) = kf − f ⋆ k2 , the above
expression is seen to be
Ekfˆ − f ⋆ k2 ≤ τ inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }.
f ∈F
For the purposes of proving results in the case when F is uncountable, it
is useful to consider complexities Ln (f˜) for f˜ in a countable subset F̃ of F
P
˜
satisfying f˜∈F̃ e−γn Ln (f ) ≤ 1 for some γn > 0 and such that
sup Pn′ (f ||f ⋆ ) − τ Pn (f ||f ⋆ ) − τ penn (f )/n
f ∈F
(3.2)
n
o
≤ sup Pn′ (f˜||f ⋆ ) − τ Pn (f˜||f ⋆ ) − τ γn Ln (f˜)/n ,
f˜∈F̃
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
13
with
n
o
E sup Pn′ (f˜||f ⋆ ) − τ Pn (f˜||f ⋆ ) − τ γn Ln (f˜)/n ≤ 0.
f˜∈F̃
The condition in (3.2) is equivalent to requiring that
sup inf {∆n (f, f˜) + γn Ln (f˜) − penn (f )} ≤ 0,
f ∈F f˜∈F̃
where
∆n (f, f˜) = n[Pn (f˜||f ⋆ ) − Pn (f ||f ⋆ )] − (n/τ )[Pn′ (f˜||f ⋆ ) − Pn′ (f ||f ⋆ )].
If we truncate the penalized least squares estimator fˆ at a certain level Bn ,
for EkT fˆ − f ⋆ k2 to maintain the resolvability bound τ inf f ∈F {kf − f ⋆ k2 +
Epenn (f )/n + EAf }, we require that
sup inf {∆n (f, f˜) + γn Ln (f˜) − penn (f )} ≤ 0,
f ∈F f˜∈F̃
where
∆n (f, f˜) = n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ )] − (n/τ )[Pn′ (T f˜||f ⋆ ) − Pn′ (T f ||f ⋆ )].
Rather than working with the relative empirical loss Pn′ (T f ||f ⋆ ), we prefer
to work with
Dn′ (T f, f ⋆ ). These two quantities are related to each other,
1 Pn
provided n i=1 ǫi g(Xi′ ) is small and they are exactly equal in the no noise
case. Hence we would like to determine penalties that ensure
E sup Dn′ (T f, f ⋆ ) − τ Pn (f ||f ⋆ ) − τ penn (f )/n ≤ 0.
f ∈F
Suppose we require that
E sup {τ1−1 Dn′ (T f, f ⋆ ) − τ τ2 Pn (f ||f ⋆ )−
f ∈F
τ τ2 penn (f )/n} ≤ 0,
for some τ1 , τ2 ≥ 1. This further inflates the resulting risk bound by (1 +
τ1 )(1 + τ2 ) so that the factor τ is replaced with τ τ1 τ2 in (3). However, it
enables us to create countable covers F̃ with smaller errors in approximating
functions from F. To see this, suppose the countable cover F̃ satisfies
sup τ1−1 Dn′ (T f, f ⋆ ) − τ τ2 Pn (f ||f ⋆ ) − τ τ2 penn (f )/n
f ∈F
n
o
≤ sup Dn′ (T f˜, f ⋆ ) − τ Pn (T f˜||f ⋆ ) − τ γn Ln (f˜)/n ,
f˜∈F̃
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
14
or equivalently that
sup inf
f ∈F f˜∈F̃
γn
˜
˜
∆n (f, f ) + Ln (f ) − penn (f ) ≤ 0,
τ2
where
∆n (f, f˜) = n[τ2−1 Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ )]+
nτ −1 τ2−1 [τ1−1 Dn′ (T f, f ⋆ ) − Dn′ (T f˜, f ⋆ )].
There are two cases to consider for bounding ∆n (f, f˜). In the noise case, we
1
(b − a)2
set τ2 = 1 and τ1 = 1/τ + 1. Using the inequality, τ −1 a2 − b2 ≤ τ −1
√
√ 2
that can be derived from (a/ τ − b τ ) ≥ 0, we can upper bound the
difference τ1−1 Dn′ (T f, f ⋆ ) − Dn′ (T f˜, f ⋆ ) by
˜
(τ1 − 1)−1 Dn′ (T f, T f).
This quantity does not involve f ⋆ , which is desirable for the proceeding
analysis. Hence ∆n (f, f˜) is not greater than
n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)].
and thus we seek a penalty penn (f ) that is at least
γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)].
An estimator fˆ satisfying (3.1) with penality penn (f ) that is at least
γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)].
satisfies the risk bound
EkT fˆ − f ⋆ k2 ≤ (τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }.
f ∈F
In the no noise case, we set both τ1 and τ2 to be strictly greater than one.
We can bound the difference
τ2−1 Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) = τ2−1 Dn (T f˜, f ⋆ ) − Dn (f, f ⋆ )
≤ τ −1 Dn (f˜, f ⋆ ) − Dn (f, f ⋆ )
2
by (τ2 − 1)−1 Dn (f˜, f ) so that ∆n (f, f˜) has the bound
n(τ2 − 1)−1 Dn (f˜, f ) + nτ −1 τ2−1 (τ1 − 1)−1 Dn′ (f, f˜).
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
15
If we set τ2 = 2 and τ1 = 1/τ + 1, we find that ∆n (f, f˜) is no less than
n[Dn (f˜, f ) + Dn′ (f, f˜)].
An estimator fˆ satisfying (3.1) with penality penn (f ) that is at least
γn Ln (f˜) + n[Dn (f˜, f ) + Dn′ (f, f˜)].
satisfies the risk bound
EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }.
f ∈F
By bounding the distortion in this way, we eliminate some error in approximating f by f˜ that arises from analyzing Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) and
Dn (T f˜, f ⋆ ) − Dn (T f, f ⋆ ).
Suppose F̃ is a countable collection of functions that satisfies
n
o
E sup Dn′ (T f˜, f ⋆ ) − τ Pn (f˜||f ⋆ ) − τ γn Ln (f˜) ≤ 0.
Theorem 3.
f˜∈F̃
If penn (f ) is at least
γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)].
or
γn Ln (f˜) + n[Dn (f˜, f ) + Dn′ (f, f˜)]
corresponding to the noise or no noise setting, then the truncated estimator
T fˆ with fˆ satisfying (3.1) has the resolvability bound
EkT fˆ − f ⋆ k2 ≤ 2(τ + 1) inf {kf − f ⋆ k2 + Epenn (f )/n + EAf }.
f ∈F
Recall that g is equal to f − f ⋆ . In this way, there is a one to one correspondence between f and g. To simplify notation, we sometimes write Dn (f, f ⋆ )
as Dn (g) and Dn′ (f, f ⋆ ) as Dn′ (g). Moreover, assume an analogous notation
holds for the relative loss functions Pn (f ||f ⋆ ) and P ′ (f ||f ⋆ ) and complexities
Ln (f ).
Theorem 4. If F is a countable collection of functions
in magP bounded
−Ln (f ) ≤ 1,
nitude by Bn and Ln (f ) satisfies the Kraft inequality
e
f ∈F
then
E sup Dn′ (f ||f ⋆ ) − τ Pn (f ||f ⋆ ) − τ γn Ln (f )/n ≤ 0,
f ∈F
where τ = (1 + δ1 )(1 + δ2 ) and γn = (2τ )−1 (1 + δ1 /2)(1 + 2/δ1 )(B + Bn )2 +
2(1 + 1/δ2 )σ 2 + 2(B + Bn )η.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
16
Proof. Let s2 (g) be as in Lemma 1. Since g2 is non-negative, s2 (g) ≤
Dn′ (g2 ) + Dn (g2 ). Moreover, since |f | ≤ Bn and |f ⋆ | ≤ B, it follows that
s2 (g) ≤ (B + Bn )2 (Dn′ (g) + Dn (g)). Let γ1 = A1 (B + Bn )2 /2 with A1 to be
specified later. By Lemma 1, we have
n
o
γ1
E sup (1 − 1/A1 )Dn′ (g) − (1 + 1/A1 )Dn (g) − L(g)
(3.3)
n
g∈G
1 2
γ1
′
≤ E sup Dn (g) − Dn (g) − L(g) −
(3.4)
s (g) ≤ 0
n
2γ1
g∈G
By Lemma 2, we also know that
( n
)
γ2
1
1X
ǫi g(Xi ) − L(g) −
Dn (g) ≤ 0,
(3.5)
E sup
n
n
A2 n
g∈G
i=1
where γ2 = A2 σ 2 /2 + (B + Bn )η. Adding the expression in (3.3) to 2a > 0
times the expression in (3.5) and collecting terms, we find
P that 1 + 1/A1 +
2a/A2 should be equal to a in order for Dn (g) and n1 ni=1 ǫi g(Xi ) to be
added together to produce Pn (g). Thus we find that
n
o
γn
E sup (1 − 1/A1 )Dn′ (g) − a(Pn (g) + L(g)) ≤ 0,
n
g∈G
where γn = γ1 /a + 2γ2 . Choosing A1 = 1 + 2/δ1 , A2 = 2(1 + 1/δ2 ), and
τ = (1 + δ1 )(1 + δ2 ), we find that a = τ (1 − 1/A1 ). Dividing the resulting
expression by 1 − 1/A1 produces
E sup Dn′ (g) − τ Pn (g) − τ γn L(g)/n ≤ 0.
g∈G
In general, the penalty should not depend on the unknown test data X ′ .
However if one seeks to describe the error of a fit fˆ trained with the data
(X, Y ) at new data points X ′ , a penalty that depends on X ′ is natural and
fits in with the standard trans-inductive setting in machine learning [13].
Since we have been assuming that the input design X is contained in a cube
with side length at most one, the dependence on X ′ of the penalties as shown
in the following lemmata can be ignored.
When we speak of empirical L2 covers of H, we mean with respect to the
empirical measure of X ∪ X ′ on both the training and test data. That is,
empirical L2 covers of H are with respect to the squared norm [D(h, h̃) +
D ′ (h, h̃)]/2.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
17
P
Theorem 5. Let f = h βh h. Let H̃1 be an empirical L2 ǫ1 -net for H of
cardinality M1 . Let H̃2 be an empirical L2 ǫ2 -net for H of cardinality M2 .
Suppose these empirical covers do not depend on the underlying
data. There
M2 +M1 +m0
such that for
exists a subset F̃ of F with cardinality at most
M1 +m0
v ≥ vf and ṽ = v(1 + M1 /m0 )
Tn
2ṽ 2 ǫ21 ṽ 2 M1
+
,
+ 8Bn ṽǫ2 +
Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜) ≤
2
m0
n
2m0
for some f˜ in F̃. Alternatively, there exists a subset F̃ of F with cardinality
0
at most M2m+m
such that
0
2vvf
Tn
+ 8Bn vǫ2 +
,
Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜) ≤
m0
n
and in the case of no noise with Bn ≥ B
4vvf
Dn (f˜, f ) + Dn′ (f, f˜) ≤
+ 4v 2 ǫ22
m0
for some f˜ in F̃ .
Proof. The proof is an immediate consequence of Lemma 4.
According to Theorems 3 and 4, a valid penalty is at least
γn Ln (f˜) + n[Pn (T f˜||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜)],
P
−Ln (f˜) ≤ 1. The
where f˜ belongs to a countable set F̃ satisfying
f˜∈F̃ e
constant γn is as prescribed in Theorem
4. By Theorem 5, there is a set F̃
M2 +M1 +m0
such that for all f with vf ≤ v, there
with cardinality at most
M1 +m0
⋆
˜
˜
is a f in F̃ such that Pn (T f ||f ) − Pn (f ||f ⋆ ) + Dn′ (T f, T f˜) is bounded by
2ṽ 2 ǫ21 ṽ 2 M1
Tn
.
+
+ 8Bn ṽǫ2 +
2
m0
n
2m0
1 +m0
is bounded by (M1 +
Using the fact that the logarithm of M2M+M
+m
1
0
m0 ) log(e(M2 /M1 + 1)), a valid penalty divided by sample size is at least
(3.6)
Tn
γn
2ṽ 2 ǫ21 ṽ 2 M1
+ 8Bn ṽǫ2 +
(M1 + m0 ) log(e(M2 /M1 + 1)) +
+
.
2
n
m0
n
2m0
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
18
0
such that
Alternatively, there is a set F̃ with cardinality at most M2m+m
0
⋆
˜
˜
for all f with vf ≤ v, there is a f in F̃ such that Pn (T f ||f ) − Pn (f ||f ⋆ ) +
˜ is bounded by
Dn′ (T f, T f)
2vvf
Tn
+ 8Bn vǫ2 +
m0
n
and hence a valid penalty divided by sample size is at least
(3.7)
γn m0 log M2 2vvf
Tn
+
+ 8Bn vǫ2 +
.
n
m0
n
In the no noise case, a valid penalty divided by sample size is at least
(3.8)
γn m0 log M2 4vvf
+
+ 4v 2 ǫ22 .
n
m0
We now discuss how m0 , ǫ1 , and ǫ2 should be chosen to produce penalties
that yield optimal risk properties for T fˆ.
4. Risk bounds in high dimensions.
4.1. Noise case. By Lemma 6, an empirical L2 ǫ2 -cover of H has cardi2
2
2) ⌉
2) ⌉
is bounded by
. The logarithm of 2d+⌈(Λ/ǫ
nality less than 2d+⌈(Λ/ǫ
⌈(Λ/ǫ2 )2 ⌉
⌈(Λ/ǫ2 )2 ⌉
2
4(Λ/ǫ2 ) log(d + 1).
Continuing from the expression (3.7), we find that penn (f )/n is at least
4γn m0 (Λ/ǫ2 )2 log(d + 1) 2vvf
Tn
+
+ 8Bn vǫ2 +
.
n
m0
n
1/2
vv nǫ22
, we see that penn (f )/n
Choosing m0 to be the ceiling of 2γn Λ2 flog(d+1)
must be at least
1/2
vvf γn Λ2 log(d + 1)
Tn
8γn Λ2 log(d + 1)
+ 8Bn vǫ2 +
+8
.
2
2
n
nǫ2
nǫ2
2 log(d+1) 1/4
so that penn (f )/n must
Finally, we set v = vf and ǫ2 = γn Λ nB
2
n
be at least
1/4
1/2
γn Bn2 Λ2 log(d + 1)
γn Bn2 Λ2 log(d + 1)
Tn
16vf
.
+8
+
n
n
n
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
19
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
We see that the main term in the penalty divided by sample size is
1/4
γn Bn2 Λ2 log(d + 1)
.
16vf
n
4.2. No noise case. Continuing from the expression (3.8), we find that
penn (f )/n is at least
4γn m0 (Λ/ǫ2 )2 log(d + 1) 4vvf
+
+ 4v 2 ǫ22 .
n
m0
1/2
Choosing m0 to be the ceiling of
must be at least
vvf nǫ22 (τ +1)2
γn Λ2 log(d+1)(τ +2)
4γn Λ2 log(d + 1)
+8
nǫ22
vvf γn Λ2 log(d + 1)
nǫ22
Finally, we set v = vf and ǫ2 =
penn (f )/n must be at least
4/3
16vf
γn Λ2 log(d + 1)
n
1/3
+
, we see that penn (f )/n
1/2
+ 4v 2 ǫ22 .
4(τ +2)/(τ +1)2 γn Λ2 log(d+1) 1/6
2
nv
4/3
4(vf
+ 1)
γn Λ2 log(d + 1)
n
so that
2/3
,
where we used the fact that v 2/3 ≤ v 4/3 + 1. We see that the main term in
the penalty divided by sample size is
1/3
2
4/3 γn Λ log(d + 1)
.
16vf
n
4.3. Combining the noise and no noise cases. As the previous sections
show, there are differences in the risk bounds depending on the nature of
the noise. These bounds only incorporate information about the presence of
noise, without regard to the degree of variability. Ideally one would prefer
to have a bound that interpolates between these two situations and recovers the no noise case exactly when the variability is zero. We can establish
the validity of a penalty divided by sample size that is at least a constant
multiple of
!1/3
!1/4
vf4 Λ2 γn log(d + 1)
vf4 Λ2 γn log(d + 1)
√
+ σ
.
(4.1)
n
n
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
20
plus negligible terms that do not depend on the candidate fit. Note that
this penalty is a convex function of vf and hence the setting of Theorem 1
applies. For a proof of the above form of the penalty, we refer the reader to
the supplement Supplement A.
5. Risk bounds with improved exponents for moderate dimensions. Continuing from the expression (3.6), we find that penn (f )/n is at
least
γn
Tn
2ṽ 2 ǫ21 ṽ 2 M1
+ 8Bn ṽǫ2 +
(M1 + m0 ) log(e(M2 /M1 + 1)) +
+
.
2
n
m0
n
2m0
Note that we can bound Bn2 by γn by choosing δ1 and δ2 appropriately. For
the precise definition of γn , see Theorem 4. The strategy for optimization is
to first consider the terms
2ṽ 2 ǫ21
√
γn
m0 log(e(M2 /M1 + 1)) +
+ 8 γn ṽǫ2 .
n
m0
(5.1)
After m0 , M1 , and M2 have been selected, we then check that
ṽ 2 M1
γn
M1 log(e(M2 /M1 + 1)) +
n
2m20
(5.2)
is relatively negligible. Choosing m0 to be the ceiling of
we see that (5.1) is at most
γn
log(e(M2 /M1 + 1)) + 4
n
1/2
2ṽ2 nǫ21
,
γn log(e(M2 /M1 +1))
ṽ 2 γn ǫ21 log(e(M2 /M1 + 1))
n
1/2
√
+ 8 γn ṽǫ2 .
Note that an empirical L2 ǫ-cover of H has cardinality between (Λ/ǫ)d and
(2Λ/ǫ + 1)d ≤ (3Λ/ǫ)d whenever ǫ ≤ Λ. Thus M2 /M1 ≤ (3ǫ1 /ǫ2 )d whenever
ǫ2 ≤ Λ and hence
log(e(M2 /M1 + 1)) ≤ 1 + (d/2) log(9ǫ21 /ǫ22 + 1) ≤ d log(9ǫ21 /ǫ22 + 1),
whenever ǫ21 ≥ ǫ22 (e − 1)/9. These inequalities imply that (5.1) is at most
dγn log(9ǫ21 /ǫ22 + 1)
+4
n
ṽ 2 ǫ21 dγn log(9ǫ21 /ǫ22 + 1)
n
Next, set
ǫ22 =
1/2
√
+ 8 γn ṽǫ2 .
9dǫ21
.
n
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
21
This means that the assumption ǫ21 ≥ ǫ22 (e − 1)/9 is valid provided d ≤
n/(e − 1). Thus (5.1) is at most
r
dγn log(n/d + 1)
dγn log(n/d + 1)
+ 20ǫ1 ṽ
.
n
n
Next, we add in the terms from (5.2). The selections of m0 and ǫ1 make
(5.2) at most
M1 dγn log(n/d + 1) M1 dγn log(n/d + 1)
+
n
nǫ21
Since M1 ≤ (3Λ/ǫ1 )d whenever ǫ1 ≤ Λ, we find that (5.2) is at most
(3Λ)d dγn log(n/d + 1) (3Λ)d dγn log(n/d + 1)
+
nǫd1
nǫd+2
1
1/2(d+3)
. Choosing ṽ = vf , we see that a valid
Let ǫ1 = 3Λ dγn log(n/d+1)
n
penalty divided by sample size is at least
60vf Λ
1 dγn log(n/d + 1) 1/2+1/2(d+3)
dγn log(n/d + 1) 1/2+1/2(d+3)
+ 2
n
Λ
n
1/2+3/2(d+3)
dγn log(n/d + 1) Tn
dγn log(n/d + 1)
+
+
.
+
n
n
n
Note that for the form of the above penalty to be valid, we need dγn log(n/d)
n
to be small enough to ensure that ǫ1 and ǫ2 are both less than Λ.
v 2 M1
4m20
from the bound in Lemma
P
5 at the expense of a larger set F̃ . For example, let (1/m0 ) m
k=1 bk hk , kbk ≥
vf be as in the first part of Lemma 4. Note that the vector
(b1 , . . . , bm )′ /kbk1 belongs to the ℓ1 unit ball. This space has an ǫ-covering
number of order (1/ǫ)m0 +M1 and thus the collection of representors F̃ is of
order
m0 +M1 M2 + M1 + m0
(1/ǫ2 )
.
M1 + m0
Remark.
It is possible to remove the term
This new cover can be used to yield even tighter bounds than those presented
in Table 1. However, the analysis is more technical and we omit it here. We
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
22
will however say that slightly improved rates of order vf ⋆
are possible.
d
n
log
n 1/2+1/(2(d+1))
d
6. Proofs of the lemmata. An important aspect of the above covers F̃
is that they P
only depend on the data (X, X ′ ) through kXk2∞ +kX ′ k2∞ , where
1
2
kXk∞ = n ni=1 kXi k2∞ . Since the coordinates of X and X ′ are restricted
to belong to [−1, 1]d , the penalties and quantities satisfying Kraft’s inequality do not depend on X and X ′ . This is an important implication for the
following empirical process theory. On the other hand, using the fact that
kXk2∞ +kX ′ k2∞ is symmetric in the coordinates of X and X ′ and has a mean
that is at most logarithmic in d, the following bounds can be adapted to handle covers F̃ that depend on the training and test data without imposing
sup-norm controls.
Lemma 1. Let (X, X ′ ) = (X1 , . . . , Xn , X1′ , . . . , Xn′ ), where X ′ is an independent copy of the data X and where (X1 , . . . , Xn ) are component-wise
independent but not necessarily identicallyPdistributed. A countable function
class G and complexities L(g) satisfying g∈G e−L(g) ≤ 1 are given. Then
for arbitrary positive γ,
1 2
γ
s (g) ≤ 0,
(6.1)
E sup Dn′ (g) − Dn (g) − L(g) −
n
2γ
g∈G
where s2 (g) =
1
n
Pn
i=1 (g
2 (X )
i
− g2 (Xi′ ))2 .
Proof. Let Z = (Z1 , . . . , Zn ) be a sequence of independent centered Bernoulli
random variables with success probability 1/2. Since Xi and Xi′ are identically distributed, g2 (Xi ) − g2 (Xi′ ) is a symmetric random variable and hence
sign changes do not affect the expectation in (6.1). Thus the right hand side
of the inequality in (6.1) is equal to
( n
)
1X
γ
1
EZ,X,X ′ sup
Zi (g2 (Xi ) − g2 (Xi′ )) − L(g) −
s2 (g) .
n
n
2γ
g∈G
i=1
Using the identity x = λ log(x/λ) with λ = γ/n, conditioning on X and X ′ ,
and applying Jensen’s inequality to move EZ inside the logarithm, we have
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
23
that
)
n
γ
1
1X
Zi (g 2 (Xi ) − g 2 (Xi′ )) − L(g) −
s2 (g)
EZ sup
n
n
2γ
g∈G
i=1
( n
)
X
1
γ
n
≤ log EZ sup exp
Zi (g 2 (Xi ) − g 2 (Xi′ )) − L(g) − 2 s2 (g) .
n
γ
2γ
g∈G
(
i=1
Replacing the supremum with the sum and using the linearity of expectation,
the above expression is not more than
( n
)
X
1X
γ
n 2
2
2
′
log
EZ exp
Zi (g (Xi ) − g (Xi )) − L(g) − 2 s (g)
n
γ
2γ
i=1
g∈G
( n
)
X
1X
n 2
γ
2
2
′
exp −L(g) − 2 s (g) EZ exp
Zi (g (Xi ) − g (Xi )) .
= log
n
2γ
γ
i=1
g∈G
Next, note that by the independence of Z1 , . . . , Zn ,
( n
)
n
Y
1X
1
2
2
′
2
2
′
EZi exp
Zi (g (Xi ) − g (Xi )) .
Zi (g (Xi ) − g (Xi )) =
EZ exp
γ
γ
i=1
i=1
n
o
2
Using the inequality ex +e−x ≤ 2ex /2 , each EZi exp γ1 Zi (g 2 (Xi ) − g 2 (Xi′ ))
o
n
is not more than exp 2γ1 2 (g2 (Xi ) − g 2 (Xi′ ))2 . Whence
( n
)
1X
n 2
2
2
′
EZ exp
Zi (g (Xi ) − g (Xi )) ≤ exp
s (g) .
γ
2γ 2
i=1
The claim follows from the fact that
γ
n
log
P
g∈G
e−L(g) ≤ 0.
Lemma 2. Let ǫ = (ǫ1 , . . . , ǫn ) be conditionally independent random variables given {Xi }ni=1 , with conditional mean zero, satisfying Bernstein’s moment condition with parameter η > 0. A countable class G and complexities
L(g) satisfying
X
e−L(g) ≤ 1
g∈G
are given. Assume a bound K, such that |g(x)| ≤ K for all g in G. Then
)
( n
n
γ
1 X 2
1X
ǫi g(Xi ) − L(g) −
g (Xi ) ≤ 0.
E sup
n
n
An
g∈G
i=1
i=1
where A is an arbitrary constant and γ = Aσ 2 /2 + Kh.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
24
Proof. Using the identity x = λ log(x/λ) with λ = γ/n, conditioning on
X, and applying Jensen’s inequality to move Eǫ inside the logarithm, we
have that
( n
)
n
1X
γ
1 X 2
Eǫ|X sup
ǫi g(Xi ) − L(g) −
g (Xi )
n
n
An
g∈G
i=1
i=1
( n
)
n
1X
γ
1 X 2
≤ log Eǫ|X sup exp
ǫi g(Xi ) − L(g) −
g (Xi ) .
n
γ
γA
g∈G
i=1
i=1
Replacing the supremum with the sum and using the linearity of expectation,
the above expression is not more than
( n
)
n
X
1X
γ
1 X 2
ǫi g(Xi ) − L(g) −
g (Xi )
log
Eǫ|X exp
n
γ
γA
i=1
i=1
g∈G
( n
)
)
(
n
X
1X
γ
1 X 2
= log
exp −L(g) −
g (Xi ) Eǫ|X exp
ǫi g(Xi ) .
n
γA
γ
i=1
g∈G
i=1
Next, note that by the independence of ǫ1 , . . . , ǫn conditional on X,
( n
)
n
Y
1X
1
Eǫi |Xi exp
ǫi g(Xi ) =
ǫi g(Xi ) .
Eǫ|X exp
γ
γ
i=1
i=1
o
o
n 2 2
g (Xi )
.
By Lemma 7, each Eǫi |Xi exp γ1 ǫi g(Xi ) is not more than exp 2γσ2 (1−ηK/γ)
Whence
( n
)
2 Pn
2
σ
1X
i=1 g (Xi )
Eǫ|X exp
ǫi g(Xi ) ≤ exp
γ
2γ 2 (1 − ηK/γ)
i=1
)
(
n
1 X 2
g (Xi ) ,
= exp
γA
n
i=1
where the last line followsPfrom the definition of γ. The proof is finished
after observing that nγ log g∈G e−L(g) ≤ 0.
P
Lemma 3. For f = Ph βh h and f0 in F, there is a choice of h1 , . . . , hm
in H with fm = (v/m) m
k=1 hk , v ≥ vf such that
kfm − f0 k2 − kf0 − f k2 ≤
vvf
.
m
Moreover, the same bound holds for any convex combination of kfm − f0 k2 −
kf0 − f k2 and ρ2 (fm , f ), where ρ is a possibly different Hilbert space norm.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
25
Proof. Let H be a random variable that equals hv with probability βh /v
and zero with probability 1 − vf /v. Let H1 , . . . ,P
Hm be a random sample
m
1
from the distribution defining H. Then H = m
j=1 Hj has mean f and
2
2
furthermore the mean of kfm − f0 k − kf0 − f k is the mean is kf − Hk2 .
This quantity is seen to be bounded by vvf /m. As a consequence of the
bound holding
P on average, there exists a2 realization 2of fm of H (having
form (v/m) m
k=1 hk ) such that kfm − f0 k − kf0 − f k is also bounded by
V vf /m.
The next lemma is an extension of a technique used in [19] to improve the
L2 error of an m-term approximation of a function in L1,H . The idea is
essentially stratified sampling with proportional allocation used in survey
sampling as a means of variance reduction. In the following, we use the
notation k · k to denote a generic Hilbert space norm.
Lemma 4. Let H̃ be an L2 ǫ1 -net of H with cardinality M1 . For f =
P
and f0 in F, there is a choice of h1 , . . . , hm in H with fm =
h βh hP
(1/m0 ) m
k=1 bk hk , m ≤ m0 + M1 and kbk1 ≥ vf such that
kf0 − fm k2 − kf0 − f k2 ≤
vvf ǫ21
.
m0
Moreover, there is an equally weighted linear combination fm = (v/m0 )
v ≥ vf , m ≤ m0 + M1 such that
kf0 − fm k2 − kf0 − f k2 ≤
Pm
k=1 hk ,
v 2 ǫ21 (1 + M1 /m0 ) v 2 M1
+
.
m0
4m20
The same bound holds for any convex combination of kfm − f0 k2 − kf0 − f k2
and ρ2 (fm , f ), where ρ is a possibly different Hilbert space norm.
Proof. Suppose the elements of H̃ are h̃1 , . . . , h̃M1 . Consider the M1 sets
H̃j = {h ∈ H : kh − h̃j k2 ≤ ǫ21 },
S
j = 1, . . . , M1 . By working instead with disjoint sets H̃j \ 1≤i≤j−1 H̃i (H̃0 =
∅) that are contained in H̃j and whose union is H, we may assume
that the
P
H̃j form a partition of H. Let M = m0 + M1 and vj =
h∈H̃j βh . To
obtain the first conclusion, define a random variable Hj to equal hvj with
probability βh /vj for all h ∈ H̃j . let H1,j , . . . , Hnj ,j be a random sample
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
26
m
l
vj M
, where V = vM
of size Nj =
V
m0 and v ≥ vf , from the distribution
P
defining Hj . Note that the Nj sum to at most M . Define gj = h∈H̃j βh h
P 1 1 P Nj
and f = M
j=1 Nj
k=1 Hk,j . Note that the mean of f is f . This means the
expectation
kf0 − f k2 − kf0 − f k2 is the expectation of kf − f k2 , which is
PMof
1
equal to j=1 EkHj − gj k2 /Nj . Now EkHj − gj k2 /Nj is further bounded by
(V /M )
X
h∈H̃j
βh inf kh − hj k2 ≤ (V /M )
hj
X
h∈H̃j
βh kh − h̃j k2 ≤
vj vǫ21
.
m0
The above fact was established by noting that the mean of a real-valued
random variable minimizes its average squared distance from any point hj .
Summing over 1 ≤ j ≤ M1 produces the claim. Since this bound
Pholds on
average, there exists a realization fm of f (having form (1/m0 ) m
k=1 bk hk
with kbk1 ≥ vf ) such that kf0 − fm k2 − kf0 − f k2 is also bounded by
vvf ǫ21
m0 .
For the second conclusion, we
inj a similar
fashion. Suppose nj is a
m
k
l proceed
vj M
vj M
and V
with respective probabilities
random variable that equals V
v M
chosen to make its average equal to jV . Furthermore, assume n1 , . . . , nM1
V
V
nj . Since Vj ≤ vj + M
, the Vj sum to
are independent. Define Vj = M
at most V . Let Hj be a random variable that equals hvj with probability
βh /vj for all h ∈ H̃j . For each j and conditional on nj , let H1,j , . . . , Hnj ,j
be a random sample of size Nj = nj + I{nj = 0} from the distribution
P
defining Hj . Note that the Nj sum to at most M . Define gj = h∈H̃j βh h
P 1 1 P Nj
and f = M
j=1 Nj
k=1 Hk,j . Note that the conditional mean of H given
PM 1
N1 , . . . , NM1 is g =
j=1 (Vj /vj )gj and hence the mean of f is f . This
2
2
of kf −f k2 ,
means the expectation
PM1of kf0 −fk −kf0 −f2k is the expectation
2
which is equal to j=1 EkHj − (Vj /vj )gj k /Nj + Ekf − gk by the law of
total variance. Now EkHj − (Vj /vj )gj k2 /Nj is further bounded by
(V /M )2 (nj /vj )
X
h∈H̃j
βh inf kh − hj k2 ≤
hj
v 2 M ǫ21
.
m20
The above fact was established by noting that the mean of a real-valued
random variable minimizes its average squared distance from any point hj .
Next, note that by the independence of the coordinates of v1 , . . . , vM1 and
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
27
the fact that Vj has mean vj ,
M1
M1
X
X
2
2
(kgj k2 /vj2 )V(nj ).
(vj /vj − 1)gj k = (V /M )
Ekf − gk = Ek
2
j=1
j=1
Finally, observe that kgj k2 ≤ vj2 and V(nj ) ≤ 1/4 (a random variable whose
range is contained in an interval of length one has variance bounded by
2M
1
1/4). This shows that Ekf − gk2 ≤ v4m
2 . Since this bound holds on average,
0
P
there exists a realization fm of f (having form (v/m0 ) m
k=1 hk ) such that
kf0 − fm k2 − kf0 − f k2 is also bounded by
v2 ǫ21 (1+M1 /m0 )
m0
+
v 2 M1
.
4m20
Lemma 5. Let y = {yi }ni=1 be a sequence of real numbers and let x =
{xi }ni=1 and x′ = {x′i }ni=1 be sequences d-dimensional vectors. Let H̃1 be an
2
empirical L2 ǫ1 -net for H with cardinality M
P1 and H̃2 be an empirical L
ǫ2 -net for H with cardinality M2 . For P
f = h βh h in F, there is a choice
of h̃1 , . . . , h̃m in H̃2 with f˜m = (v/m0 ) m
k=1 h̃k , v ≥ vf , and m ≤ m0 + M1 ,
such that
n
n
1X
1X
(yi − T f˜m (xi ))2 −
(yi − f (xi ))2 +
n
n
i=1
i=1
1
n
n
X
i=1
(T f˜m (x′i ))2 − T f (x′i ))2
≤
2v 2 ǫ21 (1 + M1 /m0 ) v 2 M1
+
m0
2m20
+ 8Bn v (1 + M1 /m0 ) ǫ2
Tn
+
.
n
If F̃ denotes the collection of functions of the form f˜m , then F̃ has cardi1 +m0
.
nality at most M2M+M
1 +m0
P 0
Moreover, there is a choice of h̃1 , . . . , h̃m0 in H̃2 with f˜m0 = (v/m0 ) m
k=1 h̃k ,
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
28
v ≥ vf such that
n
n
1X
1X
(yi − T f˜m0 (xi ))2 −
(yi − f (xi ))2 +
n
n
i=1
i=1
1
n
n
X
i=1
(T f˜m0 (x′i ) − T f (x′i ))2
≤
(6.2)
2vvf
Tn
.
+ 8Bn vǫ2 +
m0
n
and
n
n
i=1
i=1
1X ˜
1X ˜
(fm0 (xi ) − f (xi ))2 +
(fm0 (x′i ) − f (x′i ))2
n
n
≤
(6.3)
4vvf
+ 4v 2 ǫ22 .
m0
If F̃ denotes the collection
of functions of the form f˜m0 , then F̃ has cardiM2 +m0
nality at most
.
m0
Proof. We only prove the first claim of the lemma. Inequalities (6.2)
P and
(6.3) follow from similar arguments and Lemma 3. Let fm = (v/m0 ) m
k=1 hk
be as in the second part of Lemma 4. Since H̃2 is an empirical L2 ǫ2 -net for
H, for each hk there is an h̃k in H̃2 such that
n
n
i=1
i=1
1 X
1 X
|hk (xi ) − h̃k (xi )|2 +
|hk (x′i ) − h̃k (x′i )|2 ≤ ǫ22 .
2n
2n
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
29
P
Let f˜m = (v/m0 ) m
k=1 h̃k . By Lemma 8 (I) and (II),
(y − T f˜m (x))2 − (y − f (x))2 = [(y − fm (x))2 − (y − f (x))2 ]+
[(y − T f˜m(x))2 − (y − T fm (x))2 ]+
[(y − T fm (x))2 − (y − fm (x))2 ]
≤ [(y − fm (x))2 − (y − f (x))2 ]+
4Bn |fm (x) − f˜m (x)|+
4Bn (|y| − Bn )I{|y| > Bn }+
2(|y| − Bn )2 I{|y| > Bn }
= [(y − fm (x))2 − (y − f (x))2 ]+
4Bn |fm (x) − f˜m (x)|+
2(|y|2 − Bn2 )I{|y| > Bn }.
By Lemma 8 (III),
(T f˜m (x′ ) − T f (x′ ))2 ≤ (f (x′ ) − fm (x′ ))2 + 4Bn |f˜m (x′ ) − fm (x′ )|.
Thus we find that (y − T f˜m (x))2 − (y − f (x))2 + (T f˜m (x′ ) − T f (x′ ))2 is not
greater than
[(y − fm (x))2 − (y − f (x))2 ] + (f (x′ ) − fm (x′ ))2 +
4Bn [|fm (x) − f˜m (x)| + |f˜m (x′ ) − fm (x′ )|] + 2(|y|2 − B 2 )I{|y| > Bn }
n
By the second conclusion in Lemma 4,
n
n
i=1
i=1
1X
1X
(yi − fm (xi ))2 −
(yi − f (xi ))2 +
n
n
n
2v 2 ǫ21 (1 + M1 /m0 ) v 2 M1
1X
(fm (x′i ) − f (x′i ))2 ≤
+
.
n
m0
2m20
i=1
By the concavity of the square root function,
n
n
i=1
i=1
1 X
1 X
|hk (xi ) − h̃k (xi )| +
|hk (x′i ) − h̃k (x′i )|
2n
2n
is also no greater than ǫ2 . Using this, we have that
n
n
i=1
i=1
1X
1X
|fm (xi ) − f˜m (xi )| +
|fm (x′i ) − f˜m (x′i )| ≤ 2v (1 + M1 /m0 ) ǫ2 .
n
n
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
30
The last conclusion about the cardinality of F̃ follows from Lemma 10.
Lemma 6. Let xP
= {xi }ni=1 , where each xi is a d-dimensional vector in Rd .
1
2
Define kxk∞ = n ni=1 kxi k2∞ . There is a subset H̃ of H with cardinality at
most 2d+m
such that for each h(x) = φ(x · θ) with kθk1 ≤ Λ in H, there is
m
P
h̃(x) = φ(x · θ̃) in H̃ such that n1 ni=1 |h(xi ) − h̃(xi )|2 ≤ Λkθk1 kxk2∞ /m.
Proof.
By the Lipschitz condition on φ, it is enough to prove the bound for
1 Pn
|θ
· xi − θ̃ · xi |2 . Let v be a random vector that equals ej sgn(θj )Λ with
i=1
n
probability |θj |/Λ, j = 1, 2, . . . , d and equals the zero vector with probability
1 − kθk1 /Λ. Let v1 , v2 , . . . , vm be a random sample
from the distribution
1 Pm
v
defining v. Note that the average of θ = m
j=1 j is θ and hence the
2
average of each |θ · xi − θ · xi | is the variance of v · xi divided by m. Taking
the expectation of the desired quantity, we have
n
E
n
1X
1X
|θ · xi − θ · xi |2 =
E|θ · xi − θ · xi |2
n
n
i=1
i=1
n
1 X E(v · xi )2
≤
n
m
i=1
n
1 X kxi k2∞ Λkθk1
≤
n
m
i=1
= Λkθk1 kxk2∞ /m.
Since this bound holds on average, there must exist a realization θ̃ of θ for
which the inequality is also satisfied. Consider the collection of all vectors
of the form
m
X
uj ,
(Λ/m)
j=1
where uj is any of the 2d + 1 signed standard basis vectors including the
zero vector. This collection has cardinality bounded by the number of nonnegative integer solutions q1 , q2 , . . . , q2d+1 to
q1 + q2 + · · · + q2d+1 = m.
This number is 2d+m
with its logarithm is bounded by m log(e(2d/m + 1))
m
or 2m log(d + 1). An important aspect of the log cardinality of this empirical
cover is that it is logarithmic (and not linear) in the dimension d. This
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
31
small dependence on d is what produces desirable risk bounds when d is
significantly greater than the available sample size n.
Lemma 7. Let Z have mean zero and variance σ 2 . Moreover, suppose Z
satisfies Bernstein’s moment condition with parameter η > 0. Then
2 2
t σ /2
(6.4)
E(etZ ) ≤ exp
, |t| < 1/η.
1 − η|t|
Lemma 8.
Define T f = min{Bn , |f |}sgnf . Then
(I) (y − T f )2 ≤ (y − f )2 + 2(|y| − Bn )2 I{|y| > Bn },
(II) (y − T f )2 ≤ (y − T f˜)2 + 4Bn |f − f˜| + 4Bn (|y| − Bn )I{|y| > Bn }, and
(III) (T f˜ − T f )2 ≤ (f − f1 )2 + 4Bn |f1 − f˜|.
Proof. (I) Since (y − T f )2 = (y − f )2 + 2(f − T f )(2y − f − T f ), the proof
will be complete if we can show that
(f − T f )(2y − f − T f ) ≤ (|y| − Bn )2 I{|y| > Bn }.
Note that if |f | ≤ Bn , the left hand size of the above expression is zero.
Thus we may assume that |f | > Bn , in which case f − T f = sgnf (|f | − Bn ).
Thus
(f − T f )(2y − f − T f ) = 2ysgnf (|f | − Bn ) − (|f | − Bn )(|f | + Bn )
≤ 2|y|(|f | − Bn ) − (|f | − Bn )(|f | + Bn ).
If |y| ≤ Bn , the above expression is less than −(|f | − Bn )2 ≤ 0. Otherwise,
it is a quadratic in |f | that attains its global maximum at |f | = |y|. This
yields a maximum value of (|y| − Bn )2 .
(II) For the second claim, note that
(y − T f )2 = (y − T f˜)2 + (T f˜ − T f )(2y − T f˜ − T f ).
Hence, we are done if we can show that
(T f˜ − T f )(2y − T f˜ − T f ) ≤ 4Bn |f − f˜| + 4Bn (|y| − Bn )I{|y| > Bn }.
If |y| ≤ Bn , then
(T f˜ − T f )(2y − T f˜ − T f ) ≤ 4Bn |T f˜ − T f |
≤ 4Bn |f˜ − f |.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
32
If |y| > Bn , then
(T f˜ − T f )(2y − T f˜ − T f ) ≤ 2|T f˜ − T f ||y| + 2Bn |T f˜ − T f |
= 2|T f˜ − T f |(|y| − Bn ) + 4Bn |T f˜ − T f |
≤ 4Bn (|y| − Bn ) + 4Bn |f˜ − f |.
(III) For the last claim, note that
(T f˜ − T f )2 = (T f˜ − T f1 )2 + [2T f˜ − T f1 − T f ](T f1 − T f )
≤ (T f˜ − T f1 )2 + 4Bn |T f1 − T f |
≤ (f˜ − f1 )2 + 4Bn |f1 − f |
Lemma 9.
Let Y = f ⋆ (X) + ǫ with |f ⋆ (X)| ≤ B. Suppose
(I) Ee|ǫ|/ν < +∞ or
(II) Ee|ǫ|
2 /ν
< +∞
for some ν > 0. Then E[(Y 2 − Bn2 )I{|Y | > Bn }] is at most
√
(I) (4ν 2 /n)Ee|ǫ|/ν provided Bn > 2(B + ν log n) or
√
√
2
(II) (2ν/n)Ee|ǫ| /ν provided Bn > 2(B + ν log n).
Proof. Under assumption (I),
p
P(Y 2 − Bn2 > t) = P(|Y | > t + Bn2 )
p
≤ P(|ǫ| > t + Bn2 − B)
√ √
≤ P(|ǫ| > (1/ 2)( t + Bn ) − B)
√ t 1 B√n
1
− (
−B)
≤ e− ν 2 e ν 2
Ee|ǫ|/ν .
The last inequality follows from a simple application of Markov’s inequality
after exponentiation.
Integrating the previous expression from t = 0 to t =
R ∞ −1√t
+∞ ( 0 e ν 2 dt = 4ν 2 ) yields an upper bound on E[(Y 2 − Bn2 )I{|Y | >
√
Bn }] that is at most (4ν 2 /n)Ee|ǫ|/ν provided Bn > 2(B + ν log n).
Under assumption (II),
P(Y 2 − Bn2 > t) = P(|Y |2 > t + Bn2 )
≤ P(|ǫ|2 > (1/2)(t + Bn2 ) − B 2 )
t
2
1 Bn
−B 2 )
2
≤ e− 2ν e− v (
Ee|ǫ|
2 /ν
.
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
33
The last inequality follows from a simple application of Markov’s inequality after exponentiation.
Integrating the previous expression from t = 0 to
R∞
t
t = +∞ ( 0 e− 2ν dt = 2ν) yields an upper bound on E[(Y 2 − Bn2 )I{|Y | >
√
√
|ǫ|2 /ν provided B >
2(B + ν log n) ≥
B
n
pn }] that is at most (2ν/n)Ee
2(B 2 + ν log n).
v
Lemma 10. The number of functions having the form m
hk belong to a library of size M is at most M −1+m
≤
m
logarithm bounded by m log(e(M/m + 1)).
Pm
k=1 hk , where
M +m
with its
m
Proof. Suppose the elements
Pm in the library are indexed from 1 to M . Let qi
be the number
of terms in k=1 hk of type i. Hence the number of function of
v Pm
the form m
k=1 hk is at most the number of non-negative integer solutions
q1 , q2 , . . . , qM to q1 + q2 + · · · + qM = m. This number is M −1+m
with
m
its logarithm bounded by the minimum of m log(e((M − 1)/m + 1)) and
m log M .
Acknowledgements. The risk bound framework of this paper is selfcontained, yet borrows heavily from the unpublished manuscript [15] written
with Cong Huang and Gerald Cheang, which was judged to be too long for
the Annals of Statistics. We are very indebted to their contributions. The
present paper with Jason Klusowski manages a compression of much of that
work, corrected determination of improved exponents of the rate, and new
improved rates for the high dimensional setting. The authors would also like
to thank William D. Brinda for useful discussions.
SUPPLEMENTARY MATERIAL
Supplement A: Proof of an approximation result and justification
of (4.1).
(doi: COMPLETED BY THE TYPESETTER; .pdf). We prove that a function satisfying a certain spectral condition belongs to the closure of the linear
span of ridge ramp functions. We also give a justification for the penalty divided by sample size as stated in (4.1).
References.
[1] Anthony, M. and Bartlett, P. L. (1999). Neural network learning: theoretical
foundations. Cambridge University Press, Cambridge. MR1741038
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
34
[2] Barron, A. R. (1993). Universal approximation bounds for superpositions of a sigmoidal function. IEEE Trans. Inform. Theory 39 930–945. MR1237720
[3] Barron, A. R. (1994). Approximation and estimation bounds for artificial neural
networks. Machine Learning 14 115-133.
[4] Barron, A., Birgé, L. and Massart, P. (1999). Risk bounds for model selection
via penalization. Probab. Theory Related Fields 113 301–413. MR1679028
[5] Barron, A. R. and Klusowski, J. M. (2016). Training artificial neural nets by
adaptive annealing. Preprint.
[6] Barron, A. R., Huang, C., Li, J. and Luo, X. (2008a). The MDL principle, penalized likelihoods, and statistical risk. Workshop on Information Theory Methods in
Science and Engineering, Tampere, Finland.
[7] Barron, A. R., Huang, C., Li, J. and Luo, X. (2008b). The MDL principle,
penalized likelihoods, and statistical risk. Festschrift in Honor of Jorma Rissanen
on the Occasion of his 75th Birthday Tampere University Press, Tampere, Finland.
Editor Ioan Tabus.
[8] Barron, A. R., Cohen, A., Dahmen, W. and DeVore, R. A. (2008c). Approximation and learning by greedy algorithms. Ann. Statist. 36 64–94. MR2387964
[9] Bartlett, P. L. (1998). The sample complexity of pattern classification with neural
networks: the size of the weights is more important than the size of the network. IEEE
Trans. Inform. Theory 44 525–536. MR1607706
[10] Breiman, L. (1993). Hinging hyperplanes for regression, classification, and function
approximation. IEEE Trans. Inform. Theory 39 999–1013. MR1237723
[11] Bunea, F., Tsybakov, A. B. and Wegkamp, M. H. (2007). Aggregation for Gaussian regression. Ann. Statist. 35 1674–1697. MR2351101
[12] Cheang, G. L. H. (1998). Neural network approximation and estimation of functions. Yale University, Department of Statistics PhD thesis.
[13] Gammerman, A., Vovk, V. and Vapnik, V. (1998). Learning by transduction.
Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence 148–
155.
[14] Huang, C. (2008). Risk of penalized least squares, greedy selection and ℓ1 penalization for flexible function libraries. Yale University, Department of Statistics
PhD thesis.
[15] Huang, C., Cheang, G. L. and Barron, A. R. (2008). Risk of penalized least squares, greedy selection and ℓ1 penalization for flexible function libraries. Yale University, Department of Statistics technical report.
http://www.stat.yale.edu/~ arb4/publications_files/RiskGreedySelectionAndL1penalization.pdf.
[16] Jones, L. K. (1992). A simple lemma on greedy approximation in Hilbert space and
convergence rates for projection pursuit regression and neural network training. Ann.
Statist. 20 608–613. MR1150368
[17] Juditsky, A. and Nemirovski, A. (2000). Functional aggregation for nonparametric
regression. Ann. Statist. 28 681–712. MR1792783
[18] Lee, W. S., Bartlett, P. L. and Williamson, R. C. (1996). Efficient agnostic
learning of neural networks with bounded fan-in. IEEE Trans. Inform. Theory 42
2118–2132. MR1447518
[19] Makovoz, Y. (1996). Random approximants and neural networks. J. Approx. Theory
85 98–109. MR1382053
[20] Yang, Y. and Barron, A. (1999). Information-theoretic determination of minimax
rates of convergence. Ann. Statist. 27 1564–1599. MR1742500
[21] Zhang, T. (2009). Some sharp performance bounds for least squares regression with
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
35
L1 regularization. Ann. Statist. 37 2109–2144. MR2543687
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
Submitted to the Annals of Statistics
arXiv: 1607.01434
SUPPLEMENT TO ”RISK BOUNDS FOR
HIGH-DIMENSIONAL RIDGE FUNCTION
COMBINATIONS INCLUDING NEURAL NETWORKS”
By Jason M. Klusowski and Andrew R. Barron
Yale University
We prove that a function satisfying a certain spectral condition
belongs to the closure of the linear span of ridge ramp functions.
We also give a justification for the penalty divided by sample size as
stated in (4.1).
R
Theorem. For an arbitrary target function f ⋆ (x) = Rd eix·ω f˜(ω)dω with
R
vf ⋆ ,2 = Rd kωk21 |f˜(ω)|dω finite, there exists a linear combination of ridge
ramp functions with kak k = 1 and |bk | ≤ 1 such that
kf ⋆ − fm k2 ≤
16vf2 ⋆ ,2
m
.
Proof. If f ⋆ can be extended to a function on L2 (Rd ) with Fourier transform f˜, the function f ⋆ (x) − x · ∇f ⋆ (0) − f ⋆ (0) can be written as the real
part of
Z
(eiω·x − iω · x − 1)f˜(ω)dω.
(6.5)
Rd
If |z| ≤ c, we note the identity
Z c
[(z − u)+ eiu + (−z − u)+ e−iu ]du = eiz − iz − 1.
−
0
If c = kωk1 , z = ω · x, α = α(ω) = ω/kωk1 , and u = kωk1 t, 0 ≤ t ≤ 1, we
find that
Z 1
2
−kωk1
[(α · x − t)+ eikωk1 t + (−α · x − t)+ e−ikωk1 t ]dt =
0
eiω·x − iω · x − 1.
36
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
37
Multiplying the above by f˜(ω) = eib(ω) |f˜(ω)|, integrating over Rd , and applying Fubini’s theorem yields
Z Z 1
⋆
⋆
⋆
g(t, ω)dtdω,
f (x) − x · ∇f (0) − f (0) =
Rd
0
where
g(t, ω) = −[(α · x − t)+ cos(kωk1 t + b(ω))+
(−α · x − t)+ cos(kωk1 t − b(ω))]kωk21 |f˜(ω)|.
Consider a density on {−1, 1} × [0, 1] × Rd defined by
p(z, t, ω) = | cos(zkωk1 t + b(ω))|kωk21 |f˜(ω)|/v
where
Z Z 1
v=
[| cos(kωk1 t+b(ω))|+| cos(kωk1 t−b(ω))|]kωk21 |f˜(ω)|dtdω ≤ 2vf ⋆ ,2 .
Rd
0
Consider a random variable h(z, t, α)(x) that equals
(zα · x − t)+ s(zt, ω),
where s(t, ω) = −sgn cos(kωk1 t + b(ω)). Note that h(z, t, α)(x) has the form
±(α · x − t)+ . We see that
v
Z
f ⋆ (x) − x · ∇f ⋆ (0) − f ⋆ (0) =
{−1,1}×[0,1]×Rd
h(z, t, α)(x)dp(z × t × ω).
One can obtain the final result by sampling (z1 , t1 , ω1P
), . . . , (zm , tm , ωm ) ranm
v
domly from p(z, t, ω) and considering the average m
k=1 h(zk , tk , ωk ). Note
⋆
that since x = (x)+ − (−x)+ , we can regard x · ∇f (0) as belonging to the
linear span of {x 7→ z(α · x − t)+ : kαk1 = 1, 0 ≤ t ≤ 1, z ∈ {−1, 1}}. An
easy argument shows that its variance is bounded by 16vf2 ⋆ ,2 /m. This simple
argument can be extended to higher order expansions of f ⋆ . The function
f ⋆ (x) − xT Hf ⋆ (0)x/2 − x · ∇f ⋆ (0) − f ⋆ (0) (Hf ⋆ (0) is the Hessian of f ⋆ at
the point zero) can be written as the real part of
Z
(eiω·x + (ω · x)2 /2 − iω · x − 1)f˜(ω)dω.
(6.6)
Rd
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
38
As before, the integrand in (6.6) admits an integral representation by
(i/2)kωk31
Z
1
0
[(−α · x − t)2+ e−ikωk1 t − (α · x − t)2+ eikωk1 t ]dt.
Employing a sampling argument from an appropriately defined density, we
are able to approximate f ⋆ (x) − xT Hf ⋆ (0)x/2 − x · ∇f ⋆ (0) by a linear combinations of m second order spline functions (having bounded internal parameters) (α · x − t)2+ with a squared error bounded by 16vf2 ⋆ ,3 /m.
In the next part of the supplement, we justify the form of the penalty divided
by sample size as stated in (4.1). For this, we first need a lemma.
P
Lemma. Let f = h βh h and let H̃ be an empirical L2 ǫ-net
P of H of size
M . There is a choice of h̃1 , . . . , h̃m in H̃ with f˜m = (v/m) m
k=1 h̃k , v ≥ vf
such that
Pn (T f˜||f ⋆ ) − 2Pn (f ||f ⋆ ) + Dn′ (f˜, f ) ≤
Pn
4vvf
+ 6v 2 ǫ2 + 4σvǫ + Tn + Rn ,
m
√
Pn
4 √3ησ
2
2
i=1 (ǫi −σ ) > 0}. Moreover, ERn ≤
n
˜
and if F̃ denotes the collection
of functions of the form fm , then F̃ has
+m
cardinality at most Mm
.
where Rn =
1
n
1
2
2
i=1 (ǫi −σ )I{ n
Pm
˜
˜
Proof.
Let
f
=
(v/m)
m
k=1 hk be as in Lemma 3 and f = fm =
Pm
(v/m) k=1 h̃k be as in Lemma 5. Furthermore, define
q
τn = min{1, Dn (f˜m , fm )/σ 2 }.
By Lemma 8 (I),
Pn (T f˜m ||f ⋆ ) ≤ Pn (f˜m ||f ⋆ ) + Tn ,
and hence
Pn (T f˜m ||f ⋆ ) − (1 + τn )Pn (f ||f ⋆ ) ≤ Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (f ||f ⋆ ) + Tn .
Also observe that
Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (f ||f ⋆ ) = [Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (fm ||f ⋆ )]+
(1 + τn )[Pn (fm ||f ⋆ ) − Pn (f ||f ⋆ )],
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
RISK BOUNDS FOR HIGH-DIMENSIONAL RIDGE COMBINATIONS
and
39
Dn′ (f˜m , f ) ≤ 2Dn′ (f˜m , fm ) + 2Dn′ (f, fm ).
By Lemma 3,
Pn (fm ||f ⋆ ) − Pn (f ||f ⋆ ) + Dn′ (f˜, f ) ≤
Using the inequality a2 − (1 + τ )b2 ≤
1+τ
τ (a
2vvf
.
m
− b)2 , we have
1 + τn
Dn (f˜m , fm ) + τn ǫ2n
Pn (f˜m ||f ⋆ ) − (1 + τn )Pn (fm ||f ⋆ ) ≤
τn
1 + τn
≤
Dn (f˜m , fm ) + τn σ 2 + Rn
τn
q
≤ 3Dn (f˜m , fm ) + 2σ Dn (f˜m , fm ) + Rn ,
P
where the last inequality follows from the definition of τn and ǫ2n = n1 ni=1 ǫ2i .
The first conclusion is proved after observing that Dn (f˜m , fm ) ≤ 2v 2 ǫ2 .
The statement about the cardinality of F̃ follows immediately from the form
of f˜ and Lemma 10.
We are also able to comment on how Rn behaves on average. To see this,
note
that Rn ≤ s +
Rn I{Rn > s} for all s > 0. Now, Rn I{Rn > s} =
1 Pn
1 Pn
2
2
2
2
i=1 (ǫi − σ )I{ n
i=1 (ǫi − σ ) > s}. By Chebychev’s inequality and the
n
2
2
fact that V(ǫ) ≤ σ and V(ǫ ) ≤ 12η 2 σ 2 (as per the Bernstein moment
P
V(ǫ2 )
condition on the noise), P( n1 ni=1 (ǫ2i − σ 2 ) > s + t) ≤ n(t+s)
2 . Integrating
this inequality from t = 0 to t = +∞ yields Rn I{Rn > s} ≤
√
√
p
2 V(ǫ2 )
2
.
s = V(ǫ )/n produces ERn ≤ √n ≤ 4 √3ησ
n
V(ǫ2 )
ns .
Choosing
By the above lemma and similar arguments leading to the conclusion of
Theorem 3, we see that a valid penalty divided by sample size is at least
4vvf
γn m log M
+
+ 6v 2 ǫ2 + 2σvǫ + Tn + Rn
n
m
2 ⌉
By Lemma 6, an empirical L2 ǫ-cover of H has cardinality less than 2d+⌈(Λ/ǫ)
.
⌈(Λ/ǫ)2 ⌉
2d+⌈(Λ/ǫ)2 ⌉
2
The logarithm of ⌈(Λ/ǫ)2 ⌉ is bounded by 4(Λ/ǫ) log(d + 1). Thus we see
that a valid penalty divided by sample size is at least
(6.7)
4γn m(Λ/ǫ)2 log(d + 1) 4vvf
+
+ 6v 2 ǫ2 + 4σvǫ + Tn + Rn
n
m
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
40
1/2
nvvf ǫ2
. Plugging this back into
Choose m to be the ceiling of γn Γ2 log(d+1)
(6.7), we find that a valid penalty divided by sample size is at least
8
vvf γn Λ2 log(d + 1)
nǫ2
1/2
+
4γn Λ2 log(d + 1)
+ 6v 2 ǫ2 + 4σvǫ + Tn + Rn .
nǫ2
Choose v = vf and
ǫ=
1
v2 n
γn Λ2 log(d+1)
1/6
+
σ2 n
γn Λ2 log(d+1)
1/4 .
With this choice of ǫ, a valid penalty divided by sample size is seen to be at
least a modest constant multiple of
vf4 Λ2 γn log(d + 1)
n
!1/3
+
√
σ
σ
!2/3
vf4 Λ2 γn log(d + 1)
n
!1/4
+
2/3
Λ2 γn log(d + 1)
+
+
n
!3/4
Λ4/3 γn log(d + 1)
+ Tn + Rn .
n
vf2 Λ2 γn log(d + 1)
n
√
2
Thus when Λ γn log(d+1)
is small, we see that the penalty divided by sample
n
size has the form (4.1) plus negligible terms that do not depend on the
candidate fit.
Yale University
Department of Statistics
24 Hillhouse Avenue
New Haven, Connecticut
E-mail: [email protected]
[email protected]
imsart-aos ver. 2011/11/15 file: KlusowskiBarronArXiv2016.tex date: July 27, 2016
| 10math.ST
|
Федеральное государственное автономное образовательное учреждение
высшего профессионального образования
«СИБИРСКИЙ ФЕДЕРАЛЬНЫЙ УНИВЕРСИТЕТ»
arXiv:1601.07224v1 [cs.AI] 26 Jan 2016
Институт математики и фундаментальной информатики
Базовая кафедра математического моделирования и процессов управления
БАКАЛАВРСКАЯ РАБОТА
Направление 010101.62 Математика
ПОРОЖДАЮЩЕЕ ВЕРОЯТНОСТНОЕ ПРОГРАММИРОВАНИЕ
Выпускник – Юрий Перов1.
Научный руководитель в СФУ – Татьяна Валерьевна Крупкина.
Кембридж-Оксфорд-Красноярск 2012–2014
1
Адрес для корреспонденции: [email protected]
РЕФЕРАТ
Выпускная квалификационная бакалаврская работа по теме «Порождающее вероятностное программирование» содержит 48 страниц текста, 50 использованных источников, 12 рисунков.
Ключевые слова: ВЕРОЯТНОСТНОЕ ПРОГРАММИРОВАНИЕ, МАШИННОЕ
ОБУЧЕНИЕ, ИСКУССТВЕННЫЙ ИНТЕЛЛЕКТ, ВЕРОЯТНОСТНЫЕ МОДЕЛИ, АВТОМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ.
Работа посвящена новому направлению в области машинного обучения и компьютерных наук — вероятностному программированию. В работе дается краткое реферативное введение в языки вероятностного программирования Church/Venture/Anglican, а также описываются результаты первых экспериментов по автоматической генерации вероятностных программ.
СОДЕРЖАНИЕ
Введение
4
1 Краткое введение в языки вероятностного программирования Church,
Venture и Anglican
8
1.1
Первое знакомство с Church, Venture, Anglican . . . . . . . . . . . . . . . . .
8
1.2
Статистический вывод в вероятностных языках программирования с помощью алгоритма Метрополиса-Гастингса . . . . . . . . . . . . . . . . . . . . . 11
1.2.1
Метод «выборки с отклонением» . . . . . . . . . . . . . . . . . . . . . 11
1.2.2
Пространство историй выполнений вероятностных программ . . . . . 12
1.2.3
Апостериорное распределение историй выполнений программ . . . . . 14
1.2.4
Использование методов Монте-Карло по схеме Марковских цепей . . 15
1.2.5
Программная реализация статистического вывода . . . . . . . . . . . 19
1.3
Эффективность вывода . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.4
Порождающее вероятностное программирование в распознавании образов . 24
1.5
О различиях между Church, Venture, Anglican . . . . . . . . . . . . . . . . . . 26
2 Автоматическая генерация вероятностных программ
27
2.1
Обзор литературы . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2
Описание подхода . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3
Грамматика и порождающие правила . . . . . . . . . . . . . . . . . . . . . . . 33
2.4
Вероятности использования порождающих правил . . . . . . . . . . . . . . . 35
2.5
Эксперименты . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5.1
Выборки из сгенерированных вероятностных программ . . . . . . . . 36
2.5.2
Вывод вероятностных программ, определяющих распределения, совпадающие или приближающие классические одномерные распределения . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2
2.5.3
Обобщение произвольных эмпирических данных с помощью порождающего вероятностного программирования . . . . . . . . . . . . . . . 37
2.5.4
2.6
«Компиляция» вероятностных программ . . . . . . . . . . . . . . . . . 39
Обобщение порождающего вероятностного программирования . . . . . . . . 41
Заключение
44
Список использованных источников
45
3
Моей любимой Маше и всем
другим моим любимым родным
ВВЕДЕНИЕ
Данная бакалаврская работа посвящена вероятностному программированию [1], новому направлению в областях машинного обучения, искусственного интеллекта и компьютерных наук, а именно реферативному краткому введению в вероятностное программирование, описанию языков вероятностного программирования Church [2], Venture [3]
и Anglican [4], описанию подхода порождающего вероятностного программирования для
решения задач распознавания образов [5], а также представлению полученных предварительных результатов по автоматизации вывода вероятностных моделей для вероятностного программирования [6].
Описание структуры работы
Первая часть данной работы начинается с общих сведений о вероятностном программировании, а затем в ней кратко описываются результаты, полученные коллегами автора и им
самим в работе над научными проектами на протяжении двух лет в Массачусетском технологическом инситуте под руководством профессора Джошуа Тененбаума и доктора Викаша Мансингхи (Кембридж, штат Массачусетс, США) и Оксфордском университете под
руководством профессора Френка Вуда (Великобритания, Оксфорд). Эта часть работы,
являясь по сути переводом, представляет собой реферативную выдержку о вероятностном программировании и его приложениях на русском языке. Насколько автору известно,
литературы о вероятностном программировании на русском языке практически нет, поэтому он надеется, что данная чисто реферативная часть работы принесет существенную
пользу русскоговорящему научному сообществу, а особенно заинтересованным студентам
и школьникам, которые впервые захотят познакомиться с развивающимся направлением
вероятностного программирования.
Во второй части данной работы автор описывает новые результаты в области вероятностного программирования, связанные с автоматизированным или полуавтоматизированным выводом вероятностных моделей для вероятностного программирования, полученные во время стажировки автора в Департаменте технических наук Оксфордского
4
университета в научной лаборатории профессора Френка Вуда и под его руководством.
Вторая часть завершается рассуждениями автора об обобщении автоматизированного изучения и вывода компьютером вероятностных моделей в виде вероятностных программ, то
есть о возможностях порождающего вероятностного программирования.
Вероятностное программирование
Вероятностное программирование можно определить как компактный, композиционный
способ представления порождающих вероятностных моделей и проведения статистического вывода в них с учетом данных с помощью обобщенных алгоритмов.
Вероятностная модель является важным понятием машинного обучения, одного из
основных направлений искусственного интеллекта на сегодняшний день. В общем случае в рамках теории машинного обучения перед компьютером ставится задача произвести
какое-то действие yi на основе входных данных xi , априорных знаний и возможности взаимодействовать со средой. Без ограничений общности целевым действием для компьютера
можно считать производство ответа в виде выходных данных, представленных в виде информации. Например, в робототехнике эта информация может являться инструкциями
для моторов и механических устройств для выполнения тех или иных физических действий роботом.
При использовании различных подходов в рамках машинного обучения используются модели, которые являются формальным «описанием компонентов и функций, отображающих существенные свойства моделируемого объема или процесса» [7]. В рамках
машинного обучения используются вероятностные модели, так как свойства, элементы и
связи между ними являются не фиксированными, а стохастическими.
Классическим примером одного из подходов в машинном обучении является способ
«обучение с учителем», когда существует N прецедентов, то есть пар входных и выходных
данных обучающей выборки X = {xi }, Y = {yi }, i = 1, N , и необходимо найти алгоритм
описывающий зависимость между xi и yi , то есть алгоритм F , который позволяет на основе каждого элемента входных данных xi получать абсолютно или достаточно точный
элемент выходных данных yi , то есть F (xi ) → yi . С помощью данного алгоритма затем
для M известных элементов входных данных {xi }, j = N + 1, N + M находятся значения
M неизвестных элементов выходных данных {yi }, j = N + 1, N + M . В рамках машинного обучения эта проблема, в том числе, решается с помощью методов регрессионного
5
анализа.
В только что приведенной как пример модели неизвестными (скрытыми) параметрами T = {tj }, j = 1, K будет информация о характеристиках модели F , которые подлежат
выводу при данной обучающей выборке в виде пар (xi , yi ).
Приведем простой пример: в линейной регрессии (при L независимых переменных)
значениями независимых переменных будут xi,j , значениями зависимой переменной будут
yi , параметрами модели будут t1 , t2 , . . . , tL+1 , а алгоритмом F будет
yi = Ft1 ,...,tL+1 (xi ) = t1 + t2 · xi,1 + . . . + tL+1 · xi,L .
Для простоты без ограничений общности будем считать, что мы можем всегда получить yi детерминированно, зная T и xi .
В порождающих вероятностных моделях задается совместное распределение вероятностей P (T, X), обычно сначала путем задания априорного распределения P (T ), а затем
задания условного распределения P (X | T ). Это и называется моделью.
При заданной модели и известных X задачей будет являться поиск апостериорного распределения на T , таким образом P (T | X). Одним из способов поиска данного
апостериорного распределения является применение теоремы Байеса:
P (T | X) =
где P (X) теоретически можно найти как
R
P (T )P (X | T )
,
P (X)
P (T )P (X | T ) dT , но при решении практиче-
ских задач это часто невозможно, так как перебор всего пространства T не поддается
аналитическому решению или решению с помощью численных методов за разумное время. Поэтому чаще всего при решении задач в рамках Байесовского подхода стоит задача
поиска ненормированного значения P (T | X):
P (T | X) ∝ P (T )P (X | T ),
где символ ∝, часто встречающийся в зарубежной литературе, но очень редко встречающийся у нас, означает «пропорционально». Нормировочную константу затем можно найти
приближенно, но иногда ее значение даже не вычисляют, так как бывает достаточно найти
и работать дальше с наиболее вероятными элементами T̂ из апостериорного распределения
6
P (T | X).
Обычно, особенно при решении практических задач с большим объемом данных
и в рамках сложных моделей, апостериорное распределение P (T | X) находят не точно,
а с помощью приближенных методов, в том числе с помощью методов Монте-Карло [8],
которые позволяют сгенерировать выборку из интересующего нас распределения.
Как отмечалось в самом начале данного подраздела, вероятностное программирование позволяет:
1. Композиционно и компактно записывать порождающую вероятностную модель
с помощью задания априорных вероятностей P (T ) и P (X | T ) в виде алгоритма
(вероятностной программы) с использованием стохастических функций (например, стохастическая функция Normal(µ, σ)) и вспомогательных детерминированных функций (например, + или ∗).
2. Снабжать модель данными X̂, таким образом теоретически определяя условное
распределение P (T | X̂).
3. Производить статистический вывод для генерации выборки из условного распределения с помощью обобщенных алгоритмов статистического вывода, подходящих для всех или большого множества моделей.
Для ознакомления с машинным обучением и искусственным интеллектом автор
рекомендует следующие источники: [9, 10, 11]. Информацию о вероятностных моделях и
Байесовских методах на русском языке можно найти в [12].
7
1
Краткое введение в языки вероятностного программирования
Church, Venture и Anglican
Существует более 15 языков вероятностного программирования, перечень с кратким описанием каждого из них можно найти на [13]. В данной работе реферативно будут рассмотрены три языка вероятностного программирования: Church [2], Venture [3] и Anglican [4].
Языки Venture и Anglican являются продолжениями языка Church. Church в свою очередь
основан на языке «обычного» программирования Lisp и Scheme. Заинтересованному читателю крайне рекомендуется ознакомиться с книгой [14], являющейся одним из лучших
способов начать знакомство с языком «обычного» программирования Scheme.
1.1
Первое знакомство с Church, Venture, Anglican
На текущий момент любой язык вероятностного программирования напрямую связан с
методами статистического вывода, которые используются в нем, поэтому часто язык ассоциируется с платформой вероятностного программирования, то есть с его технической
реализацией в виде компьютерной программы.
Рассмотрим задание простой вероятностной модели Байесовской линейной регрессии [10] на языке вероятностного программирования Venture/Anglican [15] в виде вероятностной программы:
1 [ASSUME t 1 ( normal 0 1 ) ]
2 [ASSUME t 2 ( normal 0 1 ) ]
3 [ASSUME n o i s e 0 . 0 1 ]
4 [ASSUME noisy_x ( lambda ( time ) ( normal (+ t 1 (∗ t 2 time ) ) n o i s e ) ) ]
5 [OBSERVE ( noisy_x 1 . 0 ) 1 0 . 3 ]
6 [OBSERVE ( noisy_x 2 . 0 ) 1 1 . 1 ]
7 [OBSERVE ( noisy_x 3 . 0 ) 1 1 . 9 ]
8 [ PREDICT t 1 ]
9 [ PREDICT t 2 ]
10 [ PREDICT ( noisy_x 4 . 0 ) ]
Скрытые искомые параметры — значения коэффициентов t1 и t2 линейной функции
x (time) = t1 + t2 · time. У нас есть априорные предположения о данных коэффициентах,
8
а именно мы предполагаем, что они распределены по закону нормального распределения
Normal(0, 1) со средним 0 и стандартным отклонением 1. Таким образом, мы определили в
первых двух строках вероятностной программы вероятность P (T ), описанную в предыдущем раздел. Инструкцию [ASSUME name expression] можно рассматривать как определение случайной величины с именем name, принимающей значение вычисляемого выражение
(программного кода) expression, которое содержит в себе неопределенность.
Вероятностные языки программирования (здесь и далее будут иметься в виду конкретно Church, Venture, Anglican, если не указано иное), как и Lisp/Scheme, являются
функциональными языками программирования, и используют польскую нотацию1 при
записи выражений для вычисления. Это означает, что в выражении вызова функции сначала располагается оператор, а уже только потом аргументы: (+ 1 2), и вызов функции
обрамляется круглыми скобками. На других языках программирования, таких как C++
или Python, это будет эквивалентно коду 1 + 2.
В вероятностных языках программирования выражение вызова функции принято
разделять на три разных вида:
1. Вызов детерминированных процедур (primitive-procedure arg1 ...argN), которые при одних и тех же аргументах всегда возвращают одно и то же значение.
К таким процедурам, например, относятся арифметические операции.
2. Вызов вероятностных (стохастических) процедур (stochastic-procedure arg1
...argN), которые при каждом вызове генерируют случайным образом элемент
из соответствующего распределения. Такой вызов определяет новую случайную
величину. Например, вызов вероятностной процедуры (normal 1 10) определяет случайную величину, распределенную по закону нормального распределения
√
Normal(1, 10), и результатом выполнения каждый раз будет какое-то вещественное число.
3. Вызов
составных
процедур
(compound-procedure arg1 ...argN),
где
compound-procedure — введенная пользователем процедура с помощью специального выражения lambda: (lambda (arg1 ...argN) body), где body — тело
процедуры, состоящее из выражений. В общем случае составная процедура
является стохастической (недетерминированной) составной процедурой, так как
1 Venture имеет отдельный дополнительный вид синтаксиса VentureScript, использующий инфиксную нотацию и не требующий обрамления вызова функций скобками, то есть схожий по своей сути с привычными большинству людей языками
программирования C, C++, Python и т.д.
9
ее тело может содержать вызовы вероятностных процедур.
После этого мы хотим задать условную вероятность P (X | T ) наблюдаемых переменных x1 , x2 , x3 при заданных значениях скрытых переменных t1 , t2 и параметра
time.
Перед вводом непосредственно самих наблюдений с помощью выражения [OBSERVE
...] мы определяем общий закон для наблюдаемых переменных {xi } в рамках нашей
модели, а именно мы предполагаем, что данные наблюдаемые случайные величины при
заданных t1 , t2 и заданном уровне шума noise распределены по закону нормального рас√
пределения Normal(t1 +t2 ·time, noise) со средним t1 +t2 ·time и стандартным отклонением
noise. Данная условная вероятность определена на строках 3 и 4 данной вероятностной
программы. noisy_x определена как функция, принимающая параметр time и возвращающая случайное значение, определенное с помощью вычисления выражение (normal (+
t1 (* t2 time)) noise) и обусловленное значениями случайных величин t1 и t2 и переменной noise. Отметим, что выражение (normal (+ t1 (* t2 time)) noise) содержит
в себе неопределенность, поэтому каждый раз при его вычислении мы будем получать в
общем случае разное значение.
На строках 5—7 мы непосредственно вводим известные значения xˆ1 = 10.3, xˆ2 =
11.1, xˆ3 = 11.9. Инструкция вида [OBSERVE expression value] фиксирует наблюдение о
том, что случайная величина, принимающая значение согласно выполнению выражения
expression, приняла значение value.
Повторим на данном этапе всё, что мы сделали. На строках 1—4 с помощью инструкций вида [ASSUME ...] мы задали непосредственно саму вероятностную модель:
P (T ) и P (X | T ). На строках 5—7 мы непосредственно задали известные нам значения
наблюдаемых случайных величин X с помощью инструкций вида [OBSERVE ...].
На строках 8—9 мы запрашиваем у системы вероятностного программирования апостериорное распределение P (T | X) скрытых случайных величин t1 и t2 . Как уже было
сказано, при большом объеме данных и достаточно сложных моделях получить точное
аналитическое представление невозможно, поэтому инструкции вида [PREDICT ...] генерируют выборку значений случайных величин из апостериорного распределения P (T | X)
или его приближения. Инструкция вида [PREDICT expression] в общем случае генерирует один элемент выборки из значений случайной величины, принимающей значение
10
согласно выполнению выражения expression. Если перед инструкциями вида [PREDICT
...] расположены инструкции вида [OBSERVE ...], то выборка будет из апостериорного
распределения2 , обусловленного перечисленными ранее введенными наблюдениями.
Отметим, что в завершении мы можем также предсказать значение функции
x(time) в другой точке, например, при time = 4.0. Под предсказанием в данном случае понимается генерация выборки из апостериорного распределения новой случайной
величины при значениях скрытых случайных величин t1 , t2 и параметре time = 4.0.
Для генерации выборки из апостериорного распределения P (T | X) в языке
программирования Church в качестве основного используется алгоритм МетрополисаГастингса, который относится к методам Монте-Карло по схеме Марковских цепей. В
следующем подразделе будет произведено подробное описание применения данного алгоритма для обобщенного статистического вывода в вероятностных языках. Под «обобщенным» выводом в данном случае понимается то, что алгоритм может быть применен
к любым вероятностным программам, написанным на данном вероятностном языке программирования.
1.2
Статистический вывод в вероятностных языках программирования с помощью алгоритма Метрополиса-Гастингса
Описание алгоритма Метрополиса-Гастингса в применении к «семейству» вероятностных
языков Church впервые опубликовано в [2] и более подробно описано в [16].
Получить выборку из N элементов из априорного распределения скрытых параметров P (T ), наблюдаемых величин P (X | T ) или их совместного распределение P (T, X)
какой-либо порождающей вероятностной модели, записанной в виде вероятностной программы, не составляет труда. Для этого достаточно выполнить вероятностную программу
N раз. Отметим очевидный факт, что в данном случае вероятностная программа будет содержать лишь инструкции вида [ASSUME ...] (задание вероятностной модели) и [PREDICT
...] (перечисление случайных величин, выборку которых мы генерируем).
1.2.1
Метод «выборки с отклонением»
При заданных наблюдениях с помощью инструкций вида [OBSERVE expression value]
наиболее простым способом получения апостериорного распределения является метод
2 Говоря
точнее, конечно, из приближения апостериорного распределения.
11
«выборки с отклонением» [17]. Для понимания рассмотрим следующую вероятностную
программу:
1 [ASSUME a ( uniform−d i s c r e t e 1 6 ) ]
2 [ASSUME b ( uniform−d i s c r e t e 1 6 ) ]
3 [OBSERVE (+ a b ) 5 ]
4 [ PREDICT (∗ a b ) ]
Отметим, что стохастическая процедура (uniform-continuous a b) возвращает
значение случайной величины, распределенной по равномерному дискретному закону распределения с носителем {a, . . . , b}.
Текстом задачу, записанную выше с помощью вероятностной программы, можно
сформулировать следующим образом: подбрасываются два шестигранных игральных кубика, в сумме выпало 5; каково распределение произведения очков на этих двух кубиках?
Метод «выборки с отклонением» заключается в том, чтобы генерировать значения
очков на первом и втором кубиках из их априорного распределения (таким образом, два
независимых дискретных равномерных распределения) и проверять, равна ли их сумма
5. Если нет, данная попытка отвергается и не учитывается. Если да, то произведение
очков на кубиках добавляется во множество элементов выборки. Данная выборка и будет аппроксимацией апостериорного распределения значений произведения очков на двух
кубиках, если известно, что сумма очков равна 5.
Данный метод является неэффективным, и при решении более сложных задач просто вычислительно неосуществимым. Также отметим, что он хорошо подходит только для
дискретных значений случайных и промежуточных переменных.
1.2.2
Пространство историй выполнений вероятностных программ
При выполнении вероятностной программы каждая случайная величина принимает определенное значение. Например, следующая вероятностная программа содержит три случайных величины, каждая из которых распределена по закону нормального распределения:
1 [ASSUME a ( normal 0 1 ) ]
2 [ASSUME b ( normal 0 1 ) ]
12
3 [ASSUME c ( normal (+ a b ) 1 ) ]
4 [ PREDICT c ]
При выполнении данной вероятностной программы каждая из трех случайных величин примет свое случайное значение. Назовем историей выполнения вероятностной
программы отображение, сопоставляющее каждой случайной величине ее значение. Мощность истории выполнения совпадает с количеством случайных величин, которые были
созданы при ее выполнении.
Для каждой программы можно определить соответствующее вероятностное пространство, элементарными событиями которого будут являться все истории ее выполнения. Вероятностью каждого элементарного события будет являться произведение вероятностей принятие того или иного значения каждой случайные величины при данной
истории выполнения.
Очевидно, что история выполнения однозначным образом определяет выполнение
вероятностной программы и принимаемые значения, как случайных, так и зависящих от
них детерминированных выражений.
Для примера рассмотрим еще более простую вероятностную программу.
1 [ASSUME a ( b e r n o u l l i 0 . 7 ) ]
2 [ASSUME b ( b e r n o u l l i 0 . 7 ) ]
3 [ PREDICT a ]
4 [ PREDICT b ]
В ней обе случайных величины имеют свое название, что облегчает запись историй
выполнений (иначе необходимо вводить адресную схему для наименования случайных
величин, чтобы однозначно идентифицировать их).
Данная вероятностная программа имеет четыре различных возможных историй
выполнений, а именно {a : 0, b : 0}, {a : 0, b : 1}, {a : 1, b : 0} и {a : 1, b : 1} с вероятностями
0.09, 0.21, 0.21 и 0.49 соответственно.
Отметим также, что количество «активных» случайных величин при выполнении
одной и той же вероятностной программы может меняться, как, например, в следующей
программе:
[ASSUME g e o m e t r i c
13
( lambda ( p ) ( i f (= ( b e r n o u l l i p ) 1 ) 0 (+ ( g e o m e t r i c p ) 1 ) ) ) ]
[ PREDICT ( g e o m e t r i c 0 . 5 ) ]
Данная программа генерирует элемент (т.е. одноэлементную выборку) из геометрического распределения с параметром 0.5 с помощью составной процедуры geometric,
параметризованной параметром p. При выполнении данной вероятностной программы
в истории ее выполнения количество «активных» случайных величин может быть любым.
1.2.3
Апостериорное распределение историй выполнений программ
При добавлении наблюдений, то есть фиксации значения определенных случайных величин, можно считать, что рассматривается подмножество множества элементарных событий, а именно те элементы, в историях выполнений которых наблюдаемые случайные
величины принимают желаемое значение.
Можно описать другое вероятностное пространство, множеством элементарных событий которого будет являться только что описанное подмножество. Вероятностная мера
в новом вероятностном пространстве может быть «индуцирована» вероятностной мерой из
первоначального вероятностного пространства с учетом нормировочной константы.
Только что описанный переход полностью сочетается с теоремой Байеса, которая в
нашем случае записывается следующим образом:
P (T | X = x̂) =
P (T )P (X = x̂ | T )
,
P (X = x̂)
где X — множество случайных величин, для которых мы знаем фиксированные наблюдаемые значения; T — множество случайных величин, ассоциируемых со скрытыми параметрами, апостериорное распределение которых мы заинтересованы получить (грубо
говоря, это всё остальные случайные величины); x̂ — наблюдаемые значения случайных
величин.
Отметим, что часто мы заинтересованы не в апостериорном распределении
P (T | X = x̂), а в апостериорном распределении лишь части скрытых параметров
P (T 0 ⊂ T | X = x̂) или даже функции f от них P (f (T ) | X = x̂), в общем случае не
являющейся биекцией. С другой стороны, так как мы не ставим задачу получить аналитическое представление данных апостериорных распределений, а лишь выборку из них, то
14
это не играет большой роли в нашем случае при решении задач методами Монте-Карло:
мы можем генерировать элементы выборки из P (T | X = x̂), и затем использовать только
значения нужных нам скрытых случайных величин и/или действовать функцией f на
них.
1.2.4
Использование методов Монте-Карло по схеме Марковских цепей
Математическо-статистический аппарат методов Монте-Карло по схеме Марковских цепей
кратко и «современно» изложен в [8].
Интуитивно опишем, что мы собираемся делать. У нас есть вероятностная программа g, определяющая множество скрытых T и наблюдаемых X случайных величин.
Вероятностная программа своей записью задает априорное распределение P (T ), P (X | T ),
а значит и совместное распределение P (T, X). Каждый раз путем выполнения данной
программы мы получаем одну из возможных реализаций данной программы, которая биективно описывается соответствующей историей выполнения hi ∈ H, где множество H —
множество всех возможных историй выполнений данной вероятностной программы, которое можно рассматривать как множество элементарных событий. Для каждой истории
выполнения определена ее вероятностная мера
P (hi ) = P (T = t̃, X = x̃) = P (T = t̃)P (X = x̃ | T = t̃).
У нас также есть «экспериментальное» значение каждой наблюдаемой случайной
величины x̂i , то есть множество {x̂i } = x̂. Существует подмножество историй выполнений
H 0 ⊂ H, в котором наблюдаемые случайные величины принимают желаемое значение.
Данное подмножество можно рассматривать как множество элементарных событий другого вероятностного пространства, вероятностную меру на котором можно «индуцировать»
из предыдущего путем деления на нормирующую постоянную P (X = x̂):
P (h0 ) =
P (T = t̃)P (X = x̂ | T = t̃)
.
P (X = x̂)
Будем обозначать ненормированную вероятностную меру
˜ 0 ) = P (T = t̃)P (X = x̂ | T = t̃).
P (h
15
Рассмотрим цепь Маркова, исходами которой являются истории выполнений h0 ∈
H 0 . В качестве начального распределения можно выбрать априорное распределение
P (T )P (X | T ), при котором значения наблюдаемых случайных величин не выбираются
случайным образом согласно их распределению, а устанавливаются согласно их значениям. Например, в вероятностной программе
1 [ASSUME a (gamma 1 1 ) ]
2 [ASSUME b ( lambda ( ) ( normal a 1 ) ) ]
3 [OBSERVE ( b ) 5 . 3 ]
первая случайная величина a, распределенная по закону Гамма-распределения
Gamma(1, 1), будет являться скрытой, и будет сгенерирована согласно данному закону
распределения. Наблюдаемая же случайная величина, распределенная по нормальному
закону Normal(a, 1), не будет сгенерирована, а будет установлена в соответствии с ее наблюдаемым значением.
Мы хотим установить такие правила перехода по схеме Метрополиса-Гастингса из
одного состояния (исхода) цепи Маркова в другое, чтобы стационарное распределение
данной цепи Маркова совпадало с распределением P (h0 ). В таком случае для получения
аппроксимации искомого апостериорного распределения в виде выборки нам будет достаточно имитировать данную цепь Маркова [8, 18].
В алгоритме Метрополиса-Гастингса вероятностная мера может быть известна с
точностью до нормировочной константы, что и происходит в нашем случае. На каждом
шаге алгоритма дано текущее состояние h0t и в соответствии с заданным заранее условным
распределение предлагается новое состояние h0∗ ∼ Q( · | h0t ). Таким образом, Q можно назвать распределением предлагаемых переходов. После этого подсчитывается коэффициент
«принятия» нового состояния:
P̃ (h0∗ ) Q(h0t | h0∗ )
α = min 1,
P̃ (h0t ) Q(h0∗ | h0t )
!
.
Состояние h0∗ принимается в качестве следующего состояния h0t+1 с вероятностью
α, в противном случае h0t+1 := h0t .
Новое состояние предлагается следующим образом:
1. Случайным образом (равномерно) выбирается одна «активная» скрытая случайная величина r ∈ dom h0t для «вариации».
16
2. Предлагается новое значение данной случайной величины r∗ ∼ κ( · | r = r̂, h0t ).
Условная вероятность κ в данном случае будет локальным для r распределением
предлагаемых переходов.
3. Если случайная величина r влияет на поток выполнения вероятностной программы, и в результате ее нового значения должны быть исполнены другие ветви
выполнения вероятностной программы, они исполняются и в общем случае происходит генерация новых случайных величин, которые прежде были неактивны.
Для примера рассмотрим следующую вероятностную программу:
1 [ASSUME a ( b e r n o u l l i 0 . 3 ) ]
2 [ASSUME b ( i f (= a 1 ) ( normal 0 1 ) (gamma 1 1 ) ) ]
3 [ PREDICT c ]
В данной вероятностной программе три случайных величины, первая ξ1 распределена по
закону Бернулли, вторая ξ2 по закону нормального распределения, третья ξ3 по закону
Гамма-распределения. ξ1 можно также называть «a» (по имени переменной), хотя переменная «b» не является сама по себе случайной величиной, а зависит от значения ξ1 ,
определяющей поток выполнения вероятностной программы, и от значения либо ξ2 , либо
ξ3 . Отметим также, что при каждом выполнении данной вероятностной программы будет
существовать только две активных случайных величины.
Предположим, что текущим состоянием вероятностной программы в момент времени t была история выполнения h0t = {ξ1 = 1, ξ2 = 3.2}. Это означает, что случайная
величина ξ приняла значение 1, и поэтому для задания переменной b был сгенерирован
элемент из нормального распределения, то есть была «реализована» случайная величина
ξ2 ∼ Normal(0, 1). Очевидно, что
P (h0t ) = P (ξ1 = 1) · P (ξ2 = 3.2 | ξ1 = 1) = 0.3 · fNormal(0,1) (3.2) ≈ 0.0007152264603.
Предложим новое состояние h0∗ :
1. Выберем случайным образом одну из двух «активных» случайных величин,
пусть это будет ξ1 .
2. Предложим случайным образом новое значение данной случайной величины согласно ее априорному распределению (то есть Bernoulli(0.3)), пусть это будет 0.
3. Так как случайная величина ξ1 действительно влияет на поток выполнения ве17
роятностной программы и при изменении ее значения в данном случае должна
быть выполнена другая ветвь, выполним данную ветвь, генерируя значения «активирующихся» случайных величин (в нашем случае только ξ3 ). Предположим,
что ξ3 стало равным 12.3.
Тогда
Q(h0∗ | h0t ) =
1
· 0.7 · fGamma(1,1) (12.3).
2
В общем случае
Q(h0∗ | h0t ) =
1
· κ(r∗ | r = r̂, h0t ) · Rnew ,
0
|ht |
где |h0t | — количество активных случайных величин в текущей истории выполнения,
κ(r∗ | r = r̂, h0t ) — вероятность нового значения варьируемой случайной величины r, Rnew
— совместная вероятность выбора своих значений «активирующихся» случайных величин.
При уже фиксированном h0∗ обратное Q(h0t | h0∗ ) для коэффициента принятия алгоритма Метрополиса-Гастингса в общем случае может быть посчитано аналогичным образом:
Q(h0t | h0∗ ) =
1
· κ(r̂ | r = r∗ , h0∗ ) · Rold ,
|h0∗ |
где Rold — совместная вероятность выбора своих значений случайных величин, активных
в h0t , но не являющихся активными в h0∗ .
В только что рассмотренном примере
Q(h0t | h0∗ ) =
1
· 0.3 · fNormal(0,1) (3.2).
2
И тогда с учетом того, что P (h0∗ ) = 0.7 · fGamma(1,1) (12.3) ≈ 0.000003186221124, мы
получаем, что
0.7 · fGamma(1,1) (12.3) · 12 · 0.3 · fNormal(0,1) (3.2)
α = min 1,
= 1.
0.3 · fNormal(0,1) (3.2) · 21 · 0.7 · fGamma(1,1) (12.3)
Поэтому в данном конкретном примере h0t+1 = h0∗ в любом случае, то есть с вероятностью один.
Выбор локального для r распределения предлагаемых переходов может быть раз-
18
ным. В простейшем случае, если r — независимая случайная величина, данное распределение выбирается идентичным априорному распределению для r. Если же r — перестановочная случайная величина [19], а такие случайные величины поддерживаются рассматриваемыми языками вероятностного программирования, то ее распределение может быть
выбрано с учетом уже накопленных значений.
Таким образом, мы описали алгоритм для предложения нового состояния h0∗ при
текущем состоянии h0t и описали его в рамках метода Метрополиса-Гастингса. Чтобы получить выборку {h0j }N
j=1 из N элементов желаемого апостериорного распределения, нам
необходимо имитировать данную цепь Маркова согласно описанному выше алгоритму и
+N ·K
получить {h0j }M
элементов данной цепи. Затем необходимо отсеять первые M элеменl=j
тов и из оставшихся выбрать каждый N -й элемент. Полученное множество будет являться
0
аппроксимацией искомой выборки {h0j }N
j=1 [8], а так как любая история выполнений h од-
нозначно определяет значение всех случайных величин в вероятностной программе, то и
аппроксимацией выборки из P (T | X = x̂).
K выбирается больше единицы, чтобы исключить автокорреляцию h0i , которая естественным образом возникает в цепи Маркова. M выбирается достаточно больши́м, чтобы
независимо от выбора начальной точки h01 цепь успела «забыть» данный первоначальный
выбор; это особенно важно, когда начальное априорное распределение P (T, X) очень сильно отличается от апостериорного P (T | X = x̂). Какого-то общего правила для выбора
данных величин нет, и обычно они выбираются эмпирически.
1.2.5
Программная реализация статистического вывода
В предыдущем подпункте теоретически был описан алгоритм для обобщенного статистического вывода в вероятностных языках программирования.
Простая программная реализация впервые достаточно подробно была описана в
[16]:
1. Для инициализации h01 выбирается случайным образом путем выполнения вероятностной программы и фиксации наблюдаемых случайных величин в соответствии с имеющимися данными. При этом в памяти компьютера сохраняется
база данных активных случайных величин вместе с их значениями, а также сохраняется P (h01 ), которое подсчитывается во время первоначального выполнения
программы с учетом вероятности наблюдаемых случайных величин принять то
19
значение, которое они приняли. В [16] описывается схема адресации, которая
позволяет различать случайные величины между собой.
2. Затем для выбора последующего h0t+1 каждый раз из базы данных случайным
равномерным образом выбирается случайная величина r и она случайным образом варьируется в соответствии со своим локальным распределением предлагаемых переходов κ( · | r = r̂, h0t ), которое предварительно задается для всех
используемых примитивных (несоставных) случайных величин. Создается копия
базы данных, в которой значение случайной величины r заменяется на новое.
3. Вероятностная программа выполняется еще один раз, при этом случайные величины, для которых уже в базе данных имеется запись (согласно схеме адресации), принимают соответствующие старые значения, а r принимает свое новое
полученное значение.
4. В общем случае, если r влияет на поток выполнения программы, генерируются
значения для новых случайных величин, которые становятся активными. Для
этих случайных величин прежде в базе данных не было записей.
5. Также если r влияет на поток выполнения программы, то некоторые случайные
величины могут перестать быть активными. В данном случае соответствующие
им записи в базе данных будут невостребованы.
6. После выполнения программы второй раз можно считать, что мы получили h0∗ .
Также отметим, что при выполнении программы h0∗ мы получили и использовали
всё необходимые компоненты для подсчета P (h0∗ ) и Q(h0∗ | h0t ).
7. Вероятность обратного перехода Q(h0t | h0∗ ) может быть получена разными способами. Если в вероятностной программе есть только независимые случайные
величины (и нет перестановочных), то первые две компоненты Q(h0t | h0∗ ) могут
быть найдены тривиально, так как мы знаем количество случайных величин в
h0∗ и можем посчитать κ(r̂ | r = r∗ , h0∗ ). Для третьей компоненты нам нужно посчитать произведение вероятностей случайных величин, которые перестали быть
активными в h0∗ , то есть все невостребованные случайные величины в базе данных. В случае наличия и использования перестановочных случайных величин
мы можем имитировать ситуацию, что h0∗ является нашим старым состоянием,
а новое состояние мы получаем в точном соответствии с h0t [3].
20
8. Имея P (h0t ), P (h0∗ ), Q(h0∗ | h0t ) и Q(h0t | h0∗ ), мы подсчитываем коэффициент принятия α для алгоритма Метрополиса-Гастингса, и либо принимаем h0∗ с вероятностью α, что означает, что в следующий раз мы будем использовать уже новую
базу данных случайных величин со значением, соответствующими h0∗ , либо отклоняем с вероятностью (1 − α), что означает, что на следующем шаге h0t+1 мы
снова будем использовать старую базы данную от h0t .
9. Алгоритм повторяется с шага № 2.
1.3
Эффективность вывода
При использовании вероятностных языков программирования встает вопрос об эффективности статистического вывода, другими словами о том, как быстро мы генерируем
выборку желаемой точности из апостериорного распределения. Описанная в секции 1.2.5
программная реализация статистического вывода является неэффективной, так как происходит перевыполнение всей вероятностной программы, хотя вариация случайной величины r обычно имеет только локальный эффект.
Рассмотрим более подробно данную проблему на примере следующей вероятностной программы:
1 [ASSUME r a i n y −s e a s o n ( b e r n o u l l i 0 . 2 ) ]
2 [ASSUME c l o u d y
3
( b e r n o u l l i ( i f r a i n y −s e a s o n 0 . 8 0 . 3 ) ) ]
4 [ASSUME r a i n
5
( b e r n o u l l i ( i f cloudy 0.8 0 . 2 ) ) ]
6 [ASSUME s p r i n k l e r
7
( b e r n o u l l i ( i f cloudy 0.1 0 . 5 ) ) ]
8 [ASSUME wet−g r a s s
9
10
11
( bernoulli
( i f sprinkler ( i f rain 0.99 0.9)
( i f rain 0.9 0 . 0 1 ) ) ) ]
Данная вероятностная программа описывает статистически простую упрощенную
модель зависимости между сезоном, облачностью, дождем, работой разбрызгивателя и
состоянием травы (мокрая или нет) в какой-то день. Значение переменных следующее:
21
Рисунок 1 — Пример Байесовской сети. Из [20].
rainy-season: входит ли тот день в сезон дождей или нет?, cloudy: облачно в тот день
или нет?; rain: был ли дождь в тот день?; sprinkler: работал ли разбрызгиватель в тот
день или нет?; wet-grass: была ли трава мокрой в тот день? Данная модель может быть
представлена с помощью Байесовской сети доверия (см. рис. 1) и таблицами условных
вероятностей. Отметим, что любая Байесовская сеть доверия может быть представлена в
виде вероятностной программы на языке Church/Venture/Anglican, но не любая вероятностная программа может быть представлена Байесовской сетью.
В случае, если во время очередной итерации алгоритма Метрополиса-Гастингса в
качестве варьируемой случайной величины выбрана случайная величина rain (соответствующий узел на рис. 1 выделен самым темным цветом), для подсчета коэффициента
принятия достаточно лишь рассмотреть значения и вероятности при данных значениях
узлов «Дождь» и «Трава мокрая». Все остальные значения и их вероятности останутся
прежними. Иллюстрацию распространения возмущений в связи с вариацией случайной
величины «Дождь» см. на рис. 2.
В подобном простом примере этот факт не играет большой роли, так как отношение
случайных величин, требующих «переучета», к общему количеству активных случайных
величин невелико, однако при большом объеме данных это играет решающую роль при
выполнении статистического вывода во многих моделях при помощи программных реализаций вероятностных языков программирования. Например, в скрытых марковских
моделях [17, 2, 4] или в латентном размещении Дирихле [21, 20].
Например, в простой скрытой Марковской модели есть N скрытых и N наблюдаемых величин. При реализации статистического вывода алгоритмом, описанным в сек22
Рисунок 2 — Байесовская сеть в виде «отпечатка» выполнения вероятностной программы.
Из [20].
ции 1.2.5, одна итерация алгоритма Метрополиса-Гастингса имеет сложность (по времени)
O(N ), хотя желаемая и возможная сложность O(1) или по крайней мере O(log N ).
Для достижения желаемой сложности в каждой истории выполнений необходимо
отслеживать зависимости между случайными величинами. Следует отметить, что эти зависимости в общем случае могут изменяться в вероятностных программах. Например, в
следующей программе
1 [ASSUME a ( b e r n o u l l i 0 . 5 ) ]
2 [ASSUME b (gamma 1 1 ) ]
3 [ASSUME c ( normal ( i f a b 3 . 0 ) 1 ) ]
случайная величина c, т.о. (normal ...), зависит от случайной величины b, т.о. (gamma
...), не всегда, а только если случайная величина a принимает значение «ИСТИНА».
Описание структур данных и алгоритмов, необходимых для отслеживания зависимостей в режиме реального времени, были предварительно приведено в [20] и [22], а затем
более обширно и подробно в [3]. При использовании данных структур данных и алгоритмов временная сложность одной итерации алгоритма Метрополиса-Гастингса в простой
скрытой Марковской модели равна O(log N ), при этом если использовать упорядоченный
23
перебор случайных величин, то временная сложность снизиться до O(1), так как логарифмический фактор появляется в связи с необходимостью выбирать случайным образом
следующий узел (т.е. случайную величину) для вариации.
В простой скрытой Марковской модели количество «активных» случайных величин постоянно и вид зависимости тривиален (от каждой скрытой случайной величины
напрямую зависит только одна наблюдаемая случайная величина и только следующая
скрытая случайная величина). В более сложных моделях виды зависимостей более изощрены и количество случайных величин меняется от одной истории выполнений к другой. С
другой стороны, для большого количества порождающих моделей, используемых в настоящее время в машинном обучении, необходимо, чтобы время на одну итерацию оставалось
постоянным или росло хотя бы логарифмически вместе с линейным ростом количества
наблюдений, иначе статистический вывод будет невозможен за разумное время.
На рис. 3 показаны результаты применения алгоритмов и структур данных, описанных в [20, 22, 3]. При использовании старого подхода, описанного в [16] (см. секцию 1.2.5)
время на N итераций алгоритма Метрополиса-Гастингса росло квадратично с линейным
ростом размерности модели (N скрытых и N наблюдаемых случайных величин), а при
использовании предлагаемого подхода время растет квазилинейно.
На этом же рисунке видно, что благодаря локализации выполнения одной итерации Метрополиса-Гастингса стало возможным проводить приближенный статистический
вывод параллельно.
Следует отметить, что пространственная сложность алгоритма (объем памяти,
необходимый для его применения) равна, грубо говоря, O(N + K), где O(K) — стоимость хранения в памяти зависимостей между случайными величинами. В общем случае
эта величина может быть достаточно большой, и в работе [22] описаны возможности более
эффективного расходования памяти.
1.4
Порождающее вероятностное программирование в распознавании образов
Как было отмечено в начале, цель вероятностного программирования — облегчить задачу
моделирования порождающих вероятностных моделей и проведения вывода в них. Примером иллюстрации успешного предварительного применения вероятностного программирования может служить работа [5], в которой вероятностное программирование использует24
Среднее время на N итераций
алгоритма Метрополиса-Гастингса
160
140
120
Статистический вывод без оптимизации (красный)
Предложенные алгоритмы и структуры данных (зел.)
—//—, 2 потока (син.)
—//—, 4 потока (гол.)
100
80
60
40
20
0
50
100
150
200
250
Количество наблюдений N в скрытой модели Маркова
Рисунок 3 — Эффективность статистической вывода при его различных реализациях:
красный график соответствует простейшему алгоритму, описанному в 1.2.5, при котором
каждый раз происходит перевыполнение всей вероятностной программы. Зеленый график соответствует использованию новых алгоритмов и структур данных, что позволяет
производить статистический вывод асимптотически более эффективно. Синий и голубой
график показывают, что применение предлагаемого подхода также позволяет производить
статистический вывод параллельно, по крайней мере приближенно. Рис. из [20].
ся для моделирования вероятностной модели находящихся на изображении объектов и их
взаимодействия между собой. Байесовский подход к интерпретации изображений путем
задания априорного распределения на расположение объектов и на связи между ними
был предложен задолго до появления рассматриваемых языков программирования, однако именно с их появлением исследование и осуществление данного подхода стало проще,
так как вероятностные языки программирования позволяют композиционно и компактно
представлять вероятностные порождающие модели и проводить статистический вывод в
них.
В работе рассматриваются два примера: проблема графической CAPTCHA [23] —
«компьютерного теста, используемого для определения, кем является пользователь системы: человеком или компьютером», знакомого почти что каждому пользователю интернета; и проблема нахождения на изображении с камеры автомобиля дороги, разделительной
полосы, и левого и правого оврагов. Полученные результаты по своей эффективности на
рассматриваемых простых примерах не уступают другим современным подходам к решению этих задач, однако представление, моделирование и вывод проще осуществляется с
25
помощью вероятностного программирования.
1.5
О различиях между Church, Venture, Anglican
Целью данной главы, очевидно, не было подробное описание этих вероятностных языков, а
только краткое введение в них. Заинтересованному читателю мы можем порекомендовать
продолжить свое знакомство с вероятностным языком Church с [2, 24, 25, 16], Venture —
[3], Anglican — [26, 4, 27].
Хотя многое объединяет эти вероятностные языки, в некоторых принципиальных
вещах они различаются. Например, Venture на данный момент больше позиционируется
как универсальная платформа, включающая в себя разные виды алгоритмов и методов
статистического вывода с запроектированной возможностью добавлять новые с помощью
использования базовых компонент и методов. В рамках работы над Anglican развиваются методы обобщенного вывода с использованием методов фильтрации частиц. Church, с
другой стороны, позволяет производить статистический запрос внутри другого статистического запроса, что Venture и Anglican пока делать не могут.
26
2
Автоматическая генерация вероятностных программ
При использовании полных по Тьюрингу вероятностных языков программирования,
включающих в себя функции высших порядков3 , которыми в том числе являются языки
Church, Venture и Anglican, вероятностная программа одновременно является и порождающей моделью, и записанной процедурой для генерации элементов выборки из этой модели
путем выполнения исходного кода данной процедуры. Любая процедура в вероятностном
программировании является формально программным кодом, который описывает процесс
генерации элемента выборки при заданных аргументах данной функции. Таким образом,
процедуры вероятностных программ являются конструктивным способом описания условных распределений.
Полные по Тьюрингу и допускающие функции высших порядков вероятностные
языки программирования открывают возможность проведения вывода исходного текста
самих вероятностных программ, если задано априорное распределение на множестве исходного текста, с помощью операторов eval и apply. Грубо говоря, необходимо представить
вероятностную порождающую мета-модель, которая будет генерировать вероятностные
модели в виде исходного кода вероятностных программ.
Данная глава основана на работе [6], которая включает в себя первые предварительные результаты по этой амбициозной задаче вывода самих порождающих вероятностных
моделей при наличии какой-либо информации об искомом распределении, которое определяется искомой вероятностной программой. Отметим, что статистический вывод в пространстве исходного кода сложен и нет какого-то простого подхода как к построению
вероятностных порождающих моделей исходного кода [28], так и выводу в них [29].
В рамках нашей предварительной работы мы поставили задачу найти с помощью
статистического вывода и предлагаемой нами порождающей вероятностной мета-модели
такие вероятностные программы, которые будут генерировать выборку элементов, схожую по своим статистическим характеристикам с каким-то заранее заданным распределением.
Эта задача интересна сама по себе, так как нахождение эффективных алгоритмов
генерации (моделирования) случайных величин — нетривиальная задача и для людей3 Функциями (процедурами) высших порядков называются функции, аргументами или значениями которых могут быть
другие функции.
27
ученых, которой они занимаются на протяжении десятков лет [30, 31, 32].
Наши предварительные результаты показывают, что подобный автоматизированный вывод порождающих вероятностных моделей в виде вероятностных программ действительно возможен. В частности, мы приводим результаты успешного эксперимента, в
рамках которого мы автоматически нашли обобщенную вероятностную программу, которая подлинно (не приближенно) генерирует случайные величины, распределенные по
закону Бернулли с произвольным параметром p.
2.1
Обзор литературы
Рассматриваемые нами идеи относятся к разным областям, в том числе к автоматизации
процесса программирования [33, 34], индуктивному программированию [33, 35, 36, 37, 38,
39], автоматическому моделированию [40, 41], компьютерному определению и представлению плотности распределений. Подходы к решению проблемы включают статистический
вывод, поиск и оптимизацию, в том числе эволюционные алгоритмы и в особенности генетическое программирование.
Идеи и методы использования вероятностного программирования для изучения и
автоматизированного представления вероятностных моделей предлагались и ранее [2, 42,
43, 3].
Насколько автору известно, описываемый подход к порождению вероятностных
программам мета-вероятностной программой ранее не рассматривался в качестве отдельной проблемы достаточно подробно, хотя первые шаги в исследовании и формулировке
проблемы были сделаны в работах [42, 3].
2.2
Описание подхода
Наш подход может быть описан в рамках приближенных Байесовских вычислений [44]
с использованием метода Монте-Карло по схеме цепей Маркова с выбором в качестве
искомого апостериорного распределения
π(X |X̂ )p(X̂ |T )p(T ),
(1)
где π(X |X̂ ) — вероятностная мера, измеряющая расстояние между значения статистик,
вычисленных соответственно на выборке X из искомого распределения и выборке X̂ , по28
[ASSUME program−text ( p r o d u c t i o n s ‘ ( ) ‘ r e a l ) ]
[ASSUME program ( eval ( l i s t ‘ lambda ‘ ( ) program−text ) ) ]
[ASSUME samples ( apply−n−times program 10000 ’ ( ) ) ]
[OBSERVE ( normal ( mean samples ) n o i s e − l e v e l ) 0 . 0 ]
[OBSERVE ( normal ( v a r i a n c e samples ) n o i s e − l e v e l ) 1 . 0 ]
[OBSERVE ( normal ( sk ewn ess samples ) n o i s e − l e v e l ) 0 . 0 ]
[OBSERVE ( normal ( k u r t o s i s samples ) n o i s e − l e v e l ) 0 . 0 ]
[ PREDICT program−text ]
[ PREDICT ( apply−n−times . . . ( program ) ) ]
Рисунок 4 — Вероятностная программа для вывода исходного кода вероятностной программы для генерации случайных чисел, распределенных по закону стандартного нормального распределения Normal(0, 1).
лученной путем выполнения исходного кода вероятностной программы-кандидата.
Пусть существует распределение F с параметрами θ, вероятностную программу
для генерации элементов выборки из которого мы хотим вывести. Пусть X = {xi }Ii=1 , xi ∼
F (·|θ) будет выборкой из I элементов из распределения F при каком-то фиксированном
значении параметров θ. Рассмотрим задачу вывода исходного кода вероятностной программы T , которая при ее неоднократном выполнении J раз сгенерирует выборку элементов X̂ = {xˆj }Jj=1 , xˆj ∼ T (·), статистически близких к распределению F при заданных
параметрах θ.
Пусть s будет статистикой выборки, и тогда s(X ) и s(X̂ ) — значение этой статистики на элементах выборки из F и из T (·) соответственно. Пусть вероятностная мера
d(s(X ), s(X̂ )) = π(X |X̂ ), для простоты ненормированная, принимает бо́льшие значения,
когда s(X ) ≈ s(X̂ ). d можно интерпретировать как расстояние или штраф.
Мы используем вероятностное программирование для представления мета-модели,
порождающей другие вероятностные программы в виде исходного текста, и для проведения статистического вывода в пространстве искомых вероятностных моделей. Для статистического вывода мы использовали программную реализацию вероятностного языка программирования Anglican, которая поддерживает [4] статистический вывод методом частиц
и методом Метрополиса-Гастингса по методу Монте-Карло по схеме цепей Маркова.
Вероятностная мета-модель представлена на рис. 4, где на первой строке мы устанавливаем соответствие между T и переменной program-text, которая будет содержать
один сгенерированный элемент из распределения на исходный код P (T ), определенное
априорно через порождающую процедуру production с помощью адаптивной грамматики по типу [45] (см. подробнее в разделе 2.3).
29
Мы не указываем здесь θ, так как задача вывода в данном случае найти вероятностную программу, генерирующую элементы из стандартного нормального распределения.
Переменная samples на второй строке представляет описанную выше выборку X̂ из вероятностной программы-кандидата, и в этом примере J = 10000.
s и d вычисляются на следующих четырех строках вероятностной программы, где
статистика s определяется как четырехмерный вектор, включающий в себя соответственно
выборочные среднее, дисперсию, коэффициент асимметрии и коэффициент эксцесса выборки элементов из распределения, определенного вероятностной программой, полученной
из распределения T . Мера расстояния d определяется через плотность многомерного нормального распределения со средними [0.0, 1.0, 0.0, 0.0]T и диагональной ковариационной
матрицей σ 2 I. Отметим, что это означает, что мы ищем вероятностные программы, результат выполнения которых определяет распределение со средним равным 0, дисперсией
— 1, коэффициентами асимметрии и эксцесса равными 0, и мы «штрафуем» отклонения
от этих значений с помощью квадратичной экспоненциальной функции потерь с коэффициентом
1
,
σ2
где σ определена как noise-level. Эта функция потерь представляет собой
функцию плотности нормального распределения.
Данный пример служит хорошей иллюстрацией основных особенностей нашего подхода. Для поиска в виде вероятностной программы генератора случайных чисел из стандартного нормального распределения мы используем аналитическую информацию s(F ) о
стандартном нормальном распределении при вычислении расстояния между статистиками d(s(F ), s(X̂ )). Существует по крайней мере три различных ситуации, включая данную,
в которых s и d могут вычисляться различными способами:
1. В рамках первой ситуации мы ищем вероятностную программу, которая эффективно генерирует элементы из аналитически известных распределений. Под эффективностью в данном случае можно понимать вычислительную временную
сложность и среднее количество использованной энтропии для генерации элемента выборки в среднем. Практически всегда в этой ситуации и при подобной
постановке задачи статистики распределения F известны аналитически.
2. Вторая ситуация возникает, когда мы можем генерировать только элементы выборки из F . Например, подобная ситуация возникает, когда мы генерируем элементы из апостериорного распределения с помощью «дорогостоящего» (вычис-
30
[ASSUME program−text ( p r o d u c t i o n s ‘ ( r e a l ) ‘ b o o l ) ]
[ASSUME program ( eval ( l i s t ‘ lambda ‘ ( ) program−text ) ) ]
[ASSUME J 1 0 0 ]
[ASSUME samples−1 ( apply−n−times program J ’ ( 0 . 5 ) ) ]
[OBSERVE ( f l i p ( G−test−p−value
samples−1 ‘ B e r n o u l l i ( l i s t 0 . 5 ) ) ) t r u e ]
...
[ASSUME samples−N ( apply−n−times program J ’ ( 0 . 7 ) ) ]
[OBSERVE ( f l i p ( G−test−p−value
samples−N ‘ B e r n o u l l i ( l i s t 0 . 7 ) ) ) t r u e ]
[ PREDICT program−text ]
[ PREDICT ( apply−n−times program J ’ ( 0 . 3 ) ) ]
Рисунок 5 — Вероятностная программа для вывода исходного кода вероятностной
программы, генерирующей случайные числа, распределенные по закону Бернулли
Bernoulli(θ). На предпоследней строчке выводится текст вероятностной программыкандидата. На последней строчке вероятностная программа-кандидат выполняется J раз
для генерации выборки из J элементов при параметризации p = 0.3, причем предыдущие
θn (т.о. тренировочные значения параметров) не содержали p = 0.3.
лительно) метода Монте-Карло по схеме Марковских цепей, и мы заинтересованы получить другое представление апостериорного распределения в виде вероятностной программы, чье априорное распределение будет точно или хотя бы
приблизительно совпадать с искомым апостериорным.
3. При третьей ситуации нам заранее дана фиксированного размера выборка из
F , и мы хотим найти вероятностную программу, которая позволит генерировать
выборку произвольного размера из F в дальнейшем. Мы начали этот раздел с
постановки задачи именно в рамках третьей ситуации.
Следует отметить, что возможная польза представления генератора случайных чисел потенциально не только в том, чтобы эффективно и быстро генерировать выборку
из желаемого распределения, но и чтобы получить формальное представление желаемого
распределения или его приближения в виде исходного кода вероятностной программы, то
есть в виде формальной сущности, дальнейшие действия с которой можно производить; в
том числе проводить анализ над выведенным исходным кодом и использовать найденные
блоки исходного кода для решения других задач.
Рис. 5 иллюстрирует другое важное обобщение решение задачи, сформулированной
в самом начале с апостериорным распределением (1).
При постановке задачи на вывод генератора случайных чисел, распределенных согласно стандартному нормальному распределению, мы не параметризовали искомое рас-
31
[ASSUME box−muller−normal
( lambda ( mean s t d )
(+ mean ( ∗ s t d
( ∗ ( cos ( ∗ 2 ( ∗ 3 . 1 4 1 5 9
( uniform−continuous 0 . 0 1 . 0 ) ) ) )
( sqrt ( ∗ −2
( log ( u n i f o r m − c o n t i n u o u s 0 . 0 1 . 0 )
)))))))]
[ASSUME p o i s s o n ( lambda ( r a t e )
( b e g i n ( d e f i n e L ( exp ( ∗ −1 r a t e ) ) )
( d e f i n e i n n e r − l o o p ( lambda ( k p )
( i f (< p L) ( dec k )
( begin ( d e f i n e u
( uniform−continuous 0 1 ) )
( inner−loop ( inc k ) (∗ p u ) ) ) ) ) )
( inner−loop 1 ( uniform−continuous 0 1 ) ) ) ) ]
Рисунок 6 — Найденные и записанные людьми исходные коды вероятностных программ
для (слева) общего нормального распределения Normal(µ, σ) [31] и (справа) распределения
Пуассона Poisson(λ) [46]. Эти исходные коды входят в собранный нами корпус, с помощью
которого мы определяем априорные вероятности для наших порождающих правил путем
подсчета количества встречающихся констант, процедур разных видов и т.д.
пределение никаким образом, так как у стандартного нормального распределения нет
параметров, т.е. θ = ∅. В общем случае распределения, которые мы хотим представить
в виде вероятностных программ, имеют нетривиальную параметризацию, и представляют собой по сути семейство распределений. Мы хотим найти вероятностную программу,
входные аргументы которой как раз бы и являлись параметрами искомого распределения,
таким образом, эта вероятностная программа позволяла бы генерировать случайные величины из всего семейства. Для наглядности рассмотрим алгоритм генерации случайных
чисел, распределенных по закону нормального распределения, с помощью преобразования
Бокса-Мюллера, представленный в виде вероятностной программы на рис. 6.
Эта вероятностная процедура параметризована двумя параметрами: средним и
стандартным отклонением. Для постановки обобщенной задачи вывода параметризованных вероятностных программам нам необходимо изменить наше искомое апостериорное
распределение, включив в него параметр θ, параметризующий искомое распределение
F:
π(X |X̂ , θ)p(X̂ |T , θ)p(T |θ)p(θ).
Нам бы хотелось вывести вероятностную программу, которая смогла бы обобщить
все возможные значения параметра θ. С допущением, что если мы выберем конечное число N различных параметризаций θ̂i , мы получим обобщение всего семейства распределений в виде вероятностной программы, мы формулируем нашу задачу в виде следующего
приближения с использованием приближенных Байесовских вычислений в рамках метода
32
Монте-Карло по схеме цепей Маркова:
Z
N
1 X
π(Xn |X̂n , θn )p(X̂n |T , θn )p(T |θn ) ≈ π(X |X̂ , θ)p(X̂ |T , θ)p(T |θ)p(θ)dθ.
N n=1
Вероятностная программа для поиска параметризованной вероятностной программы, генерирующей случайные числа, распределенных по закону Бернулли Bernoulli(θ),
представлена на рис. 5, и наглядным образом иллюстрирует применение данного допущения и приближения. При выбранных N различных параметризациях параметра p распределения Бернулли мы каждый раз генерируем J элементов из вероятностной программыкандидата, аккумулируя расстояние (штраф) между искомым распределением и полученным распределением, представляющим вероятностную программу-кандидата. В каждом
конкретном случае для θi мы высчитываем: 1) расстояние с использованием статистики G-теста (более «современный» аналог критерия согласия Пирсона и соответствующей
статистики) в виде
Gn = 2
X
i∈0,1
#[X̂n = i]
#[X̂n = i]ln
θni (1 − θn )(1−i) · |X̂n |
!
,
где #[X̂n = i] — количество элементов выборки из X̂n , принимающих значение i; 2) а
также соответствующее p-значение с нулевой гипотезой, утверждающей, что элементы
выборки X̂n являются и элементами выборки из распределения Bernoulli(θn ). Так как
распределение статистики G-теста приблизительно распределено по закону распределения
хи-квадрат, т.е. G ∼ χ2 (1) в нашем примере, мы можем представить и находить расстояние
d в данном случае путем вычисления вероятности ложного отклонения нулевой гипотезы
H0 : X̂n ∼ Bernoulli(θn ). Ложное отклонение нулевой гипотезы эквивалентно успеху в
проведении испытания Бернулли с вероятностью успеха равной p-значению.
2.3
Грамматика и порождающие правила
С учетом наличия в нашем распоряжении выразительного вероятностного языка программирования, допускающего функции высших порядков и полного по Тьюрингу, наше
априорное распределение об исходном коде искомых вероятностных программ также достаточно выразительно. В общих чертах оно схоже с адаптивными грамматиками [45],
используемыми в [29], но имеет отличия, в частности связанные с созданием сред с ло-
33
кальными переменными. В виде псевдокода наше априорное распределение может быть
представлено следующим образом (символ → означает «может перейти в»):
1. Выражение exprtype |env → в имя переменной, случайно выбираемой из среды
переменных env с типом type.
2. Выражение exprtype |env → в случайную константу типа type. Константы различных типов (целочисленные, вещественные и т.д.) генерируются из отдельного для
каждого типа type процесса Дирихле4 DPtype (Htype , α), где базовое распределение Htype само по себе в общем случае являются смесью нескольких распределений. Например, для констант вещественного типа мы используем смесь нормального распределения (normal 0 10), равномерного непрерывного распределения
(uniform-continuous -100 100) и равномерного дискретного распределения из
множества {−1, 0, 1, . . .}.
3. Выражение exprtype |env → (proceduretype exprarg_1_type ... exprarg_N _type ), где процедура procedure является случайно выбираемой примитивной детерминированной или стохастической (не составной) процедурой, определенной заранее в глобальной среде, с типом возвращаемого значения type.
4. Выражение exprtype |env → (compound_proceduretype exprarg_1_type ... exprarg_N _type ),
где compound_proceduretype является составной процедурой, также генерируемой
в соответствии с процессом Дирихле DPtype (Gtype , β), где базовое распределение
Gtype случайным образом генерирует составную процедуру с типом возвращаемого значения type и количеством входных аргументов, распределенным
по закону Пуассона, где каждый входной аргумент имеет свой произвольный
тип. Тело body составной процедуры генерируется также случайным образом
согласно этим же порождающим правилам и грамматике, но с учетом введение
локальной среды, включающей в себя входные аргументы процедуры.
5. Выражение exprtype |env → (let [(gensym) exprreal ] exprtype |env ∪ gensym)), где
env ∪ gensym означает среду, дополненную переменной с именем (gensym) и со
значением, вычисляемым в соответствии с генерируемым случайным образом
выражением согласно этих же порождающих правил.
6. Выражение exprtype |env → (if (exprbool ) exprtype exprtype ).
7. Выражение exprtype |env → (recur exprarg_1_type ... exprarg_M _type ), таким образом
4 Не
нужно путать с распределением Дирихле.
34
рекурсивный вызов текущей составной процедуры.
Во избежание вычислительных ошибок во время выполнения сгенерированных процедур мы заменяем примитивные функции их «защищенными» аналогами, например
log(a) заменяется на safe-log(a), причем последний возвращает 0 если a < 0; или например uniform-continuous заменяется safe-uc(a, b), которая в случае если a > b меняет
аргументы местами, а также возвращает просто a если аргументы равны: a = b.
Множество типов, которые мы использовали в рамках наших экспериментов, включало вещественные и булевы типы, а общее множество примитивных процедур, включенных нами в глобальную среду, включало в себя такие функции как +, −, *, safe-div,
safe-uc, safe-normal.
2.4
Вероятности использования порождающих правил
Для задания априорных вероятностей порождающих правил, то есть вероятностей, с которой каждое из правил будет применяться в случае возможности его применения, мы
вручную составили небольшой корпус вероятностных программ, которые повторяют найденные учеными [32] алгоритмы генераторов случайных чисел. Примеры таких программ
представлены на рис. 6. Заметим, что все они требуют наличия только одной стохастической процедуры, а именно uniform-continuous, так что мы включили только ее в глобальную среду с положительной вероятностью для экспериментов, описанных в 2.5.2.
Используя данный корпус, мы вычислили априорные вероятности каждого порождающего правила, при этом при выводе вероятностной программы для генерации случайных величин из искомого распределения F (например, распределения Бернулли), мы
исключали из корпуса все элементы, которые генерируют случайные величины согласно
закону распределения F . После этого вероятности использования порождающих правил
были «смягчены» с помощью распределения Дирихле. В будущем можно использовать более обширные корпусы вероятностных программ, примером зарождающегося подобного
корпуса может служить [25].
2.5
Эксперименты
Эксперименты были разработаны таким образом, чтобы проиллюстрировать все три вида
возможных ситуаций, описанных ранее. Но в начале мы проиллюстрируем выразительность нашего априорного распределения исходного кода вероятностных программ. После
35
−4
Y
−3
−2
0.6
0.5
P̂ (Y )
P̂ (Y )
−5
0.40
0.35
0.30
0.25
0.20
0.15
0.10
0.05
0.00
−2.5
−2.0
−1.5
Y
−1.0
−0.5
0.0
0.0
1.0
0.8
0.6
0.4
0.2
−0.5
0.0
Y
0.5
1.0
0.0
0.3
0.1
−3.0
1.2
−1.0
0.4
0.2
P̂ (Y )
1.8
1.6
1.4
1.2
1.0
0.8
0.6
0.4
0.2
0.0
−6
P̂ (Y )
P̂ (Y )
P̂ (Y )
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
−14.56636
Y
−7.28318
1.4
1.2
1.0
0.8
0.6
0.4
0.2
0.0
−4
−2
0
Y
2
4
−2.0
−1.5
−1.0
Y
−0.5
0.0
Рисунок 7 — Гистограммы выборок из некоторых порожденных вероятностных программ
из их априорного распределения. По форме распределений видно, что наши порождающие правила достаточно обширны, чтобы соответствующие порождающим вероятностным
программам распределения были нетривиальны.
этого мы опишем постановку и результаты экспериментов в рамках использования нашего
подхода во всех трех различных ситуациях возможности вычисления расстояния d.
2.5.1
Выборки из сгенерированных вероятностных программ
Для иллюстрации выразительности нашего априорного распределения исходных кодов
вероятностных программ мы приводим выборки из случайным образом сгенерированных
вероятностных программ из их априорного распределения. Эти шесть выборок в виде гистограмм из шести различных автоматически сгенерированных вероятностных программам расположены на рис. 7.
Из рисунка видно, что разные случайным образом сгенерированные вероятностные
программы определяют в общем случае достаточно различные структурно распределения.
В частности, можно заметить разнообразие в носителе, дисперсии и количестве «режимов»
(т.е. островков носителя с высокой вероятностью по отношению к очень низковероятностным пространствам между островками).
2.5.2
Вывод вероятностных программ, определяющих распределения, совпадающие или
приближающие классические одномерные распределения
Как уже было отмечено, для всех классических одномерных распределений существуют
алгоритмы, позволяющие и точно, и приближенно генерировать любое количество элементов из данных параметризованных распределений, и они были аналитически выведены
учеными. Эти алгоритмы в том числе, очевидно, могут быть записаны как вероятностные
программы в виде их исходного кода.
36
Мы провели серию экспериментов, чтобы проверить возможность автоматического вывода вероятностных программ, генерирующих выборки из классических одномерных
распределений, а именно из распределения Бернулли Bernoulli(p), распределения Пуассона
Poisson(λ), Гамма-распределения Gamma(a, 1.0), Бета-распределения Beta(a, 1), стандартного нормального распределения Normal(0, 1), и «общего» нормального распределения
Normal(µ, σ).
Для каждого семейства распределений мы проводили статистический вывод,
выбирая в качестве целевого апостериорного распределения частное распределение
π(X |X̂ )p(X̂ |T )p(T ), маргинализированное по параметру θ. Для приближения в каждом
случае мы выбирали малое множество значений параметров {θ1 , . . . , θN } и определяли апостериорное распределение ограничениями по p−значению (для распределения Бернулли)
и по близости моментам к ожидаемым (для всех других рассматриваемых распределений).
Еще раз отметим, что при задании априорного распределения на порождающие правила
в каждом конкретном случае из корпуса исключались все вероятностные программы, относящиеся к искомому распределению.
Образцы гистограмм выборок из лучших найденных в результате вывода вероятностных программ представлены на рис. 8, где под лучшими мы понимаем вероятностные
программы с наименьшим расстоянием d на тренировочных значениях параметров и соответствующих значениях моментов или максимального p-значения.
Стоит особенно отметить результат эксперимента с распределением Бернулли, в
рамках которого был найден исходный код вероятностной программы, статистически подлинно (точно) генерирующей выборку из всего семейства распределения Бернулли с параметром p. Найденная вероятностная программа представлена на рис. 9.
На рис. 10 представлен выведенный исходный текст вероятностной программы для
генерации элементов из Гамма-распределения Gamma(a, 1), параметризованного параметром a.
2.5.3
Обобщение произвольных эмпирических данных с помощью порождающего вероятностного программирования
Мы также проверили наш метод на выводе порождающих моделей в виде вероятностных
программ для объяснения настоящих, не синтетических, данных, аналитическое распределение которых неизвестно.
37
1.2
0.05
0.04
0.6
0.03
0.4
0.02
0.2
0.01
0.0
0
0.00
1
P̂ (Y )
0.8
P̂ (Y )
P̂ (Y )
1.0
40
50
60
70
0
2
4
6
Y
90
100
110
8
10
12
14
0.40
0.35
0.30
0.25
0.20
0.15
0.10
0.05
0.00
-2 -1 0 1 2 3 4 5 6 7 8 9 10 11
Y
2.0
1.5
P̂ (Y )
0.40
0.35
0.30
0.25
0.20
0.15
0.10
0.05
0.00
80
Y
P̂ (Y )
P̂ (Y )
Y
0.45
0.40
0.35
0.30
0.25
0.20
0.15
0.10
0.05
0.00
1.0
0.5
−4
−2
0
Y
2
4
0.0
0.0
0.5
1.0
1.5
Y
Рисунок 8 — (Зеленые сплошные линии) Гистограммы выборок из распределений, соответствующих вероятностным программам, имеющим «высокую» вероятность в апостериорном распределении при поиске порождающих моделей, соответствующих распределениям (слева направо, сверху вниз): Bernoulli(p), Normal(µ, σ), Poisson(λ), Gamma(a, 1.0),
Normal(0, 1), Beta(a, 1.0). (Синие пунктирные линии) Гистограммы выборок из «настоящих» распределений. Параметризация семейства распределений в каждом случае производилась другими значениями параметров, которые не входили в обучающее множество
значений {θn }. Отметим, что для семейства распределений Бернулли Bernoulli(p) была выведена вероятностная программа, статистически точно генерирующая элементы выборки
при любой параметризации (см. рис. 9). С другой стороны, не все распределения получили хорошее приближение найденными вероятностными программами за то время, что мы
проводили вывод, как, например, в случае Бета-распределение Beta(a, 1.0).
( lambda ( par s t a c k − i d ) ( i f (< ( uniform−continuous 0 . 0 1 . 0 ) par ) 1 . 0 0 . 0 ) )
( lambda ( par
( i f (< 1 . 0
( lambda ( par
( i f (< 1 . 0
stack−id )
( s a f e − s q r t ( s a f e − d i v par ( safe−uc par ( dec par ) ) ) ) ) 1 . 0 0 . 0 ) )
stack−id )
( safe−uc ( s a f e − s q r t par ) (+ par ( cos par ) ) ) ) 1 . 0 0 . 0 ) )
Рисунок 9 — (сверху) Написанный человеком исходный код генератора случайных чисел,
распределенных по закону Бернулли Bernoulli(p). (внизу, две программы) Выведенные исходные коды. Первая из двух выведенных вероятностных программ определяет настоящее
семейство распределений Бернулли Bernoulli(p), параметризованное p. Вторая программа
генерирует распределение, приближенное к распределению Бернулли, параметризованное
p.
38
( lambda ( par s t a c k − i d ) ( ∗ ( b e g i n ( d e f i n e sym0 0 . 0 )
( exp ( s a f e − u c −1.0 ( s a f e − s q r t ( s a f e − u c
( safe−div ( safe−uc 0 . 0 ( safe−uc 0 . 0 3 . 1 4 1 5 9 ) )
par ) (+ 1 . 0 ( s a f e − u c ( b e g i n ( d e f i n e sym2
( lambda ( v a r 1 v a r 2 s t a c k − i d ) ( dec v a r 2 ) ) )
( sym2 ( s a f e − u c −2.0 ( ∗ ( s a f e − u c 0 . 0 ( b e g i n
( d e f i n e sym4 ( s a f e − u c sym0 ( ∗ (+ ( b e g i n
( d e f i n e sym5 ( lambda ( v a r 1 v a r 2 s t a c k − i d )
( s a f e − d i v (+ ( s a f e − l o g ( dec 0 . 0 ) ) −1.0) v a r 1 ) ) )
( sym5 ( exp par ) 1 . 0 0 ) ) 1 . 0 ) 1 . 0 ) ) )
( i f (< ( s a f e − u c par sym4 ) 1 . 0 ) sym0
( s a f e − u c 0 . 0 − 1 . 0 ) ) ) ) sym0 ) )
( s a f e − d i v sym0 ( exp 1 . 0 ) ) 0 ) ) 0 . 0 ) ) ) ) ) ) ) par ) )
( lambda ( s t a c k − i d )
(∗ 2.0 (∗ (∗
( ∗ −1.0 ( s a f e − u c 0 . 0 2 . 0 ) )
( safe−uc ( safe−uc 4 . 0
(+ ( s a f e − l o g 2 . 0 ) − 1 . 0 ) )
(∗ ( safe−div 2.0
−55.61617747203855)
( i f (< ( s a f e − u c
( safe−uc
27.396810474207317
( s a f e − u c −1.0 2 . 0 ) )
2.0) 2.0)
4.0 −1.0)))) −1.0)))
0.20
0.25
0.04
0.15
0.20
0.03
0.02
0.10
0.05
0.01
0.00
P̂ (Y )
0.05
P̂ (Y )
P̂ (Y )
Рисунок 10 — Исходный код выведенных вероятностных программ для (слева) Гаммараспределения Gamma(a, 1) и (справа) для третьей эмпирической выборки индикаторов,
используемых для рассмотрения заявок на выдачу кредита. Выборки, сгенерированные с
помощью выполнения этих программ, расположены соответственно на рис. 8 и на рис. 11
(последняя гистограмма из трех). Для экономии места исходный код был сокращен, где
возможно; например, путем замены (* 1.0 0.0) на 0.0.
10
20
30
40
50
60
70
80
90
0.00
0.15
0.10
0.05
0
5
10
Y
15
Y
20
25
30
0.00
−5
0
5
10
15
Y
20
25
30
Рисунок 11 — Гистограммы (зеленые сплошные линии) выборок из распределений, определяемых найденными в процессе статистического вывода вероятностными программами
для аппроксимации эмпирических данных (синие пунктирные линии) трех вещественных
показателей из базы данных, используемой для анализа заявок на выдачу кредита.
Для данного эксперимента мы выбрали три набора данных признаков обращающихся в банк клиентов для получения кредита [47, 48], и производили вывод вероятностной
программы, используя для сравнения p-значения двухвыборочного теста КолмогороваСмирнова аналогично тому, как мы использовали G-тест для дискретных распределений. Гистограммы выборок из лучших найденных вероятностных программ в сравнении
с гистограммами истинных эмпирическими данными признаков клиентов приведены на
рис. 11. Пример выведенной вероятностной программы показан на рис. 10 (справа).
2.5.4
«Компиляция» вероятностных программ
Генерация выборок из апостериорного распределения методом Монте-Карло по схеме Марковских цепей, особенно в случае Байесовского вывода, обычно достаточно дорогостояща.
Под «компиляцией» вероятностных программ мы имеем в виду поиск вероятностных программ, априорное распределение которых согласовывалось бы точно или приблизительно
с искомым апостериорным распределением.
В вероятностном программировании, где в общем случае генерация выборки из же39
[ASSUME t h e t a ( b e t a 1 . 0 1 . 0 ) ]
[OBSERVE ( f l i p t h e t a ) True ]
[OBSERVE ( f l i p t h e t a ) True ]
[OBSERVE ( f l i p t h e t a ) True ]
[OBSERVE ( f l i p t h e t a ) True ]
[ PREDICT t h e t a ]
[ PREDICT ( f l i p t h e t a ) ]
[ASSUME t h e t a ( s a f e − b e t a 4 . 4 4 0 1 . 0 ) ]
[ASSUME t h e t a ( s a f e − s q r t
( safe−beta ( safe−log 11.602) 1 . 0 ) ) ]
[ASSUME t h e t a ( s a f e − b e t a ( s a f e − s q r t 2 7 . 8 1 0 ) 1 . 0 ) ]
[ASSUME t h e t a ( b e t a 5 . 0 1 . 0 ) ]
[ PREDICT t h e t a ]
Рисунок 12 — (слева) Вероятностная модель бета-биномиального распределения (в несжатой форме) в виде вероятностной программы. В рамках эксперимента была поставлена
задача найти формализацию апостериорного распределения скрытого параметра θ в виде другой вероятностной программы, чье априорное распределение будет совпадать или
приближать данное апостериорное. (справа, сверху) Найденные вероятностные программы (т.е., результат «компиляции» вероятностных программ), априорное распределение
которых приближает заданное апостериорное распределение. (справа, внизу) Записанный
человеком исходный код вероятностной программы, чье априорное распределение совпадает с априорным распределением. В данном конкретном случае данная вероятностная
программа может быть просто выведена аналитически, так как Бета-распределение является сопряженным к биномиальному, но в общем случае это нетривиальная задача.
лаемого апостериорного распределения путем использования методом Монте-Карло или
аналогичным им является единственным доступным средством за разумное время, эта
проблема стоит еще острее.
В качестве самых предварительных результатов мы провели эксперимент, в рамках которого наша априорная модель была моделью бета-биномиального распределения (в
несжатой форме) с априорным распределением на скрытый параметр θ ∼ Beta(1.0, 1.0),
и использовали алгоритм Метрополиса-Гастингса для получения выборки X̂ из апостериорного распределения скрытого параметра θ с учетом проведения четырех успешных
испытаний по схеме Бернулли Bernoulli(θ). Соответствующая вероятностная программа
представлена на рис. 12.
Затем мы использовали наш подход к выводу вероятностных программ, априорное
распределение которых будет статистически схожим с полученной выборкой из желаемого апостериорного распределения. Примеры найденных вероятностных программ даны
на рис. 12. В данном конкретном случае мы можем аналитически найти и записать в
виде вероятностной программы апостериорное распределение, равное Beta(5.0, 1.0). Таким образом, полученные результаты показывают, что мы нашли хорошее приближение
апостериорного распределения.
40
2.6
Обобщение порождающего вероятностного программирования
Как было отмечено ранее, порождающие вероятностные модели определяют совместное
распределение (T, X), часто задаваемое сначала с помощью распределения (T ), а затем
с помощью условного распределения (X | T ). Порождающие вероятностные модели могут использоваться либо для генерации выборок напрямую из (T, X), либо в качестве
промежуточного этапа для нахождения условного распределения скрытых параметров
(T | X = x̂), обычно с помощью приближенных методов статистического вывода или оптимизации.
В рамках наших экспериментов, описанных выше, мы решали задачу вывода вероятностной программы, которая определяет вероятностную модель (в общем случае параметризованную), априорное распределение которой соответствует или приближает искомое распределение, заданное аналитически, или в виде выборки, или в виде дорогостоящего генератора элементов выборки.
На языке вероятностного программирования Church, поддерживающего проведение
статистического запроса внутри другого статистического запроса, данная задача может
быть сформулирована следующим образом (подобно тому, как мы ее формулировали в
Anglican/Venture, см. 4 и 5):
1 ( query
2
( d e f i n e program−text ( p r o d u c t i o n s INPUT−TYPES OUTPUT−TYPE) )
3
( d e f i n e program
4
( eval ( l i s t ‘ lambda ‘ ( arg1 . . . ar g N) program−text ) ) )
5
program−text
6
(and
7
8
( noisy−distance−equal
( get−statistics
9
( multiple−query
10
; No d e f i n e s .
11
( program arg1_1 . . . arg1_N )
12
true ))
13
14
expected−statistics1 )
...
41
( noisy−distance−equal
15
( get−statistics
16
17
( multiple−query
18
; No d e f i n e s .
19
( program argM_1 . . . argM_N)
20
true ))
expected−statisticsM )))
21
где (query defines expression predicate) — задание запроса в Church (см. [2]),
INPUT-TYPES — перечисление типов входных аргументов, OUTPUT-TYPE — тип выходного значения процедуры, noisy-distance-equal — функция сравнения статистик,
get-statistics — функция извлечения статистик из распределения, multiple-query —
аналог query, возвращающий несколько элементов из распределения вместо одного элемента, expected-statistics... — M значений статистик искомого распределения.
Автор считает, что более общо, для нахождения вероятностной модели, служащей
вспомогательным инструментом в нахождении условного апостериорного распределения
P (T | X = x̂), мы можем быть заинтересованы в постановке задачи следующим образом:
1 ( query
2
( d e f i n e l a t e n t − v a r i a b l e s − c r e a t o r ( l a t e n t − p r o d u c t i o n s LATENT−TYPES) )
3
( d e f i n e program−text
4
5
6
( p r o d u c t i o n s LATENT−TYPES INPUT−TYPES OUTPUT−TYPE) )
( d e f i n e program
( eval ( l i s t ‘ lambda ‘ ( arg1 . . . argN ) program−text ) ) )
7
( l i s t l a t e n t − v a r i a b l e s − c r e a t o r program−text )
8
(and
9
( noisy−latents−equal
10
( multiple−query
11
( define latent−variables ( latent−variables−creator ))
12
latent−variables
13
( noisy−outputs−equal
14
( program l a t e n t − v a r i a b l e s arg1_1 . . . arg1_N ) output1 ) )
42
15
expected−latents1 )
16
...
17
( noisy−latents−equal
18
( multiple−query
19
( define latent−variables ( latent−variables−creator ))
20
latent−variables
21
( noisy−outputs−equal
( program l a t e n t − v a r i a b l e s argM_1 . . . argM_N) outputM ) )
22
23
expected−latentsM ) ) )
где latent-productions — правила порождения объекта, представляющего скрытые параметры типов LATENT-TYPES, «лениво» создаваемые с помощью процедуры mem (см. [2]);
latent-variables — объект, представляющий скрытые параметры; arg..._... — M значений аргументов, output... — M значений наблюдаемых данных; expected-latents...
— M значений ожидаемых скрытых параметров.
Таким образом, в рамках данной формулировки мы ищем вероятностную программу, содержащую: скрытые переменные, определяемые latent-variables; наблюдаемые
переменные, определяемые выполнением program; и вывод производится с учетом M тренировочных троек
{ai , t̂i , x̂i },
где ai — дополнительная параметризация, x̂i — значения наблюдаемых переменных, t̂i —
ожидаемые значения скрытых переменных.
Следует отметить, что так как в настоящее время обобщенный статистический вывод с использованием вероятностных языков программирования производится достаточно
медленно, то решение практических задач таким образом пока не имеет смысла. С другой
стороны, с дальнейшим развитием [4, 3] обобщенных методов статистического вывода и
других решений (например, оптимизации или поиска), с использовании более продуманных алгоритмов программной реализации и структур данных [3, 27], со специализированным аппаратным обеспечением [49, 50], автоматизированная генерация и использование порождающих вероятностных моделей может успешно и продуктивно применяться на
практике.
43
ЗАКЛЮЧЕНИЕ
В первой части данной работы очень кратко и реферативно представлено введение
в вероятностное программирование на примере языков Church/Venture/Anglican, первое
подобное введение на русском языке, насколько известно автору.
Во второй части данной работы представлен подход к порождению вероятностных программ, обобщающих распределения, представленные либо в виде выборки, либо в
виде аналитического представления (например, в виде значения статистик), причем метавероятностная модель вероятностных моделей также записывается в виде вероятностной
программы. Используя данный подход, были получены предварительные положительные
результаты статистического вывода из апостериорного распределения искомых вероятностных программ методами Монте-Карло по схеме цепей Маркова, в том числе была автоматически выведена вероятностная программа, генерирующая элементы выборки всего
семейства распределений Бернулли.
44
СПИСОК ИСПОЛЬЗОВАННЫХ ИСТОЧНИКОВ
[1] Goodman Noah D. The principles and practice of probabilistic programming // ACM
SIGPLAN Notices / ACM. — Vol. 48. — 2013. — P. 399–402.
[2] Church: A language for generative models / Noah D. Goodman, Vikash K. Mansinghka,
Daniel M. Roy et al. — 2008. — P. 220–229.
[3] Mansinghka Vikash, Selsam Daniel, Perov Yura. Venture: a higher-order probabilistic
programming platform with programmable inference // arXiv preprint arXiv:1404.0099. —
2014.
[4] Wood Frank, van de Meent Jan Willem, Mansinghka Vikash. A new approach to
probabilistic programming inference // Proceedings of the 17th International conference
on Artificial Intelligence and Statistics. — 2014.
[5] Approximate Bayesian image interpretation using generative probabilistic graphics
programs / Vikash Mansinghka, Tejas D Kulkarni, Yura N Perov, Josh Tenenbaum //
Advances in Neural Information Processing Systems. — 2013. — P. 1520–1528.
[6] Perov Yura N, Wood Frank D. Learning probabilistic programs (статья отправлена на
конференцию). — 2014.
[7] Лопатников Леонид Исидорович. Экономико-математический словарь. — 5-е изд., перераб. и доп. — М.: Дело, 2003.
[8] Ветров Дмитрий Петрович, Кропотов Дмитрий Александрович. Байесовские методы машинного обучения (курс лекций). Методы Монте-Карло по схеме Марковских
цепей. — 2011. — URL: http://www.machinelearning.ru/wiki/images/6/6b/BMMO11_
10.pdf.
[9] Рассел Стюарт, Норвиг Питер. Искусственный интеллект: современный подход (2-е
издание). — «Вильямс», 2007.
[10] Bishop Christopher. Pattern Recognition and Machine Learning. — Springer, New York,
2006.
[11] Murphy Kevin P. Machine learning: a probabilistic perspective. — MIT Press, 2012.
[12] Ветров Дмитрий Петрович, Кропотов Дмитрий Александрович. Байесовские методы
45
машинного обучения (курс лекций). — 2013. — URL: http://www.machinelearning.
ru/.
[13] Сайт
о
вероятностном
программировании. —
2014. —
URL:
http://
probabilistic-programming.org/.
[14] Абельсон Харольд, Сассман Джеральд Джей. Структура и интерпретация компьютерных программ. — Добросвет, КДУ, 2010.
[15] Freer Cameron, Mansinghka Vikash, Roy Daniel. When are probabilistic programs
probably computationally tractable? // NIPS 2010 Workshop on Monte Carlo Methods
in Modern Applications. — 2010.
[16] Wingate David, Stuhlmueller Andreas, Goodman Noah D. Lightweight implementations of
probabilistic programming languages via transformational compilation. — 2011. — P. 131.
[17] Николенко Сергей Игоревич. Вероятностное обучение (курс лекций). — 2007. — URL:
http://logic.pdmi.ras.ru/~sergey/index.php?page=mlbayes.
[18] Chib Siddhartha, Greenberg Edward. Understanding the metropolis-hastings algorithm //
The American Statistician. — 1995. — Vol. 49, no. 4. — P. 327–335.
[19] Зубков А. М., Шуваев Д. В. Вычисление моментов комбинаторных статистик от перестановочных случайных величин // Дискретная математика. — 2005.
[20] Perov Yura, Mansinghka Vikash. Exploiting Conditional Independence for Efficient,
Automatic Multicore Inference for Church. — 2012.
[21] Blei David M, Ng Andrew Y, Jordan Michael I. Latent dirichlet allocation // the Journal
of machine Learning research. — 2003. — Vol. 3. — P. 993–1022.
[22] Wu Jeff. Reduced traces and JITing in Church : Ph. D. thesis / Jeff Wu ; Massachusetts
Institute of Technology. — 2013.
[23] CAPTCHA: Using hard AI problems for security / Luis Von Ahn, Manuel Blum,
Nicholas J Hopper, John Langford // Advances in Cryptology—EUROCRYPT 2003. —
Springer, 2003. — P. 294–311.
[24] Goodman N. D., Tenenbaum J. B. Probabilistic Models of Cognition. — 2014. — URL:
https://probmods.org/.
46
[25] A Repository for Generative Models (composite authors, edited by Andreas Stuhlmüller). —
2014. — URL: http://forestdb.org/.
[26] Wood Frank et al. Probabilistic Programming Tutorial (Machine Learning Summer School,
Iceland). — 2014. — URL: http://www.robots.ox.ac.uk/~fwood/anglican/teaching/
mlss2014/.
[27] Paige Brooks, Wood Frank. A Compilation Target for Probabilistic Programming
Languages. — 2014.
[28] Maddison Chris J, Tarlow Daniel. Structured Generative Models of Natural Source Code. —
2014.
[29] Liang Percy, Jordan Michael I, Klein Dan. Learning programs: A hierarchical Bayesian
approach. — 2010. — P. 639–646.
[30] Marsaglia George, Bray Thomas A. A convenient method for generating normal
variables. — 1964. — Vol. 6, no. 3. — P. 260–264.
[31] Box George EP, Muller Mervin E et al. A note on the generation of random normal
deviates. — 1958. — Vol. 29, no. 2. — P. 610–611.
[32] Devroye Luc. Non-Uniform Random Variate Generation. — 1986.
[33] Gulwani Sumit, Kitzelmann Emanuel, Schmid Ute. Approaches and Applications of
Inductive Programming (Dagstuhl Seminar 13502). — 2014. — Vol. 3, no. 12. — P. 43–
66. — URL: http://drops.dagstuhl.de/opus/volltexte/2014/4507.
[34] Looks Moshe. Program evolution for general intelligence // FRONTIERS IN ARTIFICIAL
INTELLIGENCE AND APPLICATIONS. — 2007. — Vol. 157. — P. 125.
[35] Muggleton Stephen, De Raedt Luc. Inductive logic programming: Theory and methods. —
1994. — Vol. 19. — P. 629–679.
[36] Muggleton Stephen, Feng Cao. Efficient induction of logic programs. — 1992. — Vol. 38. —
P. 281–298.
[37] De Raedt Luc, Kersting Kristian. Probabilistic inductive logic programming. — Springer,
2008.
[38] Kersting Kristian. An inductive logic programming approach to statistical relational
47
learning / IOS Press. — 2005. — P. 1–228. — URL: http://people.csail.mit.edu/
kersting/FAIAilpsrl/.
[39] Muggleton Stephen. Stochastic logic programs. — 1996. — Vol. 32. — P. 254–264.
[40] Exploiting compositionality to explore a large space of model structures / Roger Grosse,
Ruslan R Salakhutdinov, William T Freeman, Joshua B Tenenbaum. — 2012.
[41] Structure discovery in nonparametric regression through compositional kernel search /
David Duvenaud, James Robert Lloyd, Roger Grosse et al. — 2013.
[42] Hwang Irvin, Stuhlmüller Andreas, Goodman Noah D. Inducing probabilistic programs by
Bayesian program merging. — 2011.
[43] Gordon Andrew D. An Agenda for Probabilistic Programming: Usable, Portable,
and Ubiquitous // Workshop on Probabilistic Programming: Democratizing Machine
Learning. — 2013.
[44] Markov chain Monte Carlo without likelihoods / Paul Marjoram, John Molitor,
Vincent Plagnol, Simon Tavaré. — 2003. — Vol. 100, no. 26. — P. 15324–15328.
[45] Johnson Mark, Griffiths Thomas L, Goldwater Sharon. Adaptor grammars: A framework
for specifying compositional nonparametric Bayesian models. — 2007. — Vol. 19. — P. 641.
[46] Knuth Donald E. The Art of Computer Programming, 3rd edn., vol. 2. — 1998.
[47] Quinlan J. Ross. Simplifying decision trees. — 1987. — Vol. 27, no. 3. — P. 221–234.
[48] Bache K., Lichman M. UCI Machine Learning Repository. — 2013. — URL: http:
//archive.ics.uci.edu/ml.
[49] Tenenbaum Joshua B, Jonas Eric M, Mansinghka Vikash K. Stochastic Digital Circuits for
Probabilistic Inference. — 2008.
[50] Jonas Eric Michael. Stochastic architectures for probabilistic computation : Ph. D. thesis /
Eric Michael Jonas ; Massachusetts Institute of Technology. — 2014.
48
| 6cs.PL
|
A modal Logic for Termgraph Rewriting
⋆
Ph. Balbiani1 , R. Echahed2 , and A. Herzig1
arXiv:1003.4369v1 [cs.LO] 23 Mar 2010
1
Université de Toulouse, CNRS
Institut de Recherche en Informatique de Toulouse (IRIT)
118 route de Narbonne, 31062 Toulouse Cedex 9, France
{balbiani,herzig}@irit.fr
2
Laboratoire LIG
Bât IMAG C
BP 53
38041 Grenoble Cedex, France
[email protected]
Abstract. We propose a modal logic tailored to describe graph transformations and discuss some of its properties. We focus on a particular
class of graphs called termgraphs. They are first-order terms augmented
with sharing and cycles. Termgraphs allow one to describe classical datastructures (possibly with pointers) such as doubly-linked lists, circular
lists etc. We show how the proposed logic can faithfully describe (i) termgraphs as well as (ii) the application of a termgraph rewrite rule (i.e.
matching and replacement) and (iii) the computation of normal forms
with respect to a given rewrite system. We also show how the proposed
logic, which is more expressive than propositional dynamic logic, can
be used to specify shapes of classical data-structures (e.g. binary trees,
circular lists etc.).
1
Introduction
Graphs are common structures widely used in several areas in computer science
and discrete mathematics. Their transformation constitute a domain of research
per se with a large number of potential applications [11, 8, 9]. There are many
different ways to define graphs and graph transformation. We consider in this
paper structures known as termgraphs and their transformation via rewrite rules
[5, 10]. Roughly speaking, a termgraph is a first-order term with possible sharing
(of sub-terms) and cycles. Below we depict three examples of termgraphs : G0 is a
classical first-order term. G1 represents the same expression as G0 but argument
x is shared. G1 is often used to define the function double double(x) = G1 . The
second termgraph G2 represents a circular list of two “records” (represented here
by operator cons) sharing the same content G1 .
⋆
This work has been partly funded by the project ARROWS of the French Agence
Nationale de la Recherche.
x
{{
}{
{
+C
CC
C!
+
x
x
s
consI
II
II
$
+
/ cons
uu
u
uz u
x
G0
G1
G3
Termgraphs allow to represent real-world data structures (with pointers)
such as circular lists, doubly-linked lists etc [7], and rewriting allows to efficiently process such graphs. They are thus a suitable framework for declarative
languages dealing with such complex data structures. However, while there exist
rewriting-based proof methods for first-order terms, there is a lack of appropriate termgraph rewriting proof methods, diminishing thus their operational
benefits. Indeed, equational logic provides a logical setting for first-order term
rewriting [4], and many theorem provers use rewrite techniques in order to efficiently achieve equational reasoning. In [6] an extension of first-order (clausal)
logic dealing with termgraphs has been proposed to give a logic counterpart of
termgraph rewriting. In such a logic operations are interpreted as continuous
functions [12, 13] and bisimilar graphs cannot be distinguished (two termgraphs
are bisimilar if and only if they represent the same rational term). Due to that,
reasoning on termgraphs is unfortunately much trickier than in first-order classical logic. For example, equational theories on termgraphs are not recursively
enumerable whereas equational theories on terms are r.e.).
In this paper, we investigate a modal logic with possible worlds semantics
which better fits the operational features of termgraph rewriting systems. Termgraphs can easily be interpreted within the framework of possible worlds semantics, where nodes are considered as worlds and edges as modalities. Based
on this observation, we investigate a new modal logic which has been tailored to
fit termgraph rewriting. We show how termgraphs as well as rewrite rules can be
specified by means of modal formulae. In particular we show how a rewrite step
can be defined by means of a modal formula which encodes termgraph matching (graph homomorphism) and termgraph replacement (graph construction and
modification). We show also how to define properties on such structures, such as
being a list, a circular list, a tree, a binary tree. The computation of termgraph
normal form is formulated in this new logic. In addition, we formulate invariant preservation by rewriting rules and discuss subclasses for which validity is
decidable.
The next two sections introduce respectively the considered class of termgraph rewrite systems and the proposed modal logic. In section 4 we discuss
briefly the expressive power of the modal logic and show particularly how graph
homomorphisms can be encoded. In section 5 we show how elementary graph
transformations can be expressed as modal logic formulae whareas section 6
shows how termgraph rewriting can be specified as modal formulae. Section 7
gives some concluding remarks.
2
Termgraph Rewriting
This section defines the framework of graph rewrite systems that we consider
in the paper. There are different approaches in the literature to define graph
transformations. We follow here an algorithmic approach to termgraph rewriting
[5]. Our definitions are consistent with [7].
Definition 21 (Graph)
A termgraph, or simply a graph is a tuple G = (N , E, Ln , Le , S, T ) which consists
of a finite set of nodes N , a finite set of edges E, a (partial) node labelling function
Ln : N → Ω which associates labels in Ω to nodes in N , a (total) edge labelling
function Le : E → F which associates, to every edge in E, a label (or feature) in
F , a source function S : E → N and a target function T : E → N which specify
respectively, for every edge e, its source S(e) and its target T (e).
Note that G is a first-order term if and only if G is a tree.
We assume that the labelling of edges Le fulfills the following additional determinism condition: ∀e1 , e2 ∈ E, (S(e1 ) = S(e2 ) and Le (e1 ) = Le (e2 )) implies e1 =
e2 . This last condition expresses the fact that for every node n there exists at
most one edge e of label a such that the source of e is n. We denote such an
edge by the tuple (n, a, m) where m is the target of edge e.
Notation: For each labelled node n the fact that ω = Ln (n) is written n : ω,
and each unlabelled node n is written as n : •. This ‘unlabelled’ symbol • is used
in termgraphs to represent anonymous variables. n : ω(a1 ⇒ n1 , . . . , ak ⇒ nk )
describes a node n labelled by symbol ω with k outgoing edges, e1 , . . . , ek , such
that for every edge ei , Le (ei ) = ai , S(ei ) = n and T (ei ) = ni . In the sequel we
will use the linear notation of termgraphs [5] defined by the following grammar.
The variable A (resp. F and n) ranges over the set Ω (resp. F and N ) :
TermGraph ::= Node | Node + TermGraph
Node
::= n:A(F ⇒ Node,. . . ,F ⇒ Node) | n:• | n
the operator + stands for the disjoint union of termgraph definitions. We assume
that every node is labelled at most once. The expression n : ω(n1 , . . . , nk ) stands
for n : ω(1 ⇒ n1 , . . . , k ⇒ nk ).
A graph homomorphism, h : G → G1 , where G = (N , E, Ln , Le , S, T ) and
G1 = (N1 , E1 , Ln1 , Le1 , S1 , T1 ) is a pair of functions h = (hn , he ) with hn : N → N1
and he : E → E1 which preserves the labelling of nodes and edges as well
as the source and target functions. This means that for each labelled node
m in G, Ln1 (hn (m)) = Ln (m) and for each edge f in G, Le1 (he (f )) = Le (f ),
S1 (he (f )) = hn (S(f )) and T1 (he (f )) = hn (T (f )). Notice that the image by hn
of an unlabelled node may be any node.
Remark: Because of the determinism condition, a homomorphism h : G →
G1 is completely defined by the function hn : N → N1 which should satisfy the
following conditions : for each labelled node m in G, Ln1 (hn (m)) = Ln (m) and
for every outgoing edge from m, say (m, a, w), for some feature a and node w,
the edge (hn (m), a, hn (w)) belongs to E1 .
Example 22 Let B1 , B2 and B3 be the following termgraphs.
B1 : n 0 : h
1
n1 : gM
MMaM
M&
b
n2 : •
n3 : •
B2 : B n 0 : h
B3 : n 0 : h
1
n1 : gL
LLLa
LL%
b
n3 : •
n2 : 0
1
n1 : g
b a
n2 : 0
and h and h′ be two functions on nodes defined as follows: h(ni ) = ni for
i in {0, 1, 2, 3} and h′ (ni ) = ni for i in {0, 1, 2} and h′ (n3 ) = n2 . h defines a
homomorphism from B1 to B2 . h′ defines a homomorphism from B1 to B3 and
from B2 to B3 . There is no homomorphism from B3 to B2 or to B1 , nor from
B2 to B1 .
The following definition introduces a notion of actions. Each action specifies
an elementary transformation of graphs. These elementary actions are used later
on to define graph transformations by means of rewrite rules.
Definition 23 (Actions) An action has one of the following forms.
– a node definition or node labelling n : f (a1 ⇒ n1 , . . . , ak ⇒ nk ) where
n, n1 , . . . , nk are nodes and f is a label of node n. For i ∈ {1, . . . , k}, ai
is the label of an edge, ei , such that (Le (ei ) = ai ) and whose source is n
(S(ei ) = n) and target is node ni (T (ei ) = ni ). This action, first creates a
new node n if n does not already exist in the context of application of the
action. Then node n is defined by its label and its outgoing edges.
– an edge redirection or local redirection n ≫a m
where n, m are nodes and a is the feature of an edge e outgoing node n
(S(e) = n and Le (e) = a). This action is an edge redirection and means that
the target of edge e is redirected to point to the node m (i.e., T (e) = m after
performing the action n ≫a m).
– a global redirection n ≫ m
where n and m are nodes. This means that all edges e pointing to n (T (e) =
n) are redirected to point to the node m (T (e) = m).
The result of applying an action α to a termgraph G = (N , E, Ln , Le , S, T ) is
denoted by α[G] and is defined as the following termgraph G1 = (N1 , E1 , Ln1 , Le1 , S1 , T1 )
such that :
– If α = n : f (a1 ⇒ n1 , . . . , ak ⇒ nk ) then
• N1 = N ∪ {n, n1 , . . . , nk },
• Ln1 (n) = f and Ln1 (m) = Ln (m) if m 6= n,
• Let E = {ei | 1 ≤ i ≤ k, ei is an edge such that S(ei ) = n, T (ei ) =
e
ni and L
(ei ) = ai }. E1 = E ∪ E,
ai
if e = ei ∈ E
e
• L1 (e) =
Le (e)
if e 6∈ E
n
if e = ei ∈ E
S(e)
if
e 6∈ E
ni
if e = ei ∈ E
• T1 (e) =
T (e)
if e 6∈ E
∪ denotes classical union. This means that the nodes in {n, n1 , . . . , nk } which
already belong to G are reused whereas the others are new.
– If α = n ≫a m then
• N1 = N , Ln1 = Ln , Le1 = Le , S1 = S and
• Let e be the edge of label a outgoing n.
T1 (e) = m and T1 (e′ ) = T (e′ ) if e′ 6= e.
– If α = n ≫ m then N1 = N , Ln1 = Ln , Le1 = Le , S1 = S and
m
if T (e) = n
T1 (e) =
T (e)
otherwise
• S1 (e) =
A rooted termgraph is a termgraph G with a distinguished node n called
its root. We write G = (N , E, Ln , Le , S, T , n). The application of an action α
to a rooted termgraph G = (N , E, Ln , Le , S, T , n) is a rooted termgraph G1 =
(N1 , E1 , Ln1 , Le1 , S1 , T1 , n1 ) such that G1 = α[G] and root n1 is defined as follows :
– n1 = n if α is not of the form n ≫ p.
– n1 = p if α is of the form n ≫ p.
The application of a sequence of actions ∆ to a (rooted) termgraph G is defined
inductively as follows : ∆[G] = G if ∆ is the empty sequence and ∆[G] = ∆′ [α[G]]
if ∆ = α; ∆′ where “;” is the concatenation (or sequential) operation. Let h be
a homomorphism. We denote by h(∆) the sequence of actions obtained from ∆
by substituting every node m occurring in ∆ by h(m).
Example 24 This example illustrates the application of actions. Let H1 , H2 ,
H3 , H4 and H5 be the following termgraphs.
H2 : n1 : gL
LLLa
LL%
b
n3 : •
n2 : 0
H1 : n 1 : f
a
n2 : 0
1
n1 : gL
LLLa
LL%
b
n3 : •
n2 : 0
H5 :
H4 : n 0 : h
1
b
n1 : g
b a
n2 : 0
H3 : n 0 : h
n3 : •
nB 0 : h\
a
1
n1 : g
n2 : 0
n3 : •
H2 is obtained from H1 by applying the action n1 : g(b ⇒ n2 , a ⇒ n3 ). n1
is relabelled whereas n3 is a new unlabelled node. H3 is obtained from H2 by
applying the action α = n0 : h(n1 ). n0 is a new node labelled by h. h has one
argument n1 . H4 is obtained from H3 by applying the action n1 ≫a n2 . The
effect of this action is to change the target n3 of the edge (n1 , a, n3 ) by n2 . H5
is obtained from H4 by applying the action n2 ≫ n0 . This action redirects the
incoming edges of node n2 to target node n0 .
Definition 25 (Rule, system, rewrite step) A rewrite rule is an expression
of the form l → r where l is a termgraph and r is a sequence of actions. A rule is
written l → (a1 , . . . , an ) or l → a1 ; . . . ; an where the a′i s are elementary actions.
A termgraph rewrite system is a set of rewrite rules. We say that the term-graph
G rewrites to G1 using the rule l → r iff there exists a homomorphism h : l → G
and G1 = h(r)[G]. We write G →l→r G1 , or simply G → G1 .
Example 26 We give here an example of a rewrite step. Consider the following
rewrite rule:
n1 : g(a ⇒ n2 : •, b ⇒ n3 : •) → n0 : h(1 ⇒ n1 ); n1 ≫a n2 ; n2 ≫ n0
The reader may easily verify that the graph H2 of Example 24 can be rewritten by the considered rule into the graph H5 of Example 24.
Example 27 We give here somme illustrating examples of the considered class
of rewrite systems. We first define an operation, insert, which inserts an element
in a circular list.
r : insert(m : •, p1 : cons(m1 : •, p1 )) → p2 : cons(m, p1 ); p1 ≫2 p2 ; r ≫ p2
r : insert(m : •, p1 : cons(m1 : •, p2 ))+p3 : cons(m2 , p1 ) → p4 : cons(m, p1 );
p3 ≫2 p4 ; r ≫ p4
As a second example, we define below the operation length which computes the
number of elements of any, possibly circular, list.
r : length(p : •) → r′ : length′(p, p); r ≫ r′
r : length′ (p1 : nil, p2 : •) → r′ : 0; r ≫ r′
r : length′ (p1 : cons(n : •, p2 : •), p2 ) → r′ : succ(0); r ≫ r′
r : length′ (p1 : cons(n : •, p2 : •), p3 : •) → r′ : s(q : •); q : length′ (p2 , p3 ); r ≫ r′
Pointers help very often to enhance the efficiency of algorithms. In the following, we define the operation reverse which performs the so-called “in-situ
list reversal”.
o : reverse(p : •) → o′ : reverse′ (p, q : nil); o ≫ o′
o : reverse′ (p1 : cons(n : •, q : nil), p2 : •) → p1 ≫2 p2 ; o ≫ p1
o : reverse′ (p1 : cons(n : •, p2 : cons(m : •, p3 : •), p4 : •) → p1 ≫2 p4 ;
o ≫1 p2 ; o ≫2 p1
The last example illustrates the encoding of classical term rewrite systems.
We define the addition on naturals as well as the function double with their usual
meanings.
r : +(n : 0, m : •) → r ≫ m
r : +(n : succ(p : •), m : •) → q : succ(k : +(p, m)); r ≫ q
r : double(n : •) → q : +(n, n); r ≫ q
3
Modal logic
It is now time to define the syntax and the semantics of the logic of graph
modifiers that will be used as a tool to talk about rooted termgraphs.
3.1
Syntax
Like the language of propositional dynamic logic, the language of the logic of
graph modifiers is based on the idea of associating with each action α of an
action language a modal connective [α]. The formula [α]φ is read “after every
terminating execution of α, φ is true”. Consider, as in section 2, a countable
set F (with typical members denoted a, b, etc) of edge labels and a countable
set Ω (with typical members denoted ω, π, etc) of node labels. These labels are
formulas defined below. A node labeled by π is called a π node.
Formally we define the set of all actions (with typical members denoted α,
β, etc) and the set of all formulas (with typical members denoted φ, ψ, etc) as
follows:
– α ::= a | U | n | n | φ? | (ω :=g φ) | (ω :=l φ) | (a + (φ, ψ)) | (a − (φ, ψ)) |
(α; β) | (α ∪ β) | α⋆ ,
– φ :: ω | ⊥ | ¬φ | (φ ∨ ψ) | [α]φ.
We adopt the standard abbreviations for the other Boolean connectives. Moreover, for all actions α and for all formulas φ, let hαiφ be ¬[α]¬φ. As usual, we
follow the standard rules for omission of the parentheses. An atomic action is
either an edge label a in F , the universal action U , a test φ? or an update action
n, n, ω :=g φ, ω :=l φ, a + (φ, ψ) or a − (φ, ψ). U reads “go anywhere”, n reads
“add some new node”, n reads “add some new node and go there”, ω :=g φ
reads “assign to ω nodes the truth value of φ everywhere (globally)”, ω :=l φ
reads “assign to ω the truth value of φ here (locally)”, a + (φ, ψ) reads “add
a edges from all φ nodes to all ψ nodes”, and a − (φ, ψ) reads “deletea edges
from all φ nodes to all ψ nodes”. Complex actions are built by means of the
regular operators “;”, “∪” and “⋆ ”. An update action is an action without edge
labels and without U . An update action is :=l -free if no local assignment ω :=l φ
occurs in it.
3.2
Semantics
Like the truth-conditions of the formulas of ordinary modal logics, the truthconditions of the formulas of the logic of graph modifiers is based on the idea of
interpreting, within a rooted termgraph G = (N , E, Ln , Le , S, T , n0 ), edge labels
in F by sets of edges and node labels in Ω by sets of nodes. In this section, we
consider a more general notion of node labeling functions Ln of termgraphs
such that nodes can have several labels (propositions). In this case the labeling
function has the following profile Ln : N → P(Ω). Node labeling functions
considered in section 2 where a node can have at most one label is obviously a
particular case. Let IG be the interpretation function in G of labels defined as
follows:
– IG (a) = {e ∈ E: Le (e) = a},
– IG (ω) = {n ∈ N : ω ∈ Ln (n)}.
For all abstract actions a, let RG (a) = {(n1 , n2 ): there exists an edge e ∈ IG (a)
such that S(e) = n1 and T (e) = n2 } be the binary relation interpreting the
abstract action a in G. The truth-conditions of the formulas of the logic of
graph modifiers are defined by induction as follows:
–
–
–
–
–
G |= ω iff n0 ∈ IG (ω),
G 6|= ⊥,
G |= ¬φ iff G 6|= φ,
G |= φ ∨ ψ iff G |= φ or G |= ψ,
G |= [α]φ iff for all rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), if G
−→α G′ then G′ |= φ
where the binary relations −→α are defined by induction as follows:
– G −→a G′ iff N ′ = N , E ′ = E, Ln ′ = Ln , Le ′ = Le , S ′ = S, T ′ = T and
(n0 , n′0 ) ∈ RG (a),
– G −→φ? G′ iff N ′ = N , E ′ = E, Ln ′ = Ln , Le ′ = Le , S ′ = S, T ′ = T , n′0
= n0 and G′ |= φ,
– G −→U G′ iff N ′ = N , E ′ = E, Ln ′ = Ln , Le ′ = Le , S ′ = S and T ′ = T ,
– G −→n G′ iff N ′ = N ∪ {n1 } where n1 is a new node, E ′ = E, Ln ′ (m) =
Ln (m) if m 6= n1 , Ln ′ (n1 ) = ∅, Le ′ = Le , S ′ = S, T ′ = T and n′0 = n0 ,
– G −→n G′ iff N ′ = N ∪ {n1 } where n1 is a new node, E ′ = E, Ln ′ (m) =
Ln (m) if m 6= n1 , Ln ′ (n1 ) = ∅, Le ′ = Le , S ′ = S, T ′ = T and n′0 = n1 ,
– G −→ω:=g φ G′ iff N ′ = N , E ′ = E, Ln ′ (m) = if (N , E, Ln , Le , S, T , m) |=
φ} then Ln (m) ∪ {ω} else Ln (m) \ {ω}, Le ′ = Le , S ′ = S, T ′ = T and n′0
= n0 ,
– G −→ω:=l φ G′ iff N ′ = N , E ′ = E, Ln ′ (n0 ) = if (N , E, Ln , Le , S, T , n0 ) |=
φ then Ln (n0 ) ∪ {ω} else Ln (n0 ) \ {ω}, Ln ′ (m) = Ln (m) if m 6= n0 , Le ′ =
Le , S ′ = S, T ′ = T and n′0 = n0 ,
– G −→a+(φ,ψ) G′ iff N ′ = N , E ′ = E ∪ {(n1 , a, n2 ) : (N , E, Ln , Le , S, T , n1 ) |=
φ and (N , E, Ln , Le , S, T , n2 ) |= ψ}, Ln ′ = Ln , Le ′ (e) = if e ∈ E then
Le (e) else a, S ′ (e) = if e ∈ E then S(e) else e is of the form (n1 , a, n2 ) and
S ′ (e) = n1 , T ′ = if e ∈ E then T (e) else e is of the form (n1 , a, n2 ) and
T ′ (e) = n2 and n′0 = n0 ,
– G −→a−(φ,ψ) G′ iff N ′ = N , E ′ = E\{(n1 , a, n2 ) : (N , E, Ln , Le , S, T , n1 ) |= φ
and (N , E, Ln , Le , S, T , n2 ) |= ψ}, Ln ′ = Ln , Le ′ (e) = Le (e), S ′ = S, T ′ =
T and n′0 = n0 ,
– G −→α;β G′ iff there exists a rooted termgraph G′′ = (N ′′ , E ′′ , Ln ′′ , Le ′′ , S ′′ , T ′′ , n′′0 )
such that G −→α G′′ and G′′ −→β G′ ,
– G −→α∪β G′ iff G −→α G′ or G −→β G′ ,
(0)
– G −→α⋆ G′ iff there exists a sequence G(0) = (N (0) , E (0) , Ln (0) , Le (0) , S (0) , T (0) , n0 ),
(k)
. . ., G(k) = (N (k) , E (k) , Ln (k) , Le (k) , S (k) , T (k) , n0 ) of rooted termgraphs
(0)
(k)
′
such that G
= G, G
= G and for all non-negative integers i, if i <
k then G(i) −→α G(i+1) .
The above definitions of formulas reflect our intuitive understanding of the actions of the language of the logic of graph modifiers. Obviously, G |= hαiφ iff there
exists a rooted termgraph G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ) such that G −→α G′
and G′ |= φ. The formula φ is said to be valid in class C of rooted termgraphs, in
symbols C |= φ, iff G |= φ for each rooted termgraph G = (N , E, Ln , Le , S, T , n0 )
in C. The class of all rooted termgraphs will be denoted more briefly as Call .
3.3
Validities
Obviously, as in propositional dynamic logic, we have
–
–
–
–
Call
Call
Call
Call
|=
|=
|=
|=
[φ?]ψ ↔ (φ → ψ),
[α; β]φ ↔ [α][β]φ,
[α ∪ β]φ ↔ [α]φ ∧ [β]φ,
[α⋆ ]φ ↔ φ ∧ [α][α⋆ ]φ.
If α is a :=l -free update action then
– Call |= [α]⊥ ↔ ⊥,
– Call |= [α]¬φ ↔ ¬[α]φ,
– Call |= [α](φ ∨ ψ) ↔ [α]φ ∨ [α]ψ.
The next series of equivalences guarantees that each of our :=l -free update actions can be moved across the abstract actions of the form a or U :
Call |= [n][a]φ ↔ [a][n]φ,
Call |= [n][U ]φ ↔ [n]φ ∧ [U ][n]φ,
Call |= [n][a]φ ↔ ⊤,
Call |= [n][U ]φ ↔ [n]φ ∧ [U ][n]φ,
Call |= [ω :=g φ][a]ψ ↔ [a][ω :=g φ]φ,
Call |= [ω :=g φ][U ]ψ ↔ [U ][ω :=g φ]ψ,
Call |= [a + (φ, ψ)][b]χ ↔ [b][a + (φ, ψ)]χ if a 6= b and Call |= [a + (φ, ψ)][b]χ ↔
[b][a + (φ, ψ)]χ ∧ (φ → [U ](ψ → [a + (φ, ψ)]χ)) if a = b,
– Call |= [a + (φ, ψ)][U ]χ ↔ [U ][a + (φ, ψ)]χ,
– Call |= [a − (φ, ψ)][b]χ ↔ [b][a − (φ, ψ)]χ if a 6= b and Call |= [a − (φ, ψ)][b]χ ↔
(¬φ ∧ [b][a − (φ, ψ)]χ) ∨ (φ ∧ [b](¬ψ → [a − (φ, ψ)]χ)) if a = b,
– Call |= [a − (φ, ψ)][U ]χ ↔ [U ][a − (φ, ψ)]χ.
–
–
–
–
–
–
–
Finally, once we have moved each of our :=l -free update actions across the abstract actions of the form a or U , these update actions can be eliminated by
means of the following equivalences:
–
–
–
–
–
Call
Call
Call
Call
Call
|=
|=
|=
|=
|=
[n]ω ↔ ω,
[n]ω ↔ ⊥,
[ω :=g φ]π ↔ π if ω 6= π and Call |= [ω :=g φ]π ↔ φ if ω = π,
[a + (φ, ψ)]ω ↔ ω,
[a − (φ, ψ)]ω ↔ ω.
Proposition 31 For all :=l -free ⋆ -free formulas φ, there exists a :=l -free ⋆ -free
formula ψ without update actions such that Call |= φ ↔ ψ.
Proof. See the above discussion.
Just as for :=l -free update actions, we have the following equivalences for the
update actions of the form ω :=l φ:
–
–
–
–
Call
Call
Call
Call
|=
|=
|=
|=
[ω
[ω
[ω
[ω
:=l
:=l
:=l
:=l
φ]⊥ ↔ ⊥,
φ]¬ψ ↔ ¬[ω :=l φ]ψ,
φ](ψ ∨ χ) ↔ [ω :=l φ]ψ ∨ [ω :=l φ]χ,
φ]π ↔ π if ω 6= π and Call |= [ω :=g φ]π ↔ φ if ω = π.
But it is not possible to formulate reduction axioms for the cases [ω :=l φ][a]ψ
and [ω :=l φ][U ]ψ. More precisely,
Proposition 32 There exists a ⋆ -free formula φ such that for all ⋆ -free formulas
ψ without update actions, Call 6|= φ ↔ ψ.
Proof. Take the ⋆ -free formula φ = [ω :=g ⊥][U ][ω :=l ⊤][a]¬ω. The reader may
easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), G |= φ
iff RG (a) is irreflexive. Seeing that the fact that the binary relation interpreting
an abstract action of the form a is irreflexive cannot be modally defined in
propositional dynamic logic, then for all formulas ψ without update actions, Call
6|= φ ↔ ψ.
3.4
Decidability, axiomatization and a link with hybrid logics
Firstly, let us consider the set L of all :=l -free ⋆ -free formulas φ such that Call
|= φ. Together with a procedure for deciding membership in ⋆ -free propositional
dynamic logic, the equivalences preceding proposition 31 provide a procedure for
deciding membership in L. Hence, membership in L is decidable.
Secondly, let us consider the set L(:=l ) of all ⋆ -free formulas φ such that Call
|= φ. Aucher et al. [3] have defined a recursive translation from the language of
hybrid logic [2] into the set of all our ⋆ -free formulas that preserves satisfiability.
It is known that the problem of deciding satisfiability of hybrid logic formulas
is undecidable [1, Section 4.4]. The language of hybrid logic has formulas of the
form @i φ (“φ is true at i”), @x φ (“φ is true at x”) and ↓x.φ (“φ holds after x is
bound to the current state”), where NOM = {i1 , . . .} is a set of nominals, and
SVAR = {x1 , . . .} is a set of state variables. The (slightly adapted) translation
of a given hybrid formula φ0 is recursively defined as follows.
τ (ω)
=ω
τ (i)
= ωi where ωi does not occur in φ0
τ (x)
= ωx where ωx does not occur in φ0
τ (¬φ) = ¬τ (φ)
τ (φ ∨ ψ) = τ (φ) ∨ τ (ψ)
τ ([a]φ) = [a]τ (φ)
τ ([U ]φ) = [U ]τ (φ)
τ (@i φ) = hU i(ωi ∧ τ (φ))
τ (@x φ) = hU i(ωx ∧ τ (φ))
τ (↓x.φ) = [ωx :=g ⊥][ωx :=l ⊤]τ (φ)
As the satisfiability problem is undecidable in hybrid logic, membership in L(:=l )
is undecidable, too.
Thirdly, let us consider the set L(⋆ ) of all :=l -free formulas φ such that Call
|= φ. It is still an open problem whether membership in L(⋆ ) is decidable or not:
while the update actions can be eliminated from :=l -free formulas, it is not clear
whether this can be done for formulas in which e.g. iterations of assignments
occur.
As for the axiomatization issue, the equivalences preceding proposition 31
provide a sound and complete axiom system of L, whereas no axiom system of
L(:=l ) and L(⋆ ) is known to be sound and complete.
4
Definability of classes of termgraphs
For all abstract actions a, by means of the update actions of the form ω :=l φ,
we can express the fact that the binary relation interpreting an abstract action
of the form a is deterministic, irreflexive or locally reflexive. More precisely, for
all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ),
– G |= [ω :=g ⊥][π :=g ⊥][U ][ω :=l ⊤][a][π :=l ⊤][U ](ω → [a]π) iff RG (a) is
deterministic,
– G |= [ω :=g ⊥][U ][ω :=l ⊤][a]¬ω iff RG (a) is irreflexive,
– G |= [ω :=g ⊥][ω :=l ⊤]haiω iff RG (a) is locally reflexive in n0 .
Together with the update actions of the form ω :=l φ, the regular operation
“⋆ ” enables us to define non-elementary classes of rooted termgraphs. As a first
example, the class of all infinite rooted termgraphs cannot be modally defined
in propositional dynamic logic but the following formula pins it down:
– [ω :=g ⊤][(U ; ω?; ω :=l ⊥)⋆ ]hU iω.
As a second example, take the class of all a-cycle-free rooted termgraphs. It cannot be modally defined in propositional dynamic logic but the following formula
pins it down:
– [ω :=g ⊤][U ][ω :=l ⊥][a+ ]ω.
As a third example, within the class of all a-deterministic rooted termgraphs, the
class of all a-circular rooted termgraphs3 cannot be modally defined in propositional dynamic logic but the following formula pins it down:
– [ω :=g ⊥][U ][ω :=l ⊤]ha+ iω.
Now, within the class of all rooted termgraphs that are both a- and b-deterministic,
the class of all (a ≤ b) rooted termgraphs 4 cannot be modally defined in propositional dynamic logic but the following formula pins it down:
– [ω :=g ⊥][ω :=l ⊤][π :=g ⊥][π :=l ⊤][((U ; ω?; a; ¬ω?; ω :=l ⊤); (U ; π?; b; ¬π?; π :=l
⊤))⋆ ](hU i(π ∧ [b]⊥) → hU i(ω ∧ [a]⊥)).
Finally, within the class of all finite (a ∪ b)-cycle-free (a, b)-deterministic rooted
termgraphs, the class of all (a, b)-binary rooted termgraphs cannot be modally
defined in propositional dynamic logic but the following formula pins it down:
– [ω :=g ⊥][U ][ω :=l ⊤][a][π :=g ⊤][(a ∪ b)⋆ ][π :=l ⊥][U ](ω → [b][(a ∪ b)⋆ ]π).
Most important of all is the ability of the language of the logic of graph modifiers
to characterize finite graph homomorphisms.
Proposition 41 Let G = (N , E, Ln , Le , S, T , n0 ) be a finite rooted termgraph.
There exists a ⋆ -free action αG and a ⋆ -free formula φG such that for all finite
rooted termgraphs G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G′ |= hαG iφG iff there exists
a graph homomorphism from G into G′ .
Proof. Let G = (N , E, Ln , Le , S, T , n0 ) be a finite rooted termgraph. Suppose
that N = {0, . . . , N − 1} and consider a sequence (π0 , . . . , πN −1 ) of pairwise
distinct elements of Ω. Each πi will identify exactly one node of N , and π0 will
identify the root.
We define the action αG and the formula φG as follows:
– βG = (π0 :=g ⊥); . . . ; (πN −1 :=g ⊥),
i
– for all non-negative integers i, if i < N then γG
= (¬π0 ∧. . .∧¬πi−1 )?; (πi :=l
⊤); U ,
N −1
0
– αG = βG ; γG
; . . . ; γG
,
3
4
In an a-circular rooted termgraph for every node n there is an i and there are a1 ,
. . . an such that a = a1 = an and nk is related to nk+1 by an edge labelled a, for all
k ≤ i.
Rooted termgraphs are termgraphs where the path obtained by following feature b
is longer than or equal to the path obtained by following feature a.
i
– for all non-negative integers i, if i < N then ψG
= if Ln (i) is defined then
n
hU i(πi ∧ L (i)) else ⊤,
– for all non-negative integers i, j, if i, j < N then χi,j
G = if there exists an
edge e ∈ E such that S(e) = i and T (e) = j then hU i(πi ∧ hLe (e)iπj ) else ⊤,
N −1,N −1
N −1
0
– φG = ψG
∧ . . . ∧ ψG
∧ χ0,0
.
G ∧ . . . ∧ χG
The reader may easily verify that for all finite rooted termgraphs
G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G′ |= hαG iφG iff there exists a graph homomorphism from G to G′ .
5
Definability of transformations of termgraphs
In this section we show how elementary actions over termgraphs as defined in
Section 2 can be encoded by means of formulas of the proposed modal logic. Let
αa be the action defined as follows:
– αa = (ω :=g ⊥); (ω :=l ⊤); (π :=g ⊥); (π :=g haiω); (a − (⊤, ω)); n; (ω :=g
⊥); (ω :=l ⊤); (a + (π, ω)).
The reader may easily verify that for all rooted termgraphs
G = (N , E, Ln , Le , S, T , n0 ) and G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→αa G′
iff G′ is obtained from G by redirecting every a-edge pointing to the current root
towards a freshly created new root. Hence, together with the update actions n,
n, ω :=g φ, ω :=l φ, a+ (φ, ψ) and a− (φ, ψ), the regular operations “;”, “∪” and
“⋆ ” enable us to define the elementary actions of node labelling, local redirection
and global redirection of Section 2. Let us firstly consider the elementary action
of node labelling: n : f (a1 ⇒ n1 , . . . , ak ⇒ nk ). Applying this elementary action
consists in redirecting towards nodes n1 , . . ., nk the targets of a1 -, . . ., ak - edges
starting from node n. It corresponds to the action nl(n : f (a1 ⇒ n1 , . . . , ak ⇒
nk )) defined as follows:
– nl(n : f (a1 ⇒ n1 , . . . , ak ⇒ nk )) = U ; πn ?; (f :=l ⊤); (a1 +(πn , πn1 )); . . . ; (ak +
(πn , πnk )).
where the πi ’s are as in the proof of Proposition 41. The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ), G′ =
(N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→nl(n:f (a1 ⇒n1 ,...,ak ⇒nk )) G′ iff G′ is obtained
from G by redirecting towards nodes n1 , . . ., nk the targets of a1 -, . . ., ak - edges
starting from node n. Let us secondly consider the elementary action of local
redirection: n ≫la m. Applying this elementary action consists in redirecting
towards node m the target of an a-edge starting from node n. It corresponds to
the action lr(n, a, m) defined as follows:
– lr(n, a, m) = (a − (πn , ⊤)); (a + (πn , πm )).
The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ),
G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→lr(n,a,m) G′ iff G′ is obtained from G by
redirecting towards node m the target of an a-edge starting from node n. Let us
thirdly consider the elementary action of global redirection: n ≫ga m. Applying
this elementary action consists in redirecting towards node n the target of every
a-edge pointing towards node m. It corresponds to the action gr(n, a, m) defined
as follows:
– gr(n, a, m) = (λa :=g ⊥); (λa :=g haiπn ); (a − (⊤, πn )); (a + (λa , πm )).
The reader may easily verify that for all rooted termgraphs G = (N , E, Ln , Le , S, T , n0 ),
G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G −→gr(n,a,m) G′ iff G′ is obtained from G by
redirecting towards node n the target of every a-edge pointing towards node m.
To redirect towards n the target of all edges pointing towards m, the action
V
gr(n, a, m).
gr(n, a, m) can be performed for all a ∈ F . We get gr(n, m) =
a∈F
6
Translating rewrite rules in modal logic
Now we are ready to show how termgraph rewriting can be specified by means
of formulas of the proposed modal logic.
Let G → (a1 , . . . , an ) be a rewrite rule as defined in Section 2, i.e., G =
(N , E, Ln , Le , S, T , n0 ) is a finite rooted termgraph and (a1 , . . . , an ) is a finite
sequence of elementary actions. We have seen how to associate to G a ⋆ -free
action αG and a ⋆ -free formula φG such that for all finite rooted termgraphs G′ =
(N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), G′ |= hαG iφG iff there exists a graph homomorphism
from G into G′ . We have also seen how to associate to the elementary actions a1 ,
. . ., an actions α1 , . . ., αn . In the following proposition we show how to formulate
the fact that a normal form with respect to a rewrite rule (generalization to a set
of rules is obvious) satisfies a given formula ϕ. A termgraph t is in normal form
with respect to a rule R iff t cannot be rewritten by means of R. Such formulation
may help to express proof obligations of programs specified as termgraph rewrite
rules. Let n1 , . . ., nk be the list of all nodes occurring in a1 , . . ., an but not
occurring in G. The truth of the matter is that
Proposition 61 Let ϕ be a modal formula. For all finite rooted termgraphs
G′ = (N ′ , E ′ , Ln ′ , Le ′ , S ′ , T ′ , n′0 ), every normal form of G′ with respect to G →
(a1 , . . . , an ) satisfies ϕ iff G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ).
Proof. ⇐: Suppose that G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ). Consider a normal form Gnf of
G′ with respect to G → (a1 , . . . , an ). Then there exists a non-negative integer k
and there exist finite rooted termgraphs G0 , . . ., Gk such that:
– G0 = G′ ,
– Gk = Gnf ,
– for all non-negative integers i, if i < k then Gi →G→(a1 ,...,an ) Gi+1 .
Hence, for all non-negative integers i, if i < k then
Gi −→αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn Gi+1 . Moreover,
seeing that Gnf is a normal form with respect to G → (a1 , . . . , an ), Gnf |=
[αG ; φG ?]⊥. Since G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ), then Gnf |= ϕ. Thus, every
normal form of G′ with respect to G → (a1 , . . . , an ) satisfies ϕ.
⇒: Suppose that every normal form of G′ with respect to G → (a1 , . . . , an )
satisfies ϕ. Let Gnf be a finite rooted termgraph such that
G′ −→(αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn )⋆ Gnf and Gnf
|= [αG ; φG ?]⊥. Then Gnf is a normal form of G′ with respect to G → (a1 , . . . , an ).
Hence, Gnf satisfies ϕ. Thus, G′ |= [(αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn )⋆ ]([αG ; φG ?]⊥ → ϕ).
In other respects, the following proposition shows how an invariant ϕ of a rewrite
rule can be expressed in the proposed logic.
Proposition 62 Let ϕ be a modal formula. The rewrite rule G → (a1 , . . . , an )
strongly preserves ϕ iff |= ϕ → [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ.
Proof. ⇐: Suppose that |= ϕ → [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ. Let G′ , G′′ be finite rooted termgraphs such that
G′ |= ϕ and G′ →G→(a1 ,...,an ) G′′ . Then G′ |= [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l
⊤); . . . ; n; (πnk :=g ⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ and
G′ −→αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn G′′ . Hence, G′′
|= ϕ. Thus, the rewrite rule G → (a1 , . . . , an ) strongly preserves ϕ.
⇒: Suppose that the rewrite rule G → (a1 , . . . , an ) strongly preserves ϕ. Let G′ ,
G′′ be finite rooted termgraphs such that G′ |= ϕ and
G′ −→αG ;φG ?;n;(πn1 :=g ⊥);(πn1 :=l ⊤);...;n;(πnk :=g ⊥);(πnk :=l ⊤);α1 ;...;αn G′′ . Then G′ →G→(a1 ,...,an )
G′′ and G′′ |= ϕ. Thus, |= ϕ → [αG ; φG ?; n; (πn1 :=g ⊥); (πn1 :=l ⊤); . . . ; n; (πnk :=g
⊥); (πnk :=l ⊤); α1 ; . . . ; αn ]ϕ.
7
Conclusion
We have defined a modal logic which can be used either (i) to describe datastructures which are possibly defined by means of pointers and considered as
termgraphs in this paper, (ii) to specify programs defined as rewrite rules which
process these data-structures or (iii) to reason about data-structures themselves
and about the behavior of the considered programs. The features of the proposed logic are very appealing. They contribute to define a logic which captures
faithfully the behavior of termgraph rewrite systems. They also open new perspectives for the verification of programs manipulating pointers.
Our logic is undecidable in general. This is not surprising at all with respect
to its expressive power. However, this logic is very promising in developing new
proof procedure regarding properties of termgraph rewrite systems. For instance,
we have discussed a first fragment of the logic, consisting of formulas without
relabelling actions, where validity is decidable. Future work include mainly the
investigation of new decidable fragments of our logic and their application to
program verification.
References
1. C. Areces, P. Blackburn, and M. Marx. A road-map on complexity for hybrid
logics. In J. Flum and M. Rodrı́guez-Artalejo, editors, Computer Science Logic,
number 1683 in LNCS, pages 307–321, Madrid, Spain, 1999. Springer. Proceedings
of the 8th Annual Conference of the EACSL, Madrid, September 1999.
2. C. Areces and B. ten Cate. Hybrid logics. In P. Blackburn, J. van Benthem, and
F. Wolter, editors, Handbook of Modal Logic, volume 3. Elsevier Science, 2006.
3. G. Aucher, P. Balbiani, L. Fariñas Del Cerro, and A. Herzig. Global and local
graph modifiers. Electronic Notes in Theoretical Computer Science (ENTCS),
Special issue “Proceedings of the 5th Workshop on Methods for Modalities (M4M5
2007)” , 231:293–307, 2009.
4. F. Baader and T. Nipkow. Term Rewriting and All That. Cambridge University
Press, 1998.
5. H. Barendregt, M. van Eekelen, J. Glauert, R. Kenneway, M. J. Plasmeijer, and
M. Sleep. Term graph rewriting. In PARLE’87, pages 141–158. Springer Verlag
LNCS 259, 1987.
6. R. Caferra, R. Echahed, and N. Peltier. A term-graph clausal logic: Completeness
and incompleteness results. Journal of Applied Non-classical Logics, 18:373–411,
2008.
7. R. Echahed. Inductively sequential term-graph rewrite systems. In 4th International Conference on Graph Transformations (ICGT), volume 5214 of Lecture
Notes in Computer Science, pages 84–98. Springer, 2008.
8. H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors. Handbook of Graph
Grammars and Computing by Graph Transformations, Volume 2: Applications,
Languages and Tools. World Scientific, 1999.
9. H. Ehrig, H.-J. Kreowski, U. Montanari, and G. Rozenberg, editors. Handbook of
Graph Grammars and Computing by Graph Transformations, Volume 3: Concurrency, Parallelism and Distribution. World Scientific, 1999.
10. D. Plump. Term graph rewriting. In H. Ehrig, G. Engels, H. J. Kreowski, and
G. Rozenberg, editors, Handbook of Graph Grammars and Computing by Graph
Transformation, volume 2, pages 3–61. World Scientific, 1999.
11. G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph
Transformations, Volume 1: Foundations. World Scientific, 1997.
12. J. Tiuryn. Fixed-points and algebras with infinitely long expression, part 1, regular
algebras. Fundamenta Informaticae, 2:103–127, 1978.
13. J. Tiuryn. Fixed-points and algebras with infinitely long expression, part 2, µclones of regular algebras. Fundamenta Informaticae, 2(3):317–335, 1979.
| 6cs.PL
|
A lattice in a residually non-Desarguesian Ã2-building
Nicolas Radu∗
arXiv:1602.00588v3 [math.GR] 12 Oct 2016
October 12, 2016
Abstract
We build a building of type Ã2 and a discrete group of automorphisms acting
simply transitively on its set of vertices. The characteristic feature of this building
is that its rank 2 residues are isomorphic to the Hughes projective plane of order 9,
which is non-Desarguesian. This solves a problem asked by W. Kantor in 1986, as
well as a question asked by J. Howie in 1989.
Contents
1 Introduction
2
2 Previous work on the subject
2.1 Point-line correspondences and triangle presentations . . . . . . . . . . . . .
2.2 Building associated to a triangle presentation . . . . . . . . . . . . . . . . .
3
3
5
3 The
3.1
3.2
3.3
3.4
3.5
3.6
strategy
The graph associated to a point-line correspondence . .
The score of a point-line correspondence . . . . . . . . .
Scores of correlations . . . . . . . . . . . . . . . . . . . .
Estimated score for a general point-line correspondence
Scores in the Hughes plane of order 9 . . . . . . . . . . .
Improving a point-line correspondence . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5
6
7
8
10
11
12
4 The
4.1
4.2
4.3
4.4
4.5
building and its lattice
Description . . . . . . . . . . . . .
Torsion in ΓT . . . . . . . . . . . .
A perfect subgroup of ΓT . . . . .
Partition of ∆T into sub-buildings
Automorphism group of ∆T . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
13
14
15
15
15
16
∗
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2010 Mathematics Subject Classification: 51E24 (primary), 20F65, 22E40, 51A35 (secondary)
F.R.S.-FNRS Research Fellow.
1
A The Hughes plane of order 9
18
B The triangle presentation
19
1
Introduction
An Ã2 -building can be characterized as a simply connected simplicial complex of dimension 2 such that all simplicial spheres of radius 1 around vertices are isomorphic to the
incidence graph of a projective plane. Given an Ã2 -building, we will call these projective
planes the residue planes of the building.
The residue planes of an Ã2 -building associated to an algebraic group are always
Desarguesian. On the other hand, the existence of locally finite Ã2 -buildings with nonDesarguesian residue planes has been known since 1986. M. Ronan indeed gave in [Ron86]
a general construction affording all possible Ã2 -buildings and from which it is clear that
any projective plane can appear in an Ã2 -building. However, this point of view does not
provide any information on the automorphism groups of the buildings. A natural problem
which was asked by W. Kantor in [Kan86, Page 124] is therefore the following.1
Problem (Kantor, 1986). Construct an Ã2 -building ∆ with finite non-Desarguesian residue
planes and admitting a cocompact lattice, i.e. a group Γ ≤ Aut(∆) with finite vertex stabilizers and such that Γ\∆ is compact.
Independently, J. Howie also asked the next more specific question [How89, Question 6.12].2
Question (Howie, 1989). Does there exist a group acting simply transitively and by typerotating automorphisms (as defined in Theorem 1.1 (3) below) on the vertices of an Ã2 building whose residue planes are non-Desarguesian?
Some constructions in [VM87] and [BP07] yield Ã2 -buildings with exotic residues, but
without any lattice (or, as the case may be, without information on its possible existence).
In this paper, we solve the above problem and question by proving the following.
Theorem 1.1. There exist an Ã2 -building ∆ and a group Γ ≤ Aut(∆) satisfying the
following properties:
(1) All residue planes of ∆ are isomorphic to the Hughes plane of order 9.3
1
The original statement is “Construct finite Ã2 -SCABs with non-Desarguesian residues” and is equivalent to ours. See §2.2 for the definition of Ã2 -SCABs.
2
The original question is “Is there a special presentation with star graph isomorphic to the incidence
graph of a finite non-Desarguesian projective plane?”. As mentioned in [EV10], the notion of a special
presentation from [How89] is equivalent to the notion of a triangle presentation from [CMSZ93a] (see
§2 below for the definition of a triangle presentation). The latter is in turn related to Ã2 -buildings, as
explained in §2.
3
The Hughes plane of order 9 was actually first constructed by O. Veblen and J. Wedderburn in
1907, see [VW07]. This was the first discovered finite non-Desarguesian projective plane, and the role
of D. Hughes in [Hug57] has been to generalize their construction to get an infinite family of finite nonDesarguesian planes (with order p2n for p an odd prime).
2
(2) The group Γ acts simply transitively on the set of vertices of ∆.
(3) Each element of Γ is type-rotating, i.e. its induced action σ on the set of types of
vertices {0, 1, 2} satisfies σ(i) = i + c mod 3 for some c.
(4) The index 3 subgroup Γ0 of Γ consisting of the type-preserving automorphisms is
torsion-free.
.
(5) The derived subgroup [Γ, Γ] of Γ is perfect and Γ [Γ, Γ] ∼
= C2 × C3 .
(6) There exists an infinite family {∆n0 }n of disjoint isomorphic sub-buildings of ∆ whose
residue planes are isomorphic to PG(2, 3) and such that each vertex of ∆ is contained
in (exactly) one sub-building ∆n0 .
(7) The stabilizer of a vertex in Aut(∆) has order 96, i.e. [Aut(∆) : Γ] = 96. In
particular, Aut(∆) equipped with the topology of pointwise convergence is discrete.
Moreover, as any unimodular locally compact group acting continuously, properly and
cocompactly on an Ã2 -building, Γ satisfies Kazhdan’s Property (T) (see [BdlHV08, Theorem 5.7.7]). Groups with Property (T) are deeply studied in [BdlHV08].
Acknowledgements
I thank Pierre-Emmanuel Caprace for suggesting me this problem and for all his precious
advice during the writing of this paper. I am also very grateful to Tim Steger for his
interest in this work and for sharing some of his unpublished codes that helped in describing
the full automorphism group of the discovered building. I finally want to thank Donald
Cartwright and William Kantor for their comments on a previous version of this text, and
Alina Vdovina for making me realize that I had answered a question of Howie.
2
Previous work on the subject
In [CMSZ93a], Cartwright, Mantero, Steger and Zappa were interested in groups acting
simply transitively on the vertices of an Ã2 -building. We will make great use of their work
and give in this section the essential definitions and results.
2.1
Point-line correspondences and triangle presentations
For our needs, the most important definition from [CMSZ93a] is the following.
Definition 2.1. Let P and L be the sets of points and lines respectively in a projective
plane Π. A bijection λ : P → L is called a point-line correspondence in Π. A subset
T ⊆ P 3 is then called a triangle presentation compatible with λ if the two following
conditions hold:
3
1. For all x, y ∈ P , there exists z ∈ P such that (x, y, z) ∈ T if and only if y ∈ λ(x) in
Π. In this case, z is unique.
2. If (x, y, z) ∈ T , then (y, z, x) ∈ T .
Example 2.2. The projective plane PG(2, 2) can be defined by P = L = Z /7 Z with line
x ∈ L being adjacent to the points x + 1, x + 2 and x + 4 in P . Consider the point-line
correspondence λ : P → L : x ∈ P 7→ x ∈ L in Π. Then
T := {(x, x + 1, x + 3), (x + 1, x + 3, x), (x + 3, x, x + 1) | x ∈ P }
is a triangle presentation compatible with λ. Indeed, (ii) is obviously satisfied and, for
x, y ∈ P , it is apparent that there exists (a unique) z ∈ P such that (x, y, z) ∈ T if and
only if y ∈ {x + 1, x + 2, x + 4}, which is exactly the set of points on the line λ(x).
Now suppose we have an Ã2 -building ∆ and a group Γ ≤ Aut(∆) acting simply transitively on V (∆), where V (∆) is the set of vertices of ∆. We make the further assumption
that Γ only contains type-rotating automorphisms, as defined in Theorem 1.1 (3). In this
context, the following theorem shows how one can associate to Γ a point-line correspondence and a triangle presentation compatible with it.
Theorem 2.3 (Cartwright–Mantero–Steger–Zappa). Let Γ ≤ Aut(∆) be a group of typerotating automorphisms of an Ã2 -building which acts simply transitively on V (∆). Let P
(resp. L) be the set of neighbors of type 1 (resp. 2) of a fixed vertex v0 of type 0, and
denote by Π the residue plane at v (with P and L as sets of points and lines). For each
x ∈ P , let gx be the unique element of Γ such that gx (v0 ) = x. Then there exist a point-line
correspondence λ : P → L in Π and a triangle presentation T compatible with λ such that
Γ has the following presentation:
Γ = h{gx }x∈P | gx gy gz = 1 for each (x, y, z) ∈ T i.
Proof. See [CMSZ93a, Theorem 3.1].
What makes triangle presentations really interesting is the fact that a reciprocal result
exists. Given a projective plane Π, a point-line correspondence λ : P → L in Π and
a triangle presentation compatible with λ, one can construct an Ã2 -building ∆ locally
isomorphic to Π and a group acting simply transitively on V (∆).
Theorem 2.4 (Cartwright–Mantero–Steger–Zappa). Let P and L be the sets of points
and lines in a projective plane Π, let λ : P → L be a point-line correspondence in Π and
let T be a triangle presentation compatible with λ. Define
ΓT := h{ax }x∈P | ax ay az = 1 for each (x, y, z) ∈ T i,
where {ax }x∈P are distinct letters. Then there exists an Ã2 -building ∆T whose residue
planes are isomorphic to Π and such that ΓT acts simply transitively on V (∆T ), by typerotating automorphisms.
4
Proof. See [CMSZ93a, Theorem 3.4], or §2.2 below.
Example 2.5. From Example 2.2 and Theorem 2.4, we get an Ã2 -building ∆ whose
residue planes are isomorphic to PG(2, 2) and a group acting simply transitively on the
set of vertices of ∆. The building ∆ is actually the Bruhat-Tits building associated to
PGL(3, F2 ((X))) (see [CMSZ93b, Section 4] and [CMSZ93a, Theorem 4.1]).
2.2
Building associated to a triangle presentation
In [CMSZ93a, Theorem 3.4], the authors gave an explicit construction of the Ã2 -building
∆T associated to a triangle presentation T (see Theorem 2.4 above). In this section we
show a geometric way to construct ∆T and ΓT . The following discussion can also be seen
as an alternative proof of Theorem 2.4.
Following [Kan86], an Ã2 -SCAB is a connected chamber system of rank 3 whose
residues of rank 2 are generalized 3-gons (i.e. incidence graphs of projective planes). We
will always think of an Ã2 -SCAB as a set of triangles, representing the chambers, glued
together so that two chambers are adjacent if and only if they share an edge.
Suppose we are given a point-line correspondence λ : P → L in a projective plane Π
and a triangle presentation T compatible with λ. Let us first define a finite Ã2 -SCAB
CT as follows. Consider three vertices v1 , v2 , v3 : those will be the only vertices of CT .
Then, for each x ∈ P , put an edge ex between v1 and v2 , an edge e′x between v2 and v3
and an edge e′′x between v3 and v1 . Finally, for each (x, y, z) ∈ T , attach a triangle to the
three edges ex , e′y and e′′z . One readily checks that the definition of a triangle presentation
ensures that the three rank 2 residues of CT are incidence graphs of the projective plane
Π, and hence that CT is indeed an Ã2 -SCAB. Note that CT is not a simplicial complex in
the usual sense as all simplices of dimension 2 have the same three vertices.
We then consider the universal covering Ã2 -SCAB C˜T of CT , as defined in [Kan86,
Definition B.3.3, Proposition B.3.4]. This universal covering C˜T is a simply connected
simplicial complex of dimension 2 whose simplicial spheres of radius 1 are isomorphic to
the incidence graph of Π, so it is an Ã2 -building (see [Kan86, Theorem B.3.8] for a more
rigorous proof of this fact). We therefore set ∆T := C˜T . Moreover, because of (2) in
Definition 2.1, there is an automorphism α ∈ Aut(CT ) sending ex to e′x , e′x to e′′x and e′′x
to ex for each x ∈ P . In other words, there is a natural action of the group C3 of order 3
on CT . This automorphism group C3 then lifts to an automorphism group C̃3 of ∆T
(see [Kan86, Corollary B.3.7]), and C̃3 acts simply transitively on the set of vertices of
∆T (and by type-rotating automorphisms). The group ΓT can thus be taken to be C̃3 .
The presentation of ΓT given in Theorem 2.4 can finally be found by applying Theorem 2.3
to ΓT ≤ Aut(∆T ).
3
The strategy
A way to construct an Ã2 -building with non-Desarguesian residues and admitting a lattice
is, in view of Theorem 2.4, to consider a non-Desarguesian projective plane Π and to find
a point-line correspondence in Π and a triangle presentation compatible with it. The
5
smallest non-Desarguesian projective planes are the Hughes plane of order 9, the Hall
plane of order 9 and the dual of the Hall plane. The Hughes plane is self-dual, so there
exist some natural point-line correspondences in it: the correlations (also called dualities).
For this reason, we decided to work on the Hughes plane of order 9. It will appear later
that the correlations do not actually admit a triangle presentation, but they will still be
helpful in our search for a suitable point-line correspondence.
For each Desarguesian projective plane, Cartwright-Mantero-Steger-Zappa gave in
[CMSZ93a, §4] an explicit formula for one point-line correspondence admitting a triangle
presentation. Of course, they use the finite field from which the projective plane is constructed, and it is not clear how to find a similar formula for a particular non-Desarguesian
projective plane.
Since we are searching for purely combinatorial objects, the use of a computer could be
considered. In [CMSZ93b], the authors used a computer to find all triangle presentations
in the projective planes of order 2 and 3. The number of points in these projective planes
being not too large (i.e. 7 and 13), they could do a brute-force computation. However,
already for order 3 they needed to use some symmetries of the problem so as to reduce the
search space. Even if computers are now more powerful than in the 1990s, such a method
would still be far too slow for a projective plane of order 9.
The key point is that we are not searching for all triangle presentations in the Hughes
plane: we only want to find one. In this section, we describe our strategy in order to do so.
3.1
The graph associated to a point-line correspondence
In the context of triangle presentations, it is natural to associate a particular graph to
each point-line correspondence λ : P → L of a projective plane Π.
Definition 3.1. Let λ : P → L be a point-line correspondence in a projective plane Π.
The graph Gλ associated to λ is the directed graph with vertex set V (Gλ ) := P and
edge set E(Gλ ) := {(x, y) ∈ P 2 | y ∈ λ(x)}.
For λ, admitting a triangle presentation can now be rephrased as a condition on its
associated graph Gλ . In order to state this reformulation, we first define what we will call
a triangle in a directed graph.
Definition 3.2. Let G be a directed graph. A set {e1 , e2 , e3 } of edges in G such that the
destination vertex of e1 (resp. e2 and e3 ) is the origin vertex of e2 (resp. e3 and e1 ) is
called a triangle. If two of the three edges e1 , e2 and e3 are equal, then they are all equal.
In this case, the triangle contains only one edge and is also called a loop.
The next definition will also be convenient.
Definition 3.3. Let λ : P → L be a point-line correspondence in a projective plane Π. A
triple (x, y, z) ∈ P 3 is called λ-admissible if y ∈ λ(x), z ∈ λ(y) and x ∈ λ(z).
By definition, a triangle presentation compatible with λ only contains λ-admissible
triples. Thanks to these definitions, there is now an obvious bijection between triangles
6
of Gλ and (triples of) λ-admissible triples. Indeed, for x, y, z ∈ P , (x, y, z) is λ-admissible
if and only if there is a triangle {e1 , e2 , e3 } in Gλ with x, y and z being the origins of e1 ,
e2 and e3 respectively. Note that the triangle {e1 , e2 , e3 } then corresponds to the three
λ-admissible triples (x, y, z), (y, z, x) and (z, x, y) (which are equal when x = y = z, i.e.
when e1 = e2 = e3 or equivalently when the triangle is a loop).
This observation directly gives us the next result.
Lemma 3.4. Let λ : P → L be a point-line correspondence in a projective plane Π. There
exists a triangle presentation compatible with λ if and only if there exists a partition of
the set of edges E(Gλ ) of Gλ into triangles.
Proof. Via the above bijection, a partition of E(Gλ ) into triangles exactly corresponds to
a triangle presentation compatible with λ.
3.2
The score of a point-line correspondence
Most point-line correspondences λ in a projective plane do not admit a triangle presentation, i.e. the set of edges E(Gλ ) of the graph Gλ can generally not be partitioned into
triangles. We would still like to measure if a correspondence λ is “far from admitting”
a triangle presentation or not. We therefore introduce the notion of a triangle partial
presentation compatible with λ.
Definition 3.5. Let λ : P → L be a point-line correspondence in a projective plane Π. A
subset T ⊆ P 3 is called a triangle partial presentation compatible with λ if the two
following conditions hold:
(1) For all x, y ∈ P , if there exists z ∈ P such that (x, y, z) ∈ T then y ∈ λ(x) and z is
unique.
(2) If (x, y, z) ∈ T , then (y, z, x) ∈ T .
We directly have the following.
Lemma 3.6. Let λ : P → L be a point-line correspondence in a projective plane Π of
order q. A subset T ⊆ P 3 is a triangle presentation compatible with λ if and only if it is
a triangle partial presentation compatible with λ and |T | = (q + 1)(q 2 + q + 1).
Proof. This is clear from the definitions, since there are exactly (q + 1)(q 2 + q + 1) pairs
(x, y) ∈ P 2 with y ∈ λ(x).
We now define the score of a point-line correspondence as follows.
Definition 3.7. Let λ : P → L be a point-line correspondence in a projective plane Π of
order q. The score S(λ) of λ is the greatest possible size of a triangle partial presentation
compatible with λ.
Thanks to the bijection between triangles of Gλ and (triples of) λ-admissible triples
(see §3.1), we can restate this definition in the following terms.
7
Definition 3.8. Let λ : P → L be a point-line correspondence in a projective plane Π of
order q. The score S(λ) of λ is the maximal number of edges of Gλ that can be covered
with disjoint triangles.
A point-line correspondence then admits a triangle presentation if and only if its score
reaches the maximal theoretical value (q + 1)(q 2 + q + 1).
Lemma 3.9. Let λ : P → L be a point-line correspondence in a projective plane Π of
order q. There exists a triangle presentation compatible with λ if and only if S(λ) =
(q + 1)(q 2 + q + 1).
Proof. This follows from Lemma 3.6.
3.3
Scores of correlations
When λ : P → L, L → P is a correlation of a (self-dual) projective plane Π of order q,
i.e. a map such that λ(p) ∋ λ(ℓ) if and only if p ∈ ℓ, there is an explicit formula for the
score of the point-line correspondence λ : P → L.
Proposition 3.10. Let λ : P → L, L → P be a correlation in a projective plane Π of
order q. Let a(λ) be the number of points p ∈ P such that λ3 (p) ∋ p and let b(λ) be the
number of points p ∈ P such that λ3 (p) ∋ p and λ6 (p) = p. Then
S(λ) = (q + 1)(q 2 + q + 1) − (2q − 3) · a(λ) − b(λ).
Proof. For fixed x, y ∈ P with y ∈ λ(x) (i.e. (x, y) is an edge of Gλ ), a point z ∈ P
is such that (x, y, z) is λ-admissible if and only if z ∈ λ(y) ∩ λ−1 (x). We call the edge
(x, y) unpopular if λ(y) 6= λ−1 (x) and popular if λ(y) = λ−1 (x). This means that an
unpopular edge of Gλ is contained in exactly one triangle while a popular edge is contained
in exactly (q + 1) triangles.
(i) There are exactly a(λ) popular edges in Gλ .
Proof: By definition, (x, y) is popular if y = λ−2 (x), so a vertex x ∈ P is the origin
of a (unique) popular edge if and only if λ−2 (x) ∈ λ(x), i.e. x ∈ λ3 (x). There are
exactly a(λ) such x and hence a(λ) popular edges.
(ii) There are exactly (q + 1)(q 2 + q + 1) + q · a(λ) λ-admissible triples.
Proof: By (i), there are (q + 1)(q 2 + q + 1) − a(λ) unpopular edges and a(λ) popular
edges in Gλ . As each unpopular edge (resp. popular edge) is the beginning of one
(resp. (q + 1)) λ-admissible triple(s), we get
[(q + 1)(q 2 + q + 1) − a(λ)] · 1 + a(λ) · (q + 1)
λ-admissible triples.
(iii) There are exactly (q + 1) · a(λ) λ-admissible triples (x, y, z) with (x, y) popular (resp.
(y, z) popular, (z, x) popular).
Proof: There are a(λ) popular edges by (i), each one being the beginning of (q + 1)
λ-admissible triples.
8
(iv) There are exactly a(λ) λ-admissible triples (x, y, z) with (x, y) and (y, z) popular
(resp. (y, z) and (z, x) popular, (z, x) and (x, y) popular).
Proof: If (x, y, z) is λ-admissible with (x, y) and (y, z) popular, then y = λ−2 (x), z =
λ−2 (y) and x ∈ λ3 (x). Moreover, these conditions are sufficient to be λ-admissible
with (x, y) and (y, z) popular. Since there are a(λ) points x such that x ∈ λ3 (x),
there are exactly a(λ) such triples.
(v) There are exactly b(λ) λ-admissible triples (x, y, z) with (x, y), (y, z) and (z, x) popular.
Proof: Such triples satisfy x ∈ λ3 (x), y = λ−2 (x), z = λ−2 (y) and x = λ−2 (z), so in
particular x = λ6 (x). Moreover, if x ∈ λ3 (x) and x = λ6 (x), then (x, λ−2 (x), λ−4 (x))
is λ-admissible with three popular edges, so there are exactly b(λ) such triples.
(vi) There are exactly (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) λ-admissible triples (x, y, z)
with (x, y), (y, z) and (z, x) unpopular.
Proof: By the inclusion-exclusion principle, the number of such triples is
[(q + 1)(q 2 + q + 1) + q · a(λ)] − 3(q + 1) · a(λ) + 3 · a(λ) − b(λ).
We now prove that S(λ) ≤ (q + 1)(q 2 + q + 1) − (2q − 3) · a(λ) − b(λ). Let T be a triangle
partial presentation with |T | = S(λ), i.e. a set of disjoint triangles of Gλ covering S(λ)
edges. By maximality, all λ-admissible triples (i.e. triangles) (x, y, z) with (x, y), (y, z) and
(z, x) unpopular are in T (because each of these 3 edges is only covered by this particular
triangle). By (vi), this means we already have (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) triples in
T . The other triangles in T all contain at least one popular edge. There are a(λ) popular
edges (by (i)), so we obtain
S(λ) ≤ (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) + 3 · a(λ).
Let us now show that S(λ) ≥ (q + 1)(q 2 + q + 1) − (2q − 3) · a(λ) − b(λ), by covering
that number of edges of Gλ with disjoint triangles. We first cover exactly (q + 1)(q 2 + q +
1) − 2q · a(λ) − b(λ) edges of Gλ thanks to the triangles only containing unpopular edges.
By definition of an unpopular edge, these triangles are all disjoint. Now, for each popular
edge (x, y), there are (q + 1) values of z such that (x, y, z) is λ-admissible. Among these
(q + 1) ≥ 3 values of z, choose z0 different from λ−2 (y) and λ2 (x). In this way, (y, z0 ) and
(z0 , x) are unpopular. We then add the triangle (x, y, z0 ) to our covering. This triangle
is not a loop since (x, y) is popular and (y, z) is unpopular, so it covers three new edges.
Doing so for each popular edge (x, y), we cover 3 · a(λ) new edges and get
S(λ) ≥ (q + 1)(q 2 + q + 1) − 2q · a(λ) − b(λ) + 3 · a(λ).
It follows from Proposition 3.10 that a correlation λ admits a triangle presentation if
and only if λ3 sends no point to an adjacent line. However, the following nice result of
Devillers, Parkinson and Van Maldeghem shows that this never happens.
Theorem 3.11 (Devillers–Parkinson–Van Maldeghem). Let λ : P → L, L → P be a
correlation in a finite projective plane Π. Then there exists p ∈ P such that p ∈ λ(p).
9
Proof. See [DPVM13, Proposition 5.4]. The case of polarities (i.e. correlations which are
involutions) goes back to [Bae46].
Corollary 3.12. Let λ : P → L, L → P be a correlation in a finite projective plane Π.
Then there is no triangle presentation compatible with λ.
Proof. Applying Theorem 3.11 to the correlation λ3 , we get a(λ) > 0 and hence S(λ) <
(q + 1)(q 2 + q + 1) by Proposition 3.10. The conclusion then follows from Lemma 3.9.
Remark 3.13. In the semifield plane of order 16 and with kernel GF(4), we could observe
a correlation λ such that a(λ) = b(λ) = 1. This means that there is exactly one point p
of the plane such that p ∈ λ3 (p). The score of this correlation λ is thus S(λ) = 4611, the
maximal theoretical score being (16 + 1)(162 + 16 + 1) = 4641.
3.4
Estimated score for a general point-line correspondence
It does not seem possible to get a general formula for the score of all point-line correspondences. One can however obtain (good) lower bounds for the score, simply by trying to
cover the most possible edges of Gλ with triangles. There are different algorithms that
could be used. Our principal goal being to know whether E(Gλ ) admits a partition into
triangles, we should design an algorithm that will find such a partition when it exists.
The idea is simple: if an edge of Gλ is not yet covered and if there is only one triangle
containing this edge and disjoint from the already chosen ones, then this triangle must be
part of the (possible) partition. Our algorithm to cover as many edges as we can in Gλ is
thus the following:
While there exists e ∈ E(Gλ ) such that there is a unique triangle t in Gλ containing e,
choose this triangle t, remove the edge(s) of t from Gλ and start again this procedure.
If, at the end, there is no more triangles in Gλ , then we say that the score-algorithm
succeeds and that the estimated score s(λ) of λ is the number of edges that
are covered by the chosen triangles. Otherwise, there still are triangles in Gλ but
all edges are contained in 0 or at least 2 triangles. In this case, we say that the
score-algorithm fails. For a pseudo-code, see Algorithm 1.
One should note that the value of s(λ) (and whether the score-algorithm succeeds or
not) may depend on the choice made for e ∈ E(Gλ ) at each step. We will still talk about
the estimated score s(λ) of λ, assuming that an order is fixed once and for all on the set
E(Gλ ) for each λ.
Lemma 3.14. Let λ : P → L be a point-line correspondence in a projective plane Π of
order q. Assume that the score-algorithm succeeds. Then s(λ) ≤ S(λ) and, if S(λ) =
(q + 1)(q 2 + q + 1), then s(λ) = (q + 1)(q 2 + q + 1).
Proof. This follows from the discussion in the description of the algorithm.
10
Algorithm 1: Computing the estimated score s(λ) of λ
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
score ← 0;
edgesInOneTriangle ← true;
while edgesInOneTriangle = true do
edgesInOneTriangle ← f alse;
for e in E(Gλ ) do
if e is contained in exactly one triangle t of Gλ then
edgesInOneTriangle ← true;
remove the edge(s) of t from E(Gλ );
if t is a loop then
score ← score + 1;
else
score ← score + 3;
if there still are triangles in Gλ then
return FAIL
else
return score
When the score-algorithm fails, it cannot conclude whether there exists a partition
of E(Gλ ) into triangles. Actually, we never encountered a point-line correspondence for
which the algorithm fails for the Hughes plane of order 9. We therefore did not need to
treat this particular case. Note however that, for a Desarguesian plane, we are aware of
some point-line correspondences for which the algorithm fails and which indeed admit a
triangle presentation, so this case should not in general be forgotten.
3.5
Scores in the Hughes plane of order 9
By Corollary 3.12, we know that a correlation never reaches the score of (q + 1)(q 2 + q + 1).
A naive approach to find a point-line correspondence of the Hughes plane of order 9 with
a score of (9 + 1)(92 + 9 + 1) = 910 is to simply evaluate s(λ) for a lot of random
correspondences λ and to cross one’s fingers. This idea is however not successful at all.
Indeed, we computed the estimated score of 100000 random point-line correspondences
and got, on average, an estimated score of 486.6 (with a standard deviation of 17.3). The
best estimated score we could observe was only 561, very far from 910.
Compared with these pretty low values, the formula given by Proposition 3.10 for
correlations seems to give better scores. In the Hughes plane of order 9, there are 33696
correlations. Their scores, computed thanks to Proposition 3.10, are given in Table 3.1.
Note that, as soon as two correlations λ and λ′ are conjugate (in the sense that λ = αλ′ α−1
for some automorphism α of the plane), we have a(λ) = a(λ′ ), b(λ) = b(λ′ ) and S(λ) =
S(λ′ ). (Actually, Gλ and Gλ′ are isomorphic.)
We also computed the estimated scores of all these correlations: they are also given
11
# of concerned λ
6318
4212
6318
4212
6318
6318
a(λ)
4
10
10
16
16
22
b(λ)
4
2
10
0
16
22
S(λ)
846
758
750
670
654
558
s(λ) (mean)
846.00
757.97
750.00
669.92
654.00
558.00
Table 3.1: Scores of the correlations of the Hughes plane of order 9.
in Table 3.1. They show that, at least for correlations, the estimated score is almost
always equal to the real score. As expected, correlations have higher estimated scores
than random point-line correspondences: they reach 846. This fact will be helpful for our
final strategy to find a correspondence with score 910, described in the next subsection.
3.6
Improving a point-line correspondence
In order to find a point-line correspondence with a score greater than what we already
obtained, it is natural to try to slightly modify a point-line correspondence with a high
score. The smallest change we can make is to swap the images of two points. The next
lemma shows that the score function is somewhat continuous.
Lemma 3.15. Let λ : P → L be a point-line correspondence in a projective plane Π of
order q and let a, b ∈ P . Define λa,b : P → L by λa,b (x) := λ(x) for all x ∈ P \ {a, b},
λa,b (a) := λ(b) and λa,b (b) := λ(a). Then |S(λa,b ) − S(λ)| ≤ 6(q + 1).
Proof. The graph Gλa,b can be obtained from Gλ by deleting the edges having a or b
as origin and replacing them by other edges. In total, 2(q + 1) edges are deleted and
2(q + 1) edges are added. Since a triangle contains at most 3 edges, we directly deduce
that |S(λa,b ) − S(λ)| ≤ 6(q + 1).
In Lemma 3.15, it is even reasonable to think that |S(λa,b ) − S(λ)| will often be much
smaller than 6(q + 1). In other words, the score should not vary too much when replacing
λ by λa,b , and we can in general hope to have S(λa,b ) > S(λ) for some a, b ∈ P .
Based on this observation, our idea is simple. Start with a correlation λ, whose score is
known to be higher than for a random correspondence (see §3.5). For all distinct a, b ∈ P ,
consider λa,b (as defined above) and compute its estimated score s(λa,b ). Then choose
ã, b̃ ∈ P such that s(λã,b̃ ) = max{s(λa,b ) | a, b ∈ P }. Now replace λ by λã,b̃ and start this
procedure again! We just need to keep track of the correspondences we already tried so as
to avoid being blocked in a local maximum of the score function. This idea is explained
in Algorithm 2. If after some time the algorithm does not seem able to produce a score of
910, then we stop it and start it again from another correlation.
This procedure is pretty slow: with our implementation, one step (i.e. computing
s(λa,b ) for all a, b ∈ P so as to find ã and b̃) takes ∼1.25 seconds. For this reason and
because we could still not reach 910, we have decided not to try all possible pairs a, b ∈ P .
12
Algorithm 2: Finding a point-line correspondence λ with s(λ) = 910
1
2
3
4
5
6
7
8
9
10
11
12
λ ← some correlation of the Hughes plane;
while s(λ) < 910 do
visited[λ] ← true;
bestA ← −1; bestB ← −1;
bestScore ← −1;
for a in P and b in P do
if visited[λa,b ] = false and s(λa,b ) > bestScore then
bestScore ← s(λa,b );
bestA ← a;
bestB ← b;
λ ← λbestA,bestB ;
return λ;
Instead, we can observe which points seem to be the worst, where the badness of p ∈ P is
the number of edges containing p in Gλ which were not covered by a triangle in Algorithm 1.
Then, it is natural to only try the pairs a, b ∈ P where a is one of the worst points (for
instance the 5 worst points) and b is arbitrary. Obviously, with this change Algorithm 2
does not visit the same correspondences as before, but it has the advantage that a step
only takes ∼0.13 seconds.
After three weeks of slight changes in the algorithm (e.g. the definition of a bad point,
the number of worst points we consider, the condition under which we stop and start with
another correlation, etc), the computer eventually shouted (at least wrote) victory. The
starting correlation had a score equal to 750, and the evolution of the estimated score
until 910 is shown in Figure 1.
Remark 3.16. The last change we made to the algorithm before it could solve the problem
was actually mistaken! Whereas we wanted to speed up the computation of the five worst
points, we made an error in the implementation of that idea resulting in the fact that the
five computed points were actually not the worst ones. This mistake still led us to the
discovery of a (valid) point-line correspondence λ with a score of 910. The funny part of
the story is that if we correct this implementation error and start the algorithm with the
same correlation, then it misses the correspondence λ.
4
The building and its lattice
In this section, we first give the description of the building and the lattice that we discovered (see Section 3 for the methods we used). We then give various properties of these
objects (i.e. we prove (4), (5), (6) and (7) in Theorem 1.1).
13
910
Estimated score
865
820
775
730
0
50
Step
100
150
Figure 1: Evolution of the estimated score with Algorithm 2.
4.1
Description
The structure of the Hughes plane of order 9 is given in Table A.1 and comes from [GEM].
Points and lines are numbered from 0 to 90 (let us call them p0 , . . . , p90 and ℓ0 , . . . , ℓ90 ),
and the nth row (with 0 ≤ n ≤ 90) gives the indices of the 10 points incident to ℓn .
The reader may be skeptical that the structure of incidence Π defined by these point-line
incidences is indeed the Hughes plane, but this is not so hard to verify by analyzing its
properties. It is at least really easy to implement a program checking that Π satisfies the
axioms of a projective plane. Moreover, we can see by hand that Π is not Desarguesian.
For instance, consider the triangle T1 with points {p1 , p10 , p34 } and the triangle T2 with
points {p2 , p11 , p35 }. The lines of T1 are {ℓ10 , ℓ20 , ℓ11 } and the lines of T2 are {ℓ27 , ℓ35 , ℓ19 }.
Now the line passing through the points {p1 , p2 } (resp. {p10 , p11 } and {p34 , p35 }) is ℓ0
(resp. ℓ1 and ℓ2 ), and these three lines intersect in p0 . On the other hand, the common
point of the lines {ℓ10 , ℓ27 } (resp. {ℓ20 , ℓ35 } and {ℓ11 , ℓ19 }) is p19 (resp. p66 and p42 ), and
these three points do not lie on a common line (the line through {p19 , p66 } is ℓ48 , which
does not contain p42 ). This shows that Desargues’ theorem is not satisfied in Π. Moreover,
our computations show that Π is self-dual (since there are correlations), so it can only be
the Hughes plane (see, for instance, [LKT91]).
Relative to this numbering of points and lines, the point-line correspondence λ : P → L
which we have found is given in Table B.1. For the image of p10x+y by λ, one should look
at the intersection of rows x and y. The triangle presentation T compatible with λ is
then given in Table B.2. In this table, the appearance of (x, y, z) means that (x, y, z),
(y, z, x) and (z, x, y) all belong to T . There are, in Table B.2, 298 triples (x, y, z) with
14
x, y, z not all equal and 16 triples (x, x, x), which means that T contains 298 · 3 + 16 = 910
elements as required. While a computer helped to find T , it can once again be checked
by hand (or with a trivial program) that T is indeed a triangle presentation compatible
with λ. Indeed, one only needs to check that for each (x, y, z) ∈ T , the line λ(x) contains
y and there exists no z ′ 6= z such that (x, y, z ′ ) ∈ T . This suffices to show that T is a
triangle presentation compatible with λ, since |T | = 910.
It follows from Theorem 2.4 that the building ∆T and the group ΓT ≤ Aut(∆T ) satisfy
(1), (2) and (3) in Theorem 1.1. In the next four subsections we prove (4), (5), (6) and (7).
4.2
Torsion in ΓT
The group ΓT has elements of order 3: when (x, x, x) ∈ T for some x ∈ P , we have
the relation a3x = 1 in the presentation of ΓT . However, the subgroup Γ0T of ΓT consisting of the type-preserving automorphisms is torsion-free. Indeed, let γ be a torsion
element of Γ0T , say of order n. If v0 is a fixed vertex of ∆T , then γ stabilizes the set
{v0 , γ(v0 ), γ 2 (v0 ), . . . , γ n−1 (v0 )}. By [BT72, Proposition 3.2.4], γ must fix a point of ∆T ,
i.e. it stabilizes a simplex of ∆T . Since γ preserves the types, it fixes this simplex pointwise and thus fixes its vertices. But Γ0T acts freely on the set of vertices of ∆T , so γ must
be the identity element.
4.3
A perfect subgroup of ΓT
Clearly, Γ0T is a normal subgroup of index 3 of ΓT . We find that ΓT also has a subgroup of
index 2. Indeed, if we define A ⊂ P by A = ℓ3 ∪ ℓ11 ∪ ℓ62 ∪ ℓ64 ∪ ℓ87 , then one can check that
for each (x, y, z) ∈ T , either one or three of the points x, y, z belong to A. Equivalently,
either none or two of the points x, y, z belong to P \ A. Hence, there is a well-defined
group homomorphism f : ΓT → C2 defined on the generators {ax }x∈P by f (ax ) := 0 if
x ∈ A and f (ax ) := 1 if x 6∈ A. The kernel ker(f ) of f is then a subgroup of index 2 of ΓT .
The intersection Γ0T .
∩ ker(f ) of these two subgroups is thus a normal subgroup of
∼ C2 × C3 ). We checked using the GAP system
index 6 of ΓT (with ΓT Γ0 ∩ ker(f ) =
T
that Γ0T ∩ ker(f ) is a perfect group, so that [ΓT , ΓT ] = Γ0T ∩ ker(f ).
4.4
Partition of ∆T into sub-buildings
A Baer subplane of a projective plane Π is a proper projective subplane Π0 of Π with
the property that every point of Π is incident to at least one line of Π0 and every line of
Π is incident to at least one point of Π0 . Let us take for Π the Hughes plane of order 9.
Then Π has a (Desarguesian) Baer subplane Π0 of order 3, which has the property that all
automorphisms and all correlations of Π preserve Π0 (see [Dem68, 5.4.1]). With respect
to our numbering of the points and lines of the Hughes plane (see Table A.1), the sets of
points and lines of Π0 are
P0 := {pn | n ∈ {9, 17, 20, 33, 38, 42, 43, 46, 47, 56, 59, 64, 70}}
15
and
L0 := {ℓn | n ∈ {3, 11, 22, 34, 46, 53, 62, 64, 70, 79, 84, 87, 89}}
(see the red-colored numbers in Table A.1).
What is surprising is that our point-line correspondence λ also preserves Π0 . This is
indeed clear from Table B.1. Even better, if we call λ0 the restriction of λ to P0 , then the
triangle presentation T can be restricted to a triangle presentation T0 compatible with λ0 .
In other terms, for each (x, y, z) ∈ T , if x ∈ P0 and y ∈ P0 then z ∈ P0 . This can also
be simply observed by inspecting Table B.2. The author does not know any theoretical
reason why these properties are true (and whether they must be true for any point-line
correspondence admitting a triangle presentation).
This observation has different consequences. First, we have a point-line correspondence
λ0 in the Desarguesian projective plane Π0 of order 3, and a triangle presentation T0
compatible with it. Theorem 2.4 thus gives an Ã2 -building ∆T0 whose projective plane at
each vertex is isomorphic to Π0 and a group ΓT0 acting simply transitively on V (∆T0 ). The
triangle presentations in the projective plane of order 3 have all been given by CartwrightMantero-Steger-Zappa in [CMSZ93b], so T0 must be one of their list. It turns out that T0
is equivalent (as defined in [CMSZ93b, Section 2]) to their triangle presentation numbered
14.1 (see [CMSZ93b, Appendix B] ; one such equivalence takes the pn , in the order listed
in the definition of P0 , to 12, 2, 5, 0, 8, 11, 10, 3, 1, 9, 6, 4 and 7, respectively). In particular,
this means by [CMSZ93b, Section 8] that ∆T0 is a non-linear building, i.e. is not the
building of PGL(3, K) for some local field K.
The group ΓT0 and the building ∆T0 also appear as subgroups and sub-buildings of ΓT
and ∆T , respectively. With the notation of §2.2, there is a clear embedding e : CT0 ֒→ CT .
Now ∆T0 and ∆T are the universal coverings of CT0 and CT respectively, so by fixing some
vertices v0 ∈ V (∆T0 ) and v ∈ V (∆T ) such that p(v) = e(p0 (v0 )) (where p : ∆T → CT
and p0 : ∆T0 → CT0 are the natural projections), we get an embedding ẽ : ∆T0 ֒→ ∆T with
ẽ(v0 ) = v. We can then see ΓT0 as the subgroup of ΓT such that ΓT0 (v) is exactly the
set of vertices of ẽ(∆T0 ). Moreover, for each g ∈ ΓT the set gΓT0 (v) ⊂ V (∆T ) is also
the 0-skeleton of a building isomorphic to ∆T0 . This means that the vertices of ∆T are
partitioned into sub-buildings isomorphic to ∆T0 (where each sub-building corresponds to
a left coset of ΓT0 in ΓT ).
One should note that these sub-buildings isomorphic to ∆T0 cover all the vertices of
∆T , but this is not true for edges and chambers: some edges (and chambers) of ∆T do
not belong to any of the sub-buildings.
4.5
Automorphism group of ∆T
The automorphism group Aut(∆T ) of ∆T contains ΓT , which acts simply transitively on
the vertices of the building. In order to know whether Aut(∆T ) is substantially larger
than ΓT , we should try to see what the stabilizer of a vertex in Aut(∆T ) looks like. This
can be done by making use of the GAP system. I am very thankful to Tim Steger, who
had done the same work for triangle presentations in the projective plane of order 3, and
who gave me all his source codes and a great deal of advice.
16
Let v be a vertex of ∆T . In the next discussion, XT will denote the sub-building of
∆T containing v and isomorphic to ∆T0 (see §4.4). We have the following facts.
(i) Any automorphism of ∆T fixing v must preserve the sub-building XT .
Explanation: For a vertex x contained in XT , there are 2 · 91 = 182 vertices adjacent
to x in ∆T , and exactly 2 · 13 = 26 of them belong to XT . Those 26 vertices are
characterized by the fact that, in the local Hughes plane Π associated to x, they
correspond to the 13 points and 13 lines of the Baer subplane Π0 of Π. Hence, if
α ∈ Aut(∆T ) is such that α(x) = y with x, y belonging to XT , then α must send the
26 neighbors of x in XT on the 26 neighbors of y in XT because all automorphisms
and correlations of Π preserve Π0 . Starting with x = v, we obtain step by step that
any automorphism of ∆T fixing v must stabilize XT .
(ii) There are exactly 16 automorphisms of XT stabilizing v.
Explanation: This was previously done by Steger with the help of GAP.
(iii) For each x ∈ V (∆T ), the only automorphism of the ball of radius 2 centered at x
which pointwise stabilizes the ball of radius 1 is the trivial automorphism.
Explanation: This was proved with GAP.
Point (iii) implies that the pointwise stabilizer of a ball of radius 1 in Aut(∆T ) is
trivial, and hence that an automorphism of ∆T is completely determined by its action on
the ball of radius 1 centered at v. In particular, the stabilizer of v in Aut(∆T ) is finite
and Aut(∆T ) is discrete (for the topology of pointwise convergence).
(iv) There are exactly 6 automorphisms of Π that pointwise stabilize Π0 .
Explanation: This can be checked with a computer, but one can also see [Lün76,
Corollary 5] or [Ros58] for a more theoretical approach.
The four first points imply that there are at most 16 · 6 = 96 automorphisms of ∆T
stabilizing v. Denote by G1 the set of the 96 automorphisms of the ball of radius 1 centered
at v which could maybe be extended to automorphisms of the whole building.
(v) Each automorphism in G1 can be extended to an automorphism of the ball of radius
2 centered at v.
Explanation: This was proved with GAP.
Now denote by G2 the set of these extended automorphisms.
(vi) Each automorphism in G2 can be extended to an automorphism of ∆T .
Explanation: This could be checked with a clever GAP program written by Steger.
These steps actually gave us the explicit description of the 96 automorphisms of ∆T
fixing v. Six of them pointwise stabilize the sub-building XT . The file describing these
automorphisms is pretty big so we do not append it to this text.
17
A
The Hughes plane of order 9
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
2
3
4
5
6
7
8
9
2
2
2
2
2
2
2
2
4
5
3
6
9
8
7
5
4
3
9
1
10
19
20
21
22
23
24
25
26
10
11
12
13
14
15
16
17
18
10
10
10
10
10
10
10
10
11
13
14
12
18
16
15
17
11
11
11
11
11
11
11
14
13
16
12
2
11
34
27
33
30
28
29
31
32
19
34
28
31
33
29
27
32
30
35
29
31
33
28
27
30
32
19
21
22
24
20
26
25
23
22
21
26
20
23
24
25
19
19
19
19
3
12
35
42
48
43
44
45
46
47
20
42
35
41
36
37
38
39
40
42
34
38
40
41
37
39
36
27
34
37
39
41
40
36
38
35
39
36
40
37
38
41
42
47
43
45
4
13
36
55
54
49
50
51
52
53
21
43
55
54
50
52
51
49
53
49
56
48
47
43
45
46
44
28
57
48
47
45
44
43
46
58
50
52
51
54
49
53
63
51
54
53
5
14
37
56
61
63
69
64
62
65
22
44
61
56
58
59
66
57
60
50
61
57
59
58
65
55
60
29
62
60
58
61
56
55
59
66
56
57
62
55
60
59
67
55
60
57
6
15
38
57
76
68
70
73
67
66
23
45
62
74
68
71
72
69
67
51
66
63
64
71
70
73
62
30
70
64
67
75
63
66
65
70
65
64
68
67
61
63
71
69
65
68
7
16
39
58
78
72
77
74
75
71
24
46
63
80
73
76
77
75
70
52
67
81
72
83
78
76
74
31
71
69
80
77
76
78
68
74
79
77
78
72
71
69
74
79
73
76
8
17
40
59
89
79
81
83
85
87
25
47
64
82
85
79
86
78
84
53
68
84
75
86
80
77
79
32
72
86
81
79
83
82
74
75
84
80
81
83
82
73
77
85
75
82
9
18
41
60
90
80
82
84
86
88
26
48
65
88
87
81
89
83
90
54
69
87
82
90
85
88
89
33
73
88
89
87
85
84
90
76
86
90
88
87
85
89
78
90
81
86
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
6
7
8
5
3
8
7
9
6
4
5
6
9
8
7
4
3
8
9
7
6
4
4
4
4
5
5
5
5
3
3
3
3
7
9
6
6
7
9
8
7
9
8
8
6
15
17
18
18
13
14
15
16
17
14
17
12
15
16
18
15
12
13
17
16
18
12
16
18
17
13
12
15
16
14
18
17
15
13
13
13
14
14
14
12
12
18
15
17
16
19
19
19
23
24
25
21
20
26
20
25
22
24
23
26
23
25
26
21
22
24
26
21
25
24
22
20
26
24
23
21
22
20
20
25
23
21
24
26
21
23
22
22
20
25
46
44
48
29
30
32
31
33
27
30
28
32
27
31
33
32
33
28
30
29
31
29
28
27
33
27
31
30
32
27
32
31
28
32
29
33
29
28
31
27
30
28
33
29
30
49
52
50
35
35
35
35
35
35
34
34
34
34
34
34
40
38
37
41
39
36
41
36
39
37
36
37
38
41
41
37
40
39
38
40
39
38
40
39
40
36
38
41
36
37
56
58
59
43
44
45
47
46
48
52
51
54
50
53
49
42
42
42
42
42
42
46
45
44
43
46
44
45
48
47
46
45
48
43
48
45
44
46
43
43
48
47
44
47
47
64
61
62
57
59
56
60
69
67
65
60
59
63
58
55
61
70
68
64
62
65
50
49
54
53
53
49
54
52
49
51
50
53
50
49
52
53
54
51
52
51
52
51
54
50
70
72
66
85
78
72
68
71
73
82
76
77
75
64
74
73
79
75
66
82
69
60
59
64
56
61
66
58
55
62
58
55
72
64
58
60
55
57
59
69
56
56
57
63
57
87
84
80
88
86
81
77
80
79
83
80
84
88
78
81
80
83
84
81
87
72
72
67
68
62
81
73
62
68
76
63
71
74
67
65
63
75
66
61
74
71
73
65
70
61
89
88
83
89
87
90
83
84
82
89
87
85
90
79
86
86
88
89
85
90
76
78
88
71
77
83
90
69
70
84
82
89
85
76
77
66
80
79
70
87
75
78
67
86
74
Table A.1: Incidence relation of the Hughes plane of order 9, from [GEM].
18
B
The triangle presentation
λ
0
1
2
3
4
5
6
7
8
9
0
20
54
70
73
56
25
36
89
6
49
1
0
39
82
4
2
14
27
35
21
2
44
30
42
83
87
63
31
17
1
3
75
8
23
22
84
72
29
19
52
4
78
88
38
58
26
7
79
5
74
5
77
68
90
28
45
32
33
47
40
6
50
18
81
59
53
62
16
67
12
7
76
34
13
55
11
86
71
10
48
8
37
65
61
64
80
51
85
66
9
9
3
57
69
60
41
46
24
43
15
Table B.1: Point-line correspondence λ.
(0,3,41)
(0,69,80)
(1,9,27)
(2,81,63)
(4,20,37)
(5,31,33)
(6,35,21)
(7,46,69)
(8,64,50)
(9,59,46)
(10,79,69)
(12,12,12)
(13,31,48)
(14,22,63)
(15,36,34)
(16,60,84)
(17,68,40)
(19,32,79)
(20,53,37)
(21,80,77)
(23,86,28)
(25,47,48)
(26,66,77)
(28,42,52)
(30,54,74)
(32,54,64)
(34,50,39)
(36,53,44)
(38,66,66)
(43,43,43)
(45,68,69)
(49,53,73)
(51,87,66)
(58,72,75)
(70,70,70)
(0,10,82)
(1,1,1)
(2,3,62)
(3,3,3)
(4,28,15)
(5,40,60)
(6,44,10)
(7,58,32)
(8,80,70)
(9,60,11)
(11,11,11)
(12,24,68)
(13,46,35)
(14,33,82)
(15,45,82)
(16,67,46)
(17,74,72)
(19,34,75)
(20,56,70)
(22,71,74)
(23,90,57)
(25,50,77)
(27,31,61)
(28,61,32)
(30,62,61)
(32,66,72)
(34,63,37)
(36,64,67)
(38,81,81)
(43,51,68)
(45,86,62)
(49,69,85)
(52,75,84)
(60,79,85)
(71,75,88)
(0,29,54)
(1,2,16)
(2,19,12)
(3,14,8)
(4,39,81)
(5,45,53)
(6,59,19)
(7,63,64)
(8,90,85)
(10,17,23)
(11,23,71)
(12,39,86)
(13,52,26)
(14,41,37)
(15,49,59)
(16,70,36)
(18,22,42)
(19,54,45)
(20,62,77)
(22,74,63)
(24,40,34)
(25,57,56)
(27,41,34)
(28,73,42)
(30,69,37)
(33,33,33)
(34,88,47)
(36,78,65)
(38,85,85)
(43,59,64)
(46,46,46)
(49,73,53)
(52,84,68)
(60,86,63)
(72,78,76)
(0,34,9)
(1,3,47)
(2,43,61)
(3,23,6)
(4,48,29)
(5,50,30)
(6,78,24)
(7,82,18)
(9,20,43)
(10,26,33)
(11,37,82)
(12,47,45)
(13,62,79)
(14,44,32)
(15,59,89)
(16,84,55)
(18,29,39)
(19,59,87)
(20,77,24)
(22,78,42)
(24,51,85)
(25,61,29)
(27,54,29)
(28,86,61)
(31,54,83)
(33,40,51)
(34,90,35)
(36,79,51)
(39,49,41)
(43,70,47)
(46,71,76)
(49,89,59)
(53,90,88)
(63,69,70)
(79,79,79)
(0,56,88)
(1,4,72)
(2,54,73)
(3,27,56)
(4,53,20)
(5,55,40)
(6,87,59)
(8,11,87)
(9,42,38)
(10,27,82)
(11,54,24)
(12,58,56)
(13,67,27)
(14,51,58)
(15,67,83)
(16,90,18)
(18,42,78)
(19,77,22)
(21,21,38)
(23,28,80)
(24,81,84)
(25,74,49)
(27,74,68)
(29,44,89)
(31,76,78)
(33,47,46)
(35,57,71)
(37,52,89)
(39,74,43)
(44,44,44)
(46,80,50)
(50,55,76)
(54,84,70)
(65,66,86)
(79,90,89)
(0,61,31)
(1,5,89)
(2,60,65)
(3,49,7)
(4,74,79)
(5,71,22)
(7,18,39)
(8,26,52)
(9,55,44)
(10,35,73)
(11,55,85)
(12,67,53)
(13,75,52)
(14,57,51)
(15,88,65)
(17,17,38)
(18,62,87)
(19,84,41)
(21,29,68)
(23,41,36)
(24,88,32)
(26,39,55)
(27,80,69)
(29,64,76)
(31,78,36)
(33,59,56)
(35,62,41)
(37,89,52)
(40,76,41)
(44,62,75)
(48,48,48)
(50,73,51)
(55,56,79)
(65,78,69)
(80,81,87)
(0,66,1)
(1,6,86)
(2,65,55)
(3,76,4)
(4,85,71)
(6,13,25)
(7,21,75)
(8,36,58)
(9,56,42)
(10,48,77)
(11,67,61)
(12,80,82)
(13,85,82)
(14,65,43)
(16,18,82)
(17,46,20)
(18,87,62)
(19,85,61)
(21,44,60)
(23,43,26)
(25,25,25)
(26,45,76)
(27,88,66)
(29,71,70)
(31,89,81)
(33,72,39)
(35,70,86)
(38,41,41)
(40,87,48)
(44,74,80)
(48,49,63)
(50,76,60)
(55,63,86)
(66,89,71)
(83,83,83)
(0,67,13)
(1,7,51)
(2,73,35)
(3,84,5)
(5,17,90)
(6,24,78)
(7,32,57)
(8,52,68)
(9,57,48)
(10,67,81)
(11,72,49)
(12,81,57)
(13,86,64)
(14,67,22)
(16,40,25)
(17,59,70)
(18,90,29)
(20,24,62)
(21,53,31)
(23,58,90)
(25,30,58)
(26,60,39)
(28,32,40)
(30,30,38)
(31,90,43)
(33,75,61)
(35,71,58)
(38,42,56)
(42,47,47)
(44,79,47)
(48,58,81)
(50,88,87)
(56,83,60)
(68,87,83)
(88,88,88)
Table B.2: Triangle presentation T compatible with λ.
19
(0,68,74)
(1,8,77)
(2,75,17)
(4,15,28)
(5,22,67)
(6,30,26)
(7,37,83)
(8,57,36)
(9,58,45)
(10,73,50)
(11,83,47)
(12,89,76)
(14,15,21)
(15,16,30)
(16,53,66)
(17,65,82)
(19,22,77)
(20,33,64)
(21,55,83)
(23,83,77)
(25,37,65)
(26,63,88)
(28,40,80)
(30,45,57)
(32,46,84)
(34,34,34)
(35,72,83)
(38,64,64)
(42,73,52)
(45,45,45)
(48,65,84)
(51,73,54)
(57,75,72)
(69,78,72)
References
[Bae46] Reinhold Baer, Polarities in finite projective planes, Bull. Amer. Math. Soc. 52 (1946), 77–93.
[BP07] Sylvain Barré and Mikaël Pichot, Sur les immeubles triangulaires et leurs automorphismes, Geom.
Dedicata 130 (2007), 71–91.
[BdlHV08] Bachir Bekka, Pierre de la Harpe, and Alain Valette, Kazhdan’s Property (T), New Mathematical Monographs, vol. 11, Cambridge Univ. Press, 2008.
[BT72] François Bruhat and Jacques Tits, Groupes réductifs sur un corps local, I. Données radicielles
valuées, Inst. Hautes Études Sci. Publ. Math. 41 (1972), 5–251.
[CMSZ93a] Donald I. Cartwright, Anna M. Mantero, Tim Steger, and Anna Zappa, Groups acting simply
transitively on the vertices of a building of type Ã2 , I, Geom. Dedicata 47 (1993), 143–166.
[CMSZ93b] Donald I. Cartwright, Anna M Mantero, Tim Steger, and Anna Zappa, Groups acting simply
transitively on the vertices of a building of type Ã2 , II, Geom. Dedicata 47 (1993), 167–223.
[Dem68] Peter Dembowski, Finite Geometries, Ergebnisse der Mathematik und ihrer Grenzgebiete, vol. 44,
Springer-Verlag, Berlin, 1968.
[DPVM13] Alice Devillers, James Parkinson, and Hendrik Van Maldeghem, Automorphisms and opposition
in twin buildings, J. Aust. Math. Soc. 94 (2013), 189–201.
[EV10] Martin Edjvet and Alina Vdovina, On the SQ-universality of Groups with Special Presentations,
J. Group Theory 13 (2010), 923–931.
[How89] James Howie, On the SQ-universality of T (6)-groups, Forum Math. 1 (1989), 251–272.
[Hug57] Daniel R. Hughes, A class of non-Desarguesian projective planes, Canad. J. Math. 9 (1957),
378–388.
[Kan86] William M. Kantor, Generalized polygons, SCABs and GABs, Buildings and the Geometry of
Diagrams (Proc. C.I.M.E. Session, Como 1984; L. A. Rosati ed.), Lecture Notes in Math., vol. 1181,
Springer-Verlag, 1986, pp. 79–158.
[LKT91] Clement W. H. Lam, Galina Kolesova, and Larry H. Thiel, A computer search for finite projective
planes of order 9, Discrete Math. 92 (1991), 187–195.
[Lün76] Heinz Lüneburg, Characterizations of the generalized Hughes planes, Canad. J. Math. 28 (1976),
no. 2, 376–402.
[GEM] G. Eric Moorhouse, Projective Planes of Small Order, consulted on October 30, 2015.
[Ron86] Mark A. Ronan, A construction of Buildings with no rank 3 residues of spherical type, Buildings
and the Geometry of Diagrams (Proc. C.I.M.E. Session, Como 1984; L. A. Rosati ed.), Lecture Notes
in Math., vol. 1181, Springer-Verlag, 1986, pp. 242–248.
[Ros58] Luigi Antonio Rosati, I gruppi di collineazioni dei piani di Hughes, Boll. Unione Mat. Ital. 13
(1958), no. 4, 505–513.
[VM87] Hendrik Van Maldeghem, Non-classical triangle buildings, Geom. Dedicata 24 (1987), 123–206.
[VW07] Oswald Veblen and Joseph H. M. Wedderburn, Non-Desarguesian and non-Pascalian geometries,
Trans. Amer. Math. Soc. 8 (1907), 379–388.
20
| 4math.GR
|
1
Interactive Communication for Data Exchange
arXiv:1601.03617v3 [cs.IT] 11 Nov 2017
Himanshu Tyagi, Member, IEEE, Pramod Viswanath, Fellow, IEEE, and Shun Watanabe, Member, IEEE
Abstract—Two parties observing correlated data seek to exchange their data using interactive communication. How many
bits must they communicate? We propose a new interactive
protocol for data exchange which increases the communication
size in steps until the task is done. We also derive a lower bound
on the minimum number of bits that is based on relating the
data exchange problem to the secret key agreement problem.
Our single-shot analysis applies to all discrete random variables
and yields upper and lower bounds of a similar form. In fact, the
bounds are asymptotically tight and lead to a characterization
of the optimal rate of communication needed for data exchange
for a general source sequence such as a mixture of IID random
variables as well as the optimal second-order asymptotic term in
the length of communication needed for data exchange for IID
random variables, when the probability of error is fixed. This
gives a precise characterization of the asymptotic reduction in the
length of optimal communication due to interaction; in particular,
two-sided Slepian-Wolf compression is strictly suboptimal.
I. I NTRODUCTION
Random correlated data (X, Y ) is distributed between two
parties with the first observing X and the second Y . What
is the optimal communication protocol for the two parties
to exchange their data? We allow (randomized) interactive
communication protocols and a nonzero probability of error.
This basic problem was introduced by El Gamal and Orlitsky
in [23] where they presented bounds on the average number of
bits of communication needed by deterministic protocols for
data exchange without error1 . When interaction is not allowed,
a simple solution is to apply Slepian-Wolf compression [29]
for each of the two one-sided data transfer problems. The
resulting protocol was shown to be of optimal rate, even
in comparison with interactive protocols, when the underlying observations are independent and identically distributed
(IID) by Csiszár and Narayan in [8]. They considered a
multiterminal version of this problem, namely the problem
of attaining omniscience, and established a lower bound on
the rate of communication to show that interaction does not
help in improving the asymptotic rate of communication if
the probability of error vanishes to 0. However, interaction
is known to be beneficial in one-sided data transfer (cf.
[24], [38], [39], [9]). Can interaction help to reduce the
communication needed for data exchange, and if so, what is
H. Tyagi is with the Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India. Email:
[email protected]
P. Viswanath is with the Department of Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, IL 61801, USA. Email:
{pramodv}@illinois.edu
S. Watanabe is with the Department of Computer and Information Sciences,
Tokyo University of Agriculture and Technology, Tokyo 184-8588, Japan.
Email: [email protected]
1 They also illustrated the advantage of using randomized protocols when
error is allowed
the minimum length of interactive communication needed for
data exchange?
We address the data exchange problem, illustrated in Figure 1, and provide answers to the questions raised above. We
provide a new approach for establishing converse bounds for
problems with interactive communication that relates efficient
communication to secret key agreement and uses the recently
established conditional independence testing bound for the
length of a secret key [35]. Furthermore, we propose an
interactive protocol for data exchange which matches the
performance of our lower bound in several asymptotic regimes.
As a consequence of the resulting single-shot bounds, we
obtain a characterization of the optimal rate of communication
needed for data exchange for a general sequence (Xn , Yn )
such as a mixture of IID random variables as well as the
optimal second-order asymptotic term in the length of communication needed for data exchange for the IID random
variables (X n , Y n ), first instance of such a result in source
coding with interactive communication2 . This in turn leads to
a precise characterization of the gain in asymptotic length of
communication due to interaction.
Related work: The role of interaction in multiparty data
compression has been long recognized. For the data exchange
problem, this was first studied in [23] where interaction was
used to facilitate data exchange by communicating optimally
few bits in a single-shot setup with zero error. In a different
direction, [9], [38], [39] showed that interaction enables a
universal variable-length coding for the Slepian-Wolf problem
(see, also, [10] for a related work on universal encoding). Furthermore, it was shown in [38] that the redundancy in variablelength Slepian-Wolf coding with known distribution can be
improved by interaction. In fact, the first part of our protocol is
essentially the same as the one in [38] (see, also, [4]) wherein
the length of the communication is increased in steps until the
second√party can decode. In [38], the step size was chosen to
be O( n) for the universal scheme and roughly O(n1/4 ) for
the known distribution case. We recast this protocol in an information spectrum framework (in the spirit of [16]) and allow
for a flexible choice of the step size. By choosing this step size
appropriately, we obtain exact asymptotic results in various
regimes. Specifically, the optimal choice of this step size ∆ is
given by the square root
√ of the essential length of the spectrum
of PX|Y , i.e., ∆ = λmax − λmin where λmax and λmin are
large probability upper and lower bounds, respectively, for√the
random variable h(X|Y ) = − log PX|Y (X|Y ). The O( n)
choice for the universal case of [38] follows as a special case
since for the universal setup with IID source h(X n |Y n ) can
vary over an interval of length O(n). Similarly, for a given
2 In a different context, recently [2] showed that the second-order asymptotic term in the size of good channel codes can be improved using feedback.
2
Y
X
1
⇧
Ŷ
1
X̂
Fig. 1: The data exchange problem.
n
n
IID source, h(X
√ |Y ) can essentially vary over an interval
of length O( n) for which the choice of ∆ = O(n1/4 )
in [38] is appropriate by our general principle. While the
optimal choice of ∆ (upto the order) was identified in [38]
for special cases, the optimality of this choice was not shown
there. Our main contribution is a converse which shows that
our achieved length of communication is optimal in several
asymptotic regimes. As a by-product, we obtain a precise
characterization of gain due to interaction, one of the few such
instances available in the literature. Drawing on the techniques
introduced in this paper, the much more involved problem of
simulation of interactive protocols was addressed in [33], [34].
Organization: The remainder of this paper is organized
as follows: We formally describe the data exchange problem
in Section II. Our results are summarized in Section III. Section IV contains our single-shot achievability scheme, along
with the necessary prerequisites to describe it, and Section V
contains our single-shot converse bound. The strong converse
and second-order asymptotics for the communication length
and the optimal rate of communication for general sources are
obtained as a consequence of single-shot bounds in Section VI
and VII, respectively. The final section contains a discussion
of our results and extensions to the error exponent regime.
II. P ROBLEM FORMULATION
Let the first and the second party, respectively, observe discrete random variables X and Y taking values in finite sets X
and Y. The two parties wish to know each other’s observation
using interactive communication over a noiseless (error-free)
channel. The parties have access to local randomness (private
coins) UX and UY and shared randomness (public coins) U
such that the random variables UX , UY , U are finite-valued
and mutually independent and independent jointly of (X, Y ).
For simplicity, we resrict to tree-protocols (cf. [20]). A treeprotocol π consists of a binary tree, termed the protocol-tree,
with the vertices labeled by 1 or 2. The protocol starts at the
root and proceeds towards the leaves. When the protocol is
at vertex v with label iv ∈ {1, 2}, party iv communicates a
bit bv based on its local observations (X, UX , U ) for iv = 1
or (Y, UY , U ) for iv = 2. The protocol proceeds to the leftor right-child of v, respectively, if bv is 0 or 1. The protocol
terminates when it reaches a leaf, at which point each party
produces an output based on its local observations and the
bits communicated during the protocol, namely the transcript
Π = π(X, Y, UX , UY , U ). Figure 2 shows an example of a
protocol tree.
The length of a protocol π, denoted |π|, is the maximum
accumulated number of bits transmitted in any realization of
the protocol, namely the depth of the protocol tree.
Definition 1. For 0 ≤ ε < 1, a protocol π attains εdata exchange (ε-DE) if there exist functions Ŷ and X̂ of
2
2
1
2
Fig. 2: A two-party protocol tree.
(X, Π, UX , U ) and (Y, Π, UX , U ), respectively, such that
P(X̂ = X, Ŷ = Y ) ≥ 1 − ε.
(1)
The minimum communication for ε-DE Lε (X, Y ) is the infimum of lengths of protocols3 that attain ε-DE, i.e., Lε (X, Y )
is the minimum number of bits that must be communicated by
the two parties in order to exchange their observed data with
probability of error less than ε.
Protocols with 2 rounds of communication Π1 and Π2 which
are functions of only X and Y , respectively, are termed simple
protocols. We denote by Lsε (X, Y ) the minimum communication for ε-DE by a simple protocol.
III. S UMMARY OF RESULTS
To describe our results, denote by h(X) = − log PX (X)
and h(X|Y ) = − log PX|Y (X|Y ), respectively, the entropy
density of X and the conditional entropy density of X given
Y . Also, pivotal in our results is a quantity we call the sum
conditional entropy density of X and Y defined as
h(X4Y ) := h(X|Y ) + h(Y |X).
An interactive data exchange protocol. Our data exchange
protocol is based on an interactive version of the Slepian-Wolf
protocol where the length of the communication is increased
in steps until the second party decodes the data of the first.
Similar protocols have been proposed earlier for distributed
data compression in [10], [38], for protocol simulation in [4],
and for secret key agreement in [17], [16].
In order to send X to an observer of Y , a single-shot version
of the Slepian-Wolf protocol was proposed in [22] (see, also,
[13, Lemma 7.2.1]). Roughly speaking, this protocol simply
hashes X to as many bits as the right most point in the
spectrum4 of PX|Y . The main shortcoming of this protocol for
our purpose is that it sends the same number of bits for every
realization of (X, Y ). However, we would like to use as few
bits as possible for sending X to party 2 so that the remaining
bits can be used for sending Y to party 1. Note that once X
is recovered by party 2 correctly, it can send Y to Party 1
without error using, say, Shannon-Fano-Elias coding (eg. see
[5, Section 5]); the length of this second communication is
3 By derandomizing (1), it is easy to see that local and shared randomness
does not help, and deterministic protocols attain Lε (X, Y ).
4 Spectrum of a distribution P
X refers, loosely, to the distribution of the
random variable − log PX (X).
3
dh(Y |X)e bits. Our protocol accomplishes the first part above
using roughly h(X|Y ) bits of communication.
Specifically, in order to send X to Y we use a spectrum
slicing technique introduced in [13] (see, also, [17], [16]). We
divide the support [λmin , λmax ] of spectrum of PX|Y into N
slices size ∆ each; see Figure 3 for an illustration.
Specifically, the “excess” randomness generated when the
parties observing X and Y share a communication Π can
be extracted as a secret key independent of Π using the
leftover hash lemma [19], [28]. Thus, denoting by Sε (X, Y )
the maximum length of secret key and by H the length of the
common randomness (cf. [1]) generated by the two parties
during the protocol, we get
Bits used
by Protocol 1
H − Lε (X, Y ) ≤ Sε (X, Y ).
Bits used
by Slepian-Wolf
min
i
h(X | Y )
max
Fig. 3: Spectrum slicing in Protocol 1.
The protocol begins with the left most slice and party 1
sends λmin + ∆ hash bits to party 2. If party 2 can find a
unique x that is compatible with the received hash bits and
h(x|Y ) is within the current slice of conditional information
spectrum, it sends back an ACK and the protocol stops. Else,
party 2 sends back a NACK and the protocol now moves to
the next round, in which Party 1 sends additional ∆ hash bits.
The parties keep on moving to the next slice until either party
2 sends an ACK or all slices are covered. We will show that
this protocol is reliable and uses no more than h(X|Y ) + ∆ +
N bits of communication for each realization of (X, Y ). As
mentioned above, once party 2 gets X, it sends back Y using
h(Y |X)+1 bits, thereby resulting in an overall communication
of h(X4Y ) + ∆ + N + 1 bits. In our applications, we shall
choose N and ∆ to be of negligible order in comparison with
the tail bounds for h(X4Y ). Thus, we have the following
upper bound on Lε (X, Y ). (The statement here is rough; see
Theorem 2 below for a precise version.)
Result 1 (Rough statement of the single-shot upper bound).
For every 0 < ε < 1,
Lε (X, Y ) . inf{γ : P (h(X4Y ) > γ) ≤ ε}.
A converse bound. Our next result, which is perhaps the
main contribution of this paper, is a lower bound on Lε (X, Y ).
This bound is derived by connecting the data exchange problem to the two-party secret key agreement problem. For an
illustration of our approach in the case of IID random variables
X n and Y n , note that the optimal rate of a secret key that can
be generated is given by I(X ∧ Y ), the mutual information
between X and Y [21], [1]. Also, using a privacy amplification
argument (cf. [3], [27]), it can be shown that a data exchange
protocol using nR bits can yield roughly n(H(XY ) − R) bits
of secret key. Therefore, I(X ∧Y ) exceeds H(XY )−R, which
further gives
R ≥ H(X|Y ) + H(Y |X).
This connection between secret key agreement and data exchange was noted first in [8] where it was used for designing
an optimal rate secret key agreement protocol. Our converse
proof is, in effect, a single-shot version of this argument.
Next, we apply the recently established conditional independence testing upper bound for Sε (X, Y ) [35], [36], which
follows by reducing a binary hypothesis testing problem to
secret key agreement. However, the resulting lower bound
on Lε (X, Y ) is good only when the spectrum of PXY is
concentrated. Heuristically, this slack in the lower bound arises
since we are lower bounding the worst-case communication
complexity of the protocol for data exchange – the resulting
lower bound need not apply for every (X, Y ) but only for
a few realizations of (X, Y ) with probability greater than ε.
To remedy this shortcoming, we once again take recourse to
spectrum slicing and show that there exists a slice of the
spectrum of PXY where the protocol requires sufficiently large
number of bits; Figure 4 illustrates this approach. The resulting
lower bound on Lε (X, Y ) is stated below roughly, and a
precise statement is given in Theorem 4.
Lower bound
without
slicing
min
L✏
min
Upper bound
with
slicing
H✏
i+
with
slicing
i
L✏
i
h(XY )
without
slicing
max
H✏
max
Fig. 4: Bounds on secret key length leading to the converse.
Here Lε abbreviates Lε (X, Y ) and Hε denotes the ε-tail of
h(X4Y ).
Result 2 (Rough statement of the single-shot lower bound).
For every 0 < ε < 1,
Lε (X, Y ) & inf{γ : P (h(X4Y ) > γ) ≤ ε}.
Note that the upper and the lower bounds for Lε (X, Y )
in the two results above appear to be of the same form
(upon ignoring a few error terms). In fact, the displayed term
dominates asymptotically and leads to tight bounds in several
asympotitic regimes. Thus, the imprecise forms above capture
the spirit of our bounds.
Asymptotic optimality. The single-shot bounds stated
above are asymptotically tight up to the first order term for any
sequence of random variables (Xn , Yn ), and up to the second
order term for a sequence of IID random variables (X n , Y n ).
Specifically, consider a general source sequence (X, Y) =
{(Xn , Yn )}∞
n=1 . We are interested in characterizing the minimum asymptotic rate of communication for asymptotically
error-free data exchange, and seek its comparison with the
minimum rate possible using simple protocols.
4
Definition 2. The minimum rate of communication for data
exchange R∗ is defined as
1
R (X, Y) = inf lim sup Lεn (Xn , Yn ),
εn n→∞ n
∗
where the infimum is over all εn → 0 as n → ∞. The
corresponding minimum rate for simple protocols is denoted
by Rs∗ .
Denote by H(X4Y), H(X|Y), and H(Y|X), respectively, the lim sup in probability of random variables
h(Xn 4Yn ), h(Xn |Yn ), and h(Yn |Xn ). The quantity H(X|Y)
is standard in information spectrum method [14], [13] and
corresponds to the asymptotically minimum rate of communication needed to send Xn to an observer of Yn [22] (see, also,
[13, Lemma 7.2.1]). Thus, a simple communication protocol
of rate H(X|Y) + H(Y|X) can be used to accomplish data
exchange. In fact, a standard converse argument can be used
to show the optimality of this rate for simple communication.
Therefore, when we restrict ourselves to simple protocols, the
asymptotically minimum rate of communication needed is
Rs∗ (X, Y) = H(X|Y) + H(Y|X).
As an illustration, consider the case when (Xn , Yn ) are gener(1)
ated by a mixture of two n-fold IID distributions PX n Y n and
(2)
PX n Y n . For this case, the right-side above equals (cf. [13])
max{H(X (1) | Y (1) ), H(X (2) | Y (2) )}
+ max{H(Y (1) | X (1) ), H(Y (2) | X (2) )}.
Can we improve this rate by using interactive communication?
Using our single-shot bounds for Lε (X, Y ), we answer this
question in the affirmative.
Result 3 (Min rate of communication for data exchange).
For a sequence of sources (X, Y) = {(Xn , Yn )}∞
n=1 ,
R∗ (X, Y) = H(X4Y).
For the mixture of IID example above,
H(X4Y) = max{H(X (1) | Y (1) ) + H(Y (1) | X (1) ),
H(X (2) | Y (2) ) + H(Y (2) | X (2) )},
and therefore, simple protocols are strictly suboptimal in
general. Note that while the standard information spectrum
techniques suffice to prove the converse when we restrict to
simple protocols, their extension to interactive protocols is
unclear and our single-shot converse above is needed.
Turning now to the case of IID random variables, i.e. when
Xn = X n = (X1 , ..., Xn ) and Yn = Y n = (Y1 , ..., Yn ) are
n-IID repetitions of random variables (X, Y ). For brevity,
denote by R∗ (X, Y ) the corresponding minimum rate of
communication for data exchange, and by H(X4Y ) and V ,
respectively, the mean and the variance of h(X4Y ). Earlier,
Csiszár and Narayan [8] showed that R∗ (X, Y ) = H(X4Y ).
We are interested in a finer asymptotic analysis than this first
order characterization.
In particular, we are interested in characterizing the asymptotic behavior of Lε (X n , Y n ) up to the second-order term, for
every fixed ε in (0,1). We need the following notation:
1
Lε (X n , Y n ), 0 < ε < 1.
n
Note that R∗ (X, Y ) = supε∈(0,1) Rε∗ (X, Y ). Our next result
shows that Rε∗ (X, Y ) does not depend on ε and constitutes a
strong converse for the result in [8].
Rε∗ (X, Y ) = lim
n→∞
Result 4 (Strong converse). For every 0 < ε < 1,
Rε∗ (X, Y ) = H(X4Y ).
In fact, this result follows from a general result characterizing the second-order asymptotic term5 .
Result 5 (Second-order asymptotic behavior). For every
0 < ε < 1,
√
√
Lε (X n , Y n ) = nH(X4Y ) + nV Q−1 (ε) + o( n),
where Q(a) is the tail probability of the standard Gaussian
distribution and V is the variance of the sum conditional
entropy density h(X4Y ).
While simple protocols are optimal for the first-order term
for IID observations, Example 1 in Section VII exhibits the
strict suboptimality of simple protocols for the second-order
term.
IV. A SINGLE - SHOT DATA EXCHANGE PROTOCOL
We present a single-shot scheme for two parties to exchange
random observations X and Y . As a preparation for our
protocol, we consider the restricted problem where only the
second party observing Y seeks to know the observation X
of the first party. This basic problem was introduced in the
seminal work of Slepian and Wolf [29] for the case where
the underlying data is IID where a scheme with optimal rate
was given. A single-shot version of the Slepian-Wolf scheme
was given in [22] (see, also, [13, Lemma 7.2.1]). which we
describe below.
Using the standard “random binning” and “typical set”
decoding argument, it follows that there exists an l-bit communication Π1 = Π1 (X) and a function X̂ of (Π1 , Y ) such
that
P X 6= X̂ ≤ P (h(X|Y ) > l − η) + 2−η .
(2)
In essence, the result of [22] shows that we can send X to
Party 2 with a probability of error less than ε using roughly
as many bits as the ε-tail of h(X|Y ). However, the proposed
scheme uses the same number of bits for every realization
of (X, Y ). In contrast, we present an interactive scheme that
achieves the same goal and uses roughly h(X|Y ) bits when
the underlying observations are (X, Y )
While the bound in (2) can be used to establish the
asymptotic rate optimality of the Slepian-Wolf scheme even
for general sources, the number of bits communicated can be
reduced for specific realizations of X, Y . This improvement is
achieved using an interactive protocol with an ACK − NACK
5 Following the pioneering work of Strassen [30], study of these secondorder terms in coding theorems has been revived recently by Hayashi [15],
[18] and Polyanskiy, Poor, and Verdú [26].
5
feedback which halts as soon as the second party decodes
first’s observation; this protocol is described in the next
subsection. A similar scheme was introduced by Feder and
Shulman in [10], a variant of which was shown to be of least
average-case complexity for stationary sources by Yang and
He in [38], requiring H(X | Y ) bits on average. Another
variant of this scheme has been used recently in [16] to
generate secret keys of optimal asymptotic length upto the
second-order term.
A. Interactive Slepian-Wolf Compression Protocol
We begin with an interactive scheme for sending X to an
observer of Y , which hashes (bins) X into a few values as
in the scheme of [22], but unlike that scheme, increases the
hash-size gradually, starting with λ1 = λmin and increasing the
size ∆-bits at a time until either X is recovered or λmax bits
have been sent. After each transmission, Party 2 sends either
an ACK-NACK feedback signal; the protocol stops when an
ACK symbol is received.
As mentioned in the introduction, we rely on spectrum
slicing. Our protocol focuses on the “essential spectrum” of
h(X|Y ), i.e., those values of (X, Y ) for which h(X|Y ) ∈
(λmin , λmax ). For λmin , λmax , ∆ > 0 with λmax > λmin , let
N=
λmax − λmin
,
∆
(3)
and
λi = λmin + (i − 1)∆, 1 ≤ i ≤ N.
(4)
Further, let
n
o
T0 = (x, y) : hPX|Y (x|y) ≥ λmax or hPX|Y (x|y) < λmin ,
(5)
and for 1 ≤ i ≤ N , let Ti denote the ith slice of the spectrum
given by
n
o
Ti = (x, y) : λi ≤ hPX|Y (x|y) < λi + ∆ .
(6)
Note that T0 corresponds to the complement of the “typical
set.” Finally, let Hl (X ) denote the set of all mappings h :
X → {0, 1}l .
Our protocol for transmitting X to an observer of Y is described in Protocol 1. The lemma below bounds the probability
of error for Protocol 1 when (x, y) ∈ Ti , 1 ≤ i ≤ N .
Theorem 1 (Interactive Slepian-Wolf). Protocol 1 with l =
λmin + ∆ + η sends at most (h (X|Y ) + ∆ + N + η) bits when
the observations are (X, Y ) ∈
/ T0 and has probability of error
less than
P X̂ 6= X ≤ PXY (T0 ) + N 2−η .
Note that when T0 is chosen to be of small probability,
Protocol 1 sends essentially the same number of bits in the
worst-case as the Slepian-Wolf protocol.
B. Interactive protocol for data exchange
Returning to the data exchange problem, our protocol for
data exchange builds upon Protocol 1 and uses it to first
Protocol 1: Interactive Slepian-Wolf compression
Input: Observations X and Y , uniform public
randomness U , and parameters l, ∆
Output: Estimate X̂ of X at party 2
Both parties use U to select h1 uniformly from Hl (X )
Party 1 sends Π1 = h1 (X)
if Party 2 finds a unique x ∈ T1 with hash value
h1 (x) = Π1 then
set X̂ = x
send back Π2 = ACK
else
send back Π2 = NACK
while 2 ≤ i ≤ N and party 2 did not send an ACK do
Both parties use U to select hi uniformly from
H∆ (X ), independent of h1 , ..., hi−1
Party 1 sends Π2i−1 = hi (X)
if Party 2 finds a unique x ∈ Ti with hash value
hj (x) = Π2j−1 , ∀ 1 ≤ j ≤ i then
set X̂ = x
send back Π2i = ACK
else
if More than one such x found then
protocol declares an error
else
send back Π2i = NACK
Reset i → i + 1
if No X̂ found at party 2 then
Protocol declares an error
transmit X to the second party (observing Y ). Once Party 2
has recovered X correctly, it sends Y to Party 1 without error
using, say, Shannon-Fano-Elias coding (eg. see [5, Section
5]); the length of this second communication is dh(Y |X)e
bits. When the accumulated number of bits communicated
in the protocol exceeds a prescribed length lmax , the parties
abort the protocol and declare an error.6 Using Theorem 1,
the probability of error of the combined protocol is bounded
above as follows.
Theorem 2 (Interactive data exchange protocol). Given
λmin , λmax , ∆, η > 0 and for N in (3), there exists a protocol
for data exchange of length lmax such that
P X 6= X̂ or Y 6= Ŷ
≤ P (h(X4Y ) + ∆ + N + η + 1 > lmax )
+ PXY (T0 ) + N 2−η .
Thus, we attain ε-DE using a protocol of length
lmax = λε + ∆ + N + η + 1,
where λε is the ε-tail of h(X4Y ). Note that using the
noninteractive Slepian-Wolf protocol on both sides will require
roughly as many bits of communication as the sum of ε-tails
of h(X|Y ) and h(Y |X), which, in general, is more than the
6 Alternatively, we can use the (noninteractive) Slepian-Wolf coding by
setting the size of hash as lmax − (h(X|Y ) + ∆ + N + η).
6
ε-tail of h(X|Y ) + h(Y |X).
C. Proof of Theorem 1
The theorem follows as a corollary of the following observation.
Lemma 3 (Performance of Protocol 1). For (x, y) ∈ Ti ,
1 ≤ i ≤ N , denoting by X̂ = X̂(x, y) the estimate of x at
Party 2 at the end of the protocol (with the convention that
X̂ = ∅ if an error is declared), Protocol 1 sends at most
(l + (i − 1)∆ + i) bits and has probability of error bounded
above as follows:
P X̂ 6= x | X = x, Y = y ≤ i2λmin +∆−l .
Proof. Since (x, y) ∈ Ti , an error occurs if there exists a
x̂ 6= x such that (x̂, y) ∈ Tj and Π2k−1 = h2k−1 (x̂) for
1 ≤ k ≤ j for some j ≤ i. Therefore, the probability of error
is bounded above as
P X̂ 6= x | X = x, Y = y
≤
i X
X
j=1 x̂6=x
P (h2k−1 (x) = h2k−1 (x̂), ∀ 1 ≤ k ≤ j)
× 1 (x̂, y) ∈ Tj
≤
=
i X
X
1
1 (x̂, y) ∈ Tj
l+(j−1)∆
2
j=1 x̂6=x
i X
X
1
|{x̂ | (x̂, y) ∈ Tj }|
l+(j−1)∆
2
j=1 x̂6=x
≤ i2λmin −l+∆ ,
where we have used the fact that log |{x̂ | (x̂, y) ∈ Tj }| ≤
λj + ∆. Note that the protocol sends l bits in the first transmission, and ∆ bits and 1-bit feedback in every subsequent
transmission. Therefore, no more than (l + (i − 1)∆ + i) bits
are sent.
V. C ONVERSE BOUND
Our converse bound, while heuristically simple, is technically involved. We first state the formal statement and provide
the high level ideas underlying the proof; the formal proof will
be provided later.
Our converse proof, too, relies on spectrum slicing to
find the part of the spectrum of PXY where the protocol
communicates large number of bits. As in the achievability
part, we shall focus on the “essential spectrum” of h(XY ).
Given λmax , λmin , and ∆ > 0, let N be as in (3) and the
set T0 be as in (5), with hPX|Y (x|y) replaced by hPXY (xy)
in those definitions.
Theorem 4. For 0 ≤ ε < 1, 0 < η < 1 − ε, and parameters
∆, N as above, the following lower bound on Lε (X, Y ) holds
for every γ > 0:
1
Lε (X, Y ) ≥ γ + 3 log Pγ − ε − PXY (T0 ) −
N +
1
+ log(1 − 2η) − ∆ − 6 log N − 4 log − 1,
η
where Pγ := PXY (h(X4Y ) > γ).
Thus, a protocol attaining ε-DE must communicate roughly
as many bits as ε-tail of h(X4Y ).
The main idea is to relate data exchange to secret key
agreement, which is done in the following two steps:
1) Given a protocol π for ε-DE of length l, use the leftover
hash lemma to extract an ε-secret key of length roughly
λmin − l.
2) The length of the secret key that has been generated
is bounded above by Sε (X, Y ), the maximum possible
length of an ε-secret key. Use the conditional independence testing bound in [35], [36] to further upper bound
Sε (X, Y ), thereby obtaining a lower bound for l.
This approach leads to a loss of λmax − λmin , the length of
the spectrum of PXY . However, since we are lower bounding
the worse-case communication complexity, we can divide the
spectrum into small slices of length ∆, and show that there is a
slice where the communication is high enough by applying the
steps above to the conditional distribution given that (X, Y )
lie in a given slice. This reduces the loss from λmax − λmin
to ∆.
A. Review of two party secret key agreement
Consider two parties with the first and the second party,
respectively, observing the random variable X and Y . Using
an interactive protocol Π and their local observations, the
parties agree on a secret key. A random variable K constitutes
a secret key if the two parties form estimates that agree
with K with probability close to 1 and K is concealed, in
effect, from an eavesdropper with access to communication
Π. Formally, let Kx and Ky , respectively, be randomized
functions of (X, Π) and (Y, Π). Such random variables Kx
and Ky with common range K constitute an ε-secret key (εSK) if the following condition is satisfied:
1
(2)
PKx Ky Π − Punif × PΠ
2
≤ ε,
where
(2)
Punif (kx , ky ) =
1(kx = ky )
|K|
,
and k·k is the variational distance. The condition above ensures
both reliable recovery, requiring P (Kx 6= Ky ) to be small, and
information theoretic secrecy, requiring the distribution of Kx
(or Ky ) to be almost independent of the communication Π and
to be almost uniform. See [35] for a discussion on connections
between the combined condition above and the usual separate
conditions for recovery and secrecy.
Definition 3. Given 0 ≤ ε < 1, the supremum over lengths
log |K| of an ε-SK is denoted by Sε (X, Y ).
A key tool for generating secret keys is the leftover hash
lemma [19], [28] which, given a random variable X and an lbit eavesdropper’s observation Z, allows us to extract roughly
Hmin (PX ) − l bits of uniform bits, independent of Z. Here
Hmin denotes the min-entropy and is given by
Hmin (PX ) = sup log
x
1
.
PX (x)
7
Formally, let F be a 2-universal family of mappings f : X →
K, i.e., for each x0 6= x, the family F satisfies
1
1 X
1(f (x) = f (x0 )) ≤
.
|F|
|K|
f ∈F
Lemma 5 (Leftover Hash). Consider random variables X
and Z taking values in a countable set X and a finite set Z,
respectively. Let S be a random seed such that fS is uniformly
distributed over a 2-universal family F. Then, for K = fS (X)
q
kPKZS − Punif PZS k ≤ |K||Z|2−Hmin (PX ) ,
where Punif is the uniform distribution on K.
The version above is a straightforward modification of the
leftover hash lemma in, for instance, [27] and can be derived
in a similar manner (see Appendix B of [16]).
Next, we recall the conditional independence testing upper
bound on Sε (X, Y ), which was established in [35], [36].
In fact, the general upper bound in [35], [36] is a singleshot upper bound on the secret key length for a multiparty
secret key agreement problem with side information at the
eavesdropper. Below, we recall a specialization of the general
result for the two party case with no side information at the
eavesdropper. In order to state the result, we need the following
concept from binary hypothesis testing.
Consider a binary hypothesis testing problem with null
hypothesis P and alternative hypothesis Q, where P and Q are
distributions on the same alphabet V. Upon observing a value
v ∈ V, the observer needs to decide if the value was generated
by the distribution P or the distribution Q. To this end, the
observer applies a stochastic test T, which is a conditional
distribution on {0, 1} given an observation v ∈ V. When
v ∈ V is observed, the test T chooses the null hypothesis
with probability T(0|v) and the alternative hypothesis with
probability T (1|v) = 1 − T (0|v). For 0 ≤ ε < 1, denote by
βε (P, Q) the infimum of the probability of error of type II
given that the probability of error of type I is less than ε, i.e.,
βε (P, Q) :=
inf
T : P[T]≥1−ε
Q[T],
(7)
where
P[T]
=
X
P(v)T(0|v),
v
Q[T]
=
X
Q(v)T(0|v).
v
The following upper bound for Sε (X, Y ) was established
in [35], [36].
Theorem 6 (Conditional independence testing bound).
Given 0 ≤ ε < 1, 0 < η < 1 − ε, the following bound
holds:
Sε (X, Y ) ≤ − log βε+η PXY , QX QY + 2 log(1/η),
for all distributions QX and QY on on X and Y, respectively.
We close by noting a further upper bound for βε (P, Q),
which is easy to derive (cf. [25]).
Lemma 7. For every 0 ≤ ε ≤ 1 and λ,
P (X)
<λ −ε
,
− log βε (P, Q) ≤ λ − log P log
Q (X)
+
where (x)+ = max{0, x}.
B. Converse bound for almost uniform distribution
First, we consider a converse bound under the almost
uniformity assumption. Suppose that there exist λmin and λmax
such that
λmin ≤ − log PXY (x, y) ≤ λmax ,
∀(x, y) ∈ supp(PXY ),
(8)
where supp(PXY ) denotes the support of PXY . We call such
a distribution PXY an almost uniform distribution with margin
∆ = (λmax − λmin ).
Theorem 8. Let PXY be almost uniform with margin ∆.
Given 0 ≤ ε < 1, for every 0 < η < 1−ε, and all distributions
QX and QY , it holds that
Lε (X, Y )
2
PXY (X, Y )
≥γ
≥ γ + log P − log
QX (X) QY (Y )
!
!
− ε − 2η
+
1
− ∆ − 4 log − 1.
η
Remark 1. If ∆ ≈ 0 (the almost uniform case), the bound
above yields Result 2 upon choosing QX = PX and QY =
PY .
Proof. Given a protocol π of length l that attains ε-DE,
using Lemma 5 we can generate an (ε + η)-SK that is almost
independent of Π and takes values in K with
log |K| ≥ λmin − l − 2 log(1/η) − 1.
Also, by Theorem 6
log |K| ≤ − log βε+2η (PXY , QX QY ) + 2 log(1/η),
which along with the inequality above and Lemma 7 yields
PXY (X, Y )
l ≥ λmin + log P log
< λ − ε − 2η
QX (X) QY (Y )
+
− λ − 4 log(1/η) − 1.
The claimed bound follows upon choosing λ = λmax − γ and
using assumption (8).
C. Converse bound for all distributions
The shortcoming of Theorem 8 is the ∆-loss, which is
negligible only if λmax ≈ λmin . To circumvent this loss, we
divide the spectrum of PXY into slices such that, conditioned
on any slice, the distribution is almost uniform with a small
margin ∆. To lower bound the worst-case communication
complexity of a given protocol, we identify a particular slice
where appropriately many bits are communicated; the required
slice is selected using Lemma 9 below.
8
Given λmax , λmin , and ∆ > 0, let N be as in (3), T0
be as in (5), and λi and Ti , too, be as defined there, with
hPX|Y (x|y) replaced by hPXY (xy) in those definitions. Let
random variable J take the value j when {(X, Y ) ∈ Tj }. For
a protocol Π attaining ε-DE, denote
Ecorrect := {X = X̂, Y = Ŷ },
Eγ := {h(X4Y ) ≥ γ},
(9)
Ej := Ecorrect ∩ T0c ∩ Eγ ∩ {J = j},
Pγ := PXY (Eγ ) .
1 ≤ j ≤ N,
Lemma 9. There exists an index 1 ≤ j ≤ N such that
PJ (j) > 1/N 2 and
1
.
PXY |J (Ej | j) ≥ Pγ − ε − PXY (T0 ) −
N
Proof. Let J1 be the set of indices 1 ≤ j ≤ N such that
PJ (j) > 1/N 2 , and let J2 = {1, ..., N } \ J1 . Note that
PJ (J2 ) ≤ 1/N . Therefore,
T0c
Pγ − ε − PXY (T0 ) ≤ P (Ecorrect ∩
∩ Eγ )
X
≤
PJ (j) PXY |J (Ej | j) + PJ (J2 )
j∈J1
≤ max PXY |J (Ej | j) +
j∈J1
1
.
N
Thus, the maximizing j ∈ J1 on the right satisfies the claimed
properties.
We now state our main converse bound.
Theorem 10 (Single-shot converse). For 0 ≤ ε < 1, 0 < η <
1 − ε, and parameters ∆, N as above, the following lower
bound on Lε (X, Y ) holds:
1
Lε (X, Y ) ≥ γ + 3 log Pγ − ε − PXY (T0 ) −
N +
1
+ log(1 − 2η) − ∆ − 6 log N − 4 log − 1.
η
Proof. Let j satisfy the properties stated in Lemma 9. The
basic idea is to apply Theorem 8 to PXY |Ej , where PXY |Ej
denotes the conditional distributions on X, Y given the event
Ej .
First, we have
PXY |Ej (x, y) ≥ PXY (x, y) .
(10)
Furthermore, denoting α = Pγ − ε − PXY (T0 ) − 1/N and
noting PJ (j) > 1/N 2 , we have for all (x, y) ∈ Ej that
1
PXY |Ej (x, y) ≤ PXY |J=j (x, y)
(11)
α
2
N
≤
PXY (x, y) ,
(12)
α
where PXY |J=j denotes the conditional distributions on X, Y
given {J = j}. Thus, (10) and (12) together imply, for all
(x, y) ∈ Ej ,
λj + log α − 2 log N ≤ − log PXY |Ej (x, y) ≤ λj + ∆,
i.e., PXY |Ej is almost uniform with margin ∆−log α+2 log N
(cf. (8)). Also, note that (12) implies
PXY |Ei (X, Y )2
PXY |Ej − log
≥ γ + 2 log α − 4 log N
PX (X) PY (Y )
!
2
PXY (X, Y )
≥ PXY |Ej − log
≥γ
PX (X) PY (Y )
= PXY |Ei (Eγ )
= 1,
where the final equality holds by the definition of Eγ in (9).
Moreover,
PXY |Ej X = X̂, Y = Ŷ = 1.
Thus, the proof is completed by applying Theorem 8 to
PXY |Ej with QX = PX and QY = PY , and ∆ − log α +
2 log N in place of ∆.
D. Converse bound for simple communication protocol
We close by noting a lower bound for the length of
communication when we restrict to simple communication.
For simplicity assume that the joint distribution PXY is
indecomposable, i.e., the maximum common function of X
and Y is a constant (see [12]) and the parties can’t agree
on even a single bit without communicating (cf. [37]). The
following bound holds by a standard converse argument using
the information spectral method (cf. [13, Lemma 7.2.2]).
Proposition 11. For 0 ≤ ε < 1, we have
Lsε (X, Y )
≥ inf l1 + l2 : ∀δ > 0,
P h(X|Y ) > l1 + δ or h(Y |X) > l2 + δ ≤ ε + 2 · 2−δ .
Proof: Since randomization (local or shared) does not
help in improving the length of communication (cf. [20, Chapter 3]) we can restrict to deterministic protocols. Then, since
PXY is indecomposible, both parties have to predetermine the
lengths of messages they send; let l1 and l2 , respectively, be
the length of message sent by the first and the second party.
For δ > 0, let
n
o
T1 := (x, y) : − log PX|Y (x|y) ≤ l1 + δ ,
n
o
T2 := (x, y) : − log PY |X (y|x) ≤ l2 + δ ,
and T := T1 ∩ T2 . Let A1 and A2 be the set of all (x, y) such
that party 2 and party 1 correctly recover x and y, respectively,
and let A := A1 ∩ A2 . Then, for any simple communication
protocol that attains ε-DE, we have
PXY (T c ) = PXY (T c ∩ Ac ) + PXY (T c ∩ A)
≤ PXY (Ac ) + PXY (T1c ∩ A) + PXY (T2c ∩ A)
≤ ε + PXY (T1c ∩ A1 ) + PXY (T2c ∩ A2 )
≤ ε + 2 · 2−δ ,
where the last inequality follows by a standard argument
9
∆=
(cf. [13, Lemma 7.2.2]) as follows:
X
PXY (T1c ∩ A1 ) ≤
PY (y) PX|Y (T1c ∩ A1 |y)
=N
η = ∆,
y
≤
X
≤
X
≤
X
y
y
PY (y) |{x : (x, y) ∈ A1 }|2−l1 −δ
lmax = n(H(X4Y) + δ) + 3∆ + 1
√
= n(H(X4Y) + δ) + O( n),
PY (y) |{x : (x, y) ∈ A1 }|2−l1 −δ
PY (y) 2−δ
y
= 2−δ ,
and similarly for PXY (T2c ∩ A2 ); the desired bound follows.
While the best rate of communication required for two
parties to exchange their data is known [8], and it can be
attained by simple (noninteractive) Slepian-Wolf compression
on both sides, the problem remains unexplored for general
sources. In fact, the answer is completely different in general
and simple Slepian-Wolf compression is suboptimal.
Formally, let (Xn , Yn ) with joint distribution7 PXn Yn be a
sequence of sources. We need the following concepts from the
information spectrum method; see [13] for a detailed account.
For random variables (X, Y) = {(Xn , Yn )}∞
n=1 , the the inf
entropy rate H(XY) and the sup entropy rate H(XY) are
defined as follows:
1
H(XY) = sup α | lim P
h(Xn Yn ) < α = 0 ,
n→∞
n
1
h(Xn Yn ) > α = 0 ;
H(XY) = inf α | lim P
n→∞
n
the sup-conditional entropy rate H(X|Y) is defined analogously by replacing h(Xn Yn ) with h(Xn |Yn ). To state our result, we also need another quantity defined by a limit-superior
in probability, namely the sup sum conditional entropy rate,
given by
H(X4Y)
1
h(Xn 4Yn ) > α = 0 .
= inf α | lim P
n→∞
n
=
R∗ (X, Y) = H(X4Y).
Proof. The claim follows from Theorems 2 and 10 on
choosing the spectrum slicing parameters λmin , λmax , and ∆
appropriately.
Specifically, using Theorem 2 with
λmax = n(H(X, Y) + δ),
7 The
distributions PXn Yn need not satisfy the consistency conditions.
λmin = n(H(X, Y) − ∆),
λmax = n(H(X, Y) + ∆),
γ = n(H(X4Y) − δ)
for arbitrarily fixed δ > 0, we get for n sufficiently large that
Lεn (Xn , Yn ) ≥ n(H(X4Y) − δ) + o(n).
Since δ > 0 is arbitrary, the proof is complete.
VII. S TRONG CONVERSE AND SECOND - ORDER
ASYMPTOTICS
We now turn to the case of IID observations (X n , Y n ) and
establish the second-order asymptotic term in Lε (X n , Y n ).
Theorem 13. For every 0 < ε < 1,
√
√
Lε (X n , Y n ) = nH(X4Y ) + nV Q−1 (ε) + o( n).
Proof. As before, we only need to choose appropriate
parameters in Theorems 2 and 10. Let T denote the third
central moment of the random variable h(X4Y ).
For the achievability part, note that for IID random
√ variables
(X n , Y n ) the spectrum of PX n Y n has width O( n). Therefore, the parameters ∆ and N can be O(n1/4 ). Specifically, by
standard measure concentration bounds (for bounded random
variables), for every δ > 0 √
there exists a constant c such √
that
with λmax = nH(XY ) + c n and λmin = nH(XY ) − c n,
P ((X n , Y n ) ∈ T0 ) ≤ δ.
The result below characterizes R∗ (X, Y) (see Definition 2).
λmin = n(H(X, Y) − δ),
where δ > 0 is arbitrary, we get a communication protocol of
rate H(X4Y) + δ + O(n−1/2 ) attaining εn -DE with εn → 0.
Since δ > 0 is arbitrary, R∗ (X, Y) ≤ H(X4Y).
For the other direction, given a sequence of protocols
attaining εn -DE with εn → 0. Let
and so, N = O(n). Using Theorem 10 with
VI. G ENERAL SOURCES
Theorem 12. For a sequence of sources (X, Y)
{(Xn , Yn )}∞
n=1 ,
p
λmax − λmin
For
λn = nH(X4Y ) +
√
nV Q
−1
ε − 2δ −
T3
√
2V 3/2 n
,
√
choosing ∆ = N = η = 2cn1/4 , and lmax = λn + 3∆ + 1
in Theorem 2, we get a protocol of length lmax satisfying
!
n
X
P X 6= X̂, or Y 6= Ŷ ≤ P
h(Xi 4Yi ) > λn + 2δ,
i=1
for n sufficiently large. Thus, the Berry-Esséen theorem
(cf. [11]) and the observation above gives a protocol of length
lmax attaining ε-DE. Therefore, using the Taylor approximation of Q(·) yields the achievability of the claimed protocol
length; we skip the details of this by-now-standard argument
(see, for instance, [26]).
10
Similarly, the converse follows by Theorem 10 and the
Berry-Esséen theorem upon choosing λmax , λmin , and N as in
the proof of converse part of Theorem 12 when λn is chosen
to be
√
T3
1
√
λn = nH(X4Y ) + nV Q−1 ε − 2 −
N
2V 3/2 n
√
= nH(X4Y ) + nV Q−1 (ε) + O(log n),
where the final equality is by the Taylor approximation of
Q(·).
In the previous section, we saw that interaction is necessary
to attain the optimal first order asymptotic term in Lε (Xn , Yn )
for a mixture of IID random variables. In fact, even for IID
random variables interaction is needed to attain the correct
second order asymptotic term in Lε (X n , Y n ), as shown by
the following example.
Example 1. Consider random variables X and Y with an
indecomposable joint distribution PXY such that the matrix
V = Cov([− log PX|Y (X|Y ) , − log PY |X (Y |X)])
V is nonsingular. For IID random variables (X n , Y n ) with
common distribution PXY , using Proposition 11 and a multidimensional Berry-Esséen theorem (cf. [31]), we get that
the second-order asymptotic term for the minimum length of
simple communication for ε-DE is given by8
√
√
Lsε (X n , Y n ) = nH(X4Y ) + nDε + o( n),
where
n
o
Dε := inf r1 + r2 : P (Z1 ≤ r1 , Z2 ≤ r2 ) ≥ 1 − ε ,
for Gaussian vector Z = [Z1 , Z2 ] with mean [0, 0] and
covariance matrix V. Since V is nonsingular,9 we have
n
o
√
V Q−1 (ε) = inf r : P Z1 + Z2 ≤ r ≥ 1 − ε
< Dε .
Therefore, Lε (X n , Y n ) has strictly smaller second order term
than Lsε (X n , Y n ), and interaction is necessary for attaining
the optimal second order term in Lε (X n , Y n ).
VIII. D ISCUSSION
We have presented an interactive data exchange protocol and
a converse bound which shows that, in a single-shot setup, the
parties can exchange data using roughly h(X∆Y ) bits when
the parties observe X and Y . Our analysis is based on the
information spectrum approach. In particular, we extend this
approach to enable handling of interactive communication. A
key step is the spectrum slicing technique which allows us to
split a nonuniform distribution into almost uniform “spectrum
slices”. Another distinguishing feature of this work is our
converse technique which is based on extracting a secret key
from the exchanged data and using an upper bound for the
8 The achievability part can be derived by a slight modification of the
arguments in [22],[13, Lemma 7.2.1].
9 For instance, when X is uniform random variable on {0, 1} and Y is
connected to X via a binary symmetric channel, the covariance matrix V is
singular and interaction does not help.
rate of this secret key. In effect, this falls under the broader
umbrella of common randomness decomposition methodology
presented in [32] that studies a distributed computing problem
by dividing the resulting common randomness into different
independent components with operational significance. As a
consequence, we obtain both the optimal rate for data exchange for general sources as well as the precise second-order
asymptotic term for IID observations (which in turn implies a
strong converse). Interestingly, none of these optimal results
can be obtained by simple communication and interaction is
necessary, in general. Note that our proposed scheme uses
O(n1/4 ) rounds of interaction; it remains open if fewer rounds
of interaction will suffice.
Another asymptotic regime, which was not considered in
this paper, is the error exponent regime where we seek to characterize the largest possible rate of exponential decay of error
probability with blocklength for IID observations. Specifically,
denoting by Perr (l|X, Y ) the least probability of error ε that
can be attained for data exchange by communicating less than
l bits, i.e.,
Perr (l|X, Y ) := inf{ε : Lε (X, Y ) ≤ l},
we seek to characterize the limit of
1
− log Perr 2nR |X n , Y n .
n
The following result is obtained using a slight modification
of our single-shot protocol for data exchange where the slices
of the spectrum Ti in (6) are replaced with type classes and
the decoder is replaced by a special case of the α-decoder
introduced in [6]. For a fixed rate R ≥ 0, our modified protocol
enables data exchange, with large probability, for every (x, y)
with joint type PX Y such that (roughly)
R > H(X4Y ).
The converse part follows from the strong converse of Result 4,
together with a standard measure change argument (cf. [7]).
The formal proof is given in Appendix A.
Result 6 (Error Exponent Behaviour). For a given rate R >
H(X4Y ), define
Er (R) := min D(QX Y kPXY ) + |R − H(X4Y )|+
QX Y
and
Esp (R) :=
inf
QX Y ∈Q(R)
D(QX Y kPXY ),
where |a|+ = max{a, 0} and
Q(R) := QX Y : R < H(X4Y ) .
Then, it holds that
1
lim inf − log Perr 2nR |X n , Y n ≥ Er (R)
n→∞
n
and that
1
lim sup − log Perr 2nR |X n , Y n ≤ Esp (R).
n
n→∞
Er (R) and Esp (R), termed the random coding exponent
and the sphere-packing exponent, may not match in general.
11
However, when R is sufficiently close to H(X4Y ), the two
bounds can be shown to coincide. In fact, in Appendix B we
exhibit an example where the optimal error exponent attained
by interactive protocols is strictly larger than that attained by
simple communication. Thus, in the error exponent regime,
too, interaction is strictly necessary.
following bound holds:
n
o
Nh (X X̂ Y )
≤
exp
−n(R
−
H(
X̂|X
Y
)
−
δ
)
,
n
φ(P
)
X̂ Y
|TXn Y |
(13)
where
δn = |X |2 |Y|
A PPENDIX
A. Achievability Proof of Result 6
In this appendix, we consider the error exponent and prove
Result 6. We use the method of types. The type of a sequence x
is denoted by Px . For a given type PX , the set of all sequences
of type PX is denoted by TXn . The set of all types on alphabet
X is denoted by Pn (X ). We use similar notations for joint
types and conditional types. For a pair (x, y) with joint type
PX Y , we denote H(x4y) = H(X4Y ). We refer the reader
to [7] for basic results on the method of type.
Fix R > 0 as the rate of communication exchanged (by
both the parties), but without adding the rate contributed
by ACK-NACK messages exchanged. We consider r rounds
R
protocol, where r = d ∆
e for a fixed ∆ > 0. Let Ri = i∆
for i = 1, . . . , r. Basic idea of the protocol is the same as
our single-shot protocol, i.e., we increment the hash size in
steps. However, when we consider the error exponent regime,
to reduce the contribution of “binning error” to the error
exponent, we need a more carefully designed protocol.
For a given joint type PX Y , the key modification we make
is to delay the start of communication by Party 2 (which started
once Ri > H(X|Y ) was satisfied). Heurisitcally, once Party 2
can decode x correctly, he can send y to Party 1 without error
by using roughly10 nH(Y |X) bits, where PX Y = Pxy . Thus,
the budget Party 1 can use is R−H(Y |X), which is larger than
H(X|Y ) when R > H(X4Y ). Therefore, allowing Party 1
to communicate more before Party 2 starts may reduce the
binning error probability.
Motivated by this reason, we assign the timing of decoding
to each joint type as follows:
φ(PX Y ) := min i : 1 ≤ i ≤ r, Ri ≥ R − H(Y |X) − ∆
= max i : 1 ≤ i ≤ r, Ri < R − H(Y |X)
if R − H(Y |X) − ∆ > 0, and φ(PX Y ) = 0 is R − H(Y |X) −
∆ ≤ 0.
For given hash functions h = (h1 , . . . , hr ) with hi : X n →
{1, . . . , 2dn∆e }, let Nh (X X̂ Y ) denote, for each joint type
PX X̂ Y , the number of pairs (x, y) ∈ TXn Y such that for some
x̂ 6= x with Pxx̂y = PX X̂ Y , the relations
hi (x) = hi (x̂), i = 1, . . . , φ(PX̂ Y )
hold. The next result is a slight modification of a lemma in
[6, Section 3]; the proof is almost the same and is omitted.
Lemma 14. There exist hash functions h = (h1 , . . . , hr ) such
that for every joint type PX X̂ Y such that φ(PX̂ Y ) 6= 0, the
10 Since Party 2 has to send the joint type P
X Y to Party 1, additional
|X ||Y| log(n + 1) bits are needed.
log(n + 1)
.
n
For the decoder, we use the minimum sum conditional
entropy decoder, which is a kind of α-decoder introduced in
[6].
Our protocol is described in Protocol 2.
Protocol 2: Type-based interactive data exchange protocol
Input: Observations X n and Y n , parameter ∆, and rate
R
Output: Estimate X̂ n of X n at Party 2 and Ŷ n of Y n at
Party 1
while 1 ≤ i ≤ N and Party 2 did not send an ACK do
Party 1 sends Π2i−1 = hi (X n )
if for Y n = y, Party 2 finds a unique x such that
φ(Pxy ) = i, hj (x) = Π2j−1 , ∀ 1 ≤ j ≤ i, and
H(x4y) ≤ H(x̂4y) for every x̂ 6= x satisfying
hj (x̂) = Π2j−1 , ∀ 1 ≤ j ≤ i then
set X̂ n = x
send back Π2i = ACK
else
if More than one such x found then
protocol declares an error
else
send back Π2i = NACK
Reset i → i + 1
if No X̂ n found at Party 2 then
Protocol declares an error
Party 2 send the joint type PX Y of (X̂ n , Y n ) = (x, y),
and send the index of y among TYn|X (x).
The achievability part of Result 6 can be seen as follows. Fix
a joint type PX Y . If φ(PX Y ) = 0, then an error occurs whenever (x, y) ∈ TXn Y . We also note that R − H(Y |X) − ∆ ≤ 0
implies |R − H(X4Y ) − ∆|+ = 0. Thus, the probability of
this kind of error is upper bounded by
X
exp{−n[D(PX Y kPXY )
P
∈Pn (X ×Y)
XY
φ(P
)=0
XY
+ |R − H(X4Y ) − ∆|+ ]}. (14)
Next, consider the case when φ(PX Y ) ≥ 1. For given conditional type PX̂|X Y , a sequence x̂ with (x, x̂, y) ∈ TXn X̂ Y
causes an error when
1) φ(PX̂ Y ) ≤ φ(PX Y ),
2)
hi (x̂) = hi (x), i = 1, . . . , φ(PX̂ Y )
12
3)
B. An Example Such That Interaction Improves Error Exponent
H(X̂4Y ) ≤ H(X4Y ).
Consider the following source: X and Y are both binary,
and PXY is given by
Also note that φ(PX Y ) = i implies
H(Y |X) < R − Ri ,
i.e., once x is recovered correctly, y can be sent without an
error. Thus, the error probability of this kind is upper bounded
by
X
exp{−nD(PX Y kPXY )}
∈Pn (X ×Y)
P
XY
φ(P
)≥1
XY
X
P
X̂|X Y
H(X̂4Y )≤H(X4Y )
≤
X
P
∈Pn (X ×Y)
XY
φ(P
)≥1
XY
1
,
3
that is, X and Y are connected by a Z-channel. To evaluate Esp (R), without loss of generality, we can assume that
QX Y (0, 1) = 0 (since otherwise D(QX Y kPXY ) = ∞). Let
us consider the following parametrization:
PXY (0, 0) = PXY (1, 0) = PXY (1, 1) =
QX Y (0, 0) = u, QX Y (1, 0) = 1 − u − v, QX Y (1, 1) = v,
Nh (X X̂ Y )
|TXn Y |
where 0 ≤ u, v ≤ 1. Then, we have
D(QX Y kPXY ) = log 3 − H({u, 1 − u − v, v})
X
exp{−nD(PX Y kPXY )}
and
P
H(X|Y ) + H(Y |X)
X̂|X Y
H(X̂4Y )≤H(X4Y )
= κ(u, v)
+
exp{−n|Rφ(PX̂Y ) − H(X̂|X Y ) − δn | }
X
≤
exp{−nD(PX Y kPXY )}
∈Pn (X ×Y)
P
XY
φ(P
)≥1
XY
P
X̂|X Y
H(X̂4Y )≤H(X4Y )
exp{−n|R − H(Y |X̂) − H(X̂|Y ) − ∆ − δn |+ }
X
X
=
exp{−nD(PX Y kPXY )}
P
X̂|X Y
H(X̂4Y )≤H(X4Y )
exp{−n|R − H(X̂4Y ) − ∆ − δn |+ }
X
≤
exp{−nD(PX Y kPXY )}
P
∈Pn (X ×Y)
XY
)≥1
φ(P
XY
X
P
X̂|X Y
H(X̂4Y )≤H(X4Y )
exp{−n|R − H(X4Y ) − ∆ − δn |+ }
X
2
≤
exp{−nD(PX Y kPXY )}(n + 1)|X | |Y|
P
∈Pn (X ×Y)
XY
φ(P
)≥1
XY
+
exp{−n|R − H(X4Y ) − ∆ − δn | }.
Thus, by combining this with (14), the total error probability
is upper bounded by
(n + 1)|X |
2
|Y|+|X ||Y|
exp{−n min [D(PX Y kPXY )
PX Y
+ |R − H(X4Y ) − ∆ − δn |+ ]}.
Since ∆ can be taken arbitrarily small, and the number of
bits needed to send ACK-NACK is at most r.11 Consequently,
Protocol 2 attains the exponent given in Result 6.
11 Our
:= (1 − v)h
P
exp{−n|R − H(Y |X̂) − H(X̂|X Y ) − ∆ − δn |+ }
X
X
≤
exp{−nD(PX Y kPXY )}
P
∈Pn (X ×Y)
XY
)≥1
φ(P
XY
X
X̂|X Y
H(X̂4Y )≤H(X4Y )
P
∈Pn (X ×Y)
XY
)≥1
φ(P
XY
(15)
type-based protocol uses only constant number of rounds of interaction (independent of n).
u
1−v
+ (1 − u)h
v
1−u
.
When the rate R is sufficiently close to H(X4Y ) =
κ(1/3, 1/3) = 4/3, the set Q(R) is not empty.12 Since (15)
and κ(u, v) are both symmetric with respect to u and v and
(15) and Q(R) are convex function and convex set, respectively, the optimal solution (u∗ , v ∗ ) in the infimum of Esp (R)
satisfies u∗ = v ∗ . Furthermore, since R > κ(1/3, 1/3), we
also have u∗ = v ∗ 6= 1/3.
Note that for R sufficiently close to H(X4Y ), Esp (R)
can be shown to equal Er (R). Thus, to show that a simple
communication is strictly suboptimal for error exponent, it
s
(R), where the latter
suffices to show that Esp (R) > Esp
s
quantity Esp (R) corresponds to the sphere packing bound for
error exponent using simple communication and is given by
s
Esp
(R) :=
max
inf
(R1 ,R2 ): QX Y ∈Qs (R1 ,R2 )
R1 +R2 ≤R
D(QX Y kPXY )
and
Qs (R1 , R2 ) := QX Y : R1 < H(X|Y ) or R2 < H(Y |X) .
Since the source is symmetric with respect to X and Y , for
s
evaluating Esp
(R) we can assume without loss of generality
†
v†
1
that R1 ≥ R2 . Let u† := u∗ and v † := 1−u
so that 1−u
† = 2.
2
†
Let QX
be the distribution that corresponds to (u† , v † ). Note
Y
†
that QX Y satisfies
v†
†
H(Y |X) = (1 − u )h
1 − u†
v∗
∗
> (1 − u )h
1 − u∗
R
≥
2
12 In
fact, we can check that
κ(z,z)
dz
z=1/3
= −1, and thus the function
κ(z, z) takes its maximum away from (1/3, 1/3).
13
s
which implies Esp (R) > Esp
(R).
≥ R2 ,
and so, Q†X Y ∈ Qs (R1 , R2 ). For this choice of Q†X Y , we
have
D(Q∗X Y
∗
∗
∗
∗
kPXY ) = log 3 − H({u , 1 − u − v , v })
v∗
∗
∗
= log 3 − h(1 − u ) − (1 − u )h
1 − u∗
v†
†
†
> log 3 − h(1 − u ) − (1 − u )h
1 − u†
= D(Q†X Y kPXY ),
[4] M. Braverman and A. Rao, “Information equals amortized communication,” in FOCS, 2011, pp. 748–757.
[5] T. M. Cover and J. A. Thomas, Elements of Information Theory. 2nd
edition. John Wiley & Sons Inc., 2006.
[6] I. Csiszár, “Linear codes for sources and source networks: Error exponents, universal coding,” IEEE Trans. Inf. Theory, vol. 28, no. 4, pp.
585–592, July 1982.
[7] I. Csiszár and J. Körner, Information theory: Coding theorems for
discrete memoryless channels. 2nd edition. Cambridge University Press,
2011.
[8] I. Csiszár and P. Narayan, “Secrecy capacities for multiple terminals,”
IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047–3061, December
2004.
[9] S. C. Draper, “Universal incremental slepian-wolf coding,” Proc. Conference on Communication, Control, and Computing (Allerton), October
2004.
[10] M. Feder and N. Shulman, “Source broadcasting with unknown amount
of receiver side information,” in ITW, Oct 2002, pp. 127–130.
[11] W. Feller, An Introduction to Probability Theory and its Applications,
Volume II. 2nd edition. John Wiley & Sons Inc., UK, 1971.
[12] P. Gács and J. Körner, “Common information is far less than mutual
information,” Problems of Control and Information Theory, vol. 2, no. 2,
pp. 149–162, 1973.
[13] T. S. Han, Information-Spectrum Methods in Information Theory [English Translation]. Springer, 2003.
[14] T. S. Han and S. Verdú, “Approximation theory of output statistics,”
IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752–772, May 1993.
[15] M. Hayashi, “Second-order asymptotics in fixed-length source coding
and intrinsic randomness,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp.
4619–4637, Oct 2008.
[16] M. Hayashi, H. Tyagi, and S. Watanabe, “Secret key agreement: General
capacity and second-order asymptotics,” arXiv:1411.0735, 2014.
[17] ——, “Secret key agreement: General capacity and second-order asymptotics,” ISIT, 2014.
[18] M. Hayashi, “Information spectrum approach to second-order coding
rate in channel coding,” IEEE Trans. Inf. Theory, vol. 55, no. 11, pp.
4947–4966, Novemeber 2009.
[19] R. Impagliazzo, L. A. Levin, and M. Luby, “Pseudo-random generation from one-way functions,” Proc. Annual Symposium on Theory of
Computing, pp. 12–24, 1989.
[20] E. Kushilevitz and N. Nisan, Communication Complexity. New York,
NY, USA: Cambridge University Press, 1997.
[21] U. M. Maurer, “Secret key agreement by public discussion from common
information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, May
1993.
[22] S. Miyake and F. Kanaya, “Coding theorems on correlated general
sources,” IIEICE Trans. Fundamental, vol. E78-A, no. 9, pp. 1063–
1070, September 1995.
R EFERENCES
[1] R. Ahlswede and I. Csiszár, “Common randomness in information theory
and cryptography–part i: Secret sharing,” IEEE Trans. Inf. Theory,
vol. 39, no. 4, pp. 1121–1132, July 1993.
[2] Y. Altuğ and A. B. Wagner, “Feedback can improve the second-order
coding performance in discrete memoryless channels,” ISIT, 2014.
[3] C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized
privacy amplification,” IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915–
1923, November 1995.
[23] A. Orlitsky and A. El Gamal, “Communication with secrecy constraints,”
STOC, pp. 217–224, 1984.
[24] A. Orlitsky, “Worst-case interactive communication i: Two messages are
almost optimal,” IEEE Trans. Inf. Theory, vol. 36, no. 5, pp. 1111–1126,
1990.
[25] Y. Polyanskiy, “Channel coding: non-asymptotic fundamental limits,”
Ph. D. Dissertation, Princeton University, 2010.
[26] Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the
finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp.
2307–2359, May 2010.
[27] R. Renner, “Security of quantum key distribution,” Ph. D. Dissertation,
ETH Zurich, 2005.
[28] R. Renner and S. Wolf, “Simple and tight bounds for information
reconciliation and privacy amplification,” in ASIACRYPT, 2005, pp. 199–
216.
[29] D. Slepian and J. Wolf, “Noiseless coding of correlated information
source,” IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471–480, July
1973.
[30] V. Strassen, “Asymptotische abschätzungen in Shannon’s informationstheorie,” Third Prague Conf. Inf. Theory, pp. 689–723, 1962, English
translation: http://www.math.cornell.edu/∼pmlut/strassen.pdf.
[31] V. Y. F. Tan and O. Kosut, “On the dispersions of three network
information theory problems,” IEEE Trans. Inf. Theory, vol. 60, no. 2,
pp. 881–903, 2014.
[32] H. Tyagi, “Common randomness principles of secrecy,” Ph. D. Dissertation, Univeristy of Maryland, College Park, 2013.
[33] H. Tyagi, S. Venkatakrishnan, P. Viswanath, and S. Watanabe, “Information complexity density and simulation of protocols,” Proc. ACM
Conference on Innovations in Theoretical Computer Science (ITCS), pp.
381–391, 2016.
[34] ——, “Information complexity density and simulation of protocols,”
IEEE Trans. Inf. Theory, vol. 63, no. 11, pp. 6979–7002, Nov 2017.
[35] H. Tyagi and S. Watanabe, “A bound for multiparty secret key agreement
and implications for a problem of secure computing,” in EUROCRYPT,
2014, pp. 369–386.
[36] ——, “Converses for secret key agreement and secure computing,” IEEE
Trans. Inf. Theory, vol. 61, no. 9, pp. 4809–4827, Sept 2015.
[37] H. S. Witsenhausen, “On sequences of pairs of dependent random
variables,” Siam J. Appl. Math., vol. 28, no. 1, pp. 100–113, January
1975.
[38] E.-H. Yang and D.-K. He, “Interactive encoding and decoding for
one way learning: Near lossless recovery with side information at the
decoder,” Information Theory, IEEE Transactions on, vol. 56, no. 4, pp.
1808–1824, April 2010.
[39] E.-H. Yang, D.-K. He, T. Uyematsu, and R. W. Yeung, “Universal multiterminal source coding algorithms with asymptotically zero feedback:
fixed database case,” Information Theory, IEEE Transactions on, vol. 54,
no. 12, pp. 5575–5590, Dec. 2008.
| 7cs.IT
|
Blind-date Conversation Joining ∗
Luca Cesari1,2
1 Università
di Pisa, Italy
[email protected]
Rosario Pugliese2
2 Università
Francesco Tiezzi3
3 IMT
degli Studi di Firenze, Italy
[email protected]
Advanced Studies Lucca, Italy
[email protected]
[email protected]
We focus on a form of joining conversations among multiple parties in service-oriented applications
where a client may asynchronously join an existing conversation without need to know in advance
any information about it. More specifically, we show how the correlation mechanism provided by orchestration languages enables a form of conversation joining that is completely transparent to clients
and that we call ‘blind-date joining’. We provide an implementation of this strategy by using the
standard orchestration language WS-BPEL. We then present its formal semantics by resorting to
COWS, a process calculus specifically designed for modelling service-oriented applications. We
illustrate our approach by means of a simple, but realistic, case study from the online games domain.
1
Introduction
The increasing success of e-business, e-learning, e-government, and other similar emerging models, has
led the World Wide Web, initially thought of as a system for human use, to evolve towards an architecture for supporting automated use. A new computing paradigm has emerged, called Service-Oriented
Computing (SOC), that advocates the use of loosely-coupled services. These are autonomous, platformindependent, computational entities that can be described, published, discovered, and assembled as the
basic blocks for building interoperable and evolvable systems and applications. Currently, the most successful instantiation of the SOC paradigm are Web Services, i.e. sets of operations that can be published,
located and invoked through the Web via XML messages complying with given standard formats.
In SOC, service definitions are used as templates for creating service instances that deliver application functionalities to either end-user applications or other instances. Upon service invocation, differently from what usually happens in traditional client-server paradigms, the caller (i.e., a service client)
and the callee (i.e., a service provider) can engage in a conversation during which they exchange the
information needed to complete all the activities related to the specific service. For instance, a client
of an airplane ticket reservation service usually interacts several times with the service before selecting
the specific flight to be reserved. Although initially established between a caller and callee, a conversation can dynamically accommodate and dismiss participants. Therefore, a conversation is typically a
loosely-coupled, multiparty interaction among a (possibly dynamically varying) number of participants.
The loosely-coupled nature of SOC implies that, from a technological point of view, the connection
between communicating partners cannot be assumed to persist for the duration of a whole conversation.
Even the execution of a simple request-response message exchange pattern provides no built-in means of
automatically associating the response message with the original request. It is up to each single message
to provide a form of context thus enabling partners to associate the message with others. This is achieved
by including values in the message which, once located, can be used to correlate the message with others
logically forming the same stateful conversation. The link among partners is thus determined by so called
correlation values: only messages containing the ‘right’ correlation values are processed by the partner.
∗ This
work has been partially sponsored by the EU project ASCENS (257414).
A. Ravara and J. Silva (Eds.): 9th Workshop on
Automated Specification and Verification of Web Systems (WWV’13)
EPTCS 123, 2013, pp. 3–18, doi:10.4204/EPTCS.123.3
c L. Cesari, R. Pugliese & F. Tiezzi
This work is licensed under the
Creative Commons Attribution License.
4
Blind-date Conversation Joining
Message correlation is an essential part of messaging within SOC as it enables the persistence of activities’ context and state across multiple message exchanges while preserving service statelessness and
autonomy, and the loosely-coupled nature of SOC systems. It is thus at the basis of Web Services interaction which is implemented on top of stateless Internet protocols, such as the transfer protocol HTTP. For
example, the Internet Cookies used by web sites in order to relate an HTTP request to a user profile, thus
enabling to return a customized HTML file to the user, are correlation information. Besides being useful
to implement stateful communication on top of stateless protocols, correlation is also a flexible and user
programmable mechanism for managing loosely-coupled, multiparty conversations. Indeed, correlation
data can be communicated to other partners in order to allow them to join a conversation or to delegate
the task of carrying out an ongoing conversation.
In this paper, we show another evidence of the flexibility of the correlation mechanism that involves
creation of and joining conversations. More specifically, we demonstrate how correlation allows a partner
to asynchronously join an existing conversation without need to know in advance any information about
the conversation itself, such as e.g. its identifier or the other participants. Since this particular kind of
conversation joining is completely transparent to participants we call it blind-date joining. It can be used
in various domains like e-commerce, events organization, bonus payments, gift lists, etc. In the context
of e-commerce, for instance, a social shopping provider (e.g., Groupon [1]) can activate deals only if a
certain number of buyers adhere. In this scenario, the blind-date joining can be used to activate these
deals. As another example, blind-date joining can be used to organize an event only if a given number
of participants is reached. Specifically, the organizers can wait for the right amount of participants and,
when this is reached, they send the invitation with the location details to each of them.
We illustrate the blind-date joining strategy by exploiting a simple but realistic case study from the
online games domain. We then implement the case study via a well-established orchestration language
for web services, i.e. the OASIS standard WS-BPEL [20]. To better clarify and formally present the
semantics of the blind-date joining strategy we also introduce a specification of the case study, and its
step-by-step temporal evolution, using the process calculus COWS [15, 21], a formalism specifically
designed for specifying and combining SOC applications, while modelling their dynamic behaviour.
The rest of the paper is structured as follows. Section 2 surveys syntax and semantics of WSBPEL and COWS. Section 3 presents how blind-date conversation can be expressed in WS-BPEL
by implementing a case study from the online games domain. Section 4 formally describes, by using
COWS, the creation and joining phase of blind-date conversations. Finally, Section 5 concludes the
paper by also reviewing more closely related work.
2
A glimpse of WS-BPEL and COWS
This section presents a survey of WS-BPEL and COWS. The overview of WS-BPEL gives a highlevel description of the aspects captured by its linguistic constructs. Due to lack of space, the overview
of COWS gives only a glimpse of its semantics, a full account of which can be found in [21].
2.1
An overview of WS-BPEL
WS-BPEL [20] is essentially a linguistic layer on top of WSDL for describing the structural aspects of
Web Services ‘orchestration’, i.e. the process of combining and coordinating different Web Services to
obtain a new, customised service. In practice, and briefly, WSDL [8] is a W3C standard that permits
to express the functionalities offered and required by web services by defining, akin object interfaces in
L. Cesari, R. Pugliese & F. Tiezzi
5
Object-Oriented Programming, the structure of input and output messages of operations.
In WS-BPEL, the logic of interaction between a service and its environment is described in terms
of structured patterns of communication actions composed by means of control flow constructs that
enable the representation of complex structures. For the specification of orchestration, WS-BPEL provides many different activities that are distinguished between basic activities and structured activities.
Orchestration exploits state information that is stored in variables and is managed through message correlation. In fact, when messages are sent/received, the value of their parameters is stored in variables.
Likewise block structured languages, the scope of variables extends to the whole immediately enclosing
<scope>, or <process>, activity (whose meaning is clarified below).
The basic activities are: <invoke>, to invoke an operation offered by a Web Service; <receive>,
to wait for an invocation to arrive; <reply>, to send a message in reply to a previously received invocation; <wait>, to delay execution for some amount of time; <assign>, to update the values
of variables with new data; <throw>, to signal internal faults; <exit>, to immediately end a service instance; <empty>, to do nothing; <compensate> and <compensateScope>, to invoke
compensation handlers; <rethrow>, to propagate faults; <validate>, to validate variables; and
<extensionActivity>, to add new activity types. Notably, <reply> can be combined with
<receive> to model synchronous request-response interactions.
The structured activities describe the control flow logic of a business process by composing basic
and/or structured activities recursively. The structured activities are: <sequence>, to execute activities sequentially; <if>, to execute activities conditionally; <while> and <repeatUntil>, to
repetitively execute activities; <flow>, to execute activities in parallel; <pick>, to execute activities
selectively; <forEach>, to (sequentially or in parallel) execute multiple activities; and <scope>, to
associate handlers for exceptional events to a primary activity. Activities within a <flow> can be further synchronised by means of flow links. These are conditional transitions connecting activities to form
directed acyclic graphs and are such that a target activity may only start when all its source activities
have completed and the condition on the incoming flow links evaluates to true.
The handlers within a <scope> can be of four different kinds: <faultHandler>, to
provide the activities in response to faults occurring during execution of the primary activity;
<compensationHandler>, to provide the activities to compensate the successfully executed primary activity; <terminationHandler>, to control the forced termination of the primary activity;
and <eventHandler>, to process message or timeout events occurring during execution of the primary activity. If a fault occurs during execution of a primary activity, the control is transferred to the
corresponding fault handler and all currently running activities inside the scope are interrupted immediately without involving any fault/compensation handling behaviour. If another fault occurs during a
fault/compensation handling, then it is re-thrown, possibly, to the immediately enclosing scope. Compensation handlers attempt to reverse the effects of previously successfully completed primary activities
(scopes) and have been introduced to support Long-Running (Business) Transactions (LRTs). Compensation can only be invoked from within fault or compensation handlers starting the compensation either
of a specific inner (completed) scope, or of all inner completed scopes in the reverse order of completion.
The latter alternative is also called the default compensation behaviour. Invoking a compensation handler
that is unavailable is equivalent to perform an empty activity.
A WS-BPEL program, also called (business) process, is a <process>, that is a sort of <scope>
without compensation and termination handlers.
WS-BPEL uses the basic notion of partner link to directly model peer-to-peer relationships between
services. Such a relationship is expressed at the WSDL level by specifying the roles played by each
of the services in the interaction. This information, however, does not suffices to deliver messages to a
6
Blind-date Conversation Joining
service. Indeed, since multiple instances of the same service can be simultaneously active because service
operations can be independently invoked by several clients, messages need to be delivered not only to
the correct partner, but also to the correct instance of the service that the partner provides. To achieve
this, WS-BPEL relies on the business data exchanged rather than on specific mechanisms, such as WSAddressing [10] or low-level methods based on SOAP headers. In fact, WS-BPEL exploits correlation
sets, namely sets of correlation variables (called properties), to declare the parts of a message that can
be used to identify an instance. This way, a message can be delivered to the correct instance on the basis
of the values associated to the correlation variables, independently of any routing mechanism.
2.2
An overview of COWS
COWS [15, 21] is a formalism for modelling (and analysing) service-oriented applications. It provides
a novel combination of constructs and features borrowed from well-known process calculi such as nonbinding receiving activities, asynchronous communication, polyadic synchronization, pattern matching,
protection, and delimited receiving and killing activities. As a consequence of its careful design, the
calculus makes it easy to model many important aspects of service orchestrations à la WS-BPEL, such
as service instances with shared state, services playing more than one partner role, stateful conversations
made by several correlated service interactions, and long-running transactions. For the sake of simplicity,
we present here a fragment of COWS (called µ COWS in [21]) without linguistic constructs for dealing
with ‘forced termination’, since such primitives are not used in this work.
The syntax of COWS is presented in Table 1. We use two countable disjoint sets: the set of values
(ranged over by v, v0 , . . . ) and the set of ‘write once’ variables (ranged over by x, y, . . . ). The set of
values is left unspecified; however, we assume that it includes the set of names (ranged over by n, m, p,
o, . . . ) mainly used to represent partners and operations. We also use a set of expressions (ranged over by
ε), whose exact syntax is deliberately omitted; we just assume that expressions contain, at least, values
and variables. As a matter of notation, w ranges over values and variables and u ranges over names and
variables. Notation ¯· stands for tuples, e.g. x̄ means hx1 , . . . , xn i (with n ≥ 0) where variables in the same
tuple are pairwise distinct. We will omit trailing occurrences of 0, writing e.g. p • o?w̄ instead of p • o?w̄.0,
and write [hu1 , . . . , un i] s in place of [u1 ] . . . [un ] s. We will write I , s to assign a name I to the term s.
Services are structured activities built from basic activities, i.e. the empty activity 0, the invoke activity • ! and the receive activity • ? , by means of prefixing . , choice + , parallel composition | ,
delimitation [ ] and replication ∗ . We adopt the following conventions about the operators precedence:
monadic operators bind more tightly than parallel composition, and prefixing more tightly than choice.
Invoke and receive are the communication activities, which permit invoking an operation offered by
a service and waiting for an invocation to arrive, respectively. Besides output and input parameters, both
activities indicate an endpoint, i.e. a pair composed of a partner name p and an operation name o, through
which communication should occur. An endpoint p • o can be interpreted as a specific implementation
of operation o provided by the service identified by the logic name p. An invoke p • o!hε1 , . . . , εn i can
proceed as soon as all expression arguments ε1 , . . . , εn can be successfully evaluated to values. A receive p • o?hw1 , . . . , wn i.s offers an invocable operation o along a given partner name p and thereafter
(due to the prefixing operator) the service continues as s. An inter-service communication between these
two activities takes place when the tuple of values hv1 , . . . , vn i, resulting from the evaluation of the invoke argument, matches the template hw1 , . . . , wn i argument of the receive. This causes a substitution
of the variables in the receive template (within the scope of variables declarations) with the corresponding values produced by the invoke. Partner and operation names can be exchanged in communication,
thus enabling many different interaction patterns among service instances. However, dynamically re-
L. Cesari, R. Pugliese & F. Tiezzi
7
Expressions: ε, ε 0 , . . .
Values: v, v0 , . . .
Names: n, m, . . .
Partners: p, p0 , . . .
Operations: o, o0 , . . .
Variables: x, y, . . .
Services:
s ::=
|
|
|
|
u • u0 !ε̄
g
s|s
[u] s
∗s
(invoke)
(receive-guarded choice)
(parallel composition)
(delimitation)
(replication)
Variables/Values: w, w0 , . . .
Variables/Names: u, u0 , . . .
Receive-guarded choice:
g ::=
0
(empty)
|
p • o?w̄.s
(receive)
|
g+g
(choice)
Table 1: COWS syntax
ceived names cannot form the endpoints used to receive further invocations. Indeed, endpoints of receive
activities are identified statically because their syntax only allows using names and not variables.
The empty activity does nothing, while choice permits selecting for execution one between two alternative receives.
Execution of parallel services is interleaved. However, if more matching receives are ready to process
a given invoke, only one of the receives that generate a substitution with smallest domain (see [21] for
further details) is allowed to progress (namely, this receive has an higher priority to proceed than the
others). This mechanism permits to model the precedence of a service instance over the corresponding
service specification when both can process the same request (see also Section 4).
Delimitation is the only binding construct: [u] s binds the element u in the scope s. It is used for two
different purposes: to regulate the range of application of substitutions produced by communication, if
the delimited element is a variable, and to generate fresh names, if the delimited element is a name.
Finally, the replication construct ∗ s permits to spawn in parallel as many copies of s as necessary.
This, for example, is exploited to implement recursive behaviours and to model business process definitions, which can create multiple instances to serve several requests simultaneously.
3
Blind-date conversations in WS-BPEL
We present here a (web) service capable of arranging matches of 4-players1 online (card) games, such
as e.g. burraco or canasta. To create or join a match, a player has only to indicate the kind of game
he/she would like to play and his/her endpoint reference (i.e., his/her address). Thus, players do not
need to know in advance any further information, such as the identifier of the table or the identifiers
of other players. Moreover, players do not either know if a new match is created as a consequence of
their request to play, or if they join an already existing match. Therefore, the arrangement of tables is
completely transparent to players.
Figure 1 shows a graphical representation2 We report below the code of the process where, to sim1
It is worth noticing that the blind-date conversation approach works as well with a number of players not fixed a priori. Of
course, this would require using some extra activities. Therefore, to better highlight the specificities of the proposed approach,
we have preferred to keep the example as simple as possible and, hence, we have fixed the number of players to four.
2 The representation has been created by using Eclipse BPEL Designer (http://www.eclipse.org/bpel/).
8
Blind-date Conversation Joining
Figure 1: Graphical representation of the WS-BPEL process TableManager
plify the reading of the code, we have omitted irrelevant details and highlighted the basic activities
<receive>, <invoke> and <assign> by means of a grey background.
<process name="TableManager" ... >
<partnerLinks>
<partnerLink name="tableManager"
myRole="table" partnerRole="player"
initializePartnerRole="no"
partnerLinkType="tableManager:table"/>
</partnerLinks>
<variables>
<variable messageType="tableManager:request" name="Player1"/>
<variable messageType="tableManager:request" name="Player2"/>
<variable messageType="tableManager:request" name="Player3"/>
<variable messageType="tableManager:request" name="Player4"/>
<variable messageType="tableManager:reply" name="PlayersReply"/>
</variables>
<correlationSets>
<correlationSet name="GameCorrelationSet"
properties="tableManager:gameNameProperty"/>
</correlationSets>
L. Cesari, R. Pugliese & F. Tiezzi
<sequence>
<receive partnerLink="tableManager"
operation="join"
variable="Player1"
createInstance="yes">
<correlations>
<correlation initiate="yes" set="GameCorrelationSet"/>
</correlations>
</receive>
<receive partnerLink="tableManager"
operation="join"
variable="Player2">
<correlations>
<correlation initiate="no" set="GameCorrelationSet"/>
</correlations>
</receive>
<receive partnerLink="tableManager"
operation="join"
variable="Player3">
<correlations>
<correlation initiate="no" set="GameCorrelationSet"/>
</correlations>
</receive>
<receive partnerLink="tableManager"
operation="join"
variable="Player4">
<correlations>
<correlation initiate="no" set="GameCorrelationSet"/>
</correlations>
</receive>
<assign>
...
<copy ...>
<from>getTableID()</from>
<to>$PlayersReply.payload/tableManager:tableID</to>
</copy>
</assign>
<assign>
<copy>
<from>$Player1.payload/tableManager:playerAddress</from>
<to partnerLink="tableManager"/>
</copy>
</assign>
<invoke inputVariable="PlayersReply"
operation="start"
partnerLink="tableManager"/>
<assign>
<copy>
<from>$Player2.payload/tableManager:playerAddress</from>
<to partnerLink="tableManager"/>
</copy>
</assign>
<invoke inputVariable="PlayersReply"
operation="start"
partnerLink="tableManager"/>
9
10
Blind-date Conversation Joining
<assign>
<copy>
<from>$Player3.payload/tableManager:playerAddress</from>
<to partnerLink="tableManager"/>
</copy>
</assign>
<invoke inputVariable="PlayersReply"
operation="start"
partnerLink="tableManager"/>
<assign>
<copy>
<from>$Player4.payload/tableManager:playerAddress</from>
<to partnerLink="tableManager"/>
</copy>
</assign>
<invoke inputVariable="PlayersReply"
operation="start"
partnerLink="tableManager"/>
</sequence>
</process>
The process uses only one partner link, namely tableManager, that provides two roles: table and
player. The former is used by the process to receive the players’ requests, while the latter is used by
players to receive the table identifier. Five variables are used for storing data of the exchanged messages:
one for each player request and one for the manager response. Notably, the used message style3 is
document, thus messages are formed by a single part, called payload, that contains all message data.
Therefore, we use XPath expressions of the form $VariableName.payload/Path to extract or
store data in message variables.
The process starts with a <receive> activity waiting for a message from a player; the message contains a request (stored in the variable Player1) to participate to a match of a given
game. Whenever prompted by a player’s request, the process creates an instance (see the option
createInstance="yes" in the first <receive>), corresponding to a new (virtual) card-table of
the game specified by the player, and is immediately ready to concurrently serve other requests. Service
instances are indeed the WS-BPEL counterpart of inter-service conversations. In order to deliver each
request to an existing instance corresponding to a table of the requested game (if there exists one), the
name of the game is used as correlation datum. Thus, each <receive> activity specifies the correlation
set GameCorrelationSet, which is instantiated by the initial <receive>, in order to receive only
requests for the same game indicated by the first request. The <property> defining the correlation set
is declared in the WSDL document associated to the process as follows:
<prop:property name="gameNameProperty" type="xs:string"/>
<prop:propertyAlias messageType="this:request" part="payload"
propertyName="this:gameNameProperty">
<prop:query queryLanguage=...>//this:RequestElement/this:gameName</prop:query>
</prop:propertyAlias>
3
The SOAP message style configuration is specified in the binding section of the WSDL document associated to the WSBPEL process. We have preferred to use the document-style rather than the RPC-style, because the former minimizes coupling
between the interacting parties.
L. Cesari, R. Pugliese & F. Tiezzi
11
A <property> specifies an element of a correlation set and relies on one (or more) <propertyAlias> to identify correlation values inside messages. In our specification, the <propertyAlias>
extracts from <request> messages the needed element by using an XPath <query>. Then, the correlation set GameCorrelationSet is defined by the property gameNameProperty that identifies
the string element gameName of the messages sent by players.
Once the initial <receive> is executed and an instance is created, other three <receive> activities are sequentially performed by such instance, in order to complete the card-table for the new match.
Notice that the correlation mechanism ensures that only players that want to play the same game are put
together in a table.
When four players join a conversation for a new match (which, in WS-BPEL, corresponds to a
process instance), a unique table identifier is generated, by means of the custom XPath expression
getTableID(), and inserted into the variable PlayersReply. This variable contains the message
that will be sent back to each player via four <invoke> activities using the tableManager partner
link. Before every <invoke>, an activity <assign> is executed to extract (by means of an XPath
expression) the endpoint reference of the player, contained within the player’s request, and to store it
into the partnerRole of the tableManager partner link. These assignments allow the process to
properly reply in an asynchronous way to the players.
Now, the new table is arranged and, therefore, the players can start to play by using the received table
identifier and by interacting with another service dedicated to this purpose (which, of course, is out of
the scope of this work).
Experimenting with the WS-BPEL process. This WS-BPEL process can be experimented via the
Web interface at http://reggae.dsi.unifi.it/blinddatejoining/, or by downloading
from the same address the source and binary code.
More specifically, the process is configured to be deployed in a WS-BPEL engine Apache ODE [2].
Indeed, we have equipped the process with the corresponding WSDL and deployment descriptor files,
which provide typing and binding information, respectively. Notably, in order to call the custom XPath
expression getTableID() within the process, its definition must be previously installed in the ODE
engine as a Java library. For the sake of simplicity, we have defined such expression as a random function.
To experiment with the WS-BPEL program, we have developed a sort of testing environment consisting of a few Java classes implementing the service clients. Such classes rely on the artifacts automatically generated by JAX-WS [9] from the WSDL document of the process, and simply exchange SOAP
messages with the process. These clients are instantiated and executed by a Web application developed
by using the Play framework [24]; a screenshot of such application is shown in Figure 2. Notably, players created in a given browser session could be assigned to tables together with players created in other
sessions.
4
Semantics mechanisms underlying blind-date conversation joining
In this section, to clarify the behaviour at runtime of the TableManager process (and of its instances),
we formally specify a scenario involving the manager service by means of the process calculus COWS.
The aim is to shed light on the effect of the blind-date joining and to show how it can be easily programmed through the correlation approach. Moreover, this formal account also permits clarifying the
mechanisms underlying message correlation (i.e., shared input variables, pattern-matching and priority
among receive activities).
12
Blind-date Conversation Joining
Figure 2: A screenshot of the Web application for experimenting with the process TableManager
The TableManager process can be rendered in COWS as follows:
TableManagerProcess , ∗ [xgame , xplayer1 , xplayer2 , xplayer3 , xplayer4 ]
manager • join?hxgame , xplayer1 i.
manager • join?hxgame , xplayer2 i.
manager • join?hxgame , xplayer3 i.
manager • join?hxgame , xplayer4 i.
[tableId] ( xplayer1 • start!htableIdi
| xplayer2 • start!htableIdi
| xplayer3 • start!htableIdi
| xplayer4 • start!htableIdi )
The replication operator ∗ specifies that the above term represents a service definition, which acts as
a persistent service capable of creating multiple instances to simultaneously serve concurrent requests.
The delimitation operator [ ] declares the scope of variables xgame and xplayer i , with i = 1..4. The endpoint
manager • join (composed by the partner name manager and the operation join) is used by the service to
receive join requests from four players. When sending their request, the players are required to provide
only the kind of game, stored in xgame , and their partner names, stored in xplayer i , that they will then use to
receive the table identifier. Player’s requests are received through receive activities of the form manager •
join?hxgame , xplayer i i, which are correlated by means of the shared variable xgame . Then, the delimitation
operator is used to create a fresh name tableId that represents an unique table identifier. Such identifier
will be then communicated to each player by means of four invoke activities xplayer i • start!htableIdi.
Notably, differently from the WS-BPEL specification of the process, in the COWS definition the assign
activities are not necessary, because their role is played by the substitutions generated by the interactions
along the endpoint manager • join.
L. Cesari, R. Pugliese & F. Tiezzi
13
Consider now the following system
Luca | Rosario | Francesco | . . . | TableManagerProcess
where the players are defined as follows
Luca , manager • join!hburraco, pL i | [xid ] pL • start?hxid i. hrest of Lucai
Rosario , manager • join!hcanasta, pR i | [xid ] pR • start?hxid i. hrest of Rosarioi
Francesco , manager • join!hburraco, pF i | [xid ] pF • start?hxid i. hrest of Francescoi
...
If Luca requests to join a match, since there are not tables under arrangement, TableManager-Process
initialises a new match instance (highlighted by grey background) and the system evolves to:
[xid ] pL • start?hxid i. hrest of Lucai
| Rosario | Francesco | . . . | TableManagerProcess
| [xplayer2 , xplayer3 , xplayer4 ]
manager • join?hburraco, xplayer2 i.
manager • join?hburraco, xplayer3 i.
manager • join?hburraco, xplayer4 i.
[tableId] ( pL • start!htableIdi
| xplayer2 • start!htableIdi
| xplayer3 • start!htableIdi
| xplayer4 • start!htableIdi )
Now, if Rosario invokes TableManagerProcess, a second match instance (highlighted by dark grey background) is created:
[xid ] pL • start?hxid i. hrest of Lucai
| [xid ] pR • start?hxid i. hrest of Rosarioi
| Francesco | . . . | TableManagerProcess
| [xplayer2 , xplayer3 , xplayer4 ]
manager • join?hburraco, xplayer2 i.
manager • join?hburraco, xplayer3 i.
manager • join?hburraco, xplayer4 i.
[tableId] ( pL • start!htableIdi
| xplayer2 • start!htableIdi
| xplayer3 • start!htableIdi
| xplayer4 • start!htableIdi )
14
Blind-date Conversation Joining
| [xplayer2 , xplayer3 , xplayer4 ]
manager • join?hcanasta, xplayer2 i.
manager • join?hcanasta, xplayer3 i.
manager • join?hcanasta, xplayer4 i.
[tableId0 ] ( pR • start!htableId0 i
| xplayer2 • start!htableId0 i
| xplayer3 • start!htableId0 i
| xplayer4 • start!htableId0 i )
When Francesco invokes TableManagerProcess, the process definition and the first created instance,
being both able to receive the same message hburraco, pF i along the endpoint manager • join, compete
for the request manager • join!hburraco, pF i. COWS’s (prioritized) semantics precisely establishes how
this sort of race condition is dealt with: only the existing instance is allowed to evolve, as required
by WS-BPEL. This is done through the dynamic prioritised mechanism of COWS, i.e. assigning the
receives performed by instances (having a more defined pattern and requiring less substitutions) a greater
priority than the receives performed by a process definition. In fact, in the above COWS term, the first
instance can perform a receive matching the message and containing only one variable in its argument,
while the initial receive of TableManagerProcess contains two variables. In this way, the creation of a
new instance is prevented. Moreover, pattern-matching permits delivering the request to the appropriate
instance, i.e. that corresponding to a burraco match. Therefore, the only feasible computation leads to
the following term
[xid ] pL • start?hxid i. hrest of Lucai
| [xid ] pR • start?hxid i. hrest of Rosarioi
| [xid ] pF • start?hxid i. hrest of Francescoi
| . . . | TableManagerProcess
| [xplayer3 , xplayer4 ]
manager • join?hburraco, xplayer3 i.
manager • join?hburraco, xplayer4 i.
[tableId] ( pL • start!htableIdi
| pF • start!htableIdi
| xplayer3 • start!htableIdi
| xplayer4 • start!htableIdi )
| [xplayer2 , xplayer3 , xplayer4 ]
manager • join?hcanasta, xplayer2 i.
manager • join?hcanasta, xplayer3 i.
manager • join?hcanasta, xplayer4 i.
[tableId0 ] ( pR • start!htableId0 i
| xplayer2 • start!htableId0 i
| xplayer3 • start!htableId0 i
| xplayer4 • start!htableId0 i )
L. Cesari, R. Pugliese & F. Tiezzi
15
where Francesco joined to the burraco table under arrangement.
Eventually, with the arrival of other requests from players that want to play burraco, the
TableManagerProcess completes to arrange the burraco table and contacts the players for communicating them the table identifier:
[tableId] ( hrest of Lucai | hrest of Francescoi | . . . )
| [xid ] pR • start?hxid i. hrest of Rosarioi
| . . . | TableManagerProcess
| [xplayer2 , xplayer3 , xplayer4 ]
manager • join?hcanasta, xplayer2 i.
manager • join?hcanasta, xplayer3 i.
manager • join?hcanasta, xplayer4 i.
[tableId0 ] ( pR • start!htableId0 i
| xplayer2 • start!htableId0 i
| xplayer3 • start!htableId0 i
| xplayer4 • start!htableId0 i )
Therefore, the players of table tableId (including Luca and Francesco) can start to play, while Rosario
continues to wait for other canasta players.
5
Concluding remarks
We have illustrated blind-date conversation joining, a strategy allowing a participant to join a conversation without need to know information about the conversation itself, such as e.g. its identifier or the other
participants, but the endpoint of the service provider. This is possible because some values in the request
define which conversation the participant will join. In case such a conversation does not exist, a new one
associated to these values will be created.
We showed how the blind-date conversation joining strategy can be implemented in the wellestablished industrial standard WS-BPEL. In order to accomplish this task, we used WS-BPEL correlation sets to filter the client requests and create conversations identified by means of the filtered values.
We also presented a formal semantics for the strategy by using the process calculus COWS. The
semantics permits to highlight what the effect of the strategy is, by clarifying the mechanism underlying
message correlation and showing how the strategy can be easily programmed in a correlation-based
environment. This also permits appreciating the conciseness and cleanness of the COWS specification
of the TableManager process, especially when compared with its WS-BPEL counterpart.
We developed a case study to show how our strategy can be used in a realistic scenario. The case
study defines an online games provider that arranges online matches of 4-players card games. This
scenario is implemented using WS-BPEL and executed on Apache ODE. As we showed in Section 2.1,
despite the XML markup used by WS-BPEL, the blind-date joining strategy permits to have a smooth
and clean implementation. We also equipped the case study with a ‘testing environment’ in order to
facilitate its testing.
Related work. The peculiar form of conversation joining studied in this paper, which we call ‘blinddate’, originates from the message correlation mechanism used for delivering messages to the appropriate
16
Blind-date Conversation Joining
service instances in both orchestration languages and formalisms for SOC. This joining strategy is, at
least in principle, independent from the specific language or formalism used to enact it. In this paper,
we have used the language WS-BPEL and the formalism COWS, but different choices could have been
made. For example, Jolie [19] could be used as correlation-based orchestration language and SOCK [11]
as the formalism, being the former a Java-based implementation of the latter. However, our choice fell
on WS-BPEL because it is an OASIS open standard well-accepted by industries and, hence, supported
by well-established and maintained engines. Instead, COWS has been selected because of its strict
correspondence with WS-BPEL while, at the same time, being a core calculus consisting of just a few
constructs, which makes it more suitable than WS-BPEL to reason on applications’ behaviour.
In the SOC literature, two main approaches have been considered to connect the interaction protocols
of clients and of the respective service instances. That based on the correlation mechanism was first
exploited in [23] where, however, only interaction among different instances of a single service are taken
into account. Another correlation-based formalism, besides COWS and SOCK mentioned above, is the
calculus Corr [17], which is a sort of value-passing CCS without restriction and enriched with constructs
for expressing services and their instances. Corr has been specifically designed to capture behaviours
related to correlation aspects in a specific WS-BPEL engine. Another work with an aim similar to
ours, i.e. to show an exploitation of the correlation-based mechanism for dealing with issues raised by
practical scenarios, is presented in [16]. Such work proposes an implementation of a correlation-based
primitive allowing messages to be delivered to more than one service conversation. Anyway, WS-BPEL
(and COWS as well) natively provides such kind of broadcast primitive.
A large strand of work, instead, relies on the explicit modelling of interaction sessions and their
dynamic creation. A session corresponds to a private channel (à la π-calculus [18]) which is implicitly
instantiated when calling a service: it binds caller and callee and is used for their future conversation.
Although this the technology underling SOC, its abstraction level has proved convenient for reasoning
about SOC applications. Indeed, session-based conversation can be regulated by so called session types
that can statically guarantee a number of desirable properties, such as communication safety, progress,
predictability. scenario declared in the session type). Therefore, an important group of calculi for modeling and proving properties of services is based on the explicit notion of interaction session. Most of such
work (among which we mention [12, 6, 14, 3]) has been devoted to study dyadic sessions, i.e. interaction
sessions between only two participants.
Recently, another body of work (as, e.g., [13, 4, 5, 7]) focussed on a more general form of sessions,
called multiparty sessions/conversations, which are closer to the notion of conversation that we have
considered in this paper. The multiparty session approach proposed in [13] permits expressing a conversation by means of channels shared among the participants. However, the conversation is created through
a single synchronization among all participants, whose number is fixed at design time. This differs from
our notion of blind-date joining, where once a conversation has been created the participants can asynchronously join. Moreover, although in our case study we consider a conversation of five participants, in
principle this number can change at runtime. The µse language [4] permits the declaration of multiparty
sessions in a way transparent to the user. However, rather than relying on the correlation mechanism, as
in our approach, µse creates multiparty conversations by using a specific primitive that permits to merge
together previously created conversations. Instead, when relying on correlation, the conversation merging is automatically performed for each correlated request. Another formalism dealing with multiparty
interactions is the Conversation Calculus [22, 5]. It uses the conversation-based mechanism for intersession communication, which permits to progressively accommodate and dismiss participants from the
same conversation. This is realized by means of named containers for processes, called conversation
contexts. However, processes in unrelated conversations cannot interact directly. Moreover, conversa-
L. Cesari, R. Pugliese & F. Tiezzi
17
tion joining is not transparent to a new participant, because he has to know the name of the conversation.
Instead, in our correlation-based approach, a conversation is represented by a service instance, which is
not accessed via an identifier, but via the correlation values specified by the correlation set.
In conclusion, the lower-level mechanism based on correlation sets, that exploits business data to
correlate different interactions, is more robust and fits the loosely-coupled world of Web Services better
than that based on explicit session references. It turned out to be powerful and flexible enough to fulfill
the need of SOC, e.g. it easily allows a single message to participate in multiple conversations, each
(possibly) identified by separate correlation values, which instead requires non-trivial workarounds by
using the session-based approach. It is not a case that also the standard WS-BPEL uses correlation sets.
Future work. To better highlight the semantics mechanisms underlying blind-date conversation joining, we have preferred to consider a quite simple case study. Anyway, many other features could be
added without much effort that would make the case study even more realistic. For example, a player
should be able to play concurrently in more than one match. However, for the sake of simplicity, we
assume here that a player can ask to play the same game more than once only if each time it waits for
the response to the previous request, otherwise it could be assigned more than once to the same table.
Moreover, TableManagerProcess can be easily tailored to arrange matches for n-players online games
with n 6= 4 (e.g. poker, bridge, . . . ). It could also be modified so to be able to manage games with a number of players not statically known, as well as games that can be played by a variable number of players,
i.e. games that may begin with a minimum number of players but later on other players can dynamically
join and some others can stop playing and leave. The fact that some players may give up, i.e. the number
of players may also decrease, implies that some tables may dynamically have not enough players for the
game to go on. In this case, tables with an insufficient number of players could be joined and there are
several possible strategies to to this: a centralized solution could exploit the table manager as a forwarder
for the player messages, while a decentralized one could exploit the tables with not enough players as
forwarders; alternatively, we could exploit memory cell services to store the (dynamically updatable)
value of the table assigned to each single player thus avoiding to replace, once and for all, the correlation
variable with this value; finally, TableManagerProcess instances, instead of single tables, could represent
rooms containing more tables for the same game and manage all the requests for that game. In order to
avoid deadlocks, we could add timeouts to receive activities of TableManagerProcess and players’ services. This can be done both in WS-BPEL, by exploiting onAlarm events within pick activities, and
in COWS, by using wait activities in conjunction with choice activities (as shown in [21]).
We leave as a future work the task of formalizing the pattern underlying blind-date conversation
joining in a way which is independently from the specific case study considered in this paper. We also
plan to study and develop type theories for describing and regulating the correlation mechanism. This
will permit to guarantee desired properties like those defined for dyadic and multiparty session types.
We expect that to develop type theories for ensuring properties of the correlation mechanism be more
difficult than doing so for session-based interaction because the communication media are not necessarily
private and the correlation values are determined at runtime.
References
[1] Groupon. Web site: http://www.groupon.com/.
[2] Apache Software Foundation (2011): Apache ODE 1.3.5. Available at http://ode.apache.org/.
18
Blind-date Conversation Joining
[3] M. Boreale, R. Bruni, R. De Nicola & M. Loreti (2008): Sessions and Pipelines for Structured Service
Programming. In: FMOODS, LNCS 5051, Springer, pp. 19–38, doi:10.1007/978-3-540-68863-1 3.
[4] R. Bruni, I. Lanese, H.C. Melgratti & E. Tuosto (2008): Multiparty Sessions in SOC. In: COORDINATION,
LNCS 5052, Springer, pp. 67–82, doi:10.1007/978-3-540-68265-3 5.
[5] L. Caires & H.T. Vieira (2010): Conversation types. Theor. Comput. Sci. 411(51-52), pp. 4399–4440,
doi:10.1016/j.tcs.2010.09.010.
[6] M. Carbone, K. Honda & N. Yoshida (2007): Structured Communication-Centred Programming for Web
Services. In: ESOP, LNCS 4421, Springer, pp. 2–17, doi:10.1007/978-3-540-71316-6 2.
[7] M. Carbone & F. Montesi (2013): Deadlock-freedom-by-design: multiparty asynchronous global programming. In: POPL, ACM, pp. 263–274, doi:10.1145/2429069.2429101.
[8] E. Christensen, F. Curbera, G. Meredith & S. Weerawarana (2001): Web Services Description Language
(WSDL) 1.1. Technical Report, W3C. Available at http://www.w3.org/TR/wsdl/.
[9] GlassFish community (2012): JAX-WS 2.2.7. Available at http://jax-ws.java.net/.
[10] M. Gudgin, M. Hadley & T. Rogers (2006): Web Services Addressing 1.0 - Core. Technical Report, W3C.
[11] C. Guidi, R. Lucchi, R. Gorrieri, N. Busi & G. Zavattaro (2006): SOCK: A Calculus for Service Oriented
Computing. In: ICSOC, LNCS 4294, Springer, pp. 327–338, doi:10.1007/11948148 27.
[12] K. Honda, V. T. Vasconcelos & M. Kubo (1998): Language Primitives and Type Discipline for
Structured Communication-Based Programming. In: ESOP, LNCS 1381, Springer, pp. 122–138,
doi:10.1007/BFb0053567.
[13] K. Honda, N. Yoshida & M. Carbone (2008): Multiparty asynchronous session types. In: POPL, ACM Press,
pp. 273–284, doi:10.1145/1328438.1328472.
[14] I. Lanese, F. Martins, A. Ravara & V.T. Vasconcelos (2007): Disciplining Orchestration and Conversation in Service-Oriented Computing. In: SEFM, IEEE Computer Society Press, pp. 305–314,
doi:10.1109/SEFM.2007.13.
[15] A. Lapadula, R. Pugliese & F. Tiezzi (2007): A Calculus for Orchestration of Web Services. In: ESOP,
LNCS 4421, Springer, pp. 33–47, doi:10.1007/978-3-540-71316-6 4.
[16] J. Mauro, M. Gabbrielli, C. Guidi & F. Montesi (2011): An Efficient Management of Correlation Sets with
Broadcast. In: COORDINATION, LNCS 6721, Springer, pp. 80–94, doi:10.1007/978-3-642-25535-9 45.
[17] H.C. Melgratti & C. Roldán (2012): On Correlation Sets and Correlation Exceptions in ActiveBPEL. In:
TGC, LNCS 7173, Springer, pp. 212–226, doi:10.1007/978-3-642-30065-3 13.
[18] R. Milner, J. Parrow & D. Walker (1992): A Calculus of Mobile Processes, I and II. Information and
Computation 100(1), pp. 1–40, 41–77, doi:10.1016/0890-5401(92)90009-5.
[19] F. Montesi, C. Guidi, R. Lucchi & G. Zavattaro (2007): JOLIE: a Java Orchestration Language Interpreter Engine. In: MTCoord, Electronic Notes in Theoretical Computer Science 181, Elsevier, pp. 19–33,
doi:10.1016/j.entcs.2007.01.051.
[20] OASIS WSBPEL TC (2007): Web Services Business Process Execution Language Version 2.0. Technical
Report, OASIS. Available at http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.
0-OS.html.
[21] R. Pugliese & F. Tiezzi (2012): A calculus for orchestration of web services. J. Applied Logic 10(1), pp.
2–31, doi:10.1016/j.jal.2011.11.002.
[22] H.T. Vieira, L. Caires & J. C. Seco (2008): The Conversation Calculus: A Model of Service-Oriented Computation. In: ESOP, LNCS 4960, Springer, pp. 269–283, doi:10.1007/978-3-540-78739-6 21.
[23] M. Viroli (2004): Towards a Formal Foundation to Orchestration Languages. In: WS-FM, Electronic Notes
in Theoretical Computer Science 105, Elsevier, pp. 51–71, doi:10.1016/j.entcs.2004.05.008.
[24] Zenexity and Typesafe (2013): Play framework 2.1.0. Available at http://www.playframework.
com/.
| 6cs.PL
|
OPTIMAL RATE LIST DECODING OVER BOUNDED ALPHABETS
USING ALGEBRAIC-GEOMETRIC CODES
arXiv:1708.01070v1 [cs.CC] 3 Aug 2017
VENKATESAN GURUSWAMI AND CHAOPING XING
Abstract. We give new constructions of two classes of algebraic code families which
are efficiently list decodable with small output list size from a fraction 1 − R − ε of
adversarial errors where R is the rate of the code, for any desired positive constant ε.
The alphabet size depends only ε and is nearly-optimal.
The first class of codes are obtained by folding algebraic-geometric codes using automorphisms of the underlying function field. The list decoding algorithm is based on a
linear-algebraic approach, which pins down the candidate messages to a subspace with a
nice “periodic” structure. The list is pruned by pre-coding into a special form of subspaceevasive sets. Instantiating this construction with the explicit Garcia-Stichtenoth tower
of function fields yields codes list-decodable up to a 1 − R − ε error fraction with list size
bounded by O(1/ε), matching the existential bound for random codes up to constant factors. Further, the alphabet size of the codes is a constant depending only on ε — it can
be made exp(Õ(1/ε2 )) which is not much worse than the lower bound of exp(Ω(1/ε)).
The parameters we achieve are thus quite close to the existential bounds in all three
aspects — error-correction radius, alphabet size, and list-size — simultaneously. Our
code construction is Monte Carlo and has the claimed list decoding property with high
probability. Once the code is (efficiently) sampled, the encoding/decoding algorithms
are deterministic with a running time Oε (N c ) for an absolute constant c, where N is the
code’s block length.
The second class of codes are obtained by restricting evaluation points of an algebraicgeometric code to rational points from a subfield. Once again, the linear-algebraic approach to list decoding to pin down candidate messages to a “periodic” subspace. We
develop an alternate approach based on subspace designs is used to pre-code messages
and prune the subspace of candidate solutions. Together with the subsequent explicit
constructions of subspace designs, this yields the first deterministic construction of an
algebraic code family of rate R with efficient list decoding from 1 − R − ε fraction of
errors over an alphabet of constant size exp(Õ(1/ε2 )). The list size is bounded by a very
slowly growing function of the block length N ; in particular, it is at most O(log(r) N )
(the r’th iterated logarithm) for any fixed integer r. The explicit construction avoids the
shortcoming of the Monte Carlo sampling at the expense of a slightly worse list size.
Extended abstracts announcing these results were presented at the 2012 and 2013 ACM Symposia
on Theory of Computing (STOC) [16, 17]. This is a merged and revised version of these conference
papers, that accounts for the explicit subspace designs that were constructed in [8] subsequent to [17], and
makes some simplifications and improvements in the construction of h.s.e sets in Section 6 compared to [16].
The research of V. Guruswami was supported in part by a Packard Fellowship and NSF grants
CCF-0963975 and CCF-1422045. Some of this work was done during visits by the author to Nanyang
Technological University. Any opinions, findings, and conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of the National Science
Foundation.
The research of C. Xing was supported by the Singapore MoE Tier 1 grants RG20/13 and RG25/16,
and NTU grant M4081575.
2
V. GURUSWAMI AND C. XING
Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
1.1.
Prior and related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4
1.2.
Open questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
1.3.
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
2. Our techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
2.1.
Algebraic ideas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
2.2.
Pseudorandomness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
3. Periodic subspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4. Preliminaries on function fields and algebraic-geometric codes . . . . . . . . . . . . . . . . 11
5. Folded codes from the Hermitian tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.1.
Background on Hermitian tower. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.2.
Redefining the code in terms of local expansion at P0 . . . . . . . . . . . . . . . . . . 15
5.3.
List decoding folded codes from the Hermitian tower . . . . . . . . . . . . . . . . . . . 16
6. Subspace evasive sets with additional structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.1.
Hierarchical subspace-evasive sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.2.
Random sets are hierarchically subspace evasive . . . . . . . . . . . . . . . . . . . . . . . . 19
6.3.
Pseudorandom construction of large h.s.e subsets . . . . . . . . . . . . . . . . . . . . . . . 20
6.4.
Efficient computation of intersection with h.s.e. subsets . . . . . . . . . . . . . . . . 22
7. Folded codes from the Garcia-Stichtenoth tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.1.
Background on Garcia-Stichtenoth tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.2.
Redefining the code in terms of local expansion at P∞ . . . . . . . . . . . . . . . . . 25
7.3.
List decoding FGS codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
8. Pruning list for folded AG codes using h.s.e sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
8.1.
Combining folded Hermitian codes and h.s.e sets . . . . . . . . . . . . . . . . . . . . . . . 28
8.2.
Combining folded Garcia-Stichtenoth codes and h.s.e sets . . . . . . . . . . . . . . 29
9. List decoding AG codes with subfield evaluation points . . . . . . . . . . . . . . . . . . . . . . . 31
10.
11.
9.1.
Decoding Reed-Solomon codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
9.2.
Decoding algebraic-geometric codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
9.3.
Decoding the codes from the Garcia-Stichtenoth tower . . . . . . . . . . . . . . . . . 38
Subspace designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
10.1.
Constructing subspace designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
10.2.
Cascaded subspace designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Good list decodable subcodes of RS and AG codes . . . . . . . . . . . . . . . . . . . . . . . . . . 44
11.1.
Reed-Solomon codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
11.2.
Subcodes of Garcia-Stichtenoth codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
AG CODES & NEAR-OPTIMAL LIST DECODING
3
1. Introduction
An error-correcting code C of block length N over a finite alphabet Σ maps a set M
of messages into codewords in ΣN . The rate of the code C, denoted R, equals N1 log|Σ| |M|.
In this work, we will be interested in codes for adversarial noise, where the channel can
arbitrarily corrupt any subset of up to τ N symbols of the codeword. The goal will be to
correct such errors and recover the original message/codeword efficiently. It is easy to see
that information-theoretically, we need to receive at least RN symbols correctly in order
to recover the message (since |M| = |Σ|RN ), so we must have τ 6 1 − R.
Perhaps surprisingly, in a model called list decoding, recovery up to this informationtheoretic limit becomes possible. Let us say that a code C ⊆ ΣN is (τ, ℓ)-list decodable
if for every received word y ∈ ΣN , there are at most ℓ codewords c ∈ C such that y
and c differ in at most τ N positions. Such a code allows, in principle, the correction
of a fraction τ of errors, outputting at most ℓ candidate codewords one of which is the
originally transmitted codeword.
The probabilistic method shows that a random code of rate R over an alphabet of
size exp(O(1/ε)) is with high probability (1 − R − ε, O(1/ε))-list decodable [2]. However,
it is not known how to construct or even randomly sample such a code for which the
associated algorithmic task of list decoding (i.e., given y ∈ ΣN , find the list of codewords
within fractional radius 1 − R − ε) can be performed efficiently. This work takes a big step
in that direction, giving a randomized construction of such efficiently list-decodable codes
over a slightly worse alphabet size of exp(Õ(1/ε2 )). We note that the alphabet size needs
to be at least exp(Ω(1/ε)) in order to list decode from a fraction 1 − R − ε of errors, so
this is close to optimal. For the list-size needed as a function of ε for decoding a 1 − R − ε
fraction of errors, the best lower bound is only Ω(log(1/ε)) [9], but as mentioned above,
even random coding arguments only achieve a list-size of O(1/ε), which our construction
matches up to constant factors. We also give a fully deterministic construction with a
list-size that is very slowly growing as a function of the block length.
We now review some of the key results on algebraic list decoding leading up to this
work. A more technical comparison with related work appears in Section 1.1. The first
construction of codes that achieved the optimal trade-off between rate and list-decoding
radius, i.e., enabled list decoding up to a fraction 1−R−ε of worst-case errors with rate R,
was due to Guruswami and Rudra [11]. They showed that a variant of Reed-Solomon (RS)
codes called folded RS codes admit such a list decoder. For a decoding radius of 1 − R − ε,
the code was based on bundling together disjoint windows of m = Θ(1/ε2 ) consecutive
symbols of the RS codeword into a single symbol over a larger alphabet. As a result, the
2
alphabet size of the construction was N Ω(1/ε ) . Ideas based on code concatenation and
expander codes can be used to bring down the alphabet size to exp(Õ(1/ε4 )), but this
compromises some nice features such as list recovery and soft decoding of the folded RS
code. Also, the decoding time complexity as well as proven bound on worst-case output
list size for these constructions were N Ω(1/ε) .
Our main final result statement is the following, offering two constructions, one randomized and one deterministic, of variants of algebraic-geometric (AG) codes that are
list-decodable with optimal rate. More detailed statements can be found in the technical
sections of the paper.
Theorem 1.1 (Main). For any R ∈ (0, 1) and positive constant ε ∈ (0, 1), there is
(i) a Monte Carlo construction of a family of codes of rate at least R over an alphabet
size exp(O(log(1/ε)/ε2 )) that are encodable and (1−R−ε, O(1/(Rε))-list decodable
4
V. GURUSWAMI AND C. XING
in Oε (N c ) time1, where N is the block length of the code and c is an absolute
positive constant.
(ii) a deterministic construction of a family of codes of rate at least R over an alphabet
size exp(O(log2 (1/ε)/ε2 )) that are encodable and (1 − R − ε, L(N ))-list decodable
in Oε (N c ) time, for a list size that satisfies L(N ) = o(log(r) N ) (the r’th iterated
logarithm) for any fixed integer r.
The first part of Theorem 1.1 is achieved through folded algebraic-geometric codes
and hierarchical subspace-evasive sets. To fold algebraic-geometric codes, we first find
suitable automorphisms of the ground function field. Consequently, the list of possible
candidate messages has an exponential size, but is well structured. To prune down the
list size, we only encode messages in a subspace-evasive set which has small intersection
with the original list. To make use of subspace-evasive sets efficiently, we have to: (i)
give an explicit pseudorandom construction of these sets; and (ii) encode the messages to
subspace-evasive sets efficiently. We refer to Section 2 for details.
The second part of Theorem 1.1 is obtained through usual algebraic-geometric codes
with evaluation points over subfields and subspace design. As in the fist part, the list of
possible candidate messages has an exponential size, but is well structured. The approach
based on hierarchical subspace-evasive sets in the first part leads to excellent list size;
however, we only know randomized constructions of hierarchical subspace-evasive sets. To
obtain a deterministic list decoding, we prune down the list of possible solutions through
subspace designs (see Section 2 for details).
We note that our Monte Carlo construction gives codes that are quite close to the
existential bounds in three aspects simultaneously — the trade-off between error fraction
1 − R − ε and rate R, the list-size as a function of ε, and the alphabet size of the code
family (again as a function of ε). Even though these codes are not fully explicit, they are
“functionally explicit” in the sense that once the code is (efficiently) sampled, with high
probability the polynomial time encoding and decoding algorithms deliver the claimed
error-correction guarantees for all allowed error pattern. The explicit construction avoids
this shortcoming at the expense of a slightly worse list size. Our algorithms can also be
extended to the “list recovery” setting in a manner similar to [11, 7]; we omit discussion
of this aspect and the straightforward details.
1.1. Prior and related work. Let us recap a bit more formally the construction of
folded RS codes from [11]. One begins with the Reed-Solomon encoding of a polynomial f ∈ Fq [X] of degree < k consisting of the evaluation of f on a subset of field
elements ordered as 1, γ, . . . , γ N −1 for some primitive element γ ∈ Fq and N < q. For
an integer “folding” parameter m > 1 that divides N , the folded RS codeword is defined over alphabet Fm
q and consists of n/m blocks, with the j’th block consisting of the
(j−1)m
m-tuple (f (γ
), f (γ (j−1)m+1 ), . . . , f (γ jm−1 )). The algorithm in [11] for list decodq
ing these codes was based on the algebraic identity f (γX) = f (X) in the residue field
Fq [X]/(X q−1 − γ) where f denotes the residue f mod (X q−1 − γ). This identity is used to
solve for f from an equation of the form Q(X, f (X), f (γX), . . . , f (γ s−1 X)) = 0 for some
low-degree nonzero multivariate polynomial Q. The high degree q > n of this identity,
coupled with s ≈ 1/ε, led to the large bounds on list-size and decoding complexity in [11].
One possible approach to reduce q (as a function of the code length) in this construction would be to work with algebraic-geometric codes based on function fields K
1We use the O (·) notation to hide constant factors that depend on ε.
ε
AG CODES & NEAR-OPTIMAL LIST DECODING
5
over Fq with more rational points. However, an automorphism σ of K that can play the
role of the automorphism f (X) 7→ f (γX) of Fq (X) is only known (or even possible) for
very special function fields. This approach was used in [6] to construct list-decodable
codes based on cyclotomic function fields using as σ certain Frobenius automorphisms.
These codes improved the alphabet size to polylogarithmic in N , but the bound on listsize and decoding complexity remained N Ω(1/ε) . Recently, a linear-algebraic approach to
list decoding folded RS codes was discovered in [27, 7]. Here, in the interpolation stage,
which is common to all list decoding algorithms for algebraic codes [26, 13, 21, 11], one
finds a linear multivariate polynomial Q(X, Y1 , . . . , Ys ) whose total degree in the Yi ’s is
1. The simple but key observation driving the linear-algebraic approach is that the equation Q(X, f (X), . . . , f (γ s−1 X)) = 0 now becomes a linear system in the coefficients of f .
Further, it is shown that the solution space has dimension less than s, which again gives
a list-size upper bound of q s−1 . Finally, since the list of candidate messages fall in an
affine space, it was noted in [7] that one can bring down the list size by carefully “precoding” the message polynomials so that their k coefficients belong to a “subspace-evasive
set” (which has small intersection with every s-dimensional subspace of Fkq ). This idea
was used in [14] to give a randomized construction of (1 − R − ε, O(1/ε))-list decodable
codes of rate R. However, the alphabet size and runtime of the decoding algorithm both
remained N Ω(1/ε) . Similar results were also shown in [14] for derivative codes, where the
encoding of a polynomial f consists of the evaluations of f and its first m − 1 derivatives
at distinct field elements.
Concurrently with our work reported in [16], Dvir and Lovett gave an elegant construction of explicit subspace evasive sets based on certain algebraic varieties [1]. This
yields an explicit version of the codes from [7], albeit with a worse list size bound of
(1/ε)O(1/ε) . This work and [1] are incomparable in terms of results. The big advantage
of [1] is the deterministic construction of the code. The benefits in our work are: (i)
both constructions give codes over an alphabet size that is a constant independent of N ,
2
whereas in [1] the N Ω(1/ε ) alphabet size of folded RS codes is inherited; (ii) our first
Monte Carlo construction ensures list-decodability with a list-size of O(1/ε) that is much
better and in fact matches the full random construction up to constant factors,2 and (iii)
our second construction gives a deterministic algorithm as well with almost constant list
size (and constant alphabet size). Another important feature is that both our work and
[1] achieve a decoding complexity of Oε (N c ) with exponent independent of ε.
Our paper presents two class of codes: folded algebraic-geometric codes and usual
algebraic-geometric codes with evaluation points over subfields. For both the classes of
codes, we can apply hierarchical subspace-evasive sets as well as subspace design to prune
down the list size by taking certain subcodes. This is because of the “periodic” structure of
the subspace in which the candidate messages are pinned down by the linear-algebraic list
decoder is similar in both cases. Thus, we can obtain both randomized and deterministic
algorithms from each of the two classes of codes. In total, we have four combinations
of constructions. To illustrate both algebraic approaches, we decide to focus on two
combinations, i.e., (i) folded algebraic-geometric codes with hierarchical subspace-evasive
sets; and (ii) usual algebraic-geometric codes with evaluation points over subfields with
subspace designs. These are listed in Figure 1. We note that the other two combinations
are also possible, as the pruning of the subspace of solutions is “black-box” with respect
to its periodic structure.
2As mentioned above, the bound in [1] is (1/ε)O(1/ε) and it seems very difficult to get a sub-exponential
dependence on 1/ε with the algebraic approach relying on Bezout’s theorem to construct subspace-evasive
sets.
6
V. GURUSWAMI AND C. XING
Code
Construction Alphabet size List size Decoding time
2
Folded RS/derivative
Explicit
N O(1/ε )
N O(1/ε)
N O(1/ε)
2)
O(1/ε
Folded RS subcode
Monte Carlo
N
O(1/ε)
N O(1/ε)
2
O(1)
Folded RS subcode
Explicit
N O(1/ε )
(1/ε)O(1/ε) N O(1) 21/ε
2
2
2
Folded cyclotomic
Las Vegas
(log N )O(1/ε ) N O(1/ε )
N O(1/ε )
O(1)
Folded AG subcode Monte Carlo exp(Õ(1/ε2 ))
O(1/ε)
N O(1) 21/ε
AG subcode
Explicit
exp(Õ(1/ε2 ))
∗
2
2(log N)
22
Reference
[11, 14]
[14]
[1]
[6]
Thm. 1.1(i)
N O(1) (1/ε)O(ℓ) Thm. 1.1(ii)
Figure 1. Parameters of various constructions of codes that enable list decoding
(1 − R − ε) fraction of errors, with rate R. The last two lines are from this work.
“Explicit” means the code can be constructed in deterministic polynomial time.
The rows with first column in boldface are not dominated by other constructions.
The last line gives the first deterministic construction of algebraic codes for efficient
optimal rate list decoding over constant-sized alphabets.
In the table presented in Figure 1, we list previous results and those in this paper.
The major improvement of this work is to bring down the alphabet size to constant, while
at the same time ensuring small list size and low decoding complexity where the exponent
of the polynomial run time does not depend on ε. Our folded algebraic-geometric subcodes
achieve a list size matching the fully random constructions up to constant factors, together
with alphabet size not much worse than the lower bound exp(Ω(1/ε)). On the last line,
our algebraic-geometric subcodes give a deterministic list decoding with almost constant
list size and optimal decoding radius.
1.2. Open questions. The challenge of decoding up to radius approaching the optimal
bound (1 − R) with rate R along with good list and alphabet size is, for the most part,
solved by our work. There are still some goals that have not been met. One is to get
a fully deterministic construction with constant list-size and alphabet size (as a function
of ε), and construction/decoding complexity Oε (N c ). In this regard, in a recent personal
communication, Kopparty, Ron-Zewi, and Saraf [19] report a construction that achieves
constant list and alphabet size with complexity N c (log log N )O(1/ε) (the list size, while a
constant, grows doubly exponentially in 1/ε). Another challenge is to construct a (1 − R −
ε, L)-list decodable code of rate R (for list size L bounded by a polynomial in the block
length), over an alphabet of size exp(O(1/ε)), which is the asymptotically optimal size.
Note that all constructions over a constant-sized alphabet known so far have alphabet
size at least exp(Ω(1/ε2 )). Finally, the various algebraic and expander-based techiques
that have led to progress on list decoding only work over large alphabets. The challenge
of efficient optimal rate list decoding over say the binary alphabet, even for the simpler
model of erasures, remains wide open. The best known constructions are obtained via
concatenation, and are list-decodable up to the so-called Blokh-Zyablov bound [12].
1.3. Organization. The paper is organized as follows. In Section 2, we describe the
detailed techniques of our paper including algebraic approaches and pseudorandomness.
Following the section on techniques, in Section 3 we introduce periodic and ultra-periodic
subspaces, give definitions and basic properties. In Section 4, we recall some basis results
on function fields and algebraic-geometric codes. To illustrate our ideas in an algebraically
simpler (and perhaps more practical) setting, in Section 5 we give a construction based
AG CODES & NEAR-OPTIMAL LIST DECODING
7
on a tower of Hermitian field extensions [22]. This is capable of giving a similar result
to our best ones based on the Garcia-Stichtenoth tower, albeit with alphabet size and
list-size upper bound polylogarithmic in the code length. In Section 6 we first introduce
hierarchical subspace-evasive sets, then show that random sets are hierarchical subspaceevasive with high probability. We also present a pseudorandom construction of hierarchical
subspace-evasive sets, which also allow for efficient encoding and efficient computation of
intersection with periodic subspaces.
Folded algebraic-geometric codes from the Garcia-Stichtenoth tower are studied in
Section 7. The list size, decoding radius and decoding algorithm via local expansion are
also discussed in this section. Section 8 is devoted to the discussion of pruning down the
list size for folded codes from both the Hermitian and the Garcia-Stichtenoth towers using
hierarchical subspace-evasive sets. The second class of our codes, namely usual algebraicgeometric codes with evaluation points over subfields is presented in Section 9. In this
section, we first discuss list decoding for the simpler Reed-Solomon case, and then generalize it to list decoding of arbitrary algebraic geometric codes and finally instantiate the
approach with the codes from the Garcia-Stichtenoth tower. In Section 10, we introduce
subspace designs and cascaded subspace designs, and discuss parameters of random and
explicit constructions of those. In the last section, the explicit construction of subcodes
of RS and AG subcodes based on subspace designs is presented.
2. Our techniques
We describe some of the main new ingredients that go into our work. We need both
new algebraic insights and constructions, as well as ideas in pseudorandomness relating
to (variants of) subspace-evasive sets. We describe these in turn below.
2.1. Algebraic ideas. It is shown in [13] that one can list decode the usual algebraicgeometric codes up to the Johnson bound. Thus, to list decode the algebraic-geometric
codes beyond the Johnson bound, we have to consider some variants of usual algebraicgeometric codes. In this work, we present two variants of algebraic-geometric codes–folded
algebraic geometric codes and usual algebraic geometric codes with evaluation points over
subfields. We describe these in turn.
2.1.1. Folding AG codes. The first approach is to use suitable automorphisms of function
fields to fold the code. This approach was used for Reed-Solomon codes in [11] and for
cyclotomic function field in [6], though this was done using the original approach in [11]
where the messages to be list decoded were pinned down to the roots of a higher degree
polynomial over a large residue field. As mentioned earlier, effecting this “non-linear”
approach in [11, 6] with automorphisms of more general function fields seems intricate at
best. In this work we employ the linear-algebraic list decoding method of [14]. However,
the correct generalization of the linear-algebraic list decoding approach to the function
field case is also not obvious. One of the main algebraic insights in this work is noting
that the right way to generalize the linear-algebraic approach to codes based on algebraic
function fields is to rely on the local power series expansion of functions from the message
space at a suitable rational point. (The case for Reed-Solomon codes being the expansion
around 0, which is a finite polynomial form.)
Working with a suitable automorphism which has a “diagonal” action on the local
expansion lets us extend the linear-algebraic decoding method to AG codes. Implementing
this for specific AG codes requires an explicit specification of a basis for an associated
message (Riemann-Roch) space, and the efficient computation of the local expansion of
8
V. GURUSWAMI AND C. XING
the basis elements at a special rational point on the curve. We show how to do this for two
towers of function fields: the Hermitian tower [22] and the asymptotically optimal GarciaStichtenoth tower [4, 5]. The former tower is quite simple to handle — it has an easily
written down explicit basis, and we show how to compute the local expansion of functions
around the point with all zero coordinates. However, the Hermitian tower does not have
bounded ratio of the genus to number of rational points, and so does not give constant
alphabet codes (we can get codes over an alphabet size that is polylogarithmic in the
block length though). Explicit basis for Riemann-Roch spaces of the Garcia-Stichtenoth
tower were constructed in [23]. Regarding local expansions, one major difference is that
we work with local expansion of functions at the point at infinity, which is fully “ramified”
in the tower. For both these towers, we find and work with a nice automorphism that acts
diagonally on the local expansion, and use it for folding the codes and decoding them by
solving a linear system.
2.1.2. Restricting evaluation points to a subfield. The second approach is to work with
“normal” algebraic-geometric codes, based on evaluating functions from a Riemann-Roch
space at some rational places, except we use a constant field extension of the function
field for the function space, but restrict to evaluating at rational places over the original
base field. Let use give a brief idea why restricting evaluation points to a subfield enables
correcting more errors. The idea behind list decoding results for folded RS (or derivative)
codes in [11, 14] is that the encoding of a message polynomial f ∈ FQ [X] includes the values
of f and closely related polynomials at the evaluation points. Given a string not too far
from the encoding of f , one can use this property together with the “interpolation method”
to find an algebraic condition that f (and its closely related polynomials) must satisfy, eg.
A0 (X) + A1 (X)f (X) + A2 (X)f ′ (X) + · · · + As (X)f (s−1) (X) = 0 in the case of derivative
codes [14] (here f (i) denotes the i’th formal derivative of f , and the A0 , A1 , . . . , As are
low-degree polynomials found by the decoder). The solutions f (X) to this equation form
an affine space, which can be efficiently found (and later pruned for list size reduction
when we pre-code messages into a subspace-evasive set).
For Reed-Solomon codes as in Definition 12, the encoding only includes the values of
f at α1 , α2 , . . . , αn . But since αi ∈ Fq , we have f (αi )q = f σ (αi ) where f σ is the polynomial
obtained by the action of the Frobenius automorphism that maps y 7→ y q on f (formally,
Pk−1
Pk−1 q j
f σ (X) = j=0
fj X if f (X) = j=1
fj X j ). Thus the decoder can “manufacture” the
2
3
values of f σ (and similarly f σ , f σ , etc.) at the αi . Applying the above approach then
s−1
enables finding a relation A0 (X) + A1 (X)f (X) + A2 (X)f σ (X) + · · · + As (X)f σ (X) = 0,
which is again an Fq -linear condition on f that can be used to solve for f . We remark
here that this approach can also be applied effectively to linearized polynomials, and can
be used to construct variants of Gabidulin codes that are list-decodable up to the optimal
1 − R fraction of errors (where R is the rate) in the rank metric [15].
To extend this idea to algebraic-geometric codes, we work with constant extensions
Fqm · F of algebraic function fields F/Fq . The messages belong to a Riemann-Roch space
over Fqm , but they are encoded via their evaluations at Fq -rational points. For decoding,
we recover the message function f in terms of the coefficients of its local expansion at
some rational point P . (The Reed-Solomon setting is a special case when F = Fq (X),
and P is 0, i.e., the zero of X.) To get the best trade-offs, we use AG codes based on
a tower of function fields due to Garcia and Stichtenoth [4, 5] which achieve the optimal
trade-off between the number of Fq -rational points and the genus. For this case, we recover
messages in terms of their local expansion around the point at infinity P∞ which is also
AG CODES & NEAR-OPTIMAL LIST DECODING
9
used to define the Riemann-Roch space of messages. So we treat this setting separately
(Section 9.3), after describing the framework for general AG codes first (Section 9.2).
2.2. Pseudorandomness. The above algebraic ideas enable us to pin down the messages
into a structured subspace of dimension linear in the message length. The specific structure
of the subspace is a certain “periodicity” — there is a subspace W ⊂ Fm
q such that once
f0 , f1 , . . . , fi−1 (the first i coefficients of the message polynomial) are fixed, fi belongs to a
coset of W . We now describe our ideas to prune this list, by restricting (or “pre-coding”)
the message polynomials to belong to carefully constructed pseudorandom subsets that
have small intersection with any periodic subspace.
2.2.1. Hierarchical subspace-evasive sets. The first approach to follows along the lines
of [14] and only encode messages in a subspace-evasive set which has small intersection
with low-dimensional subspaces. Implementing this in our case, however, leads to several
problems. First, since the subspace we like to avoid intersecting much has large dimension,
the list size bound will be linear in the code length and not a constant like in our final
result. More severely, we cannot go over the elements of this subspace to prune the list
as that would take exponential time. To solve the latter problem, we observe that the
subspace has a special “periodic” structure, and exploit this to show the existence of
large “hierarchically subspace evasive” (h.s.e) subsets which have small intersection with
the projection of the subspace on certain prefixes. Isolating the periodic property of the
subspaces, and formulating the right notion of evasiveness w.r.t to such subspaces, is an
important aspect of this work.
We also give a pseudorandom construction of good h.s.e sets using limited wise independent sample spaces, in a manner enabling the efficient iterative computation of the
final list of intersecting elements. Further our construction allows for efficient indexing
into the h.s.e set which leads to an efficient encoding algorithm for our code). As a further
ingredient, we note that the number of possible subspaces that arise in the decoding is
much smaller than the total number of possibilities. Using this together with an added
trick in the h.s.e set construction, we are able to reduce the list size to a constant.
2.2.2. Subspace designs. The approach based on h.s.e sets leads to excellent list size; however, we only know randomized constructions of h.s.e sets with the required properties.
Our second approach to prune the subspace of possible solutions is based on subspace
designs and leads to deterministic subcode constructions. Recall that the coefficients
f0 , f1 , . . . , fk−1 of the message polynomial (which belong to the extension field Fqm ) are
pinned down by the linear-algebraic list decoder to a periodic subspace with the property that there is an Fq -subspace W ⊂ Fqm such that once f0 , f1 , . . . , fi−1 are fixed, fi
belongs to a coset of W . Our idea then is to restrict fi to belong to a subspace Hi
where H1 , H2 , . . . , Hk are a collection of subspaces in Fm
q such that for any s-dimensional
m
subspace W ⊂ Fq , only a small number of them have non-trivial intersection with W .
P
More precisely, we require that ki=1 dim(W ∩ Hi ) is small. We call such a collection as
a subspace design in Fm
q . We feel that the concept of subspace designs is interesting in its
own right, and view the introduction of this notion in Section 10 as a key contribution in
this work. Indeed, subsequent work by Forbes and Guruswami [3] highlighted the central
role played by subspace designs in “linear-algebraic pseudorandomness” and in particular
how they lead to rank condensers and dimension expanders.
A simple probabilistic argument shows the existence of q Ω(εm) random subspaces of
dimension (1 − ε)m have small total intersection with every s-dimensional W . This construction can also be derandomized, though the construction complexity of the resulting
10
V. GURUSWAMI AND C. XING
codes becomes quasi-polynomial with this approach for the parameter choices needed in
the construction.
Fortunately, in a follow-on to [17], Guruswami and Kopparty gave explicit constructions of subspace designs with parameters nearly matching the random constructions [8].
One can pre-code with this subspace design to get explicit list-decodable sub-codes of
Reed-Solomon codes whose evaluation points are in a subfield (Section 11.1). However,
this construction inherits the large field size of Reed-Solomon codes.
For explicit subcodes of algebraic-geometric codes using subspace designs we need
additional ideas. The dimension k in the case of AG codes is much larger than the
alphabet size q m (in fact that is the whole point of generalizing to AG codes). So we
cannot have a subspace design in Fm
q with k subspaces. We therefore use several “layers”
of subspace designs in a cascaded fashion (Section 10.2) — the first one in Fm
q , the next
√
√
m
m
m
m
2
1
1
and so on. Since the mi ’s
one in Fq for m1 ≫ q , the third one in Fq for m2 ≫ q
increase exponentially, we only need about log∗ k levels of subspace designs. Each level
incurs about a factor 1/ε increase in the dimension of the “periodic subspace” (W when
we begin) at the corresponding scale. With a careful technical argument and choice of
parameters, we are able to obtain the bounds of Theorem 1.1(ii).
3. Periodic subspaces
In this section we formalize a certain “periodic” property of affine subspaces that will
arise in our list decoding application.
We begin with some notation. For a vector y = (y1 , y2 , . . . , ym ) ∈ Fm
q and positive
t
−t
+1
2
1
its projection onto coordinates
integers t1 6 t2 6 m, we denote by proj[t1 ,t2 ] (y) ∈ Fq
t1 through t2 , i.e., proj[t1 ,t2 ] (y) = (yt1 , yt1 +1 , . . . , yt2 ). When t1 = 1, we use projt (y) to
denote proj[1,t] (y). These notions are extended to subsets of strings in the obvious way:
proj[t1 ,t2 ] (S) = {proj[t1 ,t2 ] (x) | x ∈ S}.
Definition 1 (Periodic subspaces). For positive integers r, b, ∆ and κ := b∆, an affine
subspace H ⊂ Fκq is said to be (r, ∆, b)-periodic if there exists a subspace W ⊆ F∆
q of
(j−1)∆
dimension at most r such that for every j = 1, 2, . . . , b, and every “prefix” a ∈ Fq
the projected affine subspace of F∆
q defined as
,
{proj[(j−1)∆+1,j∆] (x) | x ∈ H and proj(j−1)∆ (x) = a}
∆
is contained in an affine subspace of F∆
q given by W + va for some vector va ∈ F
dependent on a.3
The motivation of the above definition will be clear when we present our linearalgebraic list decoders, which will pin down the messages that must be output within an
(where q m will be the alphabet size of the
(s − 1, m, k)-periodic (affine) subspace of Fmk
q
code, k its dimension, and s a parameter of the algorithm that governs how close the
decoding performance approaches the Singleton bound).
The following properties of periodic affine spaces follow from the definition.
Claim 3.1. Let H be an (r, ∆, b)-periodic affine subspace. Then for each j = 1, 2, . . . , b,
(1) the projection of H to the first j blocks of ∆ coordinates, projj∆ (H) = {projj∆ (x) |
x ∈ H}, has dimension at most jr. (In particular H has dimension at most br.)
3In fact, in our applications this affine space will either be empty or equal to a coset of W , but for a
simpler definition we just require that it is always contained in a coset of W .
AG CODES & NEAR-OPTIMAL LIST DECODING
(j−1)∆
(2) for each a ∈ Fq
proj(j−1)∆ (y) = a.
11
, there are at most q r extensions y ∈ projj∆ (H) such that
For an affine space H, its underlying subspace is the subspace S such that H is a
coset of S.
Definition 2 (Representing periodic affine subspaces). The canonical representation of
an (r, ∆, b)-periodic subspace H consists of a matrix B ∈ Fq∆×∆ such that ker(B) has
∆×∆ for 1 6 i 6 b and
dimension at most r, and vectors ai ∈ F∆
q and matrices Ai,j ∈ Fq
1 6 j < i, such that x ∈ H if and only if for every i = 1, 2, . . . , b the following holds:
i−1
X
ai +
Ai,j · proj[(j−1)∆+1,j∆] (x) + B · proj[(i−1)∆+1,i∆] (x) = 0 .
j=1
Ultra-periodic subspaces. For our result on pre-coding algebraic-geometric codes with
subspace designs, we will exploit an even stronger property that holds for the subspaces
output by the linear-algebraic list decoder. We formalize this notion below.
Definition 3. An affine subspace H of Fκq is said to be (r, ∆)-ultra periodic if for every
κ
κ
, setting bℓ = ℓ∆
, we have projbℓ ·ℓ∆ (H) is (ℓr, ℓ∆, bℓ )-periodic.
integer ℓ, 1 6 ℓ 6 ∆
The definition captures the fact that the subspace is periodic not only for blocks of
size ∆, but also for block sizes that are multiples of ∆. Thus the subspace looks periodic
in all “scales” simultaneously.
4. Preliminaries on function fields and algebraic-geometric codes
For convenience of the reader, we start with some background on global function fields
over finite fields. The reader may refer to [25, 20] for detailed background on function
fields and algebraic-geometric codes.
For a prime power q, let Fq be the finite field of q elements. An algebraic function
field over Fq in one variable is a field extension F ⊃ Fq such that F is a finite algebraic
extension of Fq (x) for some x ∈ F that is transcendental over Fq . The field Fq is called the
full constant field of F if the algebraic closure of Fq in F is Fq itself. Such a function field
is also called a global function field. From now on, we always denote by F/Fq a function
field F with the full constant field Fq .
Let PF denote the set of places of F . The divisor group, denoted
P by Div(F ), is the
free abelian group generated by all places in PF . An element G = P ∈PF nP P of Div(F )
is called a divisor of F , where nP = 0 for almost all P ∈ PF . We denote np by νP (G).
The support, denoted by Supp(G), of G is the set {P ∈ PF : nPP6= 0}. For a nonzero
function z ∈ F , the principal divisor of z is defined to be div(z) = P ∈PF νP (z)P , where
νP denotes the normalized
P and pole divisors of z are
P discrete valuation at P . The zero
defined to be div(z)0 = νP (z)>0 νP (z)P and div(z)∞ = − νP (z)<0 νP (z)P , respectively.
Riemann-Roch space. For a divisor G of F , we define the Riemann-Roch space associated with G by
L(G) := {f ∈ F ∗ : div(f ) + G > 0} ∪ {0},
where F ∗ denotes the set of nonzero elements of F . Then L(G) is a finite dimensional
space over Fq and its dimension ℓ(G) is determined by the Riemann-Roch theorem which
gives
ℓ(G) = deg(G) + 1 − g + ℓ(W − G),
12
V. GURUSWAMI AND C. XING
where g is the genus of F and W is a canonical divisor of degree 2g − 2. Therefore, we
always have that ℓ(G) > deg(G) + 1 − g and the equality holds if deg(G) > 2g − 1.
Consider finite extension Fqm over Fq and the constant extension Fm := Fqm · F
over F . A divisor G of F can be viewed as a divisor of Fm . Thus, we can consider the
Riemann-Roch space in Fm given by
∗
Lm (G) := {f ∈ Fm
: div(f ) + G > 0} ∪ {0}.
Then it is clear that Lm (G) contains L(G) and Lm (G) is a finite dimensional vector
space over Fqm . Furthermore, Lm (G) is the tensor product of L(G) with Fqm (see [24,
Proposition 5.8 of Chapter II]). This implies that
dimFqm (Lm (G)) = dimFq (L(G))
and an Fq -basis of L(G) is also an Fqm -basis of Lm (G).
Automorphism. For a function f and a place P ∈ PF with νP (f ) > 0, we denote
by f (P ) the residue class of f in the residue class field FP at P . For an automorphism
φ ∈ Aut(F/Fq ) and a place P , we denote by P φ the place {φ(x) : x ∈ P }. For a function
f ∈ F , we denote by f φ the action of φ on f . If νP (f ) > 0 and νP φ (f ) > 0, then one has
P
−1
−1
that νP (f φ ) > 0 and f (P φ ) = f φ (P ). Furthermore, for a divisor G = P ∈PF mP P
P
we denote by Gφ the divisor P ∈PF mP P φ . Therefore, we have
φ(L(G)) := {f φ : f ∈ L(G)} = L(Gφ ).
Assume that E/Fq is a subfield of F and φ is an automorphism of Aut(F/E). Then
for a divisor G of F that is invariant under φ, then we have φ(L(G)) = L(G). Next we
consider the constant extension Fm = Fqm · F . Let σ be the Frobenius automorphism
Fqm , i.e., σ(α) = αq for any α ∈ Fqm . Then σ can be extended to an automorphism of
Aut(Fm /F ).
Local expansion (or power series). Let F/Fq be a function field and let P be a
rational place. An element t of F is called a local parameter at P if νp (t) = 1 (such a
local
alwaysexists).
For a nonzero function f ∈ F with νP (f ) > v, we have
parameter
f
f
νP tv > 0. Put av = tv (P ), i.e., av is the value of the function f /tv at P . Note that
v
vt
the function f /tv − av satisfies νP tfv − av > 1, hence we know that νP f −a
> 0.
v+1
t
v
vt
(P ). Then νP (f − av tv − av+1 tv+1 ) > v + 2.
Put av+1 = f −a
tv+1
Assume that we have obtained a sequence {ar }m
r=v (m > v)
of Pelements
of Fq such
r
Pk
f− m
r
r=v ar t
that νP (f − r=v ar t ) > k + 1 for all v 6 k 6 m. Put am+1 =
(P ). Then
tm+1
Pm+1
νP (f − r=v ar tr ) > m + 2. In this way we continue our construction
Pmof ar .r Then we
obtain an infinite sequence {ar }∞
of
elements
of
F
such
that
ν
(f
−
q
P
r=v
r=v ar t ) > m + 1
for all m > v. We summarize the above construction in the formal expansion
∞
X
ar t r ,
(1)
f=
r=v
which is called the local expansion of f at P .
It is clear that the local expansions P
of a function depends on P
the choice of the local
m
i satisfies ν (f −
i
parameters t. Note that if a power series ∞
a
t
i
P
i=v
i=v ai t ) > m + 1 for
all m > v, then it is a local expansion of f . The above procedure shows that finding a local
expansion at a rational place is very efficient as long as the computation of evaluations of
functions at this place is easy.
AG CODES & NEAR-OPTIMAL LIST DECODING
13
If f belongs to a Riemann-Roch space L(G) with deg(G) = d. Denote νP (G) by v,
then the first d + 1 coefficients av , av+1 , . . . , av+d in (1) determines the function f . To see
this, assume that g is a function of L(G) with the same first d + 1 coefficients in its local
expansion. Then we have f − g ∈ L(G − (d + 1)P ) which is the zero vector space. This
implies that f = g.
Algebraic-geometric codes. Let P + {P1 , P2 , . . . , PN } be a set of N distinct rational
places of a function field F/Fq of genus g. Let G be a divisor of F with Supp(G) ∩ P = ∅.
Then the algebraic-geometric codes defined by
C(P, G) := {(f (P1 ), f (P2 ), . . . , f (PN )) : f ∈ L(G)}
is an Fq -linear code of length N . Furthermore, the dimensions of C(P, G) is equal to ℓ(G)
if N > deg(G).
The codes considered in this paper are variations of the above algebraic-geometric
codes, namely, folded algebraic-geometric codes and algebraic-geometric codes with evaluation points in a subfield.
5. Folded codes from the Hermitian tower
In this section, we will describe a family of folded codes based on the Hermitian
function field (or rather a tower of such fields).
5.1. Background on Hermitian tower. In what follows, let r be a prime power and
let q = r 2 . We denote by Fq the finite field with q elements. The Hermitian function
tower that we are going to use for our code construction was discussed in [22]. The
reader may refer to [22] for the detailed background on the Hermitian function tower, and
Stichtenoth’s book [25] for general background on algebraic function fields and their use in
constructing algebraic-geometric codes. The Hermitian tower is defined by the following
recursive equations
xri+1 + xi+1 = xr+1
,
i
i = 1, 2, . . . , e − 1.
Put Fe = Fq (x1 , x2 , . . . , xe ) for e > 2. We will assume that r > 2e.
Rational places. The function field Fe has r e+1 + 1 rational places. One of these is the
“point at infinity” which is the unique pole P∞ of x1 (and is fully ramified). The other r e+1
come from the rational places lying over the unique zero Pα of x1 −α for each α ∈ Fq . Note
that for every α ∈ Fq , Pα splits completely in Fe , i.e., there are r e−1 rational places lying
over Pα . Intuitively, one can think of the rational places of Fe (besides P∞ ) as being given
for i = 1, 2, . . . , e − 1. For
by e-tuples (α1 , α2 , . . . , αe ) ∈ Feq that satisfy αri+1 + αi+1 = αr+1
i
each value of α ∈ Fq , there are precisely r solutions to β ∈ Fq satisfying β r + β = αr+1 ,
so the number of such e-tuples is r e+1 (q = r 2 choices for α1 , and then r choices for each
successive αi , 2 6 i 6 e).
Riemann-Roch spaces. For a place P of Fe , we denote by νP the discrete valuation of
P : for a function h ∈ Fe , if h has a zero at P , then νP (h) gives the number (multiplicity)
of zeroes, if h has a pole at P , then −νP (h) gives the pole order of h at P , and νP (h) = 0
if h has neither a zero or a pole at P .
For an integer l, we consider the Riemann-Roch space defined by
L(lP∞ ) := {h ∈ Fe \ {0} : νP∞ (h) > −l} ∪ {0}.
14
V. GURUSWAMI AND C. XING
Then the dimension ℓ(lP∞ ) is at least l − ge + 1 and furthermore, ℓ(lP∞ ) = l − ge + 1 if
l > 2ge − 1. A basis over Fq of L(lP∞ ) can be explicitly constructed as follows
)
(
e
X
j1
e−i
i−1
e
je
ji r (r + 1)
6l .
(2)
x1 · · · xe : (j1 , . . . , je ) ∈ Z>0 ,
i=1
We stress that evaluating elements of L(lP∞ ) at the rational places of Fe (other than
P∞ ) is easy: we simply have to evaluate a linear combination of the monomials allowed
in (2) at the tuples (α1 , α2 , . . . , αe ) ∈ Feq mentioned above. In other words, it is just
evaluating an e-variate polynomial at a specific subset of r e+1 points of Feq , and can be
accomplished in polynomial time.
Genus. The genus ge of the function field Fe is given by
(3)
!
e−1
e
e
1 i−1
er e X e i−1
re X e 1
1 X e
e−1
r 1+
6 er e
6
− (r + 1)
+1 6
ge =
2
r
2
2
r
i r i−1
i=1
i=1
i=1
where the last step used r > 2e.
A useful automorphism. Let γ be a primitive element of Fq and consider the automorphism σ ∈ Aut(Fe /Fq ) defined by
i−1
σ : xi 7→ γ (r+1)
xi
for i = 1, 2, . . . , e.
The order of σ is q − 1 and furthermore, we have the following facts:
(i) Let P0 be the unique common zero of x1 , x2 , . . . , xe (this corresponds to the e-tuple
(0, 0, . . . , 0)), and P∞ the unique pole of x1 . The automorphism σ keeps P0 and
P∞ unchanged, i.e., P0σ = P0 and P∞ σ = P∞ ,
(ii) Let P be the set of all the rational places which are neither P∞ nor zeros of x1 . Then
|P| = (q − 1)r e−1 . Moreover, σ divides P into r e−1 orbits and each orbit has q − 1
places. For an integer m with 1 6 m 6 q − 1, we can label N m distinct
k
j elements
m−1
m−1
q−1
σ
σ
σ
e−1
σ
, . . . , PN , PN , . . . , PN
in P, as long as N 6 r
P1 , P1 , . . . , P1
m .
Definition 4 (Folded codes from the Hermitian tower). Assume
j
k that m, l, N are positive
q−1
e−1
integers satisfying 1 6 m 6 q − 1 and l/m 6 N 6 r
m . The folded code from
f
Fe with parameters N, l, q, e, m, denoted by FH(N,
l, q, e, m), encodes a message function
f ∈ L(lP∞ ) as
f (PN )
f (P2 )
f (P1 )
f (PNσ )
f (P1σ ) f (P2σ )
N
(4)
f 7→
.
..
..
,...,
∈ Fm
..
,
q
.
.
.
m−1
m−1
m−1
f (PNσ
)
)
f (P2σ
)
f (P1σ
f
Lemma 5.1. The above code FH(N,
l, q, e, m) is an Fq -linear code over alphabet size q m ,
l−ge +1
rate at least N m , and minimum distance at least N − ml .
Proof. It is clear that the map (4) is an Fq -linear map. The dimension over Fq of the
message space L(lP∞ ) is at least l − ge + 1 by the Riemann-Roch theorem, which gives the
claimed lower bound on rate. For the distance property, observe that if the i-th column
is zero, then f has m zeros. This implies that the encoding of a nonzero function f can
have at most l/m zero columns since f ∈ L(lP∞ ).
AG CODES & NEAR-OPTIMAL LIST DECODING
15
5.2. Redefining the code in terms of local expansion at P0 . For our decoding, we
will actually recover the message f ∈ L(lP∞ ) in terms of the coefficients of its power series
expansion around P0
f = f 0 + f 1 x + f 2 x2 + · · ·
where x := x1 is the local parameter at P0 (which means that x1 has exactly one zero at P0 ,
i.e., νP0 (x1 ) = 1). In fact, realizing that one must work in this power series representation
is one of the key insights in this work.
Let us first show that one can efficiently move back-and-forth between the representation of f ∈ L(lP∞ ) in terms of a basis for L(lP∞ ) and its power series representation
(f0 , f1 , . . . ) around P0 . Since the mapping f 7→ (f0 , f1 , . . . ) is Fq -linear, it suffices to
compute the local expansion at P0 of a basis for L(lP∞ ).
Lemma 5.2. For any n, one can compute the first n terms of the local expansion of the
basis elements (2) at P0 using poly(n) operations over Fq .
Proof. By the structure of the basis functions in (2), it is sufficient to find an algorithm of
efficiently finding local expansions of xi at P0 for every i = 1, 2, . . . , e. We can inductively
find the local expansions of xi at P0 as follows.
ci,j
For i = 1, x1 is the local parameter x of P0 , so x is the local expansion of x1 at P0 .
P
j
Now assume that we know the local expansion of xi = ∞
j=1 ci,j x at P0 for some
∈ Fq . Then we have
∞
∞
∞
∞
X
X
X
X
ci+1,j xj = xri+1 + xi+1 = xr+1
=
cri,j xjr
ci,j xj .
cri+1,j xjr +
i
j=1
j=1
j=1
j=1
By comparing the coefficients of xj in the above identity, we can easily solve ci+1,j ’s from
ci,j ’s. More specifically, the coefficient of xj at the left of the identity is
ci+1,j
if r 6 |j
ci+1,j + cri+1,j/r if r|j.
Thus, all ci+1,j ’s can be easily solved recursively.
To keep the list output by the algorithm at a controllable size, we will combine the
code with certain special subspace evasive sets. For this purpose, we will actually need
to index the messages of the code by the first k coefficients (f0 , f1 , . . . , fk−1 ) of the local
expansion of the function f at P0 . This requires that for every (f0 , f1 , . . . , fk−1 ) there is
a f ∈ L(lP∞ ) whose power series expansion has the fi as the first k coefficients. This is
easy to ensure by taking l = k + 2ge − 1 as we argue below. Note that to ensure that
L(lP∞ ) has dimension k, it suffices to pick l = k + ge − 1 by the Riemann-Roch theorem.
We pick l to be ge more than this bound. Since the genus will be much smaller than the
code length, we can afford this small loss in parameters.
Let us define the local expansion map evP0 : L((k + 2ge − 1)P∞ ) → Fkq that maps f
to (f0 , f1 , . . . , fk−1 ) where f = f0 + f1 x + f2 x2 + · · · is the local expansion of f at P0 .
Claim 5.3. evP0 is an Fq -linear surjective map. Further, we can compute evP0 using
poly(k, ge ) operations over Fq given a representation of the input f ∈ L((k + 2ge − 1)P∞ )
in terms of the basis (2).
Proof. The Fq -linearity of evP0 is clear. The kernel of evP0 is L((k+2ge −1)P∞ −kP0 ) which
has dimension exactly ge by the Riemann-Roch theorem. By the rank-nullity theorem,
16
V. GURUSWAMI AND C. XING
the image must have dimension k, and so the map is surjective. The claimed complexity
of computation follows immediately from Lemma 5.2.
For each (f0 , f1 , . . . , fk−1 ) ∈ Fkq , we can therefore pick a pre-image in L((k + 2ge −
1)P∞ ). For convenience, we will denote an injective map making such a unique choice by
κP0 : Fkq → L((k + 2ge − 1)P∞ ). By picking the pre-images of a basis of Fkq and extending
it by linearity, we can assume κP0 to be Fq -linear, and thus specify it by a (k + ge ) × k
matrix. We record this fact for easy reference below.
Claim 5.4. The map κP0 : Fkq → L((k + 2ge − 1)P∞ ) is Fq -linear and injective. We can
compute a representation of this linear transformation using poly(k, ge ) operations over
Fq , and the map itself can be evaluated using poly(k, ge ) operations over Fq .
N by
We will now redefine a version of the folded Hermitian code that maps Fkq to (Fm
q )
composing the folded encoding (4) from the original Definition 4 with κP0 .
Definition 5 (Folded Hermitian code using local expansion). The folded Hermitian code
f
k + 2ge − 1, q, e, m)(κP0 (f ))
FH(N, k, q, e, m) maps f = (f0 , f1 , . . . , fk−1 ) ∈ Fkq to FH(N,
N
m
∈ (Fq ) .
The rate of the above code equals k/(N m) and its distance is at least N − (k + 2ge −
1)/m.
5.3. List decoding folded codes from the Hermitian tower. We now present a list
decoding algorithm for the above codes. The algorithm follows the linear-algebraic list
decoding algorithm for folded Reed-Solomon codes. Suppose a codeword (4) encoding
f ∈ Im(κP0 ) ⊆ L((k + 2ge − 1)P∞ ) is transmitted and received as
y1,1 y2,1
yN,1
..
y2,2
.
y
(5)
y = 1,2
..
.
y1,m · · ·
yN,m
where some columns are erroneous. Let s > 1 be an integer parameter associated with
the decoder.
Lemma 5.5. Given a received word as in (5), using poly(N ) operations over Fq , we can
find a nonzero linear polynomial in Fe [Y1 , Y2 , . . . , Ys ] of the form
(6)
satisfying
(7)
Q(Y1 , Y2 , . . . , Ys ) = A0 + A1 Y1 + A2 Y2 + · · · + As Ys
j
j
j
Q(yi,j , yi,j+1 , · · · , yi,j+s−1 ) = A0 (Piσ ) + As (Piσ )yi,j+1 + · · · + As (Piσ )yi,j+s = 0
for i = 1, 2, . . . , N and j = 0, 1, . . . , m−s. The coefficients Ai of Q satisfy Ai ∈ L(DP∞ )
for i = 1, 2, . . . , s and A0 ∈ L((D + k + 2ge − 1)P∞ ) for a “degree” parameter D chosen as
N (m − s + 1) − k + (s − 1)ge + 1
(8)
D=
.
s+1
Proof. If we fix a basis of L(DP∞ ) (of the form (2)) and extend it to a basis of L((D +
k + 2ge − 1)P∞ ), then the number of freedoms of A0 is at least D + k + ge and the number
of freedoms of Ai is at least D − ge + 1 for i > 1. Thus, the total number of freedoms in
the polynomial Q equals
(9)
s(D − ge + 1) + D + k + ge = (s + 1)(D + 1) − (s − 1)ge − 1 + k > N (m − s + 1)
AG CODES & NEAR-OPTIMAL LIST DECODING
17
for the above choice (8) of D. The interpolation requirements on Q ∈ Fe [Y1 , . . . , Ys ] are
the following:
(10)
j
j
j
Q(yi,j , yi,j+1 , · · · , yi,j+s−1 ) = A0 (Piσ ) + As (Piσ )yi,j+1 + · · · + As (Piσ )yi,j+s = 0
for i = 1, 2, . . . , N and j = 0, 1, . . . , m − s. The interpolation requirements on Q give
a total of N (m − s + 1) homogeneous linear equations that the coefficients of the Ai ’s
w.r.t the chosen basis of L((D + k + 2ge − 1)P∞ ) must satisfy. Since the number of such
coefficients (degrees of freedom in Q) exceeds N (m − s + 1), we can conclude that such a
linear polynomial Q as required by the lemma must exist, and can be found by solving a
homogeneous linear system over Fq with about N (m − s + 1) variables and constraints.
Similar to earlier interpolation based list decoding algorithms, the following lemma gives
an algebraic condition that the message functions f ∈ L((k +2ge −1)P∞ ) we are interested
in list decoding must satisfy. The proof is a standard argument comparing the pole order
to the number of zeroes.
Lemma 5.6. If f is a function in L((k + 2ge − 1)P∞ ) whose encoding (4) agrees with the
e −1
received word y in at least t columns with t > D+k+2g
m−s+1 , then
−1
Q(f, f σ , . . . , f σ
(11)
−(s−1)
) = A0 + A1 f + A2 f σ
−1
+ · · · + As f σ
−(s−1)
= 0.
−1
Proof. The proof proceeds by comparing the number of zeros of the function Q(f, f σ ,
−(s−1)
−1
−(s−1)
with D + k + 2ge − 1. Note that
) = A0 + A1 f + A2 f σ + · · · + As f σ
. . . , fσ
−(s−1)
−1
σ
σ
) is a function in L((D+k+2ge −1)P∞ ). If column i of the encoding
,...,f
Q(f, f
(4) of f agrees with y, then for all j = 0, 1, . . . , m − s, we have
j
j
j
j
j
j
0 = A0 (Piσ ) + A1 (Piσ )yi,j+1 + A2 (Piσ )yi,j+2 + · · · + As (Piσ )yi,j+s
j
j
= A0 (Piσ ) + A1 (Piσ )f (Piσ ) + A2 (Piσ )f (Piσ
=
j
) + · · · + As (Piσ )f (Piσ
j+s−1
)
j
j
j
−(s−1)
j
j
j
−1
(Piσ )
+ A1 (Piσ )f (Piσ ) + A2 (Piσ )f σ (Piσ ) + · · · + As (Piσ )f σ
j
−(s−1)
−1
)(Piσ ) .
A1 f + A2 f σ + · · · + As f σ
we use the fact that f σ (P σ ) = f (P )σ = f (P ), or equivalently f (P σ )
j
A0 (Piσ )
= (A0 +
j+1
Note that here
=
−(s−1)
−1
−1
) has (m − s + 1) distinct zeros from this
f σ (P ). In other words, Q(f, f σ , . . . , f σ
agreeing column. Thus, there are a total of at least t(m − s + 1) zeros for all the agreeing
−(s−1)
−1
) must be the zero function when t(m − s − 1) >
columns. Hence, Q(f, f σ , . . . , f σ
D + k + 2ge − 1.
Solving the functional equation for f . Our goal next is to recover the list of solutions
f to the functional equation (11). Recall that our message functions lie in Im(κP0 ), so we
can recover
f by recovering the top k coefficients (f0 , f1 , . . . , fk−1 ) of its local expansion
P
j
f= ∞
f
j=0 j x at P0 . We now prove that (f0 , f1 , . . . , fk−1 ) for f satisfying Equation (11)
belong to a “periodic” subspace (in the sense of Definition 1) of not too large dimension.
Lemma 5.7. The set of solutions (f0 , f1 , . . . , fk−1 ) ∈ Fkq such that f = f0 + f1 x + f2 x2 +
· · · ∈ L((k + 2ge − 1)P∞ ) obeys equation
(12)
A0 + A1 f + A2 f σ
−1
+ · · · + As f σ
−(s−1)
=0,
when the Ai ’s obey the pole order restrictions of Lemma 5.5 and at least one Ai is nonzero,
k
⌉)-periodic subspace (note that we do not require (q − 1)|k here and
is an (s − 1, q − 1, ⌈ q−1
k
⌉ by padding with 0’s). Further, there
one could extend the subspace to length (q − 1)⌈ q−1
are at most q N m+s+1 possible choices of this subspace over varying choices of the Ai ’s.
18
V. GURUSWAMI AND C. XING
Proof. Let u = min{νP0 (Ai ) : i = 1, 2, . . . , s}. Then it is clear that u > 0 and νP0 (A0 ) > u.
Each Ai has a local expansion at P0 :
Ai = xu
∞
X
ai,j xj
j=0
for i = 0, 1, . . . , s − 1, which can be efficiently computed from the basis representation of
the Ai ’s. From the definition of u, one knows that the polynomial
B0 (X) := a1,0 + a2,0 X + · · · + as,0 X s−1
is nonzero. Assume that at P0 , the function f has a local expansion
f
σ−i
has a local expansion at P0 as follows
f
σ−i
=
∞
X
P∞
j=0 fj x
j.
Then
ξ ij fj xj ,
j=0
−1
where ξ = 1/γ. The coefficient of xd+u in the local expansion of Q(f, f σ , . . . , f σ
is
(13)
0 = B0 (ξ d )fd +
d−1
X
−(s−1)
)
bi fi + a0,d ,
i=0
where bi ∈ Fq is a linear combination of ai,j which does not involve fj . Hence, fd is uniquely
determined by f0 , . . . , fd−1 as long as B0 (ξ d ) 6= 0. Let S := {0 6 d 6 q − 2 : B0 (ξ d ) = 0}.
Then it is clear that |S| 6 s − 1 since the order of ξ is q − 1 and B0 (X) has degree at most
s − 1. Thus, B0 (ξ j ) 6= 0 if and only if j mod (q − 1) ∈
/ S; and in this case fj is a fixed
affine linear combination of fi for 0 6 i < j.
k
)Let W be the set of solutions (f0 , f1 , . . . , fk−1 ). The fact that W is (s, q − 1, q−1
periodic follows from (13). Note that the coefficients bd−j for j > 1 in that equation are
given by Bj (ξ d−j ) where Bj (X) := a1,j + a2,j X + · · · + as,j X s−1 . Therefore, once the
values of fi , 0 6 i < (j − 1)(q − 1) are fixed, the possible choices for the next block
of (q − 1) coordinates, f(j−1)(q−1) , · · · , fj(q−1)−1 , lie in an affine shift of a fixed subspace
of dimension at most (s − 1). Further, this shift is an easily computed affine linear
combination of the fi ’s in the previous blocks. This implies the efficient computability of
the claimed representation of W .
Finally, by the choice of D in (8), the total number of possible (A0 , A1 , . . . , As )
and hence the number of possible functional equations (12), is at most q N (m−s+1)+s+1 6
q N m+s+1 . Therefore, the number of possible candidate subspaces W is also at most
q N m+s+1 .
Combining Lemmas 5.6 and 5.7, we conclude, after some simple calculations, that
one can find a representation of the (s, q − 1)-periodic subspace containing all candidate
messages (f0 , f1 , . . . , fk−1 ) in polynomial time, when the fraction of errors τ = 1 − t/N
satisfies
k
ge
s
3m
s
−
−
.
(14)
τ6
s + 1 s + 1 N (m − s + 1) m − s + 1 mN
Pruning the subspace. Applying Lemma 9.8 directly we would get a list size bound of
≈ q sk/q which would be super-polynomial in the code length unless k = O(q). Thus this
idea does not directly allow us to get good list decodable codes while keeping the base
field size small or achieve a list size that grows polynomially in s. Instead what we show
AG CODES & NEAR-OPTIMAL LIST DECODING
19
is that by only encoding (f0 , f1 , . . . , fk−1 ) ∈ Fkq that are restricted to belong to a special
subspace-evasive set, we can (i) bring down the list size, and (ii) find this list efficiently
in polynomial time (and further the exponent of the polynomial is independent of ε, the
gap to capacity). To this end, we develop the necessary machinery concerning subspace
evasive sets next. Later, in Section 8.1, we combine these subspace evasive sets with our
folded Hermitian codes to get good list-decodable codes.
6. Subspace evasive sets with additional structure
Let us first recall the notion of “ordinary” subspace-evasive sets from [7].
Definition 6. A subset S ⊂ Fkq is said to be (d, ℓ)-subspace-evasive if for all d-dimensional
affine subspaces W of Fkq , we have |S ∩ W | 6 ℓ.
We next define the notion of evasiveness w.r.t a collection of subspaces instead of all
subspaces of a particular dimension.
Definition 7. Let F be a family of (affine) subspaces of Fkq , each of dimension at most
d. A subset S ⊂ Fkq is said to be (F, d, ℓ)-evasive if for all W ∈ F, we have |S ∩ W | 6 ℓ.
6.1. Hierarchical subspace-evasive sets. The key to pruning the list to a small size is
the notion of a hierarchical subspace-evasive set, which is defined as a subset of Fkq with the
property that some of its prefixes are subspace-evasive with respect to (s, ∆, b)-periodic
subspaces. We will show how the special subspace-evasive sets help towards pruning the
list in our list decoding context in Section 6.4.
Definition 8. Let F be a family of (s, ∆, b)-periodic subspaces of Fkq with k = b∆. A subset
S ⊂ Fkq is said to be (F, s, ∆, b, L)-h.s.e (for hierarchically subspace evasive for block size
∆) if for every affine subspace W ∈ F, the following bound holds for j = 1, 2, . . . , b:
|projj∆ (S) ∩ projj∆ (W )| 6 L .
6.2. Random sets are hierarchically subspace evasive. Our goal is to give a randomized construction of large h.s.e sets that works with high probability, with the further
properties that one can index into elements of this set efficiently (necessary for efficient
encoding), and one can check membership in the set efficiently (which is important for
efficient decoding).
An easy probabilistic argument, see [7], shows that a random subset of Fkq of size
about q (1−ζ)k is (d, O(d/ζ))-subspace evasive with high probability. As a warmup, let us
work out the similar proof for the case when we have only to avoid a not too large family
F of all possible d-dimensional affine subspaces. The advantage is that the guarantee on
the intersection size is now O(1/ζ) and independent of the dimension d of the subspaces
one is trying to evade.
Lemma 6.1. Let ζ ∈ (0, 1) and k be a large enough positive integer. Let F be a family
of affine subspaces of Fkq , each of dimension at most d 6 ζk/2, with |F| 6 q ck for some
positive constant c.
Let W be a random subset of Fkq chosen by including each x ∈ Fkq in W with probability
q −ζk . Then with probability at least 1 − q −ck , W satisfies both the following conditions: (i)
|W| > q (1−2ζ)k , and (ii) W is (F, d, 4c/ζ)-evasive.
20
V. GURUSWAMI AND C. XING
Proof. The first part follows by noting that the expected size of W equals q (1−ζ)k and a
standard Chernoff bound calculation. For the second part, fix an affine subspace S ⊆ F
of dimension at most d, and a subset T ⊆ S of size t, for some parameter t to be specified
shortly. The probability that W ⊇ T equals q −ζkt. By a union bound over the at most q ck
choices for the affine subspace S ∈ F, and the at most q dt choices of t-element subsets T
of S, we get that the probability that W is not (F, d, t)-evasive is at most q ck+dt · q −ζkt 6
q ck q −ζkt/2 since d 6 ζk/2. Choosing t = ⌈4c/ζ⌉, this quantity is bounded from above by
q −ck .
6.3. Pseudorandom construction of large h.s.e subsets. We next turn to the pseudorandom construction of large h.s.e subsets. Suppose, for some fixed subset F of (s, ∆, b)periodic subspaces of Fkq with k = b∆, we are interested in an (F, s, ∆, b, L)-h.s.e subset
of Fkq of size ≈ q (1−ζ)k for a constant ζ, 1/∆ < ζ < 1/3. For simplicity, let us assume
that the block size ∆ divides k, though arbitrary k can be easily handled. (We will also
ignore floors and ceilings in the description to avoid notational clutter; those are easy to
accommodate and do not affect any of the claims.) The parameters b, ∆, k and field size
q will be considered fixed for the rest of the discussion in this section.
Denote ∆′ = (1 − ζ)∆, b′ = (1 − ζ)b, and k′ = b′ ∆ = (1 − ζ)k.
The random part of the construction will consist of mutually independent, random
univariate polynomials P1 , P2 , . . . , Pb′ and Q, where Pj ∈ Fqj∆′ [T ] for 1 6 j 6 b′ and
Q ∈ Fqk′ [T ] are random polynomials of degree λ.4 The degree parameter will be chosen
to be λ = Θ(k).5
The key fact we will use about random polynomials is the following, which follows
by virtue of the λ-wise independence of the values of a random degree λ polynomial.
Fact 6.2. Let P ∈ K[T ] be a polynomial of degree λ whose coefficients are picked uniformly
and independently at random from the field K. For a fixed subset T ⊆ K with |T | 6 λ, the
values {P (α)}α∈T are independent random values in K.
We remark that this property of low-degree polynomials was also the basis of the
pseudorandom construction of subspace evasive sets in [14]. However, since we require the
h.s.e property, and need to exploit the periodicity of the subspaces we are trying to evade
(which can have large dimension), the construction here is more complicated, and needs
to use several polynomials Pj ’s evaluated in a nested fashion, and one further polynomial
Q to further bring down the list size to a constant (this final use of Q is similar in spirit
to the construction in [14]). We remark that the construction presented here is a bit
simpler and cleaner than the one in the conference version [16], and comes with efficient
encoding automatically by construction. In contrast, the construction in [16] required
some additional work in order to allow for efficient encoding.
In what follows we assume that, for j = 1, 2, . . . , b′ , some fixed bases of the fields
Fqj∆′ have been chosen, giving us some canonical Fq -linear injective maps
′
ρj : Fj∆
→ Fqj∆′ .
q
4We will assume that representations of the necessary extension fields Fi∆′ are all available. For this
q
purpose, we only need irreducible polynomials over Fq of appropriate degrees, which can be constructed
by picking random polynomials and checking them for irreducibility. Our final construction is anyway
randomized, so the randomized nature of this step does not affect the results.
5The degree of Q can in fact be just O(1/ζ), but for uniformity we fix the degree of all polynomials to
be the same.
AG CODES & NEAR-OPTIMAL LIST DECODING
Also, for j = 1, 2, . . . , b′ , let
21
ξj : Fqj∆′ → Fζ∆
q
be some arbitrary Fq -linear surjective map (thus ξj just outputs the first ζ∆ coordinates of
′
w.r.t some fixed basis). Finally,
the representation of elements of Fqj∆′ as vectors in Fj∆
q
let ρ : Fkq → Fqk′ be some fixed Fq -linear injective map, and ξ : Fqk′ → Fζk
q be an arbitrary
Fq -linear surjective map.
′
We are now ready to describe our construction of h.s.e set based on the random
polynomials P1 , P2 , . . . , Pb′ , Q.
Definition 9 (h.s.e set construction). Given the polynomials Pj ∈ Fqj∆′ [T ] for i =
1, 2, . . . , b′ and Q ∈ Fqk′ [T ], define the subset Γ(P1 , P2 , . . . , Pb ; Q) by
n
′
(y1 , z1 , y2 , z2 , . . . , yb′ , zb′ ; w) ∈ Fkq for j = 1, 2, . . . , b′ : yj ∈ F∆
q ,
zj = ξj (Pj (ρj (y1 ◦ y2 ◦ · · · ◦ yj ))) ∈ Fζ∆
q ; and
o
.
w = ξ(Q(ρ(y1 , z1 , . . . , yb′ , zb′ ))) ∈ Fζk
q
By construction, once suitable representations of the extension fields are available
by pre-processing and the choice of P1 , . . . , Pb′ , Q is made, we can efficiently compute
(1−ζ)2 k
a bijective encoding map HSE : Fq
→ Γ(P1 , P2 , . . . , Pb ; Q). Indeed, we can view
′
′ ∆′
b
as (y1 , y2 , . . . , yb′ ) with yj ∈ F∆
the input y ∈ Fq
q and then compute the zj ’s and w
efficiently using poly(k) operations over Fq (recall that the degree of the polynomials is
λ = Θ(k)).
We now move on to the main claim about the h.s.e property of our construction.
Theorem 6.3. Let ζ ∈ (0, 1/3) and s be a positive integer satisfying s < ζ∆/10. Let F
be a subset of at most q ck (s, ∆, b)-periodic subspaces of Fkq for k = b∆ and some positive
constant c. Suppose that the parameters satisfy the condition q ζ∆ > (2q 2 ck)10/9 . Then
with probability 1 − q(−Ω(k)) over the choice of random polynomials {Pi }16i6b and Q each
of degree λ = ⌈ck⌉, the set Γ(P1 , P2 , . . . , Pb ; Q) from Definition 9 is
(F, s, ∆, b, L)-h.s.e and (F, sb, ℓ)-evasive
for L = ⌈ck⌉ and ℓ = ⌈4c/ζ⌉.
Proof. Note that the first k′ = (1− ζ)k symbols of vectors in Γ(P1 , . . . , Pb′ ; Q) only depend
on the Pj ’s. We will first prove that with high probability over the choice of the Pj ’s the
following holds (call such a choice of Pj ’s as good):
For every W ∈ F, |projk′ (W ) ∩ projk′ (Γ)| < L, where we denote Γ as
shorthand for Γ(P1 , . . . , Pb′ ; Q).
Then, conditioned on a good choice of Pj ’s, we will prove that with high probability over
the choice of the random polynomial Q, |W ∩ Γ| < ℓ. Together, these steps will imply
that the set Γ(P1 , P2 , . . . , Pb′ ; Q) is (F, sb, ℓ)-evasive. (Note that every subspace in F has
dimension at most sb by Claim 3.1.) We will return to the (F, s, ∆, b, L)-h.s.e property at
the end of the proof.
Let us first establish the second step. Fix a good choice of P1 , . . . , Pb′ , and suppose
we pick Q randomly. Fix a subspace W ∈ F. Since |projk′ (W )∩projk′ (Γ)| < L (recall that
projk′ (Γ) only depends on the Pj ’s and thus is already determined), the number of elements
′
of W that could possibly belong to Γ (after the choice of Q) is at most L · q s(b−b ) = Lq ζsb ;
22
V. GURUSWAMI AND C. XING
′
indeed for each prefix belonging to projk′ (Γ)∩projk′ (W ), there are most q s(b−b ) extensions
that can fall in W since W is (s, ∆, b)-periodic. Further, the probability over the choice
of Q that any such fixed extension belongs to Γ is at most q −ζk , and any ℓ of these events
are independent. (Note that for a fixed prefix, there can be at most extension that falls in
Γ, so for ℓ different strings to fall in Γ, their prefixes must be distinct and are mapped to
independent locations by the random polynomial Γ.) Therefore, the probability over the
choice of Q that |W ∩ Γ| > ℓ is at most (Lq ζsb )ℓ q −ζkℓ . By a union bound over all W ∈ F,
we conclude that |W ∩ Γ| < ℓ for every W ∈ F simultaneously, except with probability at
most
q ck Lℓ q ζ(s−∆)bℓ 6 q ck (ck)ℓ q −ζ∆bℓ/2 = q ck q −ζkℓ/2
where in the first inequality we used s 6 ∆/2 and in the next one ck 6 q ζk both of which
hold comfortably. For ℓ > 4c/ζ, the above probability upper bound is at most q −ck .
We now turn to the first step, on the Pj ’s being good with high probability. Fix some
W ∈ F; we will prove by induction on j that
(15)
|projj∆ (W ) ∩ projj∆ (Γ)| < L
w.h.p over the choice of P1 , P2 , . . . , Pj , for 1 6 j 6 b′ (note that projj∆ (Γ) only depends
on P1 , . . . , Pj , so this event is well defined). For the base case j = 1, |proj∆ (W )| 6 q s
as W is (s, ∆, b)-periodic, and the probability that some L of these q s elements belong to
proj∆ (Γ) is at most q sL times the probability that L distinct elements in Fq∆′ are mapped
−ζ∆ L . So the overall probability
to specific values in Fζ∆
q by ξ1 ◦ P1 , which is at most q
that |proj∆ (W ) ∩ proj∆ (Γ)| > L is at most q (s−ζ∆)L .
Now let j > 2 and assume |proj(j−1)∆ (W ) ∩ proj(j−1)∆ (Γ)| < L. By the (s, ∆, b)periodicity of W , for each of the (less than L) prefixes in proj(j−1)∆ (W ) ∩ proj(j−1)∆ (Γ),
there are at most q s extensions that fall in projj∆ (W ). Similarly to the argument used
for second step above, the probability that some L of these belong to projj∆ (Γ) is at
most (Lq s )L · q −ζ∆L . Thus, the probability that |projj∆ (W ) ∩ projj∆ (Γ)| > L is at most
L
L · q (s−ζ∆) .
Combining these arguments, we conclude that the probability over the choice of the
Pj ’s that |projb′ ∆ (W ) ∩ projb′ ∆ (Γ)| > L is at most
b′ (L · q (s−ζ∆))L 6 (2ckq −0.9ζ∆ )L 6 q −2L
where the last step used the assumption that q ζ∆ > (2q 2 ck)10/9 .
Finally, since there are at most q ck subspaces W ∈ F, by a union bound we have
that for all W ∈ F simultaneously, |projk′ (W ) ∩ projk′ (Γ)| < L with probability at least
1 − q ck q −L = 1 − q −ck over the choice of P1 , . . . , Pb′ .
To finish the proof, we need to verify the (F, s, ∆, b, L)-h.s.e property. That is, we
need to prove that w.h.p, |projj∆ (W )∩projj∆ (Γ)| 6 L for every W ∈ F and j = 1, 2, . . . , b.
By (15), this holds for j = 1, 2, . . . , b′ . By construction, the last ζk symbols of any vector
in Γ is a function of the first (1 − ζ)k = b′ ∆ symbols, so |projj∆ (W ) ∩ projj∆ (Γ)| 6 L also
holds for b′ < j 6 b.
6.4. Efficient computation of intersection with h.s.e. subsets. The key aspect
which makes h.s.e subsets useful in our context to prune the affine space of candidate
messages, and indeed motivated the exact specifics of the definition and aspects of its
construction, is the following claim which shows that intersection of a (s, ∆, b)-periodic
subspace with our h.s.e set can found efficiently.
AG CODES & NEAR-OPTIMAL LIST DECODING
23
Lemma 6.4. There is an algorithm running in time poly(k, q ζ∆ ) that provides the following guarantee. Given as input the polynomials P1 , . . . , Pb′ and Q underlying the construction of an (F, s, ∆, b, L)-h.s.e and (F, sb, ℓ)-evasive set Γ = Γ(P1 , . . . , Pb′ ; Q) and an
(s, ∆, b)-periodic subspace W ⊆ Fkq belonging to F, the algorithm computes the at most ℓ
elements of W ∩ Γ.
Proof. The proof essentially follows from the observations made in the proof of Theorem 6.3. First note that claim that |W ∩ Γ(P1 , . . . , Pb′ ; Q) 6 ℓ just follows from the
(F, sb, ℓ)-evasiveness of Γ. To compute W ∩ Γ, the algorithm iteratively computes the
intersections projj∆ (W ) ∩ projj∆ (Γ) for 1 6 j 6 b′ . As Γ is (F, s, ∆, b, L)-h.s.e, this intersection has size at most L. To compute projj∆ (W )∩projj∆ (Γ), the algorithm runs over the
at most q s possible extensions of each element of proj(j−1)∆ (W ) ∩ proj(j−1)∆ (Γ) that can
belong to projj∆ (W ) (due to the (s, ∆, b)-periodicity of W ), and checks which ones also
belong to projj∆ (Γ). The complexity amounts to q O(s) evaluations of degree O(k) polynomials, and thus takes q O(ζ∆) poly(k) time. To compute W ∩Γ from projb′ ∆ (W )∩projb′ ∆ (Γ),
we recall the earlier observation that the construction of Γ implies that there is a unique
extension of an element in projb′ ∆ (Γ) that belongs to Γ.
We conclude this section by recording in convenient form all necessary properties of
our h.s.e set construction, which follow from Theorem 6.3 and Lemma 6.4.
Theorem 6.5. Let ζ ∈ (0, 1), and b, ∆, s, and k = b∆ be positive integers satisfying
s < ζ∆/10. Let F be a family of at most q ck (s, ∆, b)-periodic subspaces of Fkq . Then
the poly(k, log q) time randomized construction from Definition 9 of the injective map
(1−ζ)2 k
HSE : Fq
→ Fkq satisfies the following properties:
(1−ζ)2 k
(1) Given x ∈ Fq
, HSE(x) can be computed using poly(k) operations over Fq .
(1−ζ)2 k
(2) For every W ∈ F, the set {x ∈ Fq
| HSE(x) ∈ W } has size at most O(c/ζ),
and can be computed in poly(k, q ζ∆ ) time.
7. Folded codes from the Garcia-Stichtenoth tower
Compared with the Hermitian tower of function fields, the Garcia-Stichtenoth tower
of function fields yields folded codes with better parameters due to the fact that the GarciaStichtenoth tower is an optimal one in the sense that the ratio of number of rational places
against genus achieves the maximal possible value. The construction of folded codes from
the Garcia-Stichtenoth tower is almost identical to the one from the Hermitian tower
except for one major difference: the redefined code from the Garcia-Stichtenoth tower is
constructed in terms of the local expansion at point P∞ , while in the Hermitian case local
expansion at P0 is considered. For convenience of the reader, we give a parallel description
of folded codes from the Garcia-Stichtenoth tower, while only sketching the identical parts.
7.1. Background on Garcia-Stichtenoth tower. Again let r be a prime power and let
q = r 2 . We denote by Fq the finite field with q elements. The Garcia-Stichtenoth towers
that we are going to use for our code construction were discussed in [4, 5]. The reader
may refer to [4, 5] for the detailed background on the Garcia-Stichtenoth function tower.
There are two optimal Garcia-Stichtenoth towers that are equivalent. For simplicity, we
introduce the tower defined by the following recursive equations [5]
xr
, i = 1, 2, . . . , e − 1.
(16)
xri+1 + xi+1 = r−1i
xi + 1
24
V. GURUSWAMI AND C. XING
Put Ke = Fq (x1 , x2 , . . . , xe ) for e > 2.
Rational places. The function field Ke has at least r e−1 (r 2 − r) + 1 rational places. One
of these is the “point at infinity” which is the unique pole P∞ of x1 (and is fully ramified).
The other r e−1 (r 2 − r) come from the rational places lying over the unique zero of x1 − α
for each α ∈ Fq with αr + α 6= 0. Note that for every α ∈ Fq with αr + α 6= 0, the unique
zero of x1 − α splits completely in Ke , i.e., there are r e−1 rational places lying over the
zero of x1 − α. Let P be the set of all the rational places lying over the zero of x1 − α for all
α ∈ Fq with αr + α 6= 0. Then, intuitively, one can think of the r e−1 (r 2 − r) rational places
αr
in P as being given by e-tuples (α1 , α2 , . . . , αe ) ∈ Feq that satisfy αri+1 + αi+1 = αr−1i +1 for
i
i = 1, 2, . . . , e − 1 and αr1 + α1 6= 0. For each value of α ∈ Fq , there are precisely r solutions
αr
to β ∈ Fq satisfying β r + β = αr−1
, so the number of such e-tuples is r e−1 (r 2 − r) (r 2 − r
+1
choices for α1 , and then r choices for each successive αi , 2 6 i 6 e).
Riemann-Roch spaces. As shown in [23], every function of Ke with a pole only at P∞
has an expression of the form
(e−2)r+1 r−1
r−1
i1 i2
i
e
X
X X
x x · · · xe
,
ci h1 1 2
(17)
xa1
···
π2 . . . πe−1
i1 =0
ie =0
i2 =0
where a > 0, ci ∈ Fq , and for 1 6 j < e, hj = xjr−1 + 1 and πj = h1 h2 . . . hj . Moreover,
Shum et al. [23] present an algorithm running in time polynomial in l that outputs a basis
of over Fq of L(lP∞ ) explicitly in the above form.
We stress that evaluating elements of L(lP∞ ) at the rational places of P is easy: we
simply have to evaluate a linear combination of the monomials allowed in (17) at the tuples
(α1 , α2 , . . . , αe ) ∈ Feq mentioned above. In other words, it is just evaluating an e-variate
polynomial at a specific subset of r e−1 (r 2 − r) points of Feq , and can be accomplished in
polynomial time.
Genus. The genus ge of the function field Ke is given by
e/2
(r − 1)2
if e is even
ge =
(e−1)/2
(e+1)/2
(r
− 1)(r
− 1) if e is odd.
Thus the genus ge is at most r e . (Compare this with the er e bound for the Hermitian tower;
this smaller genus is what allows to pick e as large as we want in the Garcia-Stichtenoth
tower, while keeping the field size q fixed.)
A useful automorphism. Let γ be a primitive element of Fr and consider the automorphism σ ∈ Aut(Ke /Fq ) defined by
σ : xi 7→ γ (r+1)r
i−1
xi
for i = 1, 2, . . . , e.
Then the order of σ is r − 1 and furthermore, we have the following facts:
(i) σ keeps P∞ unchanged, i.e., P∞ σ = P∞ ;
(ii) Let P be the set of all the rational places lying over x1 − α for all α ∈ Fq with
αr + α 6= 0. Then |P| = (r − 1)r e . Moreover, σ divides P into r e orbits and each
orbit has r − 1 places. For an integer m with 1 6 m 6 r − 1, we can label N m
distinct elements
P1 , P1σ , . . . , P1σ
in P, as long as N 6 r e r−1
m .
m−1
m−1
, . . . , PN , PNσ , . . . , PNσ
AG CODES & NEAR-OPTIMAL LIST DECODING
25
The folded codes from the Garcia-Stichtenoth tower are defined similarly to the Hermitian case.
Definition 10 (Folded codes from the Garcia-Stichtenoth tower).
that m, k, N
Assume
are positive integers satisfying 1 6 m 6 r − 1 and l/m < N 6 r e r−1
.
The
folded code
m
g
from Ke with parameters N, l, q, e, m, denoted by FGS(N,
l, q, e, m), encodes a message
function f ∈ L(lP∞ ) as
f (PN )
f (P2 )
f (P1 )
f (PNσ )
f (P1σ ) f (P2σ )
N
.
(18)
f 7→
..
∈ Fm
..
,...,
..
,
q
.
.
.
m−1
m−1
m−1
f (PNσ
)
)
f (P2σ
)
f (P1σ
g
Then we have a similar result on parameters of FGS(N,
l, q, e, m).
g
Lemma 7.1. The above code FGS(N,
l, q, e, m) is an Fq -linear code over alphabet size q m ,
l−ge +1
rate at least N m , and minimum distance at least N − ml .
7.2. Redefining the code in terms of local expansion at P∞ . In the Hermitian
case, we use coefficients of its power series expansion around P0 . However, for the GarciaStichtenoth tower we do not have such a nice point P0 . Fortunately, we can use point P∞
to achieve our mission.
Again for our decoding, we will actually recover the message f ∈ L(lP∞ ) in terms of
the coefficients of its power series expansion around P∞
f = T −l (f0 + f1 T + f2 T 2 + · · · )
where T := x1e is the local parameter at P∞ (which means that xe has exactly one pole at
P∞ , i.e., νP∞ (xe ) = −1).
In this case we can also show that one can efficiently move back-and-forth between
the representation of f ∈ L(lP∞ ) in terms of a basis for L(lP∞ ) and its power series
representation (f0 , f1 , . . . ) around P∞ . Since the mapping f 7→ (f0 , f1 , . . . ) is Fq -linear, it
suffices to compute the local expansion at P∞ of a basis for L(lP∞ ).
Lemma 7.2. For any n, one can compute the first n terms of the local expansion of the
basis elements (17) at P∞ using poly(n) operations over Fq .
Proof. First let h be a nonzero function
P∞ in Fqj(x1 , x2 , . . . , xe ) with νP∞ (h) = v ∈ Z. Assume
1
v
that the local expansion h = T
j=0 aj T is known. To find the local expansion h =
P∞
−v
j
T
j=0 cj T . Consider the identity
∞
∞
X
X
1=
cj T j
aj T j .
j=0
j=0
Then by comparing the coefficients of T i in the above identity, one has c0 = a−1
and
0
ci = −a−1
(c
a
+
·
·
·
+
c
a
)
can
be
easily
computed
recursively
for
all
i
>
1.
i−1 1
0 i
0
Thus, by the structure of the basis functions in (17), it is sufficient to find an algorithm of efficiently finding local expansions of xi at P∞ for every i = 1, 2, . . . , e. We can
inductively find the local expansions of xi at P∞ as follows. We note that νP∞ (xi ) = −r e−i
for i = 1, 2, . . . , e.
For i = e, xe has the local expansion
1
T
at P∞ .
26
V. GURUSWAMI AND C. XING
Now assume that we know the local expansion of xi . Then we can easily compute the
local expansion of xri + xi and hence the local expansion of 1/(xri + xi ). Let us assume that
e−i+1 P∞
j
1/(xri + xi ) has local expansion 1/(xri + xi ) = T r
j=0 αj T at P∞ for some αi ∈ Fq .
P
e−i+1
∞
j
Assume that 1/xi−1 has the local expansion 1/xi−1 = T r
j=0 βj T . To find βj , we
consider the identity
r
∞
∞
∞
X
X
X
1
1
1
e−i+1
r rj
j
r e−i+2
r e−i+1
αj T j .
= r
+
= Tr
βj T =
βj T + T
T
xi−1
xi−1
xi + xi
j=0
j=0
j=0
e−i+1
in the above identity, we have that β0 = α0
By comparing the coefficients of T j+r
and βj can be easily computed recursively by the following formula for all i > 1.
αj
if r 6 |j
βj = α − β r
if r|j.
j
j/r−1
Therefore, the local expansion of xi−1 at P∞ can be easily computed.
As in the Hermitian case, we will actually need to index the messages of the code by
the first k coefficients (f0 , f1 , . . . , fk−1 ) of the local expansion of the function f at P∞ .
Let us define the local expansion map evP∞ : L((k + 2ge − 1)P∞ ) → Fkq that maps f
to (f0 , f1 , . . . , fk−1 ) where f = T −(k+2ge−1) (f0 + f1 T + f2 T 2 + · · · ) is the local expansion
of f at P∞ .
Claim 7.3. evP∞ is an Fq -linear surjective map. Further, we can compute evP∞ using
poly(k, ge ) operations over Fq given a representation of the input f ∈ L((k + 2ge − 1)P∞ )
in terms of the basis (17).
The proof of this claim is similar to Claim 5.3. Note that the kernel of evP∞ is
L((2ge − 1)P∞ ) which has dimension exactly ge by the Riemann-Roch theorem.
For each (f0 , f1 , . . . , fk−1 ) ∈ Fkq , we can therefore pick a pre-image in L((k + 2ge −
1)P∞ ). For convenience, we will denote an injective map making such a unique choice by
κP∞ : Fkq → L((k + 2ge − 1)P∞ ). By picking the pre-images of a basis of Fkq and extending
it by linearity, we can assume κP∞ to be Fq -linear, and thus specify it by a (k + ge ) × k
matrix. We record this fact for easy reference below.
Claim 7.4. The map κP∞ : Fkq → L((k + 2ge − 1)P∞ ) is Fq -linear and injective. We can
compute a representation of this linear transformation using poly(k, ge ) operations over
Fq , and the map itself can be evaluated using poly(k, ge ) operations over Fq .
N
Now we redefine a version of the folded Garcia-Stichtenoth code that maps Fkq to (Fm
q )
by composing the folded encoding (18) from the original Definition 10 with κP∞ .
Definition 11 (Folded Garcia-Stichtenoth code using local expansion). The folded GarciaStichtenoth code (FGS code for short) FGS(N, k, q, e, m) maps f = (f0 , f1 , . . . , fk−1 ) ∈ Fkq
N
g
to FGS(N,
k + 2ge − 1, q, e, m)(κP∞ (f )) ∈ (Fm
q ) .
The rate of the above code equals k/(N m) and its distance is at least N − (k + 2ge −
1)/m.
7.3. List decoding FGS codes. The list decoding part for the codes from the GarciaStichtenoth tower is almost identical to the Hermitian tower. We only sketch this part
briefly.
AG CODES & NEAR-OPTIMAL LIST DECODING
27
If f is a function in L((k + 2ge − 1)P∞ ) whose encoding (18) agrees with the received
e −1
and
word y in at least t columns with t > D+k+2g
m−s+1
N (m − s + 1) − k + (s − 1)ge + 1
D=
,
s+1
then there exist Ai ∈ L(DP∞ ) for i = 1, 2, . . . , s and A0 ∈ L((D + k + 2ge − 1)P∞ ) such
that they are not all zero and
(19)
−1
Q(f, f σ , . . . , f σ
−(s−1)
) = A0 + A1 f + A2 f σ
−1
+ · · · + As f σ
−(s−1)
= 0.
Solving the functional equation for f . As in the Hermitian case, our goal next
is to recover the list of solutions f to the functional equation (19). Recall that our
message functions lie in Im(κP∞ ), so we can recover f by recovering the top k coefficients
(f0 , f1 , . . . , fk−1 ) of its local expansion.
(20)
f =T
−(k+2ge −1)
∞
X
fj T j
j=0
at P∞ . We now prove that (f0 , f1 , . . . , fk−1 ) for f satisfying Equation (19) belong to a
“periodic” subspace (in the sense of Definition 1) of not too large dimension.
Lemma 7.5. The set of solutions (f0 , f1 , . . . , fk−1 ) ∈ Fkq such that
f =T
−(k+2ge −1)
∞
X
j=0
obeys equation
A0 + A1 f + A2 f σ
(21)
fj T j ∈ L((k + 2ge − 1)P∞ )
−1
+ · · · + As f σ
−(s−1)
=0
k
⌉)-periodic subspace.
when at least one Ai is nonzero is an (s − 1, r − 1, ⌈ r−1
Further, there are at most q N m+s+1 possible choices of this subspace over varying
choices of the Ai ’s.
Proof. Let u = min{νP∞ (Ai ) : i = 1, 2, . . . , s}. Then it is clear that u 6 0 and νP∞ (A0 ) >
u − (k + 2ge − 1). Each Ai has a local expansion at P∞ :
Ai = T u
∞
X
ai,j T j
j=0
for i = 1, . . . , s − 1 and A0 has a local expansion at P∞ :
∞
X
a0,j T j
A0 = T u−(k+2ge−1)
j=0
From the definition of u, one knows that the polynomial
is nonzero.
B0 (X) := a1,0 + a2,0 X + · · · + as,0 X s−1
Assume that at P∞ , the function f has a local expansion (20). Then f σ
expansion at P∞ as follows
∞
X
σ−i
−(k+2ge −1)i −(k+2ge −1)
ξ ji fj T j ,
f
=ξ
T
j=0
−i
has a local
28
V. GURUSWAMI AND C. XING
where ξ = 1/γ.
−1
The coefficient of T d+u−(k+2ge−1) in the local expansion of Q(f, f σ , . . . , f σ
(22)
0 = B(ξ
d−(k+2ge −1)
)fd +
d−1
X
−(s−1)
) is
bi fi + a0,d ,
i=0
where bi ∈ Fq is a linear combination of ai,j which does not involve fj . Hence, fd is
uniquely determined by f0 , . . . , fd−1 as long as B(ξ d−(k+ge −1) ) 6= 0.
Let S := {0 6 d 6 r − 2 : B(ξ d−(k+ge −1) ) = 0}. Then it is clear that |S| 6 s − 1 since
the order of ξ is r −1 and B0 (X) has degree at most s−1. Thus, B(ξ d−(k+ge −1) ) 6= 0 if and
only if j mod (r − 1) ∈
/ S; and in this case fj lis a fixed
affine linear combination of fi for
m
0 6 i < j. Note that B0 (X) has at most (s−1)
k
r−1
roots among {ξ i : i = 0, 1, . . . , k−1}.
It follows that the set of solutions (f0 , f1 , . . . , fk−1 ) is an affine space W ⊂ Fkq , and the
l
m
k
dimension of W is at most (s − 1) r−1
.
k
The fact that W is (s, r − 1, ⌈ r−1
⌉)-periodic subspace follows from (22). Note that
the coefficients bd−j for j > 1 in that equation are given by Bj (ξ d−j−(k+2ge −1) ), where
Bj (X) := a1,j + a2,j X + · · · + as,j X s−1 . Therefore, once the values of fi , 0 6 i <
(j − 1)(r − 1) are fixed, the possible choices for the next block of (r − 1) coordinates,
f(j−1)(r−1) , · · · , fj(r−1)−1 , lie in an affine shift of a fixed subspace of dimension at most
(s − 1). Further, the affine shift is an affine linear combination of the fi ’s in the previous
blocks.
Finally, by the choice of D, the total number of possible (A0 , A1 , . . . , As ) and hence
the number of possible functional equations (21), is at most q N (m−s+1)+s+1 6 q N m+s+1 .
Therefore, the number of possible candidate subspaces W is also at most q N m+s+1 .
Similar to the bound (14) for the Hermitian case, we conclude, after some simple
calculations and using the upper bound on genus ge 6 r e , that one can find a representation
of the (s, r − 1)-periodic subspace containing all candidate messages (f0 , f1 , . . . , fk−1 ) in
polynomial time, when the fraction of errors τ = 1 − t/N satisfies
re
k
3m
s
.
1−
−
(23)
τ6
s+1
N (m − s + 1)
m − s + 1 mN
8. Pruning list for folded AG codes using h.s.e sets
8.1. Combining folded Hermitian codes and h.s.e sets. Instead of encoding arbitrary f ∈ Fkq by the folded Hermitian code (Definition 5), we can restrict the messages f
to belong to the range of our h.s.e set, so that the affine space of solutions guaranteed by
Lemma 5.7 can be efficiently pruned to a small list. The formal claim is below.
Theorem 8.1. Let e > 2 be an integer, r > 2e be a large enough prime power, q = r 2 ,
and ζ ∈ (1/q, 1). Let k 6 q ζq/2 be a positive integer. Let s, m be positive integers satisfying
1 6 s 6 m 6 q − 1 and s < ζq/12. Finally let N be an integer satisfying k + 2er e 6 N m 6
(q − 1)r e .
(1−ζ)2 k
Consider the code C1 with encoding E1 : Fq
N defined as
→ (Fm
q )
E1 (x) = FH(N, k, q, e, m)(HSE(x)) ,
AG CODES & NEAR-OPTIMAL LIST DECODING
29
(1−ζ)2 k
for a random map HSE : Fq
→ Fkq as constructed in Definition 9 for a period size
k
∆ = q − 1 and b = ⌈ q−1 ⌉ (where technically we pad the input Fkq with 0’s to make its length
b∆ to feed into HSE).
Then, the code C1 code has rate R = (1−ζ)2 k/(N m), can be encoded in poly(N mq ζq )
time, and with high probability over the choice of HSE, it is (τ, ℓ)-list decodable in time
poly(N mq ζq ) for ℓ 6 O(1/(Rζ)) and
s
er e
k
3m
τ=
.
1−
−
s+1
N (m − s + 1)
m − s + 1 mN
Proof. The claim about the rate is clear, and the encoding time follows from the time to
compute HSE recorded in Theorem 6.5.
By (3), the genus ge 6 er e , and so the condition on N, m meets the requirement for
the construction of the folded Hermitian tower based code in Definition 4, and the claimed
value of the error fraction τ satisfies (14). By Lemma 5.7, we know that the candidate
k
⌉)-periodic
messages found by the decoder lie in one of at most q 2N m possible (s, q −1, ⌈ q−1
6
subspaces.
One can check that the conditions of Theorem 6.5 are met for our choice of ζ, s, q, k, ∆.
Appealing to Theorem 6.5 with the choice c = 2N m/k = O(1/R), we conclude that, with
high probability over the choice of HSE, there is a decoding algorithm running in time
poly(N mq ζq ) to list decode C1 from a fraction τ of errors, outputting at most O(1/(Rζ))
messages in the worst-case.
Let ε > 0 be a small positive constant, and a family of codes of length N (assumed
large enough) and rate R ∈ (0, 1) is sought. Pick n to be a growing parameter.
By picking s = Θ(1/ε), m = Θ(1/ε2 ), r = ⌊log n⌋, e = ⌈ logloglogn n ⌉, ζ = (log n log log n)−1 ,
N = ⌊ (r
2 −1)r e
m
⌋, and k proportional to N m in Theorem 8.1, we can conclude the following.
Corollary 8.2. For any R ∈ (0, 1) and positive constant ε ∈ (0, 1), there is a Monte Carlo
2
construction of a family of codes of rate at least R over an alphabet size (log N )O(1/ε ) that
are encodable and (1 − R − ε, O(R−1 log N log log N ))-list decodable in poly(N, 1/ε) time,
where N is the block length of the code.
Our promised main result (Theorem 1.1) achieves better parameters than the above
— an alphabet size of exp(Õ(1/ε2 )) and list-size of O(1/(Rε)). This is based on the
Garcia-Stichtenoth tower and is described next.
8.2. Combining folded Garcia-Stichtenoth codes and h.s.e sets. Similarly to Section 8.1, we now show how to pre-code the messages of the FGS code with a h.s.e subset.
The approach is similar, though we need one additional idea to ensure that we can pick
parameters so that the base field Fq can be constant-sized and obtain a final list-size
bound that is a constant independent of the code length. This idea is to work with a
larger “period size” ∆ for the periodic subspaces, based on the following observation.
Observation 8.3. Let W be an (s, ∆, b)-periodic subspace of Fkq for k = b∆. Then W is
also (su, ∆u, b)-periodic for every integer u, 1 6 u 6 b.
6Technically, it will belong to proj (W ) of such a periodic subspace W , but we may pretend that there
k
are (q−1)⌈k/(q−1)⌉−k extra dummy coordinates which we decode. Or we can just assume for convenience
that k is divisible by (q − 1).
30
V. GURUSWAMI AND C. XING
As in the Hermitian case, instead of encoding arbitrary f ∈ Fkq by the folded GarciaStichtenoth code (Definition 18), we will restrict the messages f to belong to the range of
our h.s.e set. This will ensure that the affine space of solutions guaranteed by Lemma 7.5
can be efficiently pruned to a small list.
Theorem 8.4. Let r be a prime power, q = r 2 , and e > 2 be an integer, and ζ ∈ (0, 1).
Let k 6 q ζ∆/2 be a positive integer. Let ∆ 6 k be a multiple of (r − 1), say ∆ = u(r − 1)
for a positive integer u.
Let s, m be positive integers satisfying 1 6 s 6 m 6 r − 1 and s < ζr/12. Finally let
N be an integer satisfying k + 2r e 6 N m 6 (r − 1)r e .
(1−ζ)2 k
Consider the code C2 with encoding E2 : Fq
N defined as
→ (Fm
q )
E2 (x) = FGS(N, k, q, e, m)(HSE(x)) ,
(1−ζ)2 k
for a random map HSE : Fq
→ Fkq as constructed in Definition 9 for a period size ∆
k
and b = ⌈ ∆ ⌉ (where we pad the input Fkq with 0’s to make its length b∆ to feed into HSE).
The code C2 has rate R = (1 − ζ)2 k/(N m), can be encoded in poly(N mq ζ∆ ) time,
and w.h.p over the choice of HSE, it is (τ, ℓ)-list decodable in time poly(N mq ζ∆ ) for
ℓ 6 O(1/(Rζ)) and
re
k
3m
s
.
1−
−
(24)
τ=
s+1
N (m − s + 1)
m − s + 1 mN
Proof. The proof is very similar to that of Theorem 8.1. The claim about the rate is clear,
and the encoding time follows from the time to compute HSE recorded in Theorem 6.5.
The genus ge is now upper bounded by r e , and so the condition on N, m meets the
requirement for the construction of the folded Hermitian tower based code in Definition
4, and the claimed value of the error fraction τ satisfies (14). By Lemma 5.7, we know
that the candidate messages found by the decoder lie in one of at most q 2N m possible
k
(s, r − 1, ⌈ r−1
⌉)-periodic subspaces.7 Now by Observation 8.3, each of these subspaces is
k
⌉)-periodic. One can check that the conditions of Theorem 6.5 are met for
also (su, ∆, ⌈ ∆
our choice of ζ, s, q, k, ∆ and taking su to play the role of s (since s < ζr/12, we have
su < ζ∆/10).
Appealing to Theorem 6.5 with the choice c = 2N m/k = O(1/R), we conclude that
there is a decoding algorithm running in time poly(N mq ζ∆ ) to list decode C2 from a
fraction τ of errors, outputting at most O(1/(Rζ)) messages in the worst-case.
Finally, all that is left to be done is to pick parameters to show how the above can
lead to optimal rate list-decodable codes over a constant-sized alphabet which further
achieve very good list-size.
Let ε > 0 be a small positive constant, and a family of codes of length N (assumed
large enough) and rate R ∈ (0, 1) is sought. Pick n to be a growing parameter.
n
Let us pick s = Θ(1/ε), m = Θ(1/ε2 ), ζ = ε/12, r = Θ(1/ε), q = r 2 , and e = ⌈ log
log r ⌉,
e
N = ⌊ (r−1)r
⌋, and k = RN m(1 + ε). This ensures that (i) there are at least n = N m
m
rational places and so we get a code of length at least n/m = N , (ii) the rate of the code
C2 is at least R, and (iii) the error fraction (24) is at least 1 − R − ε.
7Technically, it will belong to proj (W ) of such a periodic subspace W , but we may pretend that there
k
are (r−1)⌈k/(r−1)⌉−k extra dummy coordinates which we decode. Or we can just assume for convenience
that r − 1 divides k.
AG CODES & NEAR-OPTIMAL LIST DECODING
31
The remaining part is to pick a multiple ∆ of (r − 1) so that the k 6 q ζ∆/2 condition
log n
⌉ and ∆ = (r − 1)u. With these
is met. This can be achieved by choosing u = ⌈ log(1/ε)
choices, we can conclude the following, which is one of the main end goals of this paper.
Theorem 8.5 (Main; Corollary to Theorem 8.4 with above choice of parameters). For
any R ∈ (0, 1) and positive constant ε ∈ (0, 1), there is a Monte Carlo construction of
a family of codes of rate at least R over an alphabet size exp(O(log(1/ε)/ε2 )) that are
encodable and (1 − R − ε, O(1/(Rε))-list decodable in poly(N ) time, where N is the block
length of the code.
It may be instructive to recap why the Hermitian tower could not give a result like
the above one. In the Hermitian case, the ratio ge /n of the genus to the number of rational
√
places was about e/r = e/ q, and thus we needed q > e2 . Since the period ∆ was about
q, the running time
of the decoder was bigger than q Ω(ζq) , whereas the length of the code
√
O(
q)
was at most q
. This dictated the choice of q ≈ log2 n, and then to keep the running
time polynomial, we had to take ζ ≈ (log n log log n)−1 .
9. List decoding AG codes with subfield evaluation points
In this section, we will present a linear-algebraic list decoding algorithm for algebraicgeometric (AG) codes based on evaluations of functions at rational points over a subfield.
The algorithm will manage to correct a large fraction of errors, and pin down the possible
messages to a well-structured affine subspace of dimension much smaller than that of the
code. For simplicity, we begin with the case of Reed-Solomon codes in Section 9.1. We
then extend it to a general framework for decoding AG codes based on constant field
extensions in Section 9.2. Finally, in Section 9.1, we instantiate the general framework
(with a slight twist) to codes based on the Garcia-Stichtenoth tower.
9.1. Decoding Reed-Solomon codes. Our list decoding algorithm will apply to ReedSolomon codes with evaluation points in a subfield, defined below.
Definition 12. [Reed-Solomon code with evaluations in a subfield] Let Fq be a finite
field with q elements, and m a positive integer. Let n, k be positive integers satisfying
1 6 k < n 6 q. The Reed-Solomon code RS(q,m) [n, k] is a code over alphabet Fqm that
encodes a polynomial f ∈ Fqm [X] of degree at most k − 1 as
f (X) 7→ (f (α1 ), f (α2 ), · · · , f (αn ))
where α1 , α2 , . . . , αn are an arbitrary sequence of n distinct elements of Fq .
Note that while the message polynomial has coefficients from Fqm , the encoding only
contains its evaluations at points in the subfield Fq . The above code has rate k/n, and
minimum distance (n − k + 1).
We now present a list decoding algorithm for the above Reed-Solomon codes. Suppose
the codeword (f (α1 ), f (α2 ), · · · , f (αn )) is received as (y1 , y2 , . . . , yn ) ∈ Fnqm with at most
e = τ n errors (i.e., yi 6= f (αi ) for at most e values of i ∈ {1, 2, . . . , n}). The goal is to
recover the list of all polynomials of degree less than k whose encoding is within Hamming
distance e from y. As is common in algebraic list decoders, the algorithm will have two
steps: (i) interpolation to find an algebraic equation the message polynomials must satisfy,
and (ii) solving the equation for the candidate message polynomials.
32
V. GURUSWAMI AND C. XING
Interpolation step. Let 1 6 s 6 m be an integer parameter of the algorithm. Choose
the “degree parameter” D to be
n−k+1
.
(25)
D=
s+1
Definition 13 (Space of interpolation polynomials). Let P be the space of polynomials
Q ∈ Fqm [X, Y1 , Y2 , . . . , Ys ] of the form
(26)
Q(X, Y1 , Y2 , . . . , Ys ) = A0 (X) + A1 (X)Y1 + A2 (X)Y2 + · · · + As (X)Ys ,
with each Ai ∈ Fqm [X] and deg(A0 ) 6 D + k − 1 and deg(Ai ) 6 D for i = 1, 2, . . . , s.
The lemma below follows because for our choice of D, the number of degrees of
freedom for polynomials in P exceeds the number n of interpolation conditions (27). We
include the easy proof for completeness.
Lemma 9.1. There exists a nonzero polynomial Q ∈ P such that
(27)
2
Q(αi , yi , yiq , yiq , · · · , yiq
s−1
)=0
for
i = 1, 2, . . . , n .
Further such a Q can be found using O(n3 ) operations over Fqm .
Proof. Note that P is an Fqm -vector space of dimension
(D + k) + s(D + 1) = (D + 1)(s + 1) + k − 1 > n,
where the last inequality follows from our choice (25). The interpolation conditions required in the lemma impose n homogeneous linear conditions on Q. Since this is smaller
than the dimension of P, there must exist a nonzero Q ∈ P that meets the interpolation
conditions
2
s−1
Q(αi , yi , yiq , yiq , · · · , yiq ) = 0 for i = 1, 2, . . . , n .
Finding such a Q amounts to solving a homogeneous linear system over Fqm with n
constraints and at most dim(P) 6 n + s + 2 unknowns, which can be done in O(n3 )
time.
Lemma 9.3 below shows that any polynomial Q given by Lemma 9.1 yields an algebraic condition that the message functions f we are interested in list decoding must
satisfy.
Definition 14 (Frobenius action on polynomials). For a polynomial f ∈ Fqm [X] with
f (X) = f0 + f1 X + · · · + fk−1 X k−1 , define the polynomial f σ ∈ Fqm [X] as f σ (X) =
q
f0q + f1q X + · · · + fk−1
X k−1 .
i
For i > 2, we define f σ recursively as (f σ
i−1
)σ .
The following simple fact is key to our analysis.
j
j
Fact 9.2. If α ∈ Fq , then f (α)q = (f σ )(α) for all j = 1, 2, . . . .
Lemma 9.3. Suppose Q ∈ P satisfies the interpolation conditions (27). Suppose f ∈
Fqm [X] of degree less than k satisfies f (αi ) 6= yi for at most e values of i ∈ {1, 2, . . . , n}
s−1
2
s
(n − k). Then Q(X, f (X), f σ (X), f σ (X), · · · , f σ (X)) = 0.
with e 6 s+1
2
Proof. Define the polynomial Φ ∈ Fqm [X] by Φ(X) := Q(X, f (X), f σ (X), f σ (X), · · · ,
s−1
f σ (X)). By the construction of Q and the fact that deg(f ) 6 k − 1, we have deg(Φ) 6
n
s
D + k − 1 6 n−k+1
s+1 + k − 1 = s+1 + s+1 (k − 1).
AG CODES & NEAR-OPTIMAL LIST DECODING
qj
yi
33
Suppose yi = f (αi ). By Fact 9.2, we have yiq = f (αi )q = (f σ )(αi ), and similarly
j
= (f σ )(αi ) for j = 2, 3, . . . . Thus for each i such that f (αi ) = yi , we have
Φ(αi ) = Q(αi , f (αi ), f σ (αi ), · · · , f σ
s−1
(αi )) = Q(αi , yi , yiq , · · · , yiq
s−1
)=0.
s
n
+ s+1
k zeroes. Since this exceeds the upper bound on
Thus Φ has at least n − e > s+1
the degree of Φ, Φ must be the zero polynomial.
Finding candidate solutions. The previous two lemmas imply that the polynomials
s
f whose encodings differ from (y1 , · · · , yn ) in at most s+1
(n − k) positions can be found
s−1
= 0.
amongst the solutions of the functional equation A0 + A1 f + A2 f σ + · · · + As f σ
We now prove that these solutions form a well-structured affine space over Fq .
Pk−1
Lemma 9.4. For integers 1 6 s 6 m, the set of solutions f = i=0
fi X i ∈ Fqm [X] to
the equation
(28)
A0 (X) + A1 (X)f (X) + A2 (X)f σ (X) + · · · + As (X)f σ
s−1
(X) = 0
when at least one of {A0 , A1 , . . . , As } is nonzero is an affine subspace over Fq of dimension
at most (s − 1)k. Further, fixing an Fq -basis of Fqm and viewing each fi as an element of
mk
Fm
q , the solutions are an (s − 1, m, k)-periodic subspace of Fq . A canonical representation
of this periodic subspace (in the sense of Definition 2) can be computed in poly(k, m, log q)
time.
Proof. If f, g are two solutions to (28), then so is αf + βg for any α, β ∈ Fq with α + β = 1.
So the solutions to (28) form an affine Fq -subspace. We now proceed to analyze the
structure of the subspace.
First, by factoring out a common powers of X that divide all of A0 (X), A1 (X), . . . , As (X),
we can assume that at least one Ai∗ (X) for some i∗ ∈ {0, 1, . . . , s} is not divisible by X,
and has nonzero constant term. Further, if A1 (X), . . . , As (X) are all divisible by X, then
so is A0 (X), so we can take i∗ > 0.
Let us denote Aι (X) = aι,0 + aι,1 X + aι,2 X 2 + · · · for ι = 0, 1, 2, . . . , s. For l =
0, 1, 2, . . . , k − 1, define the linearized polynomial
(29)
2
Bl (X) = a1,l X + a2,l X q + a3,l X q + · · · + as,l X q
s−1
.
We know that ai∗ ,0 6= 0, and therefore B0 6= 0. This implies that the solutions β ∈ Fqm to
B0 (β) = 0 is a subspace, say W , of Fqm of dimension at most s − 1.
Fix an i ∈ {0, 1, . . . , k − 1}. Expanding the equation (28) and equating the coefficient
of X i to be 0, we get
(30)
a0,i + Bi (f0 ) + Bi−1 (f1 ) + · · · + B1 (fi−1 ) + B0 (fi ) = 0 .
This implies fi ∈ W +θi for some θi ∈ Fqm that is determined by f0 , f1 , . . . , fi−1 . Therefore,
for each choice of f0 , f1 , . . . , fi−1 , fi must belong to a fixed coset of the subspace W of
dimension at most s − 1. Thus, the solutions belong to an (s − 1, m, k)-periodic subspace.
Also, it is clear from (30) that a canonical representation of the periodic subspace can be
computed in poly(k, m, log q) time.
Combining Lemmas 9.3 and 9.4, we see that one can find an affine space of dimension
(s − 1)k that contains the coefficients of all polynomials whose encodings differ from the
s
(1 − R) of the positions. Note the dimension
input (y1 , . . . , yn ) in at most a fraction s+1
of the message space of the Reed-Solomon code RS(q,m) [n, k] over Fq is km. The above
lemma pins down the candidate polynomials to a space of dimension (s − 1)k. For s ≪ m,
34
V. GURUSWAMI AND C. XING
this is a lot smaller. In particular, it implies one can list decode in time sub-linear in the
code size (the proof follows by taking s = ⌈1/ε⌉ and m > γs ).
Corollary 9.5. For every R ∈ (0, 1), and ε, γ > 0, there is a positive integer m such that
for all large enough prime powers q, the Reed-Solomon code C = RS(q,m) [q, Rq] can be list
decoded from a fraction (1 − R − ε) of errors in |C|γ time, outputting a list of size at most
|C|γ .
Since the dimension of the subspace guaranteed by Lemma 9.4 grows linearly in k,
we still cannot afford to list this subspace as the decoder’s output for polynomial time
decoding. Instead, we will use a “pre-code” that only allows polynomials with coefficients
in a carefully chosen subset that is guaranteed to have small intersection with the space
of solutions to any equation of the form (28). Further, this intersection can be found
quickly without going over all solutions to (28). In Section 10, we will see the approach
to accomplish this based on subspace designs.
9.2. Decoding algebraic-geometric codes. In this section we generalize the ReedSolomon algorithm to algebraic-geometric codes. The description in this section will be
for a general abstract AG code. So we will focus on the algebraic ideas, and not mention
complexity estimates. The next subsection will focus on a specific AG code based on
Garcia-Stichtenoth function fields, which will require a small change to the setup, and
where we will also mention computational aspects. We assume familiarity with the basic
setup of algebraic function fields and codes based on function fields, and use standard
terminology and notation; the reader is referred to Stichtenoth’s book for basic background
information [25].
Let F/Fq be a function field of genus g. Let P∞ , P1 , P2 , . . . , PN be N + 1 distinct
Fq -rational places. Let σ ∈ Gal(Fqm /Fq ) be the Frobenius automorphism, i.e, ασ = αq for
all α ∈ Fqm . Then we can extend σ to an automorphism in Gal(Fm /F ), where Fm is the
constant extension Fqm · F . Note that P σ = P for any place of F .
For a place P of F , we denote by νP the discrete valuation of P . For an integer l, we
consider the Riemann-Roch space over Fq defined by
L(lP∞ ) := {h ∈ F \ {0} : νP∞ (h) > −l} ∪ {0}.
Then the dimension ℓ(lP∞ ) is at least l−g+1 and equality holds if l > 2g−1. Furthermore,
we define the Riemann-Roch space over Fqm by
Lm (lP∞ ) := {h ∈ Fm \ {0} : νP∞ (h) > −l} ∪ {0}.
Consider the Goppa geometric code defined by
C(m; l) := {(f (P1 ), f (P2 ), . . . , f (PN )) : f ∈ Lm (lP∞ )}.
The following result is a fundamental fact about algebraic-geometric codes.
Lemma 9.6. The above code C(m; l) is an Fqm -linear code over Fqm , rate at least
and minimum distance at least N − l.
l−g+1
N ,
We now present a list decoding algorithm for the above codes. The algorithm follows
the linear-algebraic list decoding algorithm for RS codes. Suppose a codeword encoding
f ∈ Lm ((k + 2g − 1)P∞ ) is transmitted and received as y = (y1 , y2 , . . . , yN ).
Given such a received word, we will interpolate a nonzero linear polynomial over Fm
(31)
Q(Y1 , Y2 , . . . , Ys ) = A0 + A1 Y1 + A2 Y2 + · · · + As Ys
AG CODES & NEAR-OPTIMAL LIST DECODING
35
where Ai ∈ Lm (DP∞ ) for i = 1, 2, . . . , s and A0 ∈ Lm ((D + k + 2g − 1)P∞ ) with the
degree parameter D chosen to be
N − k + (s − 1)g + 1
.
(32)
D=
s+1
If we fix a basis of Lm (DP∞ ) and extend it to a basis of Lm ((D + k + 2g − 1)P∞ ), then
the number of freedoms of A0 is at least D + k + g and the number of freedoms of Ai is at
least D − g + 1 for i > 1. Thus, the total number of freedoms in the polynomial Q equals
(33)
s(D − g + 1) + D + k + g = (s + 1)(D + 1) − (s − 1)g − 1 + k > N.
for the above choice (32) of D. The interpolation requirements on Q ∈ Fm [Y1 , . . . , Ys ] are
the following:
(34)
Q(yi , yiσ , . . . , yiσ
s−1
) = A0 (Pi ) + A1 (Pi )yi + A2 (Pi )yiσ + · · · + As (Pi )yiσ
s−1
=0
for i = 1, 2, . . . , N . Thus, we have a total of N equations to satisfy. Since this number
is less than the number of freedoms in Q, we can conclude that a nonzero linear function
Q ∈ Fm [Y1 , . . . , Ys ] of the form (31) satisfying the interpolation conditions (34) can be
found by solving a homogeneous linear system over Fqm with at most N constraints and
at least s(D − g + 1) + D + k + g variables.
The following lemma gives the algebraic condition that the message functions f ∈
Lm ((k + 2g − 1)P∞ ) we are interested in list decoding must satisfy.
Lemma 9.7. If f is a function in Lm ((k + 2g − 1)P∞ ) whose encoding agrees with the
received word y in at least t positions with t > D + k + 2g − 1, then
(35)
Q(f, f σ , . . . , f σ
s−1
) = A0 + A1 f + A2 f σ + · · · + As f σ
s−1
= 0.
Proof. The proof proceeds by comparing the number of zeros of the function Q(f, f σ ,
s−1
s−1
with D + k + 2g − 1. Note that Q(f, f σ , . . . ,
. . . , f σ ) = A0 + A1 f + A2 f σ + · · · + As f σ
s−1
σ
) is a function in Lm ((D + k + 2g − 1)P∞ ). If position i of the encoding of f agrees
f
with y, then
0 = A0 (Pi ) + A1 (Pi )yi + A2 (Pi )yiσ + · · · + As (Pi )yiσ
s−1
= A0 (Pi ) + A1 (Pi )f (Pi ) + A2 (Pi )(f (Pi ))σ + · · · + As (Pi )(f (Pi ))σ
= A0 (Pi ) + A1 (Pi )f (Pi ) + A2 (Pi )f σ (Pi ) + · · · + As (Pi )f σ
σ
= (A0 + A1 f + A2 f + · · · + As f
σs−1
s−1
s−1
(Pi )
)(Pi )
s−1
i.e., Pi is a zero of Q(f, f σ , . . . , f σ ). Thus, there are at least t zeros for all the agreeing
s−1
positions. Hence, Q(f, f σ , . . . , f σ ) must be the zero function when t > D+k+2g−1.
Let P be a rational place in F and let T ∈ F be a local parameter of P . Then T σ = T .
Here, we have two scenarios, i.e., P = P∞ or P 6= P∞ . In Subsection 9.3, we will consider
the case where P = P∞ for the Garcia-Stichtenoth tower. While in this subsection, we
only discuss the case where P 6= P∞ . This was the case with Reed-Solomon codes with
message polynomials in Fq [X] in Subsection 9.1 where P∞ was the pole of X, and P the
zero of X.
Assume that a function f ∈ Lm ((k + 2g − 1)P∞ ) has a local expansion at P
(36)
f=
∞
X
j=0
fj T j
36
V. GURUSWAMI AND C. XING
for some fj ∈ Fqm . Then f is uniquely determined by (f0 , f1 , . . . , fk+2g−1 ) since f has the
pole degree at most k + 2g − 1.
Lemma 9.8. The set of solutions f ∈ Lm ((k + 2g − 1)P∞ ) to the equation (34)
A0 + A1 f + A2 f σ + · · · + As f σ
s−1
=0
when at least one Ai is nonzero has size at most q (s−1)(k+2g−1) . Further, the possible
coefficients (f0 , f1 , . . . , fk+2g−1 ) of f ’s local expansion at P belong to an (s − 1, m)-ultra
(k+2g−1)m
periodic affine subspace of Fq
.
Proof. The argument is very similar to Lemma 9.4. Let u = min{νP∞ (Ai ) : i =
1, 2, . . . , s}. Then it is clear that u > 0 and νP (A0 ) > u. Each Ai has a local expansion at P :
∞
X
ai,j T j
Ai = T u
j=0
for i = 0, 1, . . . , s.
i
Assume that at P , the function f has a local expansion (36). Then f σ has a local
expansion at P as follows
∞
X
i
σi
fjq T j .
f =
j=0
For l = 0, 1, . . . , define the linearized polynomial
Bl (X) := a1,l X + a2,l X q + · · · + as,l X q
s−1
From the definition of u, one knows that B0 (X) is nonzero. Equating the coefficient of
s−1
to equal 0 gives us the condition
T d+u in A0 + A1 f + A2 f σ + · · · + As f σ
(37)
a0,d + Bd (f0 ) + Bd−1 (f1 ) + · · · + B0 (fd ) = 0 .
Let W = {α ∈ Fqm : B0 (α) = 0}. Then W is an Fq -subspace of Fqm of dimension at
most s − 1, since B0 is a nonzero linearized polynomial of q-degree at most s − 1. As
in Lemma 9.4, for each fixed f0 , f1 , . . . , fd−1 , the coefficient fd must belong to a coset
of the subspace W . This implies that the coefficients (f0 , f1 , . . . , fk+2g−1 ) belong to an
m(k+2g−1)
(s − 1, m, k + 2g − 1)-periodic subspace of Fq
. In particular, there are at most
q (s−1)(k+2g−1) solutions f ∈ Lm ((k + 2g − 1)P∞ ) to (34).
The equation (37) also shows that each group of ℓ successive coefficients fd−ℓ+1 ,
fd−ℓ+2 , · · · , fd belong to cosets of the same underlying ℓ(s − 1) dimensional subspace of
Fmℓ
q . This implies that (f0 , f1 , . . . , fk+2g−1 ) in fact belong to an (s − 1, m)-ultra periodic
subspace.8
Restricting message functions using local expansions. Using Lemma 9.8, we will
recover the message in terms of the coefficients of its local expansion at P . In order to prune
the subspace of possible solutions, we will pick a subcode that corresponds to restricting
the coefficients to a carefully constructed subset of all possibilities. This requires us to
index message functions in terms of the local expansion coefficients. However, not all
(k + 2g − 1) tuples over Fqm arise in the local expansion of functions in the k-dimensional
subspace Lm ((k + 2g − 1)P∞ ). Below we show that we can find a k-dimensional subspace
8This ultra-periodicity was also true for the Reed-Solomon case in Lemma 9.4, but we did not state it
there as we will not make use of this extra property for picking a subcode in the case of Reed-Solomon
codes.
AG CODES & NEAR-OPTIMAL LIST DECODING
37
of Lm ((k + 2g − 1)P∞ ) such that their top k local expansion coefficients give rise to all
k-tuples over Fqm .
Lemma 9.9. There exist a set of functions {g1 , g2 , . . . , gk } in Lm ((k + 2g − 1)P∞ ) such
that the k × k matrix A formed by taking the ith row of A to be the first k coefficients in
the local expansion (36) for gi at P is non-singular.
Proof. Let {ψ1 , ψ2 , . . . , ψg } be a basis of Lm ((k + 2g − 1)P∞ − kP ). Extend this basis to
a basis {ψ1 , ψ2 , . . . , ψg , g1 , g2 , . . . , gk } of Lm ((k + 2g − 1)P∞ ). We claim that the functions
{g1 , g2 , . . . , gk } are our desired functions.
Suppose that the matrix A is obtained from expansion of functions gi and it is
P
singular. This implies that there exists elements {λi }ki=1 such that the function ki=1 λi gi
P∞
P
k
i
has expansion
the function
i=k ai T at P for some ai ∈ Fq m . Therefore,
i=1 λi gi
Pk
belongs to the space Lm ((k + 2g − 1)P∞ − kP ), i.e.,
i=1 λi gi is a linear combination
of ψ1 , ψ2 , . . . , ψg . This forces that all λi are equal to 0 since {ψ1 , . . . , ψg , g1 , g2 , . . . , gk } is
linearly independent. This completes the proof.
With the above lemma in place, we now describe our AG code in a manner convenient
for pruning the possible local expansion coefficients.
Encoding. Assume that we have found a set of functions {g1 , g2 , . . . , gk } of Lm ((k +
2g − 1)P∞ ) as in Lemma 9.9. After elementary row operations on the matrix A defined
in Lemma 9.9, we may assume that A is the k × k P
identity matrix, i.e., we assume that,
j
for 1 6 i 6 k, the function gi has expansion T i−1 + ∞
j=k λij T for some λij ∈ Fq m .
Now for any subset M ⊆ Fkqm , we may assume that our messages belong to M ,
and encode each message (a1 , a2 , . . . , ak ) ∈ M to the codeword (f (P1 ), f (P2 ), . . . , f (PN )),
P
where f = ki=1 ai gi . Thus, our actual code is a subcode of C(m; k + 2g − 1) given by
(38)
k
X
def
ai gi , (a1 , a2 , . . . , ak ) ∈ M } .
C(m; k + 2g − 1 | M ) = {(f (P1 ), f (P2 ), . . . , f (PN )) : f =
i=1
Decoding. To decode, we first establish the equation (35) and solve this equation to
find the subspace of possible first k coefficients f0 , f1 , . . . , fk−1 in the local expansion of
Pk
the function f =
i=1 ai gi at P . The following claim implies that the message tuple
(a1 , a2 , . . . , ak ) belongs to this subspace.
Lemma 9.10. The first k coefficients f0 , f1 , . . . , fk−1 of the local expansion of f =
Pk
i=1 ai gi at P equal a1 , a2 , . . . , ak .
P
j
Proof. Since gi has local expansion T i−1 + ∞
j=k λij T , it is clear that the local expansion
Pk−1
P
∞
i
j
of f is
i=0 ai+1 T +
j=k aj+1 T for some ak+1 , ak+2 , . . . in Fq m . Thus the first k
coefficients of the local expansion of f are a1 , a2 , . . . , ak .
Combining Lemmas 9.7, 9.8, and 9.10, and recalling the choice of D in (32), we get
the following.
Corollary 9.11. For the code C(m; k + 2g − 1 | Fkqm ), we can find an (s − 1, m)-ultra
periodic subspace of Fmk
that includes all messages whose encoding differs from a received
q
3s+1
s
in
at
most
word y ∈ FN
m
q
s+1 (N − k) − s+1 g positions.
38
V. GURUSWAMI AND C. XING
9.3. Decoding the codes from the Garcia-Stichtenoth tower. Let r be a prime
power and let q = r 2 . For e > 2, let Ke be the function field Fq (x1 , x2 , . . . , xe ) given by
Garcia-Stichtenoth tower (16).
Put F = Ke and Fm = Fqm · Ke . The encoding and decoding is almost identical to
the algebraic geometric code described in the previous section except here we use P∞ for
local expansion.
Encoding. As in Lemma 9.9, we can find a set of functions {h1 , h2 , . . . , hk } of Lm ((k +
2ge −1)P∞ ) such that the k×k matrix A formed by taking the ith row of A to be the first k
coefficients in the expansion (40) for hi at P∞ is non-singular (note that in this case, the local expansion starts from T −(k+2ge−1) , while in the previous subsection the local expansion
starts from T 0 ). Furthermore, after some elementary row operations
on A,Pwe may assume
j for
−(k+2g
e −1)
that, for 1 6 i 6 k, the function hi has expansion T
T i−1 + ∞
j=k λij T
some λij ∈ Fqm .
We encode a message k-tuple (a1 , a2 , . . . , ak ) ∈ Fkqm by the codeword (f (P1 ), f (P2 ), . . . ,
P
f (PN )) where f = ki=1 ai hi , and P1 , P2 , . . . , PN are arbitrary Fq -rational points (other
than P∞ ) in the function field. The block length N can be any integer satisfying k 6 N 6
r e−1 (r 2 − r). As in Section 9.2, for any subset M ⊆ Fkqm , we can consider the subcode
obtained by only encoding tuples in M :
(39)
k
X
def
ai hi , (a1 , a2 , . . . , ak ) ∈ M } .
CGS (m; k+2ge −1 | M ) = {(f (P1 ), f (P2 ), . . . , f (PN )) : f =
i=1
Computing the code. Note that an explicit specification of the code simply requires
the evaluations of the basis functions h1 , h2 , . . . , hk at the N rational points. One can find
a basis of Lm (lP∞ ) along with its evaluations at the rational points using poly(N, l, m)
operations over Fq [23] (see also [10, Sec. 7]). We can also compute the first l coefficients
of the local expansion of the basis functions at P∞ using poly(l, m) operations over Fq
as described in Section 4. The computation of the hi ’s following the method of Lemma
9.9 only requires elementary matrix operations, so we can compute its evaluations at the
rational points also in polynomial time.
List decoding. In order to list decode, we can find a functional equation A0 + A1 f +
s−1
exactly as in Lemma 9.7. To solve for f from this equation, we
A2 f σ + · · · + As f σ
consider the local expansions of the message functions f at P∞ . Let T ∈ Ke be a local
expansion of P∞ and suppose that a function f ∈ Lm ((k+2ge −1)P∞ ) has a local expansion
at P∞
(40)
f = T −(k+2ge −1)
∞
X
fj T j
j=0
Pk
for some fj ∈ Fqm . As in Lemma 9.10, if f =
i=1 ai hi , then the top k coefficients
f0 , f1 , . . . , fk−1 in the above local expansion equal a1 , a2 , . . . , ak . Thus we can determine
such f uniquely by finding f0 , f1 , . . . , fk−1 . The following lemma is similar to Lemma 9.8
and shows that the coefficients belong to an ultra-periodic subspace.
Lemma 9.12. Suppose f ∈ Lm ((k + 2ge − 1)P∞ ) satisfies the equation
A0 + A1 f + A2 f σ + · · · + As f σ
s−1
=0
AG CODES & NEAR-OPTIMAL LIST DECODING
39
when at least one Ai is nonzero. Then the possible first k coefficients (f0 , f1 , . . . , fk−1 )
of f ’s local expansion (40) at P∞ belong to an (s − 1, m)-ultra periodic affine subspace of
Fkm
q .
Proof. Let u = min{νP∞ (Ai ) : i = 1, 2, . . . , s} (so that −u is the maximum number of
poles any Ai , 1 6 i 6 s, has at P∞ ). Then it is clear that u > −D and νP∞ (A0 ) >
u − (k + 2ge − 1). Each Ai has a local expansion at P∞ :
A0 = T
u−(k+2ge −1)
∞
X
j
a0,j T ;
and Ai = T
u
∞
X
ai,j T j for i = 1, 2, . . . , s.
j=0
j=0
i
Assume that at P∞ , the function f has a local expansion (36). Then f σ has a local
expansion at P as follows
∞
X
i
i
fjq T j .
fσ =
j=0
For l = 0, 1, . . . , define the linearized polynomial
Bl (X) := a1,l X + a2,l X q + · · · + as,l X q
s−1
From the definition of u, one knows that B0 (X) is nonzero. Equating the coefficient of
s−1
to equal 0 gives us the condition
T d+u−(k+2ge −1) in A0 + A1 f + A2 f σ + · · · + As f σ
a0,d + Bd (f0 ) + Bd−1 (f1 ) + · · · + B0 (fd ) = 0 .
Arguing as in Lemma 9.8 this constrains (f0 , f1 , . . . , fk−1 ) to belong to an (s − 1, m)-ultra
periodic subspaces of Fmk
q .
Similar to Corollary 9.11, we can now conclude the following:
Corollary 9.13. The code CGS (m; k + 2ge − 1 | Fkqm ) can be list decoded from up to
s
3s+1
s+1 (N − k) − s+1 ge errors, pinning down the messages to an (s − 1, m)-ultra periodic
mk
subspace of Fq .
We conclude the section by incorporating the trade-off between ge and N , and stating
the rate vs. list decoding radius trade-off offered by these codes, in a form convenient for
improvements to the list size using subspace evasive sets and subspace designs (see Section
10). The claim about the number of possible solution subspaces follows since the subspace
is determined by A0 , A1 , . . . , As , and for our choice of parameter D, there are at most
q O(mN ) choices of those.
Theorem 9.14. Let q be the even power of a prime. Let 1 6 s 6 m be integers, and
√
let R ∈ (0, 1). Then for infinitely many N (all integers of the form q e/2 ( q − 1)), there
is a deterministic polynomial time construction of an Fqm -linear code GS(q,m) [N, k] of
block length N and dimension k = R · N that can be list decoded in poly(N, m, log q) time
s
O(mN ) possible
(N − k) − √3N
from s+1
q−1 errors, pinning down the messages to one of q
(s − 1, m)-ultra periodic Fq -affine subspaces of Fmk
q .
10. Subspace designs
The linear-algebraic list decoder discussed in the previous sections pins down the
coefficients of the message to a periodic subspace. This subspace has linear dimension, so
we need to restrict the coefficients further so that the subspace can be pruned to a small
list of solutions. We already saw, in Section 6, an approach using h.s.e. sets to prune the
40
V. GURUSWAMI AND C. XING
periodic subspace to a small list. In this section, we will develop an alternate approach
based a special collection of subspaces, which we call a subspace design, for pruning the
periodic subspaces. This will lead to explicit constructions with somewhat larger list size.
We begin with the definition of the central object of study in this section, subspace
designs.
Definition 15. Let Λ be a positive integer, and q a prime power. For positive integers
Λ
r < Λ and d, an (r, d)-subspace design in FΛ
q is a collection of subspaces of Fq such that
for every r-dimensional subspace W ⊂ FΛ
q , we have
X
(41)
dim(W ∩ H) 6 d .
H∈H
The cardinality of a subspace design H is the number of subspaces in its collection, i.e.,
|H|. If all subspaces in H have the same dimension t, then we refer to t as the dimension
of the subspace design H.
Note that the condition (41) in particular implies for every r-dimensional subspace W , at
most d of the subspaces in an (r, d)-subspace design non-trivially intersect it. This weaker
property is called a “weak subspace design” in [8] which gave explicit constructions of
subspace designs following our original definition in [17]. For our list decoding application,
the stronger property (41) is required. In particular, the usefulness of subspace designs
defined above, in the context of pruning periodic subspaces, is captured by the following
key lemma.
Lemma 10.1 (Periodic subspaces intersected with a subspace design). Suppose H1 , H2 ,
. . . , Hb are subspaces in an (r, d)-subspace design in FΛ
q , and T is a (r, Λ, b)-periodic affine
subspace of FΛb
with
underlying
subspace
S.
Then
the
set
q
T = {(f1 , f2 , . . . , fb ) ∈ T | fj ∈ Hj for j = 1, 2, . . . , b}
is an affine subspace of FΛb
q of dimension at most d. Also, the underlying subspace of T
def
is contained in S = S ∩ (H1 × H2 × · · · × Hb ).
Proof. It is clear that T is an affine subspace, since its elements are restricted by the set
of linear constraints defining T and the Hj ’s. Also, the difference of two elements in T
is contained in both the subspaces S and (H1 × H2 × · · · × Hb ), which implies that the
underlying subspace of T is contained in S.
We will prove the bound on dimension by proving that |T | 6 q d . To prove this, we
will imagine the elements of T as the leaves of a tree of depth b, with the nodes at level j
representing the possible projections of T onto the first j blocks. The root of this tree has
as children the elements of the affine space proj[1,Λ] (T ) ∩ H1 . Let W be the subspace of FΛ
q
of dimension at most r associated with the periodic subspace T (in the sense of Definition
1). Note that the underlying subspace of the affine space proj[1,Λ] (T ) ∩ H1 is contained in
the subspace W ∩ H1 .
Continuing this argument, the children of an element a ∈ FjΛ
q at level j will be a
followed by the possible extensions of a to the (j + 1)’th block, given by
{proj[j∆+1,(j+1)∆] (x) | x ∈ T and projj∆ (x) = a} ∩ Hj+1 .
The periodic property of T and the fact that Hj+1 is a subspace implies that the possible
extensions of a are given by a coset of a subspace of W ∩ Hj+1 . Thus the nodes at level
j have degree at most q dim(W ∩Hj+1 ) for j = 0, 1, . . . , b − 1. Since the Hj ’s belong to an
AG CODES & NEAR-OPTIMAL LIST DECODING
41
P
(r, d)-subspace design we have bj=1 dim(W ∩ Hj ) 6 d. Therefore, the tree has at most
q d leaves, which is also an upper bound on |T |.
10.1. Constructing subspace designs. We now turn to the construction of subspace
designs of large size and dimension. We first analyze the performance of a random collection of subspaces.
Lemma 10.2. Let η > 0 and q be a prime power. Let r, Λ be integers Λ > 8/η and
r 6 ηΛ/2. Consider a collection H of subspaces of FΛ
q obtained by picking, independently
at random, q ηΛ/8 subspaces of FΛ
of
dimension
(1
−
η)Λ each. Then, with probability at
q
−Λr
least 1 − q
, H is an (r, 8r/η)-subspace design.
Proof. Let ℓ = 8r/η, and let M = q ηΛ/8 denote the number of randomly chosen subspaces.9
Let H1 , H2 , . . . , HM be the subspaces in the collection H. Fix a subspace W of FΛ
q of
dimension r. Fix a tuple of non-negative integers (a1 , a2 , . . . , aM ) summing up to ℓ. For
each j ∈ {1, 2, . . . , M }, the probability that dim(W ∩Hj ) > aj is at most q raj q −ηΛaj . Since
the choice of the different Hj ’s are independent, the probability that dim(W ∩ Hj ) > aj
for every j is at most q (r−ηΛ)ℓ 6 q −ηΛℓ/2 (the last step uses r 6 ηΛ/2).
A union bound over the at most q Λr subspaces W ⊂ FΛ
q of dimension r, and the at
ℓ+M
ℓ
2ℓ
most ℓ 6 (M +ℓ) 6 M choices of the tuples (a1 , a2 , . . . , aM ), we get the probability
that H is not an (r, ℓ)-subspace design is at most
q Λr · q −ηΛℓ/2 · (q ηΛ/8 )2ℓ = q Λr · q −ηΛℓ/4 6 q −Λr
where the last step uses ℓ > 8r/η.
Note that given a collection H of subspaces, one can deterministically check if it is
O(Λr) |H| time by doing a brute-force check of all ran (r, d)-subspace design in FΛ
q in q
P
Λ
dimensional subspaces W of Fq , and for each computing H∈H dim(W ∩H) using |H|ΛO(1)
operations over Fq . Thus the above lemma gives a q O(Λr) time Las Vegas construction of
an (r, d)-subspace design with many subspaces each of large dimension (1 − η)m.
Lemma 10.3. For parameters η, r, Λ as in Lemma 10.2, for any b 6 q ηΛ/8 , one can
compute an (r, 8r/η)-subspace design in FΛ
q of dimension (1 − η)Λ and cardinality b in
O(Λr)
q
Las Vegas time.
As noted in the conference version [17] of this paper, the construction can be derandomized using the method of conditional expectations to successively find good subspaces
Hi to add to the subspace design. However, as each step involves searching over all
O(Λ2 ) even for con(1 − η)Λ-dimensional subspaces of FΛ
q , the construction time would be q
structing subspace designs with few subspaces. For our application to reducing the list size
for long algebraic-geometric codes (either folded or with rational points in a subfield), we
will need subspace designs for ambient dimension Λ growing at least logarithmically in the
2
code length. The q O(Λ ) complexity will thus lead to a quasi-polynomial code construction
time, as claimed in the conference version [17]. In fact, even the Las Vegas construction
time of q O(Λr) will be super-polynomial for the parameters used in the construction.
The question of explicit (polynomial time) constructions of subspace designs naturally arose following [17] and was addressed in the follow-up work by Guruswami and
Kopparty [8], who proved the following.
9For simplicity, we ignore the floor and ceil signs in defining integers; these can be easily incorporated.
42
V. GURUSWAMI AND C. XING
Theorem 10.4 (Explicit subspace designs [8]). For every η > 0, integers r, Λ with r 6
ηΛ/4, and prime powers q satisfying q ηΛ/(2r) > 2r/η, for any b 6 q ηΛ/(4r) , there exists
an explicit (r, r 2 /η)-subspace design of cardinality b and dimension (1 − η)Λ, that can be
constructed deterministically in time poly(b, q) time. In the case when q > Λ, one can
explicitly construct an (r, 2r/η)-subspace design with the same parameters.
We note a couple of senses in which the parameters offered by the explicit construction are weaker than those guaranteed by the probabilistic construction. First, the total
intersection dimension (41) is r 2 /η rather than O(r/η) (except when q is large). This is
because, for small fields, their construction yields only a weak subspace design, incurring
a factor r loss when passing to a subspace design. Second, the number of subspaces in the
design is smaller, roughly q Ω(ηΛ/r) instead of q Ω(ηΛ) . Finally, there is a modest restriction
the field size q, and we need to pick r, Λ suitably to allow for fixed q. Fortunately, all
these restrictions can be accommodated for our application. We remark that a recent
construction of subspace designs based on cyclotomic function fields [18] gives an analog of Theorem 10.4 over any field Fq with an (r, O(r logq Λ/η))-subspace design; for our
application, however, the r 2 /η bound is more useful as r ≪ Λ, and we can’t afford the
dependence on Λ in the bound.
Let us now record a construction of subspaces with low-dimensional intersection with
every periodic subspace based on the above subspace designs. This form will be convenient
for later use in pre-coding Reed-Solomon codes.
Theorem 10.5. Let η ∈ (0, 1) and q be a prime power, and r, Λ, b be integers such that
r 6 ηΛ/4 and b < q. Then, one can construct a subspace V of FbΛ
q of dimension at least
O(Λ)
(1 − η)bΛ in either deterministic q
time: For every (r, Λ, b)-periodic subspace T ⊂ FbΛ
q ,
V ∩ T is an Fq -affine subspace of dimension at most 2r/η.
Proof. We will take V = H1 × H2 × · · · Hb where the Hi ’s belong to a (r, 2r/η)-subspace
design in F∆
q of cardinality b and dimension at least (1−η)Λ as guaranteed by Theorem 10.4
when q > Λ. er Clearly dim(V ) > (1 − η)bΛ since each Hi has dimension at least (1 − η)Λ.
The claim now follows using Lemma 10.1.
10.2. Cascaded subspace designs. In preparation for our results about algebraic-geometric
codes, whose block length ≫ q m is much larger than the possible size of subspace designs
in Fm
q , we now formalize a notion that combines several “levels” of subspace designs. The
definition might seem somewhat technical, but it has a natural use in our application to
list-size reduction for AG codes. Note that there is no “consistency” requirement between
subspace designs at different levels other than the lengths and cardinalities matching.
Definition 16 (Subspace designs of increasing length). Let l be a positive integer. For
positive integers r0 6 r1 6 · · · 6 rl and m0 6 m1 6 · · · 6 ml such that mι−1 |mι for
1 6 ι 6 l, an (r0 , r1 , . . . , rl )-cascaded subspace design with length-vector (m0 , m1 , . . . , ml )
and dimension vector (d0 , d1 , . . . , dl−1 ) is a collection of l subspace designs, specifically an
(rι−1 , rι )-subspace design in Fqmι−1 of cardinality mι /mι−1 and dimension dι−1 for each
ι = 1, 2, . . . , l.
Note that the l = 1 case of the above definition corresponds to an (r0 , r1 )-subspace
0 of dimension d
design in Fm
0 and cardinality m1 /m0 . In Lemma 10.1, we used the
q
subspace H1 × H2 × · · · × Hb based on a subspace design consisting of the Hi ’s to prune a
periodic subspace. Generalizing this, we now define a subspace associated with a cascaded
subspace design based on the subspace designs comprising it.
AG CODES & NEAR-OPTIMAL LIST DECODING
43
Definition 17 (Canonical subspace). Let M be a cascaded subspace design with lengthvector (m0 , m1 , . . . , ml ) such that the ι’th subspace design in M has subspaces
(ι)
(ι)
(ι)
ι−1
H1 , H2 , · · · , Hmι /mι−1 ⊂ Fm
, for 1 6 ι 6 l .
q
The canonical subspace associated with such a cascaded subspace design, denoted U (M),
is a subspace of Fqml defined as follows:
l
A vector x ∈ Fm
q belongs to U (M) if and only if for every ι ∈ {1, 2, . . . , l},
each of the mι -sized blocks of x given proj[jmι +1,(j+1)mι ] (x) for 0 6 j <
(ι)
(ι)
(ι)
ml /mι ) belongs H1 × H2 × · · · × Hmι /mι−1 .
In other words, we apply the construction of Lemma 10.1 for (disjoint) intervals of
length mι at each level ι ∈ {1, 2, . . . , l}.
The following simple fact, which follows by counting number of linear constraints imposed,
gives a lower bound on the dimension of a canonical subspace.
Observation 10.6. For a cascaded subspace design M as above, if the ι’th subspace design
has dimension at least (1 −ξι−1 )mι−1 for 1 6 ι 6 l, then the dimension of the canonical
subspace U (M) is at least 1 − (ξ0 + ξ1 + · · · + ξl−1 ) ml .
The following is the crucial claim about pruning ultra-periodic subspaces using (the
canonical subspace of) a cascaded subspace design. It generalizes Lemma 10.1 which
corresponds to the l = 1 case.
Lemma 10.7. Suppose M is a (r0 , r1 , . . . , rl )-cascaded subspace design with length-vector
l
(m0 , m1 , . . . , ml ). Let T be a (r0 , m0 )-ultra periodic affine subspace of Fm
q . Then the
dimension of the affine space T ∩ U (M) is at most rl .
Proof. The idea will be to apply Lemma 10.1 inductively, for increasing periods m0 , m1 ,
. . . , ml−1 . Since T is (r0 , m0 )-ultra periodic, it is (r0 , m0 )-periodic and ((m1 /m0 )r0 , m1 )periodic. Using this together with Lemma 10.1, it follows that
(1)
(1)
(1)
l
T ∩ {x ∈ Fm
q | proj[jm1 +1,(j+1)m1 ] (x) ∈ H1 × H2 × · · · × Hm1 /m0 for 0 6 j < ml /m1 }
is an affine subspace that is (r1 , m1 )-periodic. Continuing this argument, the affine sub(ι)
(ι)
(ι)
space of T formed by restricting each mι -block to belong to H1 × H2 × · · · × Hmι /mι−1
l
for 1 6 ι 6 j is (rj , mj )-periodic. For j = l, we get the intersection T ∩ U (M) ⊂ Fm
q
will be (rl , ml )-periodic, which simply means that it is an rl -dimensional affine subspace
l
of Fm
q .
We conclude this section by constructing a canonical subspace that has low-dimensional
intersection with ultra-periodic subspaces based on the explicit subspace designs of Theorem 10.4. This statement will be used in Section 11.2 for pre-coding algebraic-geometric
codes based on the Garcia-Stichtenoth tower.
Theorem 10.8. Let q > 4 be a prime power. Let η ∈ (0, 1) and integers Λ, r > 2 satisfy
Λ > crη −1 log(r/η) for a large enough (absolute) constant c > 0. For all large enough
multiples κ of Λ, we can construct a subspace U of Fκq of dimension at least (1 − η)κ
such that for every (r, Λ)-ultra periodic affine subspace T ⊂ Fκq , the dimension of the
O(log∗ κ)
affine subspace U ∩ T is at most (r/η)2
deterministically in poly(κ, q) time.
. The subspace U can be constructed in
44
V. GURUSWAMI AND C. XING
Proof. We will take U to the canonical subspace U (M) of an appropriate cascaded subspace design M. To this end, given our work so far, the main remaining task is to pick
η
the parameters of M carefully. Let ηι = 4·2
ι for ι = 0, 1, 2, . . . .
√
Let m0 = Λ, m1 = m0 · ⌊(r/η)c/4 ⌋, and for ι > 0, mι+1 = mι · q ⌈ mι ⌉ . Let r0 = r,
and for ι > 0, rι+1 = ⌈rι2 /ηι ⌉. For this choice of parameters, one can verify that (i)
rι 6 ηι mι /4, and (ii) q ηι mι /(4rι ) > mι+1 /mι for all ι > 0. Indeed, to verify the first
condition by induction, one only needs to check that mι+1 > m2ι , which is true for ι = 0
√
for a large enough choice of c, and for ι > 1, mι+1 in fact grows exponentially in mι . For
the second condition, for ι = 0 it follows from our assumption that Λ > crη −1 log(r/η).
√
For ι > 1, it is implied by rι /ηι ≪ mι /4, which is true for ι = 1 for large enough c,
and for ι > 1 by induction since rι /ηι grows quadratically in each step, whereas mι grows
exponentially.
We can therefore conclude by Theorem 10.4 that we can construct a (rι , rι+1 )ι
subspace design of cardinality mι+1 /mι in Fm
q of dimension (1 − ηι )mι .
Pick l to the smallest integer so that ml−1 > (logq κ)2 . Since m0 = Λ > 2 and
√
mι+1 > q mι for 1 6 ι < l, it is easy to see that that l 6 O(log∗ κ). Redefine ml−1
to equal m′l−1 which is the smallest multiple of ml−2 that is at least (logq κ)2 . Since
ml−2 < (logq κ)2 , we have (logq κ)2 6 m′l−1 < 2(logq κ)2 . We also redefine ml to equal the
largest multiple m′l of m′l−1 that is at most κ. This implies κ − m′l < m′l−1 . Note that
√ ′
√
m′l−1 6 ml−2 q ⌈ ml−2 ⌉ and m′l 6 q ml−1 . For notational simplicity, let us re-denote m′l−1
and m′l by ml−1 and ml .
Thus for these parameters, we can construct an (r0 , r1 , . . . , rl )-cascaded subspace design Ml with length-vector (m0 , m1 , . . . , ml ) and dimension-vector (d0 , d1 , . . . , dl−1 ) where
dι > (1 − η/2ι+2 )mι .
The construction time for subspace designs guaranteed by Theorem 10.4 implies that
Ml can be constructed in poly(ml , q) time. We define the desired subspace U ⊂ Fκq as
l
U (Ml ) × 0κ−ml , i.e., U consists of the vectors in the canonical subspace U (Ml ) ⊂ Fm
q
padded with κ − ml zeroes at the end. By Observation 10.6, the dimension of U is at least
!
l−1
X
η
ml > (1 − η/2)ml > (1 − η/2)(κ − ml−1 )
1−
ι
4
·
2
ι=0
> (1 − η/2)κ − 2(logq κ)2 > (1 − η)κ
for large enough κ. This proves that the subspace U has dimension at least (1 − η)κ, and
can be constructed deterministically in poly(q, κ) time.
It remains to prove the claimed intersection property with ultra-periodic subspaces.
Let T be an arbitrary (r, Λ)-ultra periodic affine subspace of Fκq . By Lemma 10.7,
l of dimension at most r . Clearly, the
projml (T ) ∩ U (M) is an affine subspace of Fm
l
q
same dimension bound also holds for T ∩ U since the last κ − ml coordinates for vectors
in U are set to 0. The proof is complete by noting that for our choice of parameters,
l
rl 6 (2r/η)2 and l 6 O(log∗ κ).
11. Good list decodable subcodes of RS and AG codes
We now combine our code constructions in Section 9 with a pre-coding step that
restricts coefficients to belong to a subspace design, and thereby obtain subcodes that are
list decodable with smaller list-size in polynomial time.
AG CODES & NEAR-OPTIMAL LIST DECODING
45
11.1. Reed-Solomon codes. We begin with the case of Reed-Solomon codes. For a finite
field Fq , constant ε > 0, integers n, k, m, s satisfying 1 6 k < n 6 q and 1 6 s 6 εm/12, we
will define subcodes of RS(q,m) [n, k]. Below for a polynomial f ∈ Fqm [X] with k coefficients
f0 , f1 , . . . , fk−1 , we denote by f0 , f1 , . . . , fk−1 the representation of these coefficients as
vectors in Fm
q by fixing some Fq -basis of Fq m .
c of RS(q,m) [n, k] consisting of the encodings of f ∈ Fqm [X] such
Define the subcode RS
guaranteed by Theorem 10.5, when
that (f0 , f1 , . . . , fk−1 ) ∈ V for a subspace V ⊆ Fmk
q
applied with the parameter choices
Λ = m;
b = k;
r = s − 1;
η=ε.
c is an Fq -linear code over the alphabet Fqm of rate (1 − ε)k/n, and it can be
Note that RS
2
constructed in deterministic q O(m ) time, or Las Vegas q O(ms) time.10
Theorem 11.1. Given an input string y ∈ Fnqm , a basis of an affine subspace of dimension
at most O(s/ε) that includes all codewords of the above subcode within Hamming distance
s
s+1 (n − k) from y can be found in deterministic poly(n, log q, m) time.
Proof. By Lemma 9.4, we can compute the (s − 1, m, k)-periodic subspace T of messages
s
whose Reed-Solomon encodings can be within Hamming distance s+1
(n − k) from y.
By Theorem 10.5, the intersection T ∩ V is is an affine subspace over Fq of dimension
d = O(s/ε). Since both steps involve only basic linear algebra, they can be accomplished
using poly(n, m) operations over Fq .
By picking s = Θ(1/ε) and m = Θ(1/ε2 ) in the above construction, we can conclude
the following.
Corollary 11.2. For every R ∈ (0, 1) and ε > 0, and all large enough integers n < q
with q a prime power, one can construct a rate R Fq -linear subcode of a Reed-Solomon
code of length n over Fqm , such that the code can be (i) encoded in (n/ε)O(1) time and
(ii) list decoded from a fraction (1 − ε)(1 − R) of errors in (n/ε)O(1) time, outputting a
subspace over Fq of dimension O(1/ε2 ) including all close-by codewords. The code can be
constructed deterministically in poly(q) time.
We note that the above list decoding guarantee is in fact weaker than what is achieved
for folded Reed-Solomon codes in [14], where the codewords were pinned down to a dimension O(1/ε) subspace. We can improve the list size above to poly(1/ε) using pseudorandom
subspace-evasive sets as in [14], or to exp(ε−O(1) ) using the explicit subspace-evasive sets
from [1]. The main point of the above result is not the parameters but that an explicit
subcode of RS codes has optimal list decoding radius with polynomial complexity.
11.2. Subcodes of Garcia-Stichtenoth codes. We now pre-code the codes constructed
in Section 9.3. For a finite field Fq , constant ε > 0, and integers s, m satisfying 1 6 s 6
O(εm/ log(1/ε)) and m > Ω(1/ε2 ), we will define subcodes of GS(q,m) [N, k] guaranteed
by Theorem 9.14. Note that messages space of this code can be identified with Fmk
q .
d of GS(q,m) [N, k] consisting of the encodings of a subspace
Define the subcode GS
mk
U ⊆ Fq guaranteed by Theorem 10.8, when applied with the parameter choices
(42)
η = ε;
r = s − 1;
Λ = m;
κ = km .
10It can also be constructed in Monte Carlo (q/ε)O(1) time by randomly picking subspaces for the
subspace design used to construct V in Theorem 10.5.
46
V. GURUSWAMI AND C. XING
d is an Fq -linear code over the alphabet Fqm of rate (1 − ε)k/N . Also, it can
Note that GS
be constructed in poly(k, m, q) time by virtue of the construction complexity of U .
Lemma 11.3. Given an input string y ∈ FN
q m , a basis of an affine subspace of dimension
at most
O(log ∗ (km)
(s/ε)2
that includes all codewords of the above subcode within Hamming distance
√
3N/( q − 1) from y can be found in deterministic poly(n, log q, m) time.
s
s+1 (N
− k) −
Proof. By Theorem 9.14, we can compute the (s − 1, m)-ultra periodic subspace T of
√
s
(N − k) − 3N/( q − 1)
messages whose encodings can be within Hamming distance s+1
from y. By Theorem 10.8, for the above choice of parameters (42), the intersection T ∩ U
O(log ∗ (km)
. Since both steps involve only
is is an affine subspace over Fq of dimension (s/ε)2
basic linear algebra, they can be accomplished using poly(N, m) operations over Fq .
By taking q = Θ(1/ε2 ), and choosing s = Θ(1/ε) and m = Θ(ε−2 log(1/ε)) in the
above lemma, we conclude the following main result concerning the explicit construction
of codes list decodable up to the Singleton bound.
Theorem 11.4 (Main deterministic code construction). For every R ∈ (0, 1) and ε > 0,
there is a deterministic polynomial time constructible family of error-correcting codes of
rate R over an alphabet of size exp(O(ε−2 log2 (1/ε))) that can be list decoded in polynomialtime from a fraction (1
− R − ε) of errors, outputting a list of size at most
∗
exp1/ε exp1/ε (exp(O(log N ))) , where N is block length of the code.
References
[1] Zeev Dvir and Shachar Lovett, Subspace evasive sets, Proceedings of the 44th Symposium on Theory
of Computing Conference (STOC), 2012, pp. 351–358.
[2] Peter Elias, Error-correcting codes for list decoding, IEEE Transactions on Information Theory 37
(1991), 5–12.
[3] Michael A. Forbes and Venkatesan Guruswami, Dimension expanders via rank condensers, 19th International Workshop on Randomization and Computation (RANDOM), 2015, pp. 800–814.
[4] Arnaldo Garcia and Henning Stichtenoth, A tower of Artin-Schreier extensions of function fields
attaining the Drinfeld-Vlădut bound, Inventiones Mathematicae 121 (1995), 211–222.
[5]
, On the asymptotic behavior of some towers of function fields over finite fields, Journal of
Number Theory 61 (1996), no. 2, 248–273.
[6] Venkatesan Guruswami, Cyclotomic function fields, Artin-Frobenius automorphisms, and list errorcorrection with optimal rate, Algebra and Number Theory 4 (2010), no. 4, 433–463.
[7]
, Linear-algebraic list decoding of folded Reed-Solomon codes, Proceedings of the 26th IEEE
Conference on Computational Complexity, June 2011.
[8] Venkatesan Guruswami and Swastik Kopparty, Explicit subspace designs, Combinatorica 36 (2016),
no. 2, 161–185, Preliminary version in FOCS 2013.
[9] Venkatesan Guruswami and Srivatsan Narayanan, Combinatorial limitations of average-radius listdecoding, IEEE Transactions on Information Theory 60 (2014), no. 10, 5827–5842.
[10] Venkatesan Guruswami and Anindya Patthak, Correlated Algebraic-Geometric codes: Improved list
decoding over bounded alphabets, Mathematics of Computation 77 (2008), no. 261, 447–473.
[11] Venkatesan Guruswami and Atri Rudra, Explicit codes achieving list decoding capacity: Errorcorrection with optimal redundancy, IEEE Transactions on Information Theory 54 (2008), no. 1,
135–150.
[12]
, Better binary list decodable codes via multilevel concatenation, IEEE Trans. Information
Theory 55 (2009), no. 1, 19–26.
[13] Venkatesan Guruswami and Madhu Sudan, Improved decoding of Reed-Solomon and Algebraicgeometric codes, IEEE Transactions on Information Theory 45 (1999), no. 6, 1757–1767.
AG CODES & NEAR-OPTIMAL LIST DECODING
47
[14] Venkatesan Guruswami and Carol Wang, Linear-algebraic list decoding for variants of reed-solomon
codes, IEEE Transactions on Information Theory 59 (2013), no. 6, 3257–3268.
[15] Venkatesan Guruswami, Carol Wang, and Chaoping Xing, Explicit list-decodable rank-metric and
subspace codes via subspace designs, IEEE Trans. Information Theory 62 (2016), no. 5, 2707–2718.
[16] Venkatesan Guruswami and Chaoping Xing, Folded codes from function field towers and improved
optimal rate list decoding, Proceedings of the 44th Symposium on Theory of Computing Conference
(STOC), 2012, pp. 339–350.
[17]
, List decoding Reed-Solomon, algebraic-geometric, and Gabidulin subcodes up to the Singleton
bound, Proceedings of the ACM Symposium on Theory of Computing Conference (STOC), 2013,
pp. 843–852.
[18] Venkatesan Guruswami, Chaoping Xing, and Chen Yuan, Subspace designs based on algebraic function
fields, 44th International Colloquium on Automata, Languages, and Programming (ICALP), 2017,
pp. 86:1–86:10.
[19] Swastik Kopparty, Noga Ron-Zewi, and Shubhangi Saraf, Personal communication, 2017.
[20] Harald Niederreiter and Chaoping Xing, Rational points on curves over finite fields–theory and applications, Cambridge University Press, 2001.
[21] Farzad Parvaresh and Alexander Vardy, Correcting errors beyond the Guruswami-Sudan radius in
polynomial time, Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer
Science, 2005, pp. 285–294.
[22] Ba-Zhong Shen, A Justesen construction of binary concatanated codes that asymptotically meet the
Zyablov bound for low rate, IEEE Transactions on Information Theory 39 (1993), 239–242.
[23] Kenneth Shum, Ilia Aleshnikov, P. Vijay Kumar, Henning Stichtenoth, and Vinay Deolalikar, A
low-complexity algorithm for the construction of algebraic-geometric codes better than the GilbertVarshamov bound, IEEE Transactions on Information Theory 47 (2001), no. 6, 2225–2241.
[24] Joseph H. Silverman, The arithmetic of elliptic curves, Springer, New York, 1985.
[25] Henning Stichtenoth, Algebraic function fields and codes, Universitext, Springer-Verlag, Berlin, 1993.
[26] Madhu Sudan, Decoding of Reed-Solomon codes beyond the error-correction bound, Journal of Complexity 13 (1997), no. 1, 180–193.
[27] Salil Vadhan, Pseudorandomness, Foundations and Trends in Theoretical Computer Science 7(1-3):
1-336 (2012)
Computer Science Department, Carnegie Mellon University, Pittsburgh, USA.
E-mail address: [email protected]
Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang
Technological University, Singapore.
E-mail address: [email protected]
| 7cs.IT
|
APPLICATION OF SIGNAL ANALYSIS TO THE EMBEDDING
PROBLEM OF Zk -ACTIONS
arXiv:1709.00125v1 [math.DS] 1 Sep 2017
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Abstract. We study the problem of embedding arbitrary Zk -actions into the shift
Zk
action on the infinite dimensional cube [0, 1]D . We prove that if a Zk -action X
satisfies the marker property (in particular if X is a minimal system without periodic
points) and if its mean dimension is smaller than D/2 then we can embed it in the
Zk
shift on [0, 1]D . The value D/2 here is optimal. The proof goes through signal
analysis. We develop the theory of encoding Zk -actions into band-limited signals and
apply it to proving the above statement. Main technical difficulties come from higher
dimensional phenomena in signal analysis. We overcome them by exploring analytic
techniques tailored to our dynamical settings. The most important new idea is to encode
the information of a tiling of Rk into a band-limited function which is constructed from
another tiling.
1. Introduction
1.1. Background. The main purpose of this paper is to deepen interactions between
signal analysis and dynamical systems. (This subsection is just a motivation. So readers
can skip unfamiliar/undefined terminologies.) If we think of signal analysis in a broad
sense (like signal analysis ≈ Fourier analysis), then applications of signal analysis are
ubiquitous in ergodic theory. For example, Fourier analysis proof of the unique ergodicity
of the irrational rotation (due to Weyl) is a milestone of such applications. But here
we would like to think of signal analysis in a narrower sense, say signal analysis is a
part of communication theory. From this viewpoint, a masterpiece is Shannon’s work on
communications over band-limited channels with Gaussian noise ([Sha48], [CT06, Chapter
9]): Suppose that we try to send information by using signals (say, of telephone line) whose
frequencies are limited in [−W/2, W/2]. If the averaged power of signal is P and if the
noise is additive white Gaussian noise of spectral density N, then the capacity of the
channel (i.e. the amount of information we can send by using this channel) is given by
Date: February 14, 2018.
2010 Mathematics Subject Classification. 37B05, 54F45, 94A12.
Key words and phrases. Band-limited signal, dynamical system, Zk -action, mean dimension, embedding, tiling of Rk .
Y.G. was partially supported by the Marie Curie grant PCIG12-GA-2012-334564 and the National
Science Center (Poland) grant 2016/22/E/ST1/00448. Y.Q. was partially supported by NNSF of China
(11371339 and 11571335). M.T. was supported by John Mung Program of Kyoto University.
1
2
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
the formula
W
P
Capacity =
bits per second.
log2 1 +
2
NW
The details of this formula are not important here. We just would like to emphasize
that the band-width W is a crucial parameter in the communications over band-limited
channels.
Recently the first and third named authors [GT] found an analogous theory in the
context of topological dynamics. They started the theory of encoding arbitrary dynamical
systems into band-limited signals and applied it to solving an open problem posed by
Lindenstrauss [Lin99] in 1999. The purpose of the present paper is to expand this theory
to multi-dimensional case.
1.2. Encoding into discrete signals. We start from a problem seemingly unrelated to
signal analysis. Let k be a natural number. A triple (X, Zk , T ) (often abbreviated to X)
is called a dynamical system if X is a compact metric space and
T : Zk × X → X,
(n, x) 7→ T n x
is a continuous action. A fundamental example of dynamical systems is the shift action
on the infinite dimensional cube. Let D be a natural number. Consider the infinite
Zk
Zk
Zk
be the shift:
→ [0, 1]D
product [0, 1]D . Let σ : Zk × [0, 1]D
σ m ((xn )n∈Zk ) = (xn+m )n∈Zk .
Zk k
Zk
The triple [0, 1]D
, Z , σ is a dynamical system and called the shift on [0, 1]D .
We study the old problem of embedding arbitrary dynamical systems in the shift on
Zk
Zk
is called
[0, 1]D . Let (X, Zk , T ) be a dynamical system. A map f : X → [0, 1]D
k
an embedding of a dynamical system if f is a Z -equivariant continuous injection. We
Zk
would like to understand when X can be embedded in the shift on [0, 1]D . Notice that
Zk
every compact metric space can be topologically embedded in [0, 1]D . So the problem
is a genuinely dynamical question.
It will be convenient later to see the problem from a slightly different viewpoint: A point
Zk
can be seen as a discrete signal 1 valued in [0, 1]D . Then the
x = (xn )n∈Zk in [0, 1]D
embedding problem asks when we can encode a given dynamical system X into discrete
signals.
We review the history of the problem before explaining our main result (Main Theorem
1 below). The embedding problem was first studied by Jaworski [Jaw74] in 1974. For
understanding his result, notice that periodic points form an obvious obstruction to the
Zk
embedding. For example, the shift on ([0, 1]2 ) cannot be embedded in the shift on
k
k
Zk
[0, 1]Z because the fixed points sets of ([0, 1]2 ) and [0, 1]Z are homeomorphic to the
1When
k = 2, it might be better to call x a discrete image.
EMBEDDING PROBLEM OF Zk -ACTIONS
3
square [0, 1]2 and the line segment [0, 1] respectively and the square cannot be topologically
embedded in the line segment.
A dynamical system (X, Zk , T ) is said to be aperiodic if T n x 6= x for all x ∈ X and
nonzero n ∈ Zk . Jaworski [Jaw74] proved that periodic points are the only obstruction if
X is a finite dimensional system:
Theorem 1.1 (Jaworski, 1974). Let (X, Z, T ) be an aperiodic finite dimensional dynamical system. Then we can embed it in the shift on [0, 1]Z .
Although this theorem is stated only for Z-actions, it can be easily generalized to Zk actions. (Indeed the Zk -case can be deduced from the Z-case.)
After Jaworski, people were interested in whether the assumption of finite dimensionality is essential or not. Auslander [Aus88, p. 193] asked whether we can embed every
minimal system (X, Z, T ) in the shift on [0, 1]Z . A system (X, Zk , T ) is said to be minimal if the orbit {T n x}n∈Zk is dense in X for every x ∈ X. When k = 1, minimal systems
X have no periodic points unless X is a finite set. (If X is finite, then it can be obviously
embedded in the shift on [0, 1]Z .) Therefore the question essentially asks whether there is
another obstruction different from periodic points.
Lindenstrauss–Weiss [LW00] found that mean dimension provides a new obstruction to
the embedding. Mean dimension (first introduced by Gromov [Gro99]) is a topological
invariant of dynamical systems which counts the average number of parameters of a
given system. The mean dimension of (X, Zk , T ) is denoted by mdim(X). We review its
definition in Subsection 2.1. Finite dimensional systems and finite topological entropy
systems are known to have zero mean dimension.
Zk
is equal to D, which means that
The mean dimension of the shift on [0, 1]D
k
Z
has D parameters in average. If (X, Zk , T ) can be embedded in the shift
[0, 1]D
Zk
on [0, 1]D
then mdim(X) ≤ D. Lindenstrauss–Weiss [LW00, Proposition 3.5] constructed a minimal system (X, Z, T ) of mean dimension strictly greater than one. This
system cannot be embedded in the shift on [0, 1]Z although it is minimal. Thus it solved
Auslander’s question.
Lindenstrauss went further; he proved a partial converse [Lin99, Theorem 5.1].
Theorem 1.2 (Lindenstrauss, 1999). If a minimal system (X, Z, T ) satisfies mdim(X) <
Z
D/36 then we can embed it in the shift on [0, 1]D .
Lindenstrauss [Lin99, p. 229] asked the problem of improving the condition mdim(X) <
D/36. This problem was solved by the first and third named authors [GT, Theorem 1.4]:
Theorem 1.3 (Gutman–Tsukamoto). If a minimal system (X, Z, T ) satisfies mdim(X) <
Z
D/2 then we can embed it in the shift on [0, 1]D .
The condition mdim(X) < D/2 is optimal because there exists a minimal system
Z
(X, Z, T ) of mean dimension D/2 which cannot be embedded in the shift on [0, 1]D
4
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
([LT14]). Theorem 1.3 can be seen as a dynamical analogue of the classical theorem in
dimension theory [HW41, Thm. V2]: A compact metric space X can be topologically
embedded in [0, 1]D if dim X < D/2. We review the proof of this classical result in
Subsection 2.3.
A motivation of the present paper is to generalize Theorem 1.3 to Zk -actions. It is
convenient to introduce the following notion. A dynamical system (X, Zk , T ) is said to
satisfy the marker property if for every natural number N there exists an open set
U ⊂ X satisfying
[
U ∩ T −n U = ∅ (0 < |n| < N), X =
T −n U.
n∈Zk
This property obviously implies the aperiodicity. The following dynamical systems are
known to satisfy the marker property:
• Aperiodic minimal systems. (This is an immediate fact from the definition.)
• Aperiodic finite dimensional systems ([Gut12, Theorem 6.1])2.
• If X satisfies the marker property and if π : Y → X is an extension (i.e. Zk equivariant continuous surjection) then Y also satisfies the marker property.
The authors do not know an example of aperiodic actions which do not satisfy the marker
property.
Lindenstrauss and the first and third named authors [GLT16, Theorem 1.5] proved:
Theorem 1.4 (Gutman–Lindenstrauss–Tsukamoto, 2016). If a dynamical system (X, Zk , T )
satisfies the marker property and
D
mdim(X) <
then we can embed it in the shift on [0, 1]2D
Zk
2k+1
.
After stating this theorem, the paper [GLT16] posed the problem of improving the
condition mdim(X) < D/2k+1. Quoting [GLT16, p. 782]:
Note also that in our condition mdim(X) < D/2k+1, the constant involved is likely far from optimal. Presumably for an aperiodic Zk -system
k
if mdim(X) < D2 then X can be embedded in ([0, 1]D )Z .
The first main theorem of the present paper confirms this conjecture under the assumption of the marker property:
2More
generally, we can prove that if an aperiodic dynamical system satisfies the small boundary
property then it satisfies the marker property. The small boundary property is a notion introduced
by Lindenstrauss–Weiss [LW00, Definition 5.2], which is satisfied by every aperiodic finite dimensional
system. We do not use these facts. So we omit the detailed explanation.
EMBEDDING PROBLEM OF Zk -ACTIONS
5
Main Theorem 1. If a dynamical system (X, Zk , T ) satisfies the marker property and
mdim(X) <
then we can embed it in the shift on [0, 1]D
Zk
D
,
2
.
As in the case of Theorem 1.3, the condition mdim(X) < D/2 is optimal because
the paper [LT14]3 provides an example of aperiodic minimal system (X, Zk , T ) of mean
Zk
dimension D/2 which cannot be embedded in the shift on [0, 1]D . Main Theorem
1 has some novelty even in the case of k = 1: Since both aperiodic finite dimensional
systems and aperiodic minimal systems satisfy the marker property, Main Theorem 1
unifies Jaworski’s theorem (Theorem 1.1) and Theorem 1.3 into a single statement.
1.3. Encoding into band-limited signals. A discovery of the paper [GT] is that we
can approach to the embedding problem in Subsection 1.2 via signal analysis. We need
to prepare some terminologies. For a rapidly decreasing function ϕ : Rk → C we define
its Fourier transforms by
Z
√
F (ϕ)(ξ) = ϕ̂(ξ) =
ϕ(t) e−2π −1t·ξ dt1 . . . dtk ,
k
ZR
√
F(ϕ)(t) = ϕ̌(t) =
ϕ(ξ) e2π −1t·ξ dξ1 . . . dξk .
Rk
It follows that F F (ϕ) = F (F (ϕ)) = ϕ. We extend F and F to tempered distributions
ψ by the dualities hF (ψ), ϕi = hψ, F(ϕ)i and hF(ψ), ϕi = hψ, F (ϕ)i where ϕ are rapidly
√
decreasing functions (Schwartz [Sch66, Chapter 7]). For example, if ψ(t) = e2π −1a·t
(a ∈ Rk ) then F (ψ) = δa is the delta probability measure at a.
Let a1 , . . . , ak be positive numbers. A bounded continuous function ϕ : Rk → R is
said to be band-limited in [−a1 /2, a1 /2] × · · · × [−ak /2, ak /2] if the Fourier transform ϕ̂
satisfies
h a a i
h a a i
1
k
1
k
supp ϕ̂ ⊂ − ,
×···× − ,
,
2 2
2 2
which means that hϕ̂, φi = hϕ, φ̌i = 0 for all rapidly decreasing functions φ satisfying
h a a i
h a a i
k
1
k
1
×···× − ,
= ∅.
supp φ ∩ − ,
2 2
2 2
For example, when k = 1, the functions
sin(πt1 ),
cos(πt1 ),
sin(πt1 )
πt1
are band-limited in [−1/2, 1/2].
We define B(a1 , . . . , ak ) as the Banach space of all bounded continuous functions ϕ :
Rk → R band-limited in [−a1 /2, a1 /2] × · · · × [−ak /2, ak /2]. Its norm is the L∞ -norm.
3Strictly
speaking, the paper [LT14] considered only the case of k = 1. But their construction can be
generalized to Zk -actions without any changes.
6
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
We define B1 (a1 , . . . , ak ) as the set of ϕ ∈ B(a1 , . . . , ak ) satisfying ||ϕ||L∞ (Rk ) ≤ 1. In this
paper we promise that the space B1 (a1 , . . . , ak ) is always endowed with the topology of
uniform convergence over compact subsets. Namely B1 (a1 , . . . , ak ) is endowed with
the topology given by the distance
∞
X
d(ϕ, ψ) =
2−n ||ϕ − ψ||L∞ (Bn ) ,
Bn = {t ∈ Rk | |t| ≤ n} .
n=1
B1 (a1 , . . . , ak ) is compact (see Corollary 2.3 below) and endowed with a natural continuous
action of Zk defined by
σ : Zk × B1 (a1 , . . . , ak ) → B1 (a1 , . . . , ak ),
σ n (ϕ)(t) = ϕ(t + n).
We call the dynamical system (B1 (a1 , . . . , ak ), Zk , σ) the shift on B1 (a1 , . . . , ak ). Its mean
dimension is equal to the product4
a1 . . . ak ,
which is a multi-dimensional version of band-width W introduced in Subsection 1.1. As
band-width W plays a crucial role in Shannon’s theory, the quantity a1 . . . ak becomes a
key parameter below.
We consider the problem of embedding arbitrary dynamical systems in the shift on
B1 (a1 , . . . , ak ). In other words we ask when we can encode a given dynamical system into
band-limited signals. When k = 1, the first and third named authors [GT, Theorem 1.7]
proved:
Theorem 1.5 (Gutman–Tsukamoto). If an aperiodic minimal system (X, Z, T ) satisfies
mdim(X) < a1 /2 then we can embed it in the shift on B1 (a1 ).
The second main theorem of the present paper generalizes this theorem to the higher
dimensional case:
Main Theorem 2. If a dynamical system (X, Zk , T ) satisfies the marker property and
a1 . . . ak
,
mdim(X) <
2
then we can embed it in the shift on B1 (a1 , . . . , ak ).
As in the case of Main Theorem 1, the condition mdim(X) < a1 . . . ak /2 is optimal
because a modification of [LT14] provides an aperiodic minimal system (X, Zk , T ) of
mean dimension a1 . . . ak /2 which cannot be embedded in the shift on B1 (a1 , . . . , ak ).
We can prove Main Theorem 1 by using Main Theorem 2.
Proof: Main Theorem 2 implies Main Theorem 1. From mdim(X) < D/2 we can choose
positive numbers a1 , . . . , ak satisfying
a1 . . . ak
.
a1 < D, a2 < 1, . . . , ak < 1, mdim(X) <
2
4This
fact is not used in the paper. So we omit the proof.
EMBEDDING PROBLEM OF Zk -ACTIONS
7
Main Theorem 2 implies that we can embed X in the shift on B1 (a1 , . . . , ak ). We define
a lattice Λ ⊂ Rk by
o
n n
1
, n2 , . . . , nk n1 , n2 . . . , nk ∈ Z .
Λ=
D
It follows from a sampling theorem (see Lemma 2.4 below) that the map
B1 (a1 , . . . , ak ) → [−1, 1]Λ ,
ϕ 7→ ϕ|Λ
is injective. Set e = (1/D, 0, . . . , 0) ∈ Rk . The above injectivity means that the Zk equivariant map
B1 (a1 , . . . , ak ) → [−1, 1]D
Zk
,
ϕ 7→ (ϕ(n), ϕ(n + e), . . . , ϕ (n + (D − 1)e))n∈Zk
is an embedding. Since the system X can be embedded in the shift on B1 (a1 , . . . , ak ), it
Zk
can be also embedded in the shift on [−1, 1]D , which is obviously isomorphic to the
Zk
shift on [0, 1]D .
1.4. One dimension versus multi-dimension; what are the main difficulties?
This subsection explains what are the main difficulties in the proof of Main Theorem 2.
When the authors started the research of this paper, they optimistically thought that the
proof of Main Theorem 2 is probably more or less a direct generalization of the proof
of Theorem 1.5 in [GT]. This expectation turned out to be wrong. Completely new
difficulties arose in the context of signal analysis. The paper [GT] used the technique of
one dimensional signal analysis. The proof of Main Theorem 2 uses mutli-dimensional
signal analysis. The difference of one dimension/multi-dimension is fundamental and
causes big changes of the approaches significantly.
We review some basic signal analysis in Subsection 2.2 below. The main results there
are Paley–Wiener’s theorem (Lemma 2.2) and a sampling theorem (Lemma 2.4) for functions in B(a1 , . . . , ak ), whose proofs are a simple generalization of (or a reduction to) the
corresponding theorems in one-variable case. They might give readers an impression that
multi-dimensional signal analysis is just a simple generalization of one-dimensional signal
analysis. This is far from being true. It is well-known in classical analysis community
(cf. [OU12]) that multi-dimensional signal analysis is inherently more difficult than onedimensional signal analysis. Some important theorems in one-dimensional case cannot be
generalized to higher dimension.
For explaining further, we need to recall the statement of Paley–Wiener’s theorem
(Lemma 2.2): A bounded continuous function f : Rk → R belongs to B(a1 , . . . , ak ) if and
only if it can be extended to a holomorphic function in Ck satisfying
√
√
f x1 + y1 −1, . . . , xk + yk −1 ≤ const · eπ(a1 |y1 |+···+ak |yk |) .
8
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Roughly speaking, band-limited functions are the same as holomorphic functions of exponential type. Therefore we can say that signal analysis is a part of complex analysis5. Then
it is easy to see why multi-dimensional case is more difficult than one-dimensional case:
Zero points of holomorphic functions in C are isolated, whereas zero points of holomorphic functions in Ck (k ≥ 2) form positive dimensional complex varieties whose geometry
are highly nontrivial in general. This causes a fundamental difference in the nature of
one-dimensional/multi-dimensional signal analysis.
More concretely speaking, we face difficulties of higher dimension in the following two
issues. (The second issue is more serious than the first one.)
(1) Interpolation: Sampling and interpolation are the most basic themes of signal
analysis. We recall a sampling theorem stated in Lemma 2.4 with a bit simplifidef
cation6: Let f ∈ B(1, . . . , 1) and 0 < c < 1. If f vanishes over Λ = cZk then f
is identically zero. This theorem is valid for all dimensions. The crucial point of
the statement is that we consider only regular sampling, which means that the
fundamental domain [0, c]k of the sampling set Λ = cZk is similar to the frequency
domain [−1/2, 1/2]k . It is also easy to prove the following regular interpolation
theorem: If c > 1 then the map
B(1, . . . , 1) → ℓ∞ (cZk ),
f 7→ (f (λ))λ∈cZk
is surjective.
When k = 1, Beurling [Beu89] proved that essentially the same results also hold
for irregular sampling/interpolation: Let Λ ⊂ R be a uniformly discrete set, i.e.
the infimum of |λ1 − λ2 | over distinct λ1 , λ2 ∈ Λ is positive. Suppose the lower
density
#(Λ ∩ [t, t + R])
lim inf inf
R→∞ t∈R
R
is larger than 1. Under this setting, Beurling proved that if f ∈ B(1) vanishes over
Λ then f is identically zero. Similarly, he also proved that if Λ ⊂ R is a uniformly
discrete set and its upper density
lim sup sup
R→∞
t∈R
#(Λ ∩ [t, t + R])
R
is smaller than 1, then the map
B(1) → ℓ∞ (Λ),
5Of
f 7→ (f (λ))λ∈Λ
course this is over-simplified. Signal analysis is a mutli-faceted discipline and cannot be classified
as a sub-area of complex analysis. For example, we emphasized its communication theory aspect in
Subsection 1.1. But the complex analysis viewpoint is convenient here.
6
Here we state a (seemingly) simpler version of the theorem for clarifying the argument, but indeed
this statement is equivalent to Lemma 2.4.
EMBEDDING PROBLEM OF Zk -ACTIONS
9
is surjective. Therefore only the lower/upper density of Λ determines its sampling/interpolation property.
When k ≥ 2, the situation is much more messy. We have no clear theorems
valid for irregular sampling and interpolation (see [OU12] for the details). For
example, consider
t2
t2
2
Λ1 =
ε t1 ,
t1 , t2 ∈ Z , Λ2 =
ε t1 , 2 t1 , t2 ∈ Z
(ε > 0).
ε
ε
Suppose ε is very small. The density of Λ1 is equal to 1/ε (very large) and the
density of Λ2 is equal to ε (very small). The function f (z1 , z2 ) = sin(πεz2 ) ∈
B(1, 1) vanishes over Λ1 but is not identically zero. Thus Λ1 is not a sampling set
for functions in B(1, 1) although its density is very large. Similarly, it is also easy
to prove that Λ2 is not an interpolation set for B(1, 1), namely the map
B(1, 1) → ℓ∞ (Λ2 ),
f 7→ (f (λ))λ∈Λ2
is not surjective, although its density is very small.
In the proof of Main Theorem 2 we need to construct interpolating functions
for some irregular sets Λ ⊂ Rk . The paper [GT] addressed the same problem (in
dimension one) by employing Beurling’s interpolation theorem mentioned above.
But this theorem is not valid in higher dimension.
(2) Zero points of band-limited maps f : Ck → Ck : One crucial ingredient of
the proof of Main Theorem 2 is the study of (isolated) zero points7 of some holomorphic maps f = (f1 , . . . , fk ) : Ck → Ck all of whose entries fi are band-limited
functions. We call such a map f a band-limited map. It becomes important to
know the growth of
(1.1)
{z ∈ Ck | z is an isolated zero point of f with |z| < R}
as R goes to infinity. If k = 1, then this is a very easy problem. It follows
from Jensen’s formula or Nevanlinna’s first main theorem ([Hay64, Section 1.3],
[NW14, Section 1.1]) that if f ∈ B(a) then
Z R
dr
#{z ∈ C| f (x) = 0, |z| < r} ≤ 2aR + constf .
r
1
In particular (1.1) grows at most linearly in R. Moreover if f ∈ B(a) has no zero
points, then it must be of the form
f (z) = eαz+β
for some constants α and β.
7A
point p ∈ Ck is a zero point of f : Ck → Ck if f (p) = 0. Notice that the domain and target of f
have the same dimension. Therefore generically zero points of f are expected to be isolated.
10
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
When k ≥ 2, the situation is radically different. First, we have no simple
description of f : Ck → Ck having no zero points. For example, the map of the
form
f (z1 , z2 ) = (eαz1 +β , f2 (z1 , z2 )),
(f2 (z1 , z2 ): arbitrary band-limited function),
have no zero points. Second (and more importantly), the set (1.1) may have arbitrarily fast growth. This inconvenient phenomena was first observed by Cornalba–
Shiffman [CS72] and known as the failure of the transcendental Bezout theorem.
Here we briefly review their construction (with minor modification). Let {αn }∞
n=1
2n
be an arbitrary sequence of positive integers (say, αn = 2 ). We choose a polynomial pn (w) (of one-variable) having αn zeros in |w| < 1. Let ϕ : R → R be a
(nonzero) rapidly decreasing function satisfying supp ϕ̂ ⊂ [−1/2, 1/2]. We choose
βn > 0 so that the function
def
gn (w) = βn ϕ(w)pn (w)
is bounded by 2−n over R. We define f = (f1 , f2 ) : C2 → C2 as follows:
f1 (z1 , z2 ) = sin(πz1 ),
f2 (z1 , z2 ) =
∞
X
n=1
gn (z2 )
sin π(z1 − n)
.
π(z1 − n)
Both f1 and f2 belong to B(1, 1). The map f has αn zero points of the form (n, w)
(|w| < 1). Therefore
#{z ∈ C2 | z is an isolated zero point of f and |z| < n + 1} ≥ αn .
As a conclusion, it is hard (and sometimes impossible) to control the set (1.1)
in higher dimension.
The above two issues show that general theory of multi-dimensional signal analysis is
not strong enough for the proof of Main Theorem 2. Thus we have to develop tailored
methods specific for the situation of the theorem. This becomes the main technical task
of the paper. We address the issues (1) and (2) in Sections 4 and 5 respectively. The
techniques developed there seem to have some independent interests, and possibly further
applications will be found in a future.
The key ideas are as follows. (Here we ignore many details for simplicity. The real
arguments are different.)
(1)’ Almost regular interpolation: As we mentioned above, we need to construct interpolation for some irregular sets Λ ⊂ Rk . But our sets Λ are not
completely general uniformly discrete sets. They are “almost” regular sets in the
sense that we have a decomposition
Λ=
∞
[
n=1
Λn
EMBEDDING PROBLEM OF Zk -ACTIONS
11
Figure 1.1. Almost regular interpolation set Λ. Different pieces Λm and
Λn are sufficiently far from each other.
such that each Λn is a part of a regular interpolation set and that the distances
between different pieces Λm and Λn are sufficiently large. See Figure 1.1. We
develop a technique of constructing interpolation for such almost regular sets. As
a conclusion, we can prove that they have (essentially) all the nice properties which
regular interpolation sets possess.
(2)’ Good/bad decomposition of the space: It is very difficult in general to
control the zero points of holomorphic maps f : Ck → Ck . The maps f used
in the proof of Main Theorem 2 are very special, but still we cannot control all
their (isolated) zero points. Therefore we simply give up to control all the zero
points of f . Instead we decompose the space Ck into two disjoint regions:
Ck = G ∪ B.
In the “good region”G, the zero points of f are very sparsely distributed and we
can control them as we like. In the “bad region” B, the zero points of f may have
extremely high density, but the region B itself is very tiny. See Figure 1.2. We
consider a Voronoi diagram with respect to the zero points of f . Then most of
the space Ck is cover by very large (and hence well organized) tiles whose Voronoi
centers are zero points in G. We don’t have any control of tiles whose centers
are located in B. They may have very complicated structure. But every messy
phenomena is confined in the tiny region B and does not affect much the whole
picture.
In Subsection 3.1 we state a key proposition (Proposition 3.1) and prove Main Theorem
2 assuming it. The rest of the paper is devoted to the proof of Proposition 3.1. The
strategy of the proof is explained in Subsection 3.2. It might be better for some readers
to go to Subsections 3.1 and 3.2 before reading Section 2.
12
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Figure 1.2. Schematic picture of the good/bad decomposition. Zero
points of f are sparsely and almost regularly distributed inside the good
region G. The bad region B may contain plenty of zero points but it is tiny.
1.5. Organization of the paper. In Section 2 we review mean dimension, band-limited
functions, simplicial complexes and convex sets. In Section 3 we state the main proposition
and prove Main Theorem 2 assuming it. In particular, we give an overview of the proof
of the main theorem. In Section 4 we construct interpolating functions. In Section 5 we
construct certain “tiling-like maps” and study their properties. In Section 6 we prove the
main proposition by using the results in Sections 2, 4 and 5. In Section 7 we explain some
open problems.
Acknowledgement. This paper was written when the third named author stayed in
the Einstein Institute of Mathematics in the Hebrew University of Jerusalem. He would
like to thank the institute for its hospitality.
2. Preliminaries
2.1. Review of mean dimension. Here we review the definition of mean dimension
[Gro99, LW00]. Throughout this paper we promise that every simplicial complex is finite
(i.e. it has only finitely many simplicies) and that for a natural number N
[N] = {0, 1, 2, . . . , N − 1}k .
Let (X, d) be a compact metric space and Y a topological space. Let ε be a positive number and f : X → Y a continuous map. f is said to be an ε-embedding if
diamf −1 (y) < ε for all y ∈ Y . We define the ε-width dimension Widimε (X, d) as the
minimum integer n such that there exist an n-dimensional simplicial complex P and an
ε-embedding f : X → P . This is a macroscopic dimension of X in the scale of ε. The
EMBEDDING PROBLEM OF Zk -ACTIONS
13
topological dimension dim X can be obtained by8
dim X = lim Widimε (X, d).
ε→0
k
Let (X, Z , T ) be a dynamical system, namely X is a compact metric space (with a
distance d) and T : Zk × X → X is a continuous action. For a finite subset Ω ⊂ Zk we
define a distance dΩ on X by
dΩ (x, y) = max d(T n x, T n y).
n∈Ω
It is easy to check the following subadditivity and invariance:
Widimε (X, dΩ1 ∪Ω2 ) ≤ Widimε (X, dΩ1 ) + Widimε (X, dΩ2 ),
Widimε (X, da+Ω ) = Widimε (X, dΩ ) (a ∈ Zk , a + Ω = {a + x| x ∈ Ω}).
Then by the standard division argument we can show the existence of the limit
Widimε X, d[N ]
lim
.
N →∞
Nk
We define the mean dimension of (X, Zk , T ) by
!
Widim
X,
d
ε
[N ]
.
mdim(X, Zk , T ) = lim lim
ε→0 N →∞
Nk
This is a topological invariant, namely it is independent of the choice of the distance d.
We usually abbreviate this to mdim(X).
2.2. Review of band-limited functions. Here we review some basic theorems on
band-limited functions. Throughout this subsection we assume that a1 , . . . , ak are pos√
itive numbers. We denote by z = x + y −1 the standard coordinate of Ck with
x = (x1 , . . . , xk ), y = (y1 , . . . , yk ) ∈ Rk .
Lemma 2.1. Let f : Ck → C be a holomorphic function such that there exists C > 0
√
satisfying f x + y −1 ≤ Ceπ(a1 |y1 |+···+ak |yk |) . Then it follows that
√
f x + y −1 ≤ ||f ||L∞ (Rk ) eπ(a1 |y1 |+···+ak |yk |) .
Proof. The paper [GT, Lemma 2.1] proves this for f : C → C. So we consider the
√
√
√
case of k > 1. Fix x + y −1 ∈ Ck . For s + t −1 ∈ C we set g s + t −1 =
√
f x + y s + t −1 . g is a holomorphic function satisfying
√
g s + t −1 ≤ Ceπ|t|(a1 |y1 |+···+ak |yk |) .
√
By the statement of the one variable case, g s + t −1 is bounded by
||g||L∞ (R) eπ|t|(a1 |y1 |+···+ak |yk |) ≤ ||f ||L∞ (Rk ) eπ|t|(a1 |y1 |+···+ak |yk |) .
8If
readers do not know the definition of topological dimension, then they may think that this is the
definition of topological dimension. Only one nontrivial point is that dim X is a topological invariant
whereas Widimε (X, d) depends on the distance d.
14
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Letting s = 0 and t = 1, we get the statement.
Lemma 2.2 (Paley–Wiener’s theorem). Let f : Rk → C be a bounded continuous function. Then the following two conditions are equivalent.
Q
(1) The Fourier transform fˆ is supported in k [−ai /2, ai /2].
i=1
(2) f can be extended to a holomorphic function in Ck such that there exists C > 0
√
satisfying f x + y −1 ≤ Ceπ(a1 |y1 |+···+ak |yk |) .
Proof. This is a special case of a distribution version of Paley–Wiener’s theorem ([Sch66,
Chapter 7, Section 8]). Here we prove it directly only by using the standard version of
Paley–Wiener’s theorem ([DM72, Section 3.3]): For a (one-variable) L2 -function f : R →
Q
C, the above two Conditions (1) and (2) are equivalent. Set Ω = ki=1 [−ai /2, ai /2].
First we assume that f : Rk → C is a L2 -function and prove (1) ⇔ (2). Suppose f
satisfies (1). Then
Z
Z
√
√
2π −1x·ξ
ˆ
f (x) =
f (ξ)e
dξ1 . . . dξk =
fˆ(ξ)e2π −1x·ξ dξ1 . . . dξk .
Rk
Ω
We extend f to a holomorphic function in Ck by
Z
√
√
√
f x + y −1 =
fˆ(ξ)e2π −1(x+y −1)·ξ dξ1 . . . dξk .
Ω
Then we can check Condition (2):
Z
√
f x + y −1 ≤
|fˆ(ξ)|e−2πy·ξ dξ1 . . . dξk ≤ const · eπ(a1 |y1 |+···+ak |yk |) .
Ω
Next suppose f satisfies (2). Fix ξ ∈ Rk and suppose |ξ1 | > a1 /2. We will show
fˆ(ξ) = 0. We fix x2 , . . . , xk and consider f (x1 , . . . , xk ) as a one-variable function of
variable x1 . This is a L2 -function (of variable x1 ) for almost every choice of (x2 , . . . , xk ).
√
It follows from f x1 + y1 −1, x2 , . . . , xk ≤ const · eπa1 |y1 | and the standard Paley–
Wiener’s theorem that
Z ∞
√
f (x1 , x2 , . . . , xk )e−2π −1x1 ξ1 dx1 = 0 for a.e. (x2 , . . . , xk ).
−∞
Therefore
Z
fˆ(ξ) =
Rk−1
Z
∞
−∞
√
−2π −1x1 ξ1
f (x1 , x2 , . . . , xk )e
dx1 e−2π
√
−1(x2 ξ2 +···+xk ξk )
dx2 . . . dxk = 0.
Thus the proof has been completed under the assumption f ∈ L2 .
Next we only assume that f : Rk → C is a bounded continuous function. We choose
a rapidly decreasing function ϕ : Rk → R such that maxx∈Rk |ϕ(x)| = ϕ(0) = 1 and
supp ϕ̂ ⊂ (−1/2, 1/2)k . We set ϕε (x) = ϕ(εx) for ε > 0. It satisfies ϕ̂ε (ξ) = ε−k ϕ̂(ξ/ε)
and hence supp ϕ̂ε ⊂ (−ε/2, ε/2)k . ϕε converges to 1 uniformly over every compact subset
EMBEDDING PROBLEM OF Zk -ACTIONS
15
of Rk as ε → 0. Since ϕε is rapidly decreasing (and hence in L2 ), we can extend it to a
holomorphic function satisfying
√
ϕε x + y −1 ≤ eπε(|y1 |+···+|yk |) (here we used Lemma 2.1).
(2.1)
We set fε (x) = ϕε (x)f (x). Then fε is a L2 -function and satisfies |fε (x)| ≤ |f (x)|.
Q
Suppose f satisfies (1). Then fˆε is supported in ki=1 [−(ai + ε)/2, (ai + ε)/2]. Thus by
the previous argument for L2 -functions and Lemma 2.1, we can extend fε to a holomorphic
function satisfying
√
fε x + y −1 ≤ ||fε ||L∞ (Rk ) eπ{(a1 +ε)|y1 |+···+(ak +ε)|yk |}
(2.2)
≤ ||f ||L∞ (Rk ) eπ{(a1 +ε)|y1 |+···+(ak +ε)|yk |} .
Then we can extend f to a meromorphic function in Ck by
√
√ fε x + y −1
√ .
f x + y −1 =
ϕε x + y −1
This is independent of ε > 0 because of the unique continuation. Since ϕε converges to
√
1 uniformly over every compact subset, f x + y −1 is actually a holomorphic function
(namely it does not have neither poles nor indeterminacy points). By taking the limit in
(2.2) we get
√
f x + y −1 ≤ ||f ||L∞ (Rk ) eπ(a1 |y1 |+···+ak |yk |) .
Next suppose f satisfies (2). By (2.1) and Lemma 2.1, we get (2.2) again. Since fε ∈ L2 ,
Q
the Fourier transform fˆε is supported in ki=1 [−(ai + ε)/2, (ai + ε)/2]. The functions fˆε
Q
converge to fˆ in the topology of distribution. Thus fˆ is supported in ki=1 [−ai /2, ai /2].
Corollary 2.3. The space B1 (a1 , . . . , ak ) of continuous functions f : Rk → [−1, 1] bandQ
limited in ki=1 [−ai /2, ai /2] is compact with respect to the topology of uniform convergence
over compact subsets of Rk .
Proof. Let {fn }∞
n=1 be a sequence in B1 (a1 , . . . , ak ). By Lemmas 2.1 and 2.2 the functions
fn can be holomorphically extended over Ck satisfying |fn (z)| ≤ eπ(a1 |y1 |+···+ak |yk |) . In
particular {fn } is bounded over every compact subset of Ck . By the Cauchy integration
formula, it becomes an equicontinuous family over every compact subset (i.e. normal
family). So we can choose a converging subsequence by the Arzela–Ascoli theorem.
Lemma 2.4 (Sampling theorem). Let f : Rk → R be a bounded continuous function
Q
band-limited in ki=1 [−ai /2, ai /2]. Suppose that there exist positive numbers b1 , . . . , bk
such that ai bi < 1 for all 1 ≤ i ≤ k and that f vanishes over
{(b1 n1 , . . . , bk nk )| n1, . . . , nk ∈ Z}.
Then f is identically zero.
16
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Proof. As in the proof of Lemma 2.2, it is enough to prove the statement under the assumption that f is a L2 -function. Then the proof is standard as follows. Set g(x1 , . . . , xk ) =
f (b1 x1 , . . . , bk xk ). This vanishes on Zk .
1
ξk
ξ1
ˆ
ĝ(ξ) =
,...,
.
f
b1 . . . bk
b1
bk
Then ĝ is supported in
k
k
Y
ai bi ai bi
1 1
−
⊂ − ,
,
.
2
2
2
2
i=1
Consider the Fourier series of ĝ(ξ) for ξ ∈ (−1/2, 1/2)k :
X
√
ĝ(ξ) =
an e−2π −1n·ξ .
n∈Zk
The coefficients an are given by
Z
√
an =
e2π −1n·ξ ĝ(ξ)dξ1 . . . dξk = F (F (g)) (n) = g(n) = 0.
[−1/2,1/2]k
Thus ĝ = 0. This implies g = 0 and f = 0.
2.3. Technical results on simplicial complexes. The results of this subsection are
used only in Section 6. So readers can postpone reading this subsection until they come
to Section 6. Recall that we promised that every simplicial complex is finite. (This is
mainly for the simplicity of the exposition.) Let P be a simplicial complex. A map
f : P → Rn is said to be simplicial if it has the form
!
!
m
m
m
X
X
X
f
λk vk =
λk f (vk ),
λk ≥ 0,
λk = 1 ,
k=0
k=0
k=0
on every simplex ∆ ⊂ P , where v0 , . . . , vm are the vertices of ∆. We define ||x||∞ =
max1≤i≤n |xi | for x = (x1 , . . . , xn ) ∈ Rn .
Lemma 2.5 (Approximation lemma). Let ε and δ be positive numbers. Let (X, d) be a
compact metric space and P a simplicial complex. Let π : X → P be an ε-embedding and
f : X → Rn a continuous map satisfying
d(x, y) < ε =⇒ ||f (x) − f (y)||∞ < δ.
Then, after taking a sufficiently fine subdivision of P , we can find a simplicial map g :
P → Rn satisfying
||f (x) − g(π(x))||∞ < δ (∀x ∈ X).
Proof. We reproduce the proofs in [GLT16, GT] for the completeness. By subdividing P
we can assume that for every vertex v ∈ P the diameter of π −1 (O(v)) is smaller than ε,
where O(v) is the open star of v, i.e. the union of the relative interiors of all simplices
containing v. For each vertex v ∈ P we choose g(v) ∈ f (π −1 (O(v))). (If this is empty,
EMBEDDING PROBLEM OF Zk -ACTIONS
17
then we choose arbitrary g(v).) We linearly extend g all over P . Take x ∈ X and let
∆ ⊂ P be the simplex containing π(x) in its relative interior. Every vertex v ∈ ∆ satisfies
π(x) ∈ O(v) and hence ||f (x) − g(v)||∞ < δ because the diameter of f (π −1 (O(v))) (which
contains both f (x) and g(v)) is smaller than δ. g(π(x)) is a convex combination of such
g(v). Hence ||f (x) − g(π(x))||∞ < δ.
Let P be a simplicial complex. We denote by V the set of all vertices of P . The
set Hom(P, Rn ) of simplicial maps f : P → Rn can be identified with (Rn )V , which is
endowed with the natural topology.
Lemma 2.6 (Embedding lemma).
(1) If dim P < n/2 then the set of simplicial embeddings (i.e. injective simplicial maps) f : P → Rn is an open dense subset of
Hom(P, Rn ).
(2) Let U be the set of simplicial maps f : P → Rn such that, for every subcomplex
Q ⊂ P and every subset A ⊂ {1, 2, . . . , n} with #A > 2 dim Q, the map
Q → RA ,
x 7→ f (x)|A
is an embedding. Then U is open and dense in Hom(P, Rn ).
Proof. The statement (2) follows from (1) because the natural map (restriction)
Hom(P, Rn ) → Hom(Q, RA )
is an open map and thus the preimage of an open and dense set under this map is also open
and dense. (Notice that it corresponds to the natural projection (Rn )V (P ) → (RA )V (Q)
where V (P ) and V (Q) are the sets of vertices of P and Q.) Thus it is enough to prove (1).
First we show that simplicial embeddings f : P → Rn form an open set. Let f : P → Rn
be a simplicial embedding. We would like to show that “injectiveness” is preserved under
a small perturbation of f .
• Let ∆ ⊂ P be a simplex with the vertices v0 , . . . , vm . Then f |∆ : ∆ → Rn is an
injection, which means that f (v0 ), . . . , f (vm ) are affinely independent. If g : P →
Rn is sufficiently close to f then g(v0), . . . , g(vm ) are also affinely independent.
• Let ∆1 , ∆2 ⊂ P be two disjoint simplices. Then the distance between f (∆1 ) and
f (∆2 ) is positive. This condition is certainly preserved under a small perturbation.
• Let ∆1 , ∆2 ⊂ P be two simplices which share a nonempty simplex ∆1 ∩ ∆2 . We
assume ∆1 6= ∆1 ∩ ∆2 and ∆2 6= ∆1 ∩ ∆2 . Consider V (∆1 ) \ V (∆1 ∩ ∆2 ) and
V (∆2 ) \ V (∆1 ∩ ∆2 ), and denote their convex hulls by ∆′1 and ∆′2 respectively.
Fix v ∈ V (∆1 ∩ ∆2 ). The map f |∆1 ∪∆2 : ∆1 ∪ ∆2 → Rn is injective, which means
the positivity of
−→) and f (−
−→)| w ∈ ∆′ , w ∈ ∆′ } .
min {Angle between the vectors f (−
vw
vw
1
2
1
2
1
2
This condition is preserved under a small perturbation.
18
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
The above proves that sufficiently small perturbations of f are also injective.
Next we prove that simplicial embeddings f : P → Rn form a dense set. Let f : P → Rn
be an arbitrary simplicial map and U ⊂ Hom(P, Rn ) an open neighborhood of f . By
simple linear algebra we can choose g ∈ U such that for any subset {v1 , . . . , vm } ⊂ V (P )
with m ≤ n + 1 the points g(v1 ), . . . , g(vm ) are affinely independent. As 2 dim P + 1 ≤ n,
g|∆1∪∆2 is an embedding for any two simplices ∆1 , ∆2 ⊂ P and thus g is an embedding.
How to use Lemmas 2.5 and 2.6: We would like to illustrate the above two lemmas by
a simple application. (This is a prototype of the later argument but logically independent
of the proof of the main theorems. So experienced readers can skip it.) Let (X, d) be a
compact metric space. We prove a classical result in the dimension theory: If dim X < n/2
then X can be topologically embedded into Rn . The set of all embeddings f : X → Rn is
equal to
∞
\
(2.3)
{f : X → Rn | (1/m)-embedding}.
m=1
So it is a Gδ -subset of the space of all continuous maps f : X → Rn since “(1/m)embedding” is an open condition. Fix a natural number m and a positive number δ. Let
f : X → Rn be an arbitrary continuous map. Choose 0 < ε < 1/m so that
d(x, y) < ε =⇒ ||f (x) − f (y)||∞ < δ.
By dim X = limε→0 Widimε (X, d), we can find a simplicial complex P of dim P ≤ dim X <
n/2 and an ε-embedding π : X → P . By Lemma 2.5 there exists a simplicial map
g : P → Rn satisfying ||f (x) − g(π(x))||∞ < δ for all x ∈ X. By dim P < n/2 and Lemma
2.6 (1) we can find a simplicial embedding h : P → Rn satisfying ||g(p) − h(p)||∞ < δ for
all p ∈ P . Then the map h ◦ π : X → Rn is an ε-embedding (and hence (1/m)-embedding
by ε < 1/m) and satisfies ||f (x) − h ◦ π(x)||∞ < 2δ for all x ∈ X. Since δ is arbitrary, this
shows that
{f : X → Rn | (1/m)-embedding}
is dense in the space of all continuous maps from X to Rn . Thus, by the Baire Category
Theorem, the set (2.3) is dense Gδ . In particular there exists a topological embedding of
X into Rn .
2.4. A lemma on convex sets. The result of this subsection is used only in Section 6.
Let r > 0 and W ⊂ Rk . We define ∂r W as the set of all t ∈ Rk such that the closed
r-ball Br (t) around t have non-empty intersections both with W and Rk \ W . We set
Intr W = W \ ∂r W .
Lemma 2.7. For any c > 1 and r > 0 there exists R > 0 such that if a bounded closed
convex subset W ⊂ Rk satisfies IntR W 6= ∅ then
|W ∪ ∂r W | < c |Intr W | .
EMBEDDING PROBLEM OF Zk -ACTIONS
19
Here | · | denotes the k-dimensional volume (Lebesgue measure).
Proof. We can assume 0 ∈ IntR W . For a > 0 we set aW = {at| t ∈ W }.
Claim 2.8. ∂r W ⊂ 1 + Rr W .
Proof. Take u ∈ Rk outside of 1 + Rr W . There exists a hyperplane H = {a1 x1 + · · · +
ak xk = 1} ⊂ Rk separating u and 1 + Rr W . Namely
r
u ∈ {a1 x1 + · · · + ak xk > 1},
1+
W ⊂ {a1 x1 + · · · + ak xk < 1}.
R
Then
W ⊂
r −1
a1 x1 + · · · + ak xk < 1 +
.
R
It follows that the distance between u and W is greater than the distance between H and
−1
−1
H. Let h be the distance between 1 + Rr
H and the origin. h > R since
1 + Rr
r −1
0 ∈ IntR W . Then the distance between H and 1 + R
H is
1+
rh
r
h−h=
> r.
R
R
This implies that u does not belong to ∂r W .
Claim 2.9. ∂r W ∩ 1 − Rr W = ∅ and hence Intr W ⊃ 1 − Rr W .
Proof. Almost the same argument shows that if we take a point u outside of W then
the distance between u and 1 − Rr W is greater than r. This implies that every point
v ∈ 1 − Rr W satisfies Br (v) ⊂ W and hence does not belong to ∂r W .
It follows from these two claims that
r k
r
W = 1+
|W ∪ ∂r W | ≤ 1 +
|W |,
R
R
r
r k
|Intr W | ≥ 1 −
W = 1−
|W |.
R
R
Thus
|W ∪ ∂r W | ≤
1+
1−
r k
R
r
R
|Intr W | .
Since c > 1, if r/R is sufficiently small then the right-hand side is smaller than c |Intr W |.
3. Main proposition
3.1. Statement of the main proposition. Main Theorem 2 in Subsection 1.3 follows
from the next proposition whose proof occupies the rest of the paper.
20
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Proposition 3.1 (Main Proposition). Let a1 , . . . , ak and δ be positive numbers. Let
(X, Zk , T ) be a dynamical system and d a distance on X. Let f : X → B1 (a1 , . . . , ak ) be
a Zk -equivariant continuous map. If X has the marker property and satisfies
mdim(X) <
a1 . . . ak
2
then there exists a Zk -equivariant continuous map g : X → B1 (a1 + δ, . . . , ak + δ) such
that
• ||f (x) − g(x)||L∞ (Rk ) < δ for all x ∈ X.
• g is a δ-embedding with respect to the distance d.
It is important to note that the map g takes values in B1 (a1 + δ, . . . , ak + δ) which is
slightly larger than the target B1 (a1 , . . . , ak ) of the original map f . Here we prove that
Proposition 3.1 implies Main Theorem 2.
Proof of Main Theorem 2, assuming Proposition 3.1. The proof is very close to the standard proof of the Baire Category Theorem. We assume diam(X, d) < 1 by rescaling the
distance (just for simplicity of the notation). For 1 ≤ i ≤ k we choose sequences {ain }∞
n=1
such that
0 < ai1 < ai2 < ai3 < · · · < ai ,
mdim(X) <
a1n a2n . . . akn
2
(∀n ≥ 1).
For n ≥ 1 we inductively define a positive number δn and a Zk -equivariant (1/n)embedding (with respect to d) fn : X → B1 (a1n , . . . , akn ). First we set
δ1 = 1,
f1 (x) = 0 (∀x ∈ X).
Notice that f1 is a 1-embedding because diam(X, d) < 1. Suppose we have defined δn
and fn . Since fn is a (1/n)-embedding, we can choose 0 < δn+1 < δn /2 such that if a
Zk -equivariant continuous map g : X → B1 (a1 , . . . , ak ) satisfies
sup ||fn (x) − g(x)||L∞ (Rk ) ≤ δn+1
x∈X
then g is also a (1/n)-embedding. By applying Proposition 3.1 to fn , we can find a
Zk -equivariant continuous map fn+1 : X → B1 (a1,n+1 , . . . , ak,n+1) such that
• supx∈X ||fn (x) − fn+1 (x)||L∞ (Rk ) < δn+1 /2.
1
-embedding with respect to d.
• fn+1 is a n+1
EMBEDDING PROBLEM OF Zk -ACTIONS
For n > m ≥ 1
sup ||fn (x) − fm (x)||L∞ (Rk ) ≤
x∈X
<
<
n−1
X
l=m
21
sup ||fl (x) − fl+1 (x)||L∞ (Rk )
x∈X
n−1
X
δl+1
l=m
∞
X
l=1
2
2−l δm+1 = δm+1 → 0 (m → ∞).
Here we used δl+1 < δl /2. By taking a limit, we find a Zk -equivariant continuous map
f : X → B1 (a1 , . . . , ak ) satisfying
sup ||f (x) − fn (x)||L∞ (Rk ) ≤ δn+1
x∈X
for all n ≥ 1. It follows from the definition of δn+1 that f is a (1/n)-embedding. Since n
is arbitrary, f is an embedding.
The above proof used a flexibility exhibited by band-limited signals and not by discrete
signals. At each step of the induction, the target B1 (a1,n+1 , . . . , ak,n+1) of the map fn+1
is slightly bigger than the previous target B1 (a1n , . . . , akn ). The differences ai,n+1 − ain
converge to zero as n goes to infinity. Such an argument is possible because a1 , . . . , ak
Zk
are continuous parameters. We cannot apply the same argument to [0, 1]D
because
it depends on a discrete parameter D.
3.2. Strategy of the proof. Most known theorems about embedding (e.g. the Whitney
embedding theorem for manifolds) are proved by perturbation. The proof of Proposition
3.1 also uses this idea but with a twist. The map g in the statement of Proposition 3.1
will have the form
g(x) = g1 (x) + g2 (x), (x ∈ X).
The first term g1 (x) is a band-limited function in B1 (a1 , . . . , ak ), which is constructed by
perturbing the function f (x) ∈ B1 (a1 , . . . , ak ). The second term g2 (x) is also a bandlimited function whose frequencies are restricted in a compact subset of
Y
k h
k
Y
ai ai i
ai + δ ai + δ
− ,
\
.
,
−
2
2
2
2
i=1
i=1
The construction of g2 (x) is (essentially) independent of f (x). The function g2 (x) encodes
how to perturb f (x). In other words, the function g1 (x) is constructed by perturbing
the function f (x), and the perturbation method is determined by the function g2 (x).
Probably this explanation is not very clear. So let us try a more naive explanation.
Consider cooking. Each point x ∈ X is a cook. The function f (x) is an ingredient of
cooking (e.g. a raw salmon) that the cook x chooses. The function g2 (x) is a cookware
(e.g. kitchen knife and oven) that the cook x possesses. The function g1 (x) is the result
22
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
of cooking (e.g. grilled salmon). The grilled salmon g1 (x) is made from the raw salmon
f (x) by using the knife and oven g2 (x). The knife and oven g2 (x) are independent of the
raw salmon f (x).
The Fourier transforms F (g1 (x)) and F (g2 (x)) have disjoint supports. Hence if we
have the equation g(x) = g(y) for some x and y in X, then it follows that
g1 (x) = g1 (y),
g2 (x) = g2 (y).
We would like to deduce d(x, y) < δ from these equations. In other words we try to
determine who is the cook (up to some small error) by knowing the result of cooking
(g1 (x) = g1 (y)) and what cookware was used (g2 (x) = g2 (y)).
More precisely, the proof goes as follows. Take x ∈ X. The function f (x) is defined
over Rk . It is difficult to control functions over unbounded domains. So we introduce a
tiling (indexed by Zk )
[
Rk =
W (x, n),
n∈Zk
such that
(1) Each tile W (x, n) is a bounded convex set, and different tiles W (x, n) and W (x, m)
are disjoint except for their boundaries.
(2) W (x, n) depends continuously on x ∈ X in the Hausdorff topology.
(3) The tiles are equivariant in the sense that
W (T n x, m) = −n + W (x, n + m) = {−n + t| t ∈ W (x, n + m)}.
(4) “Most” part of the space Rk is covered by “sufficiently large” tiles.
We try to perturb the function f (x) over each tile W (x, n). We can construct a good
perturbation over sufficiently large tiles. So if every tile is sufficiently large, then we
can construct a good perturbation of f (x) over the whole space Rk . Unfortunately some
tiles may be small in general. We cannot construct a good perturbation over such tiny
tiles. Condition (4) helps us here. We will construct a “social welfare system” of the
tiles W (x, n). (This idea was first introduced in [GT].) Large tiles help small tiles and
bear “additional” perturbations which are originally “duties” of small tiles. By using this
social welfare system we construct the perturbation g1 (x) of the function f (x).
The map g1 will have the following property: If x and y in X satisfy g1 (x) = g1 (y) and
(3.1)
∀n ∈ Zk :
W (x, n) = W (y, n)
then it follows that d(x, y) < δ. Namely if we know g1 (x) and the tiling {W (x, n)} then
we can recover the point x up to error δ. So the next problem is how to encode the
information of the tiles. The function g2 (x) is introduced for solving this problem. We
encode all the information of the tiles W (x, n) to a band-limited function g2 (x). (Indeed
the real argument below goes in a reverse way. First we construct the function g2 (x), and
then the tiles W (x, n) are constructed from g2 (x). So g2 (x) knows everything about the
EMBEDDING PROBLEM OF Zk -ACTIONS
23
tiles W (x, n).) In particular the equation g2 (x) = g2 (y) implies (3.1). As a conclusion,
the function g(x) = g1 (x) + g2 (x) satisfies the requirements of Proposition 3.1. This is
the outline of the proof.
We would like to emphasize that the most important new idea introduced in this paper
is the technique to encode the information of the tiling {W (x, n)} into the band-limited
function g2 (x). This idea is new even in the one dimensional case. This is the main reason
why Main Theorems 1 and 2 have some novelty even in the case of k = 1.
Section 4 introduces interpolating functions which will be used in the perturbation
process. In Section 5 we construct the tiling W (x, n) and their social welfare system and
explain how to encode them into a band-limited function. The proof of Proposition 3.1
is finished in Section 6.
3.3. Fixing some notations. The proof of Proposition 3.1 is notationally messy. So
here we gather some of the notations for the convenience of readers. Throughout the rest
of the paper (except for Section 7 where we discuss open problems) we fix the following.
• a1 , . . . , ak and δ are positive numbers. We additionally assume
(3.2)
δ < min(1, a1 , . . . , ak ).
• (X, Zk , T ) is a dynamical system satisfying the marker property and
a1 . . . ak
.
mdim(X) <
2
• We fix positive rational numbers ρ1 , . . . , ρk satisfying
ρ1 . . . ρk
(3.3)
ρi < ai (∀1 ≤ i ≤ k), mdim(X) <
.
2
• We define a lattice Γ ⊂ Rk by
t1
tk
(3.4)
Γ=
t1 , . . . , tk ∈ Z .
,...,
ρ1
ρk
(3.5)
Moreover we define Γ1 ⊂ Rk by
[
Γ1 =
(n + Γ),
n∈Zk
(n + Γ = {n + γ| γ ∈ Γ}).
Since ρi are rational numbers, Γ1 is also a lattice.
4. Interpolating functions
Recall that we fixed positive numbers a1 , . . . , ak , positive rational numbers ρ1 , . . . , ρk
with ρi < ai and lattices Γ ⊂ Γ1 ⊂ Rk in Subsection 3.3. We fix a positive number τ
satisfying
(4.1)
∀1 ≤ i ≤ k :
ρi + τ < ai .
24
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
For r > 0 and a ∈ Rk we denote by Br (a) the closed r-ball around a, and we set
Br = Br (0). We choose a rapidly decreasing function χ0 : Rk → R satisfying χ0 (0) = 1
and supp F (χ0 ) ⊂ Bτ /2 .
Notation 4.1.
(1) We set
(4.2)
K0 = sup
X
t∈Rk λ∈Γ
1
|χ0 (t − λ)|.
This is finite because χ0 is rapidly decreasing and Γ1 is a lattice.
(2) We fix r0 > 0 satisfying
X
1
|χ0 (λ)| < .
(4.3)
2
λ∈Γ1 \Br0
Definition 4.2.
(1) A subset Λ ⊂ Γ1 is called an admissible set if any two points
λ1 , λ2 ∈ Λ satisfy at least one of the following two conditions:
• λ1 − λ2 ∈ Γ.
• |λ1 − λ2 | > r0 .
This notion is an elaborated formulation of “almost regular interpolation set”
introduced in Subsection 1.4. We denote by Ads the set of all admissible sets
Λ ⊂ Γ1 .
(2) A function p : Γ1 → [0, 1] is called an admissible function if the set
{λ ∈ Γ1 | p(λ) > 0}
is an admissible set. We denote by Adf the set of all admissible functions.
We define the function sinc : R → R by
sinc(t) =
sin(πt)
,
πt
sinc(0) = 1.
This is one of the most famous functions in signal analysis. The function sinc(t) vanishes
on Z \ {0} and its Fourier transform is supported in [−1/2, 1/2]. It satisfies |sinc(t)| ≤ 1
for all t ∈ R.
Let Λ ⊂ Γ1 be an admissible set. We denote by ℓ∞ (Λ) the Banach space of all bounded
functions u : Λ → R endowed with the supremum norm ||·||∞ . For u ∈ ℓ∞ (Λ) we define a
band-limited function ϕΛ (u) ∈ B(ρ1 + τ, . . . , ρk + τ ) by
ϕΛ (u)(t) =
X
λ=(λ1 ,...,λk )∈Λ
u(λ)χ0 (t − λ)
k
Y
i=1
sinc (ρi (ti − λi )) ,
(t = (t1 , . . . , tk ) ∈ Rk ).
Here ρi are rational numbers introduced in Subsection 3.3. It follows from the definition
of K0 that
||ϕΛ (u)||L∞ (Rk ) ≤ K0 ||u||∞ .
EMBEDDING PROBLEM OF Zk -ACTIONS
25
Since we promised ρi + τ < ai in (4.1), the function ϕΛ (u) belongs to B(a1 , . . . , ak ). We
define a bounded linear operator SΛ : ℓ∞ (Λ) → ℓ∞ (Λ) by
SΛ (u) = ϕΛ (u)|Λ = (ϕΛ (u)(λ))λ∈Λ .
Remark 4.3. When Λ is the empty set, we define ℓ∞ (Λ) to be the trivial vector space
consisting only of zero and ϕΛ (0) = 0, the operator SΛ the identity operator of the trivial
vector space.
Lemma 4.4. ||SΛ − id|| ≤ 1/2, where the left-hand side is the operator norm of SΛ − id.
Proof. For λ = (λ1 , . . . , λk ) ∈ Λ the function
χ0 (t − λ)
k
Y
i=1
sinc (ρi (ti − λi ))
vanishes on (λ + Γ) \ {λ} and its value at t = λ is 1. Then by the admissibility of Λ
ϕΛ (u)(λ) − u(λ) =
X
′
λ′ ∈Λ\Br0 (λ)
By the choice of r0 in (4.3),
|ϕΛ (u)(λ) − u(λ)| ≤
′
u(λ )χ0 (λ − λ)
X
λ′ ∈Λ\Br0 (λ)
k
Y
i=1
sinc (ρi (λ′i − λi )) .
|χ0 (λ′ − λ)| ||u||∞ ≤
1
||u||∞ .
2
Therefore the operator SΛ has the inverse
SΛ−1
=
∞
X
n=0
(id − SΛ )n with SΛ−1 ≤ 2.
For u ∈ ℓ∞ (Λ) we define a band-limited function ψΛ (u) ∈ B(a1 , . . . , ak ) by
ψΛ (u) = ϕΛ (SΛ−1 (u)).
This function satisfies
ψΛ (u)(λ) = u(λ) (∀λ ∈ Λ),
||ψΛ (u)||L∞ (Rk ) ≤ 2K0 ||u||∞ .
The former property means that ψΛ (u) interpolates the sequence u. The construction
of ψΛ (u) is “Zk -equivariant”: For n ∈ Zk and u ∈ ℓ∞ (Λ) we define v ∈ ℓ∞ (n + Λ) by
v(n + λ) = u(λ). Then
ψn+Λ (v)(t + n) = ψΛ (u)(t).
If Λ is the empty set, then ψΛ (0) = 0.
We denote by B1 (ℓ∞ (Λ)) the closed unit ball of ℓ∞ (Λ) around the origin with respect
to the supremum norm. The function ψΛ (u) depends continuously on Λ and u as follows:
26
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Lemma 4.5 (Continuity of the construction of ψΛ (u)). For any r > 0 and ε > 0 there
exist r ′ > 0 and ε′ > 0 so that if Λ1 , Λ2 ∈ Ads, u1 ∈ B1 (ℓ∞ (Λ1 )) and u2 ∈ B1 (ℓ∞ (Λ2 ))
satisfy
(4.4)
Λ1 ∩ Br′ = Λ2 ∩ Br′ ,
then for all t ∈ Br
|u1 (λ) − u2 (λ)| < ε′
(∀λ ∈ Λ1 ∩ Br′ )
|ψΛ1 (u1 )(t) − ψΛ2 (u2 )(t)| < ε.
Proof. By the linearity of ϕΛ ,
ψΛ (u) =
ϕΛ (SΛ−1 (u))
=
∞
X
n=0
By Lemma 4.4
ϕΛ ((id − SΛ )n u) .
||ϕΛ ((id − SΛ )n u)||L∞ (Rk ) ≤ K0 ||(id − SΛ )n u||∞ ≤
K0
||u||∞ .
2n
Therefore the statement follows from the next claim.
Claim 4.6.
(1) For any r > 0 and ε > 0 there exist r ′ > 0 and ε′ > 0 so that if
Λ1 , Λ2 ∈ Ads, u1 ∈ B1 (ℓ∞ (Λ1 )) and u2 ∈ B1 (ℓ∞ (Λ2 )) satisfy (4.4) then for all
t ∈ Br
|ϕΛ1 (u1 )(t) − ϕΛ2 (u2 )(t)| < ε.
(2) For any r > 0, ε > 0 and a natural number n there exist r ′ > r and ε′ > 0 so that
if Λ1 , Λ2 ∈ Ads, u1 ∈ B1 (ℓ∞ (Λ1 )) and u2 ∈ B1 (ℓ∞ (Λ2 )) satisfy (4.4) then for all
λ ∈ Λ1 ∩ Br
|(id − SΛ1 )n (u1 )(λ) − (id − SΛ2 )n (u2 )(λ)| < ε.
Proof. (1) We choose r ′ > r so large that for all t ∈ Br
X
ε
|χ0 (t − λ)| < .
4
λ∈Γ1 \Br ′
Then Condition (4.4) implies that for t ∈ Br
X
ε
|ϕΛ1 (u1 )(t) − ϕΛ2 (u2 )(t)| < +
|u1(λ) − u2 (λ)| · |χ0 (t − λ)|
2
λ∈Λ1 ∩Br ′
X
ε
≤ + ε′
|χ0 (t − λ)|.
2
λ∈Γ1 ∩Br ′
We can choose ε′ > 0 so small that the right-hand side is smaller than ε.
(2) The statement can be reduced to the case of n = 1 by induction. The case of n = 1
immediately follows from the statement (1).
EMBEDDING PROBLEM OF Zk -ACTIONS
27
ψΛ (u) is a nice interpolating function. But we need one more twist. We naturally
identify the set {0, 1}Γ1 with the set of all subsets of Γ1 . Namely, Λ ⊂ Γ1 is identified with
the characteristic function 1Λ ∈ {0, 1}Γ1 . Then in particular Ads (the set of admissible
sets) is a Borel subset of {0, 1}Γ1 . Let p : Γ1 → [0, 1] be an admissible function, namely
{λ ∈ Γ1 | p(λ) > 0} belongs to Ads. We define a probability measure µp on {0, 1}Γ1 by
Y
((1 − p(λ)) δ0 + p(λ)δ1 ) ,
µp =
λ∈Γ1
where δ0 and δ1 are the delta probability measures at 0 and 1 on {0, 1} respectively. Since
p is admissible, the set Ads has full measure: µp (Ads) = 1.
Let ℓ∞ (Γ1 ) be the Banach space of bound functions u : Γ1 → R. For u ∈ ℓ∞ (Γ1 ) we
define a band-limited function Ψ(p, u) ∈ B(a1 , . . . , ak ) by
Z
(4.5)
Ψ(p, u) =
ψΛ (u|Λ ) dµp(Λ).
Λ∈Ads
This function is the main product of this section.
Lemma 4.7 (Basic properties of Ψ). Ψ satisfies:
(1) Interpolation: If λ ∈ Γ1 satisfies p(λ) = 1 then Ψ(p, u)(λ) = u(λ).
(2) Boundedness: ||Ψ(p, u)||L∞ (Rk ) ≤ 2K0 ||u||∞ .
(3) Equivariance: For n ∈ Zk we define q ∈ Adf and v ∈ ℓ∞ (Γ1 ) by q(λ+n) = p(λ)
and v(λ + n) = u(λ) for λ ∈ Γ1 . Then Ψ(q, v)(t + n) = Ψ(p, u)(t).
Proof. These three properties immediately follow from the corresponding properties of
ψΛ (u).
We would like to show that the map Ψ depends continuously on p and u (Proposition
4.9 below). But we need a preparation before that. For r > 0 and p ∈ Adf we define
probability measures µp,r and νp,r on {0, 1}Γ1 ∩Br and {0, 1}Γ1 \Br respectively by
Y
Y
((1 − p(λ)) δ0 + p(λ)δ1 ) .
((1 − p(λ)) δ0 + p(λ)δ1 ) , νp,r =
µp,r =
λ∈Γ1 ∩Br
λ∈Γ1 \Br
It follows µp = µp,r ⊗ νp,r .
Lemma 4.8 (Truncation of the integral). For any r > 0 and ε > 0 if we choose r ′ > 0
sufficiently large then for any p ∈ Adf, u ∈ B1 (ℓ∞ (Γ1 )) and t ∈ Br
Z
(4.6)
Ψ(p, u)(t) −
ψΛ (u|Λ )(t) dµp,r′ (Λ) < ε.
Λ∈Ads∩{0,1}Γ1 ∩Br ′
Proof. For an admissible set Λ1 ⊂ Γ1 ∩ Br′ we define Ads(Λ1 , r ′) ⊂ Ads as the set of
Λ2 ⊂ Γ1 \ Br′ satisfying Λ1 ∪ Λ2 ∈ Ads. If µp,r′ ({Λ1 }) > 0 then Ads(Λ1 , r ′) has full
measure with respect to νp,r′ because µp (Ads) = 1.
28
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
By µp = µp,r′ ⊗ νp,r′
Ψ(p, u) =
Z
Λ1 ∈Ads∩{0,1}Γ1 ∩Br ′
Z
Λ2 ∈Ads(Λ1 ,r ′ )
ψΛ1 ∪Λ2 (u|Λ1∪Λ2 ) dνp,r′ (Λ2 )
dµp,r′ (Λ1 ).
If r ′ is sufficiently large, then it follows from Lemma 4.5 that
|ψΛ1 ∪Λ2 (u|Λ1∪Λ2 ) − ψΛ1 (u|Λ1 )| < ε on Br .
Then (4.6) follows.
Proposition 4.9 (Continuity of Ψ). For any r > 0 and ε > 0 there exist r ′ > 0 and
ε′ > 0 so that if p, q ∈ Adf and u, v ∈ B1 (ℓ∞ (Γ1 )) satisfy
∀λ ∈ Γ1 ∩ Br′ :
(4.7)
|p(λ) − q(λ)| < ε′ ,
|u(λ) − v(λ)| < ε′
then for all t ∈ Br
|Ψ(p, u)(t) − Ψ(q, v)(t)| < ε.
Proof. From Lemma 4.8 it is enough to show that if Condition (4.7) holds for sufficiently
large r ′ > 0 and sufficiently small ε′ > 0 then for all t ∈ Br
Z
Λ∈Ads∩{0,1}Γ1 ∩Br ′
ψΛ (u|Λ )(t) dµ
The left-hand side is bounded by
Z
p,r ′
Λ∈Ads∩{0,1}Γ1 ∩Br ′
+
Z
(Λ) −
Z
Λ∈Ads∩{0,1}Γ1 ∩Br ′
ψΛ (v|Λ )(t) dµq,r′ (Λ) < ε.
|ψΛ (u|Λ )(t) − ψΛ (v|Λ )(t)| dµp,r′ (Λ)
Λ∈Ads∩{0,1}Γ1 ∩Br ′
|ψΛ (v|Λ )(t)| d|µp,r′ − µq,r′ |(Λ).
The first term can be made arbitrarily small by Lemma 4.5. The second term is bounded
by
Z
2K0
d|µp,r′ − µq,r′ |.
{0,1}Γ1 ∩Br ′
The integral here is the total variation of the signed measure µp,r′ − µq,r′ , which is equal
to the sum
X
|µp,r′ ({Λ}) − µq,r′ ({Λ})| .
Λ∈{0,1}Γ1 ∩Br ′
This can be made arbitrarily small by choosing ε′ > 0 in (4.7) sufficiently small.
EMBEDDING PROBLEM OF Zk -ACTIONS
29
5. Dynamical construction of tiling-like band-limited maps
This section is the longest section of the paper. As we described in Subsection 3.2, the
S
proof of Proposition 3.1 uses a tiling Rk = n∈Zk W (x, n) and a social welfare system
among tiles, which should be encoded into a certain band-limited function g2 (x). The
purpose of this section is to construct these ingredients. The following diagram outlines
the construction.
A point x in a dynamical system (X, Zk , T ) satisfying the marker property.
y
S
A tiling Rk = n∈Zk W0 (x, n).
y
A tiling-like band-limited map Φ(x) : Ck → Ck ,
which is equivalent to a band-limited function g2 (x).
y
S
A tiling Rk = n∈Zk W (x, n).
y
k
Weight functions w(x, n) ∈ [0, 1]Z for n ∈ Zk ,
which form a social welfare system among tiles W (x, n).
S
Take x ∈ X. First we construct a tiling Rk = n∈Zk W0 (x, n) from the point x.
We use the marker property assumption only here. This tiling is not used directly in
the proof of Proposition 3.1. Instead we construct a certain holomorphic map Φ(x) :
Ck → Ck called a “tiling-like band-limited map” from the tiles W0 (x, n). Write Φ(x) =
(Φ(x)1 , . . . , Φ(x)k ). The Fourier transforms of Φ(x)1 |Rk , . . . , Φ(x)k |Rk and their complex
conjugates are adjusted to have disjoint supports. Then the band-limited function
def
g2 (x) =
k
X
Re (Φ(x)i )
i=1
becomes “equivalent” to Φ(x). Namely if g2 (x) = g2 (y) for some x, y ∈ X then Φ(x) =
Φ(y). (Indeed we will define g2 (x) in Section 6 by multiplying a small constant to the
above function so that the norm of g2 (x) becomes sufficiently small.)
Let us give some more heuristics concerning the construction of Φ(x). Consider the
function
πzk
πz1
, · · · , sin
) : Rk → Rk
Θ̃L = (sin
L
L
for some positive integer L thought to be very big. Every entry sin(πzi /L) of the map
Θ̃L vanishes on LZk ⊂ Rk and belongs to B( L1 , · · · , L1 ). Suppose we are given a family of
30
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
tilings W0 (x) = {W0 (x, n)}n∈Zk of Rk depending continuously9 and Zk -equivariantly (i.e.
W0 (T n x, m) = −n + W0 (x, n + m)) on x ∈ X. We would like to replace this family of
tilings by a family of Voronoi tilings10 generated by the zeros of a continuous function
F : X × Rk → Rk , where F has the following properties:
(1) Band-limited: Every entry of F (x, ·) belongs to B( L1 , · · · , L1 ).
(2) Equivariance: F (T n x, z) = F (x, z + n) for any x ∈ X, z ∈ Rk and n ∈ Zk .
A candidate for F is the following function
X × Rk → Rk ,
(x, t) 7→
X
n∈Zk
e L (t − n) 1W0 (x,n) (t).
Θ
This function is equivariant but unfortunately not continuous. However a small change
(for details see Subsection 5.2) makes it band-limited (and continuous).
Figure 5.1. The original tiling W0 (x, n): ——; The zeros of F in the
“deep” interior of “big” tiles: •; “Regular” part of the new tiling W (x, n):
- - - - -.
The most simple way of generating Voronoi tilings would be to use the zeros of F (x, ·)
as generating sets for the Voronoi tiling, i.e. W (x) = Voronoi zeros of F (x, ·) . However,
the zeros of band-limited maps behave rather wildly in general, e.g. they are not isolated
and form a positive dimensional variety in general. We will thus instead adopt a more
9More
precisely, for ε > 0 and for each x ∈ X and n ∈ Zk with Int W0 (x, n) 6= ∅, if y ∈ X is sufficiently
close to x, then the Hausdorff distance between W0 (x, n) and W0 (y, n) is smaller than ε.
10A Voronoi tiling generated by a discrete set A ⊂ Rk is a partitioning of Rk into regions based on the
closest distance to points in A. For more details, see Subsection 5.3.
EMBEDDING PROBLEM OF Zk -ACTIONS
31
elaborate scheme. We give a weight v(x, n) ∈ [0, 1] to every x ∈ X and n ∈ Zk , which
is constructed from (some appropriate) zeros of F (x, ·) in a neighborhood of n. We
use these weights to generate a family of indexed Voronoi tilings {W (x, n)}n∈Zk . The
exact procedure is described in Subsection 5.4. For big tiles and big L > 0 the picture
schematically looks like Figure 5.1.
The new tiling is used in the proof of Proposition 3.1 in Section 6. We construct a
certain “weight function” (not to be confused with v(x, n) of the previous paragraph)
k
k Z
w(x) = (w(x, n))n∈Zk ∈ [0, 1]Z
from the tiles W (x, n). This will play a role of a social welfare system among the tiles
W (x, n). The tiles W (x, n) and functions w(x, n) are constructed from Φ(x). So all their
informations are encoded into Φ(x), which is equivalent to the band-limited function
g2 (x).
Subsection 5.1 is a function-theoretic preparation for the construction of tiling-like
band-limited maps. Subsection 5.2 constructs a tiling-like band-limited map from a tiling
of Rk (not necessarily coming from a dynamical system). Subsection 5.3 describes a
S
construction of the first tiling Rk = n∈Zk W0 (x, n). Subsection 5.4 uses the preparations
in Subsections 5.1, 5.2 and 5.3 and constructs Φ(x), W (x, n) and w(x, n).
5.1. Quantitative persistence of zero points. We start from the following elementary
observation: Let f : Ck → Ck be a holomorphic map such that f (0) = 0 and the derivative
df0 at the origin is an invertible matrix. For any neighborhood U of the origin in Ck , if
g : Ck → Ck is a holomorphic map such that |f (z) − g(z)| is sufficiently small over the
unit ball B1 , then there exists z ∈ U such that g(z) = 0 and the derivative dgz at z
is also invertible. The purpose of this subsection is to develop a quantitative version of
this observation for some very special f (i.e. the function ΘL introduced below). Here
“quantitative” means that we would like to specify how small |g(x) − f (x)| should be and
how much non-degenerate dgz is.
Let r > 0. For u ∈ C we define Dr (u) as the closed disk of radius r around u in C.
We set Dr = Dr (0). For u = (u1 , . . . , uk ) ∈ Ck we define the polydisc Drk (u) in Ck by
Drk (u) = Dr (u1 ) × · · · × Dr (uk ). We set Drk = Drk (0).
First we study the sine function sin z in the complex domain. Consider the image
sin(∂Dπ/2 ) of the circle ∂Dπ/2 of radius π/2 under the map sin : C → C. This curve does
not contain the origin and its rotation number around the origin is one:
Z
Z
dz
1
cos z
1
√
= √
dz = 1.
2π −1 sin(∂Dπ/2 ) z
2π −1 ∂Dπ/2 sin z
This implies that the map
sin∗ : H1 Dπ/2 \ {0} → H1 (C \ {0})
32
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
is an isomorphism. Here H1 (·) is the standard homology group of Z-coefficients. (Both
sides of the above are isomorphic to Z.) The map sin∗ is the homomorphism induced by
the map sin : Dπ/2 \ {0} → C \ {0}. The natural maps
H2 Dπ/2 , Dπ/2 \ {0} → H1 Dπ/2 \ {0} , H2 (C, C \ {0}) → H1 (C \ {0})
are isomorphic by the canonical long exact sequence ([Hat02, Theorem 2.16]). It follows
by composition that
sin∗ : H2 Dπ/2 , Dπ/2 \ {0} → H2 (C, C \ {0})
is also an isomorphism. In the same way, for any n ∈ Z, the map
sin∗ : H2 Dπ/2 (πn), Dπ/2 (πn) \ {πn} → H2 (C, C \ {0})
is an isomorphism.
Definition 5.1.
(1) Recall that we introduced positive numbers a1 , . . . , ak and δ in
Subsection 3.3. We set bi = ai + δ/2. For L > 1 we define ΘL : Ck → Ck by
√
√
ΘL (z1 , . . . , zk ) = eπ −1 b1 z1 sin(πz1 /L), . . . , eπ −1 bk zk sin(πzk /L) .
This map vanishes on LZk . The Fourier transform of the i-th entry
eπ
√
−1 bi ti
sin(πti /L),
(t = (t1 , . . . , tk ) ∈ Rk )
of ΘL |Rk (the restriction of ΘL to Rk ) is supported in
1 bi
1
bi
i−1
× {0}k−i , (1 ≤ i ≤ k).
−
, +
{0} ×
2
2L 2
2L
We will choose a very large L later. So this line segment will be very small.
(2) Let A be a k × k matrix. We set
ν(A) =
min
z∈Ck ,|z|=1
|Az|.
The matrix A is invertible if and only if ν(A) > 0. So ν(A) quantifies the amount
of non-degeneracy of A. For another k × k matrix B we have
(5.1)
|ν(A) − ν(B)| ≤ |A − B| (the operator norm of A − B).
In particular ν(A) depends continuously on A.
Lemma 5.2. For every n = (n1 , . . . , nk ) ∈ Zk the homomorphism
k
k
(ΘL )∗ : H2k DL/2
(Ln), DL/2
(Ln) \ {Ln} → H2k Ck , Ck \ {0}
is isomorphic. (Notice that the both sides are isomorphic to Z.)
EMBEDDING PROBLEM OF Zk -ACTIONS
33
k
k
Proof. We define a homotopy ft : DL/2
(Ln), DL/2
(Ln) \ {Ln} → Ck , Ck \ {0} for
0 ≤ t ≤ 1 by
√
√
ft (z1 , . . . , zk ) = eπ −1 t b1 z1 sin(πz1 /L), . . . , eπ −1 t bk zk sin(πzk /L) .
f1 = ΘL . So it is enough to show that f0 induces an isomorphism on the 2k-th homology
groups (see [Hat02, Theorem 2.10]). The map f0 is given by
f0 (z1 , . . . , zk ) = (sin(πz1 /L), . . . , sin(πzk /L)) .
Set ϕ(z) = sin(πz/L) for z ∈ C. We have natural isomorphisms by the Künneth theorem
(Spanier [Spa66, p. 235, 10 Theorem]):
H2k
k
k
DL/2
(Ln), DL/2
(Ln)
H2k
\ {Ln} ∼
=
C , C \ {0} ∼
=
k
k
k
O
i=1
k
O
i=1
H2 DL/2 (Lni ), DL/2 (Lni ) \ {Lni }
H2 (C, C \ {0}) .
Under these isomorphisms, the homomorphism (f0 )∗ is identified with
⊗ki=1 ϕ∗
:
k
O
i=1
H2 DL/2 (Lni ), DL/2 (Lni ) \ {Lni } →
k
O
i=1
H2 (C, C \ {0}) .
By the argument in the beginning of this subsection, each factor
ϕ∗ : H2 DL/2 (Lni ), DL/2 (Lni ) \ {Lni } → H2 (C, C \ {0})
is isomorphic. Thus (f0 )∗ is an isomorphism.
The derivative (dΘL )z at z = (z1 , . . . , zk ) is a diagonal matrix whose (i, i)-th entry is
given by
√
√
cos(πzi /L)
π −1 bi zi
−1 bi sin(πzi /L) +
πe
, (1 ≤ i ≤ k).
L
Notation 5.3. We choose 0 < r1 < 1/4 so small that for all 1 ≤ i ≤ k and z ∈ Dr1
√
√
cos(πz/L)
3
π −1 bi z
−1 bi sin(πz/L) +
π e
> .
L
L
Since for small z
cos(πz/L)
1
πz
,
≈ ,
L
L
L
we can choose r1 independent of L > 1. (This independence is a plausible fact but it is
not really needed in the argument below.)
sin(πz/L) ≈
It immediately follows from the definition that for all n ∈ Zk and z ∈ Drk1 (Ln)
(5.2)
ν ((dΘL )z ) >
3
.
L
34
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Notation 5.4 (The threshold θL ). We define Ω ⊂ Ck as the set of z = (z1 , . . . , zk )
satisfying |Im(zi )| ≤ 1 for all 1 ≤ i ≤ k. We define θL > 0 as the minimum of the
following two quantities:
(
)
[
1
k −1/2 (3/4)k+1 , inf |ΘL (z)| z ∈ Ω \
Drk1 (Ln) .
L
k
n∈Z
The next lemma is the main result of this subsection.
Lemma 5.5 (Persistence of zero points of ΘL ). Let f : Ck → Ck be a holomorphic map.
Let W ⊂ Ck be a subset and suppose |f (z) − ΘL (z)| < θL for all z ∈ W . Then the
following (1) and (2) hold.
(1)
{z ∈ W ∩ Ω| f (z) = 0} ⊂
k
(2) For every n ∈ Z with
D1k (Ln)
[
Drk1 (Ln).
n∈Zk
⊂ W there exists z ∈ Drk1 (Ln) satisfying
f (z) = 0,
ν(dfz ) >
2
.
L
Proof. (1) is a direct consequence of the definition of θL . So we consider (2). For the
notational simplicity, assume n = 0. It follows from the definition of θL that
max |f (z) − ΘL (z)| < min |ΘL (z)|,
z∈∂Drk1
z∈∂Drk1
where ∂Drk1 is the boundary of Drk1 . (So in particular its (2k − 1)-th homology group is
isomorphic to Z.) Then we can define a homotopy ft : ∂Drk1 → Ck \ {0} between ΘL and
f by
ft (z) = (1 − t)ΘL (z) + tf (z), (0 ≤ t ≤ 1).
Here the point is that ft has no zero on ∂Drk1 . It follows from Lemma 5.2 that f∗ =
(ΘL )∗ : H2k−1 (∂Drk1 ) → H2k−1 Ck \ {0} is isomorphic. Then f must attain zero at some
(interior) point of Drk1 . Otherwise the map f∗ : H2k−1 ∂Drk1 → H2k−1 Ck \ {0} is equal
to the composition of the maps
f∗
H2k−1 ∂Drk1 → H2k−1 Drk1 → H2k−1 Ck \ {0} .
But H2k−1 Drk1 = 0 implies that the map f∗ : H2k−1 ∂Drk1 → H2k−1 Ck \ {0} is zero.
This is a contradiction.
The rest of the work is to prove the statement about the derivative of f at zero points.
By (5.1) and (5.2) it is enough to prove that for all z ∈ Drk1 the operator norm of
dfz − (dΘL )z is smaller than 1/L. Let z = (z1 , . . . , zk ) ∈ Drk1 . By the Cauchy integration
formula,
Z
Z
1
f (w) − ΘL (w)
√
f (z) − ΘL (z) =
dw1 . . . dwk .
···
k
(2π −1) ∂D1
∂D1 (w1 − z1 ) . . . (wk − zk )
EMBEDDING PROBLEM OF Zk -ACTIONS
35
For u = (u1 , . . . , uk ) ∈ Ck with |u| = 1, the vector dfz (u) − (dΘL )z (u) is given by
Z
Z
k
X
f (w) − ΘL (w)
1
√
···
ui
dw1 . . . dwk .
2
k
(2π −1) i=1
∂D1 (w1 − z1 ) . . . (wi − zi ) . . . (wk − zk )
∂D1
For zi ∈ Dr1 and wi ∈ ∂D1 we have |wi − zi | > 3/4 because r1 < 1/4. Hence
|dfz (u) − (dΘL )z (u)| <
≤
k
X
i=1
√
|ui |(4/3)k+1θL
k(4/3)
k+1
1
θL ≤ ,
L
by θL ≤ k
−1/2
(3/4)
k+1
1
L
.
This proves |dfz − (dΘL )| < 1/L.
5.2. Tiling-like band-limited maps. We choose a rapidly decreasing function χ1 :
Rk → R satisfying supp F (χ1 ) ⊂ Bδ/8 and
Z
(5.3)
F (χ1 )(0) =
χ1 (t) dt1 . . . dtk = 1.
Rk
Notation 5.6. We set
K1 =
Z
Rk
|χ1 (t)| dt1 . . . dtk .
The function χ1 can be extended holomorphically over Ck (see Lemma 2.2) by
Z
√
F (χ1 )(ξ) e2π −1ξ·z dξ1 . . . dξk , (z = (z1 , . . . , zk ) ∈ Ck ).
χ1 (z) =
Bδ/8
For any polynomial P (z1 , . . . , zk ), by the integration by parts,
√
√
√
Z
−1 ∂
−1 ∂
P
P (z1 , . . . , zk )χ1 (z) =
,...,
F (χ1 )(ξ) e2π −1ξ·z dξ1 . . . dξk .
2π ∂ξ1
2π ∂ξk
Bδ/8
Hence there exists a positive constant constP depending on P and satisfying
v
u k
uX
|Im(zi )|2 .
|P (z1 , . . . , zk )χ1 (z)| ≤ constP · e(πδ/4)|Im(z)| , |Im(z)| = t
i=1
In particular for each l ≥ 0 there exists a constant constl satisfying
(5.4)
|χ1 (z)| ≤ constl · (1 + |z|)−l · e(πδ/4)|Im(z)| .
It follows that the integral
Z
Rk
χ1 (z − t) dt1 . . . dtk
converges and becomes a holomorphic function in z ∈ Ck . It is constantly equal to one
for z ∈ Rk by (5.3). Therefore indeed it is identically equal to one:
Z
(5.5)
χ1 (z − t) dt1 . . . dtk = 1, (z ∈ Ck ).
Rk
36
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Let W = {Wn }n∈Zk be a set of bounded convex sets of Rk (indexed by Zk ) such that it
tiles the whole space Rk , namely
S
• Rk = n∈Zk Wn .
• For any two distinct m and n in Zk the sets Wm and Wn intersect at most on their
boundaries ∂Wm and ∂Wn : Wm ∩ Wn = ∂Wm ∩ ∂Wn .
Notice that some Wn may be empty. For L > 1 we define a tiling-like band-limited
map ΦL (W) : Ck → Ck by
Z
X
χ1 (z − t) dt1 . . . dtk .
ΦL (W) (z) =
ΘL (z − n)
Wn
n∈Zk
As was already explained before, intuitively we would like to consider
X
ΘL (t − n) 1Wn (t), (t ∈ Rk ).
n∈Zk
Namely we would like to “paint” the map ΘL (t − n) over each tile Wn . But this is not
even continuous in t. So instead we defined ΦL (W) as in the above.
√
It follows from ||ΘL ||L∞ (Rk ) = k and Notation 5.6 that the map ΦL (W) (t) is bounded
over t ∈ Rk :
Z
X
|ΦL (W) (t)| ≤
||ΘL ||L∞ (Rk )
|χ1 (t − x)| dx1 . . . dxk
n∈Zk
= ||ΘL ||L∞ (Rk )
√
= kK1 .
Wn
Z
Rk
|χ1 (t − x)| dx1 . . . dxk
The Fourier transform of the i-th entry of ΦL (W)|Rk is supported in
i−1
k−i
δ δ
1
δ bi
1
δ
bi
δ δ
× − ,
×
−
− , +
+
, (1 ≤ i ≤ k).
− ,
8 8
2
2L 8 2
2L 8
8 8
Since bi = ai + δ/2, if L > 4/δ then this is contained in
i−1
k−i
δ δ
δ δ
ai ai δ
− ,
× − ,
, +
×
4 4
2 2
2
4 4
Since we assumed δ < min(a1 , . . . , ak ) in (3.2) in Subsection 3.3, these k sets are disjoint
with each other.
Notation 5.7. Recall that Ω ⊂ Ck is the set of z = (z1 , . . . , zk ) satisfying |Im(zi )| ≤ 1
for all 1 ≤ i ≤ k. By (5.4) we can choose E = E(L) > 0 such that for all z ∈ Ω
Z
θL
|χ1 (z − t)| dt1 . . . dtk < ,
||ΘL ||L∞ (Ω)
2
Rk \BE (Re(z))
where θL is the constant introduced in Notation 5.4.
EMBEDDING PROBLEM OF Zk -ACTIONS
37
We recall the notations introduced in Subsection 2.4: For r > 0 and A ⊂ Rk , we define
∂r A as the set of all t ∈ Rk satisfying Br (t) ∩ A 6= ∅ and Br (t) ∩ Rk \ A 6= ∅. We set
Intr A = A \ ∂r A, namely Intr A is the set of t ∈ A satisfying Br (t) ⊂ A.
Lemma 5.8. Let n ∈ Zk and z ∈ Ω. If Re(z) ∈ IntE Wn then
|ΦL (W) (z) − ΘL (z − n)| < θL .
Proof. For simplicity of the notation we assume n = 0. By (5.5)
ΦL (W) (z) − ΘL (z) =
X
m6=0
ΘL (z − m)
− ΘL (z)
Z
Z
Rk \W0
Hence
|ΦL (W) (z) − ΘL (z)| ≤ 2 ||ΘL ||L∞ (Ω)
Wm
χ1 (z − t) dt1 . . . dtk
χ1 (z − t) dt1 . . . dtk .
Z
Rk \W0
|χ1 (z − t)| dt1 . . . dtk .
This is smaller than θL by the definition of E.
The next lemma is the summary of this subsection.
Lemma 5.9 (Main properties of ΦL (W)).
(1) The restriction of ΦL (W) to Rk is a
√
bounded continuous map such that ||ΦL (W)||L∞ (Rk ) ≤ kK1 and that if L > 4/δ
then the Fourier transform of the i-th entry of ΦL (W) |Rk is supported in
δ δ
− ,
4 4
i−1
×
ai ai δ
, +
2 2
2
δ δ
× − ,
4 4
k−i
,
(1 ≤ i ≤ k),
which are disjoint with each other.
(2) Let n ∈ Zk and z ∈ Ω. If Re(z) ∈ IntE Wn and ΦL (W) (z) = 0 then there exists
m ∈ Zk satisfying z ∈ Drk1 (n + Lm).
(3) Let n, m ∈ Zk with n + Lm ∈ IntE+√k Wn . Then there exists z ∈ Drk1 (n + Lm)
satisfying
ΦL (W) (z) = 0,
ν ((dΦL (W))z ) >
2
.
L
Proof. (1) was already proved. (2) follows from Lemmas 5.5 (1) and 5.8. For (3), notice
that n + Lm ∈ IntE+√k Wn implies B√k (n + Lm) ⊂ IntE (Wn ) and that every point
z ∈ D1k (n + Lm) satisfies Re(z) ∈ IntE (Wn ). Then (3) follows from Lemmas 5.5 (2) and
5.8.
38
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Conditions (2) and (3) in Lemma 5.9 are the rigorous formulation of “good/bad decomposition” explained in Subsection 1.4. The domain Ω is decomposed into two regions:
(
)
[
Good region = z ∈ Ω Rez ∈
IntE+√k Wn ,
Bad region =
n∈Zk
(
z ∈ Ω Rez ∈
[
∂E+√k Wn
n∈Zk
)
.
The above (2) and (3) mean that we have a good control (for our purpose here) of zero
points of ΦL (W) over the good region. As we explained in Subsection 1.4, the bad
region should be “tiny”. This means that we need to introduce a tiling W such that the
“boundary region”
[
∂E+√k Wn
n∈Zk
is sufficiently small. (Indeed we will need a bit more involved condition later; see (5.9)
below). The purpose of the next subsection is to construct such tilings.
5.3. Dynamical Voronoi diagram. This subsection is largely a reproduction of [GLT16,
Section 4]. Here we introduce a dynamically generated Voronoi diagram. Our use of
Voronoi diagram is conceptually influenced by the works of Lightwood [Lig03, Lig04].
Let (X, Zk , T ) be a dynamical system having the marker property as we promised in
Subsection 3.3. Let M be a natural number. It follows from the marker property that
there exists an open set U ⊂ X satisfying
[
U ∩ T n U = ∅ (0 < |n| < M), X =
T n U.
n∈Zk
We can find a natural number M1 ≥ M and a compact set F ⊂ U satisfying X =
S
n
|n|<M1 T F . Choose a continuous function h : X → [0, 1] satisfying supp h ⊂ U and
h = 1 on F . Then it satisfies
[
T n ({x ∈ X| h(x) = 1}) .
(5.6) (supp h) ∩ T n (supp h) = ∅ (0 < |n| < M), X =
|n|<M1
For x ∈ X consider the following discrete set in Rk+1 :
1
k
n
n ∈ Z , h(T x) > 0 .
n,
h(T n x)
We consider the Voronoi diagram determined by this set. Namely we define a convex
set V0 (x, n) for n ∈ Zk as follows: If h(T n x) = 0 then we set V0 (x, n) = ∅. If h(T n x) > 0
then we define it as the set of all u ∈ Rk+1 satisfying
1
1
k
m
≤ u − m,
.
u − n,
∀m ∈ Z with h(T x) > 0 :
h(T n x)
h(T m x)
EMBEDDING PROBLEM OF Zk -ACTIONS
39
Figure 5.2. Voronoi tiling. The Voronoi center (n, 1/h(T n x)) is located
inside V0 (x, n). The shadowed region is W0 (x, n).
The sets V0 (x, n) form a tiling of Rk+1 :
Rk+1 =
[
V0 (x, n).
n∈Zk
Let πRk : Rk+1 → Rk be the projection to the first k coordinates (i.e. forgetting the last
√ 2
coordinate). Set H = M1 + k and
W0 (x, n) = πRk V0 (x, n) ∩ Rk × {−H} .
See Figure 5.2. These form a tiling of Rk :
[
Rk =
W0 (x, n).
n∈Zk
This tiling is Zk -equivariant in the sense that
W0 (T n x, m) = −n + W0 (x, n + m) = {−n + u| u ∈ W0 (x, n + m)}.
The tiles W0 (x, n) depend continuously on x ∈ X in the Hausdorff topology. More
precisely, for ε > 0 and for each x ∈ X and n ∈ Zk with Int W0 (x, n) 6= ∅, if y ∈ X
is sufficiently close to x, then the Hausdorff distance between W0 (x, n) and W0 (y, n) is
smaller than ε. Here Int W0 (x, n) denotes the interior of W0 (x, n). (When the tile W0 (x, n)
has no interior point, it may vanish after x moves slightly. But this does not cause any
problem.)
The set W0 (x, n) depends on the choice of the parameter M. So we sometimes write
W0M (x, n) = W0 (x, n) for clarifying that M is the parameter11. In the next subsection
we consider the tiling-like band-limited map for this tiling. The following property of
11It
might look that M1 and h are also parameters. But we can choose them to be functions of M .
Namely for each natural number M we fix a natural number M1 = M1 (M ) and a continuous function
h = hM : X → [0, 1] satisfying (5.6). Then only M remains to be a parameter.
40
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
W0M (x, n) becomes crucial there, which means that the “bad region” is negligible as we
explained at the end of the last section.
Lemma 5.10. For any r > 0
(
lim
M →∞
lim sup sup
R→∞
BR ∩
x∈X
S
∂r W0M (x, n)
|BR |
n∈Zk
!)
= 0.
Here | · | is the k-dimensional volume (Lebesgue measure).
Proof. We need some auxiliary claims.
Claim 5.11. Let x ∈ X and n ∈ Zk with h(T n x) > 0.
(1) V0 (x, n) contains the ball BM/2 (n, 1/h(T n x)).
(2) W0 (x, n) ⊂ BM1 +√k (n).
(3) If W0 (x, n) 6= ∅ then h(T n x) > 1/2.
Proof. It follows from the first property of h in (5.6) that if m ∈ Zk also satisfies h(T m x) >
0 then |n − m| ≥ M. Property (1) easily follows from this. For the proof of (2) and (3),
take u ∈ W0 (x, n). Let v ∈ Zk be the integer point closest to u. By the second property
of h in (5.6) there exists m ∈ Zk satisfying |m| < M1 and h(T v+m x) = 1. It follows from
the definition of the Voronoi tiling that
1
(u, −H) − n,
(5.7)
≤ |(u, −H) − (v + m, 1)| .
h(T n x)
Since |H + 1/h(T n x)| ≥ H + 1,
|u − n| ≤ |u − v − m| < |u − v| + M1 <
√
k + M1 .
This proves (2). It follows from (5.7) that
2
2
√
1
2
2
k + M1 + (H + 1)2 .
H+
≤ |u − v − m| + (H + 1) <
h (T n x)
Then Property (3) follows:
√
k + M1
1
<
h(T n x)
2H
2
√
where we used H = M1 + k > 1.
2
+1+
1
1
1
< + 1 + = 2,
2H
2
2
Let ε > 0. We take c > 1 satisfying
c−k > 1 − ε.
We choose M so large that
(5.8)
(c − 1)M
> r,
2(c + 1)
2
c+
M
−k
> 1 − ε.
EMBEDDING PROBLEM OF Zk -ACTIONS
41
Figure 5.3. Configurations of V0 (x, n), W0 (x, n) and W1 (x, n).
For x ∈ X and n ∈ Zk we set W1M (x, n) = W1 (x, n) = πRk V (x, n) ∩ Rk × {−cH} ,
where πRk : Rk+1 → Rk is the projection to the first k coordinates. It follows from the
same proof of Claim 5.11 (2) that
W1 (x, n) ⊂ BM1 +√k (n).
For u ∈ W1 (x, n) we denote by (f (u), −H) the intersection point of the hyperplane
Rk × {−H} and the line segment between (u, −cH) and the Voronoi center (n, 1/h(T n x)).
It follows from the convexity of V0 (x, n) that f (u) ∈ W0 (x, n). See Figure 5.3.
Claim 5.12.
(1) For any u ∈ W1 (x, n) the point f (u) belongs to Intr W0 (x, n).
(2) |Intr W0 (x, n)| ≥ (1 − ε) |W1 (x, n)|.
Proof. (1) From BM/2 (n, 1/h(T n x)) ⊂ V0 (x, n), the set W0 (x, n) × {−H} contains the
intersection point of the hyperplane Rk × {−H} and the line segment between (u, −cH)
and (v, 1/h(T nx)) for v ∈ BM/2 (n). Then W0 (x, n) contains the ball of radius
cH − H
M
·
1
cH + h(T n x) 2
around the point f (u). See Figure 5.3 again. From h(T n x) > 1/2 (Claim 5.11 (3)),
cH − H
(c − 1)H M
(c − 1)M
M
.
>
·
=
·
1
cH + 2
2
cH + h(T n x) 2
2 c + H2
√ 2
By H = M1 + k > 2, this is larger than
(c − 1)M
>r
2(c + 1)
(by the first condition of (5.8)).
42
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
This shows f (u) ∈ Intr W0 (x, n).
(2) We can assume W1 (x, n) 6= ∅. (Otherwise the statement is trivial.) From (1)
!k
H + h(T1n x)
|W1 (x, n)| .
|Intr W0 (x, n)| ≥ |{f (u)| u ∈ W1 (x, n)}| =
cH + h(T1n x)
From h(T n x) > 1/2 (Claim 5.11 (3)),
k
k
H
1
|Intr W0 (x, n)| ≥
|W1 (x, n)| .
|W1 (x, n)| =
cH + 2
c + H2
√ 2
Since H = M1 + k > M
|Intr W0 (x, n)| ≥
1
c + M2
k
|W1 (x, n)| .
By the second condition of (5.8) this proves (2).
√
Let x ∈ X and R > 2M1 + 2 k.
BR ∩
[
n∈Zk
∂r W0 (x, n) ≤ |BR | −
[
√
|n|≤R−M1 − k
≤ |BR | − (1 − ε)
(by W0 (x, n) ⊂ BM1 +√k (n))
Intr W0 (x, n)
[
√
(by Claim 5.12 (2)).
W1 (x, n)
|n|≤R−M1 − k
S
Since W1 (x, n) ⊂ BM1 +√k (n) and Rk = n∈Zk W1 (x, n),
[
W1 (x, n) ⊃ BR−2M1 −2√k .
√
|n|≤R−M1 − k
Hence
BR ∩
Thus
[
n∈Zk
∂r W0 (x, n) ≤ |BR | − (1 − ε) BR−2M1 −2√k .
lim sup sup
R→∞
This proves the statement.
x∈X
BR ∩
S
∂r W0 (x, n)
|BR |
n∈Zk
!
≤ ε.
5.4. Tiling and weight functions from tiling-like band-limited maps. Let A, L0
and L be positive numbers. These three parameters control the construction of this
subsection. We assume:
Condition 5.13 (L is much larger than AL0 ). L is an integer satisfying
√
L > 1000k (A + 1) L0 + 1 + k .
EMBEDDING PROBLEM OF Zk -ACTIONS
43
Let E = E(L) be the positive constant introduced in Notation 5.7. By Lemma 5.10 we
can choose M = M(A, L0 , L) > 0 so that the sets W0 (x, n) = W0M (x, n) in Subsection 5.3
satisfy
S
B3R ∩ n∈Zk ∂E+2(L+1)√k+L0 +1 W0 (x, n)
1
<
.
(5.9)
lim sup sup
6A + 2
BR/2
R→∞
x∈X
Let x ∈ X. We define ΦA,L0 ,L (x) = ΦL ({W0 (x, n)}n∈Zk ) : Ck → Ck as the tiling-like
band-limited map with respect to the tiling {W0 (x, n)}n∈Zk , namely for z ∈ Ck
Z
X
ΦA,L0 ,L (x)(z) =
ΘL (z − n)
χ1 (z − t) dt1 . . . dtk .
W0 (x,n)
n∈Zk
We often abbreviate ΦA,L0 ,L (x) to Φ(x).
Lemma 5.14 (Basic properties of Φ(x)). Φ satisfies
√
(1) Boundedness: ||Φ(x)||L∞ (Rk ) ≤ kK1 .
(2) Frequencies: If L > 4/δ then the Fourier transform of the i-th entry of Φ(x)|Rk
(1 ≤ i ≤ k) is supported in
i−1
k−i
δ δ
ai ai δ
δ δ
× − ,
, +
×
,
− ,
4 4
2 2
2
4 4
which are disjoint with each other.
(3) Equivariance: Φ(T n x)(z) = Φ(x)(z + n) for all x ∈ X, n ∈ Zk and z ∈ Ck .
(4) Continuity: If a sequence xn in X converges to x then Φ(xn ) converges to Φ(x)
uniformly over every compact subset of Ck .
Proof. (1) and (2) immediately follow from Lemma 5.9 (1). (3) and (4) follow from the
equivariance and continuity of the tiles W0 (x, n).
Let 0 < r1 < 1/4 be the positive number introduced in Notation 5.3. Let α1 : Ck →
[0, 1] and α2 : R → [0, 1] be continuous functions satisfying
k
,
z∈
/ D2r
α1 (z) = 1
z ∈ Drk1 , α1 (z) = 0
1
2
1
, α2 (t) = 1
t≥
.
α2 (t) = 0
t≤
L
L
For each x ∈ X and n ∈ Zk we define a non-negative number νA,L0 ,L (x, n) = ν(x, n) by
X
ν(x, n) = min 1,
α1 (z − n) α2 (ν (dΦ(x)z )) .
Φ(x)(z)=0
k
Here the sum is taken over all z ∈ Ck satisfying Φ(x)(z) = 0, z ∈ D2r
(n) and ν (dΦ(x)z ) ≥
1
1/L. The set of such z is a finite set because non-degenerate zero points are isolated. So
k
this is a finite sum. (Notice that the polydisk D2r
(n) may contain infinitely many zeros of
1
Φ(x). The above definition of ν(x, n) addresses this problem. The number 1/L is chosen
44
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
so that the zero points found in Lemma 5.9 (3) contribute to the above sum.) For each
n ∈ Zk the number ν(x, n) depends continuously on x ∈ X.
We again consider a Voronoi tiling. Let x ∈ X. Consider the following discrete set in
k+1
R :
1
k
n ∈ Z , ν(x, n) > 0 .
n,
ν(x, n)
This set is not empty. (See the proof of Lemma 5.15 (1) below.) So this determines a
Voronoi diagram. Namely for n ∈ Zk we define V (x, n) as the set of u ∈ Rk+1 satisfying
1
1
k
u − n,
∀m ∈ Z with ν(x, m) > 0 :
≤ u − m,
.
ν(x, n)
ν(x, m)
If ν(x, n) = 0 then V (x, n) = ∅. These form a tiling of Rk+1 :
[
Rk+1 =
V (x, n).
n∈Zk
We set W (x, n) = πRk V (x, n) ∩ Rk × {0} , where πRk : Rk+1 → Rk is the projection
to the first k coordinates as before. The sets W (x, n) form a tiling of Rk :
[
Rk =
W (x, n).
n∈Zk
This is also Zk -equivariant, namely W (T n x, m) = −n + W (x, n + m). Each W (x, n) is
a bounded convex set of Rk (see Lemma 5.15 (1) below) and depends continuously on
x ∈ X in the Hausdorff topology as in the case of W0 (x, n). We sometimes denote W (x, n)
by W A,L0 ,L (x, n) for clarifying the dependence on the parameters A, L0 , L. For x ∈ X we
S
define ∂(x) = ∂ A,L0 ,L (x) as n∈Zk ∂W (x, n).
Lemma 5.15 (Basic properties of W (x, n)).
(1) The diameter of W (x, n) is bounded
k
uniformly in x ∈ X and n ∈ Z . Moreover
sup sup
sup
x∈X n∈Zk u∈W (x,n)
|n − u| < ∞.
(2) Let α3 : R → [0, 3] be a continuous function satisfying
α3 (t) = 3 (t ≤ L0 ),
α3 (t) = 0
(t ≥ L0 + 1).
There exists R0 = R0 (A, L0 , L) > 0 such that for all x ∈ X and all u ∈ Zk
X
X
|IntL0 W (x, n)| ,
α3 (d (n, ∂(x))) <
A
|n−u|≤2R0
|n−u|≤R0
where d (n, ∂(x)) = inf t∈∂(x) |n−t| and the sums are taken over all n ∈ Zk satisfying
|n−u| ≤ 2R0 and |n−u| ≤ R0 in the left-hand side and right-hand side respectively.
Proof. Let x ∈ X and n ∈ Zk . It follows from Lemma 5.9 (2) and (3) that
∀ integer point m ∈ IntE+2r1 √k W0 (x, n) \ n + LZk : ν(x, m) = 0,
(5.10)
∀ m ∈ n + LZk ∩ IntE+√k W0 (x, n) : ν(x, m) = 1.
EMBEDDING PROBLEM OF Zk -ACTIONS
45
(1) By (5.9) if we choose R sufficiently large then for all x ∈ X
[
BR ∩
∂E+(L+1)√k W0 (x, n) 6= BR .
n∈Zk
Then there exists n ∈ Zk satisfying BR ∩ IntE+(L+1)√k W0 (x, n) 6= ∅. Then we can find
a point m ∈ n + LZk ∩ BR+L√k ∩ IntE+√k W0 (x, n). It follows from the second line of
(5.10) that ν(x, m) = 1. By the Zk -equivariance we conclude that for any p ∈ Zk there
exists an integer point q ∈ BR+L√k (p) satisfying ν(x, q) = 1.
Take u ∈ W (x, n). Let p be the integer point closest to u. Then we can find an integer
point q ∈ BR+L√k (p) satisfying ν(x, q) = 1. It follows form the definition of the Voronoi
tiling that
1
≤ |(u, 0) − (q, 1)| .
(u, 0) − n,
ν(x, n)
From ν(x, n) ≤ 1,
|u − n| ≤ |u − q| ≤ |u − p| + |p − q| ≤
This proves
sup sup
sup
x∈X n∈Zk u∈W (x,n)
√
√
k + R + L k.
√
|n − u| ≤ R + (L + 1) k.
(2) The above (5.10) implies
k
∀m ∈ n + LZ
because for such m
∩
IntE+(L+1)√k W0 (x, n)
L L
: W (x, m) = m + − ,
2 2
∀ integer point l ∈ m + L (−1, 1)k with l 6= m :
∀ l ∈ m + L {−1, 0, 1}k :
k
,
ν(x, l) = 0,
ν(x, l) = 1.
We introduce a dichotomy: For x ∈ X we define a “good set” Gx as the set of m ∈ Zk
satisfying W (x, m) = m + [−L/2, L/2]k . We define a “bad set” Bx as the complement of
Gx in Zk . Then it follows that
[
IntE+(2L+1)√k W0 (x, n) ⊂
W (x, m),
(5.11)
[
m∈Bx
W (x, m) ⊂
[
m∈Gx
∂E+(2L+1)√k W0 (x, n).
n∈Zk
√
For simplicity of the notation, we set E ′ = E +(2L+1) k. We define D as the supremum
of |n − u| over all x ∈ X, n ∈ Zk and u ∈ W (x, n). This is finite by (1).
P
Let r and R be positive numbers and u ∈ Zk . We estimate
n∈BR (u) |∂r W (x, n)|.
Noting
[
BR−D (u) ⊂
W (x, n) ⊂ BR+D (u),
n∈BR (u)
46
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
we can estimate
(5.12)
X
n∈BR (u)
|∂r W (x, n)| =
X
n∈BR (u)∩Gx
|∂r W (x, n)| +
≤ 2k+1 r(L + 2r)k−1
=
X
n∈BR (u)∩Bx
|∂r W (x, n)|
[
|BR+D |
B
(u)
∩
+
∂E ′ +r W0 (x, n)
R+D+r
Lk
k
n∈Z
[
2k+1 r(L + 2r)k−1
|B
|
+
B
∩
∂E ′ +r W0 (T u x, n) .
R+D
R+D+r
Lk
k
n∈Z
We would like to prove that for sufficiently large R (uniformly in x ∈ X and u ∈ Zk )
(5.13)
A
X
X
α3 (d (n, ∂(x))) <
n∈B2R (u)
n∈BR (u)
|IntL0 W (x, n)| .
It follows from (5.12) that
X
n∈BR (u)
|IntL0 W (x, n)| ≥
X
n∈BR (u)
(|W (x, n)| − |∂L0 W (x, n)|)
2k+1L0 (L + 2L0 )k−1
|BR+D |
Lk
[
∂E ′ +L0 W0 (T u x, n) .
− BR+D+L0 ∩
≥ |BR−D | −
n∈Zk
If R is sufficiently larger than D + L0 then (noting L > 2L0 by Condition 5.13)
(5.14)
X
n∈BR (u)
|IntL0 W (x, n)| ≥ BR/2 −
=
1−
[
4k L0
|B2R | − B2R ∩
∂E ′ +L0 W0 (T u x, n)
L
k
n∈Z
16k L0
L
BR/2 − B2R ∩
[
n∈Zk
The left-hand side of (5.13) is bounded by
3A# Zk ∩ B2R (u) ∩
≤ 3A B2R+√k (u) ∩
≤ 3A
X
[
n∈Zk
[
∂L0 +1 W (x, n)
!
∂L0 +1+√k W (x, n)
n∈Zk
∂L0 +1+√k W (x, n) .
n∈B2R+2√k+D+L
0 +1
(u)
∂E ′ +L0 W0 (T u x, n) .
EMBEDDING PROBLEM OF Zk -ACTIONS
47
As in the case of (5.14) if R is sufficiently large then this is bounded by (noting L >
√
2L0 + 2 + 2 k by Condition 5.13)
√
4k L0 + 1 + k
[
|B3R | + B3R ∩
∂E ′ +L0 +1+√k W0 (T u x, n)
3A
L
n∈Zk
(5.15)
√
24k L0 + 1 + k
[
= 3A
BR/2 + B3R ∩
∂E ′ +L0 +1+√k W0 (T u x, n) .
L
k
n∈Z
By combining (5.14), (5.15) with Condition 5.13 and (5.9), we can conclude that (5.13)
holds for sufficiently large R.
As we explained in Subsection 3.2 we need a social welfare system among the tiles
W (x, n). The next proposition provides it.
Proposition 5.16 (Construction of weight functions). We can construct a continuous
map
k
k
k Z
, x 7→ (w(x, n))n∈Zk , where w(x, n) = (wm (x, n))m∈Zk ∈ [0, 1]Z
(5.16) X → [0, 1]Z
satisfying the following.
(1) The map is equivariant in the sense that for all m, n ∈ Zk and x ∈ X
w(T mx, n) = w(x, n + m).
(2) If x, y ∈ X satisfy Φ(x) = Φ(y) then w(x, n) = w(y, n) for all n ∈ Zk .
(3) For all x ∈ X and n ∈ Zk
#{m ∈ Zk | wm (x, n) > 0} < 1 +
1
|IntL0 W (x, n)| .
A
In particular if IntL0 W (x, n) = ∅ then wm (x, n) = 0 for all m ∈ Zk .
(4) Let x ∈ X and p ∈ Zk with d (p, ∂(x)) ≤ L0 . There exists n ∈ Zk ∩ BR0 (p) satisfying wp−n (x, n) = 1. Here R0 = R0 (A, L0 , L) is the positive number introduced in
Lemma 5.15 (2).
We call w(x, n) weight functions and sometimes write w A,L0,L (x, n) = w(x, n) for
clarifying the dependence on parameters.
Probably the intuitive meaning of the statement is not clear at all. So we explain it
before the proof. (The idea of the social welfare system was first introduced in [GT]. The
explanation below is more or less a reproduction of the argument around [GT, Lemma
6.4].) In the proof of Proposition 3.1 we construct a perturbation g1 (x) of a given bandlimited function f (x) for each x ∈ X. It is difficult to construct a perturbation over
the whole space Rk at once. So we will perturb f (x) over each tile W (x, n) separately.
The difficulty arises near the boundary ∂W (x, n). The parameter L0 will be chosen so
48
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
that we can construct a good perturbation in IntL0 W (x, n). But we cannot control the
perturbation over ∂L0 W (x, n). (Note that if the tile W (x, n) is tiny, it may be contained
in ∂L0 W (x, n). So the problem is approximately equivalent to “how to help small tiles”.)
The function g1 (x) should encode the information of the orbit of x ∈ X. The above
argument means that it becomes difficult to encode the information of T p x for p ∈ Zk with
d (p, ∂(x)) ≤ L0 . The weight functions wm (x, n) help with this situation. Roughly (and
very inaccurately) speaking, we will encode the (100 × wm (x, n)) % of the information of
T n+m x to g1 (x)|W (x,n). So wm (x, n) is the “amount of help” that the tile W (x, n) gives to
the point n + m. In particular, if wm (x, n) = 1 then the information of T n+m x is perfectly
encoded into g1 (x)|W (x,n).
Now we can explain the intuitive meaning of the above (1)–(4). Condition (1) is an obvious requirement. Condition (2)12 means that the weight function w(x, n) is determined
by the tiling-like band-limited map Φ(x). Condition (3) means that the amount of “additional encoding” which W (x, n) has to bear is controlled by the volume of IntL0 W (x, n).
Condition (4) means that every point near the boundary ∂(x) is “successfully rescued” by
some large tile. Namely we can solve all the difficulties coming from the boundary effect.
Proof of Proposition 5.16. We fix a bijection between Zk and N = {1, 2, 3, . . . }
N ∋ l 7→ ml ∈ Zk
such that if l1 < l2 then |ml1 | ≤ |ml2 |. (Then in particular m1 = 0.)
Fix x ∈ X. For n ∈ Zk we set
u0 (n) =
|IntL0 W (x, n)|
,
A
v0 (n) = α3 (d (n, ∂(x))) .
Here α3 : R → [0, 3] is the continuous function introduced in Lemma 5.15 (2). We define
ωl (n), ul (n), vl (n) inductively with respect to l ≥ 1 by
ωl (n) = min (ul−1 (n), vl−1 (n + ml )) ,
ul (n) = ul−1 (n) − ωl (n),
vl (n) = vl−1 (n) − ωl (n − ml ).
This process can be explained in “social welfare” terms:
• The tiles W (x, n) should pay tax. Tax is used for helping integer points p ∈ Zk .
The tile W (x, n) can pay at most u0 (n) and the point p needs v0 (p).
• At the l-th step of the induction, the tile W (x, n) gives the money ωl (n) to the
point n + ml . After the step, W (x, n) still can pay ul (n) and points p still need
vl (p).
12The
above explanation does not feature Condition (2). But indeed this is a very important condition.
It did not appear in the paper [GT]. A substantial amount of the argument in this section has been
developed for establishing this condition.
EMBEDDING PROBLEM OF Zk -ACTIONS
49
Figure 5.4. At the l-th step of the induction, the tile W (x, n) gives the
amount of money ωl (n) to the point n + ml . Before this step, W (x, n) has
the amount of money ul−1 (n) and the point n + ml needs vl−1 (n + ml ).
After this step, either W (x, n) loses all its money (i.e. ul (n) = 0) or n + ml
becomes satisfied (i.e. vl (n+ml ) = 0). Namely, min (ul (n), vl (n + ml )) = 0.
• At each step, W (x, n) pays as much as possible. Namely, after the l-th step, at
least one of ul (n) and vl (n + ml ) is zero. This is a key property of the process.
Figure 5.4 schematically explains the process.
Set l0 = # Zk ∩ BR0 . Then Zk ∩ BR0 = {m1 , . . . , ml0 }. It follows from Lemma 5.15
(2) that this process terminates: For all l ≥ l0 and n ∈ Zk
vl (n) = 0,
ωl+1 (n) = 0,
because if vl0 (n0 ) > 0 for some n0 then ul0 (n) = 0 for all n ∈ BR0 (n0 ) and hence
X
u0 (n) =
X
l0
X
ωl (n) <
n∈BR0 (n0 ) l=1
n∈BR0 (n0 )
X
v0 (n),
n∈B2R0 (n0 )
which contradicts Lemma 5.15 (2).
It follows from the construction that for n, p ∈ Zk
l0
X
(5.17)
l=1
l0
X
(5.18)
l=1
ωl (n) ≤ u0 (n) =
|IntL0 W (x, n)|
,
A
ωl (p − ml ) = v0 (p) = α3 (d (n, ∂(x))) .
We define continuous functions α4 : R → [1, 2l0 ] and α5 : R → [0, 1] such that
α4 (0) = 2l0 ,
α4 (t) = 1 (t ≥ 1),
α5 (t) = 0 (t ≤ 1),
α5 (t) = 1 (t ≥ 2).
We define F : Rl0 → Rl0 by F (x1 , . . . , xl0 ) = (y1 , . . . , yl0 ) where
yl0 = 2l0 xl0 ,
yl0 −1 = α4 (yl0 )xl0 −1 ,
y1 = α4 (max(yl0 , . . . , y2 )) x1 .
yl0 −2 = α4 (max(yl0 , yl0 −1 )) xl0 −2 ,
...
50
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
This satisfies
(5.19)
#{1 ≤ l ≤ l0 | yl > 1} ≤ 1 + #{1 ≤ l ≤ l0 | xl > 1}.
We define G : Rl0 → [0, 1]l0 by G(y1 , . . . , yl0 ) = (α5 (y1 ), . . . , α5 (yl0 )). Then it follows from
the above (5.19) that if we set GF (x1 , . . . , xl0 ) = (z1 , . . . , zl0 ) then
(5.20)
#{1 ≤ l ≤ l0 | zl > 0} ≤ 1 + #{1 ≤ l ≤ l0 | xl > 1}.
We define wm (x, n) for |m| ≤ R0 and n ∈ Zk by
wm1 (x, n), wm2 (x, n), . . . , wml0 (x, n) = GF (ω1 (n), . . . , ωl0 (n)) .
We set wm (x, n) = 0 for |m| > R0 .
Now we have defined the map (5.16) in the statement. We need to check its properties.
It is continuous and equivariant (i.e. Property (1)) because the tiles W (x, n) depend
continuously on x ∈ X and W (T mx, n) = −m + W (x, n + m). Property (2) is obvious
because the tiles W (x, n) are constructed from the function Φ(x).
Fix x ∈ X again. From (5.17)
#{1 ≤ l ≤ l0 | ωl (n) > 1} <
|IntL0 W (x, n)|
.
A
Then Property (3) follows from (5.20):
#{m| wm (x, n) > 0} ≤ 1 + #{1 ≤ l ≤ l0 | ωl (n) > 1} < 1 +
|IntL0 W (x, n)|
.
A
Finally we check Property (4). Let p ∈ Zk with d (p, ∂(x)) ≤ L0 . Then v0 (p) = 3. From
(5.18)
l0
X
ωl (p − ml ) = 3.
l=1
We define l1 as the maximum of 1 ≤ l ≤ l0 satisfying ωl (p − ml ) > 0. If ωl1 (p − ml1 ) ≥ 2
then wml1 (p − ml1 ) = 1. Otherwise
lX
1 −1
l=1
Then there exists l2 < l1 satisfying
ωl (p − ml ) > 1.
ωl2 (p − ml2 ) >
1
1
≥ .
l1
l0
The condition l2 < l1 implies ul2 (p − ml2 ) = 0 (otherwise vl2 (p) = 0 and ωl1 (p − ml1 ) = 0)
and hence ωl (p − ml2 ) = 0 for all l > l2 . It follows from the definition of the maps F and
G that
wl2 (p − ml2 ) = 1.
This proves Property (4).
EMBEDDING PROBLEM OF Zk -ACTIONS
51
6. Proof of Main Proposition
We prove Proposition 3.1 in this section. We recommend readers to review the notations
introduced in Subsection 3.3. We repeat the statement of the proposition (assuming the
notations in Subsection 3.3):
Proposition 6.1 (= Proposition 3.1). Let d be a distance on X and f : X → B1 (a1 , . . . , ak )
a Zk -equivariant continuous map. Then there exists a Zk -equivariant continuous map
g : X → B1 (a1 + δ, . . . , ak + δ) such that
• ||g(x) − f (x)||L∞ (Rk ) < δ for all x ∈ X.
• g is a δ-embedding with respect to the distance d.
We can assume ||f (x)||L∞ (Rk ) ≤ 1 − δ for all x ∈ X by replacing f with (1 − δ)f if
necessary. We fix 0 < δ ′ < δ satisfying
4K0 δ ′ < δ
(6.1)
where K0 is the positive number introduced in Notation 4.1 (1). We choose 0 < ε < δ
such that for any x, y ∈ X
(6.2)
d(x, y) < ε =⇒ ||f (x) − f (y)||L∞ ([0,1]k ) < δ ′ .
From mdim(X) < ρ1 . . . ρk /2 we can find c0 > 1 and a natural number N such that
• ρi N are integers for all 1 ≤ i ≤ k. (Recall ρi ∈ Q.)
•
Widimε X, d[N ] + 1
ρ1 . . . ρk
<
.
c0 ·
k
N
2
From the second condition, we can find a simplicial complex P and an ε-embedding
Π : X, d[N ] → P satisfying
dim P + 1
ρ1 . . . ρk
<
.
k
N
2
We take a simplicial complex Q and an ε-embedding π : (X, d) → Q.
We define the cone CP as [0, 1] × P/ ∼, where (0, p) ∼ (0, q) for all p, q ∈ P . We
denote by tp the equivalence class of (t, p) ∈ [0, 1] × P . We set ∗ = 0p and call it the
vertex of the cone. We define CQ in the same way. It follows from (6.3) that
(6.3)
c0
(6.4)
c0
ρ1 . . . ρk
dim CP
<
.
k
N
2
We set
ρ1 . . . ρk
dim CP
− c0
> 0.
2
Nk
Recall that we introduced the positive number r0 in Notation 4.1 (2). We set
v
u k
uX
(6.6)
r2 = r0 + t (1/ρi )2 .
(6.5)
c1 =
i=1
52
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
Notation 6.2 (Fixing the parameters A, L0 , L). We take positive numbers A, L0 and L
satisfying the following conditions.
(1) c1 A > 2 dim CQ.
√
(2) L0 is sufficiently larger than r2 + N k such that if a bounded closed convex set
W ⊂ Rk satisfies IntL0 W 6= ∅ then
(6.7)
2 dim CQ < c1 Intr2 +N √k W ,
(6.8)
W ∪ ∂N √k W < c0 Intr2 +N √k W .
The second condition is satisfied for sufficiently large L0 by Lemma 2.7.
(3) L > 4/δ (see Lemma 5.14 (2)) and Condition 5.13 holds.
For these A, L0 and L we construct the tiles W (x, n) = W A,L0,L (x, n) and the weight
functions w(x, n) = w A,L0 ,L (x, n) as in Subsection 5.4.
Lemma 6.3. Let x ∈ X and n ∈ Zk . We define
#(x, n) = #{m ∈ Zk | wm(x, n) > 0}.
If IntL0 W (x, n) 6= ∅ then
(6.9)
W (x, n) ∪ ∂N √k W (x, n)
dim CP + #(x, n) · dim CQ
Nk
ρ1 . . . ρk
Intr2 +N √k W (x, n) .
<
2
Proof. By (6.8) and Proposition 5.16 (3), the left-hand side of (6.9) is smaller than
Intr2 +N √k W (x, n)
|IntL0 W (x, n)|
dim CQ.
dim CP + 1 +
(6.10)
c0
Nk
A
By Notation 6.2 (1) and (2), the second term is smaller than
1
1
c1 Intr2 +N √k W (x, n) + c1 |IntL0 W (x, n)|
2
2
≤ c1 Intr2 +N √k W (x, n)
√
(by L0 > r2 + N k).
Then it follows from the definition of c1 in (6.5) that the above (6.10) is smaller than
ρ1 . . . ρk
dim CP
Intr2 +N √k W (x, n) .
+ c1 Intr2 +N √k W (x, n) =
c0
k
N
2
Notation 6.4 (Choice of R). We take a positive number R such that
• R ∈ NZ.
• R > R0 (A, L0 , L) where R0 (A, L0 , L) is the positive number introduced in Lemma
5.15 (2).
EMBEDDING PROBLEM OF Zk -ACTIONS
53
• For all x ∈ X and n ∈ Rk , the tile W (x, n) satisfies −n + W (x, n) ⊂ [−R, R)k ,
where −n + W (x, n) = {−n + t| t ∈ W (x, n)}. This condition is satisfied for
sufficiently large R by Lemma 5.15 (1).
We set
k ∩N Zk
P = (CP )[−R,R)
,
k ∩Zk
Q = (CQ)[−R,R)
.
For i ≥ 0 we define Q(i) ⊂ Q as the set of (qn )n∈[−R,R)k ∩Zk satisfying qn = ∗ except
for at most i entries. In particular Q(0) = {(∗, . . . , ∗)} and dim Q(i) ≤ i dim CQ. Let
W ⊂ [−R, R)k be a convex set. We define P(W ) ⊂ P as the set of (pn )n∈[−R,R)k ∩N Zk
such that if W ∩ n + [0, N)k = ∅ then pn = ∗. Its dimension is estimated by
W ∪ ∂N √k W
dim CP.
Nk
dim P(W ) ≤
We define a map ΠW : X → P(W ) by
ΠW (x) =
W ∩ n + [0, N)k
Nk
· Π(T n x)
!
.
n∈[−R,R)k ∩N Zk
ΠW is an ε-embedding with respect to the distance dIntW ∩Zk , where IntW is the interior
of W . It follows from Lemma 6.3 that for any x ∈ X and n ∈ Zk with IntL0 W (x, n) 6= ∅
ρ1 . . . ρk
Intr2 +N √k W (x, n) .
(6.11)
dim (P (−n + W (x, n)) × Q (#(x, n))) <
2
Recall that we introduced lattices Γ and Γ1 of Rk in Subsection 3.3. Applying Lemma
2.5 to the ε-embedding Π : (X, d[N ] ) → P and a map
k
X → RΓ∩[0,N ) ,
x 7→ (f (x)(λ))λ∈Γ∩[0,N )k ,
k
we can find a simplicial map F : P → RΓ∩[0,N ) satisfying
∀x ∈ X, λ ∈ Γ ∩ [0, N)k :
|F (Π(x)) (λ) − f (x)(λ)| < δ ′ .
We extend F over CP by F (tp) = tF (p). We define a simplicial map G : P × Q →
k
RΓ∩[−R,R) as follows: For p = (pn )n∈[−R,R)k ∩N Zk ∈ P, q ∈ Q, n ∈ [−R, R)k ∩ NZk and
λ ∈ Γ ∩ [0, N)k
G(p, q)(n + λ) = F (pn )(λ).
Using Lemma 2.6 (2), we perturb G and construct a simplicial map G : P × Q →
k
RΓ∩[−R,R) satisfying the following.
Property 6.5 (Properties on G).
(1) G is sufficiently close to G in the sense that for
all (p, q) ∈ P × Q and λ ∈ Γ ∩ [−R, R)k
|G(p, q)(λ) − G(p, q)(λ)| < δ ′ −
sup
x∈X,λ∈Γ∩[0,N )k
|F (Π(x)) (λ) − f (x)(λ)| .
This implies that for all convex sets W ⊂ [−R, R)k , x ∈ X and q ∈ Q
∀λ ∈ Γ ∩ IntN √k W :
|G (ΠW (x), q) (λ) − f (x)(λ)| < δ ′ .
54
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
(2) If a convex set W ⊂ [−R, R)k , i ≥ 0 and a subset Λ ⊂ Γ ∩ [−R, R)k satisfy
dim (P(W ) × Q(i)) <
|Λ|
,
2
then the map
P(W ) × Q(i) → RΛ ,
(p, q) 7→ G(p, q)|Λ
is an embedding.
Now we are ready to prove the main proposition.
Proof of Proposition 3.1. We choose continuous functions β1 , β2 : R → [0, 1] satisfying
β1 (t) = 0 (t ≤ r0 ), β1 (t) = 1 (t ≥ r0 + 1),
√
√
β2 (t) = 0
t ≤ N k , β2 (t) = 1
t ≥ r0 + N k .
S
Let x ∈ X. Recall that we introduced ∂(x) = n∈Zk ∂W (x, n). We define px : Γ1 → [0, 1]
and ux = (ux (λ))λ∈Γ1 ∈ ℓ∞ (Γ1 ) as follows: For λ ∈ Γ1
• If there exists n ∈ Zk satisfying λ ∈ (n + Γ) ∩ W (x, n) then
px (λ) =β1 (d(λ, ∂(x))) ,
ux (λ) =β2 (d(λ, ∂(x))) {−f (x)(λ)
+ G Π−n+W (x,n)(T n x), wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk (λ − n)}.
• Otherwise we set px (λ) = 0 and ux (λ) = 0.
px is an admissible function in the sense of Definition 4.2 (2). It follows from Property
6.5 (1) with f (x)(λ) = f (T n x)(λ − n) that
(6.12)
||ux ||∞ < δ ′ .
Since the tiles W (x, n) and the weight functions w(x, n) depend continuously on x ∈ X,
the numbers px (λ) and ux (λ) depend continuously on x for each fixed λ ∈ Γ1 . We set
g1 (x) = f (x) + Ψ(px , ux ) ∈ B(a1 , . . . , ak )
where Ψ is the interpolating function introduced in Section 4. By the continuity of Ψ
(Proposition 4.9), g1 (x) depends continuously on x ∈ X. Since the tiles W (x, n) and
the weight functions w(x, n) satisfy the natural Zk -equivariance, px (λ) and ux (λ) also
satisfy the Zk -equivariance (i.e. pT n x (λ) = px (λ + n) and uT n x (λ) = ux (λ + n)). The
interpolating function Ψ also satisfies it (Lemma 4.7 (3)). Therefore the map X ∋ x 7→
g1 (x) ∈ B1 (a1 , . . . , ak ) is Zk -equivariant. By Lemma 4.7 (2) and (6.12)
(6.13)
||g1 (x) − f (x)||L∞ (Rk ) = ||Ψ(px , ux )||L∞ (Rk )
< 2K0 δ ′ <
δ
2
(we assumed 4K0 δ ′ < δ in (6.1)) .
EMBEDDING PROBLEM OF Zk -ACTIONS
55
Let ΦA,L0 ,L (x) = (Φ(x)1 , . . . , Φ(x)k ) : Ck → Ck be the tiling-like band-limited map
introduced in Subsection 5.4 for the parameters A, L0 , L in Notation 6.2. We define
g2 (x) : Rk → R by
!
k
X
δ
Re
Φ(x)i .
g2 (x) =
2kK1
i=1
√
It follows from ||Φ(x)||L∞ (Rk ) ≤ kK1 (Lemma 5.14 (1)) that
δ
||g2 (x)||L∞ (Rk ) ≤ .
2
By Lemma 5.14 (2) with L > 4/δ, the Fourier transform of each Φ(x)i |Rk is supported in
i−1
k−i
δ δ
δ δ
ai ai δ
def
× − ,
∆i = − ,
×
, (1 ≤ i ≤ k).
, +
4 4
2 2
2
4 4
(6.14)
Then the Fourier transform of g2 (x) is supported in
(6.15)
k
[
i=1
∆i ∪ (−∆i ),
(−∆i = {−ξ| ξ ∈ ∆i }).
Q
This is contained in ki=1 [−(ai + δ)/2, (ai + δ)/2]. So g2 (x) ∈ B(a1 + δ, . . . , ak + δ). The
map X ∋ x 7→ g2 (x) ∈ B(a1 + δ, . . . , ak + δ) is continuous and Zk -equivariant by the
corresponding properties of Φ(x) in Lemma 5.14 (3) and (4).
Finally we set g(x) = g1 (x) + g2 (x). By (6.13) and (6.14)
||f (x) − g(x)||L∞ (Rk ) < δ.
In particular ||g(x)||L∞ (Rk ) < 1 by the assumption ||f (x)||L∞ (Rk ) ≤ 1 − δ in the beginning
of the section. The map
X ∋ x 7→ g(x) ∈ B1 (a1 + δ, . . . , ak + δ)
is continuous and Zk -equivariant.
We need to prove that g : X → B1 (a1 + δ, . . . , ak + δ) is a δ-embedding with respect to
d. Suppose g(x) = g(y) for some x, y ∈ X. We would like to show d(x, y) < δ. It follows
from g(x) = g(y) that g1 (x) = g1 (y) and g2 (x) = g2 (y) because the Fourier transforms
Q
of g1 (x) and g1 (y) are supported in ki=1 [−ai /2, ai /2], which is disjoint with (6.15). The
equation g2 (x) = g2 (y) implies Φ(x)i = Φ(y)i for all 1 ≤ i ≤ k because 2k sets ∆i and −∆i
are disjoint with each other. So Φ(x) = Φ(y). Then it follows that W (x, n) = W (y, n)
and w(x, n) = w(y, n) for all n ∈ Zk because the tiles W (x, n) and the weight functions
w(x, n) are constructed from the tiling-like band-limited map Φ(x).
Case 1: Suppose d (0, ∂(x)) > L0 . Then there exists n ∈ Zk satisfying 0 ∈ IntL0 W (x, n).
For all λ ∈ (n + Γ) ∩ Intr0 +N √k W (x, n)
px (λ) = 1,
ux (λ) = −f (x)(λ) + G Π−n+W (x,n)(T n x), wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk (λ − n).
56
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
It follows from the interpolation property of Ψ in Lemma 4.7 (1) that for all λ ∈ (n +
Γ) ∩ Intr0 +N √k W (x, n)
g1 (x)(λ) = G Π−n+W (x,n)(T n x), wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk (λ − n),
(6.16)
g1 (y)(λ) = G Π−n+W (y,n) (T n y), wm (y, n) · π(T n+m y) m∈[−R,R)k ∩Zk (λ − n).
From IntL0 W (x, n) 6= ∅ (because 0 ∈ IntL0 W (x, n)) and (6.11)
ρ1 . . . ρk
dim (P (−n + W (x, n)) × Q (#(x, n))) <
Intr2 +N √k W (x, n)
2
1
≤ # Γ ∩ −n + Intr0 +N √k W (x, n) ,
2
s
X
by r2 = r0 +
(1/ρi )2 in (6.6) .
i
Therefore by Property 6.5 (2) the map
(6.17)
P (−n + W (x, n)) × Q (#(x, n)) → R
Γ∩ −n+Intr
(p, q) 7→ G(p, q)|Γ∩−n+Int
r0 +N
0 +N
√
√
k
W (x,n)
k W (x,n)
is an embedding. Thus g1 (x) = g1 (y) implies that Π−n+W (x,n)(T n x) = Π−n+W (y,n) (T n y).
Recall that the map Π−n+W (x,n) is an ε-embedding with respect to the distance d−n+IntW (x,n) .
It follows from 0 ∈ IntL0 W (x, n) that −n ∈ −n + IntW (x, n). Thus we get
d(x, y) ≤ d−n+IntW (x,n) (T n x, T n y) < ε < δ.
Case 2: Suppose d (0, ∂(x)) ≤ L0 . It follows from Proposition 5.16 (3) and (4) that
there exists n ∈ BR0 ∩ Zk satisfying IntL0 W (x, n) 6= ∅ and w−n (x, n) = w−n (y, n) = 1. As
in Case 1, we have the same formula (6.16) for all λ ∈ (n + Γ) ∩ Intr0 +N √k W (x, n). The
map (6.17) is also an embedding. Then the equation g1 (x) = g1 (y) implies that
wm (x, n) · π(T n+m x) m∈[−R,R)k ∩Zk = wm (y, n) · π(T n+m y) m∈[−R,R)k ∩Zk .
Since w−n (x, n) = w−n (y, n) = 1, we get π(x) = π(y). Thus d(x, y) < ε < δ because
π : X → Q is an ε-embedding with respect to d.
Now we have completed the proof of Main Theorem 2 (and hence the proof of Main
Theorem 1).
7. Open problems
Here we explain major open problems in the direction of the paper.
(1) From Main Theorem 1, we have a good understanding of when dynamical systems
Zk
under the assumption of the marker property. So
can be embedded in [0, 1]D
the next step is how to remove the assumption. We would like to propose
EMBEDDING PROBLEM OF Zk -ACTIONS
57
Conjecture 7.1. Let (X, Zk , T ) be a dynamical system. For a subgroup A ⊂ Zk
we define XA ⊂ X as the space of x ∈ X satisfying T a x = x for all a ∈ A. The
quotient group Zk /A naturally acts on XA . Then X can be embedded in the shift
Zk
if for every subgroup A ⊂ Zk the mean dimension of XA with respect
on [0, 1]D
to the (Zk /A)-action is smaller than D/2.
If Zk /A is a finite group, then the mean dimension of XA is just
dim XA
.
#(Zk /A)
When k = 1, Conjecture 7.1 is equivalent to [LT14, Conjecture 1.2]. Notice that
Zk
then for any subgroup A ⊂ Zk the system YA is naturally
if we set Y = [0, 1]D
k
Z /A
identified with [0, 1]D
, whose mean dimension is D. So Conjecture 7.1 can
k
be rephrased; if (X, Z , T ) satisfies
∀ subgroup A ⊂ Zk :
mdim(XA ) <
mdim(YA )
,
2
Zk
then it can be embedded in Y = [0, 1]D .
(2) Let Ω ⊂ Rk be a compact subset. We define B1 (Ω) as the space of continuous
functions f : Rk → C satisfying suppfˆ ⊂ Ω and ||f ||L∞ (Rk ) ≤ 1. The mean
dimension of the natural Zk -action on B1 (Ω) is equal to 2|Ω|. (Here notice that
f are complex-valued functions. The factor 2 comes from dim C = 2.) We would
like to ask when a dynamical system (X, Zk , T ) can be embedded in the shift on
B1 (Ω). By almost the same argument as the proof of Main Theorem 2, we can
prove
Theorem 7.2. Suppose Ω is a rectangle (i.e. congruent to a set [a1 , b1 ] × · · · ×
[ak , bk ]). If a dynamical system (X, Zk , T ) satisfies the marker property and
mdim(X) < |Ω| = (b1 − a1 ) × · · · × (bk − ak ),
then we can embed it in the shift on B1 (Ω).
The proof of this theorem is notationally more messy than the proof of Main
Theorem 2. So we concentrate on Main Theorem 2 in this paper.
If Ω is not a rectangle, then the method of this paper does not work directly.
Nevertheless, it seems reasonable to conjecture that if Ω is a “nice” set (e.g. a semialgebraic set) and if a dynamical system (X, Zk , T ) satisfies the marker property
and
mdim(X) < |Ω|
then X can be embedded in the shift on B1 (Ω). We hope to return to this problem
in a future.
58
YONATAN GUTMAN, YIXIAO QIAO, MASAKI TSUKAMOTO
(3) An ambitious question is how to generalize Main Theorems 1 and 2 to the actions
of noncommutative groups. In particular it is very interesting to see what kind
of signal analysis should be involved. We don’t have an answer even for nilpotent
groups.
References
[Aus88] J. Auslander, Minimal flows and their extensions, North-Holland, Amsterdam, 1988.
[Beu89] Collected works of Arne Beurling, Vol. 2, Harmonic Analysis, Edited by L. Carleson, P. Malliavan,
J. Neuberger, and J. Wermer, Birkhäuser, Boston-Basel-Berlin, 1989.
[CS72] M. Cornalba, B. Shiffman, A couterexample to the “Transcendental Bezout Problem”. Ann. of
Math. 96 (1972) 402-406.
[CT06] T.M. Cover, J.A. Thomas, Elements of information theory, second edition, Wiley, New York,
2006.
[DM72] H. Dym, H.P. McKean, Fourier series and integrals, Academic Press, New York-London, 1972.
[Gro99] M. Gromov, Topological invariants of dynamical systems and spaces of holomorphic maps: I,
Math. Phys. Anal. Geom. 2 (1999) 323-415.
[Gut12] Y. Gutman, Mean dimension and Jaworski-type theorems, Proceedings of the London Mathematical Society 111(4) (2015) 831-850.
[GLT16] Y. Gutman, E. Lindenstrauss, M. Tsukamoto, Mean dimension of Zk -actions, Geom. Funct.
Anal. 26 Issue 3 (2016) 778-817.
[GT] Y. Gutman , M. Tsukamoto, Embedding minimal dynamical systems into Hilbert cubes, preprint,
arXiv:1511.01802.
[Hay64] W.K. Hayman, Meromorphic functions, Clarendon Press, Oxford, 1964.
[HW41] W. Hurewicz, H. Wallman, Dimension theory, Princeton University Press, 1941.
[Hat02] A. Hatcher, Algebraic topology, Cambridge University Press, 2002.
[Jaw74] A. Jaworski, Ph.D. Thesis, University of Maryland (1974).
[Lig03] S.J. Lightwood, Morphisms from non-periodic Z2 -subshifts. I. Constructing embeddings from
homomorphisms, Ergodic Theory Dynam. Systems 23 (2003) 587–609.
[Lig04] S.J. Lightwood, Morphisms from non-periodic Z2 subshifts. II. Constructing homomorphisms to
square-filling mixing shifts of finite type. Ergodic Theory Dynam. Systems 24 (2004) 1227–1260.
[Lin99] E. Lindenstrauss, Mean dimension, small entropy factors and an embedding theorem, Inst. Hautes
Études Sci. Publ. Math. 89 (1999) 227-262.
[LT14] E. Lindenstrauss, M. Tsukamoto, Mean dimension and an embedding problem: an example, Israel
J. Math. 199 (2014) 573-584.
[LW00] E. Lindenstrauss, B. Weiss, Mean topological dimension, Israel J. Math. 115 (2000) 1-24.
[NW14] J. Noguchi, J. Winkelmann, Nevanlinna theory in several complex variables and Diophantine
approximation, Springer, Tokyo, 2014.
[OU12] A. Olevskii, A. Ulanovskii, On multi-dimensional sampling and interpolation, Anal. Math. Phys.
2 (2012) 149-180
[Sch66] L. Schwartz, Théorie des distributions, Hermann, Paris, 1966.
[Sha48] C.E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27 (1948) 379-423,
623-656.
[Spa66] E.H. Spanier, Algebraic topology, Springer-Verlag, New York, 1966.
EMBEDDING PROBLEM OF Zk -ACTIONS
Yonatan Gutman
Institute of Mathematics, Polish Academy of Sciences, ul.
Warszawa, Poland
E-mail address: [email protected]
59
Śniadeckich 8, 00-656
Yixiao Qiao
Institute of Mathematics, Polish Academy of Sciences, ul. Śniadeckich 8, 00-656
Warszawa, Poland – and – Department of Mathematics, University of Science and Technology of China, Hefei, Anhui 230026, P.R. China
E-mail address: [email protected]
Masaki Tsukamoto
Department of Mathematics, Kyoto University, Kyoto 606-8502, Japan
E-mail address: [email protected]
| 7cs.IT
|
Distributed Testing of Excluded Subgraphs
Pierre Fraigniaud∗1 , Ivan Rapaport†2 , Ville Salo‡2 , and Ioan Todinca3
1
arXiv:1605.03719v1 [cs.DC] 12 May 2016
2
CNRS and University Paris Diderot, France
DIM-CMM (UMI 2807 CNRS), Universidad de Chile, Chile
3
Université d’Orléans, France
Abstract
We study property testing in the context of distributed computing, under the classical
CONGEST model. It is known that testing whether a graph is triangle-free can be done in a
constant number of rounds, where the constant depends on how far the input graph is from
being triangle-free. We show that, for every connected 4-node graph H, testing whether a
graph is H-free can be done in a constant number of rounds too. The constant also depends
on how far the input graph is from being H-free, and the dependence is identical to the one
in the case of testing triangles. Hence, in particular, testing whether a graph is K4 -free, and
testing whether a graph is C4 -free can be done in a constant number of rounds (where Kk
denotes the k-node clique, and Ck denotes the k-node cycle). On the other hand, we show
that testing Kk -freeness and Ck -freeness for k ≥ 5 appear to be much harder. Specifically, we
investigate two natural types of generic algorithms for testing H-freeness, called DFS tester
and BFS tester. The latter captures the previously known algorithm to test the presence of
triangles, while the former captures our generic algorithm to test the presence of a 4-node
graph pattern H. We prove that both DFS and BFS testers fail to test Kk -freeness and
Ck -freeness in a constant number of rounds for k ≥ 5.
Keywords: property testing, decision and verification algorithms, CONGEST model.
∗
Additional support from ANR project DISPLEXITY, and Inria project GANG.
Additional support from CONICYT via Basal in Applied Mathematics, Núcleo Milenio Información y Coordinación en Redes ICM/FIC RC130003, Fondecyt 1130061.
‡
Additional support from FONDECYT project 3150552.
†
1
Introduction
Let P be a graph property, and let 0 < ǫ < 1 be a fixed parameter. According to the usual
definition from property testing [17], an n-node m-edge graph G is ǫ-far from satisfying P if
applying a sequence of at most ǫm edge-deletions or edge-additions to G cannot result in a
graph satisfying P. In the context of property testing, graphs are usually assumed to be stored
using an adjacency list, and a centralized algorithm has the ability to probe nodes, via queries
of the form (i, j) where i ∈ {1, . . . , n}, and j ≥ 0. The answer to a query (i, 0) is the degree
of node i, while the answer to a query (i, j) with j > 0 is the identity of the jth neighbor of
node i. After a small number of queries, the algorithm must output either accept or reject. An
algorithm Seq is a testing algorithm for P if and only if, for every input graph G,
G satisfies P =⇒ Pr[Seq accepts G] ≥ 32 ;
G is ǫ-far from satisfying P =⇒ Pr[Seq rejects G] ≥ 32 .
(An algorithm is 1-sided if it systematically accepts every graph satisfying P). The challenge
in this context is to design testing algorithms performing as few queries as possible.
In the context of distributed property testing [7], the challenge is not the number of queries
(as all nodes perform their own queries in parallel), but the lack of global perspective on the
input graph. The graph models a network. Every node of the network is a processor, and every
processor can exchange messages with all processors corresponding to its neighboring nodes in
the graph. After a certain number of rounds of computation, every node must output accept
or reject. A distributed algorithm Dist is a distributed testing algorithm for P if and only if,
for any graph G modeling the actual network,
G satisfies P =⇒ Pr[Dist accepts G in all nodes] ≥ 23 ;
G is ǫ-far from satisfying P =⇒ Pr[Dist rejects G in at least one node] ≥ 23 .
The challenge is to use as few resources of the network as possible. In particular, it is desirable that every processor could take its decision (accept or reject) without requiring data from
far away processors in the network, and that processors exchange messages of size respecting
the inherent bounds imposed by the limited bandwidth of the links. These two constraints
are well captured by the CONGEST model. This model is a classical model for distributed
computation [28]. Processors are given distinct identities, that are supposed to have values in
[1, nc ] in n-node networks, for some constant c ≥ 1. All processors start at the same time,
and then proceed in synchronous rounds. At each round, every processor can send and receive
messages to/from its neighbors, and perform some individual computation. All messages must
be of size at most O(log n) bits. So, in particular, every message can include at most a constant
number of processor identities. As a consequence, while every node can gather the identities of
all its neighbors in just one round, a node with large degree that is aware of all the identities
of its neighbors may not be able to send them all simultaneously to a given neighbor. The latter observation enforces strong constraints on distributed testing algorithms in the CONGEST
model. For instance, while the LOCAL model allows every node to gather its t-neighborhood
in t rounds, even just gathering the 2-neighborhood may require Ω(n) rounds in the CONGEST
model (e.g., in the Lollipop graph). As a consequence, detecting the presence of even a small
given pattern in a graph efficiently is not necessarily an easy task.
The presence or absence of a certain given pattern (typically, paths, cycles or cliques of
a given size) as a subgraph, induced subgraph, or minor, has a significant impact on graph
properties, and/or on the ability to design efficient algorithms for hard problems. This paper
investigates the existence of efficient distributed testing algorithms for the H-freeness property,
depending on the given graph H. Recall that, given a graph H, a graph G is H-free if and only
1
if H is not isomorphic to a subgraph of G, where H is a subgraph of a graph G if V (H) ⊆ V (G),
and E(H) ⊆ E(G). Recently, Censor-Hillel et al. [7] established a series of results regarding
distributed testing of different graph properties, including bipartiteness and triangle-freeness.
A triangle-free graph is a K3 -free graph or, equivalently, a C3 -free graph, where Kk and Ck
respectively denote the clique and the cycle on k vertices. The algorithm in [7] for testing
bipartiteness (of bounded degree networks) requires O(log n) rounds in the CONGEST model,
and the authors conjecture that this is optimal. However, quite interestingly, the algorithm for
testing triangle-freeness requires only a constant number of rounds, O(1/ǫ2 ), i.e., it depends
only on the (fixed) parameter ǫ quantifying the ǫ-far relaxation.
In this paper, we investigate the following question: what are the (connected) graphs H for
which testing H-freeness can be done in a constant number of rounds in the CONGEST model?
1.1
Our results
We show that, for every connected 4-node graph H, testing whether a graph is H-free can be
done in O(1/ǫ2 ) rounds. Hence, in particular, testing whether a graph is K4 -free, and testing
whether a graph is C4 -free can be done in a constant number of rounds. Our algorithm is
generic in the sense that, for all 4-node graphs H, the global communication structure of the
algorithm is the same, with only a variant in the final decision for accepting or rejecting, which
of course depends on H.
In fact, we identify two different natural generic types of testing algorithms for H-freeness.
We call the first type DFS tester, and our algorithm for testing the presence of 4-node patterns
is actually the DFS tester. Such an algorithm applies to Hamiltonian graphs H, i.e., graphs
H containing a simple path spanning all its vertices. It performs in |H| − 1 rounds. Recall
that, for a node set A, G[A] denotes the subgraph of G induced by A. At each round t of the
DFS tester, at every node u, and for each of its incident edges e, node u pushes a graph G[At ]
(where, initially, A0 is just the graph formed by u alone). The graph G[At ] is chosen u.a.r.
among the sets of graphs received from the neighbors at the previous round. More specifically,
upon reception of every graph G[At−1 ] at round t − 1, node u forms a graph G[At−1 ∪ {u}], and
the graph G[At ] pushed by u along e at round t is chosen u.a.r. among the collection of graphs
G[At−1 ∪ {u}] currently held by u.
We call BFS tester the second type of generic testing algorithm for H-freeness. The algorithm in [7] for triangle-freeness is a simplified variant of the BFS tester, and we prove that
the BFS tester can test K4 -freeness in O(1/ǫ2 ) rounds. Instead of guessing a path spanning H
(which may actually not exist for H large), the BFS tester aims at directly guessing all neighbors in H simultaneously. The algorithm performs in D − 1 rounds, where D is the diameter
of H. For the sake of simplicity, let us assume that H is d-regular. At each round, every node
u forms groups of d neighboring nodes. These groups may overlap, but a neighbor should not
participate to more than a constant number of groups. Then for every edge e = {u, v} incident
to u, node u pushes all partial graphs of the form G[At−1 ∪ {v1 , . . . , vt }] where v ∈ {v1 , . . . , vt },
At−1 is chosen u.a.r. among the graphs received at the previous round, and the vi ’s will be in
charge of checking the presence of edges between them and the other vj ’s.
We prove that neither the DFS tester, nor the BFS tester can test Kk -freeness in a constant
number of rounds for k ≥ 5, and that the same holds for testing Ck -freeness (with the exception
of a finite number of small values of k). This shows that testing Kk -freeness or Ck -freeness for
k ≥ 5 in a constant number of rounds requires, if at all possible, to design algorithms which
explore G from each node in a way far more intricate than just parallel DFSs or parallel BFSs.
Our impossibility results, although restricted to DFS and BFS testers, might be hints that
testing Kk -freeness and Ck -freeness for k ≥ 5 in n-node networks does require to perform a
2
number of rounds which grows with the size n of the network.
1.2
Related work
The CONGEST model has become a standard model in distributed computation [28]. Most of
the lower bounds in the CONGEST model have been obtained using reduction to communication
complexity problems [12, 24, 9]. The so-called congested clique model is the CONGEST model in
the complete graph Kn [11, 23, 25, 27]. There are extremely fast protocols for solving different
types of graph problems in the congested clique, including finding ruling sets [21], constructing
minimum spanning trees [20], and, closely related to our work, detecting small subgraphs [8, 10].
The distributed property testing framework in the CONGEST model was recently introduced
in the aforementioned paper [7], inspired from classical property testing [17, 18]. Distributed
property testing relaxes classical distributed decision [13, 14, 19], typically designed for the
LOCAL model, by ignoring illegal instances which are less than ǫ-far from satisfying the considered property. Without such a relaxation, distributed decision in the CONGEST model requires
non-constant number of rounds [9]. Other variants of local decision in the LOCAL model have
been studied in [2, 3], where each process can output an arbitrary value (beyond just a single bit
— accept or reject), and [4, 22], where nodes are bounded to perform a single round before to
output at most O(log n) bits. Distributed decision has been also considered in other distributed
environments, such as shared memory [15], with application to runtime verification [16], and
networks of finite automata [29].
2
Detecting Small Graphs Using a DFS Approach
In this section, we establish our main positive result, which implies, in particular, that testing
C4 -freeness and testing K4 -freeness can be done in constant time in the CONGEST model.
Theorem 1 Let H be a graph on four vertices, containing a P4 (a path on four vertices)
as a subgraph. There is a 1-sided error distributed property-testing algorithm for H-freeness,
performing in a constant number of rounds in the CONGEST model.
Proof. We show the theorem by exhibiting a generic distributed testing protocol for testing
H-freeness, that applies to any graph H on four vertices containing a P4 as a subgraph. The
core of this algorithm is presented as Algorithm 1. Note that the test H ⊆ G[u, u′ , v ′ , w′ ] at
step 4 of Algorithm 1 can be performed thanks to the bit b that tells about the only edge that
node u is not directly aware of. Algorithm 1 performs in just two rounds (if we omit the round
used to acquire the identities of the neighbors), and that a single O(log n)-bit message is sent
through every edge at each round. Clearly, if G is H-free, then all nodes accept.
Algorithm 1: Testing H-freeness for 4-node Hamiltonian H. Instructions for node u.
1
2
3
4
5
Send id(u) to all neighbors;
For every neighbor v, choose a received identity id(w) u.a.r., and send (id(w), id(u)) to v;
For every neighbor v, choose a received pair (id(w′ ), id(u′ )) u.a.r., and send
(id(w′ ), id(u′ ), id(u), b) to v, where b = 1 if w′ is a neighbor of u, and b = 0 otherwise;
For every received 4-tuple (id(w′ ), id(v ′ ), id(u′ ), b), check whether H ⊆ G[u, u′ , v ′ , w′ ];
If H ⊆ G[u, u′ , v ′ , w′ ] for one such 4-tuple then reject else accept.
In order to analyze the efficiency of Algorithm 1 in case G is ǫ-far from being H-free,
let us consider a subgraph G[{u1 , u2 , u3 , u4 }] of G containing H, such that (u1 , u2 , u3 , u4 ) is
3
a P4 spanning H. Let E be the event “at step 2, vertex u2 sends (id(u1 ), id(u2 )) to its
neighbor u3 ”. We have Pr[E] = 1/d(u2 ). Similarly, let E ′ be the event “at step 3, vertex u3 sends (id(u1 ), id(u2 ), id(u3 )) to its neighbor u4 ”. We have Pr[E ′ |E] = 1/d(u3 ). Since
Pr[E ∧ E ′ ] = Pr[E ′ |E] · Pr[E], it follows that
Pr[H is detected by u4 while performing Algorithm 1] ≥
1
.
d(u2 )d(u3 )
(1)
Note that the events E and E ′ only depend on the choices made by u2 for the edge {u2 , u3 } and
by u3 for the edge {u3 , u4 }, in steps 3 and 4 of Algorithm 1, respectively. Since these choices
are performed independently at all nodes, it follows that if H1 and H2 are edge-disjoint copies
of H in G, then the events E1 and E2 associated to them are independent, as well as the events
E ′ 1 and E ′ 2
The following result will be used throughout the paper, so we state it as a lemma for further
references.
Lemma 1 Let G be ǫ-far from being H-free. Then G contains at least ǫm/|E(H)| edge-disjoint
copies of H.
To establish Lemma 1, let S = {e1 , . . . , ek } be a smallest set of edges whose removal from G
results in an H-free graph. We have k ≥ ǫm. Let us then remove these edges from G according
to the following process. The edges are removed in arbitrary order. Each time an edge e is
removed from S, we select an arbitrary copy He of H containing e, we remove all the edges of
He from G, and we reset S as S \ E(He ). We proceed as such until we have exhausted all the
edges of S. Note that each time we pick an edge e ∈ S, there always exists a copy He of H
containing e. Indeed, otherwise, S \ {e} would also be a set whose removal from G results in
an H-free graph, contradicting the minimality of |S|. After at most k such removals, we get
a graph that is H-free, and, by construction, for every two edges e, e′ ∈ S, we have that He
and He′ are edge-disjoint. Every step of this process removes at most |E(H)| edges from S,
hence the process performs at least ǫm/|E(H)| steps before exhausting all edges in S. Lemma 1
follows.
Let us now define an edge {u, v} as important if it is the middle-edge of a P4 in one of the
ǫm/|E(H)| edge-disjoint copies of H constructed in the proof of Lemma 1. We denote by I(G)
the set of all important edges. Let N0 be the random variable counting the number of distinct
copies of H that are detected by Algorithm 1. As a direct consequence of Eq (1), we get that
X
1
.
E(N0 ) ≥
d(u)d(v)
{u,v}∈I(G)
Define an edge {u, v} of G as good if d(u)d(v) ≤ 4m|E(H)|/ǫ, and let g(G) denote the set of
good edges. Note that if there exists a constant γ > 0 such that |I(G) ∩ g(G)| ≥ γm, then the
expected number of copies of H detected during a phase is
X
1
γǫ
1
≥ γm
=
.
(2)
E(N0 ) ≥
d(u)d(v)
4m|E(H)|/ǫ
4|E(H)|
{u,v}∈I(G)∩g(G)
We now show that the number of edges that are both important and good is indeed at least a
3
fraction γ of the egdes, for some constant γ > 0. We first show that G has at least (1− 4|E(H)|
ǫ)m
P
good edges. Recall that u∈V (G) d(u) = 2m, and define N (u) as the set of all neighbors of
node u. We have
X
X
X
1 X
d(u)
d(v) ≤
d(u) m ≤ 2m2 .
d(u)d(v) =
2
{u,v}∈E(G)
u∈V (G)
v∈N (u)
4
u∈V (G)
Thus G must have at least (1 −
X
d(u)d(v) ≥
{u,v}∈E(G)
3
4|E(H)| ǫ)m
X
good edges, since otherwise
d(u)d(v) >
{u,v}∈E(G)\g(G)
3
4m|E(H)|
ǫm
= 3m2 ,
4|E(H)|
ǫ
3
contradicting the aforementioned 2m2 upper bound. Thus, G has at least (1 − 4|E(H)|
ǫ)m good
edges. On the other hand, since the number of important edges is at least the number of edgedisjoint copies of H in G, there are at least ǫm/|E(H)| important edges. It follows that the
ǫ
m. Therefore, by Eq. (2),
number of edges that are both important and good is at least 4|E(H)|
we get that
2
ǫ
E(N0 ) ≥
.
4|E(H)|
All the above calculations were made on the ǫm/|E(H)| edge-disjoint copies of H constructed
(0)
(0)
in the proof of Lemma 1. Therefore, if Xi denotes the random variable satisfying Xi = 1 if
P
(0)
ǫm/|E(H)|
(0)
the ith copy H is detected, and Xi = 0 otherwise, then we have N0 = i=1
Xi , and
(0)
the variables Xi , i = 1, . . . , ǫm/|E(H)|, are mutually independent. Let
T = 8 ln 3
4|E(H)|
ǫ
2
.
P −1
By repeating the algorithm T times, and defining N = Tt=0
Nt where Nt denotes the number
of copies of H detected at the tth independent repetition, we get
E(N ) ≥ 8 ln 3.
P −1 Pǫm/|E(H)| (t)
(t)
In fact, we also have N = Tt=0
Xi where Xi = 1 if the ith copy H is detected
i=1
(t)
at the tth iteration of the algorithm, and Xi = 0 otherwise. All these variables are mutually
independent, as there is mutual independence within each iteration, and all iterations are performed independently. Therefore, Chernoff bound applies (see Theorem 4.5 in [26]), and so, for
every 0 < δ < 1, we have
2
Pr[N ≤ (1 − δ)E[N ]] ≤ e−δ E[N ]/2 .
By taking δ =
1
2
we get
Pr[N ≤ 4 ln 3] ≤
1
.
3
Therefore, a copy of H is detected with probability at least 23 , as desired, which completes the
proof of Theorem 1.
Remark. Theorem 1 requires the existence of a P4 in the graph H. All connected graphs H
of four vertices satisfy this condition, with the only exception of the star K1,3 (a.k.a. the claw ).
Nevertheless, detecting whether a graph G has a star K1,3 as a subgraph is trivial (every node
rejects whenever its degree at least three).
3
Limits of the DFS Approach
Algorithm 1 can be extended in a natural way to any k-node graph H containing a Hamiltonian
path, as follows. Given a graph G = (V, E), and A ⊆ V , let G[A] = (A, EA ) denote the subgraph
of G induced by A (i.e., for every two nodes u and v in A, {u, v} ∈ EA ⇐⇒ {u, v} ∈ E).
5
The extension of Algorithm 1 to Hamiltonian graphs H is depicted in Algorithm 2. At the first
round, every vertex u sends its identifier to its neighbors, and composes the d(u) graphs formed
by the edge {u, v}, one for every neighbor v. Then, during the k − 2 following rounds, every
node u forwards through each of its edges one of the graphs formed a the previous round.
Algorithm 2: Testing H-freeness: Hamiltonian H, |V (H)| = k. Instructions for node u.
8
send the 1-node graph G[u] to every neighbor v;
form the graph G[{u, v}] for every neighbor v;
repeat k − 2 times
for every neighbor v do
choose a graph G[A] u.a.r. among those formed during the previous round;
send G[A] to v;
receive the graph G[A′ ] from v;
form the graph G[A′ ∪ {u}];
9
if H ⊆ G[A] for one of the graphs formed at the last round then reject else accept.
1
2
3
4
5
6
7
Let (u1 , u2 , . . . , uk ) be a simple path in G, and assume that G[{u1 , u2 , . . . , uk }] contains H.
If, at each round i, 2 ≤ i < k, vertex ui sends to ui+1 the graph G[{u1 , . . . , ui }], then, when the
repeat-loop completes, vertex uk will test precisely the graph G[{u1 , u2 , . . . , uk }], and thus H
will be detected by the algorithm.
Theorem 1 states that Algorithm 2 works fine for 4-node graphs H. We show that, k = 4 is
precisely the limit of detection for graphs that are ǫ-far from being H-free, even for the cliques
and the cycles.
Theorem 2 Let H = Kk for arbitrary k ≥ 5, or H = Ck for arbitrary odd k ≥ 5. There
exists a graph G that is ǫ-far from being H-free in which any constant number of repetitions of
Algorithm 2 fails to detect H, with probability at least 1 − o(1).
For the purpose of proving Theorem 2, we use the following combinatorial result, which
extends Lemma 7 of [1], where the corresponding claim was proved for k = 3, with a similar
proof. The bound on p′ is not even nearly optimal in Lemma 2 below, but it is good enough
for our purpose1 .
Lemma 2 Let k be a constant. For any sufficiently large p, there exists a set X ⊂ {0, . . . , p−1}
of size p′ ≥ p
log log p+4
1− log log
log p
k−1
X
such that, for any k elements x1 , x2 , . . . , xk of X,
xi ≡ (k − 1)xk
(mod p)
=⇒
x1 = · · · = xk−1 = xk .
i=1
k
j
Proof. Let b = ⌊log p⌋ and a = logloglogp p . Take p sufficiently large so that a < b/k is satisfied.
X is a set of integers encoded in base b, on a b-ary digits, such that the digits of each x ∈ X are
a permutation
Pa−1 of i{0, 1, . . . , a − 1}. More formally, for any permutation π over {0, . . . , a − 1}, let
Nπ = i=0 π(i)b . Then, let us set X = {Nπ | π is a permutation of {0, . . . , a − 1}}. Observe
that different permutations π and π ′ yield different numbers Nπ and Nπ′ because these numbers
have different digits in base b. Hence X has p′ = a! elements. Using the inequality z! > (z/e)z
as in [1] (Lemma 7), we get that a! ≥ p1−
log log log p+4
log log p
1
, as desired.
The interested reader can consult
[30] for the state-of-the-art on such combinatorial constructions, in partic√
′
1−c/ log p
, for a constant c depending on k.
ular constructions for p ≥ p
6
log p
Now, for any x ∈ X, we have x ≤ p/k. Indeed, x < a·ba−1 ≤ k1 ba , and ba ≤ (log p) log log p = p.
Consequently, the modulo in the statement of the Lemma becomes
Pk−1 irrelevant, and we will simply
consider integer sums. Let x1 , . . . , xk−1 , xk in X, such that l=1 xi = (k − 1)xk . Viewing the
xi ’s as integers in base b, and having in mind that all digits are smaller than b/k, we get that
the equality must hold coordinate-wise. For every 1 ≤ l ≤ k, let πl be the permutation such
that xl = Nπl . For every i ∈ 0, . . . , a − 1, we have
k−1
X
πl (i) = (k − 1)πk (i).
l=1
By the Cauchy-Schwarz inequality applied to vectors (π1 (i), . . . , πk−1 (i)) and (1, . . . , 1), for
every i ∈ {0, . . . , a − 1}, we also have
k−1
X
(πl (i))2 ≥ (k − 1) (πk (i))2 .
l=1
Moreover equality holds if and only if π1 (i) = · · · = πk−1 (i) = πk (i). By summing up
P the 2a
inequalities induced by the a coordinates, observe that both sides sum to exactly (k−1) a−1
i=0 i .
Therefore, for every i, the Cauchy-Schwarz inequality is actually an equality, implying that the
ith digit is identical in all the k integers x1 , . . . , xk . As a consequence, x1 = · · · = xk−1 = xk ,
which completes the proof.
Proof of Theorem 2. Assume that G[{u1 , u2 , . . . , uk }] contains H, where (u1 , u2 , . . . , uk ) is
a path of G. For 2 ≤ i ≤ k − 1, let us consider the event “at round i, vertex ui sends the
graph G[u1 , . . . , ui }] to ui+1 ”. Observe that this event happens with probability d(u1 i ) because
ui choses which subgraph to send uniformly at random among the d(ui ) constructed subgraphs.
With the same arguments as the ones used to establish Eq. (1), we get
Pr[H is detected along the path (u1 , . . . , uk )] =
1
.
d(u2 )d(u3 ) . . . d(uk−1 )
(3)
We construct families of graphs which will allow us to show, based on that latter equality, that
the probability to detect a copy of H vanishes with the size of the input graph G. We actually
use a variant of the so-called Behrend graphs (see, e.g., [1, 5]), and we construct graph families
indexed by k, and by a parameter p, that we denote by BC(k, p) for the case of cycles, and by
BK(k, p) for the case of cliques. We prove that these graphs are ǫ-far from being H-free, while
the probability that Algorithm 2 detects a copy of H in these graphs goes to 0.
Let us begin with the case of testing cycles. Let p be a large prime number, and let X be
log log log p+4
a subset of {0, . . . , p − 1} of size p′ ≥ p1− log log p , where p′ is as defined in Lemma 2. Graph
BC(k, p) is then constructed as follows. The vertex set V is the disjoint union of an odd number
k of sets, V 0 , V 2 , . . . V k−1 , of p elements each. For every l, 0 ≤ l ≤ k − 1, let uli , i = 0, . . . , p − 1
be the nodes in V l so that
V l = {uli | i ∈ {0, . . . , p − 1}}.
For every i ∈ {0, . . . , p − 1} and every x ∈ X, edges in BC(k, p) form a cycle
k−1
Ci,x = (u0i , . . . , uli+lx , ul+1
i+(l+1)x , . . . , ui+(k−1)x ),
where the indices are taken modulo p. The cycles Ci,x form a set of pp′ edge-disjoint copies of
Ck in BC(k, p). Indeed, for any two distinct pairs (i, x) 6= (i′ , x′ ), the cycles Ci,x and Ci′ ,x′ are
7
edge-disjoint. Otherwise there exists a common edge e between the two cycles. It can be either
between two consecutive layers V l and V l+1 , or between V 0 and V k−1 . There are two cases. If
′
′
′
′
e = {uly , ul+1
z } we must have y = i + lx = i + lx and z = i + (l + 1)x = i + (l + 1)x , where
equalities are taken modulo p, and, as a consequence, (i, x) = (i′ , x′ ). If e = {u0y , uzk−1 } then we
have y = i = i′ and z = i + (k − 1)x′ = i′ + (k − 1)x′ , and, since p is prime, we also conclude
that (i, x) = (i′ , x′ ).
We now show that any k-cycle has exactly one vertex in each set V l , for 0 ≤ l < k − 1. For
this purpose, we focus on the parity of the layers formed by consecutive vertices of a cycle. The
“short” edges (i.e., ones between consecutive layers) change the parity of the layer, and hence
every cycle must include “long” edges (i.e., ones between layers 0 and k − 1). However, long
edges do not change the parity of the layer. Therefore, every cycle contains an odd number of
long edges, and an even number of short edges. For this to occur, the only possibility is that
the cycle contains a vertex from each layer.
Next, we show that any cycle of k vertices in BC(k, p) must be of the form Ci,x for some pair
k−1
(i, x). Let C = (u0y0 , . . . ulyl , ul+1
yl+1 , . . . , uyk−1 ) be a cycle in BC(k, p). For every l = 1, . . . , k − 1,
l
let xl = yl − yl−1 mod p. We have xl ∈ X because the edge {ul−1
yl−1 , uyl } is in some cycle Ci,xl .
} is in the cycle Cy0 ,xk . In particular we must
Also set xk ∈ X such that the edge {u0y0 , uyk−1
k−1
have that yk−1 = y0 + (k − 1)xk . It follows that yk−1 = y0 + (k − 1)xk = y0 + x1 + x2 + · · · + xk−1 .
By Lemma 2, we must have x1 = · · · = xk−1 = xk , so C is of the form Ci,x .
It follows from the above that BC(k, p) has exactly pp′ edge-disjoint cycles of k vertices.
Since BC(k, p) has n = kp vertices, and m = kpp′ edges, BC(k, p) is ǫ-far from being Ck -free,
for ǫ = k1 . Also, each vertex of BC(k, p) is of degree 2p′ because each vertex belongs to p′
edge-disjoint cycles.
Let us now consider an execution of Algorithm 2 for input BC(k, p). As BC(k, p) is regular
2k
to detect any given cycle C
of degree d = 2p′ , this execution has probability at most dk−2
of k vertices. Indeed, C must be detected along one of the paths formed by its vertices in
graph BC(k, p), there are at most 2k such paths in C (because all Ck ’s in BC(k, p) are induced
subgraphs, and paths are oriented), and, by Eq. (3), the probability of detecting the cycle along
1
. Therefore, applying the union bound, the probability of detecting a
one of its paths is dk−2
2k
given cycle C is at most dk−2
.
′
Since there are pp edge-disjoint cycles, the expected number of cycles detected in one execu2kpp′
tion of Algorithm 2 is at most (2p
′ )k−2 . It follows that the expected number of cycles detected by
repeating the algorithm T times is at most
2kpT
.
2(2p′ )k−3
Consequently, the probability that the al-
2kpT
′
1−o(1) ,
gorithm detects a cycle is at most 2(2p
′ )k−3 . Plugging in the fact that, by Lemma 2, p = p
we conclude that, for any constant T , the probability that T repetitions of Algorithm 2 detect
a cycle goes to 0 when p goes to ∞, as claimed.
The case of the complete graph is treated similarly. Graphs BK(k, p) are constructed in
a way similar to BC(k, p), as k-partite graphs with p vertices in each partition (in particular, BK(k, p) also has n = kp vertices). The difference with BC(k, p) is that, for each pair
(i, x) ∈ {0, . . . , p − 1} × X, we do not add a cycle, but a complete graph Ki,x on the vertex
k−1
set {u0i , . . . , uli+lx , ul+1
i+(l+1)x , . . . , ui+(k−1)x }. By the same arguments as for BC(k, p), BK(k, p)
contains contains exactly pp′ edge-disjoint copies of Kk (namely Ki,x , for each pair (i, x)). This
fact holds even for even values of k, because any k-clique must have
a vertex in each layer, no
matter the parity of k. Thus, in particular BK(k, p) has m = k2 pp′ edges, and every vertex
2
.
is of degree d = (k − 1)p′ . The graph BK(k, p) is ǫ-far from being Kk -free, for ǫ = k(k−1)
k!
The probability that Algorithm 2 detects a given copy of Kk is at most dk−2
. Indeed, a given
Kk has k! (oriented) paths of length k, and, by Eq. (3), the probability that the algorithm
8
detects this copy along a given path is
1
.
dk−2
The expected number E[N ] of Kk ’s detected in
′
T pp
k! pT
T runs of Algorithm 2 is, as for BC(k, p), at most k!dk−2
= (k−1)k−2
. Therefore, since
(p′ )k−3
Pr[N 6= 0] ≤ E[N ], we get that the probability that the algorithm detects some Kk goes to 0
as p goes to ∞. It follows that the algorithm fails to detect Kk , as claimed.
Remark. The proof that Algorithm 2 fails to detect Ck for odd k ≥ 5, can be extended to all
(odd or even) k ≥ 13, as well as to k = 10. The cases of C6 , C8 , are C12 are open, although we
strongly believe that Algorithm 2 also fails to detect these cycles in some graphs.
4
Detecting Small Graphs Using a BFS Approach
We discuss here another very natural approach, extending the algorithm proposed by CensorHillel et al. [7] for testing triangle-freeness. In the protocol of [7], each node u samples two neighbors v1 and v2 uniformly at random, and asks them to check the presence of an edge between
them. We generalize this protocol as follows. Assume that the objective is to test H-freeness,
for a graph H containing a universal vertex. Each node u samples d(u) sets S1 , . . . , Sd(u) , of
|V (H)| − 1 neighbors each. For each i = 1, . . . , d(u), node u sends Si to all its neighbors in Si ,
asking them to check the presence of edges between them, and collecting their answers. Based
on these answers, node u can tell whether G[Si ∪ {u}] contains H. We show that this very
simple algorithm can be used for testing K4 -freeness.
Theorem 3 There is a 1-sided error distributed property-testing algorithm for K4 -freeness,
performing in a constant number of rounds in the CONGEST model.
Proof. Again, we show the theorem by exhibiting a generic distributed testing protocol for
testing H-freeness, that applies to any graph H on four vertices with a universal vertex. The
core of this algorithm is presented as Algorithm 3 where all calculations on indices are performed
modulo d = d(u) at node u. This algorithm is presented for a graph H with k nodes.
Algorithm 3: Testing H-freeness for H with a universal vertex. Instructions for node u
of degree d. We let k = |V (H)|.
1
2
3
4
5
6
7
8
9
send id(u) to all neighbors;
index the d neighbors v0 , . . . , vd−1 in increasing order of their IDs;
pick a permutation π ∈ Σd of {0, 1, . . . , d − 1}, u.a.r.;
for each i ∈ {0, . . . , d − 1} do
Send (id(vπ(i) ), id(vπ(i+1) ), . . . , id(vπ(i+k−2) )) to vπ(i) , vπ(i+1) , . . . , vπ(i+k−2) ;
for each i ∈ {0, . . . , d − 1} do
for each of the k − 1 tuples (id(w(1) ), . . . , id(w(k−1) )) received from vi do
Send (b(1) , . . . , b(k−1) ) to vi where b(j) = 1 iff u = w(j) or {u, w(j) } ∈ E;
If ∃i ∈ {0, . . . , d − 1} s.t. H ⊆ G[u, vπ(i) , . . . , vπ(i+k−2) ] then reject else accept.
At Step 3, node u picks a permutation π u.a.r., in order to compose the d(u) sets S1 , . . . , Sd(u) ,
which are sent in parallel at Steps 4-5. At Step 8, every node u considers separately each of
the k − 1 tuples of size k − 1 received from each of its neighbors, checks the presence of edges
between u and each of the nodes in that tuple, and sends back the result to the neighbor from
which it received the tuple. Finally, the tests H ⊆ G[u, vπ(i) , vπ(i+1) , . . . , vπ(i+k−2) ] performed at
the last step is achieved thanks to the (k − 1)-tuple of bits received from each of the neighbors
9
vπ(i) , vπ(i+1) , . . . , vπ(i+k−2) , indicating the presence or absence of all the edges between these
nodes. Note that exactly 2k − 5 IDs are actually sent through each edges at Steps 4-5, because
of the permutation shifts. Similarly, 2k − 5 bits are sent through each edge at Steps 6-8.
Therefore Algorithm 3 runs in a constant number of rounds in the CONGEST model.
We now show that, for any given G which is ǫ-far from being K4 -free, Algorithm 3 for
H = K4 rejects G with constant probability.
Let K be a copy of K4 containing a node u. Note that d(u) ≥ k − 1 (this condition will
be implicitly used in the sequel). Observe that, if u samples the vertices of K \ {u} (Step 5 of
Algorithm 3), then u will detect K. Let us first prove that
d(u)
Pr[u detects K] = d(u)/
.
(4)
k−1
Indeed, among the d(u)! permutations π of Σd(u) , the ones that sample K \ {u} are those
where the vertices of K \ {u} appear consecutively as vπ(i) , . . . , vπ(i+d−1) , for some i, 0 ≤ i ≤
d(u)−1 (recall that indices are taken modulo d in Algorithm 3). We say that we insert a sequence
(y0 , . . . yk−2 ) into a sequence (x0 , . . . , xi , xi+1 . . . , xd(u)−k ) starting from position i ≤ d(u)−k+1,
for creating the sequence
(x0 , . . . , xi−1 , y0 , . . . , yk−2 , xi , . . . , xd(u)−k ).
If i > d(u) − k + 1, the insertion of (y0 , . . . yk−2 ) into (x0 , . . . , xd(u)−k ) at position i means the
sequence
(yd(u)−i , . . . , yk−2 , x0 , . . . , xd(u)−k , y0 , . . . , yd(u)−i−1 ).
The permutations that sample K\{u} are the permutations obtained from one of the (d(u) − k + 1)!
permutations of the vertices of N (u) \ K by inserting one of the (k − 1)! permutations of K \ {u}
starting from position i, 0 ≤ i ≤ d(u) − 1, which proves Equation 4.
Since G is ǫ-far from being K4 -free, it follows from Lemma 1 that the graph G contains a
family of ǫm
6 edge-disjoint copies of K4 . For each vertex u, denote by c(u) the number of copies
(i)
in this family that contain u. For i = 0, . . . , c(u) − 1, let Xu be the random variable indicating
whether u detects the ith copy of K4 incident to it, and denote by Xu the random variable
indicating whether u detects at least one of these copies. We have:
Pr[Xu = 1] = Pr[(Xu(0) = 1) ∨ (Xu(1) = 1) ∨ · · · ∨ (Xu(c(u)−1) = 1)].
By the inclusion-exclusion principle and Bonferroni’s inequality [6] (Exercise 1.7 in [26]), we get
Pr[Xu = 1] ≥
c(u)
X
Pr[Xu(i) = 1] −
i=1
X
Pr[Xu(i) = 1 ∧ Xu(j) = 1].
(5)
1≤i<j≤c(u)
(i)
Now, for every i, Pr[Xu = 1] is given by Equation 4. In particular,
Pr[Xu(i) = 1] =
(k − 1)!
,
(d(u) − 1)(d(u) − 2) . . . (d(u) − k + 2)
which, for k = 4, gives
Pr[Xu(i) = 1] ≥
6
,
(d(u) − 1)(d(u) − 2)
10
(6)
and
c(u)
X
Pr[Xu(i) = 1] ≥
i=1
6c(u)
.
(d(u) − 1)(d(u) − 2)
(7)
We now claim that, for any pair i, j such that 0 ≤ i < j ≤ c(u), we have
Pr[Xu(i) = 1 ∧ Xu(j) = 1] ≤
d(u)2 ((k − 1)!)2 (d(u) − 2(k − 1))!
.
d(u)!
Indeed, let K i and K j be edge-disjoint copies of K4 containing u corresponding to the random
(i)
(j)
(i)
variables Xu and Xu . Among the d(u)! permutations of N (u), those who will satisfy Xu =
(j)
Xu = 1 are such that the elements of K i \ {u} and of K j \ {u} appear consecutively (in the
cyclic order). Such a permutation is obtained from one of the (d(u) − 2(k − 1))! permutations
of N (u) \ (K i ∪ K j ), by inserting one of the (k − 1)! permutations of K i \ {u}, and one of the
(k − 1)! permutations of K j \ {u}, each at one of the d(u) possible positions between 0 and
d(u) − 1. The inequality holds automatically if d(u) ≥ 2(k − 1), as otherwise there cannot be
two edge-disjoint copies of Kk containing u. In particular, for k = 4, we obtain
Pr[Xu(i) = 1 ∧ Xu(j) = 1] ≤
36d(u)
36d(u)2 (d(u) − 6)!
=
.
d(u)!
(d(u) − 1)(d(u) − 2) . . . (d(u) − 5)
Therefore,
X
Pr[Xu(i)
1≤i<j≤c(u)
=1∧
Xu(j)
= 1] ≤
c(u)
36d(u)
.
2 (d(u) − 1)(d(u) − 2) . . . (d(u) − 5)
For each u, we have c(u) ≤ d(u)
3 because c(u) counts edge-disjoint copies of K4 containing u. So
d(u) − 3
c(u)
c(u)(c(u) − 1)
≤ c(u) ·
,
=
2
6
2
and
X
0≤i<j≤c(u)
Pr[Xu(i) = 1 ∧ Xu(j) = 1] ≤ c(u)
6d(u)
.
(d(u) − 1)(d(u) − 2)(d(u) − 4)(d(u) − 5)
(8)
By Eq. (5), and by subtracting Eq. (7) and (8), we obtain
d(u)
6c(u)
1−
.
Pr[Xu = 1] ≥
(d(u) − 1)(d(u) − 2)
(d(u) − 4)(d(u) − 5)
If d(u) ≥ 8, the the expression in the parenthesis is at least 1/3. Therefore, if d(u) ≥ 8 then
Pr[Xu = 1] ≥
2c(u)
.
d(u)2
For vertices u such that d(u) < 8, observe that c(u) ≤ 2. Therefore, thanks to Eq. (6), we deduce
2c(u)
that the probability that u detects a K4 is at least d(u)
2 . Consequently, for any vertex u,
Pr[Xu = 1] ≥
11
2c(u)
.
d(u)2
(9)
Let Y denote the random variable counting thePnumber of vertices u such that u detects one of
the ǫm
u∈V (G) Xu and, by Equation 9,
6 edge-disjoint copies of K4 . Hence Y =
E[Y ] ≥
X 2c(u)
d(u)2
u∈V (G)
Let us prove that this expectation is lower bounded by a positive constant. We say that the
vertex u is good if d(u) ≤ 24c(u)
ǫ . Otherwise, u is bad. The set of good vertices is denoted by
Good(G) and the set of bad vertices is denoted by Bad(G). Observe that
X
ǫm
c(u) <
,
12
u∈Bad(G)
because
2m =
X
X
d(u) ≥
u∈V (G)
X
d(u) >
u∈Bad(G)
u∈Bad(G)
24c(u)
.
ǫ
ǫm
6
Therefore, among the
edge-disjoint copies of K4 , at least half do not contain bad nodes, i.e.,
all their nodes are good. Hence, the number of edges between good vertices is at least ǫm
2 .
Now, we claim that among good vertices, at least half have degree at most 8g
ǫ . By contra′
diction, let g = |Good(G)| and assume that there is a set Good (G) ⊆ Good(G) containing at
least 2g vertices, each of degree greater than 8g
ǫ . Then
m≥
1
2
X
d(u) >
u∈Good′ (G)
1 g 8g
2g2
· ·
=
.
2 2 ǫ
ǫ
The number of edges between good vertices is at most
g
2
and at least
ǫm
2 .
In particular,
ǫ 2g2
g
ǫm
> ·
= g2 ,
≥
2
2 ǫ
2
a contradiction.
It follows from the above that
E[Y ] ≥
X
2
u∈Good(G)
and, by summing only over the at least
g
2
c(u)
≥
d(u)2
X
u∈Good(G)
2
c(u) 1
d(u) d(u)
good vertices of degree at most
E[Y ] ≥ 2 ·
8g
ǫ ,
we conclude that
ǫ
ǫ2
g ǫ
·
·
=
.
2 24 8g
192
Recall that Y is the sum of independent boolean variables Xu . Let N be the random variable
counting the number of vertices detecting a K4 in T iterations of Algorithm 3, so N = T · Y .
For T = 8 ln 3 · 192
, we have that
ǫ2
E[N ] ≥ 8 ln 3.
Chernoff bound applies to variable N and, as in the proof of Theorem 1, we conclude that
Pr[N ≤ 4 ln 3] ≤ 31 . Altogether, a copy of K4 is detected with probability at least 23 , which
completes the proof.
12
5
Limits of the BFS Approach
As it happened with the DFS-based approach, the BFS-based approach fails to generalize to
large graphs H. Actually, it already fails for K5 .
Theorem 4 Let k ≥ 5. There exists a graph G that is ǫ-far from being Kk -free in which any
constant number of repetitions of Algorithm 3 fails to detect any copy of Kk , with probability at
least 1 − o(1).
Proof. The family of graphs BK(k, p) constructed in the proof of Theorem 2 for defeating
Algorithm 2 can also be used to defeat Algorithm 3. Recall that those graphs have n = kp
vertices, m = k2 pp′ edges, and every vertex is of degree d = (k − 1)p′ , for p′ = p1−o(1) .
Moreover, they have exactly pp′ copies of
Kk , which are pairwise edge-disjoint. BK(k, p) is
k
ǫ-far from being Kk -free with ǫ = 1/ 2 . By Equation 4, for each copy K of Kk , and for
d
α
for some constant α > 0.
every u ∈ K, the probability that u detects K is d/ k−1
≤ dk−2
Therefore, when running the algorithm T times, it follows from the union bound that the
pp′
, which tends to 0 when p → ∞, for
expected number of detected copies of Kk is at most αkT
dk−2
any k ≥ 5. Consequently, the probability of detects at least one copy of Kk also tends to 0.
6
Conclusion and Further Work
We have proved that not only the presence of triangles can be tested in O(1) rounds in the
CONGEST model, but also the presence of any 4-node subgraph. On the other hand, we have also
proved that the natural approaches used to test such small patterns fail to detect larger patterns,
like the presence of Kk for k ≥ 5. Interestingly, as mentioned before, the lower bound techniques
for the CONGEST model are essentially based on reductions to communication complexity
problems. Such an approach does not seem to apply easily in the context of distributed testing.
The question of whether the presence of large cliques (or cycles) can be tested in O(1) rounds
in the CONGEST model is an intriguing open problem.
It is worth mentioning that our algorithms generalize to testing the presence of induced
subgraphs. Indeed, if the input graph G contains at least ǫm edge-disjoint induced copies of H,
for a graph H on four vertices containing a Hamiltonian path, then Algorithm 1 detects an
induced subgraph H with constant probability (the only difference is that, in the last line of
the algorithm, we check for an induced subgraph instead of just a subgraph). Moreover, if the
input contains ǫm edge-disjoint induced claws (i.e., induced subgraphs K1,3 ), then Algorithm 3
detects one of them with constant probability. Thus, for any connected graph H on four vertices,
distinguishing between graphs that do not have H as induced subgraph, and those who have
ǫm edge-disjoint induced copies of H can be done in O(1) rounds in the CONGEST model.
However, we point out that, unlike in the case of subgraphs, a graph that is ǫ-far from having
H as induced subgraph may not have many edge-disjoint induced copies of H.
13
References
[1] Noga Alon, Tali Kaufman, Michael Krivelevich, and Dana Ron. Testing triangle-freeness
in general graphs. SIAM J. Discrete Math., 22(2):786–819, 2008.
[2] Heger Arfaoui, Pierre Fraigniaud, David Ilcinkas, and Fabien Mathieu. Distributedly testing cycle-freeness. In 41st Graph-Theoretic Concepts in Computer Science (WG), volume
8747 of LNCS, pages 15–28, 2014.
[3] Heger Arfaoui, Pierre Fraigniaud, and Andrzej Pelc. Local decision and verification with
bounded-size outputs. In 15th Int. Symposium on Stabilization, Safety, and Security of
Distributed Systems (SSS), volume 8255 of LNCS, pages 133–147. Springer, 2013.
[4] Florent Becker, Adrian Kosowski, Martin Matamala, Nicolas Nisse, Ivan Rapaport, Karol
Suchan, and Ioan Todinca. Allowing each node to communicate only once in a distributed
system: shared whiteboard models. Distributed Computing, 28(3):189–200, 2015.
[5] Felix A Behrend. On sets of integers which contain no three terms in arithmetical progression. Proceedings of the National Academy of Sciences of the United States of America,
32(12):331, 1946.
[6] C.E. Bonferroni. Teoria statistica delle classi e calcolo delle probabilità. Pubblicazioni del
R. Istituto superiore di scienze economiche e commerciali di Firenze. Libreria internazionale
Seeber, 1936.
[7] Keren Censor-Hillel, Eldar Fischer, Gregory Schwartzman, and Yadu Vasudev. Fast distributed algorithms for testing graph properties. CoRR, abs/1602.03718, Feb. 2016.
[8] Keren Censor-Hillel, Petteri Kaski, Janne H. Korhonen, Christoph Lenzen, Ami Paz, and
Jukka Suomela. Algebraic methods in the congested clique. In ACM Symposium on Principles of Distributed Computing (PODC), pages 143–152, 2015.
[9] Atish Das-Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal
Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness
of distributed approximation. SIAM J. Comput., 41(5):1235–1265, 2012.
[10] Danny Dolev, Christoph Lenzen, and Shir Peled. “Tri, Tri Again”: Finding triangles and
small subgraphs in a distributed setting. In 26th International Symposium on Distributed
Computing (DISC), volume 7611 of LNCS, pages 195–209, 2012.
[11] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique
model. In ACM Symposium on Principles of Distributed Computing (PODC), pages 367–
376, 2014.
[12] Michael Elkin. An unconditional lower bound on the time-approximation trade-off for the
distributed minimum spanning tree problem. SIAM Journal on Computing, 36(2):433–456,
2006.
[13] Pierre Fraigniaud, Mika Göös, Amos Korman, and Jukka Suomela. What can be decided
locally without identifiers? In ACM Symposium on Principles of Distributed Computing
(PODC), pages 157–165, 2013.
[14] Pierre Fraigniaud, Amos Korman, and David Peleg. Local distributed decision. In 52nd
IEEE Symp. on Foundations of Computer Science (FOCS), pages 708–717, 2011.
14
[15] Pierre Fraigniaud, Sergio Rajsbaum, and Corentin Travers. Locality and checkability in
wait-free computing. Distributed Computing, 26(4):223–242, 2013.
[16] Pierre Fraigniaud, Sergio Rajsbaum, and Corentin Travers. On the number of opinions
needed for fault-tolerant run-time monitoring in distributed systems. In 5th International
Conference on Runtime Verification (RV), LNCS 8734, pages 92–107. Springer, 2014.
[17] Oded Goldreich, editor. Property Testing - Current Research and Surveys, volume 6390 of
LNCS. Springer, 2010.
[18] Oded Goldreich, Shari Goldwasser, and Dana Ron. Property testing and its connection to
learning and approximation. Journal of the ACM, 45(4):653–750, 1998.
[19] Mika Göös and Jukka Suomela:. Locally checkable proofs. In 30th ACM Symposium on
Principles of Distributed Computing (PODC), pages 159–168, 2011.
[20] James W. Hegeman, Gopal Pandurangan, Sriram V. Pemmaraju, Vivek B. Sardeshmukh,
and Michele Scquizzato. Toward optimal bounds in the congested clique: Graph connectivity and MST. In ACM Symposium on Principles of Distributed Computing (PODC),
pages 91–100, 2015.
[21] James W. Hegeman, Sriram V. Pemmaraju, and Vivek Sardeshmukh. Near-constanttime distributed algorithms on a congested clique. In 28th Int. Symposium on Distributed
Computing (DISC), pages 514–530, 2014.
[22] Jarkko Kari, Martin Matamala, Ivan Rapaport, and Ville Salo. Solving the induced subgraph problem in the randomized multiparty simultaneous messages model. In 22nd Int.
Colloquium on Structural Information and Communication Complexity (SIROCCO), volume 9439 of LNCS, pages 370–384. Springer, 2014.
[23] Christoph Lenzen. Optimal deterministic routing and sorting on the congested clique. In
ACM Symposium on Principles of Distributed Computing (PODC), pages 42–50, 2013.
[24] Zvi Lotker, Boaz Patt-Shamir, and David Peleg. Distributed MST for constant diameter
graphs. Distributed Computing, 18(6):453–460, 2006.
[25] Zvi Lotker, Elan Pavlov, Boaz Patt-Shamir, and David Peleg. MST construction in
O(log log n) communication rounds. In 15th ACM Symp. on Parallel Algorithms and Architectures (SPAA), pages 94–100, 2003.
[26] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and
Probabilistic Analysis. Cambridge University Press, 2005.
[27] Boaz Patt-Shamir and Marat Teplitsky. The round complexity of distributed sorting. In
ACM Symposium on Principles of Distributed Computing (PODC), pages 249–256, 2011.
[28] David Peleg. Distributed Computing: A Locality-sensitive Approach. SIAM, Philadelphia,
PA, USA, 2000.
[29] Fabian Reiter. Distributed graph automata. In 30th Annual ACM/IEEE Symposium on
Logic in Computer Science (LICS), pages 192–201, 2015.
[30] Tomasz Schoen and Ilya D. Shkredov. Roth’s theorem in many variables. Israel Journal
of Mathematics, 199(1):287–308, 2014.
15
| 8cs.DS
|
Exploiting variable associations to configure efficient
local search algorithms in large-scale binary integer
programsI
arXiv:1604.08448v2 [cs.DS] 12 May 2017
Shunji Umetani∗
Graduate School of Information Science and Technology, Osaka University,
1-5 Yamadaoka, Suita, Osaka, 565-0871, Japan
Abstract
We present a data mining approach for reducing the search space of local search
algorithms in a class of binary integer programs including the set covering and
partitioning problems. The quality of locally optimal solutions typically improves if a larger neighborhood is used, while the computation time of searching
the neighborhood increases exponentially. To overcome this, we extract variable
associations from the instance to be solved in order to identify promising pairs of
flipping variables in the neighborhood search. Based on this, we develop a 4-flip
neighborhood local search algorithm that incorporates an efficient incremental
evaluation of solutions and an adaptive control of penalty weights. Computational results show that the proposed method improves the performance of the
local search algorithm for large-scale set covering and partitioning problems.
Keywords: combinatorial optimization, heuristics, set covering problem, set
partitioning problem, local search
1. Introduction
The Set Covering Problem (SCP) and Set Partitioning Problem (SPP) are
representative combinatorial optimization problems that have many real-world
applications, such as crew scheduling (Barnhart et al., 1998; Hoffman & Padberg, 1993; Mingozzi et al., 1999), vehicle routing (Agarwal et al., 1989; Baldacci
et al., 2008; Bramel & Simchi-Levi, 1997; Hashimoto et al., 2009), facility location (Boros et al., 2005; Farahani et al., 2012) and logical analysis of data
(Boros et al., 2000; Hammer & Bonates, 2006). Real-world applications of SCP
and SPP are comprehensively reviewed in (Ceria et al., 1997) and (Balas &
Padberg, 1976), respectively.
IA
preliminary version of this paper was presented in (Umetani, 2015).
author. Tel.: +81 (6) 6879 7799.
Email address: [email protected] (Shunji Umetani)
∗ Corresponding
Preprint submitted to Elsevier
January 3, 2018
Given a ground set of m elements i ∈ M = {1, . . . , m}, n subsets Sj ⊆ M
(|Sj | ≥ 1), and their costs cj ∈ R (R is the set Sof real values) for j ∈ N =
{1, . . . , n}, we say that X ⊆ N is a cover
S of M if j∈X Sj = M holds. We also
say that X ⊆ N is a partition of M if j∈X Sj = M and Sj1 ∩ Sj2 = ∅ for all
j1 , j2 ∈ X hold. The goals of SCP and SPP are to find a minimum cost cover
and partition X of M , respectively. In this paper, we consider the following
class of Binary Integer Programs (BIPs) including SCP and SPP:
X
minimize
cj xj
subject to
j∈N
X
j∈N
X
j∈N
X
aij xj ≤ bi ,
i ∈ ML ,
aij xj ≥ bi ,
i ∈ MG ,
aij xj = bi ,
i ∈ ME ,
(1)
j∈N
xj ∈ {0, 1},
j ∈ N,
where aij ∈ {0, 1} and bi ∈ Z+ (Z+ is the set of nonnegative integer values).
We note that aij = 1 if i ∈ Sj holds and aij = 0 otherwise, and xj = 1 if j ∈ X
holds and xj = 0 otherwise. That is, a column vector aj = (a1j , . . . , amj )> of
the matrix (aij ) represents the corresponding subset Sj = {i ∈ M | aij = 1},
and the vector x also represents the corresponding cover (or partition) X =
{j ∈ N | xj = 1}. For notational convenience, we denote M = ML ∪ MG ∪ ME .
For each i ∈ M , let Ni = {j ∈ N | aij =P1} be the index set of subsets Sj that
contain the elements i, and let si (x) = j∈N aij xj be the left-hand side of the
ith constraint.
Continuous development of mathematical programming has much improved
the performance of exact and heuristic algorithms and this has been accompanied by advances in computing machinery. Many efficient exact and heuristic algorithms for large-scale SCP and SPP instances have been developed (Atamtürk
et al., 1995; Barahona & Anbil, 2000; Bastert et al., 2010; Borndörfer, 1998;
Boschetti et al., 2008; Caprara et al., 1999, 2000; Caserta, 2007; Ceria et al.,
1998; Linderoth et al., 2001; Umetani & Yagiura, 2007; Wedelin, 1995; Yagiura
et al., 2006), many of which are based on a variant of the column generation
method called the pricing method that reduces the number of variables to be
considered in the search by using Linear Programming (LP) and/or Lagrangian
relaxation. However, many large-scale SCP and SPP instances still remain unsolved because there is little hope of closing the large gap between the lower
and upper bounds of the optimal values. In particular, the equality constraints
of SPP often make the pricing method less effective because they often prevent
solutions from containing highly evaluated variables together. In this paper, we
consider an alternative approach for extracting useful features from the instance
to be solved with the aim of reducing the search space of local search algorithms
for large-scale SCP and SPP instances.
In the design of local search algorithms for combinatorial optimization prob2
lems, the quality of locally optimal solutions typically improves if a larger neighborhood is used. However, the computation time of searching the neighborhood
also increases exponentially. To overcome this, extensive research has investigated ways to efficiently implement neighborhood search, which can be broadly
classified into three types: (i) reducing the number of candidates in the neighborhood (Pesant & Gendreau, 1999; Shaw et al., 2002; Yagiura et al., 1999, 2006),
(ii) evaluating solutions by incremental computation (Michel & Van Hentenryck,
2000; Yagiura et al., 1999; Van Hentenryck & Michel, 2005; Voudouris et al.,
2001), and (iii) reducing the number of variables to be considered by using LP
and/or Lagrangian relaxation (Caprara et al., 1999; Ceria et al., 1998; Umetani
et al., 2013; Yagiura et al., 2006).
To suggest an alternative, we develop a data mining approach for reducing
the search space of local search algorithms. That is, we construct a k-nearest
neighbor graph by extracting variable associations from the instance to be solved
in order to identify promising pairs of flipping variables in the neighborhood
search. We also develop a 4-flip neighborhood local search algorithm that flips
four variables alternately along 4-paths or 4-cycles in the k-nearest neighbor
graph. We incorporate an efficient incremental evaluation of solutions and an
adaptive control of penalty weights into the 4-flip neighborhood local search
algorithm.
2. 2-flip neighborhood local search
Local Search (LS) starts from an initial solution x and then iteratively replaces x with a better solution x0 in the neighborhood NB(x) until no better
solution is found in NB(x). For some positive integer r, let the r-flip neighborhood NBr (x) be the set of solutions obtainable by flipping at most r variables in
x. We first develop a 2-Flip Neighborhood Local Search (2-FNLS) algorithm as
a basic component of our algorithm. In order to improve efficiency, the 2-FNLS
first searches NB1 (x), and then searches NB2 (x) \ NB1 (x) only if x is locally
optimal with respect to NB1 (x).
The BIP is NP-hard, and the (supposedly) simpler problem of judging the
existence of a feasible solution is NP-complete. We accordingly consider the
following formulation of the BIP that allows violations of the constraints and
introduce the following penalized objective function with penalty weights wi+ ∈
R+ (R+ is the set of nonnegative real values) for i ∈ ML ∪ ME and wi− ∈ R+
3
for i ∈ MG ∪ ME .
minimize
z(x) =
subject to
X
X
j∈N
j∈N
X
j∈N
X
X
cj x j +
wi+ yi+ +
X
wi− yi−
i∈MG ∪ME
i∈ML ∪ME
aij xj − yi+ ≤ bi ,
i ∈ ML ,
aij xj + yi− ≥ bi ,
i ∈ MG ,
aij xj − yi+ + yi− = bi ,
i ∈ ME ,
(2)
j∈N
xj ∈ {0, 1},
yi+ ≥ 0,
yi− ≥ 0,
j ∈ N,
i ∈ ML ∪ M E ,
i ∈ MG ∪ ME .
For a given x ∈ {0, 1}n , we can easily compute optimal yi+ = |si (x) − bi |+ and
yi− = |bi − si (x)|+ , where we denote |x|+ = max{x, 0}.
Because the region searched by a single application of LS is limited, LS
is usually applied many times. When a locally optimal solution is found, a
standard strategy is to update the penalty weights and to resume LS from the
obtained locally optimal solution. We accordingly evaluate solutions by using an
alternative function z̃(x), where the original penalty weight vectors w+ and w−
e + and w
e − , respectively, and these are adaptively controlled
are replaced by w
during the search (see Section 6 for details).
We first describe how 2-FNLS is used to search NB1 (x), which is called the
1-flip neighborhood. Let
(
∆z̃j↑ (x) j ∈ N \ X
∆z̃j (x) =
(3)
∆z̃j↓ (x) j ∈ X,
be the increase in z̃(x) due to flipping xj ← 1 − xj , where
X
X
∆z̃j↑ (x) = cj +
w
ei+ −
i∈Sj ∩(ML ∪ME )∩{l|sl (x)≥bl }
∆z̃j↓ (x)
= −cj −
X
i∈Sj ∩(MG ∪ME )∩{l|sl (x)<bl }
w
ei+
i∈Sj ∩(ML ∪ME )∩{l|sl (x)>bl }
w
ei− ,
+
X
w
ei− ,
i∈Sj ∩(MG ∪ME )∩{l|sl (x)≤bl }
(4)
are the increases in z̃(x) due to flipping xj = 0 → 1 and xj = 1 → 0, respectively. 2-FNLS first searches for an improved solution obtainable by flipping
xj ← 1 − xj for j ∈ N . If an improved solution exists, it chooses j with the
minimum value of ∆z̃j (x) and flips xj ← 1 − xj .
We next describe how 2-FNLS is used to search NB2 (x) \ NB1 (x), which is
called the 2-flip neighborhood. We derive conditions that reduce the number
of candidates in NB2 (x) \ NB1 (x) without sacrificing the solution quality by
expanding the results as shown in (Yagiura et al., 2006). Let ∆z̃j1 ,j2 (x) be the
increase in z̃(x) due to simultaneously flipping the values of xj1 and xj2 .
4
Lemma 1. If a solution x is locally optimal with respect to NB1 (x), then
∆z̃j1 ,j2 (x) < 0 holds only if Sj1 ∩ Sj2 6= ∅ and xj1 6= xj2 .
Proof. By the assumption of the lemma, ∆z̃j1 (x) ≥ 0 and ∆z̃j2 (x) ≥ 0 hold.
It is clear from (4) that ∆z̃j1 ,j2 = ∆z̃j1 (x) + ∆z̃j2 (x) ≥ 0 holds if Sj1 ∩ Sj2 = ∅.
We show that ∆z̃j1 ,j2 (x) ≥ 0 holds if Sj1 ∩ Sj2 6= ∅ and xj1 = xj2 . First,
we consider the case of xj1 = xj2 = 1. If si (x) = bi + 1 holds for i ∈ Sj1 ∩
Sj2 ∩ (ML ∪ ME ), then decrease of the violation yi+ partly cancels by flipping
xj1 = 1 → 0 and xj2 = 1 → 0 simultaneously. Similarly, if si (x) = bi + 1
holds for i ∈ Sj1 ∩ Sj2 ∩ (MG ∪ ME ), then a new violation yi− occurs by flipping
xj1 = 1 → 0 and xj2 = 1 → 0 simultaneously. We then have
∆z̃j1 ,j2 (x) = ∆z̃j↓1 (x) + ∆z̃j↓2 (x) +
X
w
ei+
i∈Sj1 ∩Sj2 ∩(ML ∪ME )∩{l|sl (x)=bl +1}
X
+
w
ei− ≥ 0. (5)
i∈Sj1 ∩Sj2 ∩(MG ∪ME )∩{l|sl (x)=bl +1}
Next, we consider the case of xj1 = xj2 = 0. If si (x) = bi − 1 holds
for i ∈ Sj1 ∩ Sj2 ∩ (ML ∪ ME ), then a new violation yi+ occurs by flipping
xj1 = 0 → 1 and xj2 = 0 → 1 simultaneously. Similarly, if si (x) = bi − 1 holds
for i ∈ Sj1 ∩ Sj2 ∩ (MG ∪ ME ), then decrease of the violation yi− partly cancels
by flipping xj1 = 0 → 1 and xj2 = 0 → 1 simultaneously. We then have
∆z̃j1 ,j2 (x) = ∆z̃j↑1 (x) + ∆z̃j↑2 (x) +
X
w
ei+
i∈Sj1 ∩Sj2 ∩(ML ∪ME )∩{l|sl (x)=bl −1}
X
+
w
ei− ≥ 0. (6)
i∈Sj1 ∩Sj2 ∩(MG ∪ME )∩{l|sl (x)=bl −1}
Based on this lemma, we consider only the case of xj1 = 1 and xj2 = 0. If
si (x) = bi holds for i ∈ Sj1 ∩ Sj2 ∩ (ML ∪ ME ), then increase of the violation yi+
by flipping xj2 = 0 → 1 cancels by flipping xj1 = 1 → 0 simultaneously, while
no decrease of the violation yi+ occurs by flipping xj1 = 1 → 0 independently.
Similarly, if si (x) = bi holds for i ∈ Sj1 ∩ Sj2 ∩ (MG ∪ ME ), then increase
of the violation yi− by flipping xj1 = 1 → 0 cancels by flipping xj2 = 0 → 1
simultaneously, while no decrease of the violation yi− occurs by flipping xj2 =
0 → 1 independently. We then have
X
X
w
ei+ −
w
ei− ,
∆z̃j1 ,j2 (x) = ∆z̃j↓1 (x) + ∆z̃j↑2 (x) −
i∈S̄(x)∩(ML ∪ME )
i∈S̄(x)∩(MG ∪ME )
(7)
where S̄(x) = {i ∈ Sj1 ∩ Sj2 | si (x) = bi }. From these results, the 2-flip
neighborhood can be restricted to the set of solutions satisfying xj1 6= xj2 and
S̄(x) 6= ∅. However, it might not be possible to search this set efficiently without
5
first extracting it. We thus construct a neighbor list that stores promising pairs
of variables xj1 and xj2 for efficiency (see Section 4 for details).
To increase the efficiency of 2-FNLS, we decompose the neighborhood NB2 (x)
(j )
into a number of sub-neighborhoods. Let NB2 1 (x) = {x0 ∈ NB2 (x) | xj1 =
1, x0j1 = 0} be the subset of NB2 (x) obtainable by flipping xj1 = 1 → 0. 2FNLS searches NB2 1 (x) for each j1 ∈ X in ascending order of ∆z̃j↓1 (x). If
an improved solution exists, it chooses the pair j1 and j2 with the minimum
(j )
value of ∆z̃j1 ,j2 (x) among NB2 1 (x) and flips xj1 = 1 → 0 and xj2 = 0 → 1.
2-FNLS skips to search the remaining sub-neighborhoods and immediately return to search NB1 (x) whenever an improved solution is obtained in a sub(j )
neighborhood NB2 1 (x). The first version of 2-FNLS is formally described as
Algorithm 1.
(j )
e+, w
e−)
Algorithm 1 2-FNLS(x, w
e + and w
e−.
Input: A solution x and penalty weight vectors w
Output: A solution x.
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
START:
x0 ← x
for j ∈ N do
if z̃(x) + ∆z̃j (x) < z̃(x0 ) then
x0 ← x, x0j ← 1 − x0j
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
for j1 ∈ X in ascending order of ∆z̃j↓1 (x) do
x0 ← x
for j2 ∈ N \ X do
if z̃(x) + ∆z̃j1 ,j2 (x) < z̃(x0 ) then
x0 ← x, x0j1 ← 0, x0j2 ← 1
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
end for
{Search NB1 (x)}
{Search NB2 (x)}
(j )
{Search NB2 1 (x)}
3. Efficient incremental evaluation
The 2-FNLS requires O(σ) time to compute the value of the evaluation
function z̃(x) for the current solution x if implemented naively, where σ =
6
P
P
j∈N aij denote the number of nonzero elements in the constraint matrix (aij ). To overcome this, we first develop a standard incremental evaluation
of ∆z̃j↑ (x) and ∆z̃j↓ (x) in O(|Sj |) time by keeping the values of the left-hand
side of constraints si (x) for i ∈ M in memory. We further develop an improved
incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x) in O(1) time by keeping additional auxiliary data in memory. By using this, 2-FNLS is also able to evaluate
∆z̃j1 ,j2 (x) in O(|Sj |) time by (7).
We first consider a standard incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x)
in O(|Sj |) time using the following formulas:
i∈M
∆z̃j↑ (x)
∆p̃↑j (x)
= cj + ∆p̃↑j (x) + ∆q̃j↑ (x),
X
=
w
ei+ (|(si (x) + 1) − bi |+ − |si (x) − bi |+ ) ,
i∈Sj ∩(ML ∪ME )
∆q̃j↑ (x)
=
X
w
ei−
(8)
(|bi − (si (x) + 1)|+ − |bi − si (x)|+ ) ,
i∈Sj ∩(MG ∪ME )
∆z̃j↓ (x)
∆p̃↓j (x)
= −cj + ∆p̃↓j (x) + ∆q̃j↓ (x),
X
=
w
ei+ (|(si (x) − 1) − bi |+ − |si (x) − bi |+ ) ,
i∈Sj ∩(ML ∪ME )
∆q̃j↓ (x)
=
X
w
ei−
(9)
(|bi − (si (x) − 1)|+ − |bi − si (x)|+ ) ,
i∈Sj ∩(MG ∪ME )
where 2-FNLS keeps the values of the left-hand side of constraints si (x) for
i ∈ M in memory. 2-FNLS updates si (x) for i ∈ Sj in O(|Sj |) time by si (x0 ) ←
si (x) + 1 and si (x0 ) ← si (x) − 1 when the current solution x moves to x0 by
flipping xj = 0 → 1 and xj = 1 → 0, respectively.
We further develop an improved incremental evaluation of ∆z̃j↑ (x) and ∆z̃j↓ (x)
in O(1) time by directly keeping ∆p̃↑j (x), ∆q̃j↑ (x) for j ∈ N \ X and ∆p̃↓j (x),
∆q̃j↓ (x) for j ∈ X in memory. When the current solution x moves to x0 by
flipping xj = 0 → 1, 2-FNLS first updates si (x) for i ∈ Sj in O(|Sj |) time by
si (x0 ) ← si (x) + 1, and then updates ∆p̃↑k (x), ∆q̃k↑ (x) for k ∈ Ni \ X, i ∈ Sj
P
and ∆p̃↓k (x), ∆q̃k↓ (x) for k ∈ Ni ∩ X, i ∈ Sj in O( i∈Sj |Ni |) time using the
following formulas:
X
∆p̃↑k (x0 ) ← ∆p̃↑k (x) +
w
ei+ ∆yi+ (x0 ) − ∆yi+ (x) ,
i∈Sj ∩Sk ∩(ML ∪ME )
∆q̃k↑ (x0 )
← ∆q̃k↑ (x) +
X
w
ei− ∆yi− (x0 ) − ∆yi− (x) ,
i∈Sj ∩Sk ∩(MG ∪ME )
∆p̃↓k (x0 )
∆p̃↓k (x)
←
∆q̃k↓ (x0 )
← ∆q̃k↓ (x) +
+
X
w
ei+ ∆yi+ (x0 ) − ∆yi+ (x) ,
i∈Sj ∩Sk ∩(ML ∪ME )
X
w
ei− ∆yi− (x0 ) − ∆yi− (x) ,
i∈Sj ∩Sk ∩(MG ∪ME )
7
(10)
(aij ) =
0
1
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
0
1
0
0
0
1
1
0
1
0
1
0
1
0
0
0
1
1
0
0
1
1
1
0
0
0
0
1
1
1
0
1
0
0
1
0
1
0
1
1
0
0
1
−→
x1
x2
x3
x4
x5
x6
x7
x8
x9
x10
x2
x7
x8
x1
x4
x8
x5
x7
x9
x2
x9
x3
x7
x9
x10
x10
x8
x1
x3
x5
x8
x1
x2
x6
x7
x3
x4
x5
x1
x5
x7
x10
Figure 1: Example of the neighbor list
where
∆yi+ (x0 ) = |(si (x0 ) + 1) − bi |+ − |si (x0 ) − bi |+ ,
∆yi+ (x) = |si (x0 ) − bi |+ − |si (x) − bi |+ ,
∆yi− (x0 ) = |bi − (si (x0 ) + 1)|+ − |bi − si (x0 )|+ ,
∆yi− (x) = |bi − si (x0 )|+ − |bi − si (x)|+ .
(11)
Similarly, when the current solution x moves to x0 by flipping xj = 1 → 0, 2FNLS first updates si (x) for i ∈ Sj in O(|Sj |) time, and then updates ∆p̃↑k (x),
↓
↓
∆q̃k↑ (x)
P for k ∈ Ni \ X, i ∈ Sj and ∆p̃k (x), ∆q̃k (x) for k ∈ Ni ∩ X, i ∈ Sj
in O( i∈Sj |Ni |) time. We note that the computation time for updating the
auxiliary data has little effect on the total computation time of 2-FNLS because
the number of solutions actually visited is much less than the number of neighbor
solutions evaluated in most cases.
4. Exploiting variable associations
It is known that the quality of locally optimal solutions improves if a larger
neighborhood is used. However, the computation time to search the neighborhood NBr (x) also increases exponentially with r, since |NBr (x)| = O(nr )
generally holds. A large amount of computation time is thus needed in practice
in order to scan all candidates in NB2 (x) for large-scale instances with millions
of variables. To overcome this, we develop a data mining approach that identifies
promising pairs of flipping variables in NB2 (x) by extracting variable associations from the instance to be solved using only a small amount of computation
time.
From the results in Section 2, the 2-flip neighborhood can be restricted to
the set of solutions satisfying xj1 6= xj2 and S̄(x) 6= ∅. We further observe from
(7) that it is favorable to select pairs of flipping variables xj1 and xj2 which
gives a larger size |Sj1 ∩ Sj2 | in order to obtain ∆z̃j1 ,j2 (x) < 0. Based on this
observation, we keep a limited set of pairs of variables xj1 and xj2 for which
8
|Sj1 ∩ Sj2 | is large in memory, and we call this the neighbor list (Figure 1). We
note that |Sj1 ∩ Sj2 | represents a certain kind of similarity between the subsets
Sj1 and Sj2 (or column vectors aj1 and aj2 of the constraint matrix (aij )) and
we keep the k-nearest neighbors for each variable xj for j ∈ N in the neighbor
list. (In Figure 1, we keep the set of pairs of variables xj1 and xj2 having
|Sj1 ∩ Sj2 | ≥ 2 in the neighbor list, because small examples often have many
ties.)
For each variable xj1 for j1 ∈ N , we store the first k = min{|N (j1 ) |, α|M |}
variables xj2 (j2 6= j1 ) in descending order of |Sj1 ∩ Sj2 | in the j1 th row of the
neighbor list, where N (j1 ) = {j2 ∈ N | j2 6= j1 , Sj1 ∩Sj2 6= ∅} and α is a program
parameter that we set to five. Let L[j1 ] be the index set of variables xj2 stored
in the j1 th row of the neighbor list. We then reduce the number of candidates
in NB2 (x) by restricting the pairs of flipping variables xj1 and xj2 to pairs in
the neighbor list j1 ∈ X and j2 ∈ (N \ X) ∩ L[j1 ].
We note that it is still expensive to construct the whole neighbor list for
large-scale instances with millions of variables. To overcome this, we develop a
lazy construction algorithm for the neighbor list. That is, 2-FNLS starts from
an empty neighbor list and generates the j1 th row of the neighbor list L[j1 ] only
(j )
when 2-FNLS searches NB2 1 (x) for the first time. The improved version of
2-FNLS is formally described as Algorithm 2.
A similar approach has been developed in local search algorithms for the
Euclidean Traveling Salesman Problem (TSP) in which a sorted list containing
only the k-nearest neighbors is stored for each city by using a geometric data
structure called the k-dimensional tree (Johnson & McGeoch, 1997). However, it
is not suitable for finding the k-nearest neighbors efficiently in high-dimensional
spaces. We thus extend it for application to the high-dimensional column vectors
aj ∈ {0, 1}m for j ∈ N of BIPs by using a lazy construction algorithm for the
neighbor list.
5. 4-flip neighborhood local search
We can regard the neighbor-list in Section 4 as an adjacency-list representation of a directed graph, and represent associations between variables by a
corresponding directed graph called the k-nearest neighbor graph. Figure 2
illustrates an example of the k-nearest neighbor graph corresponding to the
neighbor-list in Figure 1.
Using the k-nearest neighbor graph, we extend 2-FNLS to search a set of
promising neighbor solutions in NB4 (x). For each variable xj1 for j1 ∈ X, we
keep the variables xj2 for j2 ∈ (N \ X) ∩ L[j1 ] having the minimum value of
∆z̃j1 ,j2 (x) in memory as j2 = π(j1 ). The extended 2-FNLS, called the 4-Flip
Neighborhood Local Search (4-FNLS) algorithm, then searches for an improved
solution by flipping xj1 = 1 → 0, xπ(j1 ) = 0 → 1, xj3 = 1 → 0 and xπ(j3 ) =
0 → 1 for j1 ∈ X and j3 ∈ X ∩ L[π(j1 )] satisfying j1 6= j3 and π(j1 ) 6= π(j3 ),
i.e., flipping the values of variables alternately along 4-paths or 4-cycles in the
k-nearest neighbor graph. Let ∆z̃j1 ,j2 ,j3 ,j4 (x) be the increase in z̃(x) due to
9
e+, w
e−)
Algorithm 2 2-FNLS(x, w
e + and w
e−.
Input: A solution x and penalty weight vectors w
Output: A solution x.
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
for j1 ∈ N do
Set L[j1 ] ← ∅
end for
START:
x0 ← x
for j ∈ N do
if z̃(x) + ∆z̃j (x) < z̃(x0 ) then
x0 ← x, x0j ← 1 − x0j
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
for j1 ∈ X in ascending order of ∆z̃j↓1 (x) do
if L[j1 ] = ∅ then
Generate L[j1 ]
end if
x0 ← x
for j2 ∈ (N \ X) ∩ L[j1 ] do
if z̃(x) + ∆z̃j1 ,j2 (x) < z̃(x0 ) then
x0 ← x, x0j1 ← 0, x0j2 ← 1
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
end for
10
{Initialize L[j1 ]}
{Search NB1 (x)}
{Search NB2 (x)}
{Generate L[j1 ]}
(j )
{Search NB2 1 (x)}
x5
x7
x10
x3
x8
x6
x9
x2
x4
x1
Figure 2: Example of the k-nearest neighbor graph
simultaneously flipping xj1 = 1 → 0, xj2 = 0 → 1, xj3 = 1 → 0 and xj4 = 0 →
1. 4-FNLS computes ∆z̃j1 ,j2 ,j3 ,j4 (x) in O(|Sj |) time by applying the standard
incremental evaluation alternately (see Section 3 for details). 4-FNLS is formally
described with as Algorithm 3.
6. Adaptive control of penalty weights
In our algorithm, solutions are evaluated by the alternative evaluation function z̃(x) in which the fixed penalty weight vectors w+ and w− in the original
e + and w
e − , respectively, and
evaluation function z(x) has been replaced by w
+
−
the values of w
ei for i ∈ ML ∪ ME and w
ei for i ∈ MG ∪ ME are adaptively
controlled in the search.
It is often reported that a single application of LS tends to stop at a locally
optimal solution of insufficient quality when large penalty weights are used.
This is because it is often unavoidable to temporally increase the values of
some violations yi+ and yi− in order to reach an even better solution from a
good solution through a sequence of neighborhood operations, and large penalty
weights thus prevent LS from moving between such solutions. To overcome this,
we incorporate an adaptive adjustment mechanism for determining appropriate
values of penalty weights w
ei+ for i ∈ ML ∪ ME and w
ei− for i ∈ MG ∪ ME
(Nonobe & Ibaraki, 2001; Yagiura et al., 2006; Umetani et al., 2013). That is,
LS is applied iteratively while updating the values of the penalty weights w
ei+
−
for i ∈ ML ∪ ME and w
ei for i ∈ MG ∪ ME after each call to LS. We call this
sequence of calls to LS the Weighting Local Search (WLS) according to (Selman
& Kautz, 1993; Thornton, 2005). This strategy is also referred as the breakout
algorithm (Morris, 1993) and the dynamic local search (Hutter et al., 2002) in
the literature.
Let x be the solution at which the previous local search stops. WLS ree + and w
e − . We
sumes LS from x after updating the penalty weight vectors w
+
assume that the original penalty weights wi for i ∈ ML ∪ ME and wi− for
11
e+, w
e−)
Algorithm 3 4-FNLS(x, w
e + and w
e−.
Input: A solution x and penalty weight vectors w
Output: A solution x.
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
43:
44:
for j1 ∈ N do
{Initialize L[j1 ]}
Set L[j1 ] ← ∅
end for
START:
x0 ← x
for j ∈ N do
{Search NB1 (x)}
if z̃(x) + ∆z̃j (x) < z̃(x0 ) then
x0 ← x, x0j ← 1 − x0j
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
for j1 ∈ X in ascending order of ∆z̃j↓1 (x) do
{Search NB2 (x)}
if L[j1 ] = ∅ then
{Generate L[j1 ]}
Generate L[j1 ]
end if
x0 ← x, ∆z̃ ∗ ← ∞
(j )
for j2 ∈ (N \ X) ∩ L[j1 ] do
{Search NB2 1 (x)}
∗
if ∆z̃j1 ,j2 (x) < ∆z̃ then
{Update π(j1 )}
∆z̃ ∗ ← ∆z̃j1 ,j2 (x), π(j1 ) ← j2
end if
if z̃(x) + ∆z̃j1 ,j2 (x) < z̃(x0 ) then
x0 ← x, x0j1 ← 0, x0j2 ← 1
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
end for
for j1 ∈ X in ascending order of ∆z̃j1 ,π(j1 ) (x) do
{Search NB4 (x)}
x0 ← x
for j3 ∈ X ∩ L[π(j1 )] satisfying j3 6= j1 and π(j1 ) 6= π(j3 ) do
if z̃(x) + ∆z̃j1 ,π(j1 ),j3 ,π(j3 ) (x) < z̃(x0 ) then
x0 ← x, x0j1 ← 0, x0π(j1 ) ← 1, x0j3 ← 0, x0π(j3 ) ← 1
end if
end for
if z̃(x0 ) < z̃(x) then
x ← x0
goto START
end if
end for
12
i ∈ MG ∪ME are sufficiently large. Starting from the original penalty weight vece+, w
e − ) ← (w+ , w− ), the penalty weight vectors w
e + and w
e − are updated
tors (w
∗
as follows. Let x be the best feasible solution obtained so far for the original
formulation (1). We modify 4-FNLS to keep the best feasible solution x∗ , and
update it whenever an improved feasible solution is found. If z̃(x) ≥ z(x∗ ) holds,
e+, w
e − ) ← β(w
e+, w
e − ),
WLS uniformly decreases the penalty weights by (w
where 0 < β < 1 is a program parameter that is adaptively computed so that
the new value of ∆z̃j↓ (x) becomes negative for 10% of variables xj for j ∈ X.
Otherwise, WLS increases the penalty weights by
z(x∗ ) − z̃(x)
yi+ , i ∈ ML ∪ ME ,
+2
−2
(y
+
y
)
l∈M l
l
z(x∗ ) − z̃(x)
w
ei− ← w
ei− + P
yi− , i ∈ MG ∪ ME .
+2
−2
(y
+
y
)
l∈M l
l
w
ei+ ← w
ei+ + P
(12)
e + and w
e−
WLS iteratively applies LS, updating the penalty weight vectors w
after each call to LS until the time limit is reached. WLS is formally described
as Algorithm 4. Note that we set the initial solution to x = 0 in practice.
Algorithm 4 WLS(x)
Input: An initial solution x.
Output: The best feasible solution x∗ .
e+, w
e − ) ← (w+ , w− )
1: x̃ ← x, z ∗ ← ∞, (w
2: repeat
e+, w
e−)
3:
(x̃, x0 ) ← 4-FNLS(x̃, w
0
e+, w
e − )}
4:
{x is the best feasible solution obtained in 4-FNLS(x̃, w
5:
if z(x0 ) < z ∗ then
6:
x∗ ← x0 , z ∗ ← z(x0 )
7:
end if
8:
if z̃(x̃) ≥ z ∗ then
e+, w
e − ) ← β(w
e+, w
e−)
9:
Decrease the penalty weights by (w
10:
else
11:
Increase the penalty weights by (12)
12:
end if
13: until The time limit is reached
7. Computational results
We report computational results of our algorithm for the SCP instances from
(Beasley, 1990; Umetani et al., 2013) and the SPP instances from (Borndörfer,
1998; Chu & Beasley, 1998; Koch et al., 2011). Tables 1 and 2 summarize the
information about the SCP and SPP instances, respectively. The first column
shows the name of the group (or the instance), and the number in parentheses
shows the number of instances in the group. In the subsequent part of this paper,
we show the average value in each cell of the tables for the instances of the group.
13
Table 1: Benchmark instances for SCP
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
zLP
149.48
45.67
138.97
104.78
276.67
209.34
415.78
348.93
172.15
182.00
209.71
688.40
935.92
1054.05
1509.64
zbest
166.4
59.6
158.0
129.0
313.2
258.0
549.8
503.8
∗174
∗182
∗211
∗689
947
1064
1530
original
#cst.
#var.
1000.0
10000.0
1000.0
10000.0
1000.0
50000.0
1000.0
100000.0
2000.0
100000.0
2000.0
200000.0
5000.0
500000.0
5000.0
1000000.0
507
63009
516
47311
582
55515
2536
1081841
2586
920683
4284
1092610
4872
968672
presolved
#cst.
#var.
1000.0
10000.0
1000.0
10000.0
1000.0
49981.0
1000.0
99944.8
2000.0
99971.0
2000.0
199927.6
5000.0
499988.0
5000.0
999993.2
440
20700
403
37832
544
27427
2001
480597
2239
408724
3633
607884
4207
482500
time limit
600 s
600 s
1200 s
1200 s
1800 s
1800 s
3600 s
3600 s
600 s
600 s
600 s
3600 s
3600 s
3600 s
3600 s
Table 2: Benchmark instances for SPP
instance
aa01–06 (6)
us01–04 (4)
v0415–0421 (7)
v1616–1622 (7)
t0415–0421 (7)
?t1716–1722 (7)
?ds
?ds-big
?ivu06-big
?ivu59
zLP
40372.75
9749.44
2385764.17
1021288.76
5199083.74
121445.76
57.23
86.82
135.43
884.46
zbest
∗40588.83
∗9798.25
∗2393303.71
∗1025552.43
5453475.71
157516.29
187.47
731.69
166.02
1878.83
original
#cst.
#var.
675.3
7587.3
121.3
295085.0
1479.3
30341.6
1375.7
83986.7
1479.3
7304.3
475.7
58981.3
656
67732
1042
174997
1177
2277736
3436
2569996
presolved
#cst.
#var.
478.7
6092.7
65.5
85772.5
263.9
7277.0
1171.9
51136.7
820.7
2617.4
475.7
13193.6
656
67730
1042
173026
1177
2197774
3413
2565083
time limit
600 s
600 s
600 s
600 s
600 s
3600 s
3600 s
3600 s
3600 s
3600 s
The detailed computational results are in the online supplement. The second
column “zLP ” shows the optimal values of the LP relaxation problems. The third
column “zbest ” shows the best upper bounds among all algorithms in this paper.
The fourth and sixth columns “#cst.” show the number of constraints, and the
fifth and seventh columns “#vars.” show the number of variables. Since several
preprocessing techniques that often reduce the size of instances by removing
redundant rows and columns are known (Borndörfer, 1998), all algorithms are
tested on the presolved instances. The instances marked “?” are hard instances
that cannot be solved optimally within at least 1 h by the tested Mixed Integer
Programming (MIP) solvers (i.e., CPLEX12.6, Gurobi5.6.3 and SCIP3.1).
We compare the results of our algorithm with those of its variations. Our
algorithm was implemented in C language and tested on a MacBook Pro laptop
computer with a 2.7 GHz Intel Core i7 processor and 16 GB memory. All
variations of our algorithm were run on a single thread under MacOS10.12
operating system with time limits as shown in Tables 1 and 2.
best
Tables 3 and 4 show the relative gap z(x)−z
× 100 (%) of the best feasible
z(x)
solutions for the original formulation (1) achieved by the variations of our algorithm for the SCP and SPP instances, respectively. We note that all variations
of our algorithm found feasible solutions for all SCP instances. The second
column “no-list” shows the results of our algorithm without the neighbor list,
and the third column “no-inc” shows the results of our algorithm without the
improved incremental evaluation (i.e., only applying the standard incremental
evaluation in Section 3). The fourth column “2-FNLS” shows the results of our
algorithm without the 4-flip neighborhood search (i.e., only applying 2-FNLS in
Section 4). In Table 4, the number in parentheses shows the number of instances
14
Table 3: Computational results of variations of the proposed algorithm for SCP instances
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
avg. (all)
avg. (with stars)
no-list
0.00%
0.31%
1.24%
2.42%
2.12%
3.44%
10.97%
19.11%
0.00%
0.00%
0.47%
2.68%
2.57%
5.42%
4.43%
4.55%
4.89%
no-inc
0.12%
0.31%
0.86%
1.67%
1.69%
3.51%
8.33%
22.06%
0.57%
0.00%
0.47%
2.27%
2.87%
5.17%
3.47%
4.42%
4.75%
2-FNLS
0.00%
0.31%
0.50%
1.68%
1.32%
2.35%
2.79%
4.76%
0.00%
0.00%
0.47%
1.29%
2.27%
2.74%
2.36%
1.65%
1.77%
proposed
0.00%
0.00%
0.50%
1.53%
1.26%
2.05%
2.65%
5.47%
0.00%
0.00%
0.00%
0.72%
1.56%
2.12%
1.80%
1.56%
1.69%
Table 4: Computational results of variations of the proposed algorithm for SPP instances
instance
aa01–06 (6)
us01–04 (4)
v0415–0421 (7)
v1616–1622 (7)
t0415–0421 (7)
?t1716–1722 (7)
?ds
?ds-big
?ivu06-big
?ivu59
avg. (all)
avg. (with stars)
no-list
2.33%(6)
0.04%(4)
0.00%(7)
0.62%(7)
1.46%(5)
5.46%(7)
36.03%
29.11%
5.31%
15.75%
3.76%(40/42)
10.37%(12/13)
no-inc
2.26%(6)
1.16%(4)
0.00%(7)
0.17%(7)
1.30%(6)
4.33%(7)
33.80%
0.00%
3.83%
11.39%
2.60%(41/42)
6.61%(12/13)
2-FNLS
2.07%(6)
0.63%(4)
0.00%(7)
0.09%(7)
0.29%(7)
5.71%(7)
24.13%
40.75%
2.25%
16.01%
3.35%(42/42)
9.48%(13/13)
proposed
1.60%(6)
0.04%(4)
0.00%(7)
0.09%(7)
0.92%(6)
2.45%(7)
0.00%
0.00%
0.00%
0.00%
0.81%(41/42)
1.43%(12/13)
for which the algorithm obtained at least one feasible solution within the time
limit, and the relative gap shows the average value for them.
Tables 5 and 6 show the computational efficiency of variations of our algorithm with respect to the number of calls to 4-FNLS (and 2-FNLS in the fourth
column “2-FNLS”), where the bottom rows show average factors normalized so
that that of our algorithm is set to one.
From these results, we observe that the proposed method improves the computational efficiency of the local search algorithm for the SCP and SPP instances
in comparison with its variations, and our algorithm attains good performance
even when the size of the neighbor list is considerably small. We also observe
that the 4-flip neighborhood search substantially improves the performance of
our algorithm even though there are fewer calls to 4-FNLS compared to 2-FNLS.
rows
Tables 7 and 8 show the ratio #generated
× 100 (%) of generated rows
|N |
in the neighbor list. We observe that our algorithm achieves good performance
while generating only a small part of the neighbor list for the large-scale instances.
We compare the result of our algorithm with those of general purpose solvers,
i.e., the latest MIP solvers called CPLEX12.6 (2014), Gurobi5.6.3 (2014) and
SCIP3.1 (Achterberg, 2009) and a local search solver for BIP (including nonlinear constraints and objective functions) called LocalSolver3.1 (Benoist et al.,
2011). LocalSolver3.1 is a simulated annealing based on ejection chain moves
specialized for maintaining the feasibility of Boolean constraints and an efficient
incremental evaluation using a directed acyclic graph. LocalSolver3.1 is not the
15
Table 5: The number of calls to 4-FNLS of variations of the proposed algorithm for SCP
instances
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
avg. factor
no-list
1528.2
1040.8
845.2
494.0
364.0
262.4
103.0
78.8
4498
2004
3079
429
416
182
197
0.37
no-inc
1094.2
434.4
750.6
454.6
444.8
273.8
117.2
66.0
6482
3345
4037
359
399
195
229
0.30
2-FNLS
5755.8
2191.6
5072.0
2580.4
2828.8
1862.6
1412.8
929.4
38195
16915
22123
4045
5398
2665
4214
2.21
proposed
3001.4
1248.2
2189.8
1057.8
1445.8
809.0
535.0
290.8
23692
12350
15140
3206
3028
1683
2374
1.00
Table 6: The number of calls to 4-FNLS of variations of the proposed algorithm for SPP
instances
instance
aa01–06 (6)
us01–04 (4)
v0415–0421 (7)
v1616–1622 (7)
t0415–0421 (7)
?t1716–1722 (7)
?ds
?ds-big
?ivu06-big
?ivu59
avg. factor
no-list
10152.2
35418.5
1516414.7
1197.7
9412.6
32689.3
3109
852
236
141
0.20
no-inc
20544.8
36491.75
1783742.3
4029.1
19885.4
60992.9
3463
1019
305
208
0.38
2-FNLS
93694.3
92397.5
4274501.6
17626.9
145916.4
281283.4
14142
4370
1293
620
1.70
proposed
56584.8
86031.0
2749825.9
10048.7
53751.7
174405.1
11414
3294
1060
438
1.00
latest version, but it performs better than the latest version (LocalSolver4.5)
for the SCP and SPP instances.
We note the following issues in comparing the performance of our algorithm
with that of the latest MIP solvers. Due to the lack of pruning mechanism, it
is inherently difficult to find optimal solutions by local search algorithms even
for instances having a small gap between the lower and upper bounds of the
optimal values, while the latest MIP solvers find optimal solutions quickly by
the branch-and-cut procedure. Of course, local search algorithms often obtain
good upper bounds close to the optimal values for the instances. On the other
hand, the latest MIP solvers often prefer running primal heuristics rather than
the branch-and-cut procedure for instances having a large gap between the lower
and upper bounds of the optimal values. Indeed, the latest MIP solvers include
dozens of primal heuristics and spend much computation time on finding good
feasible solutions (Lodi, 2013), e.g., SCIP3.1 reported that it spent 1644.73 s
out of 3600 s running primal heuristics for solving the “ds” instance, while it
spent 837.47 s for solving LP relaxation problems.
We also compare our algorithm with a 3-flip local search algorithm specially
tailored for SCP developed by Yagiura et al. (2006) (denoted by YKI). In order
to handle large-scale SCP instances, many heuristic algorithms have introduced
the pricing method that reduces the number of variables to be considered by
using LP and/or Lagrangian relaxation. YKI introduced a pricing method based
on Lagrangian relaxation that substantially reduces the number of variables to
be considered to 1.05% from the original SCP instances on average. Hence, in
16
Table 7: The ratio of generated rows in the neighbor list for SCP instances
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
1 min
3.58%
2.12%
1.39%
0.82%
1.20%
0.57%
0.20%
0.01%
13.41%
4.73%
8.19%
0.30%
0.44%
0.20%
0.37%
10 min
3.95%
2.43%
1.63%
1.10%
1.49%
0.98%
0.58%
0.21%
22.02%
8.94%
10.66%
1.36%
1.67%
1.01%
1.56%
20 min
30 min
1 h
1.71%
1.16%
1.57%
1.06%
0.73%
0.29%
1.61%
1.10%
0.81%
0.35%
0.93%
0.49%
1.87%
2.19%
1.43%
2.11%
2.17%
2.54%
1.73%
2.46%
2.73%
3.28%
2.29%
3.10%
Table 8: The ratio of generated rows in the neighbor list for SPP instances
instance
aa01–06 (6)
us01–04 (4)
v0415–0421 (7)
v1616–1622 (7)
t0415–0421 (7)
?t1716–1722 (7)
?ds
?ds-big
?ivu06-big
?ivu59
1 min
40.47%
3.93%
31.44%
6.55%
83.47%
61.00%
2.29%
0.21%
0.01%
0.01%
10 min
49.17%
5.17%
31.64%
7.42%
90.00%
94.38%
12.63%
2.06%
0.07%
0.05%
30 min
1 h
97.12%
27.11%
4.96%
0.23%
0.11%
97.98%
40.05%
8.10%
0.45%
0.16%
addition to the original SCP instances, we also tested all algorithms for reduced
SCP instances by another pricing method based on LP relaxation (Umetani
& Yagiura, 2007). Table 9 summarize the reduced SCP instances, where we
applied preprocessing to the reduced SCP instances as well as the original SCP
instances. The eighth column “#free var.” shows the number of variables to
be considered in YKI for the original SCP instances. We note that it turned
out that many of reduced SPP instances by the pricing method (Umetani &
Yagiura, 2007) were infeasible because the equality constraints of SPP often
prevent solutions from containing highly evaluated variables together and make
the pricing method less effective.
Tables 10 and 11 show the relative gap of the best feasible solutions for
the original formulation (1) achieved by the algorithms for the original and
reduced SCP instances, respectively. We note that all algorithms found feasible
solutions for all SCP instances. All algorithms were tested on a MacBook Pro
laptop computer with a 2.7 GHz Intel Core i7 processor and 16 GB memory,
and were run on a single thread under MacOS10.12 operating system with time
limits as shown in Tables 1 and 9. That is, we tested all algorithms under the
same amount of available computational resources for fair comparison.
We observe that our algorithm achieves better upper bounds than general
purpose solvers (CPLEX12.6.3, Gurobi5.6.3, SCIP3.1 and LocalSolver3.1) for
the original and reduced SCP instances. We also observe that our algorithm
achieves good upper bounds close to those of YKI for the reduced SCP instances.
It shows that our algorithm attains good performance close to that of the specially tailored algorithm (YKI) for SCP by combining a pricing method. In view
of these, our algorithm achieves sufficiently good upper bounds compared to the
other algorithms for the SCP instances.
17
Table 9: Reduced benchmark instances for SCP
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
zLP
149.48
45.67
138.97
104.78
276.67
209.34
415.78
348.93
172.15
183.00
209.71
688.68
935.92
1054.05
1510.87
zbest
166.4
59.8
158.4
129.4
313.8
259.0
551.6
505.0
∗174
∗183
∗211
∗691
948
1066
1532
reduced
#cst.
#var.
1000.0
441.8
1000.0
236.2
1000.0
721.6
1000.0
703.6
2000.0
1434.2
2000.0
1421.0
5000.0
3245.2
5000.0
4471.4
507
2649
516
3788
582
2091
2536
13746
2586
13349
4284
21728
4872
21329
presolved
#cst.
#var.
1000.0
441.8
1000.0
236.2
1000.0
721.6
1000.0
703.6
2000.0
1434.2
2000.0
1421.0
5000.0
3245.2
5000.0
4471.4
402
1019
350
3088
491
1493
1391
5782
2083
7377
3189
14565
3577
11404
Yagiura et al.
#free var.
339.0
174.6
479.4
429.6
959.4
856.4
1836.4
1660.6
394
492
513
1598
2089
2639
3650
time limit
600 s
600 s
1200 s
1200 s
1800 s
1800 s
3600 s
3600 s
600 s
600 s
600 s
3600 s
3600 s
3600 s
3600 s
Table 10: Computational results of the latest solvers and the proposed algorithm for SCP
instances
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
avg. (all)
avg. (with stars)
CPLEX12.6
0.37%
1.92%
2.81%
8.37%
4.77%
9.57%
18.43%
33.13%
0.00%
0.00%
0.00%
0.00%
2.27%
5.34%
1.73%
8.64%
9.45%
Gurobi5.6.3
0.49%
2.28%
2.72%
4.30%
4.38%
8.44%
10.10%
12.49%
0.00%
0.00%
0.00%
0.00%
2.17%
1.57%
1.73%
4.92%
5.38%
SCIP3.1
0.24%
1.93%
1.85%
3.59%
2.55%
3.52%
30.71%
42.32%
0.00%
0.00%
0.00%
0.86%
2.27%
30.55%
2.67%
10.00%
10.91%
LocalSolver3.1
45.80%
61.54%
41.38%
58.40%
51.22%
57.79%
71.08%
75.63%
5.43%
3.19%
5.80%
3.50%
5.39%
6.50%
5.61%
49.99%
54.22%
Yagiura et al.
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.29%
0.00%
0.00%
0.00%
0.01%
0.00%
proposed
0.00%
0.00%
0.50%
1.53%
1.26%
2.05%
2.65%
5.47%
0.00%
0.00%
0.00%
0.72%
1.56%
2.12%
1.80%
1.56%
1.69%
Table 12 shows the relative gap of the best feasible solutions achieved by the
algorithms for the SPP instances. All algorithms were tested on a MacBook Pro
laptop computer with a 2.7 GHz Intel Core i7 processor and 16 GB memory,
and were run on a single thread under MacOS 10.12 operating system with time
limits as shown in Table 2. In Table 12, the number in parentheses shows that of
instances for which the algorithm obtained at least one feasible solution within
the time limit, and the relative gap shows the average value for them.
We also compare the computational results of our algorithm with those of a
Lagrangian heuristic algorithm for BIP called the Wedelin’s heuristic (Bastert
et al., 2010; Wedelin, 1995) and a branch-and-cut algorithm specially tailored
for SPP developed by Borndörfer (1998). The computational results for the
Wedelin’s heuristic are taken from (Bastert et al., 2010), where it was tested on
a 1.3 GHz Sun Ultra Sparc-IIIi and run with a time limit of 600 s. The computational results for the branch-and-cut algorithm are taken from (Borndörfer,
1998), where it was tested on a Sun Ultra Sparc 1 Model 170E and run with a
time limit of 7200 s.
We first observe that our algorithm achieves better upper bounds than the
latest MIP solvers (CPLEX12.6, Gurobi5.6.3 and SCIP3.1) for hard SPP instances and good upper bounds close to the optimal values for the others. We
next observe that our algorithm achieves better upper bounds than the general purpose heuristic solvers (LocalSolver3.1 and the Wedelin’s heuristic) and
18
Table 11: Computational results of the latest solvers and the proposed algorithm for reduced
SCP instances
instance
?G.1–5 (5)
?H.1–5 (5)
?I.1–5 (5)
?J.1–5 (5)
?K.1–5 (5)
?L.1–5 (5)
?M.1–5 (5)
?N.1–5 (5)
RAIL507
RAIL516
RAIL582
RAIL2536
?RAIL2586
?RAIL4284
?RAIL4872
avg. (all)
avg. (with stars)
CPLEX12.6
0.60%
1.92%
2.59%
4.43%
2.84%
4.77%
10.82%
15.95%
0.00%
0.00%
0.00%
0.00%
0.84%
0.47%
0.84%
4.72%
5.16%
Gurobi5.6.3
0.24%
1.62%
1.64%
3.99%
2.48%
4.85%
4.56%
11.36%
0.00%
0.00%
0.00%
0.00%
0.52%
0.93%
1.23%
3.33%
3.64%
SCIP3.1
0.47%
1.62%
2.10%
3.42%
2.66%
3.13%
31.15%
34.17%
0.00%
0.00%
0.00%
0.00%
0.73%
0.74%
1.10%
8.43%
9.21%
LocalSolver3.1
3.78%
1.90%
1.74%
2.99%
2.18%
2.41%
4.89%
6.47%
0.57%
1.61%
0.47%
0.29%
1.66%
1.66%
1.73%
2.98%
3.18%
Yagiura et al.
0.00%
0.00%
0.00%
0.15%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
0.02%
0.02%
proposed
0.00%
0.00%
0.00%
0.31%
0.63%
0.77%
1.01%
1.06%
0.00%
0.00%
0.00%
0.00%
0.84%
0.84%
0.84%
0.45%
0.50%
Table 12: Computational results of the latest solvers and the proposed algorithm for SPP
instances
instance
CPLEX12.6
Gurobi5.6.3
aa01–06 (6)
0.00%(6)
0.00%(6)
us01–04 (4)
0.00%(4)
0.00%(4)
v0415–0421 (7)
0.00%(7)
0.00%(7)
v1616–1622 (7)
0.00%(7)
0.00%(7)
t0415–0421 (7)
0.66%(7)
0.60%(7)
?t1716–1722 (7)
8.34%(7)
16.58%(7)
?ds
8.86%
55.61%
?ds-big
62.16%
24.03%
?ivu06-big
20.86%
0.68%
?ivu59
28.50%
4.36%
avg. (all)
4.37%(42/42)
4.88%(42/42)
avg. (with stars)
14.10%(13/13)
15.66%(13/13)
† 600 s on a 1.3 GHz Sun Ultra Sparc-IIIi
‡ 7200 s on a Sun Ultra Sparc 1 Model 170E
SCIP3.1
0.00%(6)
0.00%(3)
0.00%(7)
0.00%(7)
1.61%(6)
3.51%(7)
40.53%
72.01%
17.90%
37.84%
5.06%(40/42)
15.07%(13/13)
LocalSolver3.1
13.89%(1)
11.26%(2)
0.05%(7)
4.60%(7)
— (0)
37.08%(1)
85.17%
92.69%
52.54%
48.95%
17.52%(22/42)
63.29%(5/13)
Bastert et al.†
—
—
0.71%(6)
6.64%(3)
1.30%(5)
12.55%(7)
8.82%
—
—
—
5.79%(22/29)
10.79%(9/10)
Borndörfer‡
0.00%(6)
0.00%(4)
0.00%(7)
0.01%(7)
1.83%(7)
1.63%(7)
—
—
—
—
0.64%(38/38)
1.77%(9/9)
good upper bounds comparable to those of the branch-and-bound algorithm
(Borndörfer, 1998) for many SPP instances. In view of these, our algorithm
achieves sufficiently good upper bounds compared to the other algorithms for
the SPP instances, particularly for hard SPP instances.
8. Conclusion
We present a data mining approach for reducing the search space of local
search algorithms for a class of BIPs including SCP and SPP. In this approach,
we construct a k-nearest neighbor graph by extracting variable associations from
the instance to be solved in order to identify promising pairs of flipping variables
in the 2-flip neighborhood. We also develop a 4-flip neighborhood local search
algorithm that flips four variables alternately along 4-paths or 4-cycles in the
k-nearest neighbor graph. We incorporate an efficient incremental evaluation of
solutions and an adaptive control of penalty weights into the 4-flip neighborhood
local search algorithm. Computational results show that the proposed method
improves the performance of the local search algorithm for large-scale SCP and
SPP instances.
We expect that data mining approaches could also be beneficial for efficiently
solving other large-scale combinatorial optimization problems, particularly for
19
proposed
1.60%(6)
0.04%(4)
0.00%(7)
0.09%(7)
0.92%(6)
2.45%(7)
0.00%
0.00%
0.00%
0.00%
0.81%(41/42)
1.43%(12/13)
hard instances having large gaps between the lower and upper bounds of the
optimal values.
Acknowledgment
This work was supported by the Grants-in-Aid for Scientific Research (JP26282085).
References
Achterberg, T. (2009). SCIP: Solving constraint integer programs. Mathematical
Programming Computation, 1, 1–41.
Agarwal, Y., Mathur, K., & Salkin, H. M. (1989). A set-partitioning-based exact
algorithm for the vehicle routing problem. Networks, 19, 731–749.
Atamtürk, A., Nemhauser, G. L., & Savelsbergh, M. W. P. (1995). A combined
Lagrangian, linear programming, and implication heuristic for large-scale set
partitioning problems. Journal of Heuristics, 1, 247–259.
Balas, E., & Padberg, M. W. (1976). Set partitioning: A survey. SIAM Review,
18, 710–760.
Baldacci, R., Christofides, N., & Mingozzi, A. (2008). An exact algorithm for
the vehicle routing problem based on the set partitioning formulation with
additional cuts. Mathematical Programming, 115, 351–385.
Barahona, F. & Anbil, R. (2000). The volume algorithm: Producing primal
solutions with a subgradient method. Mathematical Programming, 87, 385–
399.
Barnhart, C., Johnson, E. L., Nemhauser, G. L., Savelsbergh, M. W. P., &
Vance, P. H. (1998). Branch-and-price: Column generation for solving huge
integer programs. Operations Research, 46, 316–329.
Bastert, O., Hummel, B. & de Vries, S. (2010). A generalized Wedelin heuristic
for integer programming. INFORMS Journal on Computing, 22, 93–107.
Beasley, J. E. (1990). OR-Library: Distributing test problems by electronic mail.
Journal of the Operational Research Society, 41, 1069–1072.
Benoist, T., Estellon, B., Gardi, F., Megel, R., & Nouioua, K. (2011). LocalSolver 1.x: A black-box local-search solver for 0-1 programming. 4OR — A
Quarterly Journal of Operations Research, 9, 299–316.
Borndörfer, R. (1998). Aspects of set packing, partitioning and covering. Ph. D.
Dissertation, Berlin: Technischen Universität.
Boros, E., Hammer, P. L., Ibaraki, T., Kogan, A., Mayoraz, E., & Muchnik, I.
(2000). An implementation of logical analysis of data. IEEE Transactions on
Knowledge and Data Engineering, 12, 292–306.
20
Boros, E., Ibaraki, T., Ichikawa, H., Nonobe, K., Uno, T., & Yagiura, M.
(2005). Heuristic approaches to the capacitated square covering problem. Pacific Journal of Optimization, 1, 465–490.
Boschetti, M. A., Mingozzi, A. & Ricciardelli, S. (2008). A dual ascent procedure
for the set partitioning problem. Discrete Optimization, 5, 735–747.
Bramel, J., & Simchi-Levi, D. (1997). On the effectiveness of set covering formulations for the vehicle routing problem with time windows. Operations
Research, 45, 295–301.
Caprara, A., Fischetti, M., & Toth, P. (1999). A heuristic method or the set
covering problem. Operations Research, 47, 730–743.
Caprara, A., Toth, P., & Fischetti, M. (2000). Algorithms for the set covering
problem. Annals of Operations Research, 98, 353–371.
Caserta, M. (2007). Tabu search-based metaheuristic algorithm for large-scale
set covering problems. In W. J. Gutjahr, R. F. Hartl, & M. Reimann (eds.),
Metaheuristics: Progress in Complex Systems Optimization (pp. 43–63).
Berlin: Springer.
Ceria, S., Nobili, P., Sassano, A. (1997). Set covering problem. In M. Dell’Amico,
F. Maffioli & S. Martello (eds.): Annotated Bibliographies in Combinatorial
Optimization, (pp. 415–428). New Jersey: John Wiley & Sons.
Ceria, S., Nobili, P., & Sassano, A. (1998). A Lagrangian-based heuristic for
large-scale set covering problems. Mathematical Programming, 81, 215–288.
Chu P. C., & Beasley, J. E. (1998). Constraint handling in genetic algorithms:
The set partitioning problem. Journal of Heuristics, 11, 323–357.
CPLEX Optimizer. (2014). http://www-01.ibm.com/software/commerce/
optimization/cplex-optimizer/index.html Accessed 2017.01.23.
Farahani, R. Z., Asgari, N., Heidari, N., Hosseininia, M., & Goh, M. (2012).
Covering problems in facility location: A review. Computers & Industrial
Engineering, 62, 368–407.
Gurobi Optimizer. (2014). http://www.gurobi.com/ Accessed 2017.01.23.
Hammer, P. L., & Bonates, T. O. (2006). Logical analysis of data — An
overview: From combinatorial optimization to medical applications. Annals
of Operations Research, 148, 203–225.
Hashimoto, H., Ezaki, Y., Yagiura, M., Nonobe, K., Ibaraki, T., & Løkketangen,
A. (2009). A set covering approach for the pickup and delivery problem with
general constraints on each route. Pacific Journal of Optimization, 5, 183–200.
Hoffman, K. L., & Padberg, A. (1993). Solving airline crew scheduling problems
by branch-and-cut. Management Science, 39, 657–682.
21
Hutter, F., Tompkins, D. A. D., & Hoos, H. H. (2002). Scaling and probabilistic smoothing: Efficient dynamic local search for SAT. Proceedings of International Conference on Principles and Practice of Constraint Programming
(CP), 233–248.
Johnson, D. S., & McGeoch, L. A. (1997). The traveling salesman problem: A
case study. In E. Aarts, & K. Lenstra (eds.), Local Search in Combinatorial
Optimization (pp. 215–310). New Jersey: Princeton University Press.
Koch, T., Achterberg, T., Andersen, E., Bastert, O., Berthold, T., Bixby, R. E.,
Danna, E., Gamrath, G., Gleixner, A. M., Heinz, S, Lodi, A., Mittelmann, H.,
Ralphs, T., Salvagnin, D., Steffy, D. E., & Wolter, K. (2011). MIPLIB2010:
Mixed integer programming library version 5. Mathematical Programming
Computation, 3, 103–163.
Linderoth, J. T., Lee, E. K., & Savelbergh, M. W. P. (2001). A parallel, linear
programming-based heuristic for large-scale set partitioning problems. INFORMS Journal on Computing, 13, 191–209.
Lodi, A. (2013) The heuristic (dark) side of MIP solvers. In E. -G. Talbi (ed.),
Hybrid Metaheuristics (pp. 273–284). Berlin: Springer.
Michel, L. & Van Hentenryck, P. (2000). Localizer. Constraints: An International Journal, 5, 43–84.
Mingozzi, A., Boschetti, M. A., Ricciardelli, S., & Bianco, L. (1999). A set
partitioning approach to the crew scheduling problem. Operations Research,
47, 873–888.
Morris, P. (1993). The breakout method for escaping from local minima. Proceedings of National Conference on Artificial Intelligence (AAAI), 40–45.
Nonobe, K., & Ibaraki, T. (2001). An improved tabu search method for the
weighted constraint satisfaction problem. INFOR, 39, 131–151.
Pesant, G., & Gendreau, M. (1999). A constraint programming framework for
local search methods. Journal of Heuristics, 5, 255–279.
Selman, B., & Kautz, H. (1993). Domain-independent extensions to GSAT:
Solving large structured satisfiability problems. Proceedings of International
Conference on Artificial Intelligence (IJCAI), 290–295.
Shaw, P., Backer, B. D., & Furnon, V. (2002). Improved local search for CP
toolkits. Annals of Operations Research, 115, 31–50.
Thornton, J. (2005). Clause weighting local search for SAT. Journal of Automated Reasoning, 35, 97–142.
Umetani, S., & Yagiura, M. (2007). Relaxation heuristics for the set covering
problem. Journal of the Operations Research Society of Japan, 50, 350–375.
22
Umetani, S., Arakawa, M., & Yagiura, M. (2013). A heuristic algorithm for the
set multicover problem with generalized upper bound constraints. Proceedings
of Learning and Intelligent Optimization Conference (LION), 75–80.
Umetani, S. (2015). Exploiting variable associations to configure efficient local
search in large-scale set partitioning problems. Proceedings of AAAI Conference on Artificial Intelligence (AAAI), 1226–1232.
Van Hentenryck, P., & Michel, L. (2005). Constraint-Based Local Search, Cambridge: The MIT Press.
Voudouris, C., Dorne, R., Lesaint, D., & Liret, A. (2001). iOpt: A software
toolkit for heuristic search methods. Proceedings of Principles and Practice
of Constraint Programming (CP), 716–729.
Wedelin, D. (1995). An algorithm for large-scale 0-1 integer programming with
application to airline crew scheduling. Annals of Operations Research, 57,
283–301.
Yagiura, M. & Ibaraki, T. (1999). Analysis on the 2 and 3-flip neighborhoods
for the MAX SAT. Journal of Combinatorial Optimization, 3, 95–114.
Yagiura, M., Kishida, M., & Ibaraki, T. (2006). A 3-flip neighborhood local
search for the set covering problem. European Journal of Operational Research, 172, 472–499.
23
| 2cs.AI
|
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE
PROJECTIVE DIMENSION
arXiv:1412.4266v2 [math.AC] 8 Sep 2015
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Abstract. Let (R, m, K) be a local ring, and let M be an R-module of finite length. We
study asymptotic invariants, βiF (M, R), defined by twisting with Frobenius the free resolution of M . This family of invariants includes the Hilbert-Kunz multiplicity (eHK (m, R) =
β0F (K, R)). We discuss several properties of these numbers that resemble the behavior of the
Hilbert-Kunz multiplicity. Furthermore, we study when the vanishing of βiF (M, R) implies
that M has finite projective dimension. In particular, we give a complete characterization
of the vanishing of βiF (M, R) for one-dimensional rings. As a consequence of our methods,
we give conditions for the non-existence of syzygies of finite length.
Contents
1. Introduction
2. Notation and terminology
3. Definition and properties of βiF (M, N) and µFi (M, N)
4. Relations with projective dimension
5. Syzygies of finite length
Acknowledgments
References
1
3
5
10
18
23
23
1. Introduction
Let (R, m, K) denote an F -finite local ring of dimension d and characteristic p > 0, and
let α = logp [K : K p ]. Given an R-module M and an integer e > 0, e M denotes the R-module
e
structure on M given by r ∗ m = r p m for every m ∈ eM and r ∈ R. In addition, λR (M),
or simply λ(M) when the ring is clear from the context, denotes the length of M as an
R-module.
Let q = pe be a power of p. For an ideal I ⊆ R, let I [q] = (iq | i ∈ I) be the ideal generated
by the q-th powers of elements in I. If I is m-primary, the Hilbert-Kunz multiplicity of I in
R is defined by
λ(R/I [q] )
.
eHK (I, R) = lim
e→∞
qd
The existence of the previous limit was proven by Monsky [Mon83]. Under mild conditions,
eHK (m, R) = 1 if and only if R is a regular ring [WY00]. The Hilbert-Kunz multiplicity can
be interpreted as a measure of singularity: the smaller it is, the nicer the ring is. For instance,
Aberbach and Enescu proved rings with small Hilbert-Kunz multiplicity are Gorenstein and
F -regular [AE08] (see also [BE04]). We have that
e
λ(R/I [q] ) = q α λ(R/I ⊗R e R) = q α λ(TorR
0 (R/I, R))
1
2
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
This gives rise to the following extension of the Hilbert-Kunz multiplicity for higher Tor
functors. Let N be a finitely generated R-module. For an integer i > 0 define
e
λ(TorR
i (M, N))
.
e→∞
q (d+α)
βiF (M, N) = lim
We denote βiF (K, R) by βiF (R) and call it the i-th Frobenius Betti number of R.
These higher invariants also detect regularity. Namely, Aberbach and Li [AL08] show that
R is a regular ring if and only if βiF (R) = 0 for some i > 1. Note that R is regular if and only
if K has finite projective dimension as R-module. In this manuscript, we seek an answer to
the following question.
Question 1.1. Let M be an R-module of finite length. What vanishing conditions on
βiF (M, R) imply that M has finite projective dimension?
Miller [Mil00] showed if R is a complete intersection and M is an R-module of finite length,
then the vanishing of βiF (M, R) for some i > 1 implies that M has finite projective dimension.
We refer to [DS13] for related results for Gorenstein rings. In Section 4, we answer this
question for rings that have small regular algebras, and for rings that have F -contributors.
Later, we focus on one-dimensional rings and give the following characterization for the
vanishing of βiF (M, R).
Theorem. (see Theorem 4.7) Let (R, m, K) be a one-dimensional local ring of positive
characteristic p, and let M be an R-module of finite length. Let (Gj , ϕj )j>0 be a minimal
free resolution of M. Then the following are equivalent:
(i) Im(ϕi+1 ) ⊆ Hm0 (Gi ).
e
(ii) TorR
i (M, (R/p)) = 0 for all e > 0, for all p ∈ Min(R).
R
e
(iii) Tori (M, (R/p)) = 0 for all e ≫ 0, for all p ∈ Min(R).
(iv) βiF (M, R) = 0.
Assume in addition that R is complete and K is algebraically closed. If V denotes the
integral closure of R in its ring of fractions, then the conditions above are equivalent to
(v) TorR
i (M, V ) = 0.
As a consequence of this theorem, we show that if R is a one-dimensional Cohen-Macaulay
local ring and λ(M) < ∞, then βiF (M, R) = 0 for any i > 1 implies that M has finite projective dimension (see Corollary 4.8). Furthermore, we prove that the vanishing of two consecutive βiF (M, R) implies that M has finite projective dimension in every one-dimensional
local ring (see Corollary 4.9).
From the theorem above we have that βiF (M, R) = 0 if and only the (i + 1)-syzygy has
finite length. On the other hand, there are modules of infinite projective dimension over onedimensional rings which have second syzygies of finite length (see Example 5.1). Motivated
by Iyengar’s question about the eventual stability of dimensions of syzygies and by our results
regarding βiF (M, R), we ask the following question.
Question 1.2. Let R be a d-dimensional local ring, and let M be a finitely generated Rmodule such that pdR (M) = ∞ and λ(M) < ∞. If i > d + 1, then must the length of the
i-th syzygy be infinite?
In Section 5, we study this question, mainly for one-dimensional rings. In particular, we
show that the answer to Question 1.2 is positive for one-dimensional Buchsbaum rings (see
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
3
Proposition 5.3). We also obtain a partial answer for modules whose Betti numbers are
eventually non-decreasing (see Proposition 5.7). Furthermore, we show that the first and
third syzygies of M are either zero or have infinite length for every finite length module M
over a one-dimensional ring (see Corollary 5.10). The assumption of M having finite length
is necessary, as shown in Example 5.11. Aside from the study of projective dimension, we
study basic properties of the higher invariants that resemble the Hilbert-Kunz multiplicity
in other aspects.
2. Notation and terminology
Throughout this article, (R, m, K) will denote a local ring of Krull dimension dim(R) =
d. For a finitely generated R-module M, we define dim(M) = dim(R/(0 :R M)), where
0 :R M = {x ∈ R | xM = 0}. When M = 0, we set dim(M) = −1. An element x ∈ R
such that dim(R/(x)) = d − 1 will be called a parameter of R. Given a finitely generated
R-module M, a minimal free resolution (G• , ϕ• ) of M is an exact sequence
...
//
Gi+1
ϕi+1
//
Gi
ϕi
//
......
//
G1
ϕ1
//
G0
//
M
//
0
such that Gi ∼
= Rβi (M ) are free R-modules and Im(ϕi+1 ) ⊆ mGi . The integers βi (M) =
rk(Gi ) = λ(TorR
j (M, K)) are called the Betti numbers of M. If βi (M) = 0 for some i, we
say that M has finite projective dimension, and that it is equal to pdR (M) = max{i ∈
N | βi (M) 6= 0}. We adopt the convention that pdR (M) = −∞, when M = 0. For all
i > 0 we set Ωi (M) = Coker(ϕi ), and we call it the i-th syzygy of the module M. Note that
Ω0 (M) = M. When no confusion may arise, we will denote Ωi (M) simply by Ωi .
Throughout the manuscript we often make use of local cohomology tools. For every k ∈ N,
the quotient map R/mk+1 → R/mk induces maps of functors
ExtiR (R/mk , −) → ExtiR (R/mk+1 , −).
For an R-module M, we define the i-th local cohomology of M with support on m by
Hmi (M) = lim ExtiR (R/mk , M).
S
k→∞
In particular, Hm0 (M) = k∈N 0 :M mk = {v ∈ M | mk v = 0 for some k ∈ N}. For a
non-zero finitely generated R-module M, depth(M) denotes the smallest integer j such that
Hmj (R) 6= 0. When depth(M) = dim(M), the module is called Cohen-Macaulay, and M is
called maximal Cohen-Macaulay if depth(M) = dim(R).
We now review some basic facts about integral closures. For an ideal I ⊆ R and an element
x ∈ R we say that x is integral over I if it satisfies an equation of the form xn + r1 xn−1 + . . .+
rn = 0, where rj ∈ I j for all j = 1, . . . , n. The set of elements integral over I forms an ideal,
which is called the integral closure of I, and denoted I. For an ideal J ⊆ I, we say that J
is a reduction of I if J = I. We say that J is a minimal reduction of I if it is a reduction
of I which minimal with respect to containment. We refer the reader to [SH06, Chapter 8]
for more details about reductions. For a domain R, let V be the integral closure of R in its
field of fractions L. We define the conductor of R as the set of all elements z ∈ L such that
zV ⊆ R, and we denote it by C. When V is finite over R, one can show that C is the largest
ideal which is common to R and V , and that C contains a non-zero divisor for R [SH06,
Exercise 2.11]. In particular, if (R, m, K) is an excellent one dimensional local domain, the
conductor is m-primary. See [SH06, Chapter 12] for more results about conductors.
4
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
We also need the notion of dualizing complex. We refer to [Rob80, P. 51] or to [Har66,
Chapter V] for more details.
Definition 2.1. Let (S, n, L) be a local ring of dimension d. We say that a complex D • is
a dualizing complex of S if
L
(1) D i = dim S/p=d−i ES (S/p).
(2) The cohomology H i (D • ) is finitely generated.
Remark 2.2. If (S, n, L) is a complete ring, then S has a dualizing complex, DS• [Har66,
P. 299]. If p is a prime ideal such that dim S/p = dim S, we have that Sp is Artinian,
hence complete. In addition, DS• p := DS• ⊗ Sp is a dualizing complex for Sp . Furthermore,
H j (DS• p ) = H j (DS• ) ⊗ Sp = 0 for j > 0 and ωSp ∼
= H 0(DS• p ) = ESp (Sp /pSp ), because Sp is
Artinian, and so, Cohen-Macaulay.
We now introduce Buchsbaum rings, which we study Question 1.2 in Section 5.
Definition 2.3. Let (R, m, K) be a local ring of dimension d. We say that R is a Buchsbaum
ring if, for any system of parameters x1 , . . . , xd , we have
(x1 , . . . , xi−1 ) : xi = (x1 , . . . , xi−1 ) : m
for every i = 1, . . . , d. When i = 1, the ideal (x1 , . . . , xi−1 ) is simply the zero ideal.
There are several equivalent ways to define Buchsbaum rings, but the one above is the
most convenient for our purposes.
Remark 2.4. Let (R, m, K) be a one-dimensional local ring. Suppose that R is not CohenMacaulay, so that Hm0 (R) 6= 0. Then there exists a parameter x of R such that Hm0 (R) =
0 :R x. In fact, fix an integer n ∈ N such that mn Hm0 (R), using that Hm0 (R) ⊆ R is an
ideal, hence it is finitely generated. Take any parameter y ∈ m, and set x = y n . With this
choice, one has xHm0 (R) ⊆ mn Hm0 (R) = 0, so that Hm0 (R) ⊆ 0 :R x. On the other hand, there
exists k ∈ N such that mk ⊆ (x). Therefore, if r ∈ 0 :R x, we get rmk ⊆ r(x) = 0, so that
r ∈ Hm0 (R). We conclude that Hm0 (R) = 0 :R x.
Remark 2.5. Let (R, m, K) be a one-dimensional Buchsbaum ring. By Remark 2.4, there
exists a parameter x ∈ R such that 0 :R x = Hm0 (R). By definition of Buchsbaum ring, we
have that
Hm0 (R) = 0 :R x = 0 :R m.
Lt
K is a finite dimensional K-vector space.
In particular, mH 0 (R) = 0, that is, H 0 (R) ∼
=
m
m
j=1
For the rest of the section, we assume that (R, m, K) is a local ring of characteristic
p > 0. For an integer e > 1, we consider the e-th iteration of the Frobenius endomorphism
e
F e : R → R, F e (r) = r p for all r ∈ R. For an R-module M, one can consider M with
the action induced by restriction of scalars, via F e . We denote this module by eM. More
e
explicitly, for r ∈ R and m ∈ eM, we have r ∗ m = r p m.
Definition 2.6. We say that R is F -finite if 1 R is a finitely generated R-module.
Note that R is F -finite if and only if eR is a finitely generated R-module for any > 1 or,
equivalently, for all e > 1. Furthermore, F -finite rings are excellent [Kun76, Theorem 2.5].
When R is F -finite, we have that [K : K p ] < ∞. In this case, we set α = logp [K : K p ].
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
5
3. Definition and properties of βiF (M, N) and µFi (M, N)
We start by defining the Frobenius Betti numbers and showing basic properties that
resemble the Hilbert-Kunz multiplicity.
Definition 3.1 (see also [Li08]). Let (R, m, K) be a local ring of characteristic p > 0, let M
be an R-module of finite length and let N be a finitely generated R-module. Define
e
λ(TorR
i (M, N))
.
e→∞
q (d+α)
F
βi,R
(M, N) = lim
F
F
We denote βi,R
(K, R) by βi,R
(R) and call it the i-th Frobenius Betti number of R. If the ring
is clear from the context, we only write βiF (M, N). The above limit exists by the main result
in [Sei89].
We point out that Li [Li08] focused on βiF (R/I, R), which he denoted by ti (I, R).
Example 3.2. Suppose that R = S/f S, where S is an F -finite regular local ring of characteristic p > 0, and f ∈ S. We can write eR ∼
= Rae ⊕ Me , where Me has no free summands.
ae
exists [Tuc12, Theorem 4.9], and it is called the F -signature of
The limit s(R) := lim q(d+α)
e→∞
R, which is an important invariant related to strong F -regularity [AL03, Theorem 0.2]. We
consider the minimal free resolution of eR:
...
//
e
Rβi ( R)
//
e
Rβi−1 ( R)
//
...
//
e
Rβ0 ( R)
//
e
R
//
0.
We note that β0 (eR) = ae + β0 (Me ) and βi (eR) = βi (Me ) for i > 0. Since Me is a maximal
Cohen-Macaulay module with no free summands, we have that βi (Me ) = β0 (Me ) for i > 0
[Eis80, Proposition 5.3 and Theorem 6.1]. Then,
β0 (eR)
ae
β0 (Me )
β0 (Me )
= lim (d+α) + lim (d+α) = s(R) + lim (d+α) .
(d+α)
e→∞ q
e→∞ q
e→∞ q
e→∞ q
β0F (R) = eHK (m, R) = lim
Hence,
βiF (R)
βi (eR)
βi (Me )
β0 (Me )
= lim (d+α) = lim (d+α) = lim (d+α) = eHK (m, R) − s(R)
e→∞ q
e→∞ q
e→∞ q
for i > 0.
As for the Hilbert-Kunz multiplicity, the Frobenius Betti numbers also increase after taking
the quotient by a nonzero divisor.
Proposition 3.3. Let (R, m, K) be a local ring of characteristic p > 0, M be an R-module
of finite length, and x ∈ ann(M) be a nonzero divisor on R. Then
R/(x)
e
λ(TorR
λ(Tori
(M, e (R/(x))))
i (M, R))
F
= lim
6
β
(N,
R/(x))
=
lim
,
i,R/(x)
e→∞
e→∞
q (d+α)
q (d−1+α)
where the subscripts indicate over which ring we are computing the Frobenius Betti numbers.
F
F
In particular, βi,R
(R) 6 βi,R/(x)
(R/(x)).
F
βi,R
(M, R)
Proof. Let G• → e R be a minimal free resolution of e R. Let R denote R/xR. We have that
G• = G• ⊗R R is a free resolution for e R ⊗R R as an R-module. Furthermore, we have that
e
H0 (G• ) = e R ⊗R R. This is a consequence of the fact that Hi (G• ) = TorR
i ( R, R) = 0 for
e
i > 0 because x is a nonzero divisor on R and R.
6
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Since x ∈ ann(M), we have that
R
e
e
TorR
i (M, R) = Hi (M ⊗R G• ) = Hi (M ⊗R R ⊗R G• ) = Hi (M ⊗R G• ) = Tori (M, R ⊗R R).
Since x is a nonzero divisor on R, there is a filtration
0 = L0 ⊆ L1 ⊆ . . . ⊆ Lqα = e R ⊗R R
R
e
e
α
such that Lr+1 /Lr = e (R). As a consequence, λ(TorR
i (M, R ⊗R R)) 6 q λ(Tori (M, R))
Then
e
e
λ(TorR
λ(TorR
i (M, R))
i (M, R))
6
lim
lim
e→∞
e→∞
q (d+α)
q (d−1+α)
We now introduce µFi (M, N), a dual version of βiF (M, N), which is defined in terms of
Ext. In Proposition 3.11, we establish a relation between these asymptotic invariants.
Definition 3.4. Let (R, m, K) be a local ring of characteristic p > 0, let M be an R-module
of finite length, and let N be a finitely generated R-module. We define
µFi (M, N)
λ(ExtiR (M, e N))
= lim
,
e→∞
q (d+α)
Next, we prove that the numbers µFi (M, N) are well defined. The proof is essentially the
same as the one for βiF (M, N), as it uses the main result in [Sei89]. Nonetheless, we include
it here for completeness.
Proposition 3.5. Let (R, m, K) be a local ring of characteristic p > 0, let M be an Rλ(ExtiR (N,e M ))
module of finite length, and let N be a finely generated R-module. Then, lim
q (d+α)
e→∞
exists. Moreover, if 0 → N1 → N2 → N3 → 0 is a short exact sequence, then
λ(ExtiR (M, e N2 ))
λ(ExtiR (M, e N1 ))
λ(ExtiR (M, e N3 ))
=
lim
+
lim
.
e→∞
e→∞
e→∞
q (d+α)
q (d+α)
q (d+α)
lim
Proof. Let G• → M be a minimal free resolution of M and define
ge (N) = λ(H i (HomR (G• ), eN)).
Let 0 → N1 → N2 → N3 → 0 be a short exact sequence of finitely generated R-modules.
We have that ge (N2 ) 6 ge (N1 ) + ge (N3 ) and equality holds if the sequence splits. Then,
ge (N)
λ(ExtiR (M, eN))
=
lim
e→∞ q (d+α)
e→∞
q (d+α)
exists, and it is additive in short exact sequences [Sei89].
lim
Proposition 3.6. Let (R, m, K) be a local ring of characteristic p > 0, M be an R-module
of finite length, and N be a finitely generated R-module. Let Λ be the set of all prime ideals
p such that dim R/p = dim R. We have that
X
βiF (M, N) =
βiF (M, R/p)λRp (Np )
p∈Λ
and
µFi (M, N) =
X
p∈Λ
µFi (M, R/p)λRp (Np ).
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
7
Proof. We only prove the first statement, since the proof of the second is completely analogous. Let 0 = N0 ⊆ N1 ⊆ . . . ⊆ Nh = N be a filtration for N such that Nj /Nj−1 ∼
= R/pj ,
where pj ⊆ R is a prime ideal. Thus, we have short exact sequences 0 → Nj−1 → Nj →
P
R/pj → 0. We deduce that βiF (M, N) = hj=1 βiF (M, R/pj ) [Sei89, Proposition 1(b)]. In
addition, we have that βiF (M, R/pj ) = 0 whenever dim(R/pj ) < dim(R) [Sei89, Proposition
1(a)]. To prove the result, we need to count the number of times that a prime p such that
dim R/p = dim R appears in the prime filtration. This number is obtained by localizing the
above filtration at p, and counting the length of the resulting chain. Since the localized chain
is a composition series of the module Np , we obtain that the number of times p appears in
the prime filtration above is given by λRp (Np ). Then
βiF (M, N)
=
h
X
βiF (R/pj ) =
j=1
pj ∈ Λ
X
βiF (M, R/p)λRp (Np ).
p∈Λ
Remark 3.7. It follows from Proposition 3.6 that, if βiF (M, R) = 0 for some i ∈ N, we have
that βiF (N, R/p) = 0 for every minimal prime of R such that dim(R/p) = d. Therefore,
if this is the case, βiF (M, N) = 0 for every finitely generated R-module N, using again
Proposition 3.6. A similar statement holds for µFi (M, R).
The following theorem is related to results of Chang [Cha97, Lemma 1.20 and Corollary
2.4], and in some cases it follows from them. We present a different proof that does not use
spectral sequences.
Theorem 3.8. Let (R, m, K) be a local ring of characteristic p > 0, M be an R-module of
finite length, and N be a finitely generated R-module. Then
λ(ExtiR (M, e N))
=0
lim
e→∞
q (i+1+α)
for i < d. In particular, µFi (M, N) = 0 for i < d.
Proof. Our proof will be by induction on n = dim(N).
If n = 0, we have that h = λ(N) is finite. There is a filtration
0 = N0 ⊆ N1 ⊆ . . . ⊆ Nh = N
such that Nj /Nj−1 ∼
= K. From the short exact sequences 0 → Nj−1 → Nj → K → 0, we
have that
λ(ExtiR (M, e Nj ))) 6 λ(ExtiR (K, e Nj−1 )) + λ(ExtiR (K, e K)).
Since
λ(ExtiR (M, e K))
q α λ(ExtiR (M, K))
λ(ExtiR (M, K))
lim
= lim
= lim
= 0,
e→∞
e→∞
e→∞
q (i+1+α)
q (i+1+α)
q (i+1)
we have that
λ(ExtiR (M, e N))
=0
e→∞
q (i+1+α)
lim
by an inductive argument.
8
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Suppose that our claim is true for modules of dimension less or equal to n − 1. There is a
filtration
0 = N0 ⊆ N1 ⊆ . . . ⊆ Nh = N
such that Nj /Nj−1 ∼
= R/pj , where pj ⊂ R is a prime ideal. From the short exact sequences
0 → Nj−1 → Nj → R/pj → 0 we have that
λ(ExtiR (M, e Nj )) 6 λ(ExtiR (M, e Nj−1 )) + λ(ExtiR (M, e (R/pj ))).
It suffices to show that
λ(ExtiR (M, e (R/pj )))
lim
=0
e→∞
q (i+1+α)
(3.0.1)
for primes pj such that dimR (R/pj ) = n = dimR N. Let T = R/pj . Let x ∈ AnnR M \ pj ,
which exists because dimR T = dimR N > 0 = dimR M. We have a short exact sequence
0
//
e
x
T
//
e
T
//
e
T /x(e T )
//
0,
which induces a long exact sequence
(3.0.2)
...
//
ExtiR (M, e T )
0
//
ExtiR (M, e T )
//
ExtiR (M, e T /x(e T ))
//
....
Then, for every i,
e
e
λ(ExtiR (M, e T )) 6 λ(Exti−1
R (M, T /x( T ))).
We have a filtration
0 = L0 ⊆ L1 ⊆ . . . ⊆ Lqα = e T /x(e T )
such that Lr+1 /Lr = e (T /xT ) because x is not a zero divisor of T. From the induced long
exact sequence by ExtiR (M, −), we have that
λ(ExtiR (M, e T /x(e T ))) 6 q α λ(ExtiR (M, e (T /xT )))).
Therefore
e
e
λ(Exti−1
λ(ExtiR (M, e T ))
R (M, T /x( T )))
6
lim
e→∞
e→∞
q (i+1+α)
q (i+1+α)
e
q α λ(Exti−1
R (M, (T /xT )))
6 lim
e→∞
q (i+1+α)
e
λ(Exti−1
R (K, (T /xT ))))
= lim
e→∞
q (i+α)
= 0 because dim T /xT = n − 1.
lim
Corollary 3.9. Let (R, m, K) be a local ring of characteristic p > 0. Let N be a finitely
generated R-module, and let C be an R-module such that, for all e ≫ 0, C θe is a direct
θe
summand of e N for some θe ∈ N. Assume that θ = lim supe→∞ q(d+α)
> 0. Then, for all
R-modules M of finite length, and all integers i, we have
µFi (M, N) > θ · λ(ExtiR (M, C)).
In particular, C is a maximal Cohen-Macaulay module.
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
9
Proof. We have
λ(ExtiR (M, e N))
θe · λ(ExtiR (M, C))
>
lim
sup
= θ · λ(ExtiR (M, C)).
(d+α)
(d+α)
e→∞
q
q
e→∞
µFi (M, N) = lim
Using M = K in Theorem 3.8, we obtain that µFi (K, N) = 0 for all i < d. It follows from
the inequality that ExtiR (K, C) = 0 for all i < d, and then C is a maximal Cohen-Macaulay
module.
Remark 3.10. Let (R, m, K) be a local ring of characteristic p > 0, and N be a finitely
generated R-module. We say that an R-module C is an F -contributor of N if C θe is a direct
θe
summand of eN for e ≫ 0, and lim supe→∞ q(d+α)
> 0 [Yao05]. Corollary 3.9 shows that
every F -contributor is a maximal Cohen-Macaulay module. This was already noted by Yao
[Yao05, Lemma 2.2] when N has finite F -representation type.
The following proposition shows that taking limits with respect to Tor or Ext give the
same invariants up to a shift in the homological degrees.
Proposition 3.11. Let (R, m, K) be a local ring of characteristic p > 0, and M be an
R-module of finite length. Then
βiF (M, R) = µFd+i (M, R)
for every i ∈ N.
Proof. Since βiF (M, R) and µFd+i (M, R) are not affected by completion at m, we may assume
•
that R is a complete local ring. In this case, R has a dualizing complex DR
by Remark 2.2.
We have that
•
βiF (M, R) = µFd+i (M, H 0(DR
))
by [Cha97, Proposition 2.3(2)]. Let Λ be the set of all prime ideals of R such that dim R/p =
•
•
) = ωRp by Remark 2.2. We have that
dim R. Let p ∈ Λ. We have that (H 0(DR
))p = H 0(DR
p
ωRp = HomRp (Rp , ERp (Rp /pRp )) and λRp (ωRp ) = λRp (Rp ). Finally, by Proposition 3.6
X
•
•
))
µFd+i (M, H 0 (DR
)) =
µFd+i (M, R/p)λRp (H 0 (DR
p
p∈Λ
=
X
µFd+i (M, R/p)λRp (ωRp )
p∈Λ
=
X
µFd+i (M, R/p)λRp (Rp )
p∈Λ
= µFd+i (M, R).
Remark 3.12. If R itself has an F -contributor C, then we get a relation involving the βiF ’s.
In fact, by Proposition 3.11, we have βiF (M, R) = µFd+i (M, R) for all i ∈ N. Thus, in the
notation of Corollary 3.9, we have βiF (M, R) > θ · λ(Extd+i
R (M, C)).
We end this section with a proposition that shows how βiF (M, N) behaves under some flat
ring extensions. First, we need a different way to compute βiF (M, N).
10
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Remark 3.13. Let (R, m, K) be a local ring of characteristic p > 0, let M be an R-module
of finite length, and let N be a finitely generated R-module. Let G• = (Gj , ϕj )j>0 denote a
[q]
[q]
[q]
minimal free resolution of M. Let G• be the complex (Gj , ϕj )j>0, where the matrix of ϕj
has as entries the q-th powers of the entries in the matrix of ϕj . We have that
e
α
[q]
λ(TorR
i (M, N)) = q λ(Hi (G• ⊗R N)).
Hence,
[q]
βiF (M, N)
λ(Hi (G• ⊗R N))
= lim
.
q→∞
qd
Proposition 3.14. Let (R, m, K) → (S, n, L) be a flat extension of two F -finite local rings
of characteristic p > 0. Let M be a finite length R-module. Let α = logp [K : K p ] and
θ = logp [L : Lp ]. Suppose that mS = n. Then,
e
λ(TorR
λ(TorSi (M ⊗R S, e S))
i (M, R))
F
=
lim
= βi,S
(M ⊗R S, S).
e→∞
e→∞
pe(d+α)
pe(d+θ)
F
βi,R
(M, R) = lim
F
c R).
b
In particular, we have that βi,R
(M, R) = βi,FRb (M,
Proof. Let q = pe . We have that
e
λR (TorR
i (M, R))
= λR (Hi (G[q]
• )) by Remark 3.13.
qα
= λS (Hi (G[q]
• ⊗R S)) because S is flat and mS = n.
= λS (Hi ((G• ⊗R S)[q] )) because G• is free.
=
λS (TorSi (M ⊗R S, e S)
by Remark 3.13 and because S is flat.
qθ
After dividing by q d and taking limits, we have that
F
F
βi,R
(M, R) = βi,S
(M ⊗R S, S).
4. Relations with projective dimension
Let (R, m, K) be a local F -finite ring of characteristic p > 0, and let M be an R-module of
finite length. In this section we investigate when the vanishing of βiF (M, R) detects whether
M has finite projective dimension.
We first recall known results in this direction. We have that R is a regular ring if and
only if βiF (R) = βiF (K, R) = 0 for some i > 1 [AL08, Corollary 3.2]. Let M be a finitely
e
generated R-module. If M has finite projective dimension, then TorR
i (M, R) = 0 for all
R
e
i > 0 and all e > 0 [PS73, Théorème 1.7]. Conversely, if Tori (M, R) = 0 for infinitely many
e and all i > 0, then M has finite projective dimension [Her74, Theorem 3.1]. In fact, even
e
more is true: if TorR
i (M, R) = 0 for depth(R) + 1 consecutive values of i and some e ≫ 0,
then M has finite projective dimension [KL98, Proposition 2.6] (see also [Mil03, Theorem
2.2.8]). Now, suppose that R is a complete intersection. If βiF (M, R) = 0 for some i > 0,
then M has finite projective dimension by [Mil00, Corollary 2.5] (see also [DS13, Corollary
4.11]).
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
11
Proposition 4.1. Let (R, m, K) be a local ring of characteristic p > 0, and let M be an
R-module of finite length. Suppose that there is a regular local ring (A, n, L) and a map of
local rings φ : R → A such that A is finitely generated as an R-module, and dim A = d. If
F
F
βjF (M, R) = βj+1
(M, R) = . . . = βj+d
(M, R) = 0,
then M has finite projective dimension.
Proof. We note that logp [L : Lp ] = logp [K : K p ] = α < ∞, and so, A is F -finite. Since A is
Lq(d+α)
A. Let x1 , . . . , xd ∈ A be a set of generators for n, and let
regular and local, e A ∼
=
Ir := (x1 , . . . , xr )A. By induction on r we will show that
R
TorR
j+r (M, A/Ir ) = . . . = Torj+d (M, A/Ir ) = 0
(4.0.3)
e
q
for every r. If r = 0, we have that TorR
i (M, A) = ⊕
R
R
e
(d+α)
λ(Tori (M, A)) = q
λ(Tori (M, A)), and thus
(d+α)
TorR
i (M, A) for every i ∈ N. Then,
βiF (M, A) = λ(TorR
i (M, A)).
Since A is finitely generated, and since βiF (M, R) = 0 for i = j, . . . , j + d by assumption, we
F
have that βjF (M, A) = . . . = βj+d
(M, A) = 0 by Remark 3.7. Hence, TorR
j (M, A) = . . . =
R
Torj+d (M, A) = 0. We suppose that (4.0.3) holds for r − 1 and prove it for r. We have a
short exact sequence
0
A/Ir−1
//
xr
//
A/Ir−1
//
A/Ir
//
0.
This induces a long exact sequence
...
//
TorR
i (M, A/Ir−1 )
xr
//
TorR
i (M, A/Ir−1 )
//
TorR
i (M, A/Ir )
//
TorR
i−1 (M, A/Ir−1 )
//
....
R
R
Since TorR
j+r−1 (M, A/Ir−1 ) = . . . = Torj+d (M, A/Ir−1 ) = 0, we have that Torj+r (M, A/Ir ) =
R
. . . = TorR
j+d (M, A/Ir ) = 0, proving the claim. In particular, we get Torj+d (M, A/Id ) = 0.
Since L = A/Id is a finite field extension of K, we have
R
0 = λ(TorR
j+d (M, A/Id )) = [L : K] · λ(Torj+d (M, K)).
Therefore, TorR
j+d (M, K) = 0 and M has finite projective dimension.
Lemma 4.2. Let (R, m, K) be a local ring of characteristic p > 0. Suppose that there is
an R-module N of dimension d that has an F -contributor C. Let M be an R-module of
e
finite length. If βiF (M, N) = 0, then TorR
i (M, C) = 0 for every e > 0. In particular, if R is
strongly F -regular of positive dimension d, and βiF (M, R) = 0 for d consecutive values of i,
then M has finite projective dimension.
′
′
Proof. For e′ ≫ 0 and q ′ = pe , we have that C θe′ is a direct summand of e N, for some
′
θe′
> 0. We note that (eC)θe′ is a direct summand of e+e N for
θe′ ∈ N such that lim sup q′(d+α)
all e > 0. Then
e
e+e′
λ(TorR
λ(TorR
N))
θe′
i (M, C))
i (M,
6 lim
= βiF (M, N) = 0.
lim sup ′(d+α)
(d+α)
′(d+α)
′
e
→∞
′
q
q
qq
e →∞
e
It follows that TorR
i (M, C) = 0. If R is strongly F -regular, then R is an F -contributor of
itself. In addition, R is Cohen-Macaulay, and if Tori (M, e R) = 0 for d consecutive values of
i and for e ≫ 0, we have that M has finite projective dimension [KL98, Proposition 2.6] (see
also [Mil03, Theorem 2.2.11]).
12
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Proposition 4.3. [CHKV06, Corollary 3.3] Let (R, m, K) be a local ring, let I be an integrally closed m-primary ideal, and let N be a finitely generated R-module. Then pdR (N) < i
if and only if TorR
i (N, R/I) = 0.
e
In particular, Proposition 4.3 shows that, if TorR
i (R/I, R) = 0 for some e > 1, then R is
regular [Kun69, Theorem 2.1]. We now present a similar result for Frobenius Betti numbers.
Proposition 4.4. Let (R, m, K) be a reduced local ring of characteristic p > 0. Suppose
that there exists an R-module N of dimension d that has an F -contributor C. If I is an
integrally closed m-primary ideal such that βiF (R/I, N) = 0 for some i > 0, then R is regular.
Proof. By Lemma 4.2, we have that Tori (R/I, e C) = 0 for every e > 0, and thus e C has finite
projective dimension by [CHKV06, Corollary 3.3]. Since e C is a maximal Cohen-Macaulay
e
(see Remark 3.10),L
we have that
module [Yao05, Lemma 2.2]L
L 1 C is a free module for every
1
2
1
∼
∼
e > 0. In particular, C = α R and C = ( α R) = α R is free as well. Therefore,
1
R is free and R is regular [Kun69, Theorem 2.1].
We now focus on one-dimensional rings. In this case, we can find a characterization of the
vanishing of βiF (M, R). We first prove two lemmas.
Lemma 4.5. Let (R, m, K) be a one-dimensional complete local domain of characteristic
p > 0, with K algebraically closed. Then there exists a parameter x ∈ R such that (xq ) = m[q]
e
for all q = pL
≫ 0. Furthermore, if V denotes the integral closure of R in its field of fractions,
e ∼
V for all e ≫ 0 (as R-modules).
then R =
Proof. Since R is a complete domain, we have that (V, mV , K) is a one dimensional, integrally
closed, local domain. Hence, V is a DVR. Let x ∈ R be a minimal reduction of m, and let
v denote the order valuation on V . Let x, y1 , . . . , yn be a minimal generating set of the
maximal ideal. We claim that we can choose the elements yi ’s such that v(x) < v(yi ) for all
i = 1, . . . , n. We have v(x) 6 v(yi ) for all i because x is a minimal reduction of m [SH06,
Proposition 6.8.1]. If equality holds, say for i = 1, we have that y1 /x = α ∈ KV = K since
K is algebraically closed. Fix a lifting u ∈ R of α. If we replace y1 for y1′ := y1 − ux we have
that x, y1′ , . . . , yn is still a minimal generating set of m. Now v(x) < v(y1′ ), since y1′ /x ∈ mV .
Similarly, if necessary, we may replace each yi to obtain our claim. Since the conductor C
[q]
is mV -primary, for all e ≫ 0 and all i = 1, . . . , n, we have that (yi /x)q = ri ∈ mV ⊆ C ⊆ R.
q
Thus yi = ri xq ∈ (x)q . This shows the first part of the lemma.
We now focus on the second part of the lemma. Since K is algebraically closed, R and K
have the same residue field. It then follows that R ⊆ V = R + mV . Since R is a domain, we
can identify eR with R1/q , the ring of q-th roots of R. For w ∈ V , we can write w = u + v,
[q]
for some u ∈ R and v ∈ mV . Therefore, we have that mV ⊆ C ⊆ R for e ≫ 0, because C is
mV primary. This shows that w q = uq + v q ∈ R, that is w ∈ R1/q . Thus, for e ≫ 0, we have
R ⊆ V ⊆ eR. Hence, eR is a V -module. Since V is a DVR, eR decomposes into a V -free part
e
and a V -torsion
L part. Therefore R is torsion free as a eV -module because R is a domain.
e
∼
Thus, R = q V . Finally, the V -module structure on R is compatible with the inclusion
L
V is also an isomorphism of R-modules.
R ⊆ V ; therefore, eR ∼
=
Lemma 4.6. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0. Let
(Gj , ϕj )j>0 be a minimal free resolution of a finite length R-module M. Suppose there exists
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
13
i > 0 such that Im(ϕi+1 ) 6⊆ pGi for some p ∈ Min(R). Then
e
λ(TorR
i (M, R))
> 0.
e→∞
qα
βiF (M, R) = lim
b = KJx1 , . . . , xn K/I for some n ∈ N
Proof. By the Cohen Structure Theorem, we have that R
and some ideal I ⊆ KJx1 , . . . , xn K. Let S = LJ1, . . . , xn K/I ′ , where L is the algebraic closure
of K and I ′ = I LJ1, . . . , xn K. Every inclusion K → L gives a flat extension R → S such
that mS is the maximal ideal of S. If Im(ϕi+1 ⊗R 1S ) = Im(ϕi+1 ) ⊗R S is contained in in
a minimal prime of S, then Im(ϕi+1 ) must be contained in the contraction of such minimal
prime to R. Then, we can assume that R is complete and that K is algebraically closed by
Proposition 3.14.
Let R denote R/p, x the class of the element x modulo p, and V the integral closure of
R. Since R/p is a one-dimensional complete local domain, by Lemma 4.5 we can choose
0 6= x ∈ R a minimal reduction of m := m/p and q0 = pe0 such that m[q] = (xq ) for q > q0 .
We may also choose q0 large enough so that xq V ∩ R ⊆ xR, by using the Artin-Rees Lemma
and the fact that the conductor from R to V is primary to the maximal ideal. In particular,
/ xR, where mV is the maximal ideal of V ,
(xq V :V r) ⊆ mV for every r ∈ R such that r ∈
which is a DVR.
[q]
[q]
Fix q > q0 and consider the matrix associated to ϕi+1 := ϕi+1 ⊗ 1R . Since q > q0 ,
[q]
Im(ϕi+1 ⊗ 1R ) ⊆ m[q] Gi = (xq )Gi . Because Im(ϕi+1 ) 6⊆ pGi , by changing the basis for Gi+1
if needed, we can assume that the matrix
[q]
ϕi+1
r1 ∗ . . .
r2 ∗ . . .
= xq+j
... ...
rn ∗ . . .
∗
∗
..
.
∗
,
where we have factored out the biggest possible power of x, so that r 1 ∈
/ (x). Here n = rk(Gi ).
[qq ′ ]
′
e′
Let q = p , and consider the matrix associated to ϕi+1 :
(4.0.4)
′
[qq ′ ]
ϕi+1 = x(q+j)q
′
rq1 ∗ . . .
′
rq2 ∗ . . .
.. ..
. .
′
rqn ∗ . . .
∗
∗
..
.
∗
.
′
′
′
[qq ′ ]
. In fact, we have that
We claim that [r q1 , rq2 , . . . , r qn ]T ∈ Ker ϕi
′
′
xqq +jq
′
r1 q
′
r2 q
..
.
rn q
′
[qq ′ ]
[qq ′ ]
;
∈ Im ϕi+1 ⊆ Ker ϕi
14
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
therefore,
[qq ′ ]
ϕi
′
′
qq′ +jq′
·
x
′
r1 q
′
r2 q
..
.
rn q
′
r1q
′
r2q
..
.
′
′
[qq ′ ]
= xqq +jq · ϕi
′
rn q
′
Since xqq +jq is a nonzero divisor in R, we have
′
r1q
q′
[qq ′ ] r 2
ϕi .. = 0,
.
′
rn q
which proves the claim. Thus
= 0.
[qq ′ ]
q′
q′ T
R[r
,
.
.
.
,
r
]
+
Im
ϕ
1
n
i+1
e+e′
λ(TorR
(R/p))) > λ
i (M,
′
[qq ]
Im ϕi+1
′
> λ
(rq1 ) + (xqq )
′
(xqq )
′
!
,
′
[qq ′ ]
[qq ′ ]
because Im ϕi+1 ⊆ (xqq )Gi . This comes from the expression of ϕi+1 in (4.0.4). We
also have projected onto the first component of Gi . We now have a cyclic module which is
′
′
isomorphic to the quotient of R by the ideal (xqq : r q1 ).
We claim that there exists an integer q1 = pe1 such that for all q ′ ,
′
(xqq : r q1 ) ⊆ (xq /q1 ).
′
′
Assuming the claim and lifting back to R, we get
′
λ(TorR
i (M,
e+e′
R)) > λ
>λ
(rq1 ) + (xqq )
′
(xqq )
′
R
(xq /q1 )
′
!
.
Dividing by qq ′ and taking the limit as e′ → ∞, we get
e+e
λ(TorR
(R)))
i (M,
= lim
′
e′ →∞
qq
′
1
λ(R/(xq /q1 ))
> lim
=
eHK (x, R) > 0.
′
′
e →∞
qq
qq1
′
βiF (M, R)
Since dim(R/q) = dim(R) for q ∈ Spec(R) if and only if q ∈ Min(R), we have
X
βiF (M, R) =
βiF (M, R/q)λ(Rq ) > βiF (M, R/p) > 0.
q∈Min(R)
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
15
by Proposition 3.6.
′
′
′
′
It remains to prove the claim. Suppose that u ∈ (xqq : rq1 ). Then u ∈ (xqq : r q1 )V ∩ R =
′
′
(xq V :V r 1 )[q ] ∩ R ⊆ mqV ∩ R by the choice of q. Since the conductor of R is primary to the
′
′
maximal ideal it follows that there exists a q1 = pe1 such that mqV ∩ R ⊆ (xq /q1 ) as claimed.
Theorem 4.7. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0, and
M be an R-module of finite length. Let (Gj , ϕj )j>0 denote a minimal free resolution of M.
Then the following are equivalent:
(i)
(ii)
(iii)
(iv)
Im(ϕi+1 ) ⊆ Hm0 (Gi ).
e
TorR
i (M, (R/p)) = 0 for all e > 0, for all p ∈ Min(R).
e
TorR
i (M, (R/p)) = 0 for all e ≫ 0, for all p ∈ Min(R).
F
βi (M, R) = 0.
Assume in addition that R is complete and K is algebraically closed. If V denotes the
integral closure of R in its ring of fractions, then the conditions above are equivalent to
(v) TorR
i (M, V ) = 0.
Proof. We will show that (i) ⇒ (ii) ⇒ (iii) ⇒ (iv) ⇒ (i). We assume (i). Let p ∈ Min(R).
Since M has finite length we have Mp = 0, and thus
R
p
e
e
TorR
j (M, (R/p))p = Torj (Mp , (R/p)p ) = 0
for all j > 0. In particular, the complex
[q]
e
(G• ⊗ (R))p : . . .
//
(Gi+1 )p
(ϕi+1 )p
[q]
//
(Gi )p
(ϕi )p
//
(Gi−1 )p
//
...
//
(G0 )p
//
0
is split exact. All the entries in a matrix associated to ϕi+1 are in Hm0 (R), and in particular
[q]
they are nilpotent. We choose q0 = pe0 such that Im(ϕi+1 ) = 0 for all q > q0 . For such q, we
[q]
[q]
have (ϕi+1 )p ≡ 0; therefore, (Gi )p splits inside (Gi−1 )p via (ϕi )p . This means that
(4.0.5)
[q]
bi := rk((Gi )p ) = rk(Gi ) = rk((ϕi )p )
[q]
Ibi (ϕi ) 6⊆ p,
and
where Ir (ψ) denotes the Fitting ideal of an homomorphism ψ : G → H of rank r between two
free modules G and H. Note that localizing and taking powers only decreases the rank of ϕi ,
[q]
and bi is already the maximal possible rank. Thus bi = rk(ϕi ) for all q > 1. Furthermore,
[q]
if Ibi (ϕi ) was contained in p, then so would be Ibi (ϕi ). Hence (4.0.5) holds in fact for all
q = pe . Consider the following complex
[q]
0
//
Gi ⊗ R/p
ϕi ⊗1R/p
//
Gi−1 ⊗ R/p
//
Cq
//
0,
where Cq is the cokernel. By Buchsbaum-Eisenbud Theorem [BE73], the two conditions
(4.0.5) ensure that it is acyclic for all q. Then,
R
e
TorR
i (M, (R/p)) = Tor1 (Cq , R/p) = 0.
for all e > 0. This holds for all p ∈ Min(R), proving (ii).
16
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Clearly (ii) implies (iii). We now show (iii) ⇒ (iv). Since for all p ∈ Min(R), we have
e
F
TorR
i (M, (R/p)) = 0 for e ≫ 0, in particular βi (M, R/p) = 0. Hence
X
βiF (M, R) =
βiF (M, R/p)λRp (Rp ) = 0.
p∈Min(R)
We now prove (iv) ⇒ (i). Now suppose that βiF (M, R) = 0. By Lemma 4.6, we have
\
√
Im(ϕi+1 ) ⊆
pGi = 0Gi .
p∈Min(R)
Since the image is nilpotent, as noticed above in (4.0.5) taking q = 1, we have
bi = rk(Gi ) = rk(ϕi )
and
Ibi (ϕi ) 6⊆ p
for all p ∈ Min(R). Localizing the resolution at any p ∈ Min(R) gives a split exact complex
(G• )p : 0
//
(Gi )p
(ϕi )p
//
......
//
(G0 )p
//
0.
In particular, Im((ϕi+1 )p ) = (Im(ϕi+1 ))p = 0. This holds for all minimal primes p of R,
proving that Im(ϕi+1 ) ⊆ Hm0 (Gi ).
Finally, assume that R is complete and K is algebraically closed, and let V be integral closure of R in its ring of fractions. Let p ∈ Min(R) and let V (p) be
L the integral
e
∼
closure of R/p, which is a DVR. By Lemma 4.5, we have
V (p) for all
L thatR (R/p) =
e
∼
e ≫ 0. Condition (iii) implies that TorR
Tor
(M,
V
(p))
=
0, therefore
(M,
(R/p))
=
i
i
L
R
∼
Tori (M, V (p)) = 0 for all p ∈ Min(R). Since V = p∈Min(R) V (p), we see that (iii) implies
R
(v). Conversely, if TorR
i (M, V ) = 0, by the same argument, we get that Tori (M, V (p)) = 0
R
implies Tori (M, e(R/p)) = 0 for all e ≫ 0 and for all p ∈ Min(R). Then, (v) implies (iii).
Corollary 4.8. Let (R, m, K) be a one-dimensional Cohen-Macaulay local ring of characteristic p > 0, and M be an R-module of finite length. Then the following are equivalent:
(i) βiF (M, R) = 0 for all i > 1.
(ii) βiF (M, R) = 0 for some i > 1.
(iii) pdR (M) < ∞.
Proof. Clearly (i) implies (ii). Now assume (ii), we want to show that (iii) holds. By
assumption, there exists an integer i > 1 such that βiF (M, R) = 0. Then, Theorem 4.7 implies
that Im(ϕi+1 ) ⊆ Hm0 (Gi ), where (Gj , ϕj )j>0 is a minimal free resolution of M. However, R
has positive depth and hence
Im(ϕi+1 ) = Hm0 (Im(ϕi+1 )) ⊆ Hm0 (Gi ) = 0,
since Gi is a free module. Thus Im(ϕi+1 ) = 0 and pdR (M) < ∞. Finally, if (iii) holds,
e
we have TorR
i (M, R) = 0 for all i > 1 and e > 0 [PS73, Théorème 1.7]. In particular,
βiF (M, eR) = 0 for all i > 1.
Corollary 4.9. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0, and
F
let M be a finite length R-module. If βiF (M, R) = βi+1
(M, R) = 0 for some i > 1, then
pdR (M) < ∞. In particular, for any parameter x, if β2F (R/(x), R) = 0 then R is CohenMacaulay.
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
17
Proof. Let (Gj , ϕj )j>0 be a minimal free resolution of M. Since βiF (M, R) = 0, we have that
[q]
Im(ϕi+1 ) has finite length, and it is nilpotent. Take q = pe ≫ 0 so that Im(ϕi+1 ) = 0. For
such q we have Ker(ϕi+1 ) = Gi+1 . Since the resolution is minimal, we get
!
G
R
i+1
R
e
α
α
λ(Tori+1 (M, R)) = q λ
,
>q λ
[q]
m[q]
Im(ϕi+2 )
where the last inequality comes from projecting onto one of the components of Gi+1 . Dividing
by q and taking limits, we get
e
λ(TorR
λ(R/m[q] )
i+1 (M, R))
>
lim
= eHK (m, R) > 0,
e→∞
e→∞
q (1+α)
q
which is a contradiction.
The last claim follows from the fact that for any parameter x, we have
F
βi+1
(M, R) = lim
λ(H1 (xq ; R))
6 lim
= 0,
e→∞
q
where H1 denotes the first Koszul homology (see [Rob87] and [HH93, Theorem 6.2]).
β1F (R/(x), R)
Lemma 4.10. Let (R, m, K) be a local ring of positive characteristic p > 0, and p ∈ Spec(R).
If pdR (p) < ∞, then R is a domain.
Proof. Since p has finite projective dimension, given a minimal free resolution
0
//
Lt
ψt
//
...
//
L0
//
R/p
//
0
of R/p over R, we have that
[q]
0
//
Lt
ψt
//
...
//
L0
//
R/p[q]
//
0
is a minimal free resolution of R/p[q] over R [PS73, Exemples 1.3 d)]. Then AssR (R/p[q] ) =
{p}, and so, p[q] is p-primary for all q = pe . Let x ∈
/ p and assume xy = 0 for y ∈ R. This
[q]
implies that for any q, we have xy ∈ p . We conclude that y ∈ p[q] since x ∈
/ p. Thus
\
y∈
p[q] = (0).
q>1
In particular, the localization map R → Rp is injective. We have that pdR (R/p) < ∞ implies
pdRp (k(p)) < ∞. Then, Rp is a regular local ring; in particular, a domain. Therefore, R is
a domain.
Proposition 4.11. Let (R, m, K) be a one-dimensional local ring of characteristic p > 0,
and I be an m-primary integrally closed ideal. If βiF (R/I, R) = 0 for some i > 0, then R is
regular.
Proof. Let p be a minimal prime of R. Since βiF (R/I, R) = 0, by Theorem 4.7 we have
that TorR
i (R/I, R/p) = 0. By Proposition 4.3, it follows that pdR (R/p) < ∞, and thus R
is a domain by Lemma 4.10. Since one-dimensional local domains are Cohen-Macaulay, by
Corollary 4.8 we have that pdR (R/I) < ∞. In particular TorR
j (R/I, K) = 0 for j ≫ 0. We
conclude that pdR (K) < ∞ because R/I tests finite projective dimension [Bur68, Theorem
5(ii)]. Hence, R is regular.
18
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
5. Syzygies of finite length
We now present several characteristic-free results. In particular, we do not always assume
that the rings have positive characteristic. We focus on Question 1.2. Specifically, we give
support to the claim that a finite length R-module M of infinite projective dimension cannot
have a finite length syzygy Ωi for i > dim(R) + 1. As a consequence of our methods, we
describe, in some cases, the dimension of the syzygies.
It follows from Theorem 4.7 that if dim(R) = 1 and R has positive characteristic, then a
positive answer to Question 1.2 is equivalent to the statement: for every M of finite length,
βiF (M, R) = 0 for some i > 1 implies pdR (M) < ∞.
We now provide an example that shows that the requirement of i > dim(R)+1 in Question
1.2 is necessary to have a positive answer.
Example 5.1. Let R = Fp Jx, yK/(x2 , xy) and M = R/(x). Then dim(R) = 1. In addition,
0
(R) = (x) has
pdR (M) = ∞ because R is not Cohen-Macaulay. We have that Ω2 ∼
= H(x,y)
finite length.
Lemma 5.2. Let (R, m, K) be a local ring and let M be a finite length R-module that has
a finite length syzygy Ωi+1 , for some fixed i > 0. Then,
0
TorR
i M, R/Hm (R) = 0.
If R has positive characteristic p, then for all e > 0
e
0
TorR
i M, R/Hm (R)
= 0.
Proof. Set H := Hm0 (R). Let (G• , ϕ• ) be a minimal free resolution of M:
G• : . . .
//
ϕi+1
Gi+1
//
ϕi
Gi
//
ϕi−1
Gi−1
//
Gi−2
//
...
//
G0
//
M
//
0.
Tensor G• with R/H and denote by G• its residue class modulo H:
Gi+1
ϕi+1
//
ϕi
Gi
//
Gi−1
Since Im(ϕi+1 ) = Ωi+1 has finite length by assumption, we have ϕi+1 = 0. We want to show
that Ker(ϕi ) = 0 as well. For any p ∈ Spec(R) r {m}, the complex (G• )p is split exact:
0
//
(Gi )p
(ϕi )p
//
(Gi−1 )p
(ϕi−1 )p
//
(Gi−2 )p
//
...
//
(G0 )p
//
0,
because M and Ωi+1 have finite length. We have that rk((ϕi )p ) is maximal, because rk(Gi ) 6
rk(Gi−1 ) as the localized complex is split exact, and localizing only decreases the rank of a
map. Thus, r := rk(Gi ) = rk((ϕi )p ) = rk(ϕi ). Furthermore, Ir (ϕi ) 6⊆ p, by split exactness.
Since this holds for all p ∈ Spec(R) r {m}; in particular, we have depth(Ir (ϕi )) > 1. By the
Buchsbaum-Eisenbud Criterion, we have that
0
//
Gi
ϕi
//
Gi−1
//
Ωi−1 = Ωi−1 /HΩi−1
//
0.
is an exact complex. Therefore Ker(ϕi ) = 0, and hence TorR
i (M, R/H) = 0. For the second
part of the Lemma, when R has positive characteristic, the argument is the same: just
notice that the complex e(G• )p is again split exact for all primes p 6= m and apply the same
[q]
argument as above to the map ϕi .
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
19
We now give results that support an affirmative answer to Question 1.2 for one-dimensional
rings. Over Buchsbaum rings, the modules Hmi (R) are K-vector spaces for i < dim(R).
Because of this fact, we can prove the following proposition using Lemma 5.2.
Proposition 5.3. Let (R, m, K) be a one-dimensional Buchsbaum ring. Then the answer
to Question 1.2 is positive.
Proof. Assume that there exists a finite length R-module M such that Ωi+1 (M) has finite
length for some i > 2. By Lemma 5.2, we have
0
R
0
∼
0 = TorR
i M, R/Hm (R) = Tori−1 M, Hm (R) ,
Lt
where i − 1 > 1 for dimension shifting. By Remark 2.5, we have that Hm0 (R) ∼
= j=1 K.
Therefore,
t
M
0
0 = TorR
M,
H
(R)
=
TorR
i−1
m
i−1 (M, K) ,
j=1
TorR
i−1 (M, K)
which implies
= 0. Hence, pdR (M) 6 i − 2.
We now present two results about the dimension of syzygies of a finite-length module.
These results will be used in Proposition 5.7 to give a case in which a finite-length module
cannot have infinitely many syzygies of finite length.
Proposition 5.4. Let (R, m, K) be a local ring of dimension d and let M be a finite length
R-module. Let i > 1 and let Ωi be the i-th syzygy of M. Then either dim(Ωi ) = d or Ωi has
finite length.
Proof. By way of contradiction, we suppose dim(Ωi ) = k with 0 < k < d. Let G• → M → 0
be a minimal free resolution of M. By our assumption on dim(Ωi ), we can choose p ∈
Min(ann(Ωi )) r ({m} ∪ Min(R)) and localize G• at p. The resulting complex is split exact,
because Mp = 0. In particular, (Ωi )p is a free Rp -module. By our choice of p, we have that
(Ωi )p has finite length, and dim(Rp ) > 0, a contradiction.
Proposition 5.5. Let (R, m, K) be a local ring of positive dimension. Suppose there exists
an R-module M of infinite projective dimension and finite length which has a finite length
syzygy Ωi+1 , for some fixed i > 0. If βi (M) > βi−1 (M), then Ωi−1 has finite length as well
and R is one-dimensional.
Proof. Let (G• , ϕ• ) be a minimal free resolution of M:
ϕi+1
G• : Gi+1
◗◗◗
◗◗(( ((
Ωi+1
// Rβi (M )
▼▼▼
♦77
♦
▼▼▼&&
♦
* ♦♦
&&
ϕi
Ωi
// Rβi−1 (M )
PPP
♦♦77
PPP((
♦
((
* ♦♦♦
ϕi−1
Ωi−1
// G
88 i−2
q
q
+ qq
//
...
//
G0
//
M
//
0.
Let p ∈ Spec(R) r {m}. We localize G• at p. Since both M and Ωi+1 have finite length, we
have a split exact sequence
G• : 0
//
β (M )
Rp i
◆◆◆
◆
∼ ''
=
(Ωi )p
// Rpβi−1 (M )
◗◗◗
♥77
◗(( ((
) ♥♥♥♥
//
(Gi−2 )p
//
...
//
(G0 )p
//
0
(Ωi−1 )p .
In particular, this implies βi (M) 6 βi−1 (M). Since the opposite inequality holds by or
assumption, we have equality. Set β = βi (M) = βi−1 (M). From the split exact sequence
20
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
above, we also get that Rpβ ∼
= (Ωi )p ; therefore, (Ωi−1 )p = 0. Since p is an arbitrary prime
in Spec(R) r {m}, we have that Ωi−1 has finite length. Thus, we have a free complex
0 → F1 = Rβ → F0 = Rβ → 0 with finite length homology. We conclude that R has
dimension one by the New Intersection Theorem [Rob87].
Remark 5.6. If in Proposition 5.5 one assumes that the sequence of Betti numbers {βi (M)}
is non-decreasing, then one can repeat the argument above to show that i is necessarily odd,
and βi (M) = βi−1 (M), βi−2 (M) = βi−3 (M), . . ., β1 (M) = β0 (M). In addition, Ωj (M) has
finite length for all j even, 0 6 j 6 i + 1. In particular, the typical situation to study would
be (R, m, K) a one-dimensional ring and a resolution
0
//
Ω4
//
Rβ
//
Rβ ❏❏
❏❏
$$
Ω2
// Rα
::
t
ttt
//
Rα
//
M
//
0
with Ω4 and Ω2 of finite length.
As a consequence of these results, we give a partial answer to Question 1.2 in the case
where M has eventually non-decreasing Betti numbers. It is a conjecture of Avramov that
every finitely generated module over a local ring has eventually non-decreasing Betti numbers
[Avr84]. The conjecture is know to be true in several cases [Eis80, Les90, Cho90, Sun94,
AGP97, Sun98], in particular, for Golod rings [Les90, Corollaire 6.5].
Proposition 5.7. Let (R, m, K) be a local ring and let M be a finite length R-module of
infinite projective dimension with eventually non-decreasing Betti numbers. Then, for all
i ≫ 0, there exists p ∈ Min(R) such that dim(Ωi ) = dim(R/p). In particular, M cannot
have arbitrarily high syzygies of finite length.
Proof. If Supp(Ωi ) ∩ Min(R) 6= ∅ for all i ≫ 0 then we are done. By way of contradiction,
assume that there exist infinitely many syzygies Ωi of M such that Supp(Ωi ) ∩ Min(R) = ∅.
Notice that, by Proposition 5.4, such syzygies must have finite length. By replacing M with
a high enough syzygy, we can then assume that M is a module of finite length with nondecreasing Betti numbers, and with infinitely many syzygies of finite length. We have that
R is one-dimensional by Proposition 5.5. Furthermore, by Remark 5.6, we have β2i = β2i+1
for all i > 0. For i > 0 consider the short exact sequence
0
//
Ω2i+2
//
Rβ
ϕ
//
Rβ
//
Ω2i
//
0,
where β := β2i = β2i+1 . Let S := R[ϕ]. Then Rβ becomes an S-module. The exact sequence
above shows that Ω2i ∼
= (0 :Rβ ϕ). Then, by [SH06, Proposition
= Rβ ⊗S S/(ϕ) and Ω2i+2 ∼
11.1.9 (2)],
λ(Ω2i ) − λ(Ω2i+2 ) = e(ϕ; Rβ ),
where e(ϕ; −) denotes the Hilbert-Samuel multiplicity with respect to the ideal (ϕ) in S.
Since such multiplicity is always positive, we have that λ(Ω2i+2 ) < λ(Ω2i ), for all i > 0.
Since there cannot be an infinite strictly decreasing sequence of such lengths, we obtain a
contradiction.
Remark 5.8. Proposition 5.7 also follows from [BL13, Theorem 8], and it gives another proof
of the fact that, when M is a module of finite length with eventually non-decreasing Betti
numbers and R is equidimensional, then the sequence of integers {dim(Ωi )}∞
i=0 is constant
for i ≫ 0 (see [BL13, Corollary 2]).
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
21
Proposition 5.9. Let (R, m, K) be a one-dimensional local ring. Suppose that there exists
a finite length module M of infinite projective dimension that has a finite length syzygy
Ωi+1 , for some fixed i > 2. Then
λ(Ωi+1 ) =
i
X
(−1)i−j+1 λ(TorR
j (M, R/(x))),
j=0
where x is a suitable parameter.
Proof. Consider a minimal free resolution of M:
G• :
...
//
Gi+1 ◆
◆◆◆
''
// G
r99 i ■■■
■$$
rrr
Ωi+1
Ωi
// Gi−1
r99
r
r
r
...
//
G1 ■
■■■
$$
//
// G0
✉::
✉
✉
✉
Ω1
//
M
//
0.
For all j = 1, . . . , i + 1, we break it into short exact sequences:
0
//
Ωj
//
Gj−1
//
Ωj−1
//
0,
where Ω0 := M. These give two exact sequences:
0
Ωi+1
//
Hm0 (Gi )
//
//
Hm0 (Ωi )
//
0
and
0
//
Hm0 (Ωj )
//
Hm0 (Gj−1 )
//
Hm0 (Ωj−1 ).
The first short exact sequence comes from the fact that Ωi+1 has finite length, and so,
Hm1 (Ωi+1 ) = 0. Furthermore, the cokernel of the rightmost map in the second exact sequence,
which can be proved to be the kernel of the leftmost map in
Ωj ⊗R Hm1 (R)
//
Gj−1 ⊗R Hm1 (R)
//
Ωj−1 ⊗R Hm1 (R)
//
0
1
0
0
is then TorR
1 (Ωj−1 , Hm (R)). For simplicity, we denote ωj := λ(Hm (Ωj )), gj := λ(Hm (Gj ))
1
and αj := λ(TorR
1 (Ωj , H (R))). Then, we have relations
ωi+1 = gi − ωi
ωi
= gi−1 − ωi−1 + αi−1
..
.
ω2
ω1
= g 1 − ω 1 + α1
= g0 − λ(M) + λ(Tor1 (M, Hm1 (R))).
After localizing the resolution G• at any minimal prime p, since (Ωi+1 )p = 0, we obtain that
Pi
Pi
j
j
0
j=0 (−1) βj (M) = 0. Then,
j=0 (−1) gj = 0 because gj = βj (M) · λ(Hm (R)). Therefore,
ωi+1 = λ(Ωi+1 ) =
i−1
X
(−1)i−j αj + (−1)i λ(Tor1 (M, H 1 (R))) + (−1)i−1 λ(M).
j=1
Choose a parameter x such that Hm0 (R) = 0 :R x, as in Remark 2.4. By similar considerations we can also assume that xM = 0. From this choice, we have that xHm0 (Ωj ) = 0 for
all j = 0, . . . , i + 1, because Ωj ⊆ Gj−1 is a free R-module. Since the Tor modules can be
computed using flat resolutions, we have an exact sequence
0
//
Hm0 (R)
//
R
//
Rx
//
Hm1 (R)
//
0.
22
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
We complete on the left to get a flat resolution of Hm1 (R):
...
//
0
Rµ(Hm (R))
//
R ❖❖❖
//
♦77 Rx
♦
♦
♦♦
❖❖❖
''
//
Hm1 (R)
//
0
R/Hm0 (R)
By our choice of x, we have that a free resolution of R/x starts as
...
//
0
Rµ(Hm (R))
R
//
//
R
//
R/(x)
0.
//
For all j = 1, . . . , i − 1, we obtain
R
R
1
∼
∼
TorR
1 (Ωj , Hm (R)) = Tor1 (Ωj , R/(x)) = Torj+1 (M, R/(x)),
where the last isomorphism comes from dimension shifting. In addition,
TorR (M, H 1 (R)) ∼
= TorR (M, R/(x)).
1
Finally, since
xHm0 (Ω0 )
1
m
= xM = 0, we get
M∼
= TorR
= M/xM ∼
0 (M, R/(x)),
and the proposition then follows.
Corollary 5.10. Let (R, m, K) be a one-dimensional ring, and let M be a finite length
module of infinite projective dimension. Then λ(Ω1 ) = λ(Ω3 ) = ∞.
Proof. Note that λ(Ω1 ) = ∞ ; otherwise, we would have a short exact sequence
0
//
Ω1
G0
//
//
M
//
0
in which both Ω1 and M have finite length. This cannot happen because G0 6= 0 is free and
dim(R) = 1. Now let us assume by way of contradiction that λ(Ω3 ) < ∞. Let (G• , ϕ• ) be a
minimal free resolution of M:
0
//
Ω3
//
G2
ϕ2
//
ϕ1
G1
//
G0
//
M
//
0
Let x ∈ R be a parameter such that xM = xHm0 (R) = 0. Consider the short exact sequence
0
//
(x)
//
R
//
R/(x)
//
0.
By our choice of x we have 0 :R x = Hm0 (R), hence (x) ∼
= R/Hm0 (R). After tensoring the
sequence with M, we obtain that
0
//
TorR
1 (M, R/(x))
//
M/Hm0 (R)M
//
M
//
M/xM
//
0.
Since xM = 0, we obtain
0
λ(TorR
1 (M, R/(x))) = λ(M/Hm (R)M).
Then, by Proposition 5.9 we have
R
λ(Ω3 ) = −λ(TorR
2 (M, R/(x))) + λ(Tor1 (M, R/(x))) − λ(M)
6 λ(TorR
1 (M, R/(x))) − λ(M)
= λ(M/Hm0 (R)M) − λ(M) 6 0,
which gives a contradiction since Ω3 6= 0, because M has infinite projective dimension.
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
23
The following example is due to the second author, and it is taken from [BL13]. It shows
the assumption that M has finite length is needed in Corollary 5.10.
Example 5.11. Let S = Q[x, y, z, u, v] and let I ⊆ S be the ideal
I = (x2 , xz, z 2 , xu, zv, u2 , v 2 , zu + xv + uv, yu, yv, yx − zu, yz − xv).
Let R = S/I, which is a one-dimensional ring of depth 0. In this case y is a parameter,
0 :R y = (u, v, z 2 ) and (y) = 0 :R (0 :R y). Let M be the cokernel of the rightmost map in
the following exact complex
u
v
z2
R
3
[u
v z2 ]
y
R3 .
Then M is a one-dimensional module with first and third syzygies Ω1 ∼
=
= R/(y) and Ω3 ∼
0 :R y. These are both modules of finite length since y is a parameter.
...
//
//
R
//
R
//
Acknowledgments
The second author thanks the National Science Foundation for support through Grant
DMS-1259142. The third author thanks the National Council of Science and Technology of
Mexico (CONACYT) for support through Grant #207063. We thank the referee for helpful
comments and suggestions.
References
[AE08]
Ian M. Aberbach and Florian Enescu. Lower bounds for Hilbert-Kunz multiplicities in local
rings of fixed dimension. Michigan Math. J., 57:1–16, 2008. Special volume in honor of Melvin
Hochster. 1
[AGP97] Luchezar L. Avramov, Vesselin N. Gasharov, and Irena V. Peeva. Complete intersection dimension. Inst. Hautes Études Sci. Publ. Math., (86):67–114 (1998), 1997. 20
[AL03]
Ian M. Aberbach and Graham J. Leuschke. The F -signature and strong F -regularity. Math. Res.
Lett., 10(1):51–56, 2003. 5
[AL08]
Ian M. Aberbach and Jinjia Li. Asymptotic vanishing conditions which force regularity in local
rings of prime characteristic. Math. Res. Lett., 15(4):815–820, 2008. 2, 10
[Avr84]
Luchezar L. Avramov. Local algebra and rational homotopy. In Algebraic homotopy and local
algebra (Luminy, 1982), volume 113 of Astérisque, pages 15–43. Soc. Math. France, Paris, 1984.
20
[BE73]
David A. Buchsbaum and David Eisenbud. What makes a complex exact? J. Algebra, 25:259–268,
1973. 15
[BE04]
Manuel Blickle and Florian Enescu. On rings with small Hilbert-Kunz multiplicity. Proc. Amer.
Math. Soc., 132(9):2505–2509 (electronic), 2004. 1
[BL13]
Kristen A. Beck and Micah J. Leamer. Asymptotic behavior of dimensions of syzygies. Proc.
Amer. Math. Soc., 141(7):2245–2252, 2013. 20, 23
[Bur68]
Lindsay Burch. On ideals of finite homological dimension in local rings. Proc. Cambridge Philos.
Soc., 64:941–948, 1968. 17
[Cha97]
Shou-Te Chang. Hilbert-Kunz functions and Frobenius functors. Trans. Amer. Math. Soc.,
349(3):1091–1119, 1997. 7, 9
[CHKV06] Alberto Corso, Craig Huneke, Daniel Katz, and Wolmer V. Vasconcelos. Integral closure of
ideals and annihilators of homology. In Commutative algebra, volume 244 of Lect. Notes Pure
Appl. Math., pages 33–48. Chapman & Hall/CRC, Boca Raton, FL, 2006. 12
[Cho90]
Sangki Choi. Betti numbers and the integral closure of ideals. Math. Scand., 66(2):173–184, 1990.
20
24
[DS13]
[Eis80]
[Har66]
[Her74]
[HH93]
[KL98]
[Kun69]
[Kun76]
[Les90]
[Li08]
[Mil00]
[Mil03]
[Mon83]
[PS73]
[Rob80]
[Rob87]
[Sei89]
[SH06]
[Sun94]
[Sun98]
[Tuc12]
[WY00]
[Yao05]
ALESSANDRO DE STEFANI, CRAIG HUNEKE, AND LUIS NÚÑEZ-BETANCOURT
Hailong Dao and Ilya Smirnov. On generalized hilbert-kunz function and multiplicity. Preprint,
arXiv:1305.1833 [math.AC]., 2013. 2, 10
David Eisenbud. Homological algebra on a complete intersection, with an application to group
representations. Trans. Amer. Math. Soc., 260(1):35–64, 1980. 5, 20
Robin Hartshorne. Residues and duality. Lecture notes of a seminar on the work of A.
Grothendieck, given at Harvard 1963/64. With an appendix by P. Deligne. Lecture Notes in
Mathematics, No. 20. Springer-Verlag, Berlin-New York, 1966. 4
Jürgen Herzog. Ringe der Charakteristik p und Frobeniusfunktoren. Math. Z., 140:67–78, 1974.
10
Melvin Hochster and Craig Huneke. Phantom homology. Mem. Amer. Math. Soc.,
103(490):vi+91, 1993. 17
Jee Koh and Kisuk Lee. Some restrictions on the maps in minimal resolutions. J. Algebra,
202(2):671–689, 1998. 10, 11
Ernst Kunz. Characterizations of regular local rings for characteristic p. Amer. J. Math., 91:772–
784, 1969. 12
Ernst Kunz. On Noetherian rings of characteristic p. Amer. J. Math., 98(4):999–1013, 1976. 4
Jack Lescot. Séries de Poincaré et modules inertes. J. Algebra, 132(1):22–49, 1990. 20
Jinjia Li. Characterizations of regular local rings in positive characteristics. Proc. Amer. Math.
Soc., 136(5):1553–1558, 2008. 5
Claudia Miller. A Frobenius characterization of finite projective dimension over complete intersections. Math. Z., 233(1):127–136, 2000. 2, 10
Claudia Miller. The Frobenius endomorphism and homological dimensions. In Commutative algebra (Grenoble/Lyon, 2001), volume 331 of Contemp. Math., pages 207–234. Amer. Math. Soc.,
Providence, RI, 2003. 10, 11
P. Monsky. The Hilbert-Kunz function. Math. Ann., 263(1):43–49, 1983. 1
C. Peskine and L. Szpiro. Dimension projective finie et cohomologie locale. Applications à la
démonstration de conjectures de M. Auslander, H. Bass et A. Grothendieck. Inst. Hautes Études
Sci. Publ. Math., (42):47–119, 1973. 10, 16, 17
Paul Roberts. Homological invariants of modules over commutative rings, volume 72 of Séminaire
de Mathématiques Supérieures [Seminar on Higher Mathematics]. Presses de l’Université de
Montréal, Montreal, Que., 1980. 4
Paul Roberts. Le théorème d’intersection. C. R. Acad. Sci. Paris Sér. I Math., 304(7):177–180,
1987. 17, 20
Gerhard Seibert. Complexes with homology of finite length and Frobenius functors. J. Algebra,
125(2):278–287, 1989. 5, 6, 7
Irena Swanson and Craig Huneke. Integral closure of ideals, rings, and modules, volume 336
of London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge,
2006. 3, 12, 20
Li-Chuan Sun. Growth of Betti numbers of modules over local rings of small embedding codimension or small linkage number. J. Pure Appl. Algebra, 96(1):57–71, 1994. 20
Li-Chuan Sun. Growth of Betti numbers of modules over generalized Golod rings. J. Algebra,
199(1):88–93, 1998. 20
Kevin Tucker. F -signature exists. Invent. Math., 190(3):743–765, 2012. 5
Kei-ichi Watanabe and Ken-ichi Yoshida. Hilbert-Kunz multiplicity and an inequality between
multiplicity and colength. J. Algebra, 230(1):295–317, 2000. 1
Yongwei Yao. Modules with finite F -representation type. J. London Math. Soc. (2), 72(1):53–72,
2005. 9, 12
Department of Mathematics, University of Virginia, Charlottesville, VA 22903
Email address: [email protected]
Department of Mathematics, University of Virginia, Charlottesville, VA 22903
Email address: [email protected]
FROBENIUS BETTI NUMBERS AND MODULES OF FINITE PROJECTIVE DIMENSION
Department of Mathematics, University of Virginia, Charlottesville, VA 22903
Email address: [email protected]
25
| 0math.AC
|
Marmara Turkish Coreference Corpus
and Coreference Resolution Baseline
Peter Schüller, Kübra Cingilli, Ferit Tunçer,
Barış Gün Sürmeli, Ayşegül Pekel, Ayşe Hande Karatay,
arXiv:1706.01863v1 [cs.CL] 6 Jun 2017
Marmara University,
Faculty of Engineering
Istanbul, Turkey
[email protected] [email protected]
[email protected] [email protected]
[email protected] [email protected]
Hacer Ezgi Karakaş
Sabanci University
Faculty of Engineering and Natural Science
Istanbul, Turkey
[email protected]
Version 1, June 7, 2017
Technical Report: manuscript submitted to
Natural Language Engineering by Cambridge University Press
http://journals.cambridge.org/nle
Abstract
We describe the Marmara Turkish Coreference Corpus, which is an annotation of the whole
METU-Sabanci Turkish Treebank with mentions and coreference chains. Collecting nine or more
independent annotations for each document allowed for fully automatic adjudication. We provide
a baseline system for Turkish mention detection and coreference resolution and evaluate it on the
corpus.
1
Introduction
Coreference Resolution is the task of identifying groups of phrases in a text that refer to the same
discourse entity. Such referring phrases are called mentions, a set of mentions that all refer to the
same discourse entity is called a chain. Annotated corpora are important resources for developing and
evaluating automatic coreference resolution methods.
Turkish is an agglutinative language and Turkish coreference resolution poses several challenges different from many other languages, in particular the absence of grammatical gender, the possibility of
null pronouns in subject and object position, possessive pronouns that can be expressed as suffixes, and
ambiguities among possessive and number morphemes, e.g., ‘çocukları’ can be analyzed as ‘their children’
or as ‘his/her children’, depending on context (Oflazer and Bozşahin, 1994).
No coreference resolution corpus exists for Turkish so far. We here describe the result of an effort
to create such a corpus based on the METU-Sabanci Turkish Treebank (Atalay et al., 2003; Oflazer
1
et al., 2003; Say et al., 2004), which is, to the best of our knowledge, the only publicly available Turkish
Treebank.
Our contributions are as follows.
• We describe two stages of annotation: in Phase I, annotators created mentions and chains, which
did not yield sufficient inter-annotator agreement. In Phase II, mentions were given to annotators
who created only chains. We collected on average more than ten independent annotations per
document for each document in the METU-Sabanci Turkish Treebank.
• We describe annotator profiles and adjudication, which was done semi-automatically in Phase I
and fully automatically in Phase II. We describe the principles of our automatic adjudication tool
which uses a voting-like approach. Such an automatic approach is possible because we collected
enough (on average 10) annotations per document.
• We describe the XML format used to address documents, sentences, and tokens in the METUSabanci Turkish Treebank. We provide a public version of the corpus as XML, including tools
to convert the corpus to CoNLL format. (For licensing reasons we cannot re-publish the Turkish
Treebank data.)
• We describe and provide a baseline method for mention detection and coreference resolution, compatible with the format of the corpus. We evaluate this baseline method on the corpus with
leave-one-out cross-validation.
Section 2 gives preliminaries of Coreference Resolution and the Turkish language and describes related
work. Section 3 explains the annotation and adjudication process and discusses properties of the corpus,
annotator profiles, and supporting tools. Section 4 describes the baseline system and its evaluation on
the corpus. Section 5 concludes and gives an outlook on future work.
We provide the Marmara Turkish Coreference Corpus, tools, and the baseline system, at
https://bitbucket.org/knowlp/marmara-turkish-coreference-corpus .
2
Preliminaries and Related Work
Next we give background and related work on coreference resolution, the Turkish language, and specific
challenges of coreference resolution in Turkish.
2.1
Coreference Resolution
Coreference resolution is the task of marking noun phrases that refer to the same discourse entity as
coreferent. Mention detection, which identifies such noun phrases, is usually included in that task. Coreference resolution is not limited to resolving pronouns: in computer linguistics it was first introduced as
a benchmark for deep semantic understanding of text in the message understanding conference series
(Grishman and Sundheim, 1995) and later continued in the Automatic Content Extraction (ACE) program (Doddington et al., 2004) which required English coreference resolution as foundation for all tasks
of years 2000–2004. The SemEval competition series followed ACE and featured the first multilingual
coreference resolution challenge in 2010 (Recasens et al., 2010). Connected to that is the freely available,
large, and multilingual OntoNotes (Hovy et al., 2006) corpus, which was used in the multilingual coreference task in SemEval 2012 (Pradhan et al., 2012) and contains coreference annotations for English,
Arabic, and Mandarin (Pradhan et al., 2007).
Coreference resolution has been surveyed by Ng (2010). Approaches are manifold and include
machine-learning-based approaches, rule-based systems, and combinations of both. In most machinelearning approaches, equivalence relations of chains (sometimes called clusters) are assembled from predictions of the relatedness of pairs of mentions (mention-mention links). The earliest machine-learning
approach is due to Soon et al. (2001), methods for building chains from link predictions include local
greedy heuristics as done by Bengtson and Roth (2008) or Stoyanov and Eisner (2012), global optimization formulations such as relaxation labeling (Sapena et al., 2012) or ranking with ILP or Markov
Logic (Culotta et al., 2007; Denis and Baldridge, 2009), and representations of trees of mention-mention
links (Chang et al., 2013; Fernandes et al., 2012). The first rule-based algorithm for anaphora resolution
2
was done by Hobbs (1978). More recent rule-based systems merge chains based on several sets of rules in
a multi-stage filtering approach (Lee et al., 2013), moreover there are hybrid systems combining rules and
machine learning such as the one by Chen and Ng (2012). Other approaches use curated or distributed
knowledge sources such as WordNet, Google distance, and Wikipedia (Poesio et al., 2004; Zheng et al.,
2013).
Note that anaphora resolution (Hirst, 1981; Mitkov, 2002) is a problem orthogonal to coreference
resolution (van Deemter and Kibble, 2000), because anaphora resolution focuses on referring expressions
that point to previous expressions in the text. Cataphora (pointing to later occurrences in the text)
are exluded. On the other hand, different from most works on coreference, anaphora resolution includes
bound pronouns that do not refer to concrete entities because they are quantified using, e.g., ‘some’ or
‘none’.
2.2
Turkish
Turkish is a member of the family of Altaic languages, it is an agglutinative language where suffixes
are attached to a root word. Derivational and inflectional suffixes are very productive (Oflazer, 1993;
Oflazer et al., 1994) and are subject to vowel harmony from the root word. Morphological analysis
is challenging due to ambiguities between different types of suffixes, for example ‘izin’ can mean ‘your
trace’ (iz+P2Sg+Nom), ‘trace’ (iz+Pnon+Gen), or ‘permission’ (izin+Pnon+Nom) (Hakkani-Tür et al.,
2002).
The METU-Sabanci Turkish Treebank (in the following just called Turkish Treebank) (Atalay et al.,
2003; Oflazer et al., 2003; Say et al., 2004) contains a subset of the METU Turkish Corpus (Say et al.,
2004) in tokenized form. Each token is analyzed morphologically and split into inflectional groups (IGs).
Sentences are annotated with dependency parse information, where dependencies point to specific IGs
within tokens. The Turkish Treebank splits tokens into IGs on derivational boundaries, for example,
‘evimdekiler’ (those in my house) is analyzed (Oflazer et al., 2003) as
ev+Noun+A3sg+P1sg+Loc^DB+Adj^DB+Noun+Zero+A3pl+Pnon+Nom
where ^DB indicates derivation boundaries and the token consists of three IGs ‘evimde’ (in my house),
‘ki’ (adjectivization), and ‘ler’ (nominalization+plural). A CoNLL format that provides a CoNLL token
corresponding to each IG of a token has been created for Turkish dependency parsing (Buchholz and
Marsi, 2006).
Named entities in the Turkish Treebank are not marked specially, but multi-word named entities are
represented as single tokens.
Turkish Coreference Resolution. The following properties of Turkish are in particular relevant for
coreference resolution. In the above example, ‘those in my house’ as well as ‘my house’ as well as ‘my’
could be coreferent with mentions in the document. However, neither ‘my house’ nor ‘my’ is available as a
separate unit of analysis: both are parts of the first IG (‘evimde’). Gender is not marked in Turkish with
the exception of honorifics ‘Bey’ and ‘Hanım’ which corresponds to English ‘Mr’ and ‘Mrs’. Moreover
several common first names apply to both genders. Hence gender-based syntactic compatibility checks
for mentions are only possible in some cases. Personal pronoun subjects in Turkish are usually realized
as suffixes of the verb, e.g., ‘gidiyoruz’ (we are going) and ‘gidiyorlar’ (they are going) but they can also
be realized explicitly as in ‘biz gidiyoruz’, depending on discourse conditions (Turan, 1996). Suffixes
of proper nouns in written Turkish are systematically separated from the proper nouns using a single
quote, e.g., ‘Türkiye’den’ (from Turkey) and ‘Türkiye’deki’ (the thing in Turkey). This systematic rule
simplifies finding equal proper noun mentions in coreference resolution for Turkish.
Most works about referring expressions in Turkish focus on anaphora resolution and not on full
coreference resolution. One exception is the work of Küçük and Yazıcı (2008) on political news texts
extracted from videos: they focus on Gazetteers for extracting mentions (without considering general
NPs or syntactic information), provide a rule-based heuristic based on recency for creating coreference
chains, and evaluate their approach on three documents (which are not part of the Turkish Treebank).
In the following we describe work on Turkish anaphora resolution, which is related to coreference
resolution.
3
METU-Sabanci Turkish Treebank (1960 text fragments)
Phase I
Treebank documents (33 documents)
21 documents
GATE annotation
12 documents
Mention annotation
Semi-automatic adjudication
Phase II
Mention candidates (for 33 documents)
Annotation of chains (339 annotations)
Automatic adjudication
Marmara Turkish Coreference Corpus
Figure 1: Annotation process visualisation
Turkish Anaphora Resolution. Erkan and Akman (1998) describe an implementation of pronoun
anaphora resolution in a framework for situation theory which is based on knowledge representation and
logical reasoning. Hobb’s naïve pronoun resolution algorithm (Hobbs, 1978) was realized for Turkish and
tested on 10 toy sentences (Tüfekçi and Kılıçaslan, 2007).
Centering theory (Grosz et al., 1995) is the foundation of several works on Turkish pronouns. Turan
(1996) performed a study about discourse conditions for referring vs. nonreferring expressions and null
vs. overt pronouns, and evaluated the theory on 2500 annotated tokens. Yüksel and Bozsahin (2002)
created a system for generating referring expressions that was tested on a machine translation task.
Furthermore, there is a theoretical model of anaphora resolution based on centering theory by Yıldırım
et al. (2004).
Küçük and Yöndem (2007) described a system for finding and resolving Turkish pronominal anaphora
and annotated 12266 anaphor candidate instances in the METU Turkish Corpus to evaluate their candidate extractor and decision tree learner for anaphora resolution. Kılıçaslan et al. (2009) performed a
comprehensive study on pronoun resolution and evaluated various machine learning methods for resolving
overt and null pronouns in a corpus of 20 children stories.
3
Marmara Turkish Coreference Corpus
We next describe the annotation and adjudication process including formal adjudication criteria, key
properties of the resulting corpus, and supporting tools.
3.1
Annotation Process
Figure 1 visualizes the process that led to the final corpus. Annotations were collected in two phases:
Phase I took place in October–December 2015 and Phase II during October–December 2016.
Annotations were collected from computer engineering students participating in a lecture on natural
language processing, after educating them in basic linguistic analysis and coreference resolution. To
achieve reasonable annotation quality, we aimed to keep annotation simple and therefore based it on
few principles and examples. We designed an annotation manual (Sürmeli et al., 2016) for marking
coreference according to the following principles:
• all concrete entities that are mentioned more than once shall be annotated,
• mentions shall be marked as the biggest possible span of tokens that describes the entity,
• lists shall not be annotated (elements of lists can be annotated), and
4
Genre
Doc
#
sum
News
Short Story
Novel
Essay
Research Monogr.
Article
Travel
Other
Overall
Ann
#
avg
IAA1
%
avg
IAA2
%
avg
Tok
#
avg
CM
#
avg
AM
#
avg
AC
#
avg
Ph1
#
sum
9
8
7
2
2
3
1
1
10.2
10.1
10.4
9.5
10.5
10.7
11.0
10.0
87
64
67
85
72
90
79
62
94
84
87
93
89
96
92
83
1324
1540
1798
2058
2020
1506
2142
2284
139
170
183
92
182
121
178
301
126
164
176
87
179
120
173
275
35
23
22
28
27
32
44
44
2
5
5
2
2
3
1
1
33
10.3
76
90
1634
160
152
29
21
Table 1: Key metrics about corpus and inter-annotator agreement per genre and overall. Doc is the
number of documents, Ann the number of annotations received, IAA1 and IAA2 are inter-annotator
agreements, Tok and CM indicate the number of tokens and given mentions, AM and AC show the
number of received mentions and chains, and Ph1 indicates how many documents were annotated in
both annotation phases. Columns Doc through CM and Ph1 are accumulated over documents, while
AM and AC are accumulated over annotations.
• predications shall not be annotated.
Note that, by marking mentions as the biggest spans, mentions and potentially available appositives are
annotated as single mentions, which is different from OntoNotes where appositives are a special type of
coreference annotation. We do not mark predications because they are a different type of coreference as
argued by van Deemter and Kibble (2000).
In Phase I, annotations were created by 19 annotators with the GATE (Cunningham et al., 2013;
Gaizauskas et al., 1996) coreference annotation tool. This yielded on average 6.5 annotations per document for 21 documents in the Treebank. Adjudication of these documents was done semi-automatically
(see Sections 3.2 and 3.4). However, due to low inter-annotator agreement about mention boundaries,
decisions often depended on the adjudicator. Therefore, in order to make the setting simpler, we decided to collect more annotations with given mentions. We used the list of mentions resulting from the
adjudicated documents of Phase I. Mentions for those 12 documents that were not annotated in Phase I
were manually created in a collaboration of two annotators for each document.
In Phase II, 46 annotators were given CoNLL files with token and coreference columns where each
mention was given in its own chain. Annotators created files with equalities between chain IDs and
uploaded these files to a web service where they were checked for syntactical correctness. The submission
file format is described in (Sürmeli et al., 2016). Phase II yielded 339 individual annotations of sufficient
inter-annotator agreement to perform fully automatic adjudication (see next section).
This method of collecting annotation as text files might seem archaic, however, in practice, annotators
were more comfortable with such a system than with the graphical user interface of GATE in Phase I.
We were not able to use the BRAT (Stenetorp et al., 2012) annotation tool, because of difficulties
representing sentence and word addresses in a way that they can be extracted from annotations.
3.2
Adjudication
Table 1 shows key properties of the annotated corpus including inter-annotator agreement. Statistics
are accumulated per genre as well as over the whole corpus. Coreference IAA scores IAA1 and IAA2 are
calculated as described in (Passonneau, 2004) and (Passonneau et al., 2006), respectively. IAA1 is an
adaption of Krippendorff α (Krippendorff, 1980) where a pair of chains gets a score of 1 for a perfect
match, 32 if one chain is a subset of the other one, 31 if they are intersecting, and 0 otherwise. (Krippendorff
α assigns 1 for a perfect match and 0 in all other cases.) IAA2 uses Jaccard distance instead of fixed
scores for the above cases, which provides more realistic results if chains have heterogeneous sizes. (This
is often the case in coreference corpora.) Over all documents, IAA1 is 76% and IAA2 is 90%. We observe
5
worse IAA for genres that are based on writing as an art form, i.e., for short stories, novels, and the
Other genre (a first-person narrative).
The amount of annotations per document, combined with the observed IAA, allows us to automatically adjudicate the corpus. This is different from other coreference annotations, in particular in
OntoNotes, where two annotators created annotations followed by adjudication done by a single human expert (Weischedel et al., 2012). Automatic adjudication is based on combinatorial optimization,
where we search for a solution of chains that has overall minimal divergence from all annotator inputs.
Divergence is measured in terms of mention-mention links given and omitted by annotators.
Formally, given a set M of mentions in a document, a chain is a subset of these mentions, and k
annotators produce annotations (sets of chains that are nonintersecting) A1 , . . . , Ak over M . A solution
G is also a set of chains over M and we search for G such that the following objective becomes minimal:
X
2 · a(m, m0 , Ai ) · na(m, m0 , G) + na(m, m0 , Ai ) · a(m, m0 , G)
(1)
m,m0 ∈ M
i ∈ {1,...,k}
where a(· · · ) is an indicator function for mentions in the same chain within an annotation A, formally
1 if there is a chain C ∈ A with {m, m0 } ⊆ C
0
a(m, m , A) =
0 otherwise
and na(· · · ) is an indicator for mention pairs that are not in the same chain in an annotation A:
na(m1 , m2 , A) = 1 − a(m1 , m2 , A).
Objective (1) incurs a cost of 2j for each mention pair that is not in the same chain in the solution G
contrary to the opinion of j annotators. Moreover, (1) incurs a cost of l for each mention-pair that is in
the same chain in G contrary to the opinion of l annotators. This makes optimal solutions ignore as little
as possible information from annotators. The coefficient 2 has the effect, that not annotating a mention
to be in some chain has less weight than annotating a mention as part of some chain. We introduced this
preference into the objective, because not annotating some mention can be due to an oversight, while
putting a mention into a chain is more likely done intentionally.
Note that, if annotators produce different sets of mentions, we can build M from the union of all
mentions produced by annotators with unused mentions becoming singleton partitions. We describe
practical issues of our adjudication tool in Section 3.4.
3.3
Corpus Properties and Annotator Profiles
Table 1 shows key properties of the annotated corpus, accumulated over genres and overall figures.
Average number of tokens and mentions per genre varies a lot. In particular, the Essay genre contains
texts discussing abstract concepts like ‘home’ and ‘science’ which are not annotated. The narrative in
genre Other contains many person names which are repeatedly mentioned.
Column Ph1 indicates how many of the documents were annotated in both phases of the annotation
process. For example the News genre contains 9 documents. Mentions of 2 News documents were
obtained from Phase I, the others from Phase II (see Figure 1). We observe better IAA values for
Phase II than for Phase I (not shown in table). This might be due to the high ratio of documents from
genre News (7 out of 12) in Phase II, because we observed that IAA for News is higher than in other
genres, independent from the annotation phase.
By comparing column CM (given mentions) and AM (annotated mentions) we see that annotators
rarely use all mentions in the annotated chains. To reduce the chance that these mentions were omitted
due to an oversight, the annotation submission system indicated which mentions were left unused.
Annotator Profiles. Anonymized learner profiles were collected from all students in Phase II (written
permission for using and publishing the data was also obtained). Learner profiles include age, gender,
native language, languages spoken at home, in primary and secondary school, foreign language knowledge,
and the number of years the annotator spent in Turkish-speaking communities.
Annotators are on average 23 years old university students at Marmara University in Istanbul. Annotations were done after basic introduction to linguistics and coreference resolution and after discussing
the annotation manual (Sürmeli et al., 2016).
6
Out of 46 annotators, 29 are male and 17 are female. One annotator indicated Azerbaijani as a
native language, all others indicated Turkish as one of their native languages. (Azerbaijani is close to
Turkish.) Two annotators indicated Kurdish as further native language, and one each Arabic, English,
and Macedonian. Primary and secondary school education was Turkish for 43 annotators, English for
two and Azerbaijani for one. Moreover 43 annotators lived at least 20 years in predominantly Turkishspeaking communities, the remaining annotators answered 4, 5, and 14 years, respectively, for this
question.
According to this data we consider our annotators to be capable of understanding and annotating
the texts in the corpus.
3.4
Tools
For creating this corpus, we built several tools.
Document Extractor. The METU-Sabanci Turkish Treebank contains 1960 text fragments, distributed over 33 documents. Most documents are split over several XML files, however there is also
one XML file containing two distinct documents. We provide a tool for extracting documents from the
Turkish Treebank and store each document in a single XML file. The Turkish Treebank is licensed
in a way that it cannot be redistributed with the Marmara Turkish Coreference Corpus, therefore the
tool generates document files from a directory containing the unpacked Turkish Treebank. Our tool not
only creates one XML file for each document, it also recodes all data to UTF-8 and fixes problematic
(non-encoded) attributes that are present in the original corpus.
Coreference XML Format. For representing coreference information we created an XML format
that contains pointers to sentence and word IDs into documents extracted from the Turkish Treebank.
A sample of such an XML file with two mentions and one chain is as follows.
<coref>
<mentions>
<mention fromWordIX="1" id="0" sentenceNo="00016112313.1" toWordIX="1">
Prof._Dr._Semih_Koray’ın
</mention>
<mention fromWordIX="1" id="2" sentenceNo="00016112313.2" toWordIX="1">
Koray
</mention>
</mentions>
<chains>
<chain>
<mention mentionId="0">Prof._Dr._Semih_Koray’ın</mention>
<mention mentionId="2">Koray</mention>
</chain>
</chains>
</coref>
In this example, ‘Prof._Dr._Semih_Koray’ın’ is a mention with ID 0 containing token 1 (called ‘word’ in
the Treebank) in sentence ‘00016112313.1’ of the document assembled from the Treebank. Moreover there
is a chain containing that mention and another mention in the first token of sentence ‘00016112313.2’.
Note that the actual text within mentions is only for readability purposes, the information about
mention content is fully represented in attributes.
CoNLL ⇔ XML Converters. As the CoNLL reference coreference scorer (Pradhan et al., 2014) is
based on CoNLL format, we provide tools for converting a document and a coreference XML file into
a CoNLL file (and vice versa). CoNLL format is also more readable than XML Format for humans.
We use XML to be consistent with the Turkish Treebank and because the Treebank license prevents
redistribution.
7
(Semi-)automatic coreference adjudication tool. Merging several distinct coreference annotations
into a single gold standard is a complex task, in particular if annotators do not agree on mentions. To
simplify this task we created a tool that merges multiple annotations into a single solution according
to objective (1) from Section 3.2. Manual intervention for editing mentions and chains is also possible,
details about a preliminary (Phase I) version of the tool is described by Schüller (2016). Note that, in
Phase II we performed only automatic adjudication and did not need manual intervention.
For the purpose of this project, it was sufficient to use our tool directly on CoNLL files without a
GUI. In the future, to make the tool accessible to a wider part of the community, we consider integrating
it into an existing software, for example BART (Broscheit et al., 2010).
4
Baseline
We have created a baseline for mention detection, based on the work of Sapena et al. (2012), and for
coreference resolution, inspired by Bengtson and Roth (2008). The baseline is based on Python and
scikit-learn (Pedregosa et al., 2011). We considered to integrate also the Named Entity Recognition
(NER) module of the ITU-pipeline (Eryiğit, 2014) because NER is not annotated in the Turkish Treebank, however we found that the output the web service changed significantly several times during the
development of the baseline. To facilitate reproducibility of results we decided to create a stand-alone
baseline that allows reproducing our results using only the METU-Sabanci Turkish Treebank (Say et al.,
2004) and scikit-learn.
Mention Detection. Our Mention Detection baseline marks all
(i) noun phrases,
(ii) pronouns, and
(iii) capitalized common nouns or proper names that occur two or more times in the document
as mentions, similar to the approach of Sapena et al. (2012) for English.
Coreference Resolution. Our Coreference Resolution baseline is inspired by the work of Bengtson
and Roth (2008) who describe a simple method with reasonable accuracy and without the need for
custom machine learning models and algorithms that are specific to coreference resolution.
As input the baseline uses a set of candidate mentions (either gold or predicted), furthermore lemma
and dependency parsing information for obtaining mention heads, as available in the Turkish Treebank.
The type of a mention is marked as pronoun if the lemma of the head is one of ben, sen, biz, siz, bu, şu,
o, bura, şura, ora, kendi, birbiri. To separate proper noun from noun phrase mention types, we realized
our own heuristic which (i) collects all uppercase tokens not at sentence-initial position, (ii) strips case
markers, and (iii) uses the resulting set of strings to mark all (including sentence-initial) tokens as proper
nouns. All remaining mentions obtain the type noun phrase.
Based on mention types and head information we create the following features for each mentionmention pair (m1 , m2 ):
(i) type of m1 and type of m2 (2 features),
(ii) both mentions are pronouns, proper nouns, or noun phrases (3 features),
(iii) heads of m1 and m2 match, and the same for head lemmas (2 features),
(iv) last part of name is equal in m1 and m2 , and
(v) m1 is an acronym of m2 ,
(vi) head of m1 is a substring of head of m2 , and the same for head lemmas (2 features),
(vii) m1 is an acronym of m2 .
8
RMD
PMD
MUC
B3
CEAFe
CEAFm
BLANC
News
Short Story
Novel
Essay
Research.M
Article
Travel
Other
82.6
89.6
84.0
85.7
76.5
71.4
71.4
89.6
14.7
22.0
19.9
7.1
13.4
11.6
10.5
23.9
81.1
77.4
79.0
76.1
76.5
78.1
66.1
72.1
74.9
55.5
56.0
70.4
56.0
70.7
57.6
47.7
71.8
57.2
51.2
66.8
51.8
68.7
55.2
46.6
73.2
56.6
55.4
67.1
55.6
70.6
55.3
45.6
72.3
60.7
61.7
63.4
62.8
68.6
52.6
50.9
Total
83.2
16.9
77.8
62.1
59.7
61.4
63.8
Genre
Table 2: Evaluation of baseline by genres: RMD and PMD show recall and precision for mention detection,
other columns show F1 scores of the respective metrics for coreference resolution on gold mentions using
linear SVC all-links method. Accumulations are averages weighted by document size (# tokens).
Features (v)–(vii) are asymmetric, that means exchanging m1 and m2 can change the feature value. For
these features we also add the respective reverse direction feature, as well as the disjunction of features of
both directions. Moreover we add all possible pairs of features (i)–(ii) and (iii)–(vii) to allow the machine
learning to give separate weight to features (iii)–(vii) per mention type.
We implemented two machine learning methods for predicting coreference based on classification
(SVC) and regression (SVR).
SVC is based on classification with a linear-kernel SVM (Corinna Cortes and Vapnik, 1995). Positive
examples are mentions and their closest predecessors within all chains, while negative examples are all
mention pairs that are not in the same chain with less than 100 mentions distance. For predicting
chains, we first generate candidate mention pairs for all mentions except for noun phrases with pronoun
predecessor, then we predict whether they are in the same chain using the SVM. Finally, each mention
starts in its own chain and we go through mentions from the beginning of the document to the end,
and merge mentions to (potentially several) previous chains for all predicted mention-mention links. We
prevent merges that lead to chains with overlapping mentions.
SVR is based on support vector regression with a linear-kernel SVM (Drucker et al., 1997) trained
on the same examples as SVC. For prediction we generate the same candidate mentions as in SVC. For
building chains we also start with one chain per mention, but this time we use the Best-Link (Bengtson
and Roth, 2008) strategy: we iterate over mentions in order of occurrence in the document, and merge
each mention with at most one predecessor chain if its highest-scored candidate link to a predecessor
mention is above 0.1 and if the resulting chain does not contain overlapping mentions.
In addition to the above, when predicting coreference on predicted mentions, we include incorrect
mentions predicted on the training documents to generate negative examples. We randomly sample
at most as many incorrect mentions as already contained in the gold annotation. When predicting
coreference on gold mentions, we train only on gold mentions. We balance example weight by class size
(we have significantly more negative examples), and we use L2 regularization for both SVC and SVR.
4.1
Evaluation
We evaluate our baseline using the CoNLL reference coreference scorer (Pradhan et al., 2014) and report
MUC, B3 , CEAFm , CEAFe , and BLANC scores. Intuitively, MUC (Vilain et al., 1995) computes
precision and recall of mention-mention links over all gold chains compared with all predicted chains.
B3 (Bagga and Baldwin, 1998) computes precision and recall over each individual mention which makes
the score also applicable to singleton mentions. CEAFm (Luo, 2005) creates an optimal matching between
predicted and gold mentions and evaluates the percentage of mentions correctly assigned to chains,
while CEAFe does the same from the perspective of chains. BLANC (Recasens and Hovy, 2010) gives
equal importance to mention-mention links and non-existing mention-mention links, without the need
to consider per-mention or per-chain score accumulations.
In the following we compute scores per document and accumulate them into overall and genre-based
scores using the number of tokens in each document as weight. Mention detection is done on the Turkish
9
MUC
B3
CEAFe
CEAFm
BLANC
average
best
worst
77.8
92.3
61.8
62.1
89.8
39.6
59.8
88.5
37.2
61.4
90.4
45.2
63.8
88.1
45.0
SVR/GM
average
best
worst
75.0
92.4
60.6
60.6
90.0
36.3
60.5
89.2
39.5
61.3
90.8
42.6
61.7
87.8
38.9
SVR/PM
average
best
worst
32.2
55.0
7.6
23.3
35.7
8.5
17.2
31.2
9.9
24.7
37.9
9.3
18.1
33.5
1.4
Method
Accumulation
SVC/GM
Table 3: Evaluation of our baseline using support vector machine classification (SVC) and regression
(SVR) on gold (GM) and predicted mentions (PM). Scores are F1 scores, averages are again weighted
by document size, best/worst rows are over single documents. SVC on PM is not applicable (see text).
Treebank data and is a deterministic algorithm which does not require learning. Coreference resolution is
done either on gold mentions (GM) or on predicted mentions (PM). Scores are obtained by leave-one-out
cross-validation on all 33 documents of the corpus, yielding 33 folds. All scores are given in percent. For
mention detection we report Precision and Recall, for coreference scores we report only F1.
Table 2 shows baseline results for mention detection and coreference with SVC on gold mentions.
We obtain 83.2% recall for mention detection over the whole Treebank. As expected and as intended,
precision is much worse because we expect the coreference resolution step to eliminate spurious mentions.
Coreference resolution yields a MUC score of 77.8%, while the stricter B3 , CEAF, and BLANC scores
are lower. The worst scores for BLANC, MUC, and CEAFm are obtained from genres Travel and Other,
which is logical because these genres contain only one document each. Hence, in cross-validation, the
training set contains only documents from other genres.
Table 3 shows results for the best and worst document in the corpus, and overall average of scores for
SVC, SVR on gold mentions and SVR on predicted mentions. Average is again weighted by document
size. SVC on gold mentions is the same setup as in Table 2. For comparison we show again the average
score, and additionally the best and worst score obtained from a single document. Using SVR on gold
mentions yields scores similar to SVC except for BLANC where the worst document is 6.1% worse
than with SVM. On predicted mentions, SVC puts nearly all mentions into a single chain, which yields
reasonable MUC score but low other scores. Therefore, we omit SVC results on predicted mentions
from the table, and show only results for SVR which has the systematic advantage of selecting only the
best link. Naturally, coreference prediction on predicted mentions yields significantly worse results than
on gold mentions, with an average MUC score of 32.2% and an average BLANC score of 18.1%. The
document producing the worst BLANC score of 1.4% is a scientific article about the meaning of the word
‘home’, which is a text that contains mainly abstract examples about the animal world, hence the score
is not surprising. The best BLANC score on predicted mentions is obtained from a story about street
children which is about concrete events and individuals.
As this is only a baseline, we did not include more sophisticated features described in (Bengtson and
Roth, 2008). For example, semantic features based on WordNet (Bilgin et al., 2004; Miller, 1995) could
rule out certain predicted mentions as relevant and thus could improve precision of the baseline.
5
Conclusion
The Turkish coreference corpus and the Turkish coreference resolution baseline are a starting point for
further research.
Annotations on the token level have the consequence that coreference between morphemes and other
tokens (or morphemes) cannot be annotated. While such coreference annotations are desirable, we
decided to reduce the complexity of the annotation task by omitting such coreference links and by
presenting tokens without morphological analysis to annotators. For future annotation projects it could
be interesting to extend annotations to include morpheme coreference links. Scoring with the reference
10
scorer tool would require development of a novel CoNLL representation for tokens that are split within
IGs. If this representation is not used for annotation, development of a tool for such annotations is also
necessary. We think this would also require annotators with a higher level of expertise than available for
our study.
As the only pronoun anaphora annotations (Küçük and Yöndem, 2007) that were done on the METUSabanci Turkish Treebank can no longer be found by the authors (personal communication), we have no
possibility of validating the annotations performed in our annotation project.
To improve the mention detection baseline, information about appositives as well as finding a way
to filter out generic mentions could be useful. To improve the coreference resolution baseline, adding
more complex features by integrating Turkish WordNet (Bilgin et al., 2004), Turkish NER (Şeker and
Eryiğit, 2012), and Turkish WSD (İlgen et al., 2012) could be helpful. For a full processing pipeline
from plain text to coreference annotations, we need at least morphological analysis (Sak et al., 2007),
disambiguation (Sak et al., 2007), and dependency parsing (Eryiğit et al., 2008). Available tools are the
ITU-pipeline (Eryiğit, 2014) and the older Zemberek system (Akın and Akın, 2007).
Acknowledgements
We are grateful to Kemal Oflazer and Bilge Say for support about the METU-Sabanci Turkish Treebank,
and to Dilek Küçük and Savaş Yıldırım for support about their papers and datasets.
This work has been supported by The Scientific and Technological Research Council of Turkey
(TUBITAK) under grant agreements 114E430 and 114E777.
Author contributions are as follows (in chronological order): creating documents from Treebank
fragments (B.G.S), evaluating GATE and BRAT annotation software (B.G.S., A.P.), creating the annotation manual (P.S., K.C., F.T., B.G.S.), performing manual adjudication in Phase I (K.C., B.G.S., A.P.,
H.E.K.), annotating mentions for those documents in Phase II that were not annotated in Phase I (K.C.,
H.E.K.), revising the manuscript as an English native-speaker (A.H.K.), writing the baseline software (P.S., F.T., A.P.), managing the project, performing baseline experiments, analyzing data and
result, and writing the manuscript (P.S).
References
Akın, A. A. and Akın, M. D. (2007). Zemberek, An Open Source NLP Framework for Turkic Languages.
Structure, 10:1–5.
Atalay, N. B., Oflazer, K., and Say, B. (2003). The Annotation Process in the Turkish Treebank. In
International Workshop on Linguistically Interpreted Corpora (LINC).
Bagga, A. and Baldwin, B. (1998). Algorithms for Scoring Coreference Chains. In International Conference on Language Resources and Evaluation (LREC), pages 563–566.
Bengtson, E. and Roth, D. (2008). Understanding the value of features for coreference resolution. In
Empirical Methods in Natural Language Processing (EMNLP), pages 294–303.
Bilgin, O., Çetinoğlu, Ö., and Oflazer, K. (2004). Building a Wordnet for Turkish. Romanian Journal
of Information Science and Technology, 7(1-2):163–172.
Broscheit, S., Poesio, M., Ponzetto, P. S., Rodriguez, J. K., Romano, L., Uryupina, O., Versley, Y., and
Zanoli, R. (2010). BART: A Multilingual Anaphora Resolution System. In International Workshop
on Semantic Evaluation (SemEval), pages 104–107.
Buchholz, S. and Marsi, E. (2006). CoNLL-X shared task on Multilingual Dependency Parsing. In
Computational Natural Language Learning (CoNLL), pages 149–164.
Chang, K.-W., Samdani, R., and Roth, D. (2013). A Constrained Latent Variable Model for Coreference
Resolution. In Empirical Methods in Natural Language Processing (EMNLP), pages 601–612.
11
Chen, C. and Ng, V. (2012). Combining the Best of Two Worlds: A Hybrid Approach to Multilingual
Coreference Resolution. In Empirical Methods in Natural Language Processing and Computational
Natural Language Learning, Shared Task, pages 56–63.
Corinna Cortes and Vapnik, V. (1995). Support Vector Networks. Machine Learning, 20(3):273–297.
Culotta, A., Wick, M., and Mccallum, A. (2007). First-Order Probabilistic Models for Coreference Resolution. In Conference of the North American Chapter of the Association for Computational Linguistics:
Human Language Technologies, pages 81–88.
Cunningham, H., Tablan, V., Roberts, A., and Bontcheva, K. (2013). Getting more out of biomedical documents with GATE’s full lifecycle open source text analytics. PLoS computational biology,
9(2):e1002854.
Denis, P. and Baldridge, J. (2009). Global joint models for coreference resolution and named entity
classification. Procesamiento del Lenguaje Natural, 42:87–96.
Doddington, G., Mitchell, A., Przybocki, M., Ramshaw, L., Strassel, S., and Weischedel, R. (2004).
The Automatic Content Extraction (ACE) Program-Tasks, Data, and Evaluation. In International
Conference on Language Resources and Evaluation (LREC), pages 837–840.
Drucker, H., Burges, C. J. C., Kaufman, L., Smola, A., and Vapnik, V. (1997). Support vector regression
machines. Advances in Neural Information Processing Systems, 9:155–161.
Erkan, T. and Akman, V. (1998). Situated Processing of Pronominal Anaphora. In Verarbeitung natürlicher Sprache (KONVENS), pages 369–378. Bilkent University.
Eryiğit, G. (2014). ITU Turkish NLP Web Service. In Conference of the European Chapter of the
Association for Computational Linguistics (EACL) Demonstrations, pages 1–4.
Eryiğit, G., Nivre, J., and Oflazer, K. (2008). Dependency Parsing of Turkish. Computational Linguistics,
34(3):357–389.
Fernandes, E. R., dos Santos, C. N., and Milidiú, R. L. (2012). Latent structure perceptron with feature
induction for unrestricted coreference resolution. In Joint Conference on EMNLP and CoNLL: Shared
Task, pages 41–48.
Gaizauskas, R., Cunningham, H., Wilks, Y., Rodgers, P., and Humphreys, K. (1996). GATE: an environment to support research and development in natural language engineering. In International
Conference on Tools with Artificial Intelligence (ICTAI), pages 58–66.
Grishman, R. and Sundheim, B. (1995). Design of the MUC-6 evaluation. In Message Understanding
Conference (MUC), pages 413–422.
Grosz, B. J., Joshi, A. K., and Weinstein, S. (1995). Centering: A Framework for Modelling the Local
Coherence of Discourse. Computational Linguistics, 21(2):203–225.
Hakkani-Tür, D. Z., Oflazer, K., and Tür, G. (2002). Statistical morphological disambiguation for
agglutinative languages. Computers and the Humanities, 36(4):381–410.
Hirst, G. (1981). Anaphora in Natural Language Understanding: A Survey. Springer.
Hobbs, J. R. (1978). Resolving Pronoun References. Lingua, 44(4):311–338.
Hovy, E., Marcus, M., Palmer, M., Ramshaw, L., and Weischedel, R. (2006). OntoNotes: the 90%
solution. In Human Language Technology Conference of the NAACL, Short Papers, pages 57–60.
Krippendorff, K. (1980). Content Analysis: An Introduction to Its Methodology. Sage Publications.
Küçük, D. and Yazıcı, A. (2008). Identification of coreferential chains in video texts for semantic annotation of news videos. In International Symposium on Computer and Information Sciences (ISCIS).
12
Küçük, D. and Yöndem, M. T. (2007). Automatic Identification of Pronominal Anaphora in Turkish
Texts. In International Conference on Computer and Information Science (ICIS).
Kılıçaslan, Y., Güner, E. S., and Yıldırım, S. (2009). Learning-based pronoun resolution for Turkish with
a comparative evaluation. Computer Speech & Language, 23(3):311–331.
Lee, H., Chang, A., Peirsman, Y., Chambers, N., Surdeanu, M., and Dan Jurafsky (2013). Deterministic
Coreference Resolution Based on Entity-Centric, Precision-Ranked Rules. Computational Linguistics,
39(4):885–916.
Luo, X. (2005). On coreference resolution performance metrics. In Conference on Human Language
Technology and Empirical Methods in Natural Language Processing (HLT/EMNLP), pages 25–32.
Miller, G. A. (1995). WordNet: a lexical database for English. Communications of the ACM, 38(11):39–
41.
Mitkov, R. (2002). Anaphora Resolution. Longman.
Ng, V. (2010). Supervised Noun Phrase Coreference Research: The First Fifteen Years. In Association
for Computational Linguistics (ACL), pages 1396–1411.
Oflazer, K. (1993). Two-level Description of Turkish Morphology. In Conference of the European Chapter
of the Association for Computational Linguistics (EACL), pages 472–472.
Oflazer, K. and Bozşahin, H. C. (1994). Turkish Natural Language Processing Initiative: An Overview.
In Turkish Symposium on Artificial Intelligence and Neural Networks.
Oflazer, K., Göçmen, E., and Bozşahin, C. (1994). An Outline of Turkish Morphology. Technical report,
NATO Science Division SfS III, Brussels.
Oflazer, K., Say, B., Hakkani-Tür, D. Z., and Tür, G. (2003). Building a Turkish Treebank. In Treebanks,
Building and Using Parsed Corpora, pages 261–277. Springer Netherlands.
Passonneau, R., Habash, N., and Rambow, O. (2006). Inter-annotator agreement on a multilingual
semantic annotation task. In International Conference on Language Resources and Evaluation (LREC),
pages 1951–1956.
Passonneau, R. J. (2004). Computing reliability for coreference annotation. In Language Resources and
Evaluation (LREC), pages 1503–1506.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot,
M., and Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning
Research, 12:2825–2830.
Poesio, M., Mehta, R., Maroudas, A., and Hitzeman, J. (2004). Learning to resolve bridging references.
In Annual Meeting on Association for Computational Linguistics (ACL). Paper #143.
Pradhan, S., Luo, X., Recasens, M., Hovy, E., Ng, V., and Strube, M. (2014). Scoring Coreference
Partitions of Predicted Mentions: A Reference Implementation. In Annual Meeting of the Association
for Computational Linguistics (ACL), pages 30–35.
Pradhan, S., Moschitti, A., Xue, N., Uryupina, O., and Zhang, Y. (2012). CoNLL-2012 Shared Task:
Modeling Multilingual Unrestricted Coreference in OntoNotes. In Joint Conference on EMNLP and
CoNLL: Shared Task, pages 1–40.
Pradhan, S. S., Ramshaw, L., Weischedel, R., MacBride, J., and Micciulla, L. (2007). Unrestricted
Coreference: Identifying Entities and Events in OntoNotes. In International Conference on Semantic
Computing (ICSC 2007), pages 446–453.
Recasens, M. and Hovy, E. (2010). BLANC: Implementing the Rand Index for Coreference Evaluation.
Natural Language Engineering, 17(4):485–510.
13
Recasens, M., Màrquez, L., Sapena, E., Martí, M. A., Taulé, M., Hoste, V., Poesio, M., and Versley,
Y. (2010). SemEval-2010 Task 1: Coreference Resolution in Multiple Languages. In International
Workshop on Semantic Evaluation (SemEval) at ACL, pages 1–8.
Sak, H., Güngör, T., and Saraçlar, M. (2007). Morphological disambiguation of Turkish text with
perceptron algorithm. In Intelligent Text Processing and Computational Linguistics, pages 107–118.
Sapena, E., Padro, L., and Turmo, J. (2012). A Constraint-Based Hypergraph Partitioning Approach to
Coreference Resolution. Computational Linguistics, 39(4):847–884.
Say, B., Zeyrek, D., Oflazer, K., and Özge, U. (2004). Development of a Corpus and a Treebank
for Present day Written Turkish. In İmer, K. and Doğan, G., editors, Current Research in Turkish
Linguistics (Proceedings of the Eleventh International Conference of Turkish Linguistics, 2002), pages
182–192. Eastern Mediterranean University Press.
Schüller, P. (2016). Adjudication of Coreference Annotations via Finding Optimal Repairs of Equivalence
Relations. In International Workshop on Experimental Evaluation of Algorithms for Solving Problems
with Combinatorial Explosion (RCRA), pages 57–71.
Soon, W., Ng, H., and Lim, D. (2001). A machine learning approach to coreference resolution of noun
phrases. Computational linguistics, 27(4):521–544.
Stenetorp, P., Pyysalo, S., Topic, G., Ohta, T., Ananiadou, S., and Tsujii, J. (2012). Brat: a Web-based
Tool for NLP-Assisted Text Annotation. In European Chapter of the Association for Computational
Linguistics (EACL), pages 102–107.
Stoyanov, V. and Eisner, J. (2012). Easy-first Coreference Resolution. In International Conference on
Computational Linguistics (COLING), pages 2519–2534.
Sürmeli, B. G., Cıngıllı, K., Tunçer, F., and Schüller, P. (2016). Turkish coreference annotation manual
(V2). https://tinyurl.com/jovfmua .
Tüfekçi, P. and Kılıçaslan, Y. (2007). A Computational Model for Resolving Pronominal Anaphora in
Turkish Using Hobbs’ Naïve Algorithm. International Journal of Computer, Electrical, Automation,
Control and Information Engineering, 1(5):1402–1406.
Turan, Ü. D. (1996). Null Vs. Overt Subjects in Turkish. PhD thesis, University of Pennsylvania.
van Deemter, K. and Kibble, R. (2000). On Coreferring: Coreference in MUC and Related Annotation
Schemes. Computational Linguistics, 26(4):629–637.
Vilain, M., Burger, J., Aberdeen, J., Connolly, D., and Hirschman, L. (1995). A Model-Theoretic
Coreference Scoring Scheme. In Message Understanding Conference (MUC), pages 45–52.
Weischedel, R., Pradhan, S., Ramshaw, L., Kaufman, J., Franchini, M., El-Bachouti, M., Xue, N.,
Palmer, M., Hwang, J. D., Bonial, C., Choi, J., Mansouri, A., Foster, M., Hawwary, A.-a., Marcus,
M., Taylor, A., Greenberg, C., Hovy, E., Belvin, R., and Houston, A. (2012). OntoNotes Release 5.0.
Yüksel, Ö. and Bozsahin, C. (2002). Contextually appropriate reference generation. Natural Language
Engineering, 8(1):69–89.
Yıldırım, S., Kılıçaslan, Y., and Aykaç, R. E. (2004). A Computational Model for Anaphora Resolution
in Turkish via Centering Theory: an Initial Approach. In International Conference on Computational
Intelligence, pages 124–128.
Zheng, J., Vilnis, L., Singh, S., Choi, J. D., and McCallum, A. (2013). Dynamic Knowledge-Base
Alignment for Coreference Resolution. In Computational Natural Language Learning (CoNLL), pages
153–162.
İlgen, B., Adalı, E., and Tantuğ, A. C. (2012). Building up Lexical Sample Dataset for Turkish Word
Sense Disambiguation. In International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pages 1–5.
14
Şeker, G. A. and Eryiğit, G. (2012). Initial explorations on using CRFs for Turkish Named Entity
Recognition. In International Conference on Computational Linguistics (COLING), pages 2459–2474.
15
| 2cs.AI
|
Quantum-enhanced reinforcement learning for finite-episode
games with discrete state spaces
arXiv:1708.09354v3 [quant-ph] 15 Sep 2017
Florian Neukart∗1 , David Von Dollen1 , Christian Seidel2 , and Gabriele Compostella2
1
Volkswagen Group of America
2
Volkswagen Data:Lab
Abstract
Quantum annealing algorithms belong to the class of metaheuristic tools, applicable for
solving binary optimization problems. Hardware implementations of quantum annealing, such as
the quantum annealing machines produced by D-Wave Systems [1], have been subject to multiple
analyses in research, with the aim of characterizing the technology’s usefulness for optimization
and sampling tasks [2–16]. Here, we present a way to partially embed both Monte Carlo policy
iteration for finding an optimal policy on random observations, as well as how to embed n
sub-optimal state-value functions for approximating an improved state-value function given a
policy for finite horizon games with discrete state spaces on a D-Wave 2000Q quantum processing
unit (QPU). We explain how both problems can be expressed as a quadratic unconstrained
binary optimization (QUBO) problem, and show that quantum-enhanced Monte Carlo policy
evaluation allows for finding equivalent or better state-value functions for a given policy with the
same number episodes compared to a purely classical Monte Carlo algorithm. Additionally, we
describe a quantum-classical policy learning algorithm. Our first and foremost aim is to explain
how to represent and solve parts of these problems with the help of the QPU, and not to prove
supremacy over every existing classical policy evaluation algorithm.
∗ Corresponding
author: [email protected]
1
1
Introduction
The physical implementation of quantum annealing that is used by the D-Wave machine minimizes
the two-dimensional Ising Hamiltonian, defined by the operator H:
H(s) =
X
hi si +
i∈V
X
Jij si sj .
(1)
ij∈E
Here, s is a vector of n spins {−1, 1}, described by an undirected weighted graph with vertices (V )
and edges (E). Each spin si is a vertex (in V ), hi represents the weights for each spin, and Jij are the
strengths of couplings between spins (edges in E). Finding the minimum configuration of spins for
such a Hamiltonian is known to be NP-hard. The QPU is designed to solve quadratic unconstrained
binary optimization (QUBO) problems, where each qubit represents a variable, and couplers between
qubits represent the costs associated with qubit pairs. The QPU is a physical implementation of an
undirected graph with qubits as vertices and couplers as edges between them. The functional form of
the QUBO that the QPU is designed to minimize is:
Obj(x, Q) = xT · Q · x,
(2)
where x is a vector of binary variables of size N , and Q is an N × N real-valued matrix describing
the relationship between the variables. Given the matrix Q, finding binary variable assignments to
minimize the objective function in Equation 2 is equivalent to minimizing an Ising model, a known
NP-hard problem [16, 17].
To directly submit a problem to a D-Wave QPU, the problem must be formulated as either an
Ising model or a QUBO instance. The spins are represented by superconducting loops of niobium
metal, which are the quantum bits (qubits). The preparation of states by the quantum annealer is
done such that the initial configuration of all spins are purely quantum, in uniform superposition in
both available states. The quantum annealing system then slowly evolves the system to construct
the problem being minimized (described by the QUBO matrix Q, or the Ising model’s h and J).
Figure 1: Left: Initial superposition represented by the minimum energy of the 1-qubit system.
Middle: Double-well potential caused by quantum annealing. Right: Tilting of the double-well
potential by the application of external magnetic fields.
During the annealing, the qubits transition from being quantum objects to classical objects, whose
states can then be readout without destroying quantum information. Due to superconductivity,
2
superposition is maintained by inducing a current in both directions at once, corresponding to the
1 and 0 states. Concerning an energy function, the superposition state corresponds to the lowest
point in the function’s single valley (Fig. 1). During the process of quantum annealing, a barrier is
raised, turning the energy diagram into a double-well potential, where the low point of the left valley
represents the state 0, and the low point on the right the state 1. The initial probability of being in
either the state 0 or the state 1, is given an equally-weighted probability,
1
2
for each.
By construction, the qubits always start in the minimum energy configuration. As the problem is
introduced, other energy levels get closer to the lowest energy level, which poses a challenge: the
smaller the gap between the energy states, the more likely it is that the system will jump from its
lowest energy configuration into one of the excited states. The so-called minimum gap is the point
where the first excited state approaches the ground state closely, and thermal fluctuations or too
short annealing times could result in the system jumping from the ground state to an excited state.
If the annealing happens slow enough, meaning that the system stays in the ground state, it follows
an adiabatic process. This is particularly worth mentioning, because the larger the system is, the
more unlikely it is to remain in the ground state during the annealing cycle.
However, even if the quantum system settles in one of the excited states, this result can be
useful. As the system size grows, it becomes harder to classically validate the optimal (minimum
energy) solution. Brute force is, for example, classically intractable for even a modest number of
qubits (∼ 104 ). If an excited state is still low-energy enough to be useful in a practical setting, much
computation time can be saved by using the quantum annealing system.
Additional built-in devices in D-Wave quantum annealers are the couplers, which allow multi-qubit
entanglement. Entanglement refers to correlating qubits in a way that they cannot be described as
separate subsystems and act as a single quantum object. Thus, considering a two qubit system, the
change of one qubits state also affects the second qubit, and they can be correlated such that if q1
ends up in a certain state, q2 is forced to take the same or opposite state. However, the object q1 q2
can take 4 different states S = 00, 01, 10, 11, and the relative energy of these states depends on the
biases of each qubit, and the coupling between them. This is how a program on the D-Wave quantum
annealing system is defined [18]: choosing a set of biases and couplings defines an energy-landscape,
whose global minima correspond to the problem being solved. At the end of the quantum algorithm,
the system ends up in the minimum energy configuration, thus solving the problem. A classical
algorithm would represent the problem in the same way, but where a classical algorithm can walk
the surface, the qubits are capable of using quantum tunneling to pass through the energy barriers
of the surface. Once entangled, qubits can tunnel together through the energy barriers from one
configuration to another. Previous publications have shown how quantum effects in the D-Wave QPU,
such as entanglement, superposition, and tunneling, help the QPU solve combinatorial optimization
problems [19].
3
2
Formalization of the reinforcement learning problem using
the Markov decision process framework
The reinforcement learning problem can be described by the Markov decision process (MDP), which
consists of states, actions that can be taken in each of these states, state transitions, and a reward
function. Furthermore, a distinction between discrete and continuous state spaces, and finite vs.
infinite horizon episodes have to be made [20, 21].
2.1
States
A set of states S is defined as finite set s1 , ..., sN , and each s ∈ S is described by its features,
and taking a self-driving cars (SDC) as example, some of the features are the SDC’s position in the
world, other traffic participants (position, velocity, trajectory,...), infrastructure (traffic lights, road
condition, buildings, construction zones,...), weather conditions, ..., thus, everything that matters for
the SDC in a certain situation at a certain time. Some states are legal, some are illegal, which is
based upon the combination of features. It is, for example, illegal for the SDC to occupy space that’s
occupied by a building or another vehicle at the same time.
2.2
Actions
In any given state an agent should be able to evaluate and execute a set of actions, which is defined
as the finite set a1 , ..., aK , where K characterizes the size of the action space |A| = K. Before we
mentioned illegal states, which may result from applying an illegal action for a state, so not every
action may be applied in every given state. Generally, and we describe the set of actions that may
be applied in a particular state s ∈ S by A(s), where A(s) ⊆ A and A(s) = A for all s ∈ S. As we
also need to account for illegal states, this can be modeled by a precondition function:
flegal : S × A → {true, f alse} ,
2.3
(3)
Transition
A transition from a state s ∈ S to a consecutive state s0 ∈ S occurs after the agent executes an
action in the former. The transition is usually not encoded in hard rules, but given by a probability
distribution over the set of possible transitions (different actions will result in different states). This
is encoded into a transition function, which is defined as
T : S × A × S → [0, 1] ,
(4)
which states that the probability of transitioning to state s0 ∈ S after executing A(s) in s ∈ S is
T (s, a, s0 ). For all actions a, all states s, and consecutive states after transition s0 , T (s, a, s0 ) ≥ 0 and
P
T (s, a, s0 ) ≤ 1, and for all actions a, s0 T (s, a, s0 )=1. Given that the result of an action does not
depend on the history (previous states and actions), and depends only on the current state, then it is
4
called Markovian:
P (st+1 |st , at , st−1 , at−1 ) = P (st+1 |st , at ) = T (st , at , st+1 ) ,
(5)
where t = 1, 2, ... are the time steps. In such a system, only the current state s encodes all the
information required to make an optimal decision.
2.4
Reward
The reward is given by a function for executing an action in a given state, or for being in a given state.
Different actions in a state s may result in different rewards, and the respective reward function is
either defined as
R : S → R,
(6)
R : S × A → R,
(7)
R : S × A × S → R,
(8)
or as
or as
Equation 6 gives the reward obtained in states, Equation 7 gives rewards for performing actions
in certain states, and Equation 8 gives rewards transitions between states.
3
Finite horizon, discrete state space
We have been focusing on finite horizon and discrete state space games so far, and in games such as
the one used to describe the introduced quantum reinforcement learning example, the foundation
for finding ”good states” and subsequently approximating an optimal policy are observations in the
form of completed games (episodes). In Black Jack, a state is given by the player’s current sum
(12-21), the dealer’s one showing card (given by the values 1-10, where 1 is an ace), and whether or
not the player holds a usable ace (given by 0 or 1, where 0 is no usable ace). The two actions the
player can execute are either to stick (=stop receiving cards), to hit (=receive another card), given
by a ∈ {0, 1}. Every episode is composed of multiple state-action pairs, and for each state-action
pair a reward value is given. Although the same state-action pairs may occur in different episodes,
it is very unlikely that the reward for these in two episodes is the same, as the reward in a state
not only depends from the state, but also from the previous states and actions. What we intend to
approximate from n complete episodes is the optimal policy under consideration of all states.
5
4
Difference Monte Carlo and quantum-enhanced Monte-Carlo
policy evaluation
Monte Carlo methods learn from complete sample returns, which implies that they are defined
for episodic tasks only. An update happens after each episode, so learning happens directly from
experience. The goal is to learn the optimal policy given some episodes, and the basic idea is to
average the returns after a state s was visited. A distinction has to be made about whether the
returns for each visit to s in an episode are averaged, or only first time visits. Each of the approaches
converges asymptotically. As for the used game each state occurs only once per episode, first-visit
Monte Carlo policy evaluation is described in Algorithm 1:
Algorithm 1 Monte Carlo policy evaluation
Initialize: π, V, Return(s)
Repeat forever:
(a) Generate an episode using π
(b) For each state s in current episode
R ← return following the first occurrence of s
Append R to Return(s)
V (s) ← average (Return(s))
where π is the policy to be evaluated, V a state-value function, and Return(s) is initialized as
empty list and will hold all s ∈ S. In the Black Jack example, our aim is to have a card sum that is
greater than the dealer’s sum, but in the same instance we must not exceed 21. A reward of +1 is
given for winning the game, 0 reward for a draw game, and -1 for losing the game. The state-value
function we approximate is based on the policy α, which is defined as ”stick if the sum is 20 or 21,
and else hit”. For this, we simulated many Black Jack games using policy α and averaged the returns
following each state. Finding the state-value function with a purely classical Monte Carlo algorithm
requires thousands of observations (simulations), based on which the returns following each state are
averaged (see Figs. 2, 3, showing the ”no usable ace”-scenario only).
6
Figure 2: Monte Carlo: 10,000 episodes, policy α, no usable ace
Figure 3: Monte Carlo: 500,000 episodes, policy α, no usable ace
Additionally, we simulated many blackjack games using random policy β, which would choose a
random action in each state, averaged the returns following each state, and used this to find a policy
only on observation. The respective value function is plotted in 4.
4.1
State-value function approximation
In the first example, we generate n sub-optimal state-value functions by purely classical Monte Carlo
policy evaluation. We want to emphasize that the formulation of the algorithm is such that either
n classically generated (sub-optimal) state-value functions can be embedded for approximating an
improved state-value function, or the state-value functions can be generated quantum-enhanced by
supplying episodes with their respective (non-averaged) rewards to the algorithm. Both may also
be combined in a nested algorithm. The QUBO formulation is such that it will find the preferable
7
Figure 4: Monte Carlo: 500,000 episodes, policy β, no usable ace
state-action pairs based on their rewards over the episodes, and once this has been completed for m
episodes, n state-value functions can be generated according to the same proceeding:
• Based on ( episodes, find n sub-optimal state-value functions classically and embed each
state-action pair with the respective value directly on the QPU and so help to approximate
the optimal state-value function, which is better than each of the n sub-optimal state-value
functions. How identical state-action pairs over different state-value functions are dealt with
will be explained below.
• Based on ( episodes, we embed state-action pairs directly on the QPU and approximate a policy
directly from the observations.
When using the QPU to approximate the state-value function, we first classically simulated m
Black Jack games according to the policy α. We did this n times, and generated n sub-optimal
state-value functions. We then embedded these state-value functions on the QPU such that the
QPU acts as a filter, which identifies the state-action pairs that do not positively contribute to
approximating the optimal state-value function, and removes these from the result. Still, the result
may contain identical state-action pairs with different rewards, but those are averaged over. In our
experiments, with the help of the QPU we were on average able to filter out approximately 1/2 of
the state-action-value triples from the initially supplied observations. Due to the partially stochastic
nature of the game and the varying episode-length, the number of different state-action-value triples
may vary.
4.2
Policy iteration
Concerning policy iteration, we chose random actions in each state, observed the obtained reward,
and use this to learn a policy. The proceeding is similar to the latter example, except that we we do
not start with a given policy, such as alpha described above, but try to find a policy (what to do in
each state) based observations. By applying the QPU-filter to the original data, we show that we are
8
able to learn policies of similar quality as with the purely classical algorithm, although the number
of states in the original data can be reduced by up to 2/3.
5
Formulation of the problem as QUBO
The following explanations are based on classically generated, sub-optimal state-value functions, which
are embedded on the QPU. The resulting state-value function is compared with single sub-optimal
state-value functions, as well as with a state-value function which was obtained by averaging over
all sub-optimal state-value functions. The sub-optimal state-value functions in this example were
generated using 100 - 500 (m) episodes each. We varied the number of generated state-value functions
n from 2 - 7. Unsurprisingly, we obtained the best results with 500 episodes and 7 sub-optimal
state-value functions. Increasing n by 1 and/ or m by 50 did not allow for embedding the problem on
the QPU without splitting it into sub-problems. Here, we explain how to use qubits for representing
state-action pairs, and how to determine the entries of the QUBO by using the value per state-action
pair we obtained in our sub-optimal state-value functions. In a nutshell, we use the 2-dimensional
physical architecture of the chip as if it was 3-dimensional by representing the problem as a tensor-like
structure, but the introduced method generalizes to more complex problems with n dimensions.
Based on the following explanations it will become obvious that the more observations are supplied,
the more qubit and connections between single qubits are required. Thus, as we have to deal with
sparse connectivity and a limited number of qubits, it is in our interest to find a formulation of the
problem that allows us to find a sufficiently good state-value function for a given policy by keeping
the number of observations small.
5.1
Conditions
What we approximate is a state-value function for a policy based on observations (complete episodes),
and the reward that is given for an action in a given state. Certainly, it is not possible to just rely
on one observation, as in each episode we can see a certain state-action pair only once, and thus
only are given one reward-value. It may be that in one episode a certain action for a certain state is
rewarded higher than in another episode, depending on which actions have been executed in which
states in the past. Furthermore, a game such as Black Jack features stochastic components, thus we
assume it is possible to make some assumptions about future states (i.e. the player’s current sum in
an ongoing episode will not decrease in the next state), but it cannot be accurately predicted. This
means that we should not ignore the future states in a given state completely, but have to include
them into our considerations to a certain degree. Therefore, for formulating the problem as a QUBO
we need to consider the following conditions:
• As identical state-action pairs may be rewarded differently in different episodes, we must
assume that in the worst case the execution of a certain action given a certain state is positively
rewarded in one episode, and negatively rewarded in another episode. As we intend to not
only identify random successful state-action pairs, but successful sequences (see condition 2),
averaging or any other means of aggregating the rewards of state-action pairs is prohibited,
9
and the QUBO must be formulated such identical state action-pairs over the episodes are given
different entries.
• As the reward in a certain state partly depends on what happened in the past, and we are
dealing with multiple episodes and want to consider the success of an action in a given state by
evaluating the future states, the QUBO must be formulated such that both actions taken in
past and future states are taken into account, which allows us to not only determine preferable
state-action pairs, but preferable state-action chains by indirectly encoding the statistical
probability of consecutive state-action pairs being successful or not while approaching the end
of the game. If, in our observed episodes, we find state-action-sequences (s0 , a0 , s00 , a00 , s000 , a000 ...)
and (s∗, a∗, s ∗ ∗, a ∗ ∗, s ∗ ∗∗, a ∗ ∗ ∗ ...), and the latter comes with higher rewards for consecutive
state-action pairs, we assume that this is a more successful sequence. If k >> l and a sequence
b gives positive reward k times, and negative reward l times, b will be considered as successful
sequence, as k times the cumulative positive reward outweighs the l times cumulative negative
reward. If for b only k > l, other successful sequences may outweigh b, and it may not contribute
to and appear in the optimal policy. lf for b k < l or even only k ≈ l then it must not be
considered in the resulting optimal policy.
5.2
QUBO
Each of the n episodes consists of a different number of states Sn = {sn1 , ..., snm }, where m is the
number of states in a given episode and may vary over the episodes. For each state snx in Sn we
may also see varying actions and rewards, depending on the history that lead us to snx . Furthermore,
we may see different actions, depending on whether the player behaved risk-affine or risk-averse an
episode under consideration. Each of the snx must be given a separate entry in the QUBO matrix, as
not only the rewards for the state itself, but also the consecutive state-action pairs including their
respective rewards may differ. Therefore, the first step is to iterate over all episodes, create a list L of
length l containing state-action pairs and the observed negative rewards r ∗ (−1) ∗ rf in a temporary
dictionary, where rf is a factor applied to scale the reward up or down, depending on the size of the
real values. In this given problem, all rewards ranged from (-1) to 1, and we had best successes in
scaling up the rewards by a factor of 10. Due to fluctuations during the annealing cycle, the energies
of different possible solutions must not be too close to each other, as jumps may happen, i.e. from a
lower energy-solution (better) to a higher-energy solution (worse). On the other hand, the higher the
energy barriers, the more unlikely tunneling will happen and we may get stuck in a local minimum,
so the energy values also must not be too far apart. The negative rewards are needed, as maximizing
the reward equals minimizing the negative reward, which can be interpreted as energy minimization
problem on the QPU. The basic QUBO-entry for each state-action pair Vs,a is thus calculated as
shown in Equation 9.
Ls,a = Vs,a = Rs,a ∗ (−1) ∗ rf ,
(9)
The QUBO-matrix is an upper triangular N ×N -matrix by i ∈ {0, ..., N − 1} and j ∈ {0, ..., N − 1}
and has rows and columns LS,A , LTS,A , each entry initialized with 0, and is an where S are all
observed states and A the respective actions. LS,A is of length n ∗ M , where n is the number of
10
observed episodes and M = {m0 , ...mn−1 } is the number of states in each episode (which may vary).
The entries are given by the following functions (Eqs. 10, 11, 12):
QU BO(i, j) + (Li(v) + Lj(v) )2 ,
QU BO(i, j) = QU BO(i, j) − ((Li(v) + Lj(v) )2 ),
QU BO(i, j),
where
if c1
if c2
(10)
otherwise
c1 : Li(s,a) = Lj(s,a) and (Li(v) + Lj(v) ) > 0 and i 6= j
(11)
c2 : Li(s,a) = Lj(s,a) and (Li(v) + Lj(v) ) < 0 and i 6= j
(12)
and
where Li(v) gives the ith value v in Ls,a,v ∈ LS,A,V , S = {s1 , s2 , ..., sn }, A = a1 , a2 , ..., an {a}.
This basically means that we lock each state-action pair in LS,A , and find the respective duplicate
state-action pairs over the remaining entries, which are summed and squared to represent the QUBO
entries. For this first QUBO manipulation there are several conditions, however, to be considered for
writing an entry:
• An entry is only added if it is the summed and squared values are maximum or minimum per
Li(v) .
• An entry is only added if the state-action pairs Li(s,a) + Lj (s, a) match.
• We intend to find the best action per state given n observations of respective length mn . As
it is most likely that identical state-action pairs appear in different episodes, and as each
state-action pair is given a separate QUBO-entry, even if it is identical to one added from
another episode, they may not have the same value. We increase or decrease these values
quadratically, in order to separate them from one another, which results in a separation or an
amplification of identical state-actions based on their values. As we are minimizing energies
and therefore multiply the state values by (−1): the smaller −((Li(n) + Lj )2 ) the better.
We add the diagonal terms as follows Equation 13:
QU BO(i, j) + (L
i(v) + Lj(v) ),
QU BO(i, j) =
QU BO(i, j),
if Li(s,a) = Lj(s,a) and i = j
(13)
otherwise
What follows next is the separation of different state values from one another, as we only want to
find the optimal policy, which is the best action in a given state considering the future states. Games
like Black Jack have a stochastic component, but nevertheless the history resulting in a state and n
observations let us statistically determine what the most likely future states in a given states are.
11
We penalize identical states with different actions as described in Equation 14.
QU BO(i, j) =
QU BO(i, j) + p,
QU BO(i, j),
if Li(s) = Lj(s) and Li(a) 6= Lj(a) and i 6= j
(14)
otherwise
where p is a penalization constant, which should be set to according to the energy scale.
In order to approximate a good policy not only based on high-valued observations, but chains
of consecutive states with cumulative high reward, it is possible to consider chains of length h (the
horizon) by manipulating the QUBO-entries of h consecutive states. While iterating over all episodes
and states, we identify each state s0 following a state-action pair {s, a}, which may differ from
episode to episode. For each of the consecutive states s0 we create or manipulate the respective entry
according to Eqs. 15 - 17.
where
QU BO(i, j) + (Li(v) + Lj+k(v) )2 , if c1
QU BO(i, j) = QU BO(i, j) − ((Li(v) + Lj+k(v) )2 ), if c2
QU BO(i, j),
(15)
otherwise
c1 : Li−(k−1)(s,a) = Lj(s,a) and (Li(v) + Lj+k(v) ) > 0 and i 6= j
(16)
c2 : Li−(k−1)(s,a) = Lj(s,a) and (Li(v) + Lj+k(v) ) < 0 and i 6= j
(17)
and
We initialize k with 1 so that in the first iteration i − (k − 1) = i, and in consecutive iterations
i increases with k, and we always consider consecutive states. As identical state-action pairs from
different episodes received separate entries, the more often a chain is successful, the more often all of
its respective values are increased at different i, j in the matrix. Due to the penalization in Equation
14 different actions per state are already separated. The bigger the horizon, the more qubits we need
to represent the problem, and the smaller the original problem must be so that it can be embedded
without splitting it into sub-problems.
6
Experimental results and conclusions
By formulating and embedding the QUBO-matrix on the QPU as specified, we are able to show that:
• Given a policy α, which is defined as ”stick if the sum is 20 or 21, and else hit”, and a limited
number of observations, we can use the QPU as a filter to identify the states or sequences
of states that do not positively contribute to approximating the optimal state-value function.
We can reduce the source state-action-value triples by up to 1/2, and by averaging over the
remaining values per state, whereby we may still see duplicate state-action pairs in the result,
we can generate an improved state-value function. The resulting state-value function, found by
12
the quantum-enhanced Monte Carlo algorithm, is at least equivalent or even better compared to
one learned with purely classical Monte Carlo policy evaluation on all given state-action-value
triples. Due to the partially stochastic nature of the game and the varying episode-length,
the number of different source-state-action-value triples may vary, but here are two examples
in support of our explanations: by setting n = 7, m = 500, we obtained 1072 different stateaction-value triples in the source data, with 1004 of them being distinct. With the QPU-filter,
we could reduce the number of state-action-value triples to 618, over which we averaged. In
another example, with unchanged n and m, we ran the algorithm 5 times, and summarized the
result to 5393 state-action-value triples in the source data, with 4699 of them being distinct.
With the QPU-filter, we could reduce the number state-action-value triples to 3019, over which
we averaged. For the latter case, plotted in Figs. 6 and 7, the Euclidean distance from the
state-value function found with the quantum-enhanced algorithm to the optimal state-value
function found with the purely classical algorithm and 500,000 episodes (with varying numbers
of states) is 2.01, whereas the distance from a state-value function determined with the purely
classical algorithm to the (also purely classically determined) optimal policy is 3.26.
• Given a random policy beta, in which an action is randomly chosen in each state, and a limited
number of observations, we can use the QPU as a filter to identify the states or sequences of
states that do not positively contribute to learning a policy which approximates an optimal
policy. We can reduce the source state-action-value triples by up to 2/3, and by conducting a
majority vote over the remaining actions per state we can approximate a policy that is equivalent
or only slightly poorer than the policy found with the purely classical algorithm on all given
state-action-value triples. By setting n = 7, m = 500 and running the algorithm 5 times and
summarizing the result, we obtained 4904 state-action-value triples in the source data, with
4489 them being distinct. With the QPU-filter, we could reduce the number state-action-value
triples to 1615. Due to the limited number of observations, we were not able to completely
eliminate duplicate states with different actions in the quantum-classical algorithm. Thus, we
applied a majority vote, and show that the results produced by the classical algorithm are only
slightly better than the ones produced by the quantum-classical algorithm. However, the purely
classical algorithm required 4904 state-action-value triples for making a decision, whereas the
quantum-enhanced algorithm was able to filter out 3289 state-action-value triples and then find
a qualitatively similar policy with only 1615 observations. In the described case, calculating
the Euclidean distance from the policy found with the quantum-enhanced to the optimal policy
found with the purely classical algorithm and 500,000 episodes (with varying numbers of states)
is 10.2, whereas the distance from a policy determined with the purely classical algorithm to
the (also purely classically determined) optimal policy is 9.8.
Summing up, we were able to directly embed maximally 7 complete state-value functions generated on
500 observations each on the QPU. With each execution the results my slightly vary, which is because
of the randomly chosen observations, based on which different numbers of different states-action-value
triples are available. We used between 1,100 and 1,700 qubits, a number which also varied with
different sets of observations. The considered horizon h can be of arbitrary length, and a discount
factor may be used to scale the importance of the future states compared to the actual state, whereby
13
we applied discount factors from 0.1 - 0.9 in our experiments. We were able to show that we can
partially formulate policy-evaluation and iteration as QUBO, such that it can be presented to and
solved with the support of a D-Wave 2000Q QPU. We were also able to show that by augmenting
Monte Carlo policy evaluation, which calculates the value function for a given policy using sampling,
with the introduced algorithm, we obtain equivalent or slightly better results compared to averaging
over n state-value functions or to each of the sub-optimal state-value functions (with identical m).
The state-value functions we found based on the n episodes and sub-optimal state-value functions
are still not optimal, compared to classically found state-value functions based on tens or hundreds
of thousands of observations. Figure 5 shows the state value function (assuming the player has a
usable ace) based on the classical Monte Carlo algorithm. Figure 6 shows the state-value function
based learned from averaging over 5 iterations and 7 classically found state-value functions. Figure
7 shows the results produced by the quantum-classical algorithm, which, in this case, produces a
better than the classical algorithms with the same parameters.
Figure 5: Classical Monte Carlo: 500 episodes, policy α, no usable ace
14
Figure 6: Classical Monte Carlo: 500 episodes, 7 policies, policy α, no usable ace
Figure 7: Quantum-enhanced Monte Carlo: 500 episodes, 7 policies, policy α, no usable ace
15
7
Future work
In this report, we showed how to partially embed policy evaluation for discrete state spaces on the
D-Wave QPU, whereas in our current work we aim to find quantum-classical algorithms capable
of dealing with continuous state spaces, which is, i.e., ultimately useful in the context self-driving
vehicles, where an agent needs to be able to make decisions considering a dynamically changing
environment based on continuous state spaces. Furthermore, actions cannot necessarily be discretized,
i.e., when we consider reinforcement learning in terms of self-learning/ healing machines, which we
also aim to solve. We will continue to focus on solving practically relevant problems by means of
quantum machine learning [22–27], quantum simulation, and quantum optimization.
Acknowledgments
Thanks go to VW Group CIO Martin Hofmann and VW Group Region Americas CIO Abdallah
Shanti, who enable our research.
16
References
[1] D-Wave (2017): Quantum Computing, How D-Wave Systems Work [04-24-2017]; URL:
https://www.dwavesys.com/quantum-computing
[2] M. Benedetti, J.R.-Gmez, R. Biswas, A. Perdomo-Ortiz (2015): Estimation of effective temperatures in quantum annealers for sampling applications: A case study with possible applications
in deep learning; URL: https://arxiv.org/abs/1510.07611
[3] V. N. Smelyanskiy, D. Venturelli, A. Perdomo-Ortiz, S. Knysh, M. I. Dykman (2015): Quantum
annealing via environment-mediated quantum diffusion; URL: https://arxiv.org/abs/1511.02581
[4] D. Venturelli, D. J.J. Marchand, G. Rojo (2015): Quantum Annealing Implementation of
Job-Shop Scheduling; URL: https://arxiv.org/abs/1506.08479
[5] Z. Jiang, E. G. Rieffel (2015): Non-commuting two-local Hamiltonians for quantum error
suppression; URL: https://arxiv.org/abs/1511.01997
[6] S. V. Isakov, G. Mazzola, V. N. Smelyanskiy, Z. Jiang, S. Boixo, H. Neven, M. Troyer (2015):
Understanding Quantum Tunneling through Quantum Monte Carlo Simulations(2015); URL:
https://arxiv.org/abs/1510.08057
[7] B. O’Gorman, A. Perdomo-Ortiz, R. Babbush, A. Aspuru-Guzik, V. Smelyanskiy
(2014):
Bayesian Network Structure Learning Using Quantum Annealing;
URL:
https://arxiv.org/abs/1407.3897
[8] E. G. Rieffel, D. Venturelli, B. O’Gorman, M. B. Do, E. Prystay, V. N. Smelyanskiy (2014):
A case study in programming a quantum annealer for hard operational planning problems;
https://arxiv.org/abs/1407.2887
[9] D. Venturelli, S. Mandr, S. Knysh, B. O’Gorman, R. Biswas, V. Smelyanskiy (2014): Quantum
Optimization of Fully-Connected Spin Glasses; URL: https://arxiv.org/abs/1406.7553
[10] A. Perdomo-Ortiz, J. Fluegemann, S. Narasimhan, R. Biswas, V. N. Smelyanskiy (2014): A
Quantum Annealing Approach for Fault Detection and Diagnosis of Graph-Based Systems; URL:
https://arxiv.org/abs/1406.7601
[11] S. Boixo, T. F. Ronnow, S. V. Isakov, Z. Wang, D. Wecker, D. A. Lidar, J. M. Martinis, M. Troyer (2014): Quantum annealing with more than one hundred qubits; URL:
https://arxiv.org/abs/1304.4595
[12] R. Babbush, A. Perdomo-Ortiz, B. O’Gorman, W. Macready, A. Aspuru-Guzik (2012): Construction of Energy Functions for Lattice Heteropolymer Models: Efficient Encodings for Constraint
Satisfaction Programming and Quantum Annealing Advances in Chemical Physics, in press;
URL: https://arxiv.org/abs/1211.3422
[13] L. Wang, T. F. Ronnow, S. Boixo, S. V. Isakov, Z. Wang, D. Wecker, D. A. Lidar, J. M. Martinis, M. Troyer (2013): Classical signature of quantum annealing; URL:
https://arxiv.org/abs/1305.5837
17
[14] A. Perdomo-Ortiz, N. Dickson, M. Drew-Brook, G. Rose, A. Aspuru-Guzik (2012): Finding low-energy conformations of lattice protein models by quantum annealing; URL:
https://arxiv.org/abs/1204.5485
[15] Los Alamos National Laboratory (2016):
D-Wave 2X Quantum Computer;
URL:
http://www.lanl.gov/projects/national-security-education-center/information-sciencetechnology/dwave/
[16] F. Neukart, C. Seidel, G. Compostella, D. Von Dollen, S. Yarkoni, B. Parney (2017): Traffic
flow optimization using a quantum annealer; arXiv preprint arXiv:1708.01625 [quant-ph]
[17] A. Lucas (2014): Ising formulations of many NP problems; Frontiers in Physics; URL:
http://journal.frontiersin.org/article/10.3389/fphy.2014.00005
[18] D. Korenkevych et al. (2016): Benchmarking Quantum Hardware for Training of Fully Visible
Boltzmann Machines; arXiv:1611.04528 [quant-ph]
[19] T. Lanting et al. (2013): Entanglement in a Quantum Annealing Processor; Phys. Rev. X 4,
021041
[20] M. Wiering, M. van Otterlo (2012): Reinforcement Learning and Markov Decision Processes;
Springer, Heidelberg
[21] R. S. Sutton, A. G. Barto (1998): Reinforcement Learning: an Introduction; MIT Press,
Cambridge
[22] F. Neukart, S. M. Moraru (2013): On Quantum Computers and Artificial Neural Networks;
Signal Processing Research 2 (1), 1-11
[23] F. Neukart, S. M. Moraru (2014): Operations on Quantum Physical Artificial Neural Structures;
Procedia Engineering 69, 1509-1517
[24] Springer
Professional:
Volkswagen
Trials
Quantum
Computers;
URL:
https://www.springerprofessional.de/en/automotive-electronics—software/companies—
institutions/volkswagen-trials-quantum-computers/12170146?wt mc=offsi.emag.mtzworldwide.rssnews.-.x
[25] F. Neukart (2017): Quantum physics and the biological brain. In: Reverse Engineering the Mind.
AutoUni Schriftenreihe, vol 94. Springer, Wiesbaden
[26] A. Levit et al. (2017): Free-Energy-based Reinforcement Learning Using a Quantum Processor;
arXiv:1706.00074v1 [cs.LG]
[27] D. Crawford et al. (2016): Reinforcement Learning Using Quantum Boltzmann Machines;
arXiv:1612.05695 [quant-ph]
18
| 7cs.IT
|
Intersection types for unbind and rebind∗
Mariangiola Dezani-Ciancaglini
Paola Giannini
Dip. di Informatica, Univ. di Torino, Italy
Dip. di Informatica, Univ. del Piemonte Orientale, Italy
Elena Zucca
DISI, Univ. di Genova, Italy
We define a type system with intersection types for an extension of lambda-calculus with unbind and
rebind operators. In this calculus, a term t with free variables x1 , . . . , xn , representing open code, can
be packed into an unbound term h x1 , . . . , xn | t i, and passed around as a value. In order to execute
inside code, an unbound term should be explicitly rebound at the point where it is used. Unbinding
and rebinding are hierarchical, that is, the term t can contain arbitrarily nested unbound terms, whose
inside code can only be executed after a sequence of rebinds has been applied. Correspondingly,
types are decorated with levels, and a term has type τ k if it needs k rebinds in order to reduce to
a value of type τ . With intersection types we model the fact that a term can be used differently in
contexts providing different numbers of unbinds. In particular, top-level terms, that is, terms not
requiring unbinds to reduce to values, should have a value type, that is, an intersection type where
at least one element has level 0. With the proposed intersection type system we get soundness under
the call-by-value strategy, an issue which was not resolved by previous type systems.
Introduction
In previous work [12, 13] we introduced an extension of lambda-calculus with unbind and rebind operators, providing a simple unifying foundation for dynamic scoping, rebinding and delegation mechanisms.
This extension relies on the following ideas:
• A term h Γ | t i, where Γ is a set of typed variables called unbinders, is a value, of a special type
code, representing “open code” which may contain free variables in the domain of Γ.
• To be used, open code should be rebound through the operator t[r], where r is a (typed) substitution
(a map from typed variables to terms). Variables in the domain of r are called rebinders. When
the rebind operator is applied to a term h Γ | t i, a dynamic check is performed: if all unbinders are
rebound with values of the required types, then the substitution is performed, otherwise a dynamic
error is raised.
For instance, the term1 h x, y | x + y i[x 7→ 1, y 7→ 2] reduces to 1 + 2, whereas both h x, y | x + y i[x 7→ 1]
and h x:int | x + 1 i[x:int → int 7→ λ y.y + 1] reduce to error.
Unbinding and rebinding are hierarchical, that is, the term t can contain arbitrarily nested unbound
terms, whose inside code can only be executed after a sequence of rebinds has been applied2 . For
instance, two rebinds must be applied to the term h x | x + h x | x i i in order to get an integer:
h x | x + h x | x i i[x 7→ 1][x 7→ 2] −→ (1 + h x | x i)[x 7→ 2]
−→ (1[x 7→ 2]) + (h x | x i[x 7→ 2])
−→⋆ 1 + 2
∗ This work
has been partially supported by MIUR DISCO - Distribution, Interaction, Specification, Composition for Object
Systems, and IPODS - Interacting Processes in Open-ended Distributed Systems.
1 In the examples we omit type annotations when they are irrelevant.
2 See the Conclusion for more comments on this choice.
E. Pimentel, B. Venneri and J. Wells (Eds.): Workshop on
Intersection Types and Related Systems 2010 (ITRS 2010).
EPTCS 45, 2011, pp. 45–58, doi:10.4204/EPTCS.45.4
c Dezani, Giannini and Zucca
This work is licensed under the
Creative Commons Attribution License.
Intersection types for unbind and rebind
46
Correspondingly, types are decorated with levels, and a term has type τ k if it needs k rebinds in order
to reduce to a value of type τ . With intersection types we model the fact that a term can be used differently
in contexts which provide a different number k of unbinds. For instance, the term h x | x + h x | x i i above
has type int2 ∧ code0 , since it can be safely used in two ways: either in a context which provides two
rebinds, as shown above, or as a value of type code, as, e.g., in:
(λ y.y[x 7→ 1][x 7→ 2]) h x | x + h x | x i i
On the other side, the term h x | x + h x | x i i does not have type int1 , since by applying only one rebind
with [x 7→ 1] we get the term 1 + h x | x i which is stuck.
The use of intersection types allows us to get soundness w.r.t. the call-by-value strategy. This issue
was not resolved by previous type systems [12, 13] where, for this reason, we only considered the callby-name reduction strategy. To see the problem, consider the following example.
The term
(λ y.y[x 7→ 2]) (1 + h x | x i)
is stuck in the call-by-value strategy, since the argument is not a value, hence should be ill typed, even
though the argument has type int1 , which is a correct type for the argument of the function. By using
intersection types, this can be enforced by requiring arguments of functions to have value types, that is,
intersections where (at least) one of the conjuncts is a type of level 0. In this way, the above term is ill
typed. Note that a call-by-name evaluation of the above term gives
(λ y.y[x 7→ 2]) (1 + h x | x i)
−→ (1 + h x | x i)[x 7→ 2]
−→ (1[x →
7 2]) + (h x | x i[x 7→ 2])
−→⋆ 1 + 2.
Instead, the term (λ y.y[x 7→ 2]) h x | 1 + x i is well typed, and it reduces as follows in both call-by-value
and call-by-name strategies:
(λ y.y[x 7→ 2]) h x | 1 + x i −→ h x | 1 + x i[x 7→ 2]
−→ 1 + 2.
It is interesting to note that this phenomenon is due to the possibility for operators (in our case for
+) of acting on arguments which are unbound terms. This design choice is quite natural in view of discussing open code, as in MetaML [23]. In pure λ -calculus there is no closed term which converges when
evaluated by the lazy call-by-name strategy and is stuck when evaluated by the call-by-value strategy.
Instead there are closed terms, like (λ x.λ y.y)((λ z.z z)(λ z.z z)), which converge when evaluated by the
lazy call-by-name strategy and diverge when evaluated by the call-by-value strategy, and open terms,
like (λ x.λ y.y)z, which converge when evaluated by the lazy call-by-name strategy and are stuck when
evaluated by the call-by-value strategy.3
In summary, the contribution of this paper is the following. We define a type system for the calculus
of Dezani et al. [12, 13], where, differently from those papers, we omit types on the lambda-binders in
order to get the whole expressivity of the intersection type constructor [25]. The type system shows, in
our opinion, an interesting and novel application of intersection types. Indeed, they handle in a uniform
way the three following issues.
• Functions may be applied to arguments of (a finite set of) different types.
• A term can be used differently in contexts providing different numbers of unbinds. Indeed, an
intersection type for a term includes a type of form τ k if the term needs k rebinds in order to
reduce to a value of type τ .
3 Note
that following Pierce [18] we consider only λ -abstractions as values, while for Plotkin [19] also variables are values.
Dezani, Giannini and Zucca
47
• Most notably, the type system guarantees soundness for the call-by-value strategy, by requiring
that top-level terms, that is, terms which do not require unbinds to reduce to values, should have
value types.
Paper Structure. In Section 1 we introduce the syntax and the operational semantics of the language.
In Section 2 we define the type system and prove its soundness in Section 3. In Section 4 we discuss
related and further work.
1
Calculus
The syntax and reduction rules of the calculus are given in Figure 1.
t
Γ
r
:: = x | n | t1 + t2 | λ x.t | t1 t2 | h Γ | t i | t[r] | error term
:: = x1 :T1 , . . . , xm :Tm
type context
:: = x1 :T1 →
7 t1 , . . . , xm :Tm 7→ tm
(typed) substitution
v :: = λ x.t | h Γ | t i | n
rv :: = x1 :T1 7→ v1 , . . . , xm :Tm 7→ vm
E
σ
value
value substitution
:: = [ ] | E + t | n + E | E t | v E | t[r, x:T 7→ E ]
:: = x1 →
7 v1 , . . . , xm 7→ vm
n1 + n2 −→ n
(λ x.t) v −→ t{x 7→ v}
h Γ | t i[rv ] −→ t{subst(rv )|dom(Γ) }
h Γ | t i[rv ] −→ error
n[rv ] −→ n
(t1 + t2 )[rv ] −→ t1 [rv ] + t2 [rv ]
(λ x.t)[rv ] −→ λ x.t[rv ]
(t1 t2 )[rv ] −→ t1 [rv ] t2 [rv ]
t[r][rv ] −→ t′ [rv ]
error[rv ] −→ error
t −→ t′
ñ = ñ1 +Z ñ2
(C TX )
(S UM )
(A PP )
if
if
Γ ⊆ tenv(rv )
Γ 6⊆ tenv(rv )
(R EBIND U NBINDY ES )
(R EBIND U NBIND N O )
(R EBIND N UM )
(R EBIND S UM )
(R EBINDA BS )
(R EBINDA PP )
if
t[r] −→ t′
(R EBIND R EBIND )
(R EBIND E RROR )
t −→ error
E 6= [ ]
E [t] −→ E [t′ ]
if
evaluation context
(untyped) substitution
E 6= [ ]
E [t] −→ error
(C TX E RROR )
Figure 1: Syntax and reduction rules
Terms of the calculus are the λ -calculus terms, the unbind and rebind constructs, and the dynamic
error. Moreover, we include integers with addition to show how unbind and rebind behave on primitive
data types. Unbinders and rebinders are annotated with types T, which will be described in the following
section. Here it is enough to assume that they include standard int and functional types. Type contexts
and substitutions are assumed to be maps, that is, order is immaterial and variables cannot appear twice.
Intersection types for unbind and rebind
48
Free variables and application of a substitution to a term are defined in Figure 2. Note that an
unbinder behaves like a λ -binder: for instance, in a term of shape h x | t i, the unbinder x introduces a
local scope, that is, binds free occurrences of x in t. Hence, a substitution for x is not propagated inside
t. Moreover, a condition, which prevents capture of free variables similar to the λ -abstraction case is
needed. For instance, the term (λ y.h x | y i) (λ z.x) reduces to h x | y i{y 7→ λ z.x} which is stuck, i.e., it
does not reduce to h x | λ z.x i, which would be wrong.
However, λ -binders and unbinders behave differently w.r.t. α -equivalence. A λ -binder can be renamed, as usual, together with all its bound variable occurrences, whereas this is not safe for an unbinder:
for instance, h x | x + 1 i[x 7→ 2] is not equivalent to h y | y + 1 i[x 7→ 2]. Only a global renaming, e.g.,
leading to h y | y + 1 i[y 7→ 2], would be safe.4
FV(x) = {x}
FV(n) = 0/
FV(t1 + t2 ) = FV(t1 ) ∪ FV(t2 )
FV(λ x.t) = FV(t) \ {x}
FV(t1 t2 ) = FV(t1 ) ∪ FV(t1 )
FV(h Γ | t i) = FV(t) \ dom(Γ)
FV(t[r]) = FV(t) ∪ FV(subst(r))
S
FV(x1 7→ t1 , . . . , xm 7→ tm ) = i∈1..m FV(ti )
x{σ } = v if σ (x) = v
x{σ } = x if x 6∈ dom(σ )
n{σ } = n
(t1 + t2 ){σ } = t1 {σ } + t2 {σ }
(λ x.t){σ } = λ x.t{σ\{x} } if x 6∈ FV(σ )
(t1 t2 ){σ } = t1 {σ } t2 {σ }
h Γ | t i{σ } = h Γ | t{σ\dom(Γ) } i if dom(Γ) ∩ FV(σ ) = 0/
t[x1 :T1 7→ t1 , . . . , xm :Tm 7→ tm ]{σ } = t{σ }[x1 :T1 7→ t1 {σ }, . . . , xm :Tm 7→ tm {σ }]
Figure 2: Free variables and application of substitution
The call-by-value operational semantics is described by the reduction rules and the definition of the
evaluation contexts E . We denote by ñ the integer represented by the constant n, by tenv(r) and subst(r)
the type context and the untyped substitution, respectively, extracted from a typed substitution r, by dom
the domain of a map, by σ|{x1 ,...,xn } and σ\{x1 ,...,xn } the substitutions obtained from σ by restricting to or
removing variables in set {x1 , . . . , xn }, respectively.
Rules for sum and application (of a lambda to a value) are standard. The (R EBIND ) rules determine
what happens when a rebind is applied to a term. There are two rules for the rebinding of an unbound
term. Rule (R EBIND U NBINDY ES ) is applied when the unbound variables are all present (and of the required
types), in which case the associated values are substituted, otherwise rule (R EBIND U NBIND N O) produces a
4 A more sophisticated solution [5] allows local renaming of unbinders by a “precompilation” step annotating variables with
indexes, which can be α -renamed, but are not taken into account by the rebinding mechanism. Indeed, variable occurrences
which are unbinders, rebinders, or bound to an unbinder, actually play the role of names rather than standard variables. Note
that variables in a rebinder, e.g., x in [x 7→ 2], are not bindings, and x is neither a free, nor a bound variable. See the Conclusion
for more comments on this difference.
Dezani, Giannini and Zucca
49
dynamic error. This is formally expressed by the side condition Γ ⊆ tenv(r). Note that a rebind applied to
a term may be stuck even though the variables are all present and of the right type, when the substitution
is not defined. This may be caused by the fact that when applied to an unbound term, a substitution
could cause capture of free variables (see the example earlier in this section). Rebinding a term which
is a number or error does not affect the term. On sum, abstraction and application, the rebind is simply
propagated to subterms, and if a rebind is applied to a rebound term, (R EBIND R EBIND ), the inner rebind is
applied first. The evaluation order is specified by rule (C TX ) and the definition of contexts, E , that gives
the call-by-value strategy. Finally rule (C TX E RROR ) propagates errors. To make rule selection deterministic,
rules (C TX ) and (C TX E RROR ) are applicable only when E 6= [ ]. As usual −→⋆ is the reflexive and transitive
closure of −→.
When a rebind is applied, only variables which were explicitly specified as unbinders are replaced.
For instance, the term h x | x + y i[x 7→ 1, y 7→ 2] reduces to 1 + y rather than to 1 + 2. In other words, the
unbinding/rebinding mechanism is explicitly controlled by the programmer.
Looking at the rules we can see that there is no rule for the rebinding of a variable. Indeed, it will be
resolved only when the variable is substituted as effect of a standard application. For instance, the term
(λ y.y[x 7→ 2]) h x | x + 1 i reduces to h x | x + 1 i[x 7→ 2].
Note that in rule (R EBINDA BS ), the binder x of the λ -abstraction does not interfere with the rebind,
even in case x ∈ dom(r). Indeed, rebind has no effect on the free occurrences of x in the body of the λ abstraction. For instance, (λ x.x + h x | x i)[x 7→ 1] 2, which is α -equivalent to (λ y.y + h x | x i)[x 7→ 1] 2,
reduces in some steps to 2 + 1. On the other hand, both λ -binders and unbinders prevent a substitution
for the corresponding variable from being propagated in their scope, for instance:
h x, y | x + λ x.(x + y) + h x | x + y i i[x 7→ 2, y 7→ 3] −→ 2 + (λ x.x + 3) + h x | x + 3 i
A standard (static) binder can also affect code to be dynamically rebound, when it binds free variables
in a substitution r, as shown by the following example:
(λ x.λ y.y[x 7→ x] + x) 1 h x | x + 2 i −→ (λ y.y[x 7→ 1] + 1) h x | x + 2 i
−→ h x | x + 2 i[x 7→ 1] + 1 −→ 1 + 2 + 1.
Note that in [x 7→ x] the two occurrences of x refer to different variables. Indeed, the second is bound by
the external lambda whereas the first one is a rebinder.
2
Type system
We have three kinds of types: primitive types τ , value types V, and term types T; see Figure 3.
T :: = τ k | T1 ∧ T2
(k ∈ N) term type
0
value type
V :: = τ | V ∧ T
τ :: = int | code | T → T ′
primitive type
Figure 3: Types
Primitive types characterise the shape of values. In our case we have integers (int), functions (T →
T ′ ), and code, which is the type of a term h Γ | t i, that is, (possibly) open code.
Term types are primitive types decorated with a level k or intersection of types. If a term has type τ k ,
then by applying k rebind operators to the term we get a value of primitive type τ . We abbreviate a type
τ 0 by τ . Terms have the intersection type T1 ∧ T2 when they have both types T1 and T2 . On intersection
Intersection types for unbind and rebind
50
we have the usual congruence due to idempotence, commutativity, associativity, and distributivity over
arrow type, defined in the first four clauses of Figure 4.
Value types characterise terms that reduce to values, so they are intersections in which (at least) one
of the conjuncts must be a primitive type of level 0. For instance, the term h x : int | h y : int | x + y i i
has type code0 ∧ code1 ∧ int2 , since it is code that applying one rebinding produces code that, in turn,
applying another rebinding produces an integer. The term h x : int | x + h y : int | y + 1 i i has type
code0 ∧ int2 since it is code that applying one rebinding produces the term n + h y : int | y + 1 i, for
some n. Both code0 ∧ code1 ∧ int2 and code0 ∧ int2 are value types, whereas int1 , which is the
type of term n + h y : int | y + 1 i, is not a value type. Indeed, in order to produce an integer value the
term must be rebound (at least) once. The typing rule for application enforces the restriction that a term
may be applied only to terms reducing to values, that is the call-by-value strategy. Similar for the terms
associated with variables in a substitution.
V
V
Let I = {1, . . . , m}. We write i∈I τiki and i∈1..m τiki to denote τ1k1 ∧ · · · ∧ τmkm . Note that any type T
V
V
is such that T = i∈1..m τiki , for some τi and ki (i ∈ 1..m). Given a type T = i∈1..m τiki , with (T)⊕h we
V
denote the type i∈1..m τiki +h .
T ≡ T ∧T
T1 ∧ T2 ≡ T2 ∧ T1
(T → T1 )k ∧ (T → T2 )k ≡ (T → T1 ∧ T2 )k
T1 ∧ (T2 ∧ T3 ) ≡ (T1 ∧ T2 ) ∧ T3
(T ′ → (T)⊕h )k+1 ≡ (T ′ → (T)⊕(h+1) )k
Figure 4: Congruence on types
Figure 4 defines congruence on types. In addition to the standard properties of intersection, the
last clause says that the level of function types can be switched with the one of their results. That is,
unbinding and lambda-abstraction commute. So rebinding may be applied to lambda-abstractions, since
reduction rule (R EBINDA BS ) pushes rebinding inside. For instance, the terms h Γ | λ x.t i and λ x.h Γ | t i
may be used interchangeably.
intk ≤ intk+1
T2 ≤ T1
T1′ ≤ T2′
(T1 → T1′ )k ≤ (T2 → T2′ )k
T1 ≤ T2
T2 ≤ T3
T1 ≤ T3
T1 ∧ T2 ≤ T1
T1 ≤ T1′
T2 ≤ T2′
T1 ∧ T2 ≤ T1′ ∧ T2′
T1 ≡ T2
T1 ≤ T2
Figure 5: Subtyping on types
Subtyping, defined in Figure 5, expresses subsumption, that is, if a term has type T1 , then it can be
used also in a context requiring a type T2 with T1 ≤ T2 . For integer types it is justified by the reduction
rule (R EBIND N UM ), since once we obtain an integer value any number of rebindings may be applied.5
For intersections, it is intersection elimination. The other rules are the standard extension of subtyping
5 Note
that the generalisation of intk ≤ intk+1 to T k ≤ T k+1 is sound but useless.
Dezani, Giannini and Zucca
51
to function and intersection types, transitivity, and the fact that congruent types are in the subtyping
relation.
(T-I NTER )
(T-N UM )
(T-A BS )
Γ ⊢ t : T1 Γ ⊢ t : T2
Γ ⊢ t : T1 ∧ T2
Γ ⊢ n : int0
(T-S UM )
Γ, x:T ⊢ t : T ′
Γ ⊢ λ x.t : (T → T ′ )0
(T-U NBIND -0)
(T-R EBIND )
(T-S UB )
Γ ⊢ t : T T ≤ T′
Γ ⊢ t : T′
Γ ⊢ t1 : intk Γ ⊢ t2 : intk
Γ ⊢ t1 + t2 : intk
(T-A PP )
Γ, Γ′ ⊢ t : T
Γ ⊢ h Γ′ | t i : code0
Γ(x) = T
Γ⊢x:T
(T-E RROR )
Γ ⊢ error : T
Γ ⊢ t1 : (V → T)0 Γ ⊢ t2 : V
Γ ⊢ t1 t2 : T
(T-U NBIND )
Γ ⊢ t : (T)⊕1 Γ ⊢ r : ok
Γ ⊢ t[r] : T
(T-VAR )
Γ, Γ′ ⊢ t : T
Γ ⊢ h Γ′ | t i : (T)⊕1
(T-R EBINDING )
Γ ⊢ ti : Vi Vi ≤ Ti (i ∈ 1..m)
Γ ⊢ x1 :T1 7→ t1 , . . . , xm :Tm 7→ tm : ok
Figure 6: Typing rules
Typing rules are defined in Figure 6. We denote by Γ, Γ′ the concatenation of the two type contexts
Γ and Γ′ with disjoint domains, which turns out to be a type context (map) as well.
A number has the value type int0 . With rule (T-S UB ), however, it can be given the type intk for any
k. Rule (T-S UM ) requires that both operands of a sum have the same type, with rule (T-S UB ) the term can be
given as level the biggest level of the operands. Rule (T-E RROR ) permits the use of error in any context.
In rule (T-A BS ) the initial level of a lambda abstraction is 0 since the term is a value. With rule (T-S UB ) we
may decrease the level of the return type by increasing, by the same amount, the level of the whole arrow
type. This is useful since, for example, we can derive
⊢ λ x.x + h y:int | y + h z:int | z i i : (int → int1 )1
by first deriving the type (int → int2 )0 for the term, and then applying (T-S UB ). Therefore, we can give
type to the rebinding of the term, by applying rule (T-R EBINDING ) that requires that the term to be rebound
has level bigger than 0, and whose resulting type is decreased by one. For example,
⊢ (λ x.x + h y:int | y + h z:int | z i i)[y:int 7→ 5] : (int → int1 )0
which means that the term reduces to a lambda abstraction, i.e., to a value, which applied to an integer
needs one rebind in order to produce an integer or error. The rule (T-A PP ) assumes that the type of the
function be a level 0 type. This is not a restriction, since using rule (T-S UB ), if the term has any function
type it is possible to assign it a level 0 type. The type of the argument must be a value type. This
condition is justified by the example given in the introduction.
The two rules for unbinds reflect the fact that code is both a value, and as such has type code0 ,
and also a term that needs one more rebinding than its body in order to produce a value. Taking the
intersection of the types derived for the same unbind with these two rules we can derive a value type for
the unbind and use it as argument of an application. For example typing h y : int | y i by code0 ∧ int1
we can derive type int0 for the term
Intersection types for unbind and rebind
52
(λ x.2 + x[y: int 7→ 3])h y : int | y i.
The present type system only takes into account the number of rebindings which are applied to a
term, whereas no check is performed on the name and the type of the variables to be rebound. This
check is performed at runtime by rules (R EBIND U NBINDY ES ) and (R EBIND U NBIND N O ). In papers introducing the
calculus [12, 13] we have also provided an alternative type system (for the call-by-name calculus) such
that this check is statically perfomed, see the Conclusion for more comments.
Note that terms which are stuck since application of substitution is undefined, such as the previous
example (λ y.h x | y i) (λ z.x), are ill typed. Indeed, in the typing rules for unbinding, unbinders are
required to be disjoint from outer binders, and there is no weakening rule. Hence, a type context for the
example should simultaneously include a type for x and not include a type for x in order to type λ z.x and
λ y.h x | y i, respectively. For the same reason, a peculiarity of the given type system is that weakening
does not hold, in spite of the fact that no notion of linearity is enforced.
3
Soundness of the type system
The type system is safe since types are preserved by reduction and a closed term with value type is
a value or error or can be reduced. In other words the system has both the subject reduction and the
progress properties. Note that a term that may not be assigned a value type can be stuck, as for example
1 + h x:int | x i, which has type int1 .
The proof of subject reduction (Theorem 5) is standard. We start with a lemma (Lemma 1) on the
properties of the equivalence and pre-order relation on types, which can be easily shown by induction on
their definitions. Then we give an Inversion Lemma (Lemma 2), a Substitution Lemma (Lemma 3) and
a Context Lemma (Lemma 4). Lemmas 2 and 3 can be easily shown by induction on type derivations.
The proof of Lemma 4 is by structural induction on contexts.
Lemma 1
1. If
V
i∈I (Ti
V
→ Ti′ )0 ≡ (T → T ′ )0 , then Ti ≡ T for all i ∈ I and
V
′
i∈I Ti
≡ T ′.
2. If i∈I (Ti → Ti′ )0 ≤ T, then there are L, T̂l , T̂l′ , (l ∈ L), such that T ≡
l ∈ L there is Jl ⊆ I with
V
l∈L (T̂l
→ T̂l′ )0 , and for all
• T̂l ≤ T j for all j ∈ Jl , and
V
• j∈Jl T̂ ′j ≤ Tl′ .
Lemma 2 (Inversion Lemma)
1. If Γ ⊢ x : T, then Γ(x) ≤ T.
2. If Γ ⊢ n : T, then int0 ≤ T.
3. If Γ ⊢ t1 + t2 : T, then int0 ≤ T and Γ ⊢ t1 : T and Γ ⊢ t2 : T.
4. If Γ ⊢ λ x.t : T, then there are m, Ti , Ti′ (i ∈ 1..m) such that T ≡
(i ∈ 1..m).
V
i∈1..m (Ti
→ Ti′ )0 , and Γ, x:Ti ⊢ t : Ti′
5. If Γ ⊢ t1 t2 : T, then there is V such that Γ ⊢ t1 : (V → T)0 and Γ ⊢ t2 : V.
V
ki
i∈1..m τi , then
: τiki −1 for all ki >
6. If Γ ⊢ h Γ′ | t i :
• Γ, Γ′ ⊢ t
• τi = code for all ki = 0.
0, and
Dezani, Giannini and Zucca
53
When m = 1 and k1 = 0 we also have Γ, Γ′ ⊢ t : T ′ , for some T ′ .
7. If Γ ⊢ t[r] :
V
ki
i∈1..m τi ,
then Γ ⊢ t :
V
ki +1
i∈1..m τi
and Γ ⊢ r : ok.
8. If Γ ⊢ x1 :T1 7→ t1 , . . . , xm :Tm 7→ tm : ok, then there are Vi ≤ Ti for i ∈ 1..m such that Γ ⊢ ti : Vi .
Proof By induction on typing derivations. We only consider some interesting cases.
For Point (4), if the last applied rule is (T-S UB ), then the result follows by induction from Lemma 1(2).
For the same Point if the last applied rule is (T-I NTER ), then let Γ ⊢ λ x.t : T ∧ T ′ . By induction hypothesis
there are m, m′ , Ti , T ′j , T̂i , T̂ ′j (i ∈ 1..m, j ∈ 1..m′ ) such that:
• T≡
V
i∈1..m (Ti
→ T̂i )0 ,
• Γ, x:Ti ⊢ t : T̂i (i ∈ 1..m),
• T′ ≡
V
′
j∈1..m′ (T j
→ T̂ ′j )0 , and
• Γ, x:T ′j ⊢ t : T̂ ′j ( j ∈ 1..m′ ).
V
V
Therefore T ∧ T ′ ≡ i∈1..m (Ti → T̂i )0 ∧ j∈1..m′ (T ′j → T̂ ′j )0 .
For Point (5) if the last applied rule is (T-I NTER ), then let Γ ⊢ t1 t2 : T1 ∧ T2 . By induction hypothesis
we have Γ ⊢ t1 : Vi → Ti and Γ ⊢ t2 : Vi , for some Vi , i = 1, 2. We derive Γ ⊢ t1 : (V1 → T1 ) ∧ (V2 → T2 )
and Γ ⊢ t2 : V1 ∧ V2 by rule (T-I NTER ). Since (V1 → T1 ) ∧ (V2 → T2 ) ≤ V1 ∧ V2 → T1 ∧ T2 , applying rule
(T-S UB ) we get Γ ⊢ t1 : V1 ∧ V2 → T1 ∧ T2 .
Lemma 3 (Substitution Lemma) If Γ, x:T ⊢ t : T ′ , and Γ ⊢ v : T, then Γ ⊢ t{x 7→ v} : T ′ .
Lemma 4 (Context Lemma) Let Γ ⊢ E [t] : T, then
• Γ ⊢ t : T ′ for some T ′ , and
• if Γ ⊢ t′ : T ′ , then Γ ⊢ E [t′ ] : T, for all t′ .
Theorem 5 (Subject Reduction) If Γ ⊢ t : T and t −→ t′ , then Γ ⊢ t′ : T.
Proof By induction on reduction derivations. We only consider some interesting cases.
If the applied rule is (A PP ), then
(λ x.t) v −→ t{x 7→ v}
From Γ ⊢ (λ x.t) v : T by Lemma 2, case (5) we have that: there is V such that Γ ⊢ λ x.t : (V → T)0
and Γ ⊢ v : V. By Lemma 2, case (4) we have that there are m, Ti , Ti′ (i ∈ 1..m) such that (V → T)0 ≡
V
(T → Ti′ )0 , and Γ, x:Ti ⊢ t : Ti′ (i ∈ 1..m). From Lemma 1(1) we get Ti ≡ V for all i ∈ 1..m and
Vi∈1..m ′i
i∈1..m Ti ≡ T. Then we can derive Γ, x:V ⊢ t : T using rules (T-S UB ) and (T-I NTER ). By Lemma 3 we conclude that Γ ⊢ t{x 7→ v} : T.
If the applied rule is (R EBIND U NBINDY ES ), then
h Γ′ | t i[rv ] −→ t{subst(rv )|dom(Γ′ ) }
Γ′ ⊆ tenv(rv )
v
′
v
′
Let r|dom(Γ
′ ) = x1 :T1 7→ v1 , . . . , xm :Tm 7→ vm . Since Γ ⊆ tenv(r ) we have that Γ = x1 :T1 , . . . , xm :Tm .
V
V
From Γ ⊢ h Γ′ | t i[rv ] : T by Lemma 2, case (7), we get T = i∈1..n τiki and Γ ⊢ h Γ′ | t i : i∈1..n τiki +1 and
V
Γ ⊢ rv : ok. From Lemma 2, case (6), we have that Γ, Γ′ ⊢ t : i∈1..n τiki . Moreover, by Lemma 2, case (8),
and rule (T-S UB ) we have that Γ ⊢ rv : ok implies that Γ ⊢ vi : Ti for i ∈ 1..m. Applying m times Lemma 3,
we derive Γ ⊢ t{subst(rv )|dom(Γ′ ) } : T.
Intersection types for unbind and rebind
54
In order to show the Progress Theorem (Theorem 9), we start as usual with a Canonical Forms
Lemma (Lemma 6). Then we state the standard relation between type contexts and free variables (Lemma
7), and lastly we prove that all closed terms which are rebound terms always reduce (Lemma 8).
Lemma 6 (Canonical Forms)
1. If ⊢ v : int0 , then v = n.
2. If ⊢ v : code0 , then v = h Γ | t i.
3. If ⊢ v : (T → T ′ )0 , then v = λ x.t.
Proof By case analysis on the shape of values.
Lemma 7 If Γ ⊢ t : T, then FV(t) ⊆ dom(Γ).
Proof By induction on type derivations.
Lemma 8 If t = t′ [rv ] for some t′ and rv , and FV(t) = 0,
/ then t −→ t′′ for some t′′ .
Proof Let t = t′ [r1v ] · · · [rnv ] for some t′ , r1v , . . . , rnv (n ≥ 1), where t′ is not a rebind. The proof is by
mathematical induction on n.
If n = 1, then one of the reduction rules is applicable to t′ [r1v ]. Note that, if t′ = h Γ | t1 i, then rule
(R EBIND U NBINDY ES ) is applicable in case Γ is a subset of the type environment associated with r1v , otherwise
rule (R EBIND U NBIND N O ) is applicable.
v ]. If FV(t′ [rv ] · · · [rv ]) = 0,
Let t = t′ [r1v ] · · · [rn+1
/ then also FV(t′ [r1v ] · · · [rnv ]) = 0.
/ By induction hypothesis
1
n+1
′
v
v
′′
′
v
v
′′
v
t [r1 ] · · · [rn ] −→ t , therefore t [r1 ] · · · [rn+1 ] −→ t [rn+1 ] with rule (R EBIND R EBIND ).
Theorem 9 (Progress) If ⊢ t : V, then either t is a value, or t = error, or t −→ t′ for some t′ .
Proof By induction on the derivation of ⊢ t : V with case analysis on the last typing rule used.
If t is not a value or error, then the last applied rule in the type derivation cannot be (T-N UM ), (T-E RROR ),
or (T-U NBIND ). Moreover the typing environment for the expression is empty, hence
by Lemma 7 the last applied rule cannot be (T-VAR ).
(T-A BS ), (T-U NBIND -0),
If the last applied rule is
theorem holds by induction.
(T-S UB ),
note that T ≤ V implies that T is a value type, and therefore the
If the last applied rule is (T-A PP ), then t = t1 t2 , and taking into account that the resulting type must be
a value type:
⊢ t1 : V ′ → V ⊢ t2 : V ′
⊢ t1 t2 : V
If t1 is not a value or error, then, by induction hypothesis, t1 −→ t1′ . So t1 t2 = E [t1 ] with E = [ ] t2 , and by
rule (C TX ), t1 t2 −→ t1′ t2 . If t1 is error, we can apply rule (C ONT E RROR ) with the same context. It t1 is a value
v, and t2 is not a value or error, then, by induction hypothesis, t2 −→ t2′ . So t1 t2 = E [t2 ] with E = v [ ],
and by rule (C TX ), v t2 −→ v t2′ . If t2 is error, we can apply rule (C ONT E RROR ) with the same context. If both
t1 and t2 are values, then by Lemma 6, case (3), t1 = λ x.t′ and, therefore, we can apply rule (A PP ).
If the last applied rule is (T-S UM ), then t = t1 + t2 and taking into account that the resulting type must
be a value type:
⊢ t1 : int0 ⊢ t2 : int0
⊢ t1 + t2 : int0
Dezani, Giannini and Zucca
55
If t1 is not a value or error, then, by induction hypothesis, t1 −→ t1′ . So by rule (C TX ), with context
E = [ ] + t2 , we have t1 + t2 −→ t1′ + t2 . If t1 is error, we can apply rule (C ONT E RROR ) with the same context.
If t1 is a value, then, by Lemma 6, case (1), t1 = n1 . Now, if t2 is not a value or error, then, by induction
hypothesis, t2 −→ t2′ . So by rule (C TX ), with context E = n1 + [ ], we get t1 + t2 −→ t1 + t2′ . If t2 is error,
we can apply rule (C ONT E RROR ) with the same context. Finally, if t2 is a value, then by Lemma 6, case (1),
t2 = n2 . Therefore rule (S UM ) is applicable.
If the last applied rule is (T-R EBIND ), then t = t′ [r]. If some term ti in r is not a value, then by Lemma
2(7) and (8) ti is typed with a value type, and therefore ti −→ ti′ by induction, so t reduces using rule
(C TX ). Otherwise t = t′ [rv ]. Since ⊢ t′ [rv ] : V, we have that FV(t′ [rv ]) = 0
/ by Lemma 7. From Lemma 8
we get that t′ [rv ] −→ t′′ for some t′′ .
4
Conclusion
We have defined a type system with intersection types for an extension of lambda-calculus with unbind
and rebind operators introduced in previous work [12, 13]. Besides the traditional use of intersection
types for typing (finitely) polymorphic functions, this type system shows two novel applications:
• An intersection type expresses that a term can be used in contexts which provide a different number
of unbinds.
• In particular, an unbound term can be used both as a value of type code and in a context providing
an unbind.
This type system could be used for call-by-name with minor modifications. However, the call-byvalue case is more significant since the condition that the argument of an application must reduce to a
value can be nicely expressed by the notion of value type.
Moreover, only the number of rebindings which are applied to a term is taken into account, whereas
no check is performed on the name and the type of the variables to be rebound; this check is performed
at runtime. This solution is convenient, e.g., in distributed scenarios where code is not all available at
compile time, or in combination with delegation mechanisms where, in case of dynamic error due to an
absent/wrong binding, an alternative action is taken. In papers introducing the calculus [12, 13] we have
also provided an alternative type system (for the call-by-name calculus) which ensures a stronger form
of safety, that is, that rebinding always succeeds. The key idea is to decorate types with the names of the
variables which need to be rebound, as done also by Nanevski and Pfenning [17]. In this way run-time
errors arising from absence (or mismatch) in rebind are prevented by a purely static type system, at the
price of quite sophisticated types. A similar system could be developed for the present calculus. Also the
type system of Dezani et al. [12, 13] could be enriched with intersection types to get the stronger safety
for the call-by-value calculus.
Intersection types have been originally introduced [6] as a language for describing and capturing
properties of λ -terms, which had escaped all previous typing disciplines. For instance, they were used
in order to give the first type theoretic characterisation of strongly normalising terms [20], and later in
order to capture (persistently) normalising terms [8].
Very early it was realised that intersection types had also a distinctive semantical flavour. Namely,
they expressed at a syntactical level the fact that a term belonged to suitable compact open sets in a
Scott domain [4]. Since then, intersection types have been used as a powerful tool both for the analysis
and the synthesis of λ -models. On the one hand, intersection type disciplines provide finitary inductive
56
Intersection types for unbind and rebind
definitions of interpretation of λ -terms in models [7], and they are suggestive for the shape the domain
model has to have in order to exhibit specific properties [10].
More recently, systems with both intersection and union types have been proposed for various aims
[3, 14], but we do not see any gain in adding union types in the present setting.
Ever since the accidental discovery of dynamic scoping in McCarthy’s Lisp 1.0, there has been
extensive work in explaining and integrating mechanisms for dynamic and static binding. The classical
reference for dynamic scoping is Moreau’s paper [16], which introduces a λ -calculus with two distinct
kinds of variables: static and dynamic. The semantics can be (equivalently) given either by translation
in the standard λ -calculus or directly. In the translation semantics, λ -abstractions have an additional
parameter corresponding to the application-time context. In the direct semantics, roughly, an application
(λ x.t) v, where x is a dynamic variable, reduces to a dynamic let dlet x = v in t. In this construct, free
occurrences of x in t are not immediately replaced by v, as in the standard static let, but rather reduction
of t is started. When, during this reduction, an occurrence of x is found in redex position, it is replaced
by the value of x in the innermost enclosing dlet, so that dynamic scoping is obtained.
In our calculus, the behaviour of the dynamic let is obtained by the unbind and rebind constructs.
However, there are at least two important differences. Firstly, the unbind construct allows the programmer to explicitly control the program portions where a variable should be dynamically bound. In particular, occurrences of the same variable can be bound either statically or dynamically, whereas Moreau [16]
assumes two distinct sets. Secondly, our rebind behaves in a hierarchical way, whereas, taking Moreau’s
approach [16] where the innermost binding is selected, a new rebind for the same variable would rewrite
the previous one, as also in work by Dezani et al. [11]. For instance, h x | x i[x 7→ 1][x 7→ 2] would reduce
to 2 rather than to 1. The advantage of our semantics, at the price of a more complicated type system, is
again more control. In other words, when the programmers want to use “open code”, they must explicitly specify the desired binding, whereas in Moreau’s paper [16] code containing dynamic variables is
automatically rebound with the binding which accidentally exists when it is used. This semantics, when
desired, can be recovered in our calculi by using rebinds of the shape t[x1 7→ x1 , . . . , xn 7→ xn ], where
x1 , . . . , xn are all the dynamic variables which occur in t.
Other calculi for dynamic binding and/or rebinding have been proposed [9, 15, 5]. We refer to our
previous papers introducing the calculus [12, 13] for a discussion and comparison.
As already mentioned, an interesting feature of our calculus is that elements of the same set can
play the double role of standard variables, which can be α -renamed, and names, which cannot be α renamed (if not globally in a program) [2, 17]. The crucial difference is that in the case of standard
variables the matching betweeen parameter and argument is done on a positional basis, as demonstrated
by the de Bruijn notation, whereas in the case of names it is done on a nominal basis. An analogous
difference holds between tuples and records, and between positional and name-based parameter passing
in languages, as recently discussed by Rytz and Odersky [21].
Distributed process calculi provide rebinding of names, see for instance the work of Sewell [22].
Moreover, rebinding for distributed calculi has been studied [1], where, however, the problem of integrating rebinding with standard computation is not addressed, so there is no interaction between static
and dynamic binding.
Finally, an important source of inspiration has been multi-stage programming as, e.g., in MetaML
[23], notably for the idea of allowing (open) code as a special value, the hierarchical nature of the
unbind/rebind mechanism and, correspondingly, of the type system. The type system of Taha and Sheard
[23] is more expressive than the present one, since both the turn-style and the types are decorated with
integers. A deeper comparison will be subject of further work.
Dezani, Giannini and Zucca
57
In order to model different behaviours according to the presence (and type concordance) of variables
in the rebinding environment, we plan to add a construct for conditional execution of rebind [11]. With
this construct we could model a variety of object models, paradigms and language features.
Future investigation will also deal with the general form of binding discussed by Tanter [24], which
subsumes both static and dynamic binding and also allows fine-grained bindings which can depend on
contexts and environments.
Acknowledgments. We warmly thank the anonymous referees for their useful comments. In particular, one referee warned us about the problem of avoiding variable capture when applying substitution
to an unbound term. We also thank Davide Ancona for pointing out the work by Rytz and Odersky [21]
and the analogy among the pairs variable/name, tuple/record, positional/nominal, any misinterpretation
is, of course, our responsibility.
References
[1] Davide Ancona, Sonia Fagorzi & Elena Zucca (2008): A Parametric Calculus for Mobile Open Code. In:
DCM’07. ENTCS 192(3), Elsevier, pp. 3–22, doi:10.1016/j.entcs.2008.10.024.
[2] Davide Ancona & Eugenio Moggi (2004): A Fresh Calculus for Name Management. In: GPCE’04. LNCS
3286, Springer, pp. 206–224, doi:10.1007/978-3-540-30175-2 11.
[3] Franco Barbanera, Mariangiola Dezani-Ciancaglini & Ugo de’ Liguoro (1995): Intersection and Union
Types: Syntax and Semantics. Information and Computation 119, pp. 202–230, doi:10.1006/inco.1995.1086.
[4] Henk P. Barendregt, Mario Coppo & Maraingiola Dezani-Ciancaglini (1983): A filter lambda model and the
completeness of type assignment. The Journal of Symbolic Logic 48(4), pp. 931–940, doi:10.2307/2273659.
[5] Gavin Bierman, Michael W. Hicks, Peter Sewell, Gareth Stoyle & Keith Wansbrough (2003): Dynamic
Rebinding for Marshalling and Update, with Destruct-Time λ . In: ICFP’03. ACM Press, pp. 99–110,
doi:10.1145/944705.944715.
[6] Mario Coppo & Mariangiola Dezani-Ciancaglini (1980): An extension of the basic functionality theory for
the λ -calculus. Notre Dame Journal of Formal Logic 21(4), pp. 685–693, doi:10.1305/ndjfl/1093883253.
[7] Mario Coppo, Mariangiola Dezani-Ciancaglini, Furio Honsell & Giuseppe Longo (1984): Extended
type structures and filter lambda models. In: Logic colloquium ’82. North-Holland, pp. 241–262,
doi:10.1016/S0049-237X(08)71819-6.
[8] Mario Coppo, Mariangiola Dezani-Ciancaglini & Maddalena Zacchi (1987):
Type theories,
Information and Computation 72(2), pp. 85–116,
normal forms, and D∞ -lambda-models.
doi:10.1016/0890-5401(87)90042-3.
[9] Laurent Dami (1997): A Lambda-Calculus for Dynamic Binding. Theoretical Computer Science 192(2), pp.
201–231, doi:10.1016/S0304-3975(97)00150-3.
[10] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan & Silvia Likavec (2004): Behavioural Inverse Limit
lambda-models. Theoretical Computer Science 316(1–3), pp. 49–74, doi:10.1016/j.tcs.2004.01.023.
[11] Mariangiola Dezani-Ciancaglini, Paola Giannini & Oscar Nierstrasz (2008): A Calculus of Evolving Objects.
Scientific Annals of Computer Science 18, pp. 63–98.
[12] Mariangiola Dezani-Ciancaglini, Paola Giannini & Elena Zucca (2009): The essence of static and dynamic
bindings. In: ICTCS’09.
http://www.disi.unige.it/person/ZuccaE/Research/papers/ICTCS09-DGZ.pdf.
[13] Mariangiola Dezani-Ciancaglini, Paola Giannini & Elena Zucca (2010):
Extending lambdacalculus with unbind and rebind. RAIRO - Theoretical Informatics and Applications To appear.
http://www.disi.unige.it/person/ZuccaE/Research/papers/ITA10.pdf.
58
Intersection types for unbind and rebind
[14] Alain Frisch, Giuseppe Castagna & Veronique Benzaken (2008): Semantic Subtyping: dealing settheoretically with function, union, intersection, and negation types. Journal of the ACM 55(4), pp. 1–64,
doi:10.1145/1391289.1391293. Extends and supersedes LICS’02 and ICALP/PPDP’05 articles.
[15] Oleg Kiselyov, Chung-chieh Shan & Amr Sabry (2006): Delimited dynamic binding. In: ICFP’06. ACM
Press, pp. 26–37, doi:10.1145/1159803.1159808.
[16] Luc Moreau (1998): A Syntactic Theory of Dynamic Binding. Higher Order and Symbolic Computation
11(3), pp. 233–279, doi:10.1023/A:1010087314987.
[17] Aleksandar Nanevski & Frank Pfenning (2005): Staged computation with names and necessity. Journal of
Functional Programming 15(5), pp. 893–939, doi:10.1017/S095679680500568X.
[18] Benjamin C. Pierce (2002): Types and Programming Languages. MIT Press.
[19] Gordon Plotkin (1977): LCF considered as a programming language. Theoretical Computer Science 5, pp.
225–255, doi:10.1016/0304-3975(77)90044-5.
[20] Garrel Pottinger (1980): A type assignment for the strongly normalizable λ -terms. In: To H. B. Curry: essays
on combinatory logic, lambda calculus and formalism. Academic Press, pp. 561–577.
[21] Lukas Rytz & Martin Odersky (2010): Named and default arguments for polymorphic object-oriented languages. In: OOPS’10. ACM Press, pp. 2090–2095, doi:10.1145/1774088.1774529.
[22] Peter Sewell, James J. Leifer, Keith Wansbrough, Mair Allen-Williams, Francesco Zappa Nardelli, Pierre
Habouzit & Viktor Vafeiadis (2007): Acute: High-level programming language design for distributed computation: Design rationale and language definition. Journal of Functional Programming 17(4-5), pp. 547–612,
doi:10.1017/S0956796807006442.
[23] Walid Taha & Tim Sheard (2000): MetaML and multi-stage programming with explicit annotations. Theoretical Computer Science 248(1-2), pp. 211–242, doi:10.1016/S0304-3975(00)00053-0.
[24] Èric Tanter (2009): Beyond Static and Dynamic Scope. In: Dynamic Languages Symposium’09. ACM Press,
pp. 3–14, doi:10.1145/1640134.1640137.
[25] Betti Venneri (1994): Intersection Types as Logical Formulae. Journal of Logic and Computation 4(2), pp.
109–124, doi:10.1093/logcom/4.2.109.
| 6cs.PL
|
arXiv:1711.08278v1 [cs.CV] 22 Nov 2017
Neuron-level Selective Context Aggregation for Scene Segmentation
Zhenhua Wang*
Hebrew University of Jerusalem
Fanglin Gu*
Shandong University
[email protected]
[email protected]
Dani Lischinski
Hebrew University of Jerusalem
Daniel Cohen-Or
Tel Aviv University
Changhe Tu
Shandong University
[email protected]
[email protected]
[email protected]
Baoquan Chen
Shandong University
[email protected]
formed through the use of deep neural networks. Long et
al. [13] proposed a fully convolutional network which can
be trained end-to-end to predict a dense labeling map, capable of extracting coarse object shapes. This approach was
extended by Noh et al. [15] by introducing multiple deconvolutional layers to gradually capture the finer details. In
these pure CNN-based methods, the representations of neurons in the convolutional feature maps are extracted from
limited receptive fields, capturing only local information.
Abstract
Contextual information provides important cues for disambiguating visually similar pixels in scene segmentation.
In this paper, we introduce a neuron-level Selective Context
Aggregation (SCA) module for scene segmentation, comprised of a contextual dependency predictor and a context
aggregation operator. The dependency predictor is implicitly trained to infer contextual dependencies between different image regions. The context aggregation operator augments local representations with global context, which is
aggregated selectively at each neuron according to its onthe-fly predicted dependencies. The proposed mechanism
enables data-driven inference of contextual dependencies,
and facilitates context-aware feature learning. The proposed method improves strong baselines built upon VGG16
on challenging scene segmentation datasets, which demonstrates its effectiveness in modeling context information.
To address this problem, Liu et al. [12] propose to use
the average feature of a layer as global context to augment the local features at each neuron. Yu and Koltun [28]
introduce dilated convolutions to systematically aggregate
multi-scale contextual information without losing resolution. Zhao et al. [30] exploit global context information by
different region-based context aggregation through pyramid
pooling. Although these methods improve the segmentation
accuracy, they aggregate context in a predefined manner,
which does not depend on the input image. Thus, they lack
internal mechanisms for handling non-uniform dependencies among different image regions.
1. Introduction
In another line of research, Shuai et al. [24] proposed
Directed Acyclic Graph Recurrent Neural Networks (DAGRNNs) to leverage contextual information, thereby enhancing the representation ability of convolutional features.
Their approach has demonstrated significant advances over
the state-of-the-art on three challenging datasets. However,
due to the gradient vanishing problem of RNNs [1, 16], the
contextual information can only be propagated to nearby
neurons, thus the long-range dependencies cannot be well
captured. In fact, Shuai et al. [23] report that using DAGRNNs induced from 8-connected grids, significantly outperforms the 4-connected case. Moreover, due to the usage of
Scene segmentation is a long standing fundamental problem in computer vision, which aims to associate a semantic object category label with each pixel in an image of
a scene. It has long been recognized that taking into account the semantic context between image regions can significantly improve the performance of scene segmentation
algorithms [8, 14, 21, 26].
As is the case in many other areas of computer vision,
the state-of-the-art in scene segmentation has been trans* equal contribution
1
Contextual Dependency
Predictor
Convolutions
#
Context Aggregation
Operator
!
"
Deconvolutions
Neuron-level Selective Context Aggregation
Input
Predicted Labels
Figure 1. An overview of the proposed scene segmentation network architecture.
RNNs, the hidden vectors of DAG-RNNs must be sequentially updated, making it less efficient than pure CNN-based
methods.
In this work, we propose a new approach for selectively
aggregating contextual information at each neuron, and doing so in an input-dependent manner, by introducing a novel
context aggregation module. This module takes as input the
feature map of a convolutional layer, and outputs a contextaware feature map. Specifically, this module consists of
two main components: a contextual dependency predictor
and a context aggregation operator. The dependency predictor is an auxiliary network that infers a coefficient representing the degree of dependency between each pair of neurons. Note that these coefficients are input-dependent. The
context aggregator densely connects each output neuron to
all the input neurons according to its predicted coefficients,
yielding feature maps with enhanced context representation
ability. These feature maps are then fed to a deconvolutional network to predict a semantic label map (see Fig. 1).
We refer to the proposed module as a neuron-level Selective
Aggregation (SCA) module, since each of its output neurons uses a different set of weights to aggregate contextual
features from the input neurons.
In summary, our work makes three main contributions:
• We present a novel context aggregation module which
selectively injects global context information into local
representations, based on image-specific dependencies
among neurons in the deep convolutional feature map.
• We introduce a contextual dependency predictor that
learns to infer image-specific dependencies between
neurons. The resulting dependency coefficients allow
each neuron to selectively aggregate context information from the entire image.
• We apply the proposed network on the scene segmentation task, and demonstrate its effectiveness and potential on two large datasets.
The rest of the paper is organized as follows: Sec. 2 discusses some work related to our method, Sec. 3 introduces
the two components of the proposed new module, Sec. 4
gives the implementation details, and, finally, Sec. 5 reports
the results of our experiments.
2. Related Works
The semantic segmentation problem has been addressed
by a wide variety of methods in recent years. Since visually similar pixels are locally indistinguishable, a major
question that arises is how to leverage contextual information for disambiguation. Many methods rely on Probabilistic Graphical Models (PGMs), e.g. Markov Random Fields
(MRFs) and Conditional Random Fields (CRFs), to account
for context [21, 8, 27, 29, 18]. These methods usually require a pre-segmentation, such as superpixels, from which
to extract features, and they are usually inefficient for inference due to the iterative solving of local beliefs.
Due to the recent advances in deep neural networks,
the mainstream methods of semantic segmentation usually
adopt Convolutional Neural Networks (CNNs) as their basic
component. Farabet et al. [6] feed their CNN with a multiscale pyramid of images, covering a large context. Pinheiro et al. [17] encode long range pixel label dependencies
by using a recurrent CNN architecture. Sharma et al. [19]
use a recursive neural network to recursively aggregate contextual information from local neighborhoods to the entire
image and then propagate the global context back to individual local features. Shuai et al. [22] use a non-parametric
model to represent global context, and transfer such information to local features extracted by CNN. Long et al. [13]
propose a fully convolutional network to directly predict label map from the input image. Noh et al. [15] extend [13]
by introducing multi-layer deconvolution networks.
Liu et al. [12] propose to use the average feature of a
layer as global context to augment the features at each neuron. Yu and Koltun [28] introduce dilated convolutions to
systematically aggregate multi-scale contextual information
without losing resolution. Zhao et al. [30] exploit global
context information by different region-based context aggregation through pyramid pooling. Shuai et al. [24] utilize
DAG-RNNs to embed context into local features. Different from all these methods, which use an input-independent
and fixed manner to aggregate context, our method introduces a dynamic mechanism which aggregates context selectively at each neuron, and does so in an input-dependent
manner. Our approach of using an auxiliary network to
achieve input-dependent processing is similar in spirit to
spatial transformer networks [7] and deformable convolution networks [5]
3. Our Approach
Contextual information has been widely used in computer vision applications [8, 14, 21, 26]. In general, context
can refer to any global information that has a facilitative
effect on representation ability. Note, however, that a local
representation may be influenced differently by different semantic categories of pixels in its context. For example, the
presence of ‘sea’ pixels in an image is a more important
clue for classifying nearby sand-colored pixels as ‘beach’,
compared to ‘mountain’ pixels, since ‘sea’ and ‘beach’ have
higher co-occurrence correlation. However, previous methods [12, 28, 30] usually embed global context into a local
representation in a fixed and uniform way, thereby lacking
internal mechanisms to effectively account for non-uniform
dependencies among different image regions.
To enhance the ability of handling non-uniform contextual information, we propose an input-dependent way to selectively incorporate context into the local representation.
Fig. 1 shows an overview of our proposed segmentation network architecture. Given an input image I, the convolution
layers gradually extract its abstract features, yielding a highlevel feature map X. Next, a neuron-level Selective Context
Aggregation (SCA) module is applied onto X to augment
it with context information. The SCA module consists of
two components. The first component is the contextual dependency predictor network, which takes X as input, and
through several hidden layers predicts a matrix A, which
consists of the dependency coefficients between all pairs of
neurons in X. A dependency coefficient aij attempts to predict the extent to which neuron xj should be accounted for
in the context of neuron xi . Next, the context aggregation
operator uses the predicted dependency matrix A to transform the input feature map X into a context-aware feature
map H. Finally, several deconvolutional layers are applied
on H to predict the final semantic segmentation label map.
3.1. Context Aggregation Operator
Generally, a context aggregation operator aims to encode
global contextual information into a local neuron representation. It takes as input a feature map X, and produces a
context-aware feature map H with the same spatial dimensions (but possibly with a different number of channels). To
fully exploit the context, the receptive field of this operator
should cover the full size image. A naive approach is to
use a fully-connected layer in which each output neuron is
connected to all the input neurons. To be more specific, let
xi ∈ RN and hi ∈ RM denote the feature vectors of the i-th
neuron in X and H, respectively. Using a fully-connected
Figure 2. An illustration of the proposed context aggregation operator on a 1D feature map.
layer each neuron in H is given by:
hi =
n
X
Wij xj
(1)
j=1
where n is the number of input neurons in X, and Wij ∈
RM ×N is the weight matrix.
As can be seen, Wij is particular to the i-th input neuron and the j-th output neuron. Thus, the learned weights
are location sensitive, which is undesirable for dense label
prediction, as the same category of pixels can appear anywhere in the image. Furthermore, after training, Wij is
fixed during test time, and thus the context aggregation is
input-independent. Finally, the fully-connected layer consumes a huge amount of learnable parameters, making it
easy to overfit the training data.
To address all these problems, we introduce a new aggregation operator. Our operator first uses two 1 × 1 convolutions to extract two different features, the identity feature
and the context feature, for each neuron. The intuition is
that the feature used to describe the neuron itself and the
feature that describes its contribution to the context of other
neurons may be different. Then, the output feature of a neuron is produced by linearly combining its own identity feature with the context features of all the other neurons, according to some input-dependent coefficients. Formally, the
computation of the output neuron hi is defined as:
hi = aii Wd xi + Pn
n
X
1
j=1,j6=i
aij
aij Wc xj
(2)
j=1,j6=i
where aij is a coefficient which controls the amount of information taken from xj to hi , Wd ∈ RM ×N and Wc ∈
RM ×N are the weight matrices for extracting the identity
and context features, respectively. In practice, we always
set aii to 1 so that the output neuron takes all of its identity feature. Fig. 2 illustrates the computation procedure of
the proposed operator for a single output neuron on a 1D
feature map.
Notably, this new operator has several appealing properties. First of all, the matrices Wd , Wc are shared across
neurons, reducing the parameter space from n2 N M (for a
fully-connected layer) to 2N M . Secondly, the operation
preserves spatial information, thus it is suitable to be applied on dense prediction tasks. Thirdly, the coefficients aij
are not fixed parameters, and are capable of representing
arbitrary dependencies between different pairs of neurons.
These dependencies may be manually defined, according
to some prior knowledge, or automatically inferred for the
specific input X. Here we adopt a data-driven paradigm,
and introduce an auxiliary contextual dependency predictor
(Sec. 3.2) that learns to infer the dependencies among neurons and provide on-the-fly input-dependent predictions for
the proposed context aggregation operator.
To allow backpropagation through the proposed operator, we must define the gradients of the loss L with respect
to both the input feature map neurons xi and the coefficients
aij . These gradients are given by
n
a
∂L
∂L X
∂L
Pn ki
WcT
= aii WdT
+
, ∀i ∈ [1, n]
∂xi
∂hi
∂h
a
k
kj
j6=k
k6=i
(3)
and
Pn
aik (Wc xj − Wc xk )
Pn
, ∀j 6= i
( k6=i aik )2
(4)
L
where ∂h
denotes
the
loss
gradients
with
respect
to
h
i rei
ceived from top layer,
denotes the element-wise multiplication, and the outermost sum in (4) is over the feature
channel.
X ∂L
∂L
=
∂aij
∂hi
k6=i
minimize the final segmentation loss. The CDP should take
a feature map X with n neurons as input, and output an
n × n matrix A, in which each element aij represents the
dependency coefficient between neuron xi and xj , for the
context aggregation operator.
To achieve this goal, we propose a new network architecture described below; also see Figure 3. Firstly, several
1 × 1 convolutional layers are applied on X to map the representation of each neuron into a higher-level feature space.
Intuitively, the purpose of this mapping is to prevent the network from simply computing linear correlations between
the neurons; instead, the network is able to explore higherlevel semantic relationships that may prove useful for the
final semantic segmentation.
In order to efficiently predict dependencies for all neuron pairs, we use a simple trick to construct a large feature
map in which each location stores a concatenation of the
mapped features of a particular neuron pair. Concretely, we
reshape the 2D feature map to a 1D feature vector, expand
it to two 2D square feature maps using horizontal and vertical replication, respectively, and then concatenate these two
replicated feature maps through the depth channel. Using
the resulting large feature map, we simply apply one more
1×1 convolutional layer to produce the dependency matrix.
According to Eq. (4), the CDP can receive gradients from
upper layers which enable it to be jointly trained with the
main network without using extra supervision. It learns how
to selectively incorporate context information, by producing appropriated dependency coefficients for different pairs
of neurons, to help minimize the overall segmentation cost
during training.
3.2. Contextual Dependency Predictor
4. Implementation Details
The contextual dependency predictor (CDP) aims to estimate the dependencies between neurons of the input features. More precisely, given a pair of neurons (xi , xj ),
the goal is to predict the weight that the context feature
extracted from xj should be given when aggregating the
context of neuron xi . Since each pair may be assigned a
different weight, the global context information is encoded
selectively into each neuron’s local representation.
The dependency function between neurons may be modeled by a neural network. Typically, Siamese networks,
which are popular for tasks that involve finding inherent relationships between two inputs, can be used to learn such a
function. Training Siamese networks requires paired inputs
and their corresponding ground truths. However, our input
feature map is not organized as neuron pairs, and, more importantly, we do not have well-defined ground truth for the
dependencies among such pairs.
Our approach is thus to learn the dependency function
implicitly, by training the CDP jointly with the context aggregation operator (as well as the rest of the network) to
4.1. Network Architecture
The convolution layers of our network are adopted from
the ImageNet pre-trained VGG16 network, i.e., all the layers before the 5-th pooling layer. Following [28], we remove the last two pooling and striding layers, and replace
all subsequent convolutions with dilated convolutions of appropriate factors to make the last convolution layer produce
a feature map that is 4 times larger.
For the proposed SCA module, the dimensions of Wc
and Wd in the context aggregation operator are both set to
be 512 × 512. The contextual dependency predictor uses
three 1 × 1 × 128 convolution layers to extract features,
and uses a 1 × 1 × 1 convolution layer on the concatenated
features to predict dependent coefficients.
The deconvolution module is similar to that of a
FCN [13]. Concretely, we convert the first fully-connected
layer of VGG16 to a 7 × 7 × 4096 convolution layer, and
convert the second one to a 1 × 1 × 4096 convolution layer.
Then, a 1 × 1 × #classes convolution is applied to predict
Figure 3. The architecture of the contextual dependency predictor. V-Replicate denotes a layer which vertically replicates the input 1D
feature map to a 2D square feature map, and H-Replicate denotes the horizontally replicated one.
scores for all classes in the dataset at each location. Finally,
a bilinear upsampling layer is applied to resize the coarse
score map to have the same resolution as the input.
4.2. Loss Re-weighting
The class distributions in scene labeling datasets are usually highly unbalanced, thus, it is common to increase the
weights of rare classes during training to improve their
accuracies [6, 23]. In our work, we simply adopt the
re-weighting strategy proposed in [23]. Specifically, the
weight for class ci is defined as wi = 2dlog10 (η/fi )e where
fi is the frequency of ci and η is a dataset dependent scalar
defined by the 85%/15% rule on frequent/rare classes.
4.3. Training and Testing
For training, since every component of the proposed segmentation network is differentiable, errors can be backpropagated to all network layers and parameters, making
the network trainable using any gradient-based optimization method. In practice, we use min-batch gradient descent with momentum. During training, we use the “poly”
learning rate policy, where current learning rate equals to
iter
the base learning rate multiplied by (1 − maxiter
)0.9 . The
base learning rate for the bottom convolution module is set
to 10−3 , while it is set to 10−2 for both the SCA and the deconvolution modules. Due to the GPU memory limitations,
we set the batch size to 3. The number of training epochs
is set to 50. To augment training data, similarly to most of
the previous methods, we adopt random horizontal flipping
for all datasets. At test time, we simply do a forward pass
of the test image to obtain the estimated label map.
5. Experiments
Similarly to most previous works, we report results
on three different evaluation metrics: Per-Pixel Accuracy
(PPA), Class Average Accuracy (CAA) and mean Intersection over Union (mIoU). We extensively compare our
proposed method with the-state-of-the-art methods on two
large scene segmentation datasets:
PASCAL Context [14] dataset contains 10103 images
with an approximate resolution of 375 × 500, in which
Kl
0
1
2
3
4
PPA
85.9%
86.0%
86.6%
86.3%
85.5%
CAA
54.2%
54.1%
52.7%
54.2%
53.6%
mIoU
38.9%
39.5%
38.7%
39.2%
38.0%
Table 1. Results of using different Kl for the contextual dependency predictor on SIFT Flow. Kf is set to 128.
4999/5104 images are used for training/testing. These images originally come from Pascal VOC 2010 dataset, and
are augmented with pixel-wise annotations of 540 classes.
Following [14], we only consider the most frequent 59
classes in the evaluation. To enable batch-based training,
we rescale and pad each image to be 448 × 448.
COCO Stuff [2] dataset contains 10000 images in various resolutions, in which 9000/1000 images are used for
training/testing. These images originally come from the
Microsoft COCO dataset [10] with pixel-wise annotations
of 80 Thing categories. They are further augmented with
91 Stuff categories. In total, there are 171 categories in this
dataset.
5.1. Hyper-parameters Study
To be fair, we conduct the hyper-parameter study on a
third dataset, SIFT Flow [11]. This dataset is smaller compared to PASCAL Context and COCO Stuff, making it faster
for tuning. It contains 2488/200 images for training/testing
with a resolution of 256 × 256, and are annotated with 33
classes.
Specifically, we study two hyper-parameters of the attention predictor: the number Kl of convolution layers for feature extraction and the number Kf of output feature channels of convolution in each layer. The results are shown
in Tab. 1 and Tab. 2, respectively. We note that, for overall performance, Kl = 3 and Kf = 512 perform slightly
better than other settings. In the following experiments, we
will use these two values as the default setting.
Kf
128
256
512
PPA
86.1%
86.9%
87.0%
CAA
55.0%
54.5%
54.3%
mIoU
40.0%
40.2%
40.7%
Table 2. Results of using different Kf for the contextual dependency predictor on SIFT Flow. Kl is set to 3.
(a)
5.2. Ablation Study
To investigate the usefulness and effectiveness of the
SCA module, we compare our method with two baselines
that use different configurations of the SCA module. Note
that, for a fair comparison, all these baselines use the same
convolution and deconvolution modules as our proposed
network.
(b)
• baseline-no We remove the dependency predictor and
set aij = 1, ∀j = i and aij = 0, ∀j 6= i. In this case,
the SCA module does not embed any context information into the local neuron representations, degenerating
to a 1 × 1 convolution layer.
• baseline-ave We remove the dependency predictor and
set aij = 1, ∀i, j ∈ [1, n]. In this case, the SCA module embeds the averaged context features into local
neuron representations. This is similar to the global
context module proposed in [12], where the globally
pooled feature is concatenated with the local feature
everywhere.
The results on both PASCAL Context and COCO Stuff
are shown in Tab. 3. As can be seen, baseline-no performs
the worst on most metrics as it does not explicitly embed
context into local neuron representation. Although the use
of dilated convolution can help to expand the theoretical
receptive fields of neurons to aggregate context, the empirical receptive field that affects the neurons may still be
small [12]. With the use of globally averaged features as
context, the baseline-ave expand its receptive field to the
entire image, thus improving the performance of baselineno. Our method further improves baseline-ave on all the
metrics on both datasets by a significant margin. Since all
the settings are the same except for the way of aggregating
context, it demonstrates the effectiveness of the proposed
neuron-level selective context aggregation. The proposed
SCA module successfully models neuron-dependent contextual information, by exploring the dependencies between
neurons, to facilitate context-aware feature learning.
5.3. Comparisons with the State of the Art
The results on PASCAL Content dataset presented in
Tab. 4. Comparing with previous CNN-based models, our
method significantly outperforms all these methods on all
metrics except for mIoU on UoA-Context+CRF. Consid-
Figure 4. Visualization of dependency masks of different neurons.
Red and green circles denote different regions corresponding to
the selected neurons.
ering RNN-based methods, our method outperforms CRFRNN by a large margin. For DAG-RNN, we perform better
on PPA, and are worse than it on CAA and mIoU. The results on COCO Stuff are presented in Tab. 5. As can be seen,
we also outperform all CNN-based methods, and perform
better than DAG-RNN on CAA and worse than it on PPA
and mIoU. The results on these two challenging datasets
demonstrate the effectiveness of the proposed method.
We also note that in DAG-RNN, skip-connections are
used to fuse the features of higher layers with low level convolution features, which significantly improves their performance. In our method, to best investigate how the proposed SCA model helps to improve the representation ability of the last convolution features, we do not employ skipconnections in our architecture. Meanwhile, the RNNbased methods have to sequentially update their hidden vectors over time, which make them inappropriate to be parallelized to improve speed. In contrast, our method is a feedforward network, which can be easily parallelized.
5.4. Qualitative Results
Fig. 4 visualizes the dependency maps for different selected neurons, from which we note that there are two different behaviors of the CDP. Firstly, as shown in Fig. 4(a),
the two different selected neurons (indicated using green
and red circles) generally have different dependency maps,
as they belong to different classes. The CDP has learned
to predict a different dependency map for each neuron, enhancing their local representation with different global context. Secondly, as shown in Fig. 4(b), there are also cases
where two different neurons may have very similar dependency maps. This may be attributed to the fact that the
salient regions, e.g., the birds here, provide an important
baseline-no
baseline-ave
ours
PASCAL Context
PPA
CAA
mIoU
71.0% 51.0% 39.3%
72.1% 52.1% 41.1%
72.8% 54.4% 42.0%
COCO Stuff
PPA
CAA
mIoU
59.9% 41.2% 27.9%
60.8% 40.5% 27.6%
61.6% 42.5% 29.1%
Table 3. Results of ablation study on PASCAL Context dataset and COCO Stuff dataset.
Figure 5. Qualitative results selected in PASCAL Context dataset. We place a yellow circle on a selected region where most pixels inside
are misclassified by the baseline-no method while are correctly classified by our method. The leftmost is the dependency mask corresponds
to the select region.
context for all other regions. Still, note that context of
the green neuron in the grass region includes the surrounding grass regions, while these regions are not important for
the semantic interpretation of the red neuron containing the
bird’s head.
To better understand how the proposed SCA module
helps to improve segmentation accuracy, we show some
visual examples from Pascal Context and COCO Stuff in
Fig. 5 and Fig. 6, respectively. These examples are also included in the supplementary material with the full legend
of label colors. For example, in the top row of Fig. 5 it
may be seen that, without considering context, the top part
of the bus is mislabeled as ‘car’. The dependency map for a
neuron located in that region predicts high dependencies for
other neurons in different parts of the bus, which are easier
to recognize as such, and thus our method correctly labels
the problematic area as ‘bus’. Similarly, in the top row of
Fig. 6, part of the playing field is mislabeled as ‘grass’ in
the baseline-no result. Neurons in that area are assigned
a high dependency with the areas containing the players,
which helps our method to correctly label the area as ‘playingfield’.
Figure 6. Qualitative results selected in COCO Stuff dataset. We place a yellow circle on a selected region where most pixels inside are
misclassified by the baseline-no method while are correctly classified by our method. The leftmost is the dependency mask corresponds to
the select region.
Table 4. Comparison with state-of-the-art methods on PASCAL
Context dataset.
Methods
CFM et al. [4]
DeepLab et al. [3]
ParseNet et al. [12]
ConvPP-8s et al. [25]
FCN-8s et al. [20]
UoA-Context+CRF et al. [9]
CRF-RNN et al. [31]
DAG-RNN et al. [24]
ours
PPA
N/A
N/A
N/A
N/A
67.5%
71.5%
N/A
72.7%
72.8%
CAA
N/A
N/A
N/A
N/A
52.3%
53.9%
N/A
55.3%
54.4%
mIoU
31.5%
37.6%
40.4%
41.0%
39.1%
43.3%
39.3%
42.6%
42.0%
6. Conclusion
In this paper, we have presented a neuron-level selective
context aggregation module for scene segmentation. The
key idea is to augment local representation with global con-
Table 5. Comparison with state-of-the-art methods on COCO Stuff
dataset.
Methods
FCN et al. [2]
DeepLab et al. [3]
FCN-8s et al. [20]
DAG-RNN et al. [24]
ours
PPA
52.0%
57.8%
60.4%
62.2%
61.6%
CAA
34.4%
38.1%
38.5%
42.3%
42.5%
mIoU
22.7%
26.9%
27.2%
30.4%
29.1%
text which is selectively aggregated at each neuron according to its own dependencies, which are predicted on-the-fly
by an auxiliary network. The strength of our method stems
from that fact that the auxiliary network is jointly trained
with the main network without extra supervision. It learns
to predict appropriated dependency coefficients for different
pairs of neurons to selectively aggregate context by minimizing the overall segmentation loss. This mechanism en-
ables data-driven inference of contextual dependencies, and
facilitates context-aware feature learning.
Adding global context to local representation does not
necessarily help in many cases. It mainly excels in harder
cases, where otherwise local context alone might fail. In
our current work, we learned general neuron dependencies.
In the future, we consider narrowing down and focusing
specifically on long-range dependencies, or possibly crossimage dependencies, where we analyze more than a single
image in test time. We believe that learning dependency
for co-segmentation is a viable research direction to further
improve semantic segmentation capabilities.
References
[1] Y. Bengio, P. Simard, and P. Frasconi. Learning long-term
dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks, 5(2):157–166, 1994. 1
[2] H. Caesar, J. R. R. Uijlings, and V. Ferrari. COCO-Stuff:
thing and stuff classes in context. CoRR, abs/1612.03716,
2016. 5, 8
[3] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and
A. L. Yuille. DeepLab: semantic image segmentation with
deep convolutional nets, atrous convolution, and fully connected CRFs. arXiv preprint arXiv:1606.00915, 2016. 8
[4] J. Dai, K. He, and J. Sun. Convolutional feature masking for
joint object and stuff segmentation. In Proc. IEEE CVPR,
pages 3992–4000, 2015. 8
[5] J. Dai, H. Qi, Y. Xiong, Y. Li, G. Zhang, H. Hu, and
Y. Wei. Deformable convolutional networks. arXiv preprint
arXiv:1703.06211, 2017. 3
[6] C. Farabet, C. Couprie, L. Najman, and Y. LeCun. Learning
hierarchical features for scene labeling. IEEE Trans. Pattern
Analysis and Machine Intelligence, 35(8):1915–1929, 2013.
2, 5
[7] M. Jaderberg, K. Simonyan, and A. Zisserman. Spatial transformer networks. In Advances in Neural Information Processing Systems, pages 2017–2025, 2015. 3
[8] P. Krähenbühl and V. Koltun. Efficient inference in fully
connected CRFs with Gaussian edge potentials. In Advances
in Neural Information Processing Systems, pages 109–117,
2011. 1, 2, 3
[9] G. Lin, C. Shen, A. van den Hengel, and I. Reid. Efficient
piecewise training of deep structured models for semantic
segmentation. In Proc. CVPR, pages 3194–3203, 2016. 8
[10] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick. Microsoft COCO: Common objects in context. In Proc. ECCV, pages 740–755.
Springer, 2014. 5
[11] C. Liu, J. Yuen, and A. Torralba. Nonparametric scene parsing: Label transfer via dense scene alignment. In Proc. IEEE
CVPR, pages 1972–1979. IEEE, 2009. 5
[12] W. Liu, A. Rabinovich, and A. Berg. ParseNet: Looking
wider to see better. arXiv preprint arXiv:1506.04579, 2015.
1, 2, 3, 6, 8
[13] J. Long, E. Shelhamer, and T. Darrell. Fully convolutional
networks for semantic segmentation. In Proc. IEEE CVPR,
pages 3431–3440, 2015. 1, 2, 4
[14] R. Mottaghi, X. Chen, X. Liu, N.-G. Cho, S.-W. Lee, S. Fidler, R. Urtasun, and A. Yuille. The role of context for object
detection and semantic segmentation in the wild. In IEEE
CVPR, pages 891–898, 2014. 1, 3, 5
[15] H. Noh, S. Hong, and B. Han. Learning deconvolution network for semantic segmentation. In Proc. IEEE ICCV, pages
1520–1528, 2015. 1, 2
[16] R. Pascanu, T. Mikolov, and Y. Bengio. On the difficulty
of training recurrent neural networks. In Proc. ICML (3),
volume 28, pages 1310–1318, 2013. 1
[17] P. H. Pinheiro and R. Collobert. Recurrent convolutional
neural networks for scene labeling. In ICML, pages 82–90,
2014. 2
[18] A. Roy and S. Todorovic. Scene labeling using beam search
under mutex constraints. In Proc. IEEE CVPR, pages 1178–
1185, 2014. 2
[19] A. Sharma, O. Tuzel, and M.-Y. Liu. Recursive context propagation network for semantic scene labeling. In Advances in
Neural Information Processing Systems, pages 2447–2455,
2014. 2
[20] E. Shelhamer, J. Long, and T. Darrell. Fully convolutional
networks for semantic segmentation. IEEE Trans. Pattern
Analysis and Machine Intelligence, 39(4):640–651, 2017. 8
[21] J. Shotton, J. Winn, C. Rother, and A. Criminisi. TextonBoost for image understanding: Multi-class object recognition and segmentation by jointly modeling texture, layout, and context. International Journal of Computer Vision,
81(1):2–23, 2009. 1, 2, 3
[22] B. Shuai, G. Wang, Z. Zuo, B. Wang, and L. Zhao. Integrating parametric and non-parametric models for scene labeling. In Proc. IEEE CVPR. IEEE, 2015. 2
[23] B. Shuai, Z. Zuo, B. Wang, and G. Wang. DAG-recurrent
neural networks for scene labeling. In Proc. IEEE CVPR,
pages 3620–3629, 2016. 1, 5
[24] B. Shuai, Z. Zuo, B. Wang, and G. Wang. Scene segmentation with DAG-recurrent neural networks. IEEE Trans. Pattern Analysis and Machine Intelligence, 2017. 1, 2, 8
[25] S. Xie, X. Huang, and Z. Tu. Top-Down Learning for Structured Labeling with Convolutional Pseudoprior, pages 302–
317. Springer International Publishing, Cham, 2016. 8
[26] J. Yang, B. Price, S. Cohen, and M.-H. Yang. Context driven
scene parsing with attention to rare classes. In IEEE CVPR,
June 2014. 1, 3
[27] J. Yao, S. Fidler, and R. Urtasun. Describing the scene as
a whole: Joint object detection, scene classification and semantic segmentation. In Proc. IEEE CVPR, pages 702–709,
June 2012. 2
[28] F. Yu and V. Koltun. Multi-scale context aggregation by dilated convolutions. In Proc. ICLR 2016, 2016. 1, 2, 3, 4
[29] Y. Zhang and T. Chen. Efficient inference for fullyconnected CRFs with stationarity. In Proc. IEEE CVPR,
pages 582–589. IEEE, 2012. 2
[30] H. Zhao, J. Shi, X. Qi, X. Wang, and J. Jia. Pyramid scene
parsing network. In Proc. CVPR, 2017. 1, 2, 3
[31] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet,
Z. Su, D. Du, C. Huang, and P. H. Torr. Conditional random
fields as recurrent neural networks. In Proc. IEEE ICCV,
pages 1529–1537, 2015. 8
| 1cs.CV
|
arXiv:1611.07397v1 [cs.NI] 22 Nov 2016
Non-linear Barrier Coverage using Mobile Wireless
Sensors
Ashutosh Baheti
Arobinda Gupta
Dept. of Computer Sc. & Engineering
Indian Institute of Technology, Kharagpur
Kharagpur, WB-721302, India
Email: [email protected]
Dept. of Computer Sc. & Engineering
Indian Institute of Technology, Kharagpur
Kharagpur, WB-721302, India
Email: [email protected]
Abstract—A belt region is said to be k-barrier covered by a
set of sensors if all paths crossing the width of the belt region
intersect the sensing regions of at least k sensors. Barrier coverage
can be achieved from a random initial deployment of mobile
sensors by suitably relocating the sensors to form a barrier.
Reducing the movement of the sensors is important in such
scenarios due to the energy constraints of sensor devices. In
this paper, we propose a centralized algorithm which achieves
1-barrier coverage by forming a non-linear barrier from a
random initial deployment of sensors in a belt. The algorithm
uses a novel idea of physical behavior of chains along with
the concept of virtual force. Formation of non-linear barrier
reduces the movement of the sensors needed as compared to
linear barriers. Detailed simulation results are presented to show
that the proposed algorithm achieves barrier coverage with less
movement of sensors compared to other existing algorithms in
the literature.
Keywords—sensor network, barrier coverage, virtual force
I.
I NTRODUCTION
A Wireless Sensor Network (WSN) consists of a set of
sensor nodes. Each node can sense some physical parameters,
and has limited computation and communication capability.
The data sensed by the sensor nodes is usually transmitted
to a central base station using a wireless network connecting
the sensors for further processing. Mobile Wireless Sensor
Networks (MWSNs) [1], [2], [3] are a class of wireless sensor
networks in which some or all of the sensor nodes are mobile.
Wireless sensor networks have been used for a wide variety
of applications such as habitat monitoring, target tracking,
intruder detection etc.
Many different problems have been addressed on wireless
sensor networks, such as routing, topology control, localization, coverage, data aggregation etc. In this work, we focus
on the coverage problem in sensor networks, which addresses
the problem of covering a given area or set of objects using
sensors. Several different variations of the problem exist depending on the nature of coverage required. As an example,
Area Coverage requires that all points in a given area are
within the sensing field of at least one sensor. In contrast, Point
Coverage requires that only a given set of points within an area
be covered by at least one sensor. Many other definitions of
coverage exist such as perimeter coverage, barrier coverage,
sweep coverage, path coverage etc. [4].
In this paper, we focus on Barrier Coverage in sensor
networks. A target belt region provides strong k-barrier cov-
erage if all crossing paths (a path crossing the width of the
belt region, originating from one parallel boundary of the belt
region and terminating at the other) intersect the sensing region
of at least k distinct sensors. In the rest of this paper, we will
refer to strong barrier coverage as just barrier coverage. Barrier
coverage has many important applications such as intrusion
detection along international borders, identifying spread of
lethal chemicals around chemical factories, detecting potential
sabotage in gas pipelines etc. [5], [6].
Static WSNs may not always work well in barrier coverage
applications for different reasons. In many applications, sensors cannot be placed exactly at the locations desired due to
deployment constraints, and hence sensors may be randomly
deployed around the area. Such applications can benefit from
mobile WSNs if the deployed sensors can autonomously move
after deployment to achieve the desired barrier coverage.
Mobile sensors can also help in scenarios where one or more
sensors fail, thereby breaking barrier coverage. In such scenarios, some of the nearby sensors can readjust their positions
to recreate the barrier. However, designing algorithms that
utilize mobility efficiently is a challenging problem. Keeping
the energy constraint of battery-powered sensor devices in
mind, algorithms for mobility control should be able to achieve
barrier coverage with low movement of the sensors.
There exist many works on formation of barrier coverage using mobile sensors. Some of these works propose
centralized solutions for deploying sensors to achieve barrier
coverage [7], [8], [6]. Centralized solutions are good since
all the information is available at a central station. Hence,
all computations regarding movement can be done centrally
and only the final locations are sent to the sensors which then
move to those locations. However, maintaining the information
centrally incurs some overhead. To address this problem,
distributed approaches in which sensors locally coordinate
to adjust and move to their final positions have also been
proposed [9], [10], [11], [12], [13]. However, most of these
solutions (centralized or distributed) try to organize all sensors
in a straight line to achieve barrier coverage. While a linear
barrier is optimal with respect to the number of sensors needed
to create a barrier, it can cause large redundant movement to
move randomly deployed sensors to a linear configuration.
In this paper, we propose a centralized algorithm for 1barrier coverage which, given a random deployment of sensors in a belt, creates a non-linear barrier of sensors that
provides barrier coverage of the belt region. The proposed
algorithm views the barrier as a chain of sensors whose sensing
disks overlap with each other, and uses some novel ideas
of physical behavior of a chain along with the concept of
virtual force to move the sensors to achieve barrier coverage.
Detailed simulation results are presented to show that the
proposed algorithm achieves barrier coverage from random
initial deployments with both less average displacement and
less maximum displacement of the sensors compared to other
existing algorithms in the literature.
The rest of the paper is organized as follows. Section
II discusses some related works. The problem statement is
defined in Section III, Section IV describes the centralized
algorithm and evaluates its performance. Finally, Section V
concludes the work.
II.
R ELATED W ORKS
Barrier coverage has been widely studied in WSNs [14],
[15]. Saipulla et al. [6] suggested an approach to relocate
sensors from an initial randomized line-based deployment
model to replicate a scenario of sensors dropped from an
aircraft. The work in [8] studied the problem of relocating
mobile sensors with limited mobility in order to save energy.
Bhattacharya et al. [7] proposed and solved an optimization problem to calculate an optimal movement strategy for
barrier coverage on a circular region. All these approaches
are centralized. Distributed approaches to barrier coverage
formation are addressed in [12], [13], [9], [10], [16]. Kong
et al. [12] used the concept of virtual forces to solve the kbarrier coverage. Silvestri [13] presented a novel approach
MobiBar that outperforms the algorithm of [12] in k-barrier
coverage. Cheng and Savkin [10] presented a decentralized
approach of creating 1-barrier coverage between any two prespecified landmarks in the belt region. Shen et al. [9] suggested
a centralized CBarrier and a distributed DBarrier(based on
virtual forces) algorithm that create a barrier after an random
initial deployment. Eftekhari et al. [16] presented distributed
algorithms for barrier coverage using sensor relocation. All
of the algorithms proposed in the literature (except DBarrier
whose performance has been shown to be poorer than CBarrier) try to rearrange sensors on a straight line to form a linear
barrier. Ban et al. [17] defined a special type of non-linear
k-barrier coverage called grid barrier that is formed out of
linear segments coinciding with grid boundaries in the region;
however, the algorithm presented for 1-barrier coverage only
(named CBGB) still forms linear barrier only. A linear barrier
uses the minimum possible number of sensors, but causes more
movement of the sensors to arrange them along a straight
line. When some extra sensors (over the minimum number
required) are available, forming a non-linear barrier can reduce
the movement of the sensors and consequently cause less
energy usage. Ban et al. [17] also presented a more general
k-barrier coverage algorithm that creates a non-linear grid
barrier by breaking the region into subregions, forming linear
barriers in each subregions, and then forming vertical isolation
barriers between subregions to connect the horizontal barriers.
However, the algorithm uses very large number of redundant
sensors, and for 1-barrier coverage (k = 1), provides no
significant advantage over the CBGB algorithm. The algorithm
proposed in this paper differs from the other algorithms (except
DBarrier [9]) in that it finds truly non-linear barriers which
reduces the movement of the sensors. The number of redundant
sensors used is also low.
III.
P ROBLEM F ORMULATION
We assume a rectangular belt region of length L and width
W , with L W . A set of N mobile sensors with unique IDs
are initially randomly deployed in this belt region. Each sensor
has a sensing range Rs and thus can cover a circular area of
radius Rs centered around the position where the sensor is
placed. We assume that a sensor knows its own location.
The displacement of a sensor is defined as the Euclidean
distance between the initial and final location of the sensor.
As noted earlier, a centralized algorithm can compute the final
location of the sensors and then the sensors can move to
that location directly. Thus, the goal of the centralized barrier
formation algorithm is to relocate the sensors to form 1-barrier
coverage over the belt region while minimizing the average and
maximum displacement of the sensors.
IV.
C ENTRALIZED A LGORITHM FOR BARRIER
F ORMATION
We first describe the intuition behind the proposed algorithm. A more formal description of the algorithm is given
next.
A barrier can be viewed as a physical chain where each
sensor, with its imaginary sensing disk, is analogous to a
circular chain link. In a physical chain, if one chain link is
pulled, it will exert a force on all chain links connected to it,
and a chain link connected to it will move when the distance
between them becomes maximum, i.e., when their rims start
touching. We primarily use this simple property in designing
the algorithm. Some of the terms we will use to describe the
operation of the algorithm are described below.
•
Chain Link: A chain link in the algorithm refers to a
sensor with sensing radius Rs . We will use the terms
sensor and chain link interchangeably in the rest of this
paper. The leftmost sensor in the belt region is called
the left chain link. Similarly, the rightmost sensor is
called the right chain link. In case there are multiple
leftmost (rightmost) sensors, any one sensor is chosen
as the left (right) chain link.
•
Connected Chain Links: Two chain links are said to
be connected if the sensing regions of the corresponding sensors intersect. Note that the distance between
the centers of two connected chain links cannot be
more than 2Rs . If one chain link is pulled, a chain
link connected to it will feel a force when the distance
between their centers becomes equal to 2Rs .
•
Chain Graph: Consider the undirected graph G with
each chain link as a node and an edge added between
two nodes if the corresponding chain links are connected. A chain graph is a connected component of
G. The chain graph that contains the left chain link is
called the left chain graph. Similarly, the chain graph
containing the right chain link is called the right chain
graph.
Note that though a distance less than 2Rs between the positions of two sensors implies that the sensors are connected by
the above definitions, sometimes we will delete a connection
even if the distance is less than 2Rs to work with a subgraph
of the chain graph. Such deletions will be clearly specified
while describing the algorithm.
Given the above virtual constructs, the main idea of the
algorithm can be described as follows. Each chain graph, by
virtue of its connectedness, can provide barrier coverage for a
part of the belt region (the part between the left boundary of
its leftmost chain link and the right boundary of its rightmost
chain link). The algorithm tries to extend the barrier coverage
to the entire belt region by merging smaller chain graphs into
larger ones, until a large enough chain graph is formed that
spans across the length of the belt. In order to merge two chain
graphs, one special chain link of one chain graph is pulled
towards a chain link of the other chain graph in steps, pulling
the other chain links along with it until the two chains merge.
We next describe this technique in more detail.
2)
3)
A. Merging Chain Graphs
Let C denote the set of all chain links (sensors). Let CG
denote the set of chain links in a chain graph G. For any chain
link u ∈ CG and v ∈ C \ CG , we define the force f (u, v)
exerted on u by v as
α
f (u, v) =
u ∈ CG , v ∈ C \ CG
dist(u, v)
where dist(u, v) is the Euclidean distance between u and v.
Note that f represents the attractive force between two chain
links in two chain graphs, with the force becoming stronger
as the distance between the chain links decreases. α is simply
a scaling parameter.
For a chain link u in CG , let
F (u) = max f (u, v)
v
u ∈ CG , ∀ v ∈ C \ CG
denote the maximum force exerted on u by a chain link in
another chain graph. Then the dominant point of the chain
graph G is defined as the chain link dG ∈ CG such that F (dG )
is the maximum among all F (u), u ∈ CG . The chain link in
a chain graph X 6= G that exerts the maximum force on dG
is defined as the co-dominant point of G. If there are more
than one pair of dominant and co-dominant points with the
maximum force then we choose the pair which has a sensor
with the lowest ID.
For merging two chain graphs, we compute the dominant
and the co-dominant points of the chain graphs and then pull
the dominant point towards the co-dominant point using the
attractive force defined, pulling the other chain links in the
chain graph along with it. The movements of a chain link due
to the attractive force as well as when a connected chain link
is pulled follows the usual laws of physics. The algorithm for
merging chain graphs works in four phases:
1)
Initialization Phase: In this phase, the algorithm first
identifies all the chain graphs based on the initial
locations of the sensors. For each chain graph, a DFS
spanning tree is constructed starting from an arbitrary
node, and all edges not in the tree are deleted from
4)
the chain graph. Removing an edge between two
chain links implies that they are not considered as
connected (even if their sensing regions overlap) in
the rest of the algorithm and are not constrained to
move together in any way. The DFS tree helps in
identifying long paths in chain graphs that will be
used to flatten the chain graphs later. At the end of
this stage, all chain graphs to be considered are trees.
We will refer to the DFS tree corresponding to a chain
graph as a chain tree in the rest of this section.
Left-Attach Phase: In this phase, the left chain link
is pulled horizontally towards the left boundary of
the belt until it touches the left boundary. Note that
pulling the left chain link may pull other chain links
in the left chain graph. Once the left chain link
touches the left boundary, it is allowed to only slide
along the width of the belt but is not allowed to
move away from the left boundary in the rest of the
algorithm.
Right-Attach Phase: This phase is similar to the
Left-Attach Phase, only difference being the right
chain link is moved horizontally towards the right
boundary of the belt in this case.
Barrier-Formation Phase: This phase actually creates the barrier by merging chain graphs. The dominant point and co-dominant points are first determined for all chain graphs. The algorithm then iterates over the following step, with every iterative step
corresponding logically to a time step τ of movement
defined suitably.
a) One chain graph G is picked up randomly
from the set of chain graphs.
b) The dominant point dG of G is moved towards the co-dominant point of G for duration τ (or until it touches the co-dominant
point, whichever is earlier) following the
laws of physics depending on the force f
between them. Note that this may move other
chain links in G, again following the laws of
Physics.
c) If dG does not touch the co-dominant point
after the movement, the force f between dG
and the co-dominant point is recomputed (as
it may have changed due to the change in distance between them), and the algorithm goes
to the next iteration. If dG touches the codominant point (the two chain graphs have
merged), then the dominant and co-dominant
point of all the chain graphs are recomputed
before going to the next iteration.
This phase terminates when the merging of the chain
graphs causes a barrier to be formed. Thus, at each
step of this phase, one chain graph is moved slightly.
Note that moving one arbitrary chain graph completely in one step to cause two chain graphs to
merge may cause a lot of redundant movement unless
the proper chain graph is chosen; the random choice
reduces this redundant movement in case of a bad
choice of chain graph.
Note that a chain graph can potentially cover a larger part
of the belt if more nodes in it have degree two, as higher degree
nodes in a chain graph cause more redundant nodes that do
not contribute in extending the barrier. Therefore, at each step
of moving the dominant point, a flattening logic is applied to
the chain graph that flattens the chain to make it longer.
B. Flattening Chain Graphs
The flattening logic is applied to the chain tree formed
from the chain graph. For any chain tree, the dominant point
of the chain tree is defined as the root chain link of the tree.
For any chain tree (except the left and the right chain trees) the
longest path from the root chain link in the chain tree is first
computed. This path is called the flatten path. The following
step are applied after each step of the Barrier Formation phase.
The flatten path is traversed starting from the root chain
link until the first node with degree greater than two (branching) is found. Let this node be called the current chain link
c. Let Nc denote the set of chain links connected to c and
Sc denote the set of chain links connected to c but are not
on the flatten path. For every chain link u ∈ Sc , the chain
link v (v ∈ Nc \ Sc ) closest to u in the flatten path is
found, and a small fixed attractive force (taken to be β × f ,
0 < β << 1, where f is the force between the dominant and
the co-dominant point of the chain graph) is exerted upon u
towards v to make u move towards v. If u touches v as a
result of this movement, an edge is added in the chain graph
between u and v and the edge between c and v is deleted
(even if their sensing regions overlap). Note that this extends
the flatten path by one sensor (replacing the edge (c, v) in the
flatten path with the edge (c, u) and (u, v)). The change in
edges still maintains a tree.
Thus, as the dominant point of a chain graph moves
towards another chain graph in successive steps, the application
of the above logic brings more and more nodes into the flatten
path, eventually causing all chain links not present in this
flatten path to collapse on it. This, along with the movement
of the dominant point which pulls the chain links on the flatten
path, causes a chain to become longer with sufficient number
of steps, thus allowing a single chain to form a larger part of
the barrier. Note that for a long enough belt region (large L),
if the merging step and the flattening logic is applied on a
chain graph long enough, the graph will be transformed into a
linear chain with all nodes having degree two (except the end
nodes that are with degree one), with the distance between the
centers of two connected chain links becoming maximum.
An example of the flattening logic is shown in Figure 1.
Figure 1a shows the initial state of a chain tree. The green
chain link denotes the dominant point, with the red arrow
depicting the direction of the force exerted. The chain links on
the flatten path computed from the root chain link (dominant
point) are shown in blue. As shown in Figure 1b, a node
connected to the the first node on the flatten path (starting
from the root) with degree greater than two is moved towards
the flatten path. When this node meets the flatten path after
sufficient number of steps, the flatten path is changed as shown
in Figure 1c. This adds one more sensor to the flatten path. At
later steps, the next chain link on the flatten path with degree
greater than two is chosen and a chain link connected to it is
moved towards and finally added to the flatten path (Figures
1d and 1e). The next chain link on this new flatten path with
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 1: Example of the flattening logic
degree greater than two is then moved towards the flatten path
(Figure 1f). This process is repeated with each step to flatten
the chain tree as much as needed. Note that as the dominant
point moves because of the force exerted on it, the chain links
on the flatten path are pulled along with it, causing the chain
to straighten out and form a longer barrier.
For the left and the right chain tree, the flatten path is fixed
to be the path from the dominant point to the left and the right
chain links respectively. The rest of the logic remains the same.
This is done because of the special constraint on the leftmost
and the rightmost sensors. The pseudo code for the flattening
logic is given in Algorithm 1. More details are omitted because
of space constraints.
Figure 2 graphically shows the complete algorithm running
on an example scenario that is generated by simulating the
algorithm. The example scenario has a belt region of length
50m and width 8m. It has 65 uniformly randomly distributed
mobile sensors each having a sensing radius of 0.5m. The
color coding of the sensors is the same as in Figure 1. After the
Initialization Phase, the sensor positions are as shown in Figure
2a. As seen in the figure, only small chain graphs exist spread
all over the belt region, with no discernible parts of the barrier.
Figure 2b shows the state after the Left-Attach Phase and
Right-Attach Phase. Dominant points for all the chain graphs
are calculated and are pulled towards their corresponding codominant points, pulling the chains with them. We can also
observe some merged chain graphs compared to Figure 2a.
After few steps in the simulation, we can see larger chain
graphs in the belt region formed gradually as shown in Figure
2c and Figure 2d. It can be seen that there are only two chain
Algorithm 1 Flattening Algorithm
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
function FLATTEN(chain graph G, chain link root)
Compute flatten path P from root
current = root
while degree of current ≤ 2 do
current = next node after current on P
end while
Sc = set of neighbor nodes of current that are not on
P
for each u ∈ Sc do
v = neighbor node of current closest to u on P
apply force f on u towards v to move u
if distance between u and v ≤ 2Rs then
delete edge (current, v) from G
add edge (u, v) to G
P = P ∪ {(u, v), (current, u)} − (current, v)
break
end if
end for
end function
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 2: Example of 1-barrier formation
graphs remaining (left and right chain graphs) in Figure 2e
which then combine to form the final barrier as shown in
Figure 2f. Note that the final barrier is non-linear and some of
the sensors are still redundant.
The following theorem can be proved for the correctness
of the algorithm; we omit the proof here due to lack of space.
Theorem 1: For a belt region of length L and sensors with
sensing radius Rs , the proposed algorithm always terminates
with a strong barrier coverage if the number of sensors is
L
greater than or equal to d 2R
e.
s
C. Performance Evaluation
The centralized algorithm is simulated using the pymunk1
(python physics simulation library) and pygame2 (python game
development library used for visualizing sensor movements).
Each sensor is modeled as a point rigid body in a gravity
free environment. The connections between chain links are
are modelled as slide joints. A slide joint is like an imaginary
rod between two ends, which can keep the ends from getting
too far apart but will allow them to get closer to each other.
The constraints for the leftmost and the rightmost sensors are
modelled as Groove Joints. The anchor point in the groove
joint can slide on a specified line, which helps the leftmost and
the rightmost sensors to slide on the left and right boundary
when required. Pymunk allows us to apply forces on mobile
rigid bodies and can simulate the results in time steps. The
coordinates from pymunk simulation space are used in pygame
to draw sensors and the connections between them.
The proposed algorithm is compared with two existing
algorithms, the CBarrier algorithm proposed by Shen et al.
[9], and the CBGB algorithm proposed by Ban et al. [17].
The CBarrier algorithm is chosen as the DBarrier algorithm
proposed in the same work is the only one that forms a truly
non-linear barrier, and it has been shown that CBarrier has
a better performance than DBarrier. The CBGB algorithm is
chosen as it has been shown to find a near-optimal movement
strategy for linear barrier formation. We simulate both algorithms and measure the average and maximum displacement of
a sensor. It should be noted that the algorithm can be centrally
executed given the initial locations of the sensors and only
final locations can be sent to the sensors directly without the
need of sensors to make any intermediate movement.
A belt of dimensions 50m × 8m is taken, with varying
number of sensors. The value of the sensing radius Rs is
taken as 0.5m. Note that these parameter values imply that a
minimum of 50 sensors are needed to provide barrier coverage
(when a linear barrier is formed). The results reported are
the average of running the algorithms on 100 random initial
deployments. The results are shown in Figure 3.
The results indicate that the proposed algorithm outperforms both CBarrier and CBGB algorithms with respect to
both the average and maximum displacement of a sensor.
In particular, the maximum displacement of the proposed
algorithm is significantly better than both the algorithms. As
the number of sensors are increased, the performance of the
1 http://pymunk.readthedocs.org/en/latest/
2 http://www.pygame.org/
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
(a) Average displacement
[8]
[9]
[10]
[11]
[12]
[13]
(b) Maximum displacement
Fig. 3: Average and maximum displacement of a sensor
[14]
[15]
[16]
algorithm improves as more and more redundant sensors are
available for local flattening and merging of chain graphs,
thereby reducing the movement required.
[17]
V.
C ONCLUSION
In this paper, we have presented a centralized algorithm
to form a barrier from a random initial deployment using
mobile sensors. The algorithm uses some novel techniques of
viewing a barrier as a chain and applying laws of physics to
create non-linear barriers that reduce the movement of sensors.
Simulation results indicate that the algorithm outperforms
other existing algorithms in terms of average and maximum
displacement even with a small number of redundant sensors.
The work can be extended further to investigate the design
of distributed algorithms for the problem and algorithms for
localized maintenance of the barrier after failures using similar
techniques.
G. Wang, G. Cao, and T. La Porta, “Movement-assisted sensor deployment,” IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp.
640–652, 2006.
K. Ma, Y. Zhang, and W. Trappe, “Managing the mobility of a
mobile sensor network using network dynamics,” IEEE Transactions
on Parallel and Distributed Systems, vol. 19, no. 1, pp. 106–120, 2008.
N. Bartolini, T. Calamoneri, T. La Porta, and S. Silvestri, “Autonomous
deployment of heterogeneous mobile sensors,” IEEE Transactions on
Mobile Computing, vol. 10, no. 6, pp. 753–766, 2011.
B. Wang, “Coverage problems in sensor networks: A survey,” ACM
Computing Surveys, vol. 43, no. 4, pp. 32:1–32:53, 2011.
A. Chen, S. Kumar, and T. H. Lai, “Local barrier coverage in wireless
sensor networks,” IEEE Transactions on Mobile Computing, vol. 9,
no. 4, pp. 491–504, 2010.
A. Saipulla, C. Westphal, B. Liu, and J. Wang, “Barrier coverage with
line-based deployed mobile sensors,” Ad Hoc Networks, vol. 11, no. 4,
pp. 1381–1391, 2013.
B. Bhattacharya, M. Burmester, Y. Hu, E. Kranakis, Q. Shi, and
A. Wiese, “Optimal movement of mobile sensors for barrier coverage
of a planar region,” Theoretical Computer Science, vol. 410, no. 52, pp.
5515–5528, 2009.
A. Saipulla, B. Liu, G. Xing, X. Fu, and J. Wang, “Barrier coverage with
sensors of limited mobility,” in 11th ACM International Symposium on
Mobile Ad Hoc Networking and Computing, 2010, pp. 201–210.
C. Shen, W. Cheng, X. Liao, and S. Peng, “Barrier coverage with
mobile sensors,” in ISPAN 2008, International Symposium on Parallel
Architectures, Algorithms, and Networks, 2008, pp. 99–104.
T. M. Cheng and A. V. Savkin, “A problem of decentralized selfdeployment for mobile sensor networks: Barrier coverage between
landmarks,” in ICCA 2009, IEEE International Conference on Control
and Automation, 2009, 2009, pp. 1438–1442.
G. Yang, W. Zhou, and D. Qiao, “Defending against barrier intrusions
with mobile sensors,” in WASA 2007, International Conference on
Wireless Algorithms, Systems and Applications, 2007, 2007, pp. 113–
120.
L. Kong, X. Liu, Z. Li, and M.-Y. Wu, “Automatic barrier coverage formation with mobile sensor networks,” in ICC 2010, IEEE International
Conference on Communications, 2010, pp. 1–5.
S. Silvestri, “Mobibar: Barrier coverage with mobile sensors,” in
GLOBECOM 2011, Global Telecommunications Conference, 2011, pp.
1–6.
M. Cardei and J. Wu, “Energy-efficient coverage problems in wireless
ad-hoc sensor networks,” Computer Communications, vol. 29, no. 4,
pp. 413–420, 2006.
G. Fan and S. Jin, “Coverage problem in wireless sensor network: A
survey,” Journal of Networks, vol. 5, no. 9, pp. 1033–1040, 2010.
M. Eftekhari, E. Kranakis, D. Krizanc, O. Morales-Ponce,
L. Narayanan, J. Opatrny, and S. Shende, “Distributed algorithms
for barrier coverage using relocatable sensors,” in PODC 2013,
ACM Symposium on Principles of Distributed Computing, 2013, pp.
383–392.
D. Ban, J. Jiang, W. Yang, W. Dou, and H. Yi, “Strong k-barrier
coverage with mobile sensors,” in IWCMC 2010, 6th International
Wireless Communications and Mobile Computing Conference, 2010,
pp. 68–72.
| 3cs.SY
|
Open3D: A Modern Library for 3D Data Processing
Qian-Yi Zhou
Jaesik Park
Intel Labs
arXiv:1801.09847v1 [cs.CV] 30 Jan 2018
Abstract
Vladlen Koltun
ing practices.
Open3D was created to address this need. It is an opensource library that supports rapid development of software
that deals with 3D data. The Open3D frontend exposes a set
of carefully selected data structures and algorithms in both
C++ and Python. The Open3D backend is implemented in
C++11, is highly optimized, and is set up for OpenMP parallelization. Open3D was developed from a clean slate with
a small and carefully considered set of dependencies. It can
be set up on different platforms and compiled from source
with minimal effort. The code is clean, consistently styled,
and maintained via a clear code review mechanism.
Open3D has been in development since 2015 and has
been used in a number of published research projects [22,
13, 15, 12]. It has been deployed and is currently running
in the Tanks and Temples evaluation server [13].
Open3D is released open-source under the permissive
MIT license and is available at http://www.open3d.
org. We welcome contributions from the open-source
community.
Open3D is an open-source library that supports rapid
development of software that deals with 3D data. The
Open3D frontend exposes a set of carefully selected data
structures and algorithms in both C++ and Python. The
backend is highly optimized and is set up for parallelization.
Open3D was developed from a clean slate with a small and
carefully considered set of dependencies. It can be set up
on different platforms and compiled from source with minimal effort. The code is clean, consistently styled, and maintained via a clear code review mechanism. Open3D has
been used in a number of published research projects and
is actively deployed in the cloud. We welcome contributions
from the open-source community.
1. Introduction
The world is three-dimensional. Systems that operate in
the physical world or deal with its simulation must often
process three-dimensional data. Such data takes the form
of point clouds, meshes, and other representations. Data in
this form is produced by sensors such as LiDAR and depth
cameras, and by software systems that support 3D reconstruction and modeling.
Despite the central role of 3D data in fields such as
robotics and computer graphics, writing software that processes such data is quite laborious in comparison to other
data types. For example, an image can be efficiently loaded
and visualized with a few lines of OpenCV code [3]. A similarly easy to use software framework for 3D data has not
emerged. A notable prior effort is the Point Cloud Library
(PCL) [18]. Unfortunately, after an initial influx of opensource contributions, PCL became encumbered by bloat and
is now largely dormant. Other open-source efforts include
MeshLab [6], which provides a graphical user interface for
processing meshes; libigl [11], which supports discrete differential geometry and related research; and a variety of solutions for image-based reconstruction [13]. Nevertheless,
there is currently no open-source library that is fast, easy to
use, supports common 3D data processing workflows, and
is developed in accordance with modern software engineer-
2. Design
Two primary design principles of Open3D are usefulness
and ease of use [8]. Our key decisions can be traced to
these two principles. Usefulness motivated support for popular representations, algorithms, and platforms. Ease of use
served as a countervailing force that guarded against heavyweight dependencies and feature creep.
Open3D provides data structures for three kinds of representations: point clouds, meshes, and RGB-D images. For
each representation, we have implemented a complete set
of basic processing algorithms such as I/O, sampling, visualization, and data conversion. In addition, we have implemented a collection of widely used algorithms, such as normal estimation [16], ICP registration [2, 4], and volumetric integration [7]. We have verified that the functionality
of Open3D is sufficient by using it to implement complete
workflows such as large-scale scene reconstruction [5, 15].
We carefully chose a small set of lightweight dependencies, including Eigen for linear algebra [9], GLFW
for OpenGL window support, and FLANN for fast nearest neighbor search [14]. For easy compilation, powerful
1
but heavyweight libraries such as Boost and Ceres are excluded. Instead we use either lightweight alternatives (e.g.,
pybind11 instead of Boost.Python) or in-house implementations (e.g., for Gauss-Newton and Levenberg-Marquardt
graph optimization). The source code of all dependencies is
distributed as part of Open3D. The dependencies can thus
be compiled from source if not automatically detected by
the configuration script. This is particularly useful for compilation on operating systems that lack package management software, such as Microsoft Windows.
The development of Open3D started from a clean slate
and the library is kept as simple as possible. Only algorithms that solve a problem of broad interest are added.
If a problem has multiple solutions, we choose one that
the community considers standard. A new algorithm is
added only if its implementation demonstrates significantly
stronger results on a well-known benchmark.
Open3D is written in standard C++11 and uses CMake
to support common C++ toolchains including
memory access to these data fields via a numpy array. The
following code sample demonstrates reading and accessing
the point coordinates of a point cloud.
from py3d import *
import numpy as np
pointcloud = read_point_cloud(’pointcloud.ply’)
print(np.asarray(pointcloud.points))
Similarly, TriangleMesh has two master data fields –
TriangleMesh.vertices and TriangleMesh.triangles –
as well as three auxiliary data fields:
TrianTriangleMesh.vertex colors,
gleMesh.vertex normals,
and TriangleMesh.triangle normals.
The Image data structure is implemented as a 2D or 3D
array and can be directly converted to a numpy array. A
pair of depth and color images of the same resolution can be
combined into a data structure named RGBDImage. Since
there is no standard depth image format, we have implemented depth image support for multiple datasets including
NYU [19], TUM [20], SUN3D [21], and Redwood [5]. The
following code sample reads a pair of RGB-D images from
the TUM dataset and converts them to a point cloud.
• GCC 4.8 and later on Linux
• XCode 8.0 and later on OS X
• Visual Studio 2015 and later on Windows
from py3d import *
import numpy as np
depth = read_image(’TUM_depth.png’)
color = read_image(’TUM_color.jpg’)
rgbd = create_rgbd_image_from_tum_format(color,
depth)
pointcloud = create_point_cloud_from_rgbd_image(
rgbd, PinholeCameraIntrinsic.
prime_sense_default)
A key feature of Open3D is ubiquitous Python binding.
We follow the practice of successful computer vision and
deep learning libraries [1, 3]: the backend is implemented in
C++ and is exposed through frontend interfaces in Python.
Developers use Python as a glue language to assemble components implemented in the backend.
Figure 1 shows code snippets for a simple 3D data processing workflow. An implementation using the Open3D
Python interface is compared to an implementation using the Open3D C++ interface and to an implementation
based on PCL [18]. The implementation using the Open3D
Python interface is approximately half the length of the implementation using the Open3D C++ interface, and about
five times shorter than the implementation based on PCL.
As an added benefit, the Python code can be edited and debugged interactively in a Jupyter Notebook.
3.2. Visualization
Open3D provides a function draw geometries() for visualization. It takes a list of geometries as input, creates a window, and renders them simultaneously using OpenGL. We
have implemented many functions in the visualizer, such
as rotation, translation, and scaling via mouse operations,
changing rendering style, and screen capture. A code sample using draw geometries() and its result are shown in Figure 2.
In addition to draw geometries(), Open3D has a
number of sibling functions with more advanced functionality.
draw geometries with custom animation()
allows the programmer to define a custom view
trajectory and play an animation in the GUI.
draw geometries with animation callback()
and
draw geometries with key callback()
accept
Python
callback functions as input. The callback function is called
in an automatic animation loop, or upon a key press event.
The following code sample shows a rotating point cloud
using draw geometries with animation callback().
3. Functionality
Open3D has nine modules, listed in Table 1.
3.1. Data
The Geometry module implements three geometric representations: PointCloud, TriangleMesh, and Image.
The PointCloud data structure has three data fields:
PointCloud.points, PointCloud.normals, PointCloud.colors.
They are used to store coordinates, normals, and colors. The
master data field is PointCloud.points. The other two fields
are considered valid only when they have the same number
of records as PointCloud.points. Open3D provides direct
2
Estimate
normal
Downsample
(a) A simple 3D data processing task: load a point cloud, downsample it, and estimate normals.
from py3d import *
pointcloud = read_point_cloud(’pointcloud.ply’)
downsampled = voxel_down_sample(pointcloud, voxel_size = 0.05)
estimate_normals(downsampled, KDTreeSearchParamHybrid(radius = 0.1, max_nn = 30))
draw_geometries([downsampled])
(b) An implementation using the Open3D Python interface.
#include <Core/Core.h>
#include <IO/IO.h>
#include <Visualization/Visualization.h>
void main(int argc, char *argv[])
{
using namespace three;
auto pointcloud = CreatePointCloudFromFile(argv[1]);
auto downsampled = VoxelDownSample(pointcloud, 0.05)
EstimateNormals(*downsampled, KDTreeSearchParamHybrid(0.1, 30));
DrawGeometry(downsampled);
}
(c) An implementation using the Open3D C++ interface.
#include <pcl/point_types.h>
#include <pcl/point_cloud.h>
#include <pcl/features/normal_3d.h>
#include <pcl/filters/voxel_grid.h>
#include <pcl/io/pcd_io.h>
#include <pcl/visualization/cloud_viewer.h>
void main(int argc, char *argv[])
{
using namespace pcl;
PointCloud<PointNormal>::Ptr pcd(new PointCloud<PointNormal>());
io::loadPCDFile<PointNormal>(argv[1], *pcd);
VoxelGrid<PointNormal> grid;
grid.setLeafSize(0.05, 0.05, 0.05);
grid.setInputCloud(pcd);
grid.filter(*pcd);
PointCloud<PointNormal>::Ptr result(new PointCloud<PointNormal>());
NormalEstimation<PointNormal, PointNormal> est;
est.setInputCloud(pcd);
est.setRadiusSearch(0.1);
est.compute(*result);
pcl::visualization::PCLVisualizer viewer("PCL Viewer");
viewer.addPointCloudNormals<PointNormal, PointNormal>(pcd, result, 1, 0.05);
while (!viewer.wasStopped())
{
viewer.spinOnce();
}
}
(d) An implementation based on PCL.
Figure 1: Code snippets for a simple 3D data processing workflow. (a) An illustration of the task. (b) An implementation
using the Open3D Python interface. (b) An implementation using the Open3D C++ interface. (c) An implementation based on
PCL [18]. The implementation using the Open3D Python interface is dramatically shorter and clearer than the implementation
based on PCL.
3
Module
Functionality
Geometry
Camera
Odometry
Registration
Integration
I/O
Visualization
Utility
Python
Data structures and basic processing algorithms
Camera model and camera trajectory
Tracking and alignment of RGB-D images
Global and local registration
Volumetric integration
Reading and writing 3D data files
A customizable GUI for rendering 3D data with OpenGL
Helper functions such as console output, file system, and Eigen wrappers
Open3D Python binding and tutorials
Table 1: Open3D modules.
from py3d import *
pointcloud = read_point_cloud(’pointcloud.pcd’)
mesh = read_triangle_mesh(’mesh.ply’)
mesh.computer_vertex_normals()
draw_geometries([pointcloud, mesh])
from py3d import *
source = read_point_cloud(’source.pcd’)
target = read_point_cloud(’target.pcd’)
source_down = voxel_down_sample(source, 0.05)
target_down = voxel_down_sample(target, 0.05)
estimate_normals(source_down,
KDTreeSearchParamHybrid(radius = 0.1, max_nn
= 30))
estimate_normals(target_down,
KDTreeSearchParamHybrid(radius = 0.1, max_nn
= 30))
We then compute FPFH features and apply a RANSACbased global registration algorithm [17]:
Figure 2: Visualize a mesh and a point cloud using
draw geometries().
source_fpfh = compute_fpfh_feature(source_down,
KDTreeSearchParamHybrid(radius = 0.25, max_nn
= 100))
target_fpfh = compute_fpfh_feature(target_down,
KDTreeSearchParamHybrid(radius = 0.25, max_nn
= 100))
result_ransac =
registration_ransac_based_on_feature_matching
(source_down, target_down, source_fpfh,
target_fpfh, max_correspondence_distance =
0.075, TransformationEstimationPointToPoint(
False), ransac_n = 4, [
CorrespondenceCheckerBasedOnEdgeLength(0.9),
CorrespondenceCheckerBasedOnDistance(0.075)],
RANSACConvergenceCriteria(max_iteration =
4000000, max_validation = 500))
from py3d import *
pointcloud = read_point_cloud(’pointcloud.pcd’)
def rotate_view(vis):
# Rotate the view by 10 degrees
ctr = vis.get_view_control()
ctr.rotate(10.0, 0.0)
return False
draw_geometries_with_animation_callback([
pointcloud], rotate_view)
In the backend of Open3D, these functions are implemented using the Visualizer class. This class is also exposed
in the Python interface.
We used profiling tools to analyze the RANSAC-based
algorithm and found that its most time-consuming part is
the validation of matching results. Thus, we give the user an
option to specify a termination criterion via the RANSACConvergenceCriteria parameter. In addition, we provide
a set of functions that prune false matches early, including CorrespondenceCheckerBasedOnEdgeLength and CorrespondenceCheckerBasedOnDistance.
The final part of the pairwise registration workflow is
ICP refinement [2, 4], applied to the original dense point
clouds:
3.3. Registration
Open3D provides implementations of multiple stateof-the-art surface registration methods, including pairwise
global registration, pairwise local refinement, and multiway
registration using pose graph optimization. This section
gives an example of a complete pairwise registration workflow for point clouds. The workflow begins by reading raw
point clouds, downsampling them, and estimating normals:
4
result_icp = registration_icp(source, target,
max_correspondence_distance = 0.02,
result_ransac.transformation,
TransformationEstimationPointToPlane())
Here TransformationEstimationPointToPlane() invokes
a point-to-plane ICP algorithm. Other ICP variants are implemented as well. Intermediate and final results of the
demonstrated registration procedure are shown in Figure 3.
Figure 4: A scene reconstructed and visualized in Open3D.
Global registration
analysis accelerated the running time of many functions by
multiplicative factors. For example, our optimized implementation of the ICP algorithm is up to 25 times faster than
its counterpart in PCL [18]. Our implementation of the reconstruction pipeline of Choi et al. [5] is up to an order of
magnitude faster than the original implementation released
by the authors.
A large number of functions are parallelized with
OpenMP. Many functions, such as normal estimation, can
be easily parallelized across data samples using “#pragma
omp for” declarations. Another example of consequential
parallelization can be found in our non-linear least-squares
solvers. These functions optimize objectives of the form
X
L(x) =
ri2 (x),
(1)
Local refinement
Figure 3: Intermediate and final results of pairwise registration.
3.4. Reconstruction
A sophisticated workflow that is demonstrated in an
Open3D tutorial is a complete scene reconstruction system [5, 15]. The system is implemented as a Python script
that uses many algorithms implemented in Open3D. It takes
an RGB-D sequence as input and proceeds through three
major steps.
i
1. Build local geometric surfaces {Pi } (referred to as
fragments) from short subsequences of the input
RGB-D sequence. There are three substeps: matching
pairs of RGB-D images, robust pose graph optimization, and volumetric integration.
where ri (x) is a residual term. A step in a Gauss-Newton
solver takes the current solution xk and updates it to
−1 >
xk+1 = xk − (J>
(Jr r),
r Jr )
2. Globally align the fragments to obtain fragment poses
{Ti } and a camera calibration function C(·). There are
four substeps: global registration between fragment
pairs, robust pose graph optimization, ICP registration,
and global non-rigid alignment.
(2)
where Jr is the Jacobian matrix for the residual vector r,
both evaluated at xk . In the Open3D implementation, the
most time-consuming part is the evaluation of J>
r Jr and
J>
r.
These
were
parallelized
using
OpenMP
reduction.
r
A lambda function specifies the computation of J>
r Jr and
r
for
each
data
record.
This
lambda
function
is
called in
J>
r
a reduction loop that sums over the matrices.
The parallelization of the Open3D backend accelerated
the most time-consuming Open3D functions by a factor of
3-6 on a modern CPU.
3. Integrate RGB-D images to generate a mesh model for
the scene.
Figure 4 shows a reconstruction produced by this pipeline
for a scene from the SceneNN dataset [10]. The visualization was also done via Open3D.
5. Release
4. Optimization
Open3D is released open-source under the permissive
MIT license and is available at http://www.open3d.
org. Ongoing development is coordinated via GitHub.
Code changes are integrated via the following steps.
Open3D was engineered for high performance. We have
optimized the C++ backend such that Open3D implementations are generally faster than their counterparts in other 3D
processing libraries. For each major function, we used profiling tools to benchmark the execution of key steps. This
1. An issue is opened for a feature request or a bug fix.
5
2. A developer starts a new branch on a personal fork of
Open3D, writes code, and submits a pull request when
ready.
[9] G. Guennebaud, B. Jacob, et al. Eigen v3, 2010.
[10] B. Hua, Q. Pham, D. T. Nguyen, M. Tran, L. Yu, and
S. Yeung. SceneNN: A scene meshes dataset with annotations. In 3DV, 2016.
3. The code change is reviewed and discussed in the
pull request. Modifications are made to address issues
raised in the discussion.
[11] A. Jacobson, D. Panozzo, et al. libigl: A simple C++
geometry processing library, 2016.
4. One of the admins merges the pull request to the master
branch and closes the issue.
[12] M. Khoury, Q.-Y. Zhou, and V. Koltun. Learning compact geometric features. In ICCV, 2017.
The code review process maintains a consistent coding
style and adherence to modern C++ programming guidelines. Pull requests are automatically checked by a continuous integration service.
We hope that Open3D will be useful to a broad community of developers who deal with 3D data.
[13] A. Knapitsch, J. Park, Q. Zhou, and V. Koltun. Tanks
and temples: Benchmarking large-scale scene reconstruction. ACM Transactions on Graphics, 36(4),
2017.
[14] M. Muja and D. G. Lowe. Scalable nearest neighbor
algorithms for high dimensional data. PAMI, 36(11),
2014.
References
[15] J. Park, Q.-Y. Zhou, and V. Koltun. Colored point
cloud registration revisited. In ICCV, 2017.
[1] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis,
J. Dean, et al. TensorFlow: A system for large-scale
machine learning. In OSDI, 2016.
[2] P. J. Besl and N. D. McKay. A method for registration
of 3-D shapes. PAMI, 14(2), 1992.
[3] G. Bradski. The OpenCV library. Dr. Dobb’s Journal,
25(11), 2000.
[4] Y. Chen and G. G. Medioni. Object modelling by registration of multiple range images. Image and Vision
Computing, 10(3), 1992.
[5] S. Choi, Q.-Y. Zhou, and V. Koltun. Robust reconstruction of indoor scenes. In CVPR, 2015.
[6] P. Cignoni, M. Callieri, M. Corsini, M. Dellepiane,
F. Ganovelli, and G. Ranzuglia. MeshLab: An opensource mesh processing tool. In Eurographics Italian
Chapter Conference, 2008.
[7] B. Curless and M. Levoy. A volumetric method for
building complex models from range images. In SIGGRAPH, 1996.
[8] F. D. Davis. Perceived usefulness, perceived ease of
use, and user acceptance of information technology.
MIS Quarterly, 13(3), 1989.
[16] M. Pauly. Point primitives for interactive modeling
and processing of 3D geometry. PhD thesis, ETH
Zürich, 2003.
[17] R. B. Rusu, N. Blodow, and M. Beetz. Fast point feature histograms (FPFH) for 3D registration. In ICRA,
2009.
[18] R. B. Rusu and S. Cousins. 3D is here: Point Cloud
Library (PCL). In ICRA, 2011.
[19] N. Silberman, D. Hoiem, P. Kohli, and R. Fergus. Indoor segmentation and support inference from RGBD
images. In ECCV, 2012.
[20] J. Sturm, N. Engelhard, F. Endres, W. Burgard, and
D. Cremers. A benchmark for the evaluation of RGBD SLAM systems. In IROS, 2012.
[21] J. Xiao, A. Owens, and A. Torralba. SUN3D: A
database of big spaces reconstructed using SfM and
object labels. In ICCV, 2013.
[22] Q.-Y. Zhou, J. Park, and V. Koltun. Fast global registration. In ECCV, 2016.
6
| 1cs.CV
|
Formalized Risk Assessment for Safety and
Security
arXiv:1709.00567v1 [cs.SY] 2 Sep 2017
Joachim Draeger
Abstract
The manifold interactions between safety and security aspects in embedded systems makes it plausible to handle safety and security risks in a unified
way. The paper develops a corresponding risk measure in the context of discrete event systems (DEVS). The chosen approach is based on a simulation of
system dynamics, which allows risk assessments even in cases with stepwise
system degradation, cascading failures, or cognitive attackers. The plausibility of the proposed risk measure is shown by its consistency with ’classical’
notions of risk. Its non-computability, on the other hand, indicates a realistic
behavior in the presence of complex dynamics. Power grids are discussed as
an application example and indicate some of the advantages of the proposed
method.
1
Introduction
1.1
Safety Risks and Security Risks
The notion of risk recaps the expected amount of losses related with the usage of
a specific system M . This makes risk an important system property. The notion
of risk is not uniquely defined, however. It can be characterized from at least two
different perspectives, safety [67] and cyber security [10]. They are distinguished by
who is typically acting on whom as given by Axelrod [6], whereby both safety and
security usually make individual assumptions about M [5, 25, 29]: Safety requires
that the system must not harm the world; all deviations from the intended behavior
are caused accidentally. In the contrary, security demands that the world must not
harm the system, though intelligent adversaries belonging to the world are acting
in an intentionally malicious way.
Due to these differences, safety and security risk assessments are typically executed independent from each other. This may be justified in some cases, but may
be inappropriate in many others. Let us consider some examples, in which safety
and security risks are intertwined.
• Let us assume that a decision has to be made whether free resources of system
performance should be invested in system monitoring or system defense. Risk
assessments from the safety resp. security perspective carried out independently may hot help in finding an answer.
• In a cyber attack on a German steel mill in 2014, hackers used social engineering techniques for getting access to the control systems of the production
plant. They modified the control systems in a way, that the safety of the plant
was compromised. It was not possible anymore to shut down a blast furnace.
The resulting damage of the plant was significant [47].
• The Stuxnet worm [40, 53] is an example of a self-propagating malware compromising specific industrial control systems. As a result, uranium enrichment
facilities in Iran seem to suffer substantial damage.
1
Without a combined view at safety and security, the situations described above
can not be appropriately modeled. Instead, trade-offs and overlaps between safety
and security suggest the development of a unified approach to safety and security
risk assessments as recommended in e.g. [48]. Knowledge about upcoming events,
system characteristics, and system behaviour will contribute significantly to the
quality of the intended assessments. The availability of such knowledge can not be
taken as granted, however. According to the theorem of Rice [32], it will not be
possible to decide about nontrivial properties of a general computable system. Only
their enumeration can be realized e.g. by experimenting with simulations [28, 46],
which explore the effects of faults and intrusions on the system. Consequently, in
this paper a simulation-based risk notion is developed and analyzed. Up to now, the
potential of such a risk concept does not seem to be discussed in necessary depth
[44]. The basic idea of such an approach was already presented in [20], which can
be considered as predecessor of the actual paper.
1.2
Related Work
Though the differences between safety and security poses a challenge for a common
handling, an unified risk assessment is discussed and judged as possible e.g. in
[12, 38]. Concepts of risk, which are applicable to both safety- and security-related
situations, can be found in [6, 57]. Corresponding approaches for a common risk
assessment process are developed in [51, 52]. Neither the cited notions of risk nor
the risk assessment processes are simulation-based. An approach integrating safety
and security risks based on fault trees and thus using a much stronger abstraction
is given in in [27].
The paper [37] discusses a simulation-based approach to risk assessment for the
special case of stochastically varying demands on a production facility. Similar
considerations from the security risk point of view were made in [11, 19, 54, 69].
Another special case is considered in [8], wherein the authors are focusing on the
Monte-Carlo simulation of air traffic control operations.
An application of discrete event simulation as specific simulation paradigm to
cyber security problems is discussed in [22], though these considerations are not
risk-related. A similar statement can be made about the paper [17], which models
cyber attacks based on the DEVS formalism.
1.3
Structure of the Paper
Section 2 describes, how the systems under consideration can be formalized using
the DEVS formalism. The system extensions, which are necessary for representing
faults and threats and thus a off-nominal system behaviour, lead to a so-called risk
system, which reproduces the nominal system behavior as a special case. In section 3, a simulation-based risk measure is defined on these risk systems enabling a
unified risk assessment. The consistency of the proposed risk measure with classical notions of safety- and security-related risks is shown in section 4, which supports the view that it can be considered as well-defined. This section touches also
the (non-)computability of the simulation-based risk measure. The final section 5
demonstrates the advantages of the new simulation-based risk measure using power
grids as an example. The paper closes with an outlook.
2
Formalization of Systems
For executing the intended risk assessment for the system S, at first a suitable
model of S has to be constructed. This is done by representing S using the DEVS
2
formalism [70, 71]. The DEVS formalism developed by Zeigler in 1984 is proposed
due to its generality and flexibility. It has the capability to represent all kinds of
systems, which have an input/output behavior describable by sequences of events.
Despite of the capability to handle many types of discrete systems [73], the DEVS
formalism in its original formulation is not able to handle stochastic aspects as they
occur in the domain of safety and security quite regularly. This gap was closed by
the introduction of the STDEVS formalism, which is an extension of the DEVS
formalism. In [43] it is shown that a DEVS model is a special case of a STDEVS
model.
2.1
DEVS Models of Systems
In the following, the definition of a DEVS model is recapitulated for a better understanding. Doing so, we are following [65, 68]. Being precisely, we are talking about
atomic DEVS models in the following. Though coupled DEVS models have been
defined as well, which are more general from the structural point of view, it can
be shown that coupled and atomic DEVS models have the same expressive power
[70, 71]. For reasons of simplicty, we are thus restricting ourselves to atomic models.
Definition 1 (DEVS Model). An (atomic) DEVS model is an 8-tupel M “ pX, Y, Q,
qstart , δint , σ, δext , λq with
• X as set of input events
• Y as set of output events
• Q as set of states
• qstart P Q as initial state
• δint : Q ÝÑ Q as the internal transition function
• σ : Q ÝÑ R`
0 Y t8u as the time advance function
• δext : Q̄ ˆ 2X ÝÑ Q as the external transition function defined on Q̄ “ tpq, tq |
q P Q, 0 ď t ď σpqqu as the total set of states
• λ : Q ÝÑ Y Y tφu as the output function
Remark 1 (DEVS Model).
• The time advance function σ gives the lifetime of an internal state q P Q.
The internal state q 1 P Q entered after reaching the end of the lifetime σpqq
of q is determined by the internal transition function δint via q 1 “ δint pqq. As
time in the real world always advances, σpqq must be non-negative. The value
σpqq “ 0 indicates an instantaneous transition. If the system is to stay in an
internal state q forever, this is modelled by means of σpqq “ 8.
• The definition of the set Q̄ of total states is based on the idea to supplement
the internal state q P Q by the elapsed time e P r0, σpqqs since the system has
entered the state q P Q.
• External events influence the system as described by the external transition
function δext : Q̄ ˆ 2X ÝÑ Q. This function can handle sets of events representing simultaneously occurring events. Such a capability is necessary, because different events coming from different sources may arrive at the same
time.
3
• The output event λpqq is generated when the time e elapsed after entering the
state q P Q reaches the lifetime σpqq of the state q, i.e. e “ σpqq. At all other
times, the output is equal to the non-event φ.
Incoming events can trigger transitions between states. Thus, the dynamics
of DEVS models is based on the so-called time-advance function σ and the state
transition functions δint and δext . This leads to the following description of the
dynamics of a DEVS model M “ pX, Y, Q, qstart , δint , σ, δext , λq [72]. Let q P Q be
the actual state of M . We have to distinguish two cases. The first case is that
no external event occurs, the second case handles the arrival of events x P 2X .
In the first case, the system dynamics is determined by the lifetime σpqq of q and
the internal transition function δint , in the second case by the external transition
function δext .
In the first case — i.e. without the occurrence of external events x P 2X — the
system remains in the state q for time σpqq P R`
0 Y t8u. This means:
• For σpqq “ 0, the state q is immediately changed to the state q 1 P Q given by
q 1 “ δint pqq. This state transition can not be influenced by external events.
• For σpqq “ 8, the system stays in state q as long as no external events x
occur.
• For σpqq P R` , the system outputs the value λpqq after expiration of the
lifetime σpqq of the state q. Afterwards, the system state changes to q 1 P Q
given by q 1 “ δint pqq.
In the second case — i.e. with occurrence of external events x P 2X — the system
changes to a new state q 1 “ δext pq, t, xq, whereby pq, tq P Q̄ is the actual total state
of M when the set x of events occurs.
Summing up, events may trigger state transitions in a DEVS-model M . A state
transition may also occur automatically after a certain time. When entering a new
state, the model M may generate an output event again. In [31] it is shown that an
(atomic) DEVS has the computational power of a Turing machine. This means that
everything representable on a common computer will also be representable in the
DEVS paradigm. These are good news, since we are aiming at a general method.
It is especially helpful for representing cognitive aspects, which may be important
for the IT security perspective.
2.2
STDEVS Models of Systems
Stochastics is required for representing probabilistically occurring safety faults and
security incidents. This is done by replacing the deterministic DEVS formalism
by the corresponding probabilistic STDEVS formalism. In effect, an (atomic)
STDEVS-model is an (atomic) DEVS model supplemented by mappings Pint , Pext
providing transition probability informations for the internal and external transition
functions δint , δext . Thus, an (atomic) STDEVS model has the structure [15, 16]
M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq. In this definition, δint : Q Ñ 2Q is
the internal transition function, which describes the set of possible successor states
δint pqq Ď 2Q to the actual state q for situations without occurrence of an external
event. Thus, δint pqq contains all the subsets of Q that the next state can belong to.
The partial function Pint : Q ˆ 2Q Ñ r0, 1s gives the probability Pint pq, Q1 q that the
system model M being in state q makes a transition to a state q 1 P Q1 P δint pqq.
Concerning the requirements for the well-definedness of the probability spaces, see
[15, 16].
X
Q
Corresponding to δint , δext : QˆR`
0 ˆ2 Ñ 2 is the external transition function.
It describes the set of possible successor states q 1 P δext pq, t, xq Ď 2Q for a situation
4
with occurrence of external events x P 2X , when the system model M is in a total
X
Q
state pq, tq P Q̄. Analogous to Pint , the partial function Pext : Q ˆ R`
0 ˆ2 ˆ2 Ñ
1
r0, 1s gives the probability Pext pq, t, x, Q q that the system model M being in the
total state pq, tq makes a transition to a state q 1 P Q1 P δext pqq at occurrence of x.
For a STDEVS, the lifetime of a state q P Q is defined in the same way as in the
case of a DEVS, though concerning e.g. safety problems, a stochastic lifetime function σ would allow a much more canonical representation of stochastically occurring
faults. Being more precise, the lifetime of a state q P Q would then become a mapping σ from a state to a random variable with given stochastics. Such an approach
is not realized here, however. A straightforward generalization to a stochastic version allowing any time span between two consecutive faults would lead to a tree of
simulation traces containing branching points with uncountably many options for
a continuation.
Definition 2 (Language of a STDEVS system). Let M be a STDEVS model and
h P R`
0 be a nonnegative real number. The set of possible simulation traces of M
limited to the time interval s0, hs is called the language LpM, hq of M for the (time)
horizon h. Formally, a simulation trace is a sequence pρ1 , . . . , ρk q representing the
history of the corresponding simulation run consisting of elements ρj “ pqj , tj , Xj q P
X
Q ˆ R`
0 ˆ 2 . These elements ρj document the start resp. end states of all state
transitions qj´1 Ñ qj during the simulation run, eventually triggered by the set Xj of
incoming events. In this definition, the start state q0 of the first state transition (i.e.
j “ 1) is equal to the initial state q0 :“ qstart of M . The case Xj “ H indicates
an internal state transition qj´1 Ñ qj , otherwise an external state transition is
represented. The times tj indicate, how long M was in the state qj´1 for j ă k.
For j “ k, the time tk is limited by the horizon h. In this way, t1 ` ¨ ¨ ¨ ` tk “ h is
assured.
The language LpM, hq represents the possible behaviors of the system, which can
be produced by different event sequences as input. The informations contained in
the elements ρj of a simulation trace τ “ pρ1 , . . . , ρk q P LpM, hq are rich enough for
allowing a reconstruction of the probabilities for the occurrence of state transitions
qj´1 Ñ qj and of other properties.
For a DEVS resp. STDEVS model, an event may arrive anytime and may
lead to various state transitions. Though the number of internal states in a DEVS
resp. STDEVS model is finite and thus countable, of course, the set of total states
described as a combination of internal states and timing informations is not. It
can be shown, however, that in a DEVS model these principally uncountable many
cases of model behavior will only lead to countably many different state transition
sequences [35, 36]. Since a STDEVS model is in essence a DEVS model extended
by probabilities of state transitions, the representing state-transition graph remains
finite (in an appropriate representation) for a STDEVS as well. As a consequence,
the tree of possible state sequences of M has a countable size and each node in the
tree has only a finite number of branching options. For a given finite time horizon,
the tree of simulation traces is thus finite, too, as long as the state-transition graph
does not contain cycles with transition time equal to 0.
Since STDEVS models are a generalization of DEVS models and since the expressive power of the DEVS formalism corresponds to that of a Turing machine, the
class of systems representable by a STDEVS model includes all Turing computable
situations. Additionally, many stochastic discrete systems belong to this class as
well. Again, remember that the extension of the modeling paradigm by stochastic
aspects results from the requirement to represent faults and secury-related incidences.
5
2.3
Inclusion of Safety and Security Risk Cases
The proposed approach of risk assessment is based on a STDEVS model M of the
system S under consideration. It can not be expected, however, that an ordinary
model M of the system S is suitable from the perspective of the intended risk
assessment task. This is due to the fact that an ordinary model usually represents
only the nominal behavior of S. A risk assessment will consider off-nominal modes of
the system as well, which thus have be represented in the model. As a consequence,
we need an extension of M covering safety- and security-related problems like errormodes and vulnerabilities w.r.t. specific threats. This can be realized in a three-step
process.
In the first step, M is supplemented by components of the system environment
U , which are either affecting the system S or affected by S in a safety or security
relevant way. Dependent on the situations considered as relevant, this may include
components, which are related to safety and security only in an indirect way. Concerning security risk assessments, for example, the criticality of a violation of the
system security will sometimes depend on the exploitation of this violation. If sensitive data have been exposed, the attacker may choose the option just to indicate
that he has seen these data; but he may also use the option to publish these data.
The criticality of the two choices may be very different.
In the second step, the safety and security problems themselves are represented
in the model as well as components related to problem management. Especially the
adversarial scenario given by cyber security can only be handled adequately if both
sides — the attacked system S and the attacker — are modeled at a similar level
of detail. For example, a cognitive attacker requires a cognitive systems control as
counterpart for assuring an appropriate defense. Such a counterpart keeps track on
the attack to avoid unnecessary threats, and to organize the defense in an adequate
manner. These actions of the defender are contributing to the controllability of a
specific risk leading to a mitigation of its criticality.
In the third step, finally descriptions of the interactions between the system S
and its environment U are added using the new components, which are introduced
in the first end second step. These interactions are essential for safety and security
considerations as discussed in the introduction.
After these extensions, the model M describes both the nominal and off-nominal
behavior of the system S. Moreover, M is now necessarily a stochastic model, since
e.g. a fault typically occurs with a certain probability. This makes M suitable
for the intended risk assessment. The STDEVS formalism seems to be a suitable
modeling paradigm for the extended model M .
3
3.1
Principles of a Simulation-Based Risk Measure
Advantages of a Simulation-based Approach
The model M modified by the extensions made in the last section provides a description of the nominal and off-nominal system behavior. In the following, a risk
measure R is defined for an unified assessment of safety and security risks and a
simulation-based procedure for calculating R based on M is given. This includes,
how specific faults, threats/vulnerabilities, and other off-nominal modes are contributing to the risk R. At first, though, some general remarks are made for safety
and security.
In ’conventional’ functional safety, a risk assessment is typically restricted to
more or less instantaneous effects of a fault or a concurrent combination of faults.
Correspondingly, conventional risk measures are usually following a static concept.
The main reason for the preference of static methods is their simplicity. Static
6
methods provide results quite fast, they are well applicable to systems of significant
size, and in many cases the results are a sufficiently good approximation to the
real situation. In other cases, however, neglecting system dynamics will be an
oversimplification [18]. Sometimes only the explicit inclusion of system dynamics
allows the exploration of the propagation of effects across the system structure over
time. This holds especially for the phenomenon of emergence in dynamic systems,
i.e. the phenomenon of unexpected global behavior due to the behavior at the
microscopic scale. Emergence can of course apply to the effects of faults etc. as well
and may thus influence the results of an risk assessment. Indeed, [41] states that
static risk measures suffer severe limitations as soon as process safety is considered.
For security, the inclusion of dynamics is even more important. Cyber security
often assumes the existence of a cognitive attacker. This means that the attacker
may follow a long-term strategy, which may correlate the probabilities of problem
causes. Concerning risk, specifically the common assumption of statistical independence between consecutive events does no longer hold.
These arguments make the inclusion of dynamics in the risk assessment process
advisable. Such an inclusion is possible by simulating system dynamics. Though
this will make the risk assessment task more complicated, the higher quality — i.e.
precision — of the risk assessment and the additional insight seems worth the effort.
Taking dynamics into account means keeping track about changes in the system,
which may be of importance for the risk assessment task due to modified transition
probabilities, system parameters affected by the system evolution, or the occurrence
of additional risk cases [42]. Thus, a simulation provides a forecast capability of
potential future risks in some way.
For providing a notion of risk, which includes the dynamics of the system, we will
take a closer look at the course of action after the occurrence of a fault or a realized
threat. We start our considerations with a nominally behaving system. If a component of the system starts to behave off-nominal, then the system will usually alter the
path of dynamics. In a STDEVS model M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext , λq,
this is represented as a state transition q1 Ñ q11 , q1 , q11 P Q. The new state q11 P Q
may be the first element of a state transition sequence, which transmits the information about the occurrence of the problem cause — in the following called cause for
short — to other parts of the system (or its environment). There, the consequences
of the cause may become effective by executing another change in the system state,
i.e. a state transition q2 Ñ q21 , q2 , q21 P Q2 . Then the new state q21 is the (potentially
disadvantageous) effect of the cause q1 Ñ q11 . Interpreting a cause as start point of
a certain behavior the effect can be considered as a (disadvantageous) consequence
of the behavior resulting from the cause.
Such a cause-and-effect resp. causality related perspective of risk is discussed
in [23, 21], whereby effects are also called consequences. This kind of perspective is
supported in [24] for safety and in [59] for security. Additionally, one has to note
that in the description of the general cause-effect relationship given above, the state
transitions q1 Ñ q11 and q2 Ñ q21 need not necessarily be different.
3.2
Criticality of a Simulation Trace
Main topic of the last section is the structural representation of system faults and
threats/vulnerabilities, which may contribute to the risk R, in the model M . This
is an important step towards calclulating R, because we are now able to derive
the existence of potential problems from the model M . For actually evaluating the
contribution of this specific problem to the overall risk quantitatively, attributes have
to be added for describing the properties of the problem under consideration. As
typical for quantifying a risk, one has to know how frequent and how severe a specific
system problem is. The severity is given as criticality c : Q̄ Ñ R`
0 defined on the
7
total states Q̄ of the STDEVS model M . It measures the amount of disadvantages
resulting from the occurrence of a specific state q P Q for a certain duration t P R`
0.
According to this purpose, cpq, tq P R`
will
be
a
nonnegative
real
number.
States
0
with criticality larger than zero are representing modes of the system, which may
contribute to the overall risk.
Definition 3 (Criticality of an Effect). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext ,
Pext , λq be a STDEVS model. Let τ P LpM, hq be an element of the language of M ,
i.e. a simulation trace of M , for the (time) horizon h. The trace τ “ pρ1 , . . . , ρk q,
X
k ě 1, with ρj “ pqj , tj , Xj q P Q ˆ R`
gives the states qj together with their
0 ˆ2
lifetimes tj and thus the total states q̄j “ pqj , tj q. Then the criticality of a total
`
state q̄j “ pqj , tj q is given by cpqj , tj q. Formally, c is a mapping c : Q ˆ R`
0 Ñ R0 .
In the realm of criticality, both qj and q̄j “ pqj , tj q are called an effect.
A simulation trace τ may contain many effects q̄1 , . . . , q̄k . Since these effects
q̄j can at least potentially interact with each other, the overall criticality cpτ q of
the simulation trace τ is usually calculated in a more complex way than simple
summation of the single criticalities cpq̄j q. Sometimes, an additional problem can
be neglected, because it does not influence the overall outcome. It is unimportant,
for example, that a leaking fluid creates a hazard to slip, if the area of leakage is
located in the center of a large explosion. On the other hand, some combinations
of hazards may produce dangers disproportionally high. An example would be the
disposal of two irritant chemicals, producing a deadly poison in combination [20].
Hazards and threats can also be uncorrelated with each other. As a conclusion, the
criticality measure c for simulation traces has to take the variety of relationships
between hazard and threat effects into account. The precise shape of c will depend
on the specific application.
Definition 4 (Criticality of Effects). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext ,
λq be a STDEVS model. Let τ P LpM, hq be an element of the language of M ,
i.e. a simulation trace of M , for the (time) horizon. The trace τ “ pρ1 , . . . , ρk q,
X
k ě 1, with ρj “ pqj , tj , Xj q P Q ˆ R`
gives the states qj together with their
0 ˆ2
lifetimes tj and thus the total states q̄j “ pqj , tj q P Q̄. For handling stepwise system
degradations and multiple failures, the domain of c has to be extended from a single
total state to a (temporally ordered) sequence q̄ “ pq̄1 , . . . , q̄k q. Then, the extended
criticality assignment function c has the signature c : Q̄ ˆ ¨ ¨ ¨ ˆ Q̄ Ñ R`
0.
The definition above extends the criticality assignment function c in such a way,
that criticality correlations can be taken into account (see figure 2). The lifetimes tj
of the total states q̄j provide informations about time differences between the effects,
which may influence c as well. If the criticality correlation depends on additional
parameters, the values of these parameters can typically be coded in the states Q
of a STDEVS model.
3.3
Probability of a Simulation Trace
The safety and security aspects lead to a probabilistic system S. Accordingly, its
overall dynamical behavior displays a tree instead of a single path. The probability
of taking a specific branching option in the tree is given at the elementary level by
the probability ppγq of the corresponding transition γ in the STDEVS model M of S.
For calculating the probability ppτ q of a whole simulation trace τ , which may results
from several such branching choices γi , we have to compose the probabilities ppγi q
assigned to these choices γi with each other. This can be done in the usual way with
help of the Bayes rule (see figure 1). Using Bayes rule has many advantages. Being
based on conditional probabilities, it may support the inclusion of uncertainties and
soft informations like the subjectivity of risk [9, 41] in the formalism.
8
Ñ q 11
ppq 1
q1
art
Ñ
q
ppq
1 Ñ
q1r q
q 1q
t
ppq s
τ11
..
q1r
τ1r
qm1
τm1
..
qstart
ppq
sta
q11
rt
Ñ
qm
1q
Ñ qm
ppq m
q
qm
ppq
m
Ñq
ms q
..
qms
τms
Figure 1: The simulation of a determninistic model gives a unique sequence τ
of system states. For stochastic models, the state sequence diversifies to a tree
of possible simulation traces. The probability of transiting to a specific successor
state at a branching point in the tree is determined by the probability Pint pq 1 , tq 2 uq
assigned to the corresponding state transition q 1 Ñ q 2 . Let us take a closer look at
the simulation trace τ11 representing the state sequence qstart Ñ q1 Ñ q11 . Using
the abbreviations T :“ qstart Ñ q1 and T 1 :“ q1 Ñ q11 , the probability ppτ11 q of the
occurrence of trace τ11 is equal to the probability ppτ11 q “ ppT ^ T 1 q that both state
transitions T, T 1 occur. Applying Bayes rule, it holds ppT ^ T 1 q “ ppT q ¨ ppT | T 1 q.
In the example, ppT q “ ppqstart Ñ q1 q is the probability that the state q1 is reached
from the start state qstart . The probability ppT | T 1 q on the other hand is the
probability that from the state q1 , which have been reached after execution of T , a
transition to the state q11 takes place. This means ppT | T 1 q “ ppT 1 q “ ppq1 Ñ q11 q.
Definition 5 (Probability of Cause). Let M “ pX, Y, Q, qstart , δint , Pint , σ, δext , Pext ,
λq be a STDEVS model. Let γ “ pq, t, X 1 , q 1 q be a state transition q Ñ q 1 between
states q, q 1 P Q eventually triggered by a set X 1 of external events (X 1 “ H is a valid
choice) at lifetime t of state q. Then the probability of executing γ is designated as
ppγq. The value of ppγq is given by the internal transition probability Pint pq, tq 1 uq
for X 1 “ H and by the external transition probability Pext pq, t, X 1 , tq 1 uq for X 1 ‰ H
with the system being in the total state pq, tq. The 4-tupel γ represents a so-called
cause.
Definition 6 (Probability of a Sequence of Causes). Let M “ pX, Y, Q, qstart , δint ,
Pint , σ, δext , Pext , λq be a STDEVS model. Let τ P LpM, hq be an element of the
language of M , i.e. a simulation trace of M , with (time) horizon h. Assigned to
X
τ “ pρ1 , . . . , ρk q with ρj “ pqj , tj , Xj q P Q ˆ R`
is the (temporally ordered)
0 ˆ2
sequence γ “ pγ1 , . . . , γk q of state transitions. Formally, γj is defined as γj :“
pqj´1 , tj , Xj , qj q. Remember, that it holds q0 :“ qstart . Then the probability of the
occurrence of the sequence γ is designated as ppγq and given by
ppγq “ ppγ1 q ¨ ppγ1 | γ2 q ¨ ¨ ¨ ¨ ¨ ppγ1 , . . . , γk´1 | γk q
9
according to Bayes rule. The expression ppγ1 , . . . , γj´1 | γj q results from the fact
that when the state transition γj is triggered, the state transitions γ1 , . . . , γj´1 were
already executed and have set the preconditions for γj .
3.4
A Simulation-Based Risk Measure
A specific behavior of the model M corresponds to a specific simulation trace τ “
pρ1 , . . . , ρk q P LpM, hq. Using the causes γ “ pγ1 , . . . , γk q and the effects q̄ “
pq̄1 , . . . , q̄k q belonging to the trace τ , we are now able to assign both a probability
and a criticality to τ via the measures ppγq and cpq̄q defined in the last section.
Definition 7 (Probability and Criticality of Simulation Traces). Let M be a STDEVS
model and h P R`
0 be a nonnegative real number being the horizon of the simulation.
Let τ P LpM, hq be an element of the language of M , i.e. a possible simulation
trace of M , for the (time) horizon h. The trace τ “ pρ1 , . . . , ρk q is associated with a
sequence γ “ pγ1 , . . . , γk q of causes and a sequence q̄ “ pq̄1 , . . . , q̄k q of effects. Then
the probability ppτ q and the criticality cpτ q of the trace τ are defined as ppτ q :“ ppγq
and cpτ q :“ cpq̄q.
The probability ppτ q and criticality cpτ q assigned to a simulation trace τ will
depend on the length of τ , i.e. on the given horizon h. If the horizon of the
simulation is increased, the extended trace may contain additional causes and may
thus have a modified probability ppτ q; similarly, the occurrence of additional effects
on the extended trace may change its criticality cpτ q. Using the probability ppτ q
and criticality cpτ q of the trace τ we will now define a risk measure R for a trace τ .
Definition 8 (Risk Measure for Simulation Traces). Let M be a STDEVS model
`
and h P R`
0 be a horizon. Then a risk measure R : LpM, hq ÝÑ R0 can be defined
for the simulation traces τ P LpM, hq of M by assigning a nonnegative real value to
τ defined by Rpτ q “ ppτ q ¨ cpτ q.
The overall behavior of a model M is represented by the set of all possible
simulation traces. It is thus plausible to define a risk measure for M as sum over
the risk values Rpτ q assigned to the different simulation traces τ P LpM, hq of M .
In this way, the risk R assigned to the system model M is the sum of the criticalities
cpτ q of the traces τ P LpM, hq weighted by their probabilities ppτ q. This corresponds
to the classical form of a risk measure as expectation value of the criticality over all
possible cases.
Definition 9 (Risk Measure for DEVS Systems). Let us designate the class of all
STDEVS models by M. Let M P M be a STDEVS model and h P R`
0 be a horizon.
`
parameterized
by
the
horizon
h is defined
Then a risk measure R : M ˆ R`
ÝÑ
R
0
0
on M by
ÿ
ÿ
RpM, hq :“
Rpτ q “
ppτ q ¨ cpτ q
τ PLpM,hq
4
4.1
τ PLpM,hq
Properties of the Simulation-Based Risk Measure
Simulation-Based vs. Traditional Approaches
The capability of the risk measure R to reproduce classical risk measures of safety
and security at least approximatively, provides a good argument for the plausibility
of R. Indeed, a very small time horizon h restricts the system dynamics in such
a way that LpM, hq is limited to almost trivial sequences consisting typically of
just one cause and one effect. Under these conditions, RpM, hq reproduces more
10
q4
p4
p3
q2
p2
q3
p5
q5
p9
p6
q6
p7
q7
p8
q8
q9
p14
q1
p10
p13
q10
q11
q12
q13
q18
p15
q15
p16
q16
c10
q14
q17
p18
p19
q19
p20
c12
c16
q20
τ
c20
Figure 2:
The figure shows the progressively diversifying state tree produced
by the simulation of a stochastic model. The simulation trace τ contains several
disadvantageous consequences occurring in the states q10 , q12 , q16 , and q20 . These
disadvantages are quantified by the criticalities c10 , c12 , c16 , and c20 . When assessing
the overall criticality cpτ q, all the c10 , c12 , c16 , and c20 have to be taken into account
and calculated with each other.
or less the classical safety risk measure R1 applied e.g. by the FMEA method. In
the case of comparatively ’simple’ systems, the errors induced by the simplifying
assumption will usually remain small. Then, R1 may be an acceptable replacement
for the risk measure RpM, hq. For ’complex’ systems, the simplifications become
either unrealistic (e.g. cascading failures in power grids), or insufficient (e.g. nuclear
power plants), or will lead to results containing significant errors.
Structurally, the risk measure RpM, hq of definition 9 and the classical safety risk
measure R1 are similar. According to [39], R1 is the sum of all losses over all potential
problems weighted by their likelihoods. Main difference besides of the restriction
h Á 0 for R1 is that [39] speaks about likelihood and definition 9 about probability.
This is caused by different perspectives. Whereas [39] uses an analytic perspective
based on observations identifying equivalent problems in different contexts, the
model-based approach proposed here generates all possible evolution paths in an
individual way. Though technically, likelihoods and probabilities maybe different,
but coincide with respect to their meaning. Summing up, we can state that the
classical notion of risk is approximately reproduced by the simulation-based risk
measure under the restriction h Á 0 given above. Thus, our risk measure definition
seems to be fine for safety risks.
Let us now consider the situation from the security risk point of view. The
classical risk measure R2 used for security applications depends on another set of
parameters than the classical safety risk measure R1 . Whereas safety defines risk as
a product of the probability, that a hazard is realized, and its criticality, security
takes vulnerability as explicit factor into account [26, 60] according to
risk “ threat ˆ vulnerability ˆ criticality
Since we already demonstrated the approximate correspondence between the proposed simulation-based risk measure R and the classical safety risk measure R1
under the simplifying assumption h Á 0, it suffices to show the embeddability of
the security risk definition R2 in the safety risk definition R1 for indicating an
11
association between R and R2 . Such an embedding can be constructed in the following way. Since both definitions have criticality in common, the attributes of
threat and vulnerability have to be put into relation to the probability of safety
risks. More precisely, probabilities for the occurrence of specific threat/vulnerability combinations have to be given. Though quantitative risk-based considerations
are not very common in IT security, they have been successfully elaborated anyway
e.g. in [1, 4, 49, 50, 59, 63]. Indeed, attack methods like social engineering can
be described very well by means of success probabilities [56]. As another example,
effort measures typically used e.g. for cryptanalysis can be interpreted as probabilities by considering the ratio between successful attacks and overall attack trials
[2]. Though this does not show the desired embeddability rigorously, it makes it at
least plausible. The paper [64] supports this view by giving an explicit embedding.
Additional support for the possibility to assign probabilities to threat-vulnerability
pairs is provided by attack trees defining probabilities for the realization of a specific
attack [3, 58].
Besides of the construction of the embedding given above, it exists another argument for a close relationship between safety and security risks. The notion of risk
used in environmental safety domains like toxicology and ecology is bridging safety
and security as well. It is based on the terms of exposure and impact [30, 45], which
have a close correspondence to the terms of threats and vulnerabilities used in cyber
security. The exposure-impact concept of environmental risk takes external reasons
of risks into consideration similar to security and contrary to technical safety. Thus,
safety-related impacts correspond to vulnerabilities and safety-related exposures to
security threats. In effect, the overall probability of an actually occurring risk may
be thought of as a product of the probability, that a specific problem raises and
the probability that the problem is indeed able to affect the system. The topic is
discussed further e.g. in [56, 59, 61, 66].
4.2
(Non)Computability of the Simulation-Based Risk Measure
We have already mentioned the large computational effort required for calculating
RpM, hq. However, there are more fundamental questions to be discussed in this
context. For example, it is natural to ask for the computability of RpM, hq for
h Ñ 8. As it turns out, the risk measure RpM, 8q is usually enumerable but not
decidable due to the infinite size of the language LpM, hq. This is an analogon to
the undecidability results of many other questions like the issue whether a piece of
code is a self-replicating malware or whether a control process will still terminate
after the infection with a specific malware.
Since the extrapolation of the system dynamics can lead to evolution paths of
infinite length, a criterion has to be given when the ’simulation’ has to stop for
assuring decidability. This is done here by using the time horizon h. Its influence
on the risk assessment is decisive. If a small h triggers a stop too early, devastating
hazards may be missed; if the assessment process stops too late, the determination
of the risk may be compromised because too much effort is wasted on unimportant
aspects. This reminds at the quiescence search of algorithmic game theory [62]. In
effect, no reliable stopping criterion can be formulated in an absolute sense.
12
5
Example Power Grids
5.1
Power Grid Systems and their Faults and Threats
The approach for a unified assessment of safety and security risks proposed here
has many advantages from the theoretical point of view. At the downside, a systematic processing of all possible evolution paths based on simulation runs requires
a significant computational effort. Though this makes an application in practice
difficult, some properties of the corresponding system may indicate candidates of
suitable application domains.
• For providing additional insight compared to classical risk assessment methods, the system should be prone to both safety and security risks. Furthermore, the system dynamics should enable fault and threat propagation.
• For assuring a simple systems model, the system should be as homogenous as
possible. Furthermore, the risks associated with the system should be easily
representable (e.g. by a flag indicating whether a component is working or
not).
Distribution networks like power grids [55] have the desired properties. At the
moment, power grids are intensively studied in Germany due to the intended exit
from nuclear and fossil energy sources [13], which is accompanied by a transition
from a centralized continuous to a decentralized, more or less fluctuating power
supply. This requires corresponding modifications of the power grid itself, which
have to be assessed w.r.t. potential safety and security risks.
5.2
Model Structure
Using a model of power grids, we demonstrate the principles of a combined simulationbased safety and security risk-assessment. We will not develop the corresponding
DEVS model in detail but restrict ourselves to the concept level.
The power grid is represented as network pV, Eq with nodes V and edges E
between the nodes. Each edge e P E has two attributes, its flow capacity ae and
its actual load la . The actual load la is determined by the flow across the network
resulting from the supplies and demands Cv P R at the network nodes v P V . The
attribute Cv of the nodes v P V indicates a power consumption of an amount |Cv |
in the case of Cv ă 0. For Cv ą 0, the node v is producing power with an amount of
Cv . The ratio between flow capacity ae and actual load le determines the probability
pe that the link e P E will fail in the next time cycle. As far as possible, the node
v will try to avoid loads le exceeding the flow capacity ae significantly for keeping
the failure probability pe low. The possible failures of the edges e P E represent the
safety aspects of the network pV, Eq.
Criticalities cv assigned to the nodes v P V quantify the disadvantagous effects
of a power loss for the consumers supplied by v. The necessity to consider multiple
concurrent failures requires a refined assessment taking correlations between node
failures (and thus the corresponding criticalities) into account. Imagine a situation
in which a hospital does not accept new patients due to power loss. Then new
patients have to be transported to other hospitals located nearby, which may be
usually acceptable. If the power loss does not affect a single hospital but all hospitals
of a whole region, the situation is much more severe due to the long distances for
transports to a region with intact power supply, say, 200 km away. Hence, the
criticality c assigned to such a situation may be considerably larger than the sum
of the criticalities cj assigned to power-loss situations for single hospitals.
As described above, the nodes v P V control the power flow across the network
pV, Eq in such a way that the actual loads la on the edges e P E are kept into the
13
limits given by the edge capacities ae in the best possible way. For this purpose,
the nodes v P V use informations provided locally by other nodes v 1 P V and are
distributed via an information network pV, F q. These informations consist of the
states of the edges e P E incident to v 1 (working resp. not working) and of the power
consumption or production at v 1 given by Cv1 . They provide (subjective) knowledge
about the power grid pV, Eq, which enables v to schedule the power flow incoming at
v across the edges carrying the power outflow. As a consequence, every edge f P F of
the information network pV, F q is a vulnerability, because a potential attacker may
influence the power grid functionality by modifying the transmitted informations.
Such a modification may happen intentionally with a certain probability pf , which
represents the security part of the model.
5.3
Model Dynamics
For assessing the risk of network failure, safety and security aspects have to be
taken into account simultaneously. Let us take a look at the risks associated with
the simple power grid depicted in figure 3. The components of the given network
consist of a single power producing node NP and several nodes consuming power.
The nodes are connected with each other by power transmission lines. Let us
assume that the control component of the node NC becomes a victim of a cyber
attack. The attacker switches off a power transmission line, say the connection
e4 between the nodes NC and ND . Now these nodes are not directly connected
anymore. The breakdown of this transmission line changes the probabilities of
many other potential faults due to the feedback mechanisms contained in the given
example. The power supply of the four nodes ND , NE , NF , NG is not provided by
the two lines e4 between NC and ND and e5 between NC and NE anymore. Only
one of these connecting lines is left. The system tries to preserve the availability
of the grid by rescheduling the power flow interrupted by the failure of e4 . The
rescheduling leads typically to a higher load for the remaining operational network
elements, which in turn leads to an increased probability of failure for them. This
may lead to the failure of the next component of the network within short notice.
When taking the rescheduling functionality of the network into consideration, an
risk resp. reliability assessment considering only the instantaneous situation at the
beginning is not valid anymore.
In effect, the rescheduling of the power flow may lead to a so-called cascading
failure switching off large parts of the network. For the handling of such a cascading
failure, the conventional methods of safety risk assessments are inappropriate [14],
because this requires the inclusion of fault propagation mechanisms and thus an explicit modeling of system dynamics. The simulation-based risk measure presented
here has such a capability and can thus handle a stepwise degradation of system capabilities and functionalities. Simulating system dynamics allows to check whether
the effects of a fault or a fault sequence may act as causes of new faults due to
overloads of remaining components. Describing the dynamics of such a cascade failure, and even more, predicting it trustworthy, is still a challenge for the reliability
theory of networks [7]. The capability of such assessments would be of high interest,
however, because the breakdown of the complete power grid (or at least essential
parts of it) is a critical risk. Human lifes may depend on a working power supply
(hospitals, infrastructure, military defence, etc.).
If the initial failure of the connection line of the power grid is caused by a
self-replicating malware propagating across the information network pV, F q, the
resulting situation is more complicated. Two kinds of dynamics are interacting
with each other. First, malware is propagating along control nodes of the power
grid. Second, if a power line fault happens, a fault sequence may be the consequence.
These two kinds of dynamics are interacting because malware-infected control-nodes
14
NP
CP
e1
CA
NA
e2
NC
e3
NB
CB
NE
CE
e5
e4
CD
ND
e6
CF
CC
NF
e7
e9
e8
NG
CG
Figure 3: A simple power grid, represented as a network. An explanation can be
found in the text.
may not react in the intended fault-mitigating way and instead worsen the problem.
Another potential complication concerning the control mechanism would be the
arousal of a new fault during the management of the actual fault leading to interferences between the fault propagation mechanism and the problem solution task of
the control process. Furthermore, the individual control tasks for managing faults
raised concurrently may interfere, too.
6
Outlook
The rapid spread of embedded systems lead to the statement that there is no safety
without security and no security without safety. Accordingly, the paper develops a
unified notion of risk applicable to both safety and security problems. This notion
uses a simulation based approach in the context of STDEVS models. Its application to power grids shows that the proposed approach can handle situations, which
are not appropriately dealt with conventional risk assessment methods. These advantages results from the inclusion of dynamics, which takes into account that
individual risk cases may occur concurrently and consecutively and that errors and
other off-nominal behaviors may propagate across the system. The simulation-based
approach considers all these effects implicitly; eventually emerging interactions between propagating effects are included as well. Questions of controllability are
calculated objectively instead of being estimated based on intuitive guesses.
Relying on a simulation model M offers another advantage. Risk cases can be
generated and assessed automatically based on M with its probability and criticality
attributes. Due to the large number of risk cases — remember that both safety and
security risk cases are considered here — the large number of items to be processed
makes the classical way of generating and assessing a list of risk cases manually
hardly feasible. Thus, an automated model-based risk assessment turns out to
be quite useful. The exploration of ways to refine the approach with respect to
computational tractability may be the topic of forthcoming research, however.
15
Acknowledgements
I would like to offer my special thanks to M. Grössler for many valuable remarks.
References
[1] Abrahamson, D., A. Sepeda, Expanding Known Process Safety and Risk Analysis Concepts to Manage Security Concerns, in Proceedings of the 40th Loss
prevention Symposium, 2006
[2] Alaboodi, Saad Saleh, Model-based Evaluation: from Dependability Theory to
Security, Doctoral Thesis, University of Waterloo, 2013
[3] Arnold, Florian, et al., Time-dependent analysis of attacks, International Conference on Principles of Security and Trust, Springer 2014
[4] Aven, Terje, A unified framework for risk and vulnerability analysis covering
both safety and security, Reliability Engineering & System Safety 92(6)(2007)
745-754
[5] Avizienis, A., J-C. Laprie et al., Basic concepts and taxonomy of dependable
and secure computing, IEEE Trans Depend Secur Comput, 1(2004) 11-33
[6] Axelrod, Warren, Engineering Safe and Secure Software Systems, Artech House
2012
[7] Baldick, R. et al., Vulnerability assessment for cascading failures in electric
power systems in Proceedings of Power Systems Conference and Exposition,
IEEE 2009
[8] Blom, Henk, et al., Safety risk assessment by Monte Carlo simulation of complex safety critical operations, Developments in Risk-based Approaches to
Safety. Springer 2006, pp. 47-67.
[9] Bobbio A., et al., Improving the analysis of dependable systems by mapping
FTs into Bayesian networks, Journal of Reliability Engineering and System
Safety 71(2001) 249-60
[10] Bosworth, Seymour, M. E. Kabay, Computer Security Handbook, Wiley 2002
[11] Branagan, Mark, A risk simulation framework for information infrastructure
protection. Dissertation, Queensland University of Technology, 2012.
[12] Brewer, DFC, Applying security techniques to achieve safety, in Proceedings
of the 3rd safety-critical systems symposium, Bristol, UK, 1993, pp. 246-56.
[13] Buchan, David, The Energiewende - Germany’s gamble, The Oxford Institute for Energy Studies, SP 26(2012), online http://www.oxfordenergy.org/
wpcms/wp-content/uploads/2012/07/SP-26.pdf
[14] Cadini, Francesco, et al., Using Centrality Measures to Rank the Importance
of the Components of a Complex Network Infrastructure, in Roberto Setola &
Stefan Geretshuber (Eds.), Critical Information Infrastructures Security, Third
International Workshop, Springer 2008
[15] Castro, R., E. Kofman, G. Wainer, A formal framework for stochastic DEVS
modeling and simulation, in Hassan Rajaei et al., Proceedings of the 2008
Spring Simulation Multiconference, Ottawa, Canada 2008, pp. 421-428
16
[16] Castro, R., E. Kofman, G. Wainer, A Formal Framework for Stochastic DEVS
Modeling and Simulation, in Transactions of the Society for Modeling and
Simulation International, 86(2010) 587-611
[17] Chi, S.-D., et al., Network Security Modeling and Cyber Attack Simulation
Methodology, in Vijay Varadharajan & Yi Mu, Information Security and Privacy, Proceedings of the 6th Australasian Conference, Sydney, Australia, Lecture Notes in Computer Science 2119(2001) 320-333
[18] Devooght, J., Dynamic Reliability: The Challenges Ahead, Fifth International
Workshop on Dynamic Reliability: Future Directions, Greenbelt, Maryland
1998.
[19] Dissanayaka, Anuradha, et al., Risk-based dynamic security assessment, IEEE
Transactions on Power Systems 26(3)(2011) 1302-1308.
[20] Draeger, J., Roadmap to a Unified Treatment of Safety and Security, in Proceedings of System Safety and Cyber Security, Bristol, UK, 2015
[21] Faber, M.H., et al., Principles of risk assessment of engineered systems, in
Proceedings of the 10th International Conference on Applications of Statistics
and Probability in Civil Engineering, Tokyo, Japan, 2007
[22] Felde, Magnus, Analyzing Security Decisions with Discrete Event Simulation.
Master Thesis, Gjøvik University College 2010
[23] Fenton, Norman, and Martin Neil, Measuring your Risks: Numbers that would
make sense to Bruce Willis and his crew, available online at http://www.
agena.co.uk/resources/white_papers/Measuring_Risks.pdf
[24] Fenton, Norman, and Martin Neil, Risk Assessment and Decision Analysis with
Bayesian Networks, CRC Press 2012
[25] Firesmith, D.G., Common Concepts Underlying Safety, Security, and Survivability Engineering, Technical Note CMU/SEI-2003-TN-033, Software Engineering Institute 2003
[26] Flammini, Francesco, et al., Optimisation of security system design by quantitative risk assessment and genetic algorithms, Int. J. of Risk Assessment and
Management 15(2/3)(2011) 205-221
[27] Fovino, Nai, M. Masera, Integrating Cyber Attacks within Fault Trees, In
Reliab. Eng. Syst. Saf. 94(2009) 1394-1402
[28] Gutierrez, Tomas Navarrete, Laurent Ciarletta, Vincent Chevrier, Multi-agent
simulation based control of complex systems, in Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, ACM
2014, pp. 1517-1518
[29] StJohn-Green, M., et al., Combined security and safety risk assessment - what
needs to be done for ICS and the IOTQ, in Proceedings of the 10th IET System
Safety and Cyber Security Conference 2015
[30] Hakkert, A.S., L. Braimaister, The uses of exposure and risk in road safety
studies, Report R-2002-12 SWOV Institute for Road Safety Research, Leidschendam 2002
[31] Hernandez, Alejandro, Norbert Giambiasi, State Reachability for DEVS Models, in A. Hernández, N. Giambiasi, Proc. of Argentine Symposium on Software
Engineering 2005, pp. 267-277
17
[32] Hopcroft, John E., Rajeev Motwani, Jeffrey D. Ullman, Introduction to Automata Theory, Languages, and Computation, Pearson 2013
[33] Hwang, Moon H., Qualitative Verification of Finite and Real-Time DEVS Networks, in Proceedings of 2012 TMS/DEVS, Orlando, FL, USA
[34] Hwang, M.H., Revisit of system variable trajectories, in Proceedings of the
Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S
Symposium, San Diego, CA, USA 2013
[35] Hwang, M.H., & Bernard Zeigler, A Reachable Graph of Finite and Deterministic DEVS Networks, in Proceedings of 2006 DEVS Symposium, Huntsville,
Alabama, USA, pp. 48-56
[36] Hwang, M.H., & Bernard Zeigler, Reachability Graph of Finite & Deterministic
DEVS, IEEE Transactions on Automation Science and Engineering 6(3)(2009)
454-467
[37] Jithavech, Id, & Krishna Kumar Krishnan, A simulation-based approach
for risk assessment of facility layout designs under stochastic product demands, The International Journal of Advanced Manufacturing Technology
49(1-4)(2010) 27-40
[38] Jonsson, E., & T. Olovsson, On the integration of security and dependability
in computer systems, in Proceedings of the IASTED international conference
on reliability, quality control and risk assessment, Washington, DC, USA 1992,
pp. 93-7
[39] Kaplan, S., & B. J. Garrick, On the Quantitavive Definition of Risk, Risk
Analysis Journal 1(1)(1981) 11-27
[40] Karnouskos, Stamatis, Stuxnet worm impact on industrial cyber-physical system security, in Proceedings of the 37th Annual Conference on IEEE Industrial
Electronics Society, IEEE 2011.
[41] Khakzad, Nima, Faisal Khan, Paul Amyotte, Safety analysis in process facilities: Comparison of fault tree and Bayesian network approaches, Reliability
Engineering & System Safety 96(8)(2011) 925-932
[42] Khakzad, Nima, Faisal Khan, Paul Amyotte, Dynamic risk analysis using bowtie approach, Reliability Engineering & System Safety 104(2012) 36-44
[43] Kofman, E., & R.D. Castro, STDEVS, A Novel Formalism for Modeling and
Simulation of Stochastic Discrete Event Systems, in Proceedings of AADECA,
Buenos Aires, Argentina, 2006
[44] Kriaa, S., et al., A Survey of Approaches Combining Safety and Security for
Industrial Control Systems, Reliab. Eng. Syst. Safe. 139(2015) 156-178
[45] Kron, W., Keynote lecture: Flood risk = hazard ˆ exposure ˆ vulnerability,
in Flood defence, Science Press 2002, pp. 82-97.
[46] Law, Averill M., Simulation Modeling and Analysis, Mc Graw Hill 2006
[47] Lee, R., M. Assante, T. Connway, ICS CP/PE (Cyber-to-Physical or Process
Effects) case study paper — German Steel Mill Cyber Attack. Technical report,
SANS ICS 2014
[48] Leveson, N., Engineering a Safer World, MIT Press 2012
18
[49] Littlewood, B., Dependability assessment of software-based systems: State of
the art, in Proceedings of the 27th international conference on software engineering, St.Louis, MO, USA 2005, pp. 6-7
[50] Littlewood, B, et al., Towards operational measures of computer security, Journal of Computer Security 2(1993) 211-29
[51] Mader, R., et al., A framework for model-based safety requirements roundtrip
engineering
[52] Mohaghegh, Zahra, Reza Kazemi, Ali Mosleh, Incorporating organizational
factors into Probabilistic Risk Assessment (PRA) of complex socio-technical
systems: A hybrid technique formalization, Reliability Engineering and System
Safety 94(2009) 1000-1018
[53] Mueller, Paul, & Babak Yadegari, The Stuxnet Worm, Departement
des sciences de l’informatique, Université de l’Arizona 2012, online available at http://www.cs.arizona.edu/~collberg/Teaching/466-566/2012/
Resources/presentations/2012/topic9-final/report.pdf
[54] Nejad-Hosseinian, Seyed Hamed, Automatic generation of generalized event
sequence diagrams for guiding simulation based dynamic probabilistic risk assessment of complex systems, ProQuest 2007
[55] Pappu, Vijay, Marco Carvalho, Panos Pardalos, Optimization and Security
Challenges in Smart Power Grids, Springer 2013
[56] Pieters, Wolter, et al., Reconciling Malicious and Accidental Risk in Cyber
Security, Journal of Internet Services and Information Security 4(2)(2014) 4-26
[57] Pietre-Cambacedes, L., & M. Bouissou, Cross-fertilization between safety and
security engineering, Reliability Engineering and System Safety 110(2013) 110126
[58] Wang, Ping, et al., Threat Risk Analysis for Cloud Security based on AttackDefense Trees, in Proceedings of the 8th International Conference on Computing Technology and Information Management, Seoul, Korea, IEEE 2012, pp.
106-111
[59] Pirzadeh, Jonsson, E., A Cause and Effect Approach Towards Risk Analysis,
in James Walden, Laurie Williams, Proceedings of the Third International
Workshop on Security Measurements and Metrics 2011, pp. 80-83
[60] Robbins, Philip, Security Risk Analysis and Critical Information Systems, Master Thesis, Hawaii Pacific University 2011
[61] Rot, Artur, IT Risk Assessment: Quantitative and Qualitative Approach, in
Proceedings of the World Congress on Engineering and Computer Science, San
Francisco, USA 2008
[62] Russell, Stuart, & Peter Norvig, Artificial Intelligence: A Modern Approach,
Prentice Hall 2013
[63] Said, Fadi Haj, Security-based risk assessment for software architecture, Doctoral Dissertation, West Virginia University 2011
[64] Salvati, Domenico, Management of information system risks, Doctoral Thesis,
ETH Zürich 2008
19
[65] Solcány, Viliam, Simulation Algorithms for DEVS Models, 2008, available online at http://www2.fiit.stuba.sk/~solcany/files/devs_article.pdf
[66] Sørby, Karine, Relationship between safety and security in a safety-security
critical system: Safety consequences of security threats, 2003
[67] Spellman, F., & N. Whiting, The Handbook of Safety Engineering: Principles
and Applications, Government Institutes 2009
[68] Vangheluwe, H.L.M., DEVS as a common denominator for multi-formalism
hybrid systems modelling, in A. Varga, Proceedings of the IEEE International
Symposium on Computer-Aided Control System Design 2000, pp. 129-134
[69] Winkelvos, Timo, Carsten Rudolph, Jurgen Repp, A property based security
risk analysis through weighted simulation, in Proceedings of Information Security South Africa, IEEE 2011
[70] Zeigler, Bernard, Multifacetted Modeling and Discrete Event Simulation, Academic Press 1984
[71] Zeigler, Bernard, Tag Gon Kim, Herbert Praehofer, Theory of Modeling and
Simulation, Academic Press 2000
[72] Zeigler, Bernard, DEVS today: Recent advances in discrete event-based information technology, in Proceedings of the 11th IEEE/ACM International
Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, IEEE 2003
[73] Zeigler, B., & S. Vahie, Devs formalism and methodology: unity of conception/diversity of application, in Proceedings of the 25th Winter Simulation
Conference, Los Angeles, CA 1993, pp. 573-579
20
| 3cs.SY
|
arXiv:1606.08151v1 [math.ST] 27 Jun 2016
Bernoulli 22(4), 2016, 2521–2547
DOI: 10.3150/15-BEJ736
Methods for improving estimators of
truncated circular parameters
KANIKA* and SOMESH KUMAR**
1
Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur-721302,
West Bengal, India. E-mail: * [email protected]; ** [email protected]
In decision theoretic estimation of parameters in Euclidean space Rp , the action space is chosen
to be the convex closure of the estimand space. In this paper, the concept has been extended
to the estimation of circular parameters of distributions having support as a circle, torus or
cylinder. As directional distributions are of curved nature, existing methods for distributions
with parameters taking values in Rp are not immediately applicable here. A circle is the simplest one-dimensional Riemannian manifold. We employ concepts of convexity, projection, etc.,
on manifolds to develop sufficient conditions for inadmissibility of estimators for circular parameters. Further invariance under a compact group of transformations is introduced in the
estimation problem and a complete class theorem for equivariant estimators is derived. This
extends the results of Moors [J. Amer. Statist. Assoc. 76 (1981) 910–915] on Rp to circles. The
findings are of special interest to the case when a circular parameter is truncated. The results
are implemented to a wide range of directional distributions to obtain improved estimators of
circular parameters.
Keywords: admissibility; convexity; directional data; invariance; projection; truncated
estimation problem
1. Introduction
Problems of estimation when the parameter space is restricted are encountered often in
practice. These restrictions arise due to prior information on parameters and they can be
in the form of bounds on the range or equality/inequality constraints of several parameters. For recent developments and discussions on various aspects of estimation procedures
in restricted parameter space problems, one may refer to [14, 15, 17, 18, 28] and references therein. Frequently in practical applications, we assume the random observations
taking values in Euclidean spaces. However, it sometimes may be more useful to represent them on circles/spheres/cylinders. In such cases, we employ directional distributions.
For instance, mortality data due to a specific disease may be better represented as circular data to study the seasonal pattern of the disease. There are numerous situations
This is an electronic reprint of the original article published by the ISI/BS in Bernoulli,
2016, Vol. 22, No. 4, 2521–2547. This reprint differs from the original in pagination and
typographic detail.
1350-7265
c
2016 ISI/BS
2
Kanika and S. Kumar
in biological, meteorological, astronomical applications, where directional data (circular/axial/spherical) arises [1, 8, 19]. However, little attention has been paid to problems
of estimating directional parameters under constraints. Rueda, Fernández and Peddada
[25] considered the estimation of the circular parameters under order restrictions. There
are situations when the parameter may lie on an arc of the circle. For example, the peak
of mortality rates due to respiratory diseases occurs during November to February.
One major consequence of placing restrictions on the natural parameter space is that
estimators derived using standard concepts of maximum likelihood, minimaxity, invariance, etc., become inadmissible. However, existing methods developed for Euclidean
spaces Rp are not directly applicable to directions which are represented to lie on unit
hypersphere with the center at origin Sp−1 = {x ∈ Rp : kxk = (xT x)1/2 = 1}. Topological properties of Sp−1 depend on the differential geometry of embedding Sp−1 in Rp
as x → x/kxk with x ∈ Rp . We need to suitably modify techniques available for Rp to
improve standard estimators of directions. In this paper, we consider the case of p = 2
and denote by S a unit circle. The elements of S can be specified by corresponding angles with respect to an arbitrary choice of zero direction and orientation. Let us define
by T = [0, 2π) the space of amplitudes of the unit vectors in S. The point on S corresponding to an angle α ∈ T is (cos α, sin α)T and the angle corresponding to a point
x = (x1 , x2 )T ∈ S is atan(x2 /x1 ), where the function atan(·) is given in (2.2). Note that
S and T are isomorphic.
Let random variable Z ∈ Z have an unknown probability distribution Pν , ν ∈ Ω. Let
the family {Pν , ν ∈ Ω} be dominated by a measure η. The support Z may be circle T,
torus Tk or cylinder R × T, etc.; however, the estimand h(ν) is circular, where h(·) is a
measurable function from Ω into T. The problem of estimating h(ν) is considered under
a circular loss function:
L(ν, δ) = 1 − cos(h(ν) − δ).
(1.1)
In the case when the parameter space is a subspace of Rp and the loss function is an
increasing function of Euclidean distance, the action space is chosen as a convex closure
of the range of estimand. Unlike this well-known result, it is demonstrated in Section 3
that analogous result does not necessarily hold for circular parameter h(ν) under the
loss L.
One of the major contributions was of Moors [22] (see [21], Chapter 3, also) to the
estimation problem of truncated parameters of a unknown family of distributions on Rp
dominated by a σ-finite measure. Estimators (except the constant ones) taking value near
the boundaries of action space with the positive probability turn out to be inadmissible
with respect to the squared loss function under certain conditions on the transformation
group. He considered invariance under a finite group with measure preserving elements
such that induced transformations of the action space satisfy the linearity property and
group of these transformations is commutative. Under this scenario, he constructed a
subspace of the original action space and proved that any invariant estimator taking
values outside this new action space with the positive probability is inadmissible and
dominated by its projection on the new action space. Later, Moors and van Houwelingen
Truncated circular parameters
3
[23] relaxed conditions of measure preserving and commutativity. Without dropping these
conditions, Kumar and Sharma [16] generalized the result of Moors [22] to a locally
compact group such that induced transformations on the action space are affine (stronger
condition than linear property) and loss function is an increasing function of Euclidean
distance. Along with these ideas, an analogous theory for circular parameter h(ν) is
developed in Section 4.
The outline of the paper is as follows. The concepts of distance formulae, convexity,
closure of a set and projections play a prominent role here. Section 2 provides the mathematical background of these concepts for T. In Section 3, we consider the estimation
of circular parameter h(ν) when it is restricted to lie on an arc of circle and estimation
space A is chosen as the convex closure of h(Ω). A complete class result for this estimation problem is obtained under certain conditions. Then the result is illustrated for
several directional distributions. In Section 4, we introduce invariance under a compact
group G in the estimation problem such that induced transformations on A satisfy the
circular property. Sufficient condition for inadmissibility of an G-equivariant estimator is
obtained. Applications of this result are demonstrated for both unrestricted or restricted
estimation problems. For restricted estimation problems, improved estimators obtained
in Section 3 are further improved using the result of Section 4.
2. Definitions and preliminary results
Before we embark on estimation problem, we introduce some preliminary results in this
section. For a subset A ⊂ T, Lebesgue measure, interior, convex hull, convex closure and
boundary of A are denoted by l(A), int(A), conv(A), cc(A) and bd(A), respectively.
2.1. Convexity
It is more convenient to deal with polar coordinates than Cartesian coordinates when
observations lie on a unit circle. We summarize the concept of convexity for the circle S
and then adopt it for the space T.
A geodesic ([27], page 15), on Riemannian manifold generalizes the line in Euclidean
space. In the context of Riemannian manifold M equipped with Riemannian metric, a
subset A ⊂ M is convex if minimal geodesic with the end points in A belongs to A. In the
case of S, great circles are geodesics. Minimal geodesic between any two points on S is
unique unless points are antipodal (diametrically opposite). Some concepts of convexity
on S were introduced in [4], Section 9.1. Here, we use convexity and strong convexity as
given below.
Definition 2.1 (Convex). A set A ⊂ S is convex if for any two points in A, there
exists a minor arc of great circle lying entirely in A joining them.
By convention, this definition allows antipodal points to lie in convex sets. Every
segment of a semicircle is a convex subset of S.
4
Kanika and S. Kumar
Definition 2.2 (Strongly convex). A subset A of S is strongly convex if A is convex
and does not contain antipodal points.
In the case of Rp , convex hull of any subset is the collection of all possible weighted
arithmetic mean of points in that subset. Analogously for a set A ⊂ S, the convex hull
of A is the smallest convex set (not necessarily strong convex) containing A, that is, it
consists of
(w1 x1 + · · · + wn xn )/kw1 x1 + · · · + wn xn k
(2.1)
Pn
for all nonnegative weights w1 , . . . , wn such that i=1 wi = 1 and for all x1 , . . . , xn ∈ A
provided the norm in the denominator is nonzero. The convex hull of two antipodal points
of S does not exist ([3], Section 2.3). Polar form of (2.1) is discussed in Section 2.2.
Extension of a fundamental theorem of Carathéodory for R2 to S can be stated as
below (see [3]).
Lemma 2.1. Each point in the convex hull of a set A ⊂ S can be expressed as normalized
weighted arithmetic mean of at most 2 points of A.
To extend definitions of convex and strong convex sets to the space T, we need certain
subsets of T. For α, β ∈ T, definitions for sets of type I, J , K and K1 are stated only for
intervals of form (α, β). They may be extended to intervals of other forms (α, β], [α, β)
and [α, β]. For α ≤ β, let
I(α, β) = (α, β),
J(α, β) = [0, α) ∪ (β, 2π),
I(α, β),
K(α, β) = I(α, β) or J(α, β),
J(α, β),
if 0 ≤ (β − α) < π;
if (β − α) = π;
if π < (β − α) < 2π.
Sets I[α, β] and J[α, β] contain all the angles corresponding to an arc joining two points
(cos α, sin α)T and (cos β, sin β)T in the positive and the negative directions, respectively.
Moreover, K[α, β] contains angles corresponding to the minor arc joining them.
Remark 2.1. Although in definition of I-type set, β is not allowed to take value 2π,
intervals (α, 2π) and [α, 2π) can be expressed as J(0, α) and J(0, α], respectively, for all
α ∈ T. For any α ∈ T, J(α, α) = T − {α} and J(α, α] = J[α, α) = J[α, α] = T.
For defining sets of type I, J and K, we have taken α ≤ β. The following definition
for K1 -type subsets of T does not have this restriction.
K(α, β),
if α ≤ β,
K1 (α, β) =
K(β, α),
if α > β.
Truncated circular parameters
5
Note that set K(α, β) is isomorphic to I(0, γ) with γ ∈ [0, π]. For 0 ≤ (β − α) ≤ π and
π < (β − α) < 2π, K(α, β) can be transformed to I(0, β − α) and I(0, 2π − β + α) using
rotation by angles 2π − α and 2π − β, respectively. Extending this argument, we have
the following result.
Lemma 2.2. Sets K1 (α, β), K1 (α, β], K1 [α, β) and K1 [α, β] with α, β ∈ T are isomorphic
to I(0, γ), I(0, γ], I[0, γ) and I[0, γ], respectively, with 0 ≤ γ ≤ π.
For studying topological properties, we consider the metric space (T, d) with the following definition of metric:
d(α, β) = 1 − cos(α − β),
α, β ∈ T.
√
Here, 2d simply returns lengths of chord between points (cos α, sin α)T and (cos β, sin β)T ,
respectively. Consider the following classes of subsets of T:
C1 = {T} ∪ {K1 (α, β), K1 (α, β], K1 [α, β), K1 [α, β] : α, β, ∈ T},
C2 = {K1 (α, β), K1 (α, β], K1 [α, β) : α, β ∈ T} ∪ {K1 [α1 , β1 ] : α1 , β1 ∈ T and |α1 − β1 | 6= π},
C3 = C1 − C2 = {T} ∪ {K1 [α, β] : α, β, ∈ T and |α − β| = π},
C4 = {∅, T} ∪ {I[α, β], J[α, β] : α, β, ∈ T and α ≤ β},
C5 = C1 ∩ C4 = {∅, T} ∪ {K1 [α, β] : α, β ∈ T and α ≤ β}.
Remark 2.2. Classes C1 , C2 and C5 consist of all convex, strongly convex and closed
convex subsets of T, respectively. Elements of C3 and C4 are closed subsets of T. Moreover,
sets belonging to C3 (except T) and C4 are corresponding to any minor arc and any arc
on the unit circle, respectively.
2.2. Circular mean direction
Since the arithmetic mean is not a suitable measure of central tendency for the angular
data, the circular mean direction is used ([12], page 13). The weighted circular mean
direction of the observations
φ1 , . . . , φn belonging to T with weights w1 , . . . , wn , wi ≥ 0
P
(i = 1, . . . , n) such that ni=1 wi = 1 is defined as
Pn
i=1 wi sin φi
P
,
φ̄w = atan
n
i=1 wi cos φi
with the following definition of atan(·)
−1
tan (s/c),
π
+
tan−1 (s/c),
s
atan
= π/2,
c
−1
2π + tan (s/c),
not defined,
if
if
if
if
if
c > 0, s ≥ 0;
c < 0;
c = 0, s > 0;
c ≥ 0, s < 0;
s = 0, c = 0,
(2.2)
6
Kanika and S. Kumar
where tan−1 (·) is the standard inverse tangent function taking values in (−π/2, π/2).
The definition of atan(·) function ensures the following property.
Lemma 2.3. For all φ ∈ T and a ∈ R, we have
tan φ + a
atan
= {φ + tan−1 (a)} mod (2π).
1 − a tan φ
Note that φ̄w is polar form of (2.1) if φi is corresponding angle to xi ∈ S for all
i = 1, . . . , n. The following proposition proves that convex combination (weighted circular
mean direction) of finite collection of the points in convex subset of T is again in that
subset.
PropositionP2.1. Let A ∈ C1 (convex), φ1 , . . . , φn ∈ A and w1 , . . . , wn be nonnegative
weights with ni=1 wi = 1. Then weighted circular mean direction φ̄w of these observations
belongs to A, if it is defined.
Circular mean direction of a circular random variable θ is defined as
CE(θ) = atan(E sin θ/E cos θ).
An elementary result given in [7], page 74, states that if random variable X lies in convex
subset of Rp with probability one, E(X) lies in the same subset. An analogous result for
T is given below.
Proposition 2.2. If A ∈ C1 (convex) and θ is a random angle such that Pr(θ ∈ A) = 1,
the mean direction CE(θ) ∈ A if CE(θ) exists. Furthermore, if A ∈ C2 (strongly convex),
CE(θ) always exists. If A ∈ C3 (convex but not strongly), CE(θ) does not necessarily exist.
2.3. Projection
The concept of projection in Rp is adopted to define projections of angles in T.
Definition 2.3. The projection of an angle φ ∈ T on a nonempty set A ∈ C4 (closed) is
defined to be the unique point φ0 ∈ A such that
d(φ, φ0 ) = inf d(φ, ψ).
ψ∈A
The case when A = T is trivial. For α, β ∈ T, let γ = (α + β)/2. If A is of from I[α, β],
φ0 is given by
if φ ∈ I[α, β];
if φ ∈ I[α, β];
φ,
φ,
φ0 = α,
if φ ∈ K1 (α, π + γ];
or
α,
if φ ∈ K1 (α, π + γ);
β,
if φ ∈ K1 (β, π + γ);
β,
if φ ∈ K1 (β, π + γ].
Truncated circular parameters
7
Note that the two definitions are equivalent except when φ = π + γ. For φ = π + γ, first
and second ones yield φ0 = α and φ0 = β, respectively. This is so because d(α, π + γ) =
d(β, π + γ). If A is the form of J[α, β], φ0 is given by
φ,
φ0 = α,
β,
if φ ∈ J[α, β];
if φ ∈ I(α, γ];
if φ ∈ I(γ, β);
or
φ,
α,
β,
if φ ∈ J[α, β];
if φ ∈ I(α, γ);
if φ ∈ I[γ, β).
Once again the two definitions are equivalent except when φ = γ.
Let A be a closed convex subset of Rp and x ∈ Rp . The projection x0 of x ∈
/ A on A
satisfies
kx0 − yk < kx − yk
for all y ∈ A.
An analogous statement holds only for specific closed convex subsets of T. The following
result can be easily proved using geometrical arguments.
Lemma 2.4. Let φ0 be the projection of an angle φ ∈
/ A on a set A ∈ C5 (closed convex).
The inequality
d(φ0 , ψ) < d(φ, ψ)
for all ψ ∈ A
holds iff A = I[α, β] with β < α + (2/3)π or A = J[α, β] with β > α + (4/3)π, that is,
l(A) < (2/3)π. Moreover, if l(A) = (2/3)π and bd(A) = {b1 , b2 }, the above inequality
remains strict for ψ ∈ int(A) and at least one of ψ = bi (i = 1, 2).
For remaining sets in C5 , the above result holds for the expected values under certain
conditions on the distribution of random variable θ (Lemma 2.5).
If the distribution of a circular random variable θ is symmetric about ψ, the density of θ
with respect to any measure (measure is always finite as T is a compact space) would be a
function of cos(θ − ψ). Further, if this distribution is unimodal, mean direction and mode
coincide. Let us denote by f (θ|ψ) = f (cos(θ − ψ)) the density of a symmetric unimodal
distribution with mode ψ. Now consider the mixture of two unimodals f (·|ψ) and f (·|ψ +
π). This mixture would necessarily not be bimodal. Let θ have a mixture distribution with
probability density εf (θ|ψ) + (1 − ε)f (θ|ψ + π), ε ∈ [0, 1]. For this mixture distribution,
define
ζ(t) = f ′ (t)/f ′ (−t),
t ∈ [−1, 1]
(2.3)
with t = cos(θ − ψ). Maxima and minima of ζ(t) are denoted by ζmax and ζmin , respectively. Distribution of θ would be unimodal with modes ψ and ψ + π for ε ∈
[{1 + ζmin }−1 , 1] and ε ∈ [0, {1 + ζmax }−1 ], respectively. For remaining values of ε, it
would be bimodal.
8
Kanika and S. Kumar
Lemma 2.5. Suppose that θ is a continuous circular random variable whose distribution
is symmetric about one of its mode ψ, where ψ belongs to A ∈ C5 (closed convex) with
l(A) ∈ (2π/3, π] such that Pr(θ ∈
/ A) > 0. Let θ0 be the projection of θ on A. Then
Eθψ {d(θ0 , ψ)} < Eθψ {d(θ, ψ)}
if distribution of θ satisfies one of the following conditions:
(C1) distribution is unimodal with mode ψ;
(C2) distribution is mixture with probability density εf (·|ψ) + (1 − ε)f (·|ψ + π), where
ε ≥ 1/2 and ζ(·) defined in (2.3) is an increasing function.
It may be noted that the condition (C2) implies (C1) for ε ∈ [{1 + ζ(−1)}−1 , 1].
Remark 2.3. Convexity of density function f (t) in t ∈ [−1, 1] yields increasing nature
of the function ζ(t).
3. Improving estimators in restricted parameter
spaces
In Euclidean spaces, the action space is chosen as a convex closure of the estimand space
since estimators outside this space with the positive probability are dominated by their
projections on it. An analogous result stated below for estimating the circular parameter
h(ν) is an immediate consequence of Lemmas 2.4 and 2.5.
Theorem 3.1. Let estimand be h(ν) ∈ Ω1 = h(Ω) ⊂ T and the loss function be L defined in (1.1). Denote the estimation space by A = cc(Ω1 ). Any estimator δ(Z) satisfying
Prν (δ(Z) ∈
/ A) > 0 for some ν ∈ Ω is inadmissible and dominated by the projection of
δ(Z) on A if either of the following conditions holds:
(C3) l(A) ≤ (2/3)π;
(C4) distribution of δ(Z) is symmetric about h(ν) and with respect to Lebesgue measure, it satisfies one of the conditions (C1) and (C2) with ψ = h(ν).
For the sake of clarity, the estimation space A can be called the action space only when
its Lebesgue measure is less than or equal to 2π/3.
Remark 3.1. Note that when estimand h(ν) is forced to lie on an arc of semicircle, A is
strictly a subset of T. If h(ν) does not take value on a semicircle, A = T ([3], Theorem 7).
Conditions given in Theorem 3.1 for the inadmissibility of an estimator are sufficient
but not necessary. Suppose that θ has a mixture distribution which is generated from
distributions CN(ν, κ) and CN(ν + π, κ) with probabilities ε and (1 − ε), respectively,
where ν ∈ [0, π], ε = 0.1 and κ = 1. Based on the random sample of size n = 10, risk
Truncated circular parameters
9
Figure 1. Risk plot (a) θ̄ (straight line) and (b) projection of θ̄ on [0, π] (dotted line) under
the loss L.
functions of the sample mean direction θ̄ (straight line) and the projection of θ̄ on [0, π]
(dotted line) under the loss L are plotted in Figure 1. Density of CN distribution and θ̄
are defined in the next subsection. It can be seen that for end points of ν ∈ [0, π], θ̄ is not
improved by its projection. This demonstration refutes the result stated in Theorem 3.1
for an arbitrary estimator in case l(A) > (2/3)π.
If an estimator δ(Z) has a distribution with mixture probability density εf (δ(z)|h(ν))+
(1 − ε)f (δ(z)|h(ν) + π), its mean direction is given by
if ε < 1/2;
h(ν) + π,
CE(δ(Z)) = undefined,
if ε = 1/2;
h(ν),
if ε > 1/2.
Therefore, when ε < 1/2, δ(Z) can be treated as an estimator for h(ν) + π.
Although Theorem 3.1 is based on a condition (C4) satisfied by the distribution of
an estimator when l(A) > (2/3)π, examining the distribution of the estimator can be a
complex exercise. We try to simplify these conditions for specific cases.
Consider the problem of estimating the location parameter ν ∈ T of a circular random
variable θ under the loss L which is invariant under a rotation group
G1 = {gα : gα (θ) = (θ + α) mod (2π)}.
(3.1)
Under L, an G1 -equivariant estimator for ν based on a random sample θ1 , . . . , θn satisfies
δ(θ1 , . . . , θn ) = θ1 + ξ(θ2 − θ1 , . . . , θn − θ1 ),
where ξ is an arbitrary statistic whose distribution is free from ν. This indicates that
distribution of an G1 -equivariant estimator is of the same nature as θ. Using this fact,
we deduce the following result from Theorem 3.1.
Corollary 3.1. If θ is a continuous circular random variable whose distribution is symmetric about ν ∈ Ω1 and satisfies one of the conditions (C1) and (C2) with ψ = ν such
10
Kanika and S. Kumar
that A = cc(Ω1 ) is K1 -type, that is, l(A) ≤ π, any G1 -equivariant estimator δ(θ) lying
outside A with the positive probability is inadmissible and dominated by its projection on
A under loss L.
A similar result can be extended to the torus Tk = T × · · ·× T. A distribution on Tk can
be specified as that of k circular random variables, that is, k-tuple vector Z = (θ1 , . . . , θk )
taking values on Z ⊂ Tk . Suppose that all k components are independently distributed
and each component has a common location parameter ν. This estimation problem is
invariant under a group G2 given by
G2 = {gα = (g1α , . . . , gkα ) : giα (θi ) = (θi + α) mod (2π)}.
(3.2)
Problem of estimating ν can also be thought as multisample problem of estimating common ν. Therefore, we can also draw random samples of different sizes from different
components of Z as components are independently distributed. As in Corollary 3.1, we
deduce the following result from Theorem 3.1.
Corollary 3.2. Let all components of a random variable Z = (θ1 , . . . , θk ) taking value
on Tk be independently distributed. If each component has a common location parameter
ν ∈ Ω1 and satisfies with respect to Lebesgue measure one of the conditions (C1) and
(C2) with ψ = ν, any G2 -equivariant estimator δ(z) lying outside A = cc(Ω1 ) with the
positive probability is inadmissible and dominated by its projection on A under loss L
when l(A) ≤ π.
Corollaries 3.1 and 3.2 enable us to improve various estimators available in the literature for the circular location ν of several directional distributions. Apart from the
maximum likelihood estimator (MLE) δml , the following estimators for ν have been proposed on the basis of a random sample θ1 , . . . , θn .
Pn
(E1) (Watson [29], page 135) Sample
direction θ̄ minimizes i=1 d(θi , α) over
Pn mean P
n
α ∈ T and is obtained as θ̄ = atan( i=1 sin θi / i=1 cos θi ).
P
(E2) (Mardia and Jupp [19], page 167) Circular median δcm minimizes ni=1 d1 (θi , α)
over α ∈ T, where d1 (α, β) = π − |π − |α − β|| for α, β ∈ T. P
n
(E3) (He and Simpson [10]) L1 -estimator δl1 minimizes i=1 {d(θi , α)}1/2 over α ∈ T.
(E4) (Ducharme and Milasevic [5]) Normalized spatial median δnsm = (α∗2 /α∗1 ), where
(α∗1 , α∗2 ) is the solution of
min
(α1 ,α2 )∈R
n
X
1/2
{1 + α21 + α22 − 2(α1 cos θi + α2 sin θi )} .
2
i=1
(Neeman and Chang [24], Tsai [26]) Circular Wilcoxon estimator δcw minimizes
P(E5)
n
R
i=1 i d1 (θi , α) over α ∈ T, where Ri (i = 1, . . . , n) is the rank of sin(θi − α) amongst
sin(θ1 − α), . . . , sin(θn − α).
Except δcm , all other estimators are proposed in their Cartesian forms. All the above
mentioned estimators are either M -estimator or restricted M -estimator or R-estimator.
Truncated circular parameters
11
Remark 3.2. Due to lack of preference for the zero direction and orientation in
the definition of T, rotation-equivariant estimators for circular parameters are preferred. All the above-mentioned estimators enjoy the property of G1 -equivariance
when support is T. When support is Tk , these estimators based on sample values
θ11 , . . . , θ1n1 , . . . , θk1 , . . . , θknk are also G2 -equivariant. This equivariance property is used
in the following section to derive improved estimators.
3.1. Applications of Theorem 3.1
Theorem 3.1 is applicable to a wide variety of estimation problems for directional distributions. In this section, we consider various examples where Theorem 3.1 leads to
improvement over traditional estimators.
Example 3.1 (Unimodal distributions on circle T). A circular normal distribution
CN(ν, κ) is defined by the following density:
f2 (θ; ν, κ) =
1
eκ cos(θ−ν) ,
2πI0 (κ)
θ, ν ∈ T, κ > 0,
where Iv is the modified Bessel function of the first kind and order v. It is known a priori
that ν ∈ Ω1 such that Ω1 is an arc of the circle. Without loss of generality, we can assume
that Ω1 = [0, b], where b ∈ T. The estimation space for ν is
A=
[0, b],
T,
if b ≤ π;
if b > π.
The unrestricted MLE of ν is δml = θ̄. The circular normal distribution is the only rotationally symmetric distribution for which MLE of the mean direction ν is the sample
mean direction θ̄. Maximization of likelihood function over Ω1 yields the restricted MLE
δrml as
if θ̄ ∈ [0, b];
if θ̄ ∈ [0, b];
θ̄,
θ̄,
δrml = b,
or
(3.3)
if θ̄ ∈ (b, π + b/2);
b,
if θ̄ ∈ (b, π + b/2];
0,
if θ̄ ∈ [π + b/2, 2π);
0,
if θ̄ ∈ (π + b/2, 2π).
At θ̄ = π + b/2, δrml can take two values. Since Pr(θ̄ = π + b/2) = 0, both estimators are
equivalent. Note that when b ≤ π, δrml is also the projection of θ̄ on A. Corollary 3.1
yields that δrml improves θ̄ under the loss L when b ≤ π. When b > π, the projection of θ̄
on A is the same as θ̄. In a similar way, improvements over all other estimators, δcm , δl1 ,
δnsm and δcw (as defined in (E2), (E3), (E4), (E5)) can be obtained from Corollary 3.1
and Remark 3.2 for ν when ν is restricted to [0, b] and b ≤ π.
Other well-known symmetric unimodal distributions are wrapped Cauchy WC(ν, ρ),
wrapped normal WN(ν, ρ) and cardioid C(ν, ρ) with the following probability densities
12
Kanika and S. Kumar
in terms of t = cos(θ − ν),
f3 (t) =
(1 − ρ2 )
,
(1 + ρ2 − 2ρt)
ρ ∈ (0, 1);
∞
f4 (t) =
1 X i2
1
ρ Ti (t),
+
2π π i=1
f5 (t) = (2π)−1 + π −1 ρt,
ρ ∈ (0, 1);
|ρ| < 1/2,
respectively, where Tv is a Chebyshev polynomial of first kind of order v. Jones and
Pewsey [13] proposed a family of symmetric unimodal distributions on T whose densities
are provided in terms of t as
f6 (t) =
{cosh(κψ)}1/ψ
1/ψ
{1 + tanh(κψ)t} ,
2πP1/ψ (cosh(κψ))
κ > 0, ψ ∈ R,
where Pv is the associated Legendre function of the first kind of degree v and order
0. Here, we exclude the case of κ = 0 since it yields the uniform distribution on T.
Circular normal, wrapped Cauchy and cardioid distributions are contained in this family
corresponding to ψ = 0, −1 and 1, respectively.
Another general family of symmetric unimodal distributions on T contains wrapped
α-stable distributions with densities of the following form in terms of t ([19], page 52)
∞
f7 (t) =
1
1 X iα
ρ Ti (t),
+
2π π i=1
ρ ∈ (0, 1), α = (0, 1) ∪ (1, 2].
For α = 2, it yields wrapped normal distribution.
Since the distributions corresponding to densities f6 and f7 satisfy condition (C1) ,
Corollary 3.1 and Remark 3.2 yield improvements over all estimators θ̄, δml , δcm , δl1 ,
δnsm and δcw for the mean direction ν when ν is restricted to [0, b] such that b ≤ π.
Example 3.2 (Mixture distributions on T). Let random variable θ be generated
from CN(ν, κ) and CN(ν + π, κ) with probabilities ε and (1 − ε), respectively. For this
distribution, ζ(t) = e2κt which is increasing in t. Thus, Corollary 3.1 and Remark 3.2
yield that all the estimators, θ̄, δml , δcm , δl1 , δnsm and δcw , for ν ∈ Ω1 are improved by
their projections on A if l(A) ≤ π and ε ≥ 1/2. For the values of ε < 1/2, improvements
are possible when l(A) ≤ (2/3)π.
Similar improvements are possible when we mix either two wrapped normal or two
distributions with density f6 for same value of ψ ≤ 1 with different mean directions ν
and ν + π. To apply Corollary 3.1, we must show that the corresponding function ζ(t) is
an increasing function in t. For a general density f6 (t), derivative of ζ(t) with respect to
t is obtained as
1/ψ
2(1 − ψ)
tanh(κψ)
1 + tanh(κψ)t
ζ ′ (t) =
,
ψ 6= 0,
ψ
{1 + tanh(κψ)t}2 1 − tanh(κψ)t
Truncated circular parameters
13
which is always nonnegative unless ψ > 1.
The wrapped normal distribution can be represented by theta function ϑ3 . Using the
representation of ϑ3 in terms of infinite products ([9], page 921, equation 8.181.2), we
have
∞
1 Y
f4 (t) =
(1 − ρ2i )(1 + 2tρ2i−1 + ρ2(i−1) ).
2π i=1
P
Second derivative of f4 (t) with respect to t is f4 (t) i6=j ξi (t)ξj (t), where ξ(i) =
2ρ2i−1 /{1 + 2tρ2i−1 + ρ2(i−1) }−1 . Convexity of f4 (t) follows from the positiveness of
ξi (t) and increasing nature of ζ(t) follows from the convexity of f4 (t) using Remark 2.3.
Example 3.3 (Distributions on T with k-fold rotational symmetry). This distribution is constructed by putting k copies of the original distribution end-to-end ([19],
page 53). If we are given a distribution of θ which is unimodal and symmetric about
ν, constructed distribution has the density f (cos(k(θ − ν0 ))), θ ∈ T, ν0 ∈ [0, 2π/k). Note
that new distribution is k-modal, for example, k-modal circular normal distribution ([12],
page 209). For k ≥ 3, condition (C3) of Theorem 3.1 is satisfied and so estimators of ν0
lying outside A with a positive probability can be improved by their projections on A.
Note that the results hold when the parameter space is full, that is, [0, 2π/k) or restricted,
that is, a subset of [0, 2π/k). For k = 2, the result holds only for restricted parameter
space if ν0 ∈ Ω1 ⊂ [0, b] such that b ≤ (2/3)π.
Example 3.4 (Distributions on torus Tk ). Suppose that all k components of
Z = (θ1 , . . . , θk ) ∈ Z ⊂ Tk are independently distributed and ith component θi follows
CN(ν, κi ) with known κi . Consider the estimation of common ν ∈ Ω1 under the loss L.
1, . . . , n). Suppose
Let (θi1 , . . . , θini ) be a random sample from the ithPpopulation (i = P
ni
ni
θ̄i denotes the sample mean direction and Ri = {( j=1
sin θij )2 + ( j=1
cos θij )2 }1/2
denotes the sample resultant length for the sample of ith component. The MLE of ν is
Pk
i=1 κi Ri sin θ̄i
.
(3.4)
θ̃ = atan Pk
i=1 κi Ri cos θ̄i
The conditional distribution of θ̃ is again circular normal CN(ν, R∗ ), where
∗
R =
(
k
X
i=1
κi Ri sin θ̄i
!2
+
k
X
i=1
κi Ri cos θ̄i
!2 )1/2
Holmquist [11].
Since the distribution of R∗ is dependent only on κi , distribution of θ̃ is unimodal and
symmetric about its mode ν. Corollary 3.2 yields that θ̃ is dominated by its projection
on A under the loss L if l(A) ≤ π. Note that improved estimator of θ̃ is also the restricted
MLE for common ν when l(A) ≤ π.
Using Corollary 3.2 and Remark 3.2, we can obtain improvements over other estimators
θ̄, δcm , δl1 , δnsm and δcw based on random sample θ11 , . . . , θ1n1 , . . . , θk1 , . . . , θknk .
14
Kanika and S. Kumar
Remark 3.3. This model can be further extended to the cases where distributions of
independent components are not necessarily the same and satisfy conditions (C1) and
(C2) with respect to Lebesgue measure, namely, distributions considered in Examples 3.1
and 3.2.
Example 3.5 (Distribution on unit sphere S2 ). Point x = (x1 , x2 , x3 )T ∈ S2 can be
specified by its geographical coordinates: colatitude θ = cos−1 (x3 ) ∈ [0, π] and longitude
φ = atan(x2 /x1 ) ∈ [0, 2π). Hence, sphere S2 is isomorphic to T2 = [0, π] × [0, 2π). The
density of Fisher distribution on the support T2 is given by
f8 (θ, φ; ν1 , ν2 , κ) =
κ sin θ
exp{κ(sin θ sin ν1 cos(φ − ν2 ) + cos θ cos ν1 )},
4π sinh(κ)
(ν1 , ν2 ) ∈ T2 , κ > 0,
where (ν1 , ν2 ) is the mean direction. On the basis of a random sample of size n, the MLE
of ν2 , when κ is known/unknown and ν1 is unknown, is given by
Pn
i=1 sin θi sin φi
P
.
δml = atan
n
i=1 sin θi cos φi
It is known that mean direction is restricted to a continuous arc of hemisphere. Without
loss of generality, we can assume that ν1 ∈ [0, π] and ν2 ∈ [0, b] with b ≤ π. We can improve
the MLE of ν2 by its projection on [0, b] if b ≤ (2/3)π using Theorem 3.1.
Example 3.6 (Distribution on cylinder R × T). Mardia and Sutton [20] proposed a
distribution on the cylinder R × T. Let (X, θ) have the support R × T where the marginal
distribution of θ is CN(ν0 , κ), ν0 ∈ T, κ > 0 and conditional distribution of X|θ is a normal
with mean
√
µc = µ + σρ κ{cos(θ − ν) − cos(ν0 − ν)},
µ ∈ R, ν ∈ T, 0 ≤ ρ ≤ 1, σ > 0
and variance σ 2 (1 − ρ2 ). Based on a random sample of size n, the MLE of ν is
s2 r23 r12 − r13
,
δml = atan
s3 r23 r13 − r12
P
where for i = 1, 2, 3 and j = 1, . . . , n, x1j = xj , x2j = cos θj , x3j = sin θj , x̄i = j xij /n,
P
s2i = j (xij − x̄i )2 ; and for i 6= k (i, k = 1, 2, 3),
rik =
1 X
(xij − x̄i )(xkj − x̄k ).
si sk j
If ν is restricted to Ω1 such that l(A) ≤ (2/3)π, δml is dominated by its projection on
A under the loss L using Theorem 3.1. Note that simulations indicate that this result is
also valid for (2/3)π < l(A) ≤ π.
Truncated circular parameters
15
4. An inadmissibility result for general equivariant
rules
Moors [21, 22], Kumar and Sharma [16] gave a general method for obtaining improved
equivariant estimators of parameters in Euclidean spaces. In this section, we extend these
results for estimating circular parameters.
Let the problem of estimating h(ν) ∈ Ω1 under the loss L be invariant under a compact
group G of measurable transformations g : Z → Z. There exists a finite and left (right)
invariant Haar measure λ on G ([6], Theorem 1.5). Let Ḡ and G̃ be the groups induced
by G on parameter space Ω and estimation space A = cc(Ω1 ).
Lemma 4.1. For the G-invariant estimation problem defined above, we have:
(i) f (z|ḡ(ν)) = f (g−1 (z)|ν) a.e. with respect to measure η;
(ii) hḡ(ν) = g̃h(ν) mod (2π) for all ν ∈ Ω;
(iii) Let A ∈ C5 (closed convex). If φ0 is the projection of φ ∈ T on A, the projection
of g̃(φ) on g̃(A) is g̃(φ0 ).
For each z ∈ Z and ν ∈ Ω, define a probability measure on G as
f (z|ḡ(ν))
.
∗ (ν)) dλ(g∗ )
f
(z|ḡ
G
τ (z|ḡ(ν)) = R
With the help of these measures, for a fixed z ∈ Z, define a function hz : Ω → A as
R
Z
sin(g̃h(ν))τ (z|ḡ(ν)) dλ(g)
G
R
f (z|ḡ(ν)) dλ(g) > 0;
,
if
atan
G
G cos(g̃h(ν))τ (z|ḡ(ν)) dλ(g)
hz (ν) =
(4.1)
Z
h(ν),
f (z|ḡ(ν)) dλ(g) = 0.
if
G
The new estimation space Az is defined as a convex closure of hz (Ω), that is, Az =
cc(hz (Ω)).
Remark 4.1. In case of
hz (ν) can be written as
R
G
f (z|ḡ(ν)) dλ(g) = 0, Az = A. When
E sin(g̃h(ν))
hz (ν) = atan
,
E cos(g̃h(ν))
R
G
f (z|ḡ(ν)) dλ(g) > 0,
(4.2)
where the expectation is taken over g with respect to a probability measure τ (z|ḡ(ν)) dλ(g).
If Pr(g̃h(ν) ∈ A) = 1, hz (ν) ∈ A from the convexity of A (see Proposition 2.2). Since Az
is the smallest convex set containing hz (ν), we conclude that Az ⊂ A.
We assume that every transformation g̃ ∈ G̃ satisfies circular property, that is, for a
fixed α and for all φ ∈ A, g̃(φ) is either α + φ or α − φ such that images are in A itself.
16
Kanika and S. Kumar
Lemma 4.2. If every induced transformation on A satisfies the circular property, the
reduced estimation space Az satisfies Ag(z) = g̃(Az ) for all z ∈ Z and g ∈ G.
Lemmas 4.1 and 4.2 are utilized to prove the main result of this section.
Theorem 4.1. Consider an G-invariant estimation problem under the loss function L
with a compact group G such that elements of induced group G̃ on the estimation space A
satisfy the circular property. Any G-equivariant estimator δ satisfying Prν (δ(Z) ∈
/ AZ ) >
0 for some ν ∈ Ω is dominated by its projection on AZ provided that l(AZ ) ≤ (2/3)π.
This result is applicable to both restricted and unrestricted estimation problems as
illustrated in the following subsection.
4.1. Applications of Theorem 4.1
We consider estimation of the location parameter ν ∈ Ω1 of a circular random variable
θ under the loss L. Let us denote by fν (θ) the density of θ that would be a function of
cos(θ − ν).
4.1.1. Unrestricted estimation problems
The estimation problem is invariant under the rotation group G1 . Clearly, the induced
group G̃1 on the estimation space A = T is itself G1 and every transformation in G1
satisfies the circular property. Taking G = G1 , we define
R 2π
R 2π
sin αfα (θ) dα
sin(α + ν)fα+ν (θ) dα
= atan R 02π
,
hθ (ν) = atan R 02π
cos(α
+
ν)f
(θ)
dα
cos
αf
(θ)
dα
α+ν
α
0
0
or equivalently, hθ (ν) is constant on ν ∈ T. Therefore the following result follows from
Theorem 4.1.
Corollary 4.1. If θ is a circular random variable with the unrestricted location parameter ν ∈ T, there is only one admissible G1 -equivariant estimator under the loss L which
is obtained as
R 2π
sin αfα (θ) dα
,
δad = atan R 02π
cos αfα (θ) dα
0
where fν (θ) the density of θ.
For CN(ν, κ) distribution, δad = θ̄. All other G1 -equivariant estimators δcm , δl1 , δnsm
and δcw for ν ∈ T under the loss L are improved by θ̄ using Corollary 4.1. This result is
significant in the sense that so far comparison of θ̄ with δcm , δl1 , δnsm and δcw was done
only with respect to asymptotic efficiency and robustness.
Truncated circular parameters
17
4.1.2. Restricted estimation problems
Let the location ν be restricted to any arc of semicircle. Without loss of generality, we
can assume that ν ∈ Ω1 = [0, b] with 0 < b ≤ π. In Example 3.1, the same restricted space
estimation problem was considered and we obtained improvements over estimators θ̄,
∗
∗
∗
∗
δml , δcm , δl1 , δnsm and δcw for various distributions. Denote by θ̄∗ , δml
, δcm
, δl1
, δnsm
and
∗
δcw , the dominating estimators of θ̄, δml , δcm , δl1 , δnsm and δcw as their projections on
Ω1 = [0, b]. Here, we can further improve upon these improved estimators.
We consider the transformation group as G3 = {e, g} where g(θ) = (b − θ) mod (2π)
and e is the identity transformation. The estimation problem remains invariant under G3
and the induced group on the estimation space A is G3 . Clearly, elements of G3 satisfy
the circular property. Define the following function for a fixed random sample θ1 , . . . , θn
as
h(θ1 ,...,θn ) (ν) = {b/2 + tan−1 (a(ν))} mod (2π),
where after some algebraic computations, a(ν) is derived as
Qn
Qn
b
i=1 fb−ν (θi ) − Qi=1 fν (θi )
Q
−ν .
tan
a(ν) = n
n
2
i=1 fb−ν (θi ) +
i=1 fν (θi )
Since fν (θ) is a function of cos(θ − ν), h(θ1 ,...,θn ) (ν) is symmetric about ν = b/2. It is
sufficient to assume that ν ∈ [0, b/2] to study the behaviour of the function h(θ1 ,...,θn ) (ν).
We consider distributions for which a(ν) is monotonic in ν ∈ [0, b/2]. As a(b/2) = 0,
monotonic nature of a(ν) is dependent on the sign of a(0). The new estimation space is
∗
if a(0) < 0;
[b , b/2],
A(θ1 ,...,θn ) = cc(h(θ1 ,...,θn ) (Ω1 )) = {b/2},
if a(0) = 0;
[b/2, b∗],
if a(0) > 0,
where b∗ = h(θ1 ,...,θn ) (0). It may be noted that l(A(θ1 ,...,θn ) ) ≤ b/2 which is a substantial
reduction in l(A) = b.
∗
∗
∗
∗
∗
Since G3 ⊂ G1 , all estimators θ̄, δml , δcm , δl1 , δnsm , δcw , θ̄∗ , δml
, δcm
, δl1
, δnsm
and δcw
are also G3 -invariant. For the distributions which satisfy the assumption of monotonicity
of a(ν), all these estimators can be improved by their projections on A(θ1 ,...,θn ) using
Theorem 4.1.
If θ follows a CN(ν, κ) distribution, the function a(ν) is given as
b
b
b
sin
−ν
tan
−ν .
a(ν) = tanh κr sin θ̃ −
2
2
2
Monotonicity of a(ν) can be easily observed. The new estimation space is equal to
if θ̄ ∈ J1 ;
[b∗ , b/2],
A(θ̄,r) = {b/2},
if θ̄ ∈ {b/2, π + b/2};
[b/2, b∗ ],
if θ̄ ∈ I1 ,
18
Kanika and S. Kumar
where b∗ = b/2 + tan−1 [tan(b/2) tanh{κr sin(θ̄ − b/2) sin(b/2)}], J1 = J(b/2, π + b/2) and
I1 = I(b/2, π + b/2). Based on A(θ̄,R) , an estimator δ is dominated by
δ,
δI = b ∗ ,
b/2,
if θ̄ ∈ J1 and δ ∈ [b∗ , b/2], or, θ̄ ∈ I1 and δ ∈ [b/2, b∗];
if θ̄ ∈ J1 and δ ∈ J(b∗ , γ), or, θ̄ ∈ I1 and δ ∈ (b∗ , γ);
if θ̄ ∈ J1 and δ ∈ (b/2, γ], or, θ̄ ∈ I1 and δ ∈ J(b/2, γ], or, θ̄ ∈ {b/2, π + b/2},
where γ = π + b∗ /2 + b/4. In Example 3.1, the estimator δ for ν is dominated by the
projection of δ on A. Let us denote by δ ∗ this improved estimator. Based on A(θ̄,R) ,
improved estimators δI and δI∗ of δ and δ ∗ , respectively, are equivalent except when
either δ ∈ [γ, π + b/2] and θ̄ ∈ J1 or δ ∈ [π + b/2, γ] and θ̄ ∈ I1 . If δ = θ̄, both θ̄I and θ̄I∗
are equivalent and given by
∗
b ,
b/2,
θ̄,
∗
θ̄ < b and θ̄ ∈ [0, b/2),
if θ̄ > b∗ and θ̄ ∈ (b/2, π + b/2),
θ̄ ∈ (π + b/2, 2π),
(4.3)
if θ̄ = π + b/2,
elsewhere.
In Figure 2, we have plotted the risk functions of the MLE θ̄, restricted estimator δrml
defined in (3.3) and improved estimator θ̄I defined in (4.3) under the loss function L. The
risk values have been evaluated using simulations. For this, we have generated 100 000
samples from a CN(ν, κ) distribution for various values of (n, κ, b). The following conclusions can be made from the numerical study.
(a) The risk function of θ̄ is constant for a fixed value of (n, κ). The risk functions of
δrml and θ̄I are symmetric about b/2. For small values of κ or b, these risk functions are
strictly decreasing in ν ∈ [0, b/2]. For higher values of κ or b, behaviour is reverse.
(b) For all the values of (n, κ) and ν ∈ [0, b], δrml uniformly improves θ̄ and θ̄I uniformly
improves δrml when b ∈ (0, π]. Risk values of δrml and θ̄I are the same when b = π and
are less than that of θ̄ for all ν ∈ [0, b].
(c) The amount of relative improvement of δrml over θ̄ is increasing as κ or b decreases.
This is seen to be as high as 95%. Similarly, relative improvement of θ̄I over δrml is seen
to be up to 75%.
Similar observations have been made for various other configurations of (n, κ, b). Simulations for various directional distributions show significant improvements. We omit details
here.
Remark 4.2. For the support T, both unrestricted and restricted estimation problems
discussed in Sections 4.1.1 and 4.1.2 can be easily extendable to the case of support Tk .
Truncated circular parameters
19
Figure 2. Risk plots of (a) θ̄ (straight line), (b) δrml (dashed line) and (c) θ̄I (dotted line)
under the loss function L when b ∈ (0, π].
5. Concluding remarks
For estimating parameters in Euclidean spaces, with respect to the loss function as an
increasing function of distance, the action space is taken to be the smallest convex set
containing the estimand space. If an estimator lies outside it with a positive probability, an improvement is obtained by projecting this estimator on the action space. In
Section 3, we have extended this concept to the estimation of circular parameters of directional distributions. The result of Theorem 3.1, is not exactly analogous to the result
for Euclidean spaces. Further, [16, 22] gave a new technique for improving equivariant
estimators in Euclidean spaces. In Section 4, we have developed a theory to extend this
technique to circular parameters. The results have been applied to various estimation
problems in directional distributions. The resulting estimators are seen to show significant improvements over the usual estimators.
It would be interesting to further extend these results to parameters lying in spheres
of higher dimensions.
20
Kanika and S. Kumar
Appendix
A.1. Proof of Proposition 2.1
The statement trivially follows when A = T. From Lemma 2.2, it is sufficient to consider
A to be of I-type. First, we assume A = I[0, γ] with γ ∈ (0, π]. Note that for γ = 0, the
proof is trivial.
Let {φ1 , . . . , φn } be linearly ordered sample of n(≥ 2) observations taking values in A.
After rotating sample by an angle 2π − φ1 , modified ordered sample {0, α2 , . . . , αn } takes
values in I[0, αn ] ⊂ A with αi = φi − φ1 (i = 2, . . . , n). We have to prove
Pn
wi sin αi
i=2
P
ᾱw = atan
∈ I[0, αn ],
n
w1 + i=2 wi cos αi
where weights are w1 , . . .P
, wn . From (2.2), the lower bound of ᾱw is zero. If αn 6= π, both
P
n
n
i=2 wi sin αi and w1 +
i=2 wi cos αi cannot be zero simultaneously, that is, ᾱw always
exists. When n = 2 and α2 = π, ᾱw does not exist if w1 = w2 .
Pn(i) Consider αn < π/2. Since tan(·) is an increasing function in [0, π/2) and w1 +
i=2 cos αi is positive, ᾱw ≤ αn is equivalent to
!
n−1
n−1
X
X
(A.1)
wi cos αi .
wi sin αi ≤ tan αn w1 +
i=2
i=2
Induction method is used to prove the inequality (A.1). For n = 2, (A.1) is reduced to
w1 tan α2 ≥ 0 which always holds. We will show that (A.1) is true for n = k + 1 after
using it for n = k. Thus,
!
!
k
k
k
X
X
X
wi sin αi .
wi cos αi =
wi cos αi ≥ tan αk w1 +
tan αk+1 w1 +
i=2
i=2
i=1
The above steps follow since tan αk ≤ tan αk+1 and (A.1) is assumed
P to be true for n = k.
(ii) Now consider the case when π/2 < αn < π. Since w1 + ni=2 wi cos αi < 0 and
tan(·) is increasing in (π/2, π], ᾱw ≤ αn is equivalent to the reverse of inequality (A.1).
The proof can be completed as above.
(iii) Cases when αn = π/2 and αn = π are straightforward.
Hence, the proposition is established for A = K1 [α, β] with α, β ∈ T. In a similar manner,
it can be proved when A is of types K1 (α, β), K1 (α, β] and K1 [α, β).
A.2. Proof of Proposition 2.2
The statement is trivially true when A = T. As in the proof of Proposition 2.1, it is
enough to prove the result only for A = [0, γ] with γ ∈ (0, π]. From (2.2), CE(θ) ≥ 0, if it
Truncated circular parameters
21
exists. Every interval is convex subset of R. Using the fact that an analogous result is
true for the expectation of random variables in R such as sin θ and cos θ ([7], page 74),
we can observe ranges of both E sin θ and E cos θ.
Suppose that Pr(θ ∈ A) = 1 and so Pr(γ − θ ∈ A) = 1. Since sin(·) is nonnegative in
the range [0, π], Pr(sin(γ − θ) ≥ 0) = 1. Thus,
E sin(γ − θ) ≥ 0.
(A.2)
(i) Consider the case 0 < γ < π/2. Since Pr(cos θ > 0) = 1, E cos θ > 0. Dividing both
sides of (A.2) by cos θ(E cos θ) (term is positive with probability one), we get
(E sin θ/E cos θ) ≤ tan γ.
(A.3)
Using facts that tan−1 (·) is increasing in [0, ∞) and atan(·) = tan−1 (·) in the range
[0, π/2), we obtain CE(θ) ≤ γ.
(ii) Consider γ = π/2. Since both E sin θ and E cos θ are nonnegative and cannot be
zero simultaneously, CE(θ) ≤ π/2.
(iii) If π/2 < γ < π, Pr(cos θ < 0) = 1 and so E cos θ is negative. Dividing both sides of
(A.2) by cos θ(E cos θ) (positive quantity), we again obtain (A.3). As tan−1 (·) is increasing
in the range (−∞, 0], we have
tan−1 (E sin θ/E cos θ) ≤ γ − π.
Since atan(·) = tan−1 (·) + π, CE(θ) ≤ γ.
(iv) Now consider that γ = π. Both sin θ ∈ [0, 1] and cos θ ∈ [−1, 1] with probability
one. Hence CE(θ) ≤ π, if it exists.
Existence of CE(θ) is not confirmed only for the case (iv). Suppose that Pr(θ = 0) =
Pr(θ = π) = 1/2, both E sin θ and E cos θ are zero, so CE(θ) does not exist. Moreover, if
A = T and θ follows uniform distribution on T with the density (2π)−1 , CE(θ) does not
exist.
A.3. Proof of Lemma 2.5
Using Lemma 2.2, it is enough to consider the case A = [0, b] with b ∈ (2π/3, π]. Decompose the set A as A1 ∪ A2 ∪ A3 , where
A1 = [0, 3b/4 − π/2),
A2 = [3b/4 − π/2, b/2],
A3 = (b/2, b],
and complement of A as B1 ∪ B2 , where
B1 = (b, π + b/2],
B2 = (π + b/2, 2π).
We have to show for all ψ ∈ A,
a(ψ) = Eθψ {u(θ)} =
Z
θ∈B1 ∪B2
u(θ)f1 (θ|ψ) dθ > 0,
(A.4)
22
Kanika and S. Kumar
where f1 (θ|ψ) is the probability density of θ with respect to Lebesgue measure and u(θ)
is given by
u(θ) = cos(θ0 − ψ) − cos(θ − ψ),
θ∈
/ A, ψ ∈ A,
with θ0 as the projection of θ on A. According to the assumption, the distribution of θ
is symmetric about ψ, therefore, we have
Eθψ cos(θ0 − ψ) = Eθb−ψ cos(θ0 − b + ψ).
Hence, a(ψ) = a(b − ψ) for ψ ∈ A. It is enough to prove that a(ψ) > 0 for ψ ∈ A1 ∪ A2 .
Next, we examine the sign of the function u(·). Define u(θ) = u1 (θ) + u2 (θ), where from
definition of projection θ0 , u1 (θ) and u2 (θ) are given by
θ+b
θ−b
sin
−ψ ,
if θ ∈ B1 ;
u1 (θ) = 2 sin
2
2
0,
if θ ∈ B2 ;
if θ ∈ B1 ;
0,
u2 (θ) = 2 sin θ sin θ − ψ ,
if θ ∈ B2 .
2
2
If θ ∈ B1 , (θ − b) ∈ (0, π − b/2] ⊂ (0, 2π/3). Hence, sign of u1 (θ) is only dependent on that
of sin((θ + b)/2 − ψ). When ψ ∈ A1 , decompose B1 as B1 = B11 ∪ B12 , where
B11 = (b, 2π + 2ψ − b],
B12 = (2π + 2ψ − b, π + b/2].
It can be noted that
θ+b
(b − ψ, π] ⊂ (2π/3, π],
−ψ ∈
(π, π/2 + 3b/4 − ψ] ⊂ (π, 5π/4],
2
if θ ∈ B11 ;
if θ ∈ B12 .
Thus, when ψ ∈ A1 , u1 (θ) ≥ 0 for θ ∈ B11 and u1 (θ) < 0 for θ ∈ B12 . If θ ∈ B1 and ψ ∈ A2 ,
((θ + b)/2 − ψ) ∈ (π/3, π] and so u1 (θ) ≥ 0. Similarly, when θ ∈ B2 , θ/2 ⊂ (2π/3, π), the
sign of u2 (θ) is only dependent on that of sin(θ/2 − ψ). If θ ∈ B2 and ψ ∈ A1 ∪ A2 ,
(θ/2 − ψ) ∈ (π/4, π). This implies that u2 (θ) > 0 when ψ ∈ A1 ∪ A2 .
From Table A.1, it is sufficient to prove
Z
u(θ)f1 (θ|ψ) dθ > 0
for ψ ∈ A1 .
(A.5)
θ∈B12 ∪B2
Now we examine two cases separately, when distribution of θ is unimodal and bimodal.
(i) If density f1 (θ|ψ) is either f (θ|ψ) or εf (θ|ψ) + (1 − ε)f (θ|ψ + π) with ε ≥ (1 +
ζmin )−1 , distribution of θ is unimodal with mode at ψ. It means that f1 (θ|ψ) is increasing
in θ ∈ [ψ + π, 2π). Write u(θ) = v1 (θ)+ v2 (θ), where for i = 1, 2, vi (θ) = ui (θ), θ ∈ B12 ∪B2 .
Truncated circular parameters
23
Table A.1. Behaviour of functions u1 (θ) and u2 (θ)
A1
A2
A1 ∪ A2
B1
u1 (θ) ≥ 0
u1 (θ) < 0
u1 (θ) ≥ 0
u2 (θ) = 0
B2
u1 (θ) = 0
u1 (θ) = 0
u2 (θ) > 0
Thus,
v1 (θ)
=
v2 (θ)
−∞,
0,
if θ ∈ B12 ;
if θ ∈ B2 .
Therefore, both v1 (θ)/v2 (θ) and f1 (θ|ψ) are increasing in θ ∈ B12 ∪ B2 . Let φ be a
uniform distributed random variable with respect to Lebesgue measure such that Pr(φ ∈
B12 ∪ B2 ) = 1. As Eφ {v2 (φ)f1 (φ|ψ)} > 0, using a result of [2], Theorem 2.1, we have
Eφ {v1 (φ)} Eφ {v1 (φ)f1 (φ|ψ)}
≤
.
Eφ {v2 (φ)} Eφ {v2 (φ)f1 (φ|ψ)}
In order to prove (A.5), it remains to show
Eφ {v1 (φ) + v2 (φ)} > 0
for all ψ ∈ A1 .
(A.6)
The above holds since we have
(b − 2ψ)Eφ {v1 (φ) + v2 (φ)} =
Z
θ∈B12 ∪B2
{cos(φ0 − ψ) − cos(φ − ψ)} dφ > 0.
This completes the proof when distribution of θ is unimodal.
(ii) Now we assume that θ has a mixture distribution with the probability density
f1 (θ|ψ) = εf (θ|ψ) + (1 − ε)f (θ|ψ + π) with 1/2 ≤ ε < (1 + ζmin )−1 , that is, the distribution
of θ is bimodal. It has two modes ψ and ψ + π. Antimodes are ψ + w and ψ + 2π − w(= β),
where w = cos−1 (ζ −1 ((1 − ε)/ε)). According to condition (C2) , w ∈ [π/2, π). We may
note that β ≤ 2π since ψ < π/2 ≤ w as ψ ∈ A1 . This implies that f1 (θ|ψ) is increasing in
θ ∈ [β, 2π). If β ≤ 2π + 2ψ − b, (A.5) can be proved following the lines of the above case.
When β > 2π + 2ψ − b, decompose the set B12 ∪ B2 = (2π + 2ψ − b, 2π) as C1 ∪ C2 ∪ C3 ,
where
C1 = (2π + 2ψ − b, β],
C2 = (β, 2π − 2w + b],
C3 = (2π − 2w + b, 2π).
Since the probability density f1 (θ|ψ) is symmetric about β, that is, f1 (θ|ψ) = f1 (2β −
θ|ψ), we have
Z
Z
Z
u(2β − θ)f1 (θ|ψ) dθ.
u(2β − θ)f1 (2β − θ|ψ) dθ =
u(θ)f1 (θ|ψ) dθ =
θ∈C1
θ∈C2
θ∈C2
24
Kanika and S. Kumar
Define
u3 (θ) =
u(θ) + u(2β − θ),
u(θ),
if θ ∈ C2 ;
if θ ∈ C3 .
It may be noted that (A.6) yields the following for ψ ∈ A1 :
Z
Z
u(θ) dθ ≥ 0.
u3 (θ) dθ =
(A.7)
θ∈B12 ∪B2
θ∈C2 ∪C3
Consider the function
θ − θ0
θ + θ0
u(θ) + u(2β − θ) = 4 sin
cos
− β sin(β − ψ).
2
2
When θ ∈ B12 ∪ B2 , sin((θ − θ0 )/2) > 0. Note that sin(β − ψ) = − sin(w) < 0 as w ∈
[π/2, π). The sign of u(θ) + u(2β − θ) is the opposite of that of cos((θ + θ0 )/2 − β). There
are three cases according to π + b/2 ∈ Ci , for i = 1, 2, 3. As in the case when distribution
of θ is unimodal, we define two functions v1 (θ) and v2 (θ) for θ ∈ C2 ∪ C3 in all these
three cases such that v1 (θ)/v2 (θ) is increasing in θ ∈ C2 ∪ C3 and v2 (θ) is nonnegative
for all θ ∈ C2 ∪ C3 .
When π + b/2 ∈ C1 , choices are
0,
if θ ∈ C2 ;
u(θ) + u(2β − θ),
if θ ∈ C2 ;
v1 (θ) =
v2 (θ) =
u(θ),
if θ ∈ C3 ;
0,
if θ ∈ C3 .
Now consider π + b/2 ∈ C2 . Decompose the interval C2 = C21 ∪ C22 , where
C21 = (β, π + b/2],
C22 = (π + b/2, 2π − 2w + b].
In this case, we choose
u(θ) + u(2β − θ),
v1 (θ) = 0,
0,
0,
v2 (θ) = u(θ) + u(2β − θ),
u(θ),
if θ ∈ C21 ;
if θ ∈ C22 ;
if θ ∈ C3 ;
if θ ∈ C21 ;
if θ ∈ C22 ;
if θ ∈ C3 .
When π + b/2 ∈ C3 , decompose the interval C3 = C31 ∪ C32 , where
C31 = (2π − 2w + b, π + b/2],
In this case, we define
u(θ) + u(2β − θ),
v1 (θ) = 0,
u(θ),
if θ ∈ C2 ;
if θ ∈ C31 ;
if θ ∈ C32 ;
C32 = (π + b/2, 2π).
v2 (θ) =
(
0,
−u(θ),
0,
if θ ∈ C2 ;
if θ ∈ C31 ;
if θ ∈ C32 .
Truncated circular parameters
25
Since the density f1 (θ|ψ) is increasing in θ ∈ C2 ∪ C3 , Theorem 2.1 of [2] completes the
proof when distribution of θ is bimodal.
A.4. Proof of Lemma 4.1
See [22], Lemma 2, for the proof of (i). Note that the proof given in [22] utilizes the
measure perseverance of the element g ∈ G under the measure η, that is, η(g−1 (B)) 6=
η(B) for all B ∈ B(Z), where B(Z) consists of Borel sets of the sample space Z. Later,
Moors and van Houwelingen [23] relaxed this condition of measure perseverance.
For any g ∈ G, if δ is an G-equivariant estimator, we have L(ḡ(ν), g̃(δ)) = L(ν, δ), that
is,
cos(hḡ(ν) − g̃(δ)) = cos(h(ν) − δ),
(A.8)
for all ν ∈ Ω and δ ∈ A. Substituting δ = h(ν), we obtain cos(hḡ(ν) − g̃h(ν)) = 1. Thus,
we have hḡ(ν) = g̃h(ν) mod (2π), for all ν ∈ Ω. This proves (ii). Exploiting this result,
(A.8) reduces to
d(g̃h(ν), g̃(δ)) = d(h(ν), δ),
for all ν ∈ Ω and δ ∈ h(Ω). This implies that g̃(·) is distance-preserving map on A. Let
ψ be the projection of g̃(φ) on g̃(A). Since g̃(·) is injective, we have
d(g̃(φ), ψ) = d(φ, φ0 ) = d(g̃(φ), g̃(φ0 )).
From the uniqueness of projection, ψ = g̃(φ0 ). This proves (iii).
A.5. Proof of Lemma 4.2
First, we show that for all g ∈ G and ν ∈ Ω, new estimand hz (ν) satisfies
hg(z) ḡ(ν) = g̃hz (ν)
for all ν ∈ Ω.
Note that
Z
Z
∗
∗
f (z|ḡ−1 ḡ∗ ḡ(ν)) dλ(g∗ )
f (g(z)|ḡ ḡ(ν)) dλ(g ) =
(A.9)
(from Lemma 4.1(i))
G
G
=
Z
G
f (z|ḡ∗ (ν)) dλ(g∗ )
(using transformation g∗ → gg∗ g−1 ).
R
This implies that for G f (z|ḡ∗ (ν)) dλ(g∗ ) = 0, (A.9) follows from Lemma 4.1(ii). In the
R
case of G f (z|ḡ∗ (ν)) dλ(g∗ ) > 0, for any g ∈ G, we have
R
sin(g̃ ∗ hḡ(ν))τ (g(z)|ḡ∗ ḡ(ν)) dλ(g∗ )
hg(z) ḡ(ν) = atan R G
∗
∗
∗
G cos(g̃ hḡ(ν))τ (g(z)|ḡ ḡ(ν)) dλ(g )
26
Kanika and S. Kumar
R
∗
−1 ∗
ḡ ḡ(ν)) dλ(g∗ )
G sin(hḡ ḡ(ν))τ (z|ḡ
R
= atan
cos(hḡ∗ ḡ(ν))τ (z|ḡ−1 ḡ∗ ḡ(ν)) dλ(g∗ )
G
R
sin(g̃g̃ ∗ h(ν))τ (z|ḡ∗ (ν)) dλ(g∗ )
= atan R G
∗
∗
∗
G cos(g̃g̃ h(ν))τ (z|ḡ (ν)) dλ(g )
R
sin(g̃ ∗ h(ν))τ (z|ḡ∗ (ν)) dλ(g∗ )
G
= g̃ atan R
cos(g̃ ∗ h(ν))τ (z|ḡ∗ (ν)) dλ(g∗ )
G
= g̃hz (ν)
for all ν ∈ Ω. The above equalities utilize Lemmas 4.1 and 2.3, the transformation g∗ →
gg∗ g−1 and the circular property of g̃. Therefore, the surjection property of ḡ and (A.9)
imply that
g̃hz (Ω) = hg(z) (Ω),
(A.10)
or equivalently, cc(g̃hz (Ω)) = cc(hg(z) (Ω)) = Ag(z) . Clearly, g̃-image of a closed convex
set is again a closed convex set. Therefore, g̃(cc(hz (Ω))) is also a closed convex and
g̃hz (Ω) ⊂ g̃(cc(hz (Ω))). This implies that
Ag(z) = cc(g̃hz (Ω)) ⊂ g̃(cc(hz (Ω))) = g̃(Az )
as cc(g̃hz (Ω)) is the smallest convex set containing g̃hz (Ω). Next, we show that g̃(Az ) ⊂
Ag(z) . As φ ∈ Az = conv(hz (Ω)) ∪ bd(hz (Ω)), there can be the following two cases:
(i) Suppose φ ∈ conv(hz (Ω)). From Proposition 2.1, there exists φ1 , φ2 ∈ hz (Ω) such
that
w sin φ1 + (1 − w) sin φ2
.
φ = atan
w cos φ1 + (1 − w) cos φ2
Operating g̃ on the both sides of the above equation and using the circular property, we
get
w sin g̃(φ1 ) + (1 − w) sin g̃(φ2 )
.
g̃(φ) = atan
w cos g̃(φ1 ) + (1 − w) cos g̃(φ2 )
Note that g̃(φ1 ), g̃(φ2 ) ∈ g̃hz (Ω). Using (A.10), both belong to hg(z) (Ω). Therefore, g̃(φ) ∈
conv(hg(z) (Ω)) ⊂ Ag(z) .
(ii) Any φ ∈ bd(hz (Ω)) is the limit point of a series of points {φn } with φn ∈
conv(hz (Ω)). Since g̃ is circular so is continuous, g̃(φ) is the limit point of the series
{g̃(φn )} in conv(g̃hz (Ω)) = conv(hg(z) (Ω)). Hence, g̃(φ) ∈ bd(hg(z) (Ω)) ⊂ Ag(z) .
A.6. Proof of Theorem 4.1
Since risk of an equivariant estimator δ(Z) is constant on the orbits of ν ([7], page 149),
risk of the G-equivariant estimator δ(Z) under the loss function L satisfies R(ν, δ) =
Truncated circular parameters
R
G
27
R(ḡ(ν), δ) dλ(g). Using this, the risk of δ(Z) is given by
R(ν, δ) =
Z Z
Z
{1 − cos(δ(z) − hḡ(ν))}f (z|ḡ(ν)) dη(z)) dλ(g)
Z Z
G
{1 − cos(δ(z) − g̃h(ν))}f (z|ḡ(ν)) dλ(g) dη(z).
G
=
Z
In the above step, we utilize the interchange in order of integration and Lemma 4.1(ii).
Note that δ0 (g(z)) is the projection of δ(g(z)) on Ag(z) , that is, δ0 (g(z)) is the projection of g̃(δ(z)) on g̃(Az ) from invariance of δ(z) and Lemma 4.2. From Lemma 4.1(iii),
δ0 (g(z)) = g̃(δ0 (z)), or equivalently, δ0 (z) is also G-equivariant estimator. Therefore, the
above risk expression is also valid for δ0 (z). The difference R(ν, δ) − R(ν, δ0 ) is given by
Z
Z
u=
{cos(δ0 (z) − g̃h(ν)) − cos(δ(z) − g̃h(ν))}f (z|ḡ(ν)) dλ(g) dη(z)
δ(z)∈A
/ z
=
Z
δ(z)∈A
/ z
G
g
E {cos(δ0 (z) − g̃h(ν)) − cos(δ(z) − g̃h(ν))}
Z
G
f (z|ḡ(ν)) dλ(g) dη(z),
R
if G f (z|ḡ(ν)) dλ(g) > 0, where the expectation is taken over g with respect to a probability measure τ (z|ḡ(ν)) dλ(g). Using the representation of hz (ν) given in (4.2) and
denoting by vz (ν) = [{E sin(g̃h(ν))}2 + {E sin(g̃h(ν))}2 ]1/2 , we have
sin hz (ν) = E sin(g̃h(ν))/vz (ν),
cos hz (ν) = E cos(g̃h(ν))/vz (ν),
the risk difference is given by
Z
Z
vz (ν){cos(δ0 (z) − hz (ν)) − cos(δ(z) − hz (ν))} f (z|ḡ(ν)) dλ(g) dη(z).
u=
δ(z)∈A
/ z
G
If l(Az ) ≤ (2/3)π, the above integrand is positive since cos(δ(z) − hz (ν)) ≤ cos(δ0 (z) −
hz (ν)) from Lemma 2.4. This completes the proof.
Acknowledgements
The authors are thankful to the two referees and an associate editor for their constructive
comments and suggestions which have substantially improved the paper.
References
[1] Batschelet, E. (1981). Circular Statistics in Biology. London: Academic Press.
MR0659065
28
Kanika and S. Kumar
[2] Bhattacharya, C.G. (1984). Two inequalities with an application. Ann. Inst. Statist.
Math. 36 129–134. MR0752011
[3] Buss, S.R. and Fillmore, J.P. (2001). Spherical averages and applications to spherical
splines and interpolation. ACM Trans. Graph. 20 95–126.
[4] Danzer, L., Grünbaum, B. and Klee, V. (1963). Helly’s theorem and its relatives.
In Proc. Sympos. Pure Math., Vol. VII 101–180. Providence, RI: Amer. Math. Soc.
MR0157289
[5] Ducharme, G.R. and Milasevic, P. (1987). Spatial median and directional data.
Biometrika 74 212–215. MR0885936
[6] Eaton, M.L. (1989). Group Invariance Applications in Statistics. Regional Conference
Series in Probability and Statistics. Hayward, CA: IMS.
[7] Ferguson, T.S. (1967). Mathematical Statistics: A Decision Theoretic Approach. New
York: Academic Press. MR0215390
[8] Fisher, N.I. (1993). Statistical Analysis of Circular Data. Cambridge: Cambridge Univ.
Press. MR1251957
[9] Gradshteyn, I.S. and Ryzhik, I.M. (1965). Table of Integrals, Series and Products. New
York: Academic Press.
[10] He, X. and Simpson, D.G. (1992). Robust direction estimation. Ann. Statist. 20 351–369.
MR1150348
[11] Holmquist, B. (1991). Estimating and testing the common mean direction of several von Mises–Fisher populations with known concentrations. Statistics 22 369–378.
MR1108133
[12] Jammalamadaka, S.R. and SenGupta, A. (2001). Topics in Circular Statistics 5. River
Edge, NJ: World Scientific. MR1836122
[13] Jones, M.C. and Pewsey, A. (2005). A family of symmetric distributions on the circle.
J. Amer. Statist. Assoc. 100 1422–1428. MR2236452
[14] Kubokawa, T. (2004). Minimaxity in estimation of restricted parameters. J. Japan Statist.
Soc. 34 229–253. MR2116757
[15] Kubokawa, T. (2005). Estimation of bounded location and scale parameters. J. Japan
Statist. Soc. 35 221–249. MR2328426
[16] Kumar, S. and Sharma, D. (1992). An inadmissibility result for affine equivariant estimators. Statist. Decisions 10 87–97. MR1165706
[17] Marchand, E. and Strawderman, W.E. (2004). Estimation in restricted parameter
spaces: A review. In A Festschrift for Herman Rubin. Institute of Mathematical Statistics Lecture Notes – Monograph Series 45 21–44. Beachwood, OH: IMS. MR2126884
[18] Marchand, É. and Strawderman, W.E. (2012). A unified minimax result for restricted
parameter spaces. Bernoulli 18 635–643. MR2922464
[19] Mardia, K.V. and Jupp, P.E. (2000). Directional Statistics. Wiley Series in Probability
and Statistics. Chichester: Wiley. MR1828667
[20] Mardia, K.V. and Sutton, T.W. (1978). A model for cylindrical variables with applications. J. Roy. Statist. Soc. Ser. B 40 229–233.
[21] Moors, J.J.A. (1985). Estimation in truncated parameter space. Ph.D. dissertation,
Tilburg Univ., The Netherlands.
[22] Moors, J.J.A. (1981). Inadmissibility of linearly invariant estimators in truncated parameter spaces. J. Amer. Statist. Assoc. 76 910–915. MR0650903
[23] Moors, J.J.A. and van Houwelingen, J.C. (1993). Estimation of linear models with
inequality restrictions. Stat. Neerl. 47 185–198. MR1243854
Truncated circular parameters
29
[24] Neeman, T. and Chang, T. (2001). Rank score statistics for spherical data. Contemp.
Math. 287 241–254.
[25] Rueda, C., Fernández, M.A. and Peddada, S.D. (2009). Estimation of parameters
subject to order restrictions on a circle with application to estimation of phase angles
of cell cycle genes. J. Amer. Statist. Assoc. 104 338–347. MR2504381
[26] Tsai, M.-T. (2009). Asymptotically efficient two-sample rank tests for modal directions on
spheres. J. Multivariate Anal. 100 445–458. MR2483430
[27] Udrişte, C. (1994). Convex Functions and Optimization Methods on Riemannian Manifolds. Mathematics and Its Applications 297. Dordrecht: Kluwer Academic. MR1326607
[28] van Eeden, C. (2006). Restricted Parameter Space Estimation Problems. New York:
Springer. MR2265239
[29] Watson, G.S. (1983). Statistics on Spheres. New York: Wiley. MR0709262
Received January 2015
| 10math.ST
|
Lower Bounds for Differential Privacy from Gaussian Width
Assimakis Kattis
arXiv:1612.02914v1 [cs.DS] 9 Dec 2016
1,2
∗1
and Aleksandar Nikolov
†2
Department of Computer Science, University of Toronto.
Abstract
We study the optimal sample complexity of a given workload of linear queries under the
constraints of differential privacy. The sample complexity of a query answering mechanism under
error parameter α is the smallest n such that the mechanism answers the workload with error
at most α on any database of size n. Following a line of research started by Hardt and Talwar
[STOC 2010], we analyze sample complexity using the tools of asymptotic convex geometry. We
study the sensitivity polytope, a natural convex body associated with a query workload that
quantifies how query answers can change between neighboring databases. This is the information
that, roughly speaking, is protected by a differentially private algorithm, and, for this reason,
we expect that a “bigger” sensitivity polytope implies larger sample complexity. Our results
identify the mean Gaussian width as an appropriate measure of the size of the polytope, and
show sample complexity lower bounds in terms of this quantity. Our lower bounds completely
characterize the workloads for which the Gaussian noise mechanism is optimal up to constants
as those having asymptotically maximal Gaussian width.
Our techniques also yield an alternative proof of Pisier’s Volume Number Theorem which
also suggests an approach to improving the parameters of the theorem.
1
Introduction
The main goal of private data analysis is to estimate aggregate statistics while preserving individual
privacy guarantees. Intuitively, we expect that, for statistics that do not depend too strongly on
any particular individual, a sufficiently large database allows computing an estimate that is both
accurate and private. A natural question then is to characterize the sample complexity under
privacy constraints: the smallest database size for which we can privately estimate the answers
to a given collection of queries within some allowable error tolerance. Moreover, it is desirable to
identify algorithms that are simple, efficient, and have close to the best possible sample complexity.
In this work, we study these questions for collections of linear queries under the constraints of
approximate differential privacy.
We model a database D of size n as a multiset of n elements (counted with repetition) from
an arbitrary finite universe U . Each element of the database corresponds to the data of a single
individual. To define a privacy-preserving computation on D, we use the strong notion of differential
privacy. Informally, an algorithm is differentially private if it has almost identical behavior on any
two databases D and D ′ that differ in the data of a single individual. To capture this concept
formally, let us define two databases to be neighboring if they have symmetric difference of size at
most 1 (counted with multiplicity). Then differential privacy is defined as follows:
∗
†
Email:[email protected]
Email:[email protected]
1
Definition 1 ([DMNS06]). A randomized algorithm A that takes as input a database and outputs
a random element from the set Y satisfies (ε, δ)-differential privacy if for all neighboring databases
′
D, D and all measurable S ⊆ Y we have that:
′
P[A(D) ∈ S] ≤ eε P[A(D ) ∈ S] + δ,
where probabilities are taken with respect to the randomness of A.
One of the most basic primitives in private data analysis, and data analysis in general, are
counting queries and, slightly more generally, linear queries. While interesting and natural in
themselves, they are also quite powerful: any statistical query (SQ) learning algorithm can be
implemented using noisy counting queries as a black box [Kea98]. In our setting, we specify a
linear query by a function q : U → [0, 1] (given
by its truth table). Slightly abusing notation, we
1 P
define the value of the query as q(D) = n e∈D q(e), where the elements of D are counted with
multiplicity. For example, when q : U → {0, 1}, we can think of q as a property defined on U and
q(D) as the fraction of elements of D that satisfy the property: this is a counting query. We call a
set Q of linear queries a workload and an algorithm that answers a query workload a mechanism.
We denote by Q(D) = (q(D))q∈Q the vector of answers to the queries in Q. Throughout the paper,
we will use the letter m for the size of a workload Q.
Starting from the work of Dinur and Nissim [DN03], it is known that we cannot hope to answer
too many linear queries too accurately while preserving even a very weak notion of privacy. For this
reason, we must allow our private mechanisms to make some error. We focus on average error (in
an L2 sense). We define the average error of an algorithm A on a query workload Q and databases
of size at most n as:
1/2
1/2
X (A(D)q − q(D))2
1
2
,
= max E kA(D) − Q(D)k2
err(Q, A, n) = max E
D
D
|Q|
m
q∈Q
where the maximum is over all databases D of size at most n, A(D)q is the answer to query q given
by the algorithm A on input D, and expectations are taken with respect to the random choices of
A. This is a natural notion of error that also works particularly well with the geometric tools that
we use.
In this work we study sample complexity: the smallest database size which allows us to answer
a given query workload with error at most α. The sample complexity of an algorithm A with error
α is defined as:
sc(Q, A, α) = min{n : err(Q, A, n) ≤ α}.
The sample complexity of answering the linear queries Q with error α under (ε, δ)-differential
privacy is defined by:
scε,δ (Q, α) = inf{sc(Q, A, α) : A is (ǫ, δ)-differentially private}.
The two main questions we are interested in are:
1. Can we characterize scε,δ (Q, α) in terms of a natural property of the workload Q?
2. Can we identify conditions under which simple and efficient (ε, δ)-differentially private mechanisms have nearly optimal sample complexity?
2
We make progress on both questions. We identify a geometrically defined property of the workload
that gives lower bounds on the sample complexity. The lower bounds also characterize when one of
the simplest differentially private mechanisms, the Gaussian noise mechanism, has nearly optimal
sample complexity in the regime of constant α.
Before we can state our results, we need to define a natural geometric object associated with
a workload of linear queries. This object has been important in applying geometric techniques to
differential privacy [HT10, BDKT12, NTZ13, Nik15].
Definition 2. The sensitivity polytope K of a workload Q of m linear queries is equal to K =
conv{±Q(D) : D is a database of size 1}.
From the above definition, we see that K is a symmetric (i.e. K = −K) convex polytope in
Rm . The importance of K lies in the fact that it captures how query answers can change between
neighboring databases: for any two neighboring databases D and D ′ of size n and n′ respectively,
nQ(D) − n′ Q(D ′ ) ∈ K. This is exactly the information that a differentially private algorithm is
supposed to hide. Intuitively, we expect that the larger K is, the larger scε,δ (K, α) should be.
We give evidence for the above intuition, and propose the width of K in a random direction as
a measure of its “size”. Let hK be the support function of K: hK (y) = maxx∈K hx, yi. For a unit
vector y, hK (y) + hK (−y) is the width of K in the direction of y; for arbitrary y, hK (ty) scales
linearly with t (and is, in fact, a norm). We define the ℓ∗ -norm of K, also known as its Gaussian
mean width, as ℓ∗ (K) = E[hK (g)], where g is a standard Gaussian random vector in Rm . The
following theorem captures our main result.
Theorem 1. Let Q be a workload of m linear queries, and let K be its sensitivity
polytope. The
ℓ∗ (K)
,
where
C is an
following holds for all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , and any α ≤ Cm(log
2m)2
p
√
absolute constant, and σ(ε, δ) = (0.5 ε + 2 log (1/δ))/ε:
n σ(ε, δ)ℓ∗ (K) σ(ε, δ)√m o
√
scε,δ (Q, α) = O min
;
,
α
mα2
σ(ε, δ)ℓ∗ (K)2
.
scε,δ (Q, α) = Ω
m3/2 (log 2m)4 α
The upper bound on sample complexity is achieved by a mechanism
running
in time polynomial in
√
m
m, n, and |U |. Moreover, if ℓ∗ (K) = Ω(m), then scε,δ (Q, α) = Θ σ(ε,δ)
for any α ≤ 1/C,
α
where C is an absolute constant.
The sample complexity upper bounds in the theorem above are known from prior work: one
is given by the projection mechanism from [NTZ13], with the sample complexity upper bound in
terms of ℓ∗ (K) shown in [DNT14]; the other upper bound is given by the Gaussian noise mechanism [DN03, DN04, DMNS06]. The main new contribution in this work are the lower bounds on
sample complexity. The gap between upper and lower bounds is small when ℓ∗ (K) is close to its
maximal value of m. Indeed, when ℓ∗ (K) = Θ(m), our results imply that the Gaussian noise mechanism has optimal sample complexity up to constants. This is, to the best of our knowledge, the first
example of a general geometric condition under which a simple and efficient mechanism has optimal
sample complexity up to constant factors. Moreover, in the constant error regime this condition
is also necessary for the Gaussian mechanism to be optimal up to constants: when ℓ∗ (K) = o(m)
and α = Ω(1), the projection mechanism has asymptotically smaller sample complexity than the
Gaussian mechanism.
We can prove somewhat stronger results for another natural problem in private data analysis,
which we call the mean point problem. In this problem, we are given a closed convex set K ⊂ Rm ,
3
and we are asked to approximate P
the mean D of the database D, where D = {x1 , . . . , xn } is a
1
multiset of points in K and D = n ni=1 xi . This problem, which will be the focus for most of this
paper, has a more geometric flavor, and is closely related to the query release problem for linear
queries. In fact, Theorem 1 will essentially follow from a reduction from the results below for the
mean point problem.
With respect to the mean point problem, we define the error of an algorithm A as:
err(K, A, n) = sup(EkA(D) − Dk22 )1/2 ,
D
where the supremum is over databases D consisting of at most n points from K, and the expectation
is over the randomness of the algorithm. The sample complexity of an algorithm A with error α is
defined as:
sc(K, A, α) = min{n : err(K, A, n) ≤ α}.
The sample complexity of solving the mean point problem with error α over K is defined by:
scε,δ (K, α) = min{sc(K, A, α) : A is (ǫ, δ)-differentially private}.
Our main result for the mean point problem is given in the following theorem:
Theorem 2. Let K be a symmetric convex body contained in the unit Euclidean ball B2m in Rm .
ℓ∗ (K)
The following holds for all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , and any α ≤ C √m(log
, where C
2m)2
p
√
is an absolute constant, and σ(ε, δ) = (0.5 ε + 2 log (1/δ))/ε:
n σ(ε, δ)ℓ∗ (K) σ(ε, δ)√ m o
;
,
scε,δ (K, α) = O min
α2
α
σ(ε, δ)ℓ∗ (K)
scε,δ (K, α) = Ω
.
(log 2m)2 α
The upper bound on sample complexity is achieved by a mechanism running
in time polynomial in
√
√
m
m, n, and |U |. Moreover, when ℓ∗ (K) = Ω( m), then scε,δ (Q, α) = Θ σ(ε,δ)
for any α ≤ 1/C,
α
where C is an absolute constant.
The upper bounds again follow from prior work, and in fact are also given by the projection
mechanism and the Gaussian noise mechanism, which can be defined for the mean point problem
2
as well. Notice that the gap between the upper and the lower bound is on the order (log α2m) . If the
lower bound ∗was valid for all values of the error parameter α less than a fixed constant, rather than
ℓ (K)
, Theorem 2 would nearly characterize the optimal sample complexity for the
for α ≤ C √m(log
2m)2
mean point problem for all constant α. Unfortunately, the restriction on α is, in general, necessary
(up to the logarithmic terms) for lower bounds on sample complexity in terms of ℓ∗ (K). For
√
example, we can take K = γB2m , i.e. a Euclidean ball in Rm with radius γ. Then, ℓ∗ (K) = Θ(γ m),
but the sample complexity is 0 when α > γ, since the trivial algorithm which ignores the database
and outputs 0 achieves error γ. Thus, a more sensitive measure of the size of K is necessary to
prove optimal lower bounds. We do, nevertheless, trust that the techniques introduced in this
paper bring us closer to this goal.
We conclude this section with a high-level overview of our techniques. Our starting point is a
recent tight lower bound on the sample complexity of a special class of linear queries: the 1-way
marginal queries. These queries achieve the worst case sample complexity for a family of m linear
√
queries: Ω( m/α) [BUV14, SU15]. The sensitivity polytope of the 1-way marginals is the cube
4
[−1, 1]m , and it can be shown that the lower bound on the sample complexity of 1-way marginals
implies an analogous lower bound on the sample complexity of the mean point problem with
√
√
K = Qm = [−1/ m, 1/ m]m . For the mean point problem, it is easy to see that when K ′ ⊆ K,
the sample complexity for K ′ is no larger than the sample complexity for K. Moreover, we can
show that the sample complexity of any projection of K is no bigger than the sample complexity
′
of K itself. So, our strategy then is to find a large scaled copy of Qm , m′ ≤ m, inside a projection
of K onto a large dimensional subspace whenever ℓ∗ (K) is large. We solve this geometric problem
using deep results from asymptotic convex geometry, namely the Dvoretzky criterion, the low M ∗
estimate, and the M M ∗ estimate.
Our techniques also yield an alternative proof of the volume number theorem of Milman and
Pisier [MP87]. Besides avoiding the quotient of subspace theorem, our proof yields an improvement
in the volume number theorem, conditional on the well-known conjecture that√
any symmetric convex
∗
body K has a position (affine image) T K for which ℓ (T K)ℓ(T K) = O(m log 2m), where ℓ(K)
is the expected K-norm of a standard Gaussian. More details about this connection are given in
Section 7.
1.1
Prior Work
Most closely related to our work are the results of Nikolov, Talwar, and Zhang [NTZ13], who gave a
private mechanism (also based on the projection mechanism, but more involved) which has nearly
optimal sample complexity (with respect to average error), up to factors polynomial in log m and
log |U |. This result was subsequently improved by Nikolov [Nik15], who showed that the log m
factors can be replaced by log n. While these results are nearly optimal for subconstant values of
the error parameter α, i.e. the optimality guarantees do not depend on 1/α, factors polynomial in
log |U | can be prohibitively large. Indeed, in many natural settings, such as that of marginal queries,
|U | is exponential in the number of queries m, so the competitiveness ratio can be polynomial in
m.
The line of work that applies techniques from convex geometry to differential privacy started
with the beautiful paper of Hardt and Talwar [HT10], whose results were subsequently strengthened
in [BDKT12]. These papers focused on the “large database” regime (or, in our language, the setting
of subconstant error), and pure differential privacy (δ = 0).
2
Preliminaries
We begin with the introduction of some notation. Throughout the paper we use C, C1 , etc., for
absolute constants, whose value may change from line to line. We use k · k2 for the Euclidean norm,
and k · k1 for the ℓ1 norm. We define B1m and B2m to be the ℓ1 and ℓ2 unit balls in Rm respectively,
while Qm = [− √1m , √1m ]m ⊆ Rm will refer to the m-dimensional hypercube, normalized to be
contained in the unit Euclidean ball. We use Im for the identity operator on Rm , as well as for
the m × m identity matrix. For a given subspace E, we define ΠE : Rm → Rm as the orthogonal
projection operator onto E. Moreover, when T : E → F is a linear operator between the subspaces
E, F ⊆ Rm , we define kT k = max{kT xk2 : kxk2 = 1} as its operator norm, which is also equal to its
largest singular value σ1 (T ). For the diameter of a set K we use the nonstandard, but convenient,
definition diam K = max {kxk2 : x ∈ K}. For sets symmetric around 0, this is equivalent to the
standard definition, but scaled up by a factor of 2. We use N (µ, Σ) to refer to the Gaussian
distribution with mean µ and covariance Σ, and we use the notation x ∼ N (µ, Σ) to denote that x
is distributed as a Gaussian random variable with mean µ and covariance Σ. For a m×m matrix (or
5
m
equivalently an operator from ℓm
2 to ℓ2 ) A we use A 0 to denote that A is positive semidefinite.
For positive semidefinite matrices/operators A, B, we use the notation A B to denote B − A 0.
3
Probability Theory
We make use of some basic comparison theorems from the theory of stochastic processes. First
we state the well-known symmetrization lemma. We also give the short proof for completeness.
Recall that ξ1 , . . . , ξn are a sequence of Rademacher random variables if each ξi is uniformly and
independently distributed in {−1, 1}.
Lemma 1 (Symmetrization). Let p > 1, and let k · k be a norm on Rm . Then, for any sequence
x1 , . . . , xn of independent random variables in Rm such that Ekxi kp is finite for every i, we have
X
X
X
p
p
ξ i xi ,
xi − E
xi ≤ 2p E
E
i
i
i
where ξ1 , . . . , ξn are Rademacher random variables, independent of x1 , . . . , xn . Each expectation
above is with respect to all random variables involved.
P
P
Proof. Let x′1 , . . . , x′n be independent copies of x1 , . . . , xn . Then, E i xi = E i x′i , and, by
convexity of the function k · kp and Jensen’s inequality,
X
X
X
X
X
p
p
p
xi − E
x′i ≤ E
xi − x′i .
xi − E
xi = E
E
i
i
i
i
i
Because xi and x′i are independent and identically distributed,
the random
x′i and
P
Pvariables x′ i −
′
′
p
p
xi − xi are also identically distributed. Therefore, Ek i xi − xi k = Ek i ξi (xi − xi )k , where
ξ1 , . . . , ξn are independent Rademacher random variables, as in the statement of the lemma. Finally,
by Minkowski’s inequality (i.e. triangle inequality for Lp ), we have
!
1/p p
X
X
X
X
p 1/p
p
p
ξi (xi − x′i ) ≤
ξ i xi
+ Ek
ξi x′i kp
E
E
ξ i xi ,
= 2p E
i
i
i
i
as desired.
Next we state a simple comparison theorem for Gaussian random variables.
Lemma 2. Let x ∼ N (0, Σ) and x′ ∼ N (0, Σ′ ) be Gaussian random variables in Rm , and assume
Σ Σ′ . Then, for any norm k · k on Rm , we have:
Ekxk ≤ Ekx′ k.
Proof. Couple x and x′ so that they are independent, and define a new random variable y ∼
N (0, Σ′ − Σ), independent of x and x′ . Then the random variables x + y and x − y are distributed
identically to x′ , and, by linearity of expectation and the triangle inequality we have
kx + yk + kx − yk
′
≥ Ekxk.
Ekx k = E
2
This completes the proof.
Note that the same conclusion follows under weaker assumptions from Slepian’s lemma.
6
3.1
Convex Geometry
In this section, we outline the main geometric tools we use in later sections. For a more detailed
treatment, we refer to the lecture notes by Vershynin [Ver09] and the books by Pisier [Pis89] and
Artstein-Avidan, Giannopoulos, and Milman [AAGM15].
Throughout, we define a convex body K as a compact subset of Rm with non-empty interior. A
convex body K is (centrally) symmetric if and only if K = −K. We define the polar body K ◦ of K
as: K ◦ = {y : hx, yi ≤ 1 ∀x ∈ K}. The following basic facts are easy to verify and very useful.
Fact 1. For convex bodies K, L ⊆ Rm , K ⊆ L ⇔ L◦ ⊆ K ◦ .
Fact 2 (Section/Projection Duality). For a convex body K ⊆ Rm and a subspace E ⊆ Rm :
1. (K ∩ E)◦ = ΠE (K ◦ );
2. (ΠE (K))◦ = K ◦ ∩ E.
In both cases, the polar is taken in the subspace E.
Fact 3. For any invertible linear map T and any convex body K, T (K)◦ = T −∗ (K ◦ ), where T −∗
is the inverse of the adjoint operator T ∗ .
A simple special case of Fact 3 is that, for any convex body K, (rK)◦ =
property alongside Fact 1, we have the following useful corollary.
1 ◦
rK .
Using this
Corollary 1. For a convex body K ⊆ Rm and E ⊆ Rm a subspace with k = dim E, the following
two statements are equivalent:
1. ΠE (rB2m ) ⊆ ΠE (K);
2. K ◦ ∩ E ⊆ 1r (B2m ∩ E),
where, as before, taking the polar set is considered in the subspace E. Notice that the second
statement is also equivalent to diam(K ◦ ∩ E) ≤ 1r .
Our work relies on appropriately quantifying the “size” of (projections and sections of) a convex
body. It turns out that, for our purposes, the right measure of size is related to the notion of width,
captured by the support function. Recall from the introduction that the support function of a
convex body K ⊂ Rm is given by hK (y) = maxx∈K hx, yi for every y ∈ Rm . The support function
is intimately related to the Minkowski norm k · kK , defined for a symmetric convex body K ⊆ Rm
by kxkK = min {r ∈ R : x ∈ rK}, for every x ∈ Rm . It is easy to verify that k · kK is indeed a
norm. The support function hK is identical to the Minkowski norm of the polar body K ◦ (which
is also the dual norm to k · kK ): hK (y) = kykK ◦ for every y ∈ Rm .
Now we come to the measure of the “size” of a convex body which will be central to our results:
the Gaussian mean width of the body, defined next.
Definition 3. The Gaussian mean width and Gaussian mean norm of a symmetric convex body
K ⊆ Rm are defined respectively as:
ℓ∗ (K) = EkgkK ◦ = E[hK (g)],
ℓ(K) = EkgkK ,
where g ∼ N (0, Im ) is a standard Gaussian random variable.
7
The next lemma gives an estimate of how the mean width changes when applying a linear
transformation to K.
m
Lemma 3. For any symmetric convex body K ⊂ Rm , and any linear operator T : ℓm
2 → ℓ2 :
ℓ∗ (T (K)) ≤ kT kℓ∗ (K).
Proof. Notice that, for a standard Gaussian g ∼ N (0, Im ),
ℓ∗ (T (K)) = E sup hT (x), gi = E sup hx, T ∗ (g)i = EkT ∗ (g)kK ◦ .
x∈K
x∈K
Treating T ∗ T as an m × m matrix in the natural way, we see that T ∗ (g) ∼ N (0, T ∗ T ). By applying
Lemma 2 to Σ = T ∗ T and Σ′ = kT k2 Im , we have that
ℓ∗ (T (K)) = EkT ∗ (g)kK ◦ ≤ kT k · EkgkK ◦ = kT kℓ∗ (K).
This finishes the proof of the lemma.
Similar to approaches in previous works ([HT10], [NTZ13]), we exploit properties inherent to a
specific position of K to prove lower bounds on its sample complexity.
Definition 4 (ℓ-position). A convex body K ⊆ Rm is in ℓ-position if for all linear operators
m
T : ℓm
2 → ℓ2 :
ℓ∗ (K) · ℓ(K) ≤ ℓ∗ (T (K)) · ℓ(T (K)).
Clearly, K is in ℓ-position if and only if K ◦ is in ℓ-position, since ℓ∗ (K) = ℓ(K ◦ ) for any
convex body K. Note further that the product ℓ∗ (K) · ℓ(K) is scale-invariant, in the sense that
ℓ∗ (rK) · ℓ(rK) = ℓ∗ (K) · ℓ(K) for any real r. This is because, for any x, y ∈ Rm , kxkrK = 1r kxkK ,
and hrK (y) = rhK (y), so ℓ∗ (rK) = rℓ∗ (K) and ℓ(rK) = 1r ℓ(K).
We will relate the Gaussian mean width of K to another measure of its size, and the size of its
projections and sections, known as Gelfand width. A definition follows.
Definition 5 (Gelfand width). For two symmetric convex bodies K, L ⊂ Rm , the Gelfand width
of order k of K with respect to L is defined as:
ck (K, L) = inf inf{r : K ∩ E ⊆ r(L ∩ E)} = inf sup{kxkL : x ∈ K ∩ E},
E
E
where the first infimum is over subspaces E ⊆ Rm of co-dimension at most k − 1 (i.e. of dimension
at least m − k + 1). When k > m, we define ck (K, L) = 0. We denote ck (K) = ck (K, B2m ), and we
call ck (K) simply the Gelfand width of K of order k.
Note that ck (K) = inf E diam(K ∩ E), where the infimum is over subspaces E ⊆ Rm of codimension at most k − 1. Observe also that for any K and L, ck (K, L) is non-increasing in k. It is
well-known that the infimum in the definition is actually achieved [Pin85].
3.2
Composition of Differential Privacy
One of the most important properties of differential privacy is that it behaves nicely under (adaptively) composing mechanisms.
Lemma 4 (Composition). For randomized algorithms A1 and A2 satisfying (ε1 , δ1 )- and (ε2 , δ2 )differential privacy respectively, the algorithm A(D) = (A1 (D), A2 (A1 (D), D)) satisfies (ε1 +ε2 , δ1 +
δ2 )-differential privacy.
8
3.3
Known Bounds
In this section, we recall some known differentially private mechanisms, with bounds on their sample
complexity, as well as a lower bound on the optimal sample complexity. We start with the lower
bound:
Theorem 3 ([BUV14, SU15]). For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) and α ≤ 1/10:
!
p
m log 1/δ
m
.
scε,δ (Q , α) = Ω
αε
(1)
Next we recall one of the most basic mechanisms in differential privacy, the Gaussian mechanism.
A proof of the privacy guarantee, with the constants given below, can be found in [NTZ13].
Theorem 4 (Gaussian Mechanism [DN03, DN04, DMNS06]).p
Let D = {x1 , . . . , xn } be such that
√
∀i : kxi k2 ≤ σ. If w ∼ N (0, σ(ε, δ)2 σ 2 Im ), σ(ε, δ) = (0.5 ε + 2 log (1/δ))/ε and Im ∈ Rm×m is
the identity matrix, then the algorithm AGM defined by AGM (D) = D + n1 w is (ε, δ)-differentially
private.
Corollary 2. For any symmetric convex K ⊆ B2m :
p
scε,δ (K, α) = O
m log 1/δ
αε
!
.
√ √
0.5 ε+ 2 log (1/δ)
In the rest of the paper we will use the notation σ(ε, δ) =
from the theorem
ε
statement above.
Finally, we also present the projection mechanism from [NTZ13], which post-processes the
output of the Gaussian mechanism by projecting onto K.
Theorem 5 (Projection Mechanism [NTZ13, DNT14]). Let K ⊆ B2m be a symmetric convex body,
and define AP M to be the algorithm that, on input D = {x1 , . . . , xn } ⊂ K, outputs:
ŷ = arg min{kŷ − ỹk22 : ŷ ∈ K},
where ỹ = D + n1 w, w ∼ N (0, σ(ε, δ)2 Im ). Then AP M satisfies (ε, δ)-differential privacy and has
sample complexity:
σ(ε, δ)ℓ∗ (K)
sc(K, AP M , α) = O
.
α2
Corollary 3. For any symmetric convex K ⊆ B2m :
σ(ε, δ)ℓ∗ (K)
.
scε,δ (K, α) = O
α2
4
Basic Properties of Sample Complexity
In this section, we prove some fundamental properties of sample complexity that will be extensively
used in later sections.
Lemma 5. L ⊆ K ⇒ ∀α ∈ (0, 1) : scε,δ (L, α) ≤ scε,δ (K, α).
9
Proof. Observe first that for any algorithm A and any n, err(L, A, n) ≤ err(K, A, n), because
err(K, A, n) is a supremum over a larger set than err(L, A, n). This implies that sc(K, A, α) ≤
sc(L, A, α) holds for any algorithm A, and, in particular, for the (ε, δ)-differentially private algorithm A∗ that achieves scε,δ (K, α). Then, we have:
scε,δ (L, α) ≤ sc(L, A∗ , α) ≤ sc(K, A∗ , α) = scε,δ (K, α),
as desired.
Corollary 4. For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) and α ≤ 1/10:
!
p
m
log
1/δ
.
scε,δ (B2m , α) = Ω
αε
Proof. Since Qm ⊆ B2m , this follows directly from Lemma 5 and Lemma 3.
Lemma 6. For any α ∈ (0, 1), any linear operator T : Rm → Rm and any symmetric convex body
K ⊂ Rm :
scε,δ (K, α) ≥ scε,δ (T (K), α · kT k).
Proof. Let A be an (ε, δ)-differentially private algorithm that achieves scε,δ (K, α). Fix a function
f : T (K) → K so that for every x′ ∈ T (K), f (x′ ) ∈ T −1 (x′ ) ∩ K. We define a new algorithm A′
that takes as input D ′ = {x′1 , ..., x′n } ⊂ T (K) and outputs A′ (D ′ ) = T (A(D)), where D = f (D ′ ) =
{f (x′1 ), . . . , f (x′n )}. We claim that A′ is (ε, δ)-differentially private and that err(T (K), A′ , n) ≤
kT k · err(K, A, n) holds for every n. This claim is sufficient to prove the lemma, because it implies:
scε,δ (T (K), α · kT k) ≤ sc(T (K), A′ , α · kT k) ≤ sc(K, A, α) = scε,δ (K, α).
To show the claim, first observe that, by linearity, D ′ = T (D). We get:
EkA′ (D ′ ) − D ′ k22 = EkT (A(D)) − T (D)k22
= EkT (A(D) − D)k22
≤ kT k2 · EkA(D) − Dk22 ≤ kT k2 err(K, A, n)2 ,
where the first inequality follows by the definition of the operator norm. Since this holds for
arbitrary n and D ′ ⊂ T (K) of size n, it implies the claim on the error bound of A′ . It remains to
show that A′ is (ε, δ)-differentially private. Note that for every two neighboring databases D1′ and
D2′ of points in T (K),the corresponding databases D1 = f (D1′ ) and D2 = f (D2′ ) of points in K are
also neighboring. Then A(D) = A(f (D ′ )) is (ε, δ)-differentially private as a function of D ′ , and the
privacy of A′ follows from Lemma 4.
Corollary 5. For any t > 0:
scε,δ (tK, tα) = scε,δ (K, α).
Proof. Taking T = tIm in Lemma 6, where Im is the identity on Rm , the lemma implies scε,δ (tK, tα) ≤
scε,δ (K, α). Since this inequality holds for any t and K, we may apply it to K ′ = tK and t′ = 1/t,
and we get scε,δ (K, α) = scε,δ ((1/t)tK, (1/t)tα) ≤ scε,δ (tK, tα).
Since for any subspace E of Rm , the corresponding orthogonal projection ΠE has operator norm
1, we also immediately get the following corollary of Lemma 6:
10
Corollary 6. For any subspace E:
scε,δ (K, α) ≥ scε,δ (ΠE (K), α).
In the next theorem, we combine the lower bound in Corollary 4 and the properties we proved
above in order to give a lower bound on the sample complexity of an arbitrary symmetric convex
body K in terms of its geometric properties. In the following sections we will relate this geometric
lower bound to the mean Gaussian width of K.
Theorem 6 (Geometric Lower Bound). For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , any convex
symmetric body K ⊆ Rm , any 1 ≤ k ≤ m and any α ≤ 1/(10ck (K ◦ )):
!
p
√
log 1/δ
m−k+1
.
·
scε,δ (K, α) = Ω
αε
ck (K ◦ )
Proof. Let us fix k and let E be the subspace that achieves ck (K ◦ ), i.e. diam(ΠE (K ◦ )) = ck (K ◦ )
and dE = dim E ≥ m − k + 1. By Corollary 1, we have ck (K ◦ )−1 ΠE (B2m ) ⊆ ΠE (K). Applying
Corollary 6, Lemma 5, and Corollary 5 in sequence, we get:
scε,δ (K, α) ≥ scε,δ (ΠE (K), α) ≥ scε,δ (ck (K ◦ )−1 ΠE (B2m ), α)
= scε,δ (Π(B2m ), αck (K ◦ )).
Notice that ΠE (B2m ) is the Euclidean unit ball in the subspace E, and, therefore:
scε,δ (Π(B2m ), αck (K ◦ )) = scε,δ (B2dE , αck (K ◦ )).
Finally, by Corollary 4, we get the following lower bound, as long as αck (K ◦ ) ≤ 1/10:
!
!
p
p
√
d
log
1/δ
log
1/δ
m
−
k
+
1
E
=Ω
.
·
scε,δ (B2dE , αck (K ◦ )) = Ω
αck (K ◦ )ε
αε
ck (K ◦ )
Combining the inequalities completes the proof.
5
Optimality of the Gaussian Mechanism
In this section, we present the result that the Gaussian mechanism is optimal, up to constant
factors, when K ⊆ B2m is sufficiently large. More specifically, if the Gaussian mean width of K
is asymptotically maximal, then we can get a tight lower bound on the sample complexity of the
Gaussian mechanism. This is summarized in the theorem below.
Theorem 7. For all ε < O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , sufficiently small constant α, and any
symmetric convex body K ⊆ B2m , if
√
ℓ∗ (K) = Ω( m),
then:
scε,δ (K, α) = Θ
p
!
m log 1/δ
,
αε
and scε,δ (K, α) is achieved, up to constants, by the Gaussian mechanism.
11
By Corollary 2 we have an upper bound for the Gaussian mechanism defined previously. To
prove its optimality, we use a classical result from convex geometry, known as Dvoretzky’s criterion,
to show a matching lower bound for the sample complexity. This result relates the existence of
a nearly-spherical section of a given convex body to the Gaussian mean norm. It was a key
ingredient in Milman’s probabilistic proof of Dvoretzky’s theorem: see Matoušek’s book [Mat02]
for an exposition.
Theorem 8 ([Mil71]; Dvoretzky’s Criterion). For every symmetric convex body K ⊆ Rm such
that B2m ⊆ K, and every β < 1, there exists a constant c(β) and a subspace E with dimension
dim E ≥ c(β)ℓ(K)2 for which:
ℓ∗ (K)
ℓ(K)
(1 − β) √ B2m ∩ E ⊆ K ∩ E ⊆ (1 + β) √ B2m ∩ E.
m
m
Proof of Theorem 7. Given the matching upper bound on sample complexity in Corollary 2, it
suffices to show the equivalent lower bound, namely that:
!
p
m log 1/δ
scε,δ (K, α) = Ω
.
αε
To this end, we will show that there exists a k ≤ (1 − c)m + 1, for an absolute constant c, so that
ck (K ◦ ) = O(1). Then the lower bound will follow directly from Theorem 6.
We will prove the claim above by applying Dvoretzky’s criterion to K ◦ . By Fact 1, K ⊆ B2m ⇒
B2m ⊆ K ◦ . We can then apply Dvoretzky’s criterion with β = 1/2, ensuring that there exists a
subspace E of dimension dim E ≥ c(1/2)ℓ(K ◦ )2 for which:
K◦ ∩ E ⊆
ℓ(K ◦ ) m
√ B ∩ E.
2 m 2
Let us define k = m − dim E + 1; then k ≤ m − c(1/2)ℓ(K ◦ )2 + 1 = m − c(1/2)ℓ∗ (K)2 + 1. Since,
by assumption ℓ(K ∗ ) = Ω(m), there exists a constant c so that k ≤ (1 − c)m + 1. Finally, by the
◦
√ ) = O(1), as desired. This completes the proof.
definition of Gelfand width, ck (K ◦ ) ≤ ℓ(K
2 m
6
Gaussian Width Lower Bounds in ℓ-position
In Section 5 we showed that the Gaussian Mechanism is optimal when the Gaussian mean width of
K is asymptotically as large possible. Our goal in this and the following section is to show general
lower bounds on sample complexity in terms of ℓ∗ (K). This is motivated by the sample complexity
upper bound in terms of ℓ∗ (K) provided by the projection mechanism.
It is natural to follow the strategy from Section 5: use Dvoretzky’s criterion to find a nearlyspherical projection of K of appropriate radius and dimension. An inspection
of the proof of 7 shows
ℓ∗√
(K)2
(ignoring the dependence on
that the sample complexity lower bound we get this way is Ω
m
ε, δ, and α here, and in the rest of this informal discussion). Recall that we are aiming for a lower
∗
bound of of Ω(ℓ∗ (K)), so we are off by a factor of ℓ√(K)
. Roughly speaking, the problem is that
m
Dvoretzky’s criterion does too much: it guarantees a spherical section of K ◦ , while we only need a
bound on the diameter of the section. In order to circumvent this difficulty, we use a different result
from asymptotic convex geometry, the low M ∗ -estimate, which bounds the diameter of a random
section of K ◦ , without also producing a large ball contained inside the section. A technical difficulty
is that the resulting upper bound on the diameter is in terms of the Gaussian mean K-norm, rather
12
than the (reciprocal of the) mean width. When K is in ℓ-position, this is not an issue, because
results of Pisier, Figiel, and Tomczak-Jaegermann show that in that case ℓ(K)ℓ∗ (K) = O(log m).
In this section we assume that K is in ℓ-position, and we remove this requirement in the subsequent
section.
The main result of this section is summarized below.
Theorem 9. For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , all symmetric convex bodies K ⊆ Rm in
∗
, where C is an absolute constant:
ℓ-position, and for α ≤ C √ℓm(K)
log 2m
scε,δ (K, α) = Ω
p
!
log 1/δ ℓ∗ (K)
.
·
αε
log 2m
The following two theorems are the main technical ingredients we need in the proof of Theorem 9.
Theorem 10 ([FTJ79], [Pis80]; M M ∗ Bound). There exists a constant C such that for every
symmetric convex body K ⊂ Rm in ℓ-position:
ℓ(K) · ℓ∗ (K) ≤ C · m log 2m.
√
It is an open problem whether this bound can be improved to m log 2m. This would be tight
for the cube Qm . This improvement would lead to a corresponding improvement in our bounds.
Theorem 11 ([PTJ86]; Low M ∗ estimate). There exists a constant C such that for every symmetric
convex body K ⊂ Rm there exists a subspace E ⊆ Rm with dim E = m − k for which:
ℓ∗ (K)
diam (K ∩ E) ≤ C · √ .
k
Combining Theorems 10 and 11, we get the following key lemma.
Lemma 7. There exists a constant C such that for every symmetric convex body K ⊂ Rm in ℓposition, and every β ∈ (0, 1 − 1/m), there exists a subspace E of dimension at least βm satisfying:
√
m log 2m
.
diam(K ∩ E) ≤ C √
1 − β · ℓ(K)
Proof. Let k = ⌊(1 − β)m⌋ ≥ 1. Using the low M ∗ estimate on K, there exists a subspace E with
dim E = m − k = ⌈βm⌉ for which:
ℓ∗ (K)
diam (K ∩ E) ≤ C1 · √ .
k
By the M M ∗ upper bound, since K is in ℓ-position, we have that:
ℓ∗ (K) ≤ C2 ·
m log 2m
,
ℓ(K)
and, combining the two inequalities, we get that:
√
m log 2m
m log m
,
diam(K ∩ E) ≤ C1 C2 √
≤ C√
1 − β · ℓ(K)
k · ℓ(K)
for an appropriate constant C. This completes the proof.
13
The proof of the desired lower bound now follows easily from this lemma.
Proof of Theorem 9. By Theorem 6, it suffices to show that
√
∗
ℓ (K)
m−k+1
m
max
=Ω
.
k=1
ck (K ◦ )
log 2m
(2)
Indeed,
if k∗ is the value of k for which the maximum on the left hand side is achieved, then
√
∗
m−k +1
◦
∗
c ∗ (K ◦ ) is a lower bound on the sample complexity for all α ≤ 1/(10ck (K )), and by (2):
k
1
=Ω
10ck∗ (K ◦ )
ℓ∗ (K)
√
m − k + 1 · log 2m
=Ω
ℓ∗ (K)
√
m · log 2m
.
In the rest of the proof, we establish (2).
Since K (and thus also K ◦ ) are in ℓ-position by assumption, from Lemma 7 applied to K ◦ we
have that there exists a subspace E such that dim E ≥ m/2 and:
√
√
m log 2m
m log 2m
=
O
.
diam(K ◦ ∩ E) = O
ℓ(K ◦ )
ℓ∗ (K)
Setting kE = m − dim E + 1 ≤ m/2 + 1, and because ckE (K ◦ ) ≤ diam(K ◦ ∩ E) by definition, we
get that:
√
√
∗
m−k+1
dim E
ℓ (K)
m
max
≥
=Ω
,
k=1
ck (K ◦ )
diam(K ◦ ∩ E)
log 2m
as desired.
7
Gaussian Width Lower Bounds for Arbitrary Bodies
In this section, we remove the assumption that K is in ℓ-position from the previous section. Instead,
we use a recursive charging argument in order to reduce to the ℓ-position case. The resulting
guarantee is worse than the one we proved for bodies in ℓ-position by a logarithmic factor.
The main lower bound result of this section is the following theorem.
Theorem 12. For all ε = O(1), 2−Ω(n) ≤ δ ≤ 1/n1+Ω(1) , any symmetric convex body K ⊂ Rm ,
ℓ∗ (K)
, where C is an absolute constant:
and any α ≤ C √m(log
2m)2
scε,δ (K, α) = Ω
σ(ε, δ)ℓ∗ (K)
(log 2m)2 α
.
The lower bound follows from the geometric lemma below, which is interesting in its own right.
Lemma 8. There exists a constant C such that, for any symmetric convex body K ⊂ Rm ,
!
m
X
1
∗
√
ℓ (K) ≤ C(log 2m)
.
i · cm−i+1 (K ◦ )
i=1
14
(3)
Lemma 8 is closely related to the volume number theorem of Milman and Pisier [MP87], which
1
states that the inequality (3) holds with cm−i+1
(K ◦ ) replaced by the volume number vi (K), defined
as:
vol(ΠE (K))1/i
,
vi (K) = sup
m 1/i
E:dim E=i (vol(ΠE (B2 ))
where the supremum is over subspaces E of Rm . Inequality (3) is stronger than the volume
1
1
number theorem, because cm−i+1
(K ◦ ) ≤ vi (K). Indeed, setting r = cm−i+1 (K ◦ ) , by Corollary 1 and
the definition of Gelfand width we have that there exists a subspace E of dimension i such that
rΠE (B2m ) ⊆ ΠE K. Therefore, vol(ΠE (K)) ≥ r i vol(ΠE (B2m )), which implies the desired inequality.
Even though the volume number theorem is weaker than (3), the proof given by Pisier in his
book [Pis89], with minor modifications, appears to yield the stronger inequality we need. Rather
than repeat this argument, we give a self-contained and slightly different proof below. Our proof
only uses the low M ∗ estimate, the M M ∗ estimate, and elementary linear algebra, while Pisier’s
∗
proof uses
√ Milman’s quotient of subspace theorem. Moreover, if the M M estimate can be improved
would imply a corresponding improvement of the logarithmic factor
to O(m log 2m), our argument
√
in (3) from log 2m to log 2m. This does not appear to be the case in Pisier’s proof, where
the logarithmic factor comes from the (tight) upper estimate of the K-convexity constant of mdimensional Banach spaces.
To prove Lemma 8 we will first establish an auxiliary lemma.
Lemma 9. There exists a constant C such that, for any symmetric convex body K ⊂ Rm and
m ≥ 4, there exists a subspace E ⊆ Rm such that dim E ≥ ⌊m/4⌋ and:
√
m
∗
.
ℓ (ΠE (K)) ≤ C(log 2m)
c2⌊m/4⌋+1 (K ◦ )
Proof. Let T be a linear operator such that T (K) is in ℓ-position. By the rotational invariance of
Gaussians, ℓ∗ (U T (K)) = ℓ∗ (T (K)) and ℓ(U T (K)) = ℓ(T (K)) for any orthogonal transformation
U ; so, we may assume that T is self-adjoint and positive definite.
Let λ1 ≥ . . . ≥ λm > 0 be the eigenvalues of T . Let us set k = ⌊m/4⌋ and define E to be the
subspace spanned by the eigenvectors of T corresponding to λ1 , . . . , λk . Observe that ΠE and T
commute because they are simultaneously diagonalized by the eigenvectors of T .
Using Lemma 3, we calculate:
ℓ∗ (ΠE (K)) = ℓ∗ (ΠE T −1 T (K)) ≤ kΠE T −1 kℓ∗ (T (K)).
By the definition of E, the singular values of ΠE T −1 are λ−1
≥ . . . ≥ λ−1
1 , and therefore the
k
operator norm of ΠE T −1 is kΠE T −1 k = λ−1
.
Thus
we
have:
k
ℓ∗ (ΠE (K)) ≤
ℓ∗ (T (K))
.
λk
Since T (K), and thus T (K)◦ , is in ℓ-position, we can apply Lemma 7 to T (K)◦ and β =
and get that there exists a subspace F of dimension at least m − k so that:
√
m
ℓ∗ (T (K)) ≤ C1 (log 2m)
,
diam(T (K)◦ ∩ F )
where C1 is an absolute constant.
15
(4)
m−k
m
≥
1
4
Let G = E ⊥ be the orthogonal complement of the subspace E, i.e. the space spanned by the
eigenvectors of T corresponding to the eigenvalues λk+1 , . . . , λm . The restriction T |G : G → Rm of
T to G has eigenvalues λk+1 ≥ . . . ≥ λm . Therefore kT |G k ≤ λk+1 ≤ λk . Because G is spanned by
eigenvectors of T , it is invariant under action by T , i.e. T (G) = G, and, equivalently, T −1 (G) = G.
Therefore T −1 (K ◦ ) ∩ G = T −1 (K ◦ ∩ G) and K ◦ ∩ G = (T |G )T −1 (K ◦ ∩ G). It follows that:
diam(K ◦ ∩ F ∩ G) = diam((T |G )T −1 (K ◦ ∩ G) ∩ F )
≤ kT |G k diam(T −1 (K ◦ ∩ G) ∩ F )
≤ λk diam(T −1 (K ◦ ) ∩ F )
= λk diam(T (K)◦ ∩ F ).
Setting H = F ∩ G and combining the inequalities, we get that:
√
√
λk m
λk m
≤
C
(log
2m)
,
ℓ∗ (T (K)) ≤ C1 (log 2m)
1
diam(K ◦ ∩ H)
c2k+1 (K ◦ )
where the final inequality follows from the definition of Gelfand width, since the co-dimension of
H is at most 2k. Sibstituting this inequality into the right hand side of (4) finishes the proof of
the lemma.
We are now ready to prove Lemma 8.
Proof of Lemma 8. Let us first establish the lemma for m ≤ 16. Notice that:
cm (K ◦ ) =
min diam(K ◦ ∩ {tθ : t ∈ R}).
θ:kθk2 =1
But diam(K ◦ ∩ {tθ : t ∈ R}) = kθk1 ◦ for any unit vector θ, by the definition of Minkowski norm.
K
Therefore, 1/cm (K ◦ ) = max{kθkK ◦ : kθk2 = 1}. It follows that, for a standard Gaussian g in Rm :
√
(Ekgk22 )1/2
4
m
Ekgk2
∗
◦
≤
=
≤
.
(5)
ℓ (K) = EkgkK ≤
cm (K ◦ )
cm (K ◦ )
cm (K ◦ )
cm (K ◦ )
This establishes the lemma for m ≤ 16.
For m > 16, we will use an induction argument. We will strengthen the induction hypothesis
to:
⌈k/2⌉
X
1
.
√
ℓ∗ (K) ≤ C(log 2k)
(6)
◦)
i
·
c
(K
k−i+1
i=1
Assume the inequality holds for a sufficiently large absolute constant C and all symmetric convex
bodies K ⊆ Rk , in any dimension k < m. We will show that the inequality then holds in dimension
k = m as well. The inequality (5), provides the base case for the induction (k ≤ 16).
We proceed with the inductive step. By Lemma 9 there exists a subspace E of dimension at
least ⌊m/4⌋ such that:
√
m
∗
.
ℓ (ΠE (K)) ≤ C1 (log 2m)
c2⌊m/4⌋+1 (K ◦ )
Observe that, since 2⌊m/4⌋ ≤ ⌊m/2⌋, and cj (K ◦ ) is monotone non-increasing in j, we have that
c2⌊m/4⌋+1 (K ◦ ) ≥ cm−i+1 (K ◦ ) for any i ≤ ⌈m/2⌉. Moreover,
⌈m/2⌉
1 √
1
√ ≥
m,
C2
i
i=⌈3m/8⌉+1
X
16
for all m > 16 and an absolute constant C2 . These observations together imply that
∗
ℓ (ΠE (K)) ≤ C1 (log 2m)
√
m
c2⌊m/4⌋+1
(K ◦ )
≤ C1 C2 (log 2m)
⌈m/2⌉
X
i=⌈3m/8⌉+1
√
1
i · cm−i+1 (K ◦ )
.
(7)
For a standard Gaussian g ∼ N (0, Im ), using the triangle inequality and the fact that Im =
ΠE + ΠE ⊥ , we have:
ℓ∗ (K) = E max |hx, gi|
x∈K
= E max |hΠE x, gi + ΠE ⊥ x, gi|
x∈K
≤ E max |hΠE x, gi| + E max |hΠE ⊥ x, gi|
x∈K
∗
x∈K
∗
= ℓ (ΠE K) + ℓ (ΠE ⊥ K).
Then, the inductive hypothesis follows by (7) and by the inductive hypothesis (6) applied to
ℓ∗ (ΠE ⊥ ). This finishes the proof of the lemma.
Proof of Theorem 12. As in the proof of Theorem 9, it is sufficient to prove that:
√
∗
ℓ (K)
m−k+1
m
=Ω
.
max
k=1
ck (K ◦ )
(log 2m)2
(8)
But this inequality follows easily from Lemma 8 and the trivial case of Hölder’s inequality:
!
!
!
√
m
m
X
X
1
1
i
m
∗
√
ℓ (K) ≤ C(log 2m)
· max
≤ C(log 2m)
◦)
i=1 cm−i+1 (K ◦ )
i
i
·
c
(K
m−i+1
i=1
i=1
!
√
i
m
= O((log 2m)2 ) · max
.
i=1 cm−i+1 (K ◦ )
Then, the proof of the theorem follows from (8) analogously to the proof of Theorem 9.
We now have everything in place to prove our main result for the mean point problem.
Proof of Theorem 2. The upper bounds on sample complexity follow from Theorem 4, Corollary 2,
Theorem 5, and Corollary 3. The lower bounds follow from Theorem 12. The statement after
“moreover” follows from Corollary 2 and Theorem 7.
8
From Mean Point to Query Release
All the bounds we proved so far were for the mean point problem. In this section we show reductions
between this problem, and the query release problem, which allow us to translate our lower bounds
to the query release setting and prove Theorem 1. We will show that the problem of approximating
Q(D) for a query workload Q under differential privacy is nearly equivalent to approximating the
mean point problem with universe K ′ = √1m K, where K is the sensitivity polytope of Q. The main
technical lemma follows.
17
Lemma 10. Let Q be a workload of m linear queries over the universe U with sensitivity polytope
K. Define K ′ = √1m K. Then, we have the inequalities:
scε,δ (Q, α) ≤ scε,δ (K ′ , α);
16 diam(K ′ )
′
scε,δ (K , α) ≤ max sc2ε,2δ (Q, α/4),
.
α2
(9)
(10)
Moreover, we can use an (ε, δ)-differentially private algorithm A′ as a black box to get an (ε, δ)differentially private algorithm A such that sc(Q, A, α) = sc(K ′ , A′ , α). A makes a single call to
A′ , and performs additional computation of worst-case complexity O(mn), where n is the size of
the database.
Proof. Note that inequality (9) is implied by the statement after “moreover”. We prove this
claim first. The algorithm A uses D to form a database D ′ of elements from K ′ which contains,
for each e ∈ D, a copy of √1m Q({e}). This transformation clearly takes time O(mn). Then A
√
simply outputs mA′ (D ′ ). Because any two neighboring databases D1 , D2 drawn from U are
transformed into neighboring databases D1′ , D2′ of points from K ′ , and A′ was assumed to be
′
(ε, δ)-differentially private, we have that A is (ε, δ)-differentially private as well. Also, since D =
√1 Q(D), err(Q, A, n) = err(K ′ , A, n) by definition, which implies that sc(Q, A, α) = sc(K ′ , A′ , α).
m
The second inequality (10) is more challenging. We will show that for any (ε, δ)-differentially
private algorithm A there exists an (2ε, 2δ)-differentially private algorithm A′ such that:
err(K ′ , A′ , n) ≤ 2 err(Q, A, n) +
2 diam(K ′ )
√
.
n
A simple calculation then shows that this implies the desired inequality. In constructing A′ we
will run A on a database formed by sampling from the vertices of K ′ (which correspond to universe elements) so that the true query answers are preserved in expectation. The analysis uses
symmetrization.
Let A′ be given the input D ′ = {x1 , . . . , xn }, which is a multiset of points from K ′ . A′ will
randomly construct two databases D+ and D− (i.e. multisets of elements from U ), and output
√1 (A(D+ ) − A(D− )).
m
Next we describe how D+ and D− are sampled. Observe that, for each i, xi is a convex
combination of vertices of K ′ . Therefore, by Caratheodory’s
theorem, there exist universe elements
1 Pk i
√
ei,1 , . . . , ei,ki ∈ U , where ki ≤ m + 1, such that xi = m j=1 αi,j Q(ei,j ) for some αi,1 , . . . , αi,ki ∈
P i
[−1, 1] satisfying kj=1
|αi | = 1. We would like to fix a unique way to pick the ei,j and αi,j for each
xi , and indeed for any point in K ′ . To this end, fix an arbitrary order on U , and for each xi choose
a minimal sequence ei,1 , . . . , ei,ki that satisfies the conditions above and which comes earliest in the
lexicographic order induced by the order on U . Once we have chosen the ei,j and αi,j , we construct
D+ and D− using the following sampling procedure: for each i ∈ [n], we independently sample ji
from [ki ], s.t. P[ji = j] = |αi,j |; we add ei,ji to D+ if αi,ji ≥ 0, and to D− otherwise. Then, as
mentioned above, A′ outputs √1m (A(D+ ) − A(D− )).
First, we show that A′ is (2ε, 2δ)-differentially private. Let D1′ = {x1 , . . . , xn } and D2′ =
{x1 , . . . , xn , xn+1 } be two neighboring databases and let {ei,j } and {αi,j } be defined as above,
(1)
(1)
where 1 ≤ i ≤ n + 1 and for each i, 1 ≤ j ≤ ki . Let D+ , D− be the random databases sampled by
(2)
(2)
A′ on input D1′ , and let D+ , D− be the random databases sampled on input D2′ . Let us couple
(1)
(2)
(2)
(1)
D+ and D+ so that they have symmetric difference at most 1 and D+ is a superset of D+ . We
18
(1)
can achieve this by sampling ji ∈ [ki ] as described above for 1 ≤ i ≤ n and adding ei,ji to both D+
(2)
and D+ if αi,ji ≥ 0 (or to neither otherwise) and sampling jn+1 ∈ [kn+1 ] and adding en+1,jn+1 to
(2)
(1)
(2)
D+ if αn+1,jn+1 ≥ 0. Because, with this coupling, D+ and D+ are always neighboring, by the
(ε, δ)-differential privacy guarantee for A we have that, for any measurable S in the range of A:
(2)
(1)
P[A(D+ ) ∈ S] ≤ eε P[A(D+ ) ∈ S] + δ,
(2)
(1)
P[A(D+ ) ∈ S] ≥ e−ε P[A(D+ ) ∈ S] − δ,
(2)
(1)
where the probabilities are taken over the random choices of D+ and D+ , and over the randomness
(2)
(1)
of A. An analogous argument holds for D− and D− . Therefore, each of the two calls of A made
by A′ , composed with the sampling procedure that produces the input to A, is (ε, δ)-differentially
private with respect to the input to A′ . The privacy claim follows by composition (Lemma 4).
Finally we analyze the error of A′ . By Minkowski’s inequality, we have:
2 1/2
2 1/2
1
1
′
(EkA′ (D ′ ) − D k22 )1/2 ≤ E A(D+ ) − √ Q(D+ )
+ E A(D− ) − √ Q(D− )
2
2
m
m
1/2
2
1
′
+ E √ (Q(D+ ) − Q(D− )) − D
m
2
1
′ 2 1/2
.
≤ 2 err(Q, A, n) + E √ (Q(D+ ) − Q(D− )) − D
m
2
We proceed to bound the second term on the right hand side. Observe that, by the way we sample
′
D+ and D− , linearity of expectation, and the linearity of Q(·), D = E √1m (Q(D+ ) − Q(D− )).
Let, for each i ∈ [n], ji ∈ [ki ] be sampled as above, and let yi = √1m sign(αi,j )Q(ei,ji ). Then
Pn
′
1 Pn
√1 (Q(D+ ) − Q(D− )) = 1
i=1 yi , so E n
i=1 yi = D . The vectors y1 , . . . , yn are independent
n
m
and all belong to K ′ ⊆ R · B2m , where R = diam(K ′ ). Let ξ1 , . . . , ξn be Rademacher random
variables, independent from everything else; by Lemma 1 and the parallelogram identity:
1
′
E √ (Q(D+ ) − Q(D− )) − D
m
2
2
n
n
1X
1X
=E
yi − E
yi
n
n
≤
4
E
n2
i=1
n
X
i=1
i=1
ξi y i
2
2
=
4
n2
2
2
n
X
i=1
kyi k22 ≤
4R2
.
n
With this, we have established the desired bound on err(K ′ , A′ , n), and, therefore, the lemma.
We will also use a simple lemma that relates the sample complexity at an error level α to the
sample complexity at a lower error level α′ < α. The proof is a padding argument and can be found
in [SU15].
Lemma 11. For any workload Q, any 0 < α′ < α < 1, and any privacy parameters ε, δ, we have
α
· scε,δ (Q, α),
scε,δ (Q, α′ ) = Ω
Cα′
for an absolute constant C.
We are now ready to finish the proof of our main result for query release.
19
Proof of Theorem 1. The upper bounds on sample complexity follow from the upper bounds in
Theorem 2 together with Lemma 10.
ℓ∗ (K)
ℓ∗ (K ′ )
= Cm(log
be the smallest error parameter
Denote K ′ = √1m K, and let α0 = C √m(log
2m)2
2m)2
for which Theorem 12 holds. Then, by Theorem 12 and Lemma 10:
σ(ε, δ)ℓ∗ (K)
diam(K)
√
√
=
Ω
max scε,δ (Q, α0 ),
.
m(log 2m)2 α0
mα20
√
It is easy to show that scε,δ (Q, α0 ) = Ω(diam(K)/(α0 m)) for all sufficiently small ε and δ.
Therefore, we have:
σ(ε, δ)ℓ∗ (K)
.
scε,δ (Q, α0 ) = Ω √
m(log 2m)2
By Lemma 11, we get that for any α ≤ α0 the sample complexity is at least:
σ(ε, δ)ℓ∗ (K)α0
σ(ε, δ)ℓ∗ (K)2
scε,δ (Q, α) = Ω √
.
=
Ω
m(log 2m)2 α
m3/2 (log 2m)4 α
An analogous proof, with α0 = 1/C set to the smallest error parameter for which Theorem 7
holds, establishes the statement after “moreover”.
References
[AAGM15] Shiri Artstein-Avidan, Apostolos Giannopoulos, and Vitali D. Milman. Asymptotic geometric analysis. Part I, volume 202 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2015.
[BDKT12] Aditya Bhaskara, Daniel Dadush, Ravishankar Krishnaswamy, and Kunal Talwar. Unconditional differentially private mechanisms for linear queries. In Proceedings of the
44th symposium on Theory of Computing, STOC ’12, pages 1269–1284, New York, NY,
USA, 2012. ACM.
[BUV14]
Mark Bun, Jonathan Ullman, and Salil Vadhan. Fingerprinting codes and the price of
approximate differential privacy. In Proceedings of the 46th Annual ACM Symposium
on Theory of Computing, pages 1–10. ACM, 2014.
[DMNS06] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise
to sensitivity in private data analysis. In Theory of Cryptography Conference, pages
265–284. Springer, 2006.
[DN03]
Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In
Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles
of Database Systems, pages 202–210. ACM, 2003.
[DN04]
Cynthia Dwork and Kobbi Nissim. Privacy-preserving datamining on vertically partitioned databases. In Annual International Cryptology Conference, pages 528–544.
Springer, 2004.
[DNT14]
Cynthia Dwork, Aleksandar Nikolov, and Kunal Talwar. Using convex relaxations for
efficiently and privately releasing marginals. In 30th Annual Symposium on Computational Geometry, SOCG’14, Kyoto, Japan, June 08 - 11, 2014, page 261. ACM, 2014.
20
[FTJ79]
T. Figiel and Nicole Tomczak-Jaegermann. Projections onto Hilbertian subspaces of
Banach spaces. Israel J. Math., 33(2):155–171, 1979.
[HT10]
Moritz Hardt and Kunal Talwar. On the geometry of differential privacy. In Proceedings
of the 42nd ACM Symposium on Theory of Computing, STOC ’10, pages 705–714, New
York, NY, USA, 2010. ACM.
[Kea98]
Michael Kearns. Efficient noise-tolerant learning from statistical queries. J. ACM,
45(6):983–1006, 1998.
[Mat02]
Jiřı́ Matoušek. Lectures on discrete geometry, volume 212 of Graduate Texts in Mathematics. Springer-Verlag, New York, 2002.
[Mil71]
V. D. Milman. A new proof of A. Dvoretzky’s theorem on cross-sections of convex
bodies. Funkcional. Anal. i Priložen., 5(4):28–37, 1971.
[MP87]
V. D. Milman and G. Pisier. Gaussian processes and mixed volumes. Ann. Probab.,
15(1):292–304, 1987.
[Nik15]
Aleksandar Nikolov. An improved private mechanism for small databases. In Automata,
Languages, and Programming - 42nd International Colloquium, ICALP 2015, Kyoto,
Japan, July 6-10, 2015, Proceedings, Part I, volume 9134 of Lecture Notes in Computer
Science, pages 1010–1021. Springer, 2015.
[NTZ13]
Aleksandar Nikolov, Kunal Talwar, and Li Zhang. The geometry of differential privacy:
the sparse and approximate cases. In Symposium on Theory of Computing Conference,
STOC’13, Palo Alto, CA, USA, June 1-4, 2013, pages 351–360. ACM, 2013.
[Pin85]
Allan Pinkus. n-widths in approximation theory, volume 7 of Ergebnisse der Mathematik
und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)]. SpringerVerlag, Berlin, 1985.
[Pis80]
G. Pisier. Sur les espaces de Banach K-convexes. In Seminar on Functional Analysis,
1979–1980 (French), pages Exp. No. 11, 15. École Polytech., Palaiseau, 1980.
[Pis89]
Gilles Pisier. The volume of convex bodies and Banach space geometry, volume 94 of
Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, 1989.
[PTJ86]
Alain Pajor and Nicole Tomczak-Jaegermann. Subspaces of small codimension of finitedimensional Banach spaces. Proc. Amer. Math. Soc., 97(4):637–642, 1986.
[SU15]
Thomas Steinke and Jonathan Ullman. Between pure and approximate differential
privacy. CoRR, abs/1501.06095, 2015.
[Ver09]
R. Vershynin.
Lectures in geometric functional analysis.
personal.umich.edu/ romanv/papers/GFA-book/GFA-book.pdf, 2009.
21
http://www-
| 8cs.DS
|
arXiv:1404.3790v1 [math.AC] 15 Apr 2014
n-COHERENCE AND (n, d)-PROPERTIES IN
AMALGAMATED ALGEBRA ALONG AN IDEAL
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
Abstract. Let f : A → B be a ring homomorphism and let J be an
ideal of B. The purpose of this article is to examine the transfer of the
properties of n-coherence and strong n-coherence from a ring A to his
amalgamated algebra A ⊲⊳f J. Also, we investigate the (n, d)-property
of the amalgamated algebra A ⊲⊳f J, to resolve Costa’s first conjecture.
1. Introduction
Throughout this paper, all rings are commutative with identity element,
and all modules are unitary.
Let A and B be two rings, let J be an ideal of B and let f : A → B be a
ring homomorphism. In this setting, we can consider the following subring
of A × B:
A ⊲⊳f J = {(a, f (a) + j)a ∈ A, j ∈ J}
called the amalgamation of A with B along J with respect to f (introduced
and studied by D’Anna, Finocchiaro, and Fontana in [9, 10]). This construction is a generalization of the amalgamated duplication of a ring along
an ideal (introduced and studied by D’Anna and Fontana in [11, 12, 13] and
denoted by A ⊲⊳ I). Moreover, other classical constructions (such as the
A + XB[X], A + XB[[X]], and the D + M constructions) can be studied
as particular cases of the amalgamation [9, Examples 2.5 & 2.6] and other
classical constructions, such as the Nagata’s idealization and the CPI extensions (in the sense of Boisen and Sheldon [4]) are strictly related to it (see
[9, Example 2.7 & Remark 2.8]).
Let R be a commutative ring. For a nonnegative integer n, an R-module
E is called n-presented if there is an exact sequence of R-modules:
Fn → Fn−1 → . . . F1 → F0 → E → 0
where each Fi is a finitely generated free R-module. In particular, 0presented and 1-presented R-modules are, respectively, finitely generated
and finitely presented R-modules.
2000 Mathematics Subject Classification. 13D05, 13D02.
Key words and phrases. Amalgamated algebra, amalgamated duplication, strong ncoherent ring, n-coherent ring, (n, d)-ring, n-finitely presented module.
1
2
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
The ring R is n-coherent if each (n−1)-presented ideal of R is n-presented,
and R is strong n-coherent ring if each n-presented R-module is (n + 1)presented [14, 15] (This terminology is not the same as that of Costa (1994)
[7], where Costa’s n-coherence is our strong n-coherence). In particular,
1-coherence coincides with coherence, and one may view 0-coherence as
Noetherianity. Any strong n-coherent ring is n-coherent, and the converse
holds for n = 1 or for coherent rings [15, Proposition 3.3].
In 1994, Costa [7] introduced a doubly filtered set of classes of rings in
order to categorize the structure of non-Noetherian rings: for non-negative
integers n and d, we say that a ring R is an (n, d)-ring if pdR (E) ≤ d
for each n-presented R-module E (as usual, pdR (E) denotes the projective
dimension of E as an R-module). An integral domain with this property will
be called an (n, d)-domain. For example, the (n, 0)-domains are the fields,
the (0, 1)-domains are the Dedekind domains, and the (1, 1))-domains are
the Prüfer domains [7]. Every (n, d)-ring is strong (sup{n, d})-coherent and
every (n, d)-domain is strong (sup{n, d − 1})-coherent [7, Theorem 2.2].
We call a commutative ring an n-Von Neumann regular ring if it is an
(n, 0)-ring. Thus, the 1-Von Neumann regular rings are the Von Neumann
regular rings [7, Theorem 1.3].
In [7], Costa asks whether there is an (n, d)-ring which is neither an
(n, d − 1)-ring nor an (n − 1, d)-ring for each integers n, d ≥ 0. The answer
is affirmative for (0, d)-ring and (1, d)-ring for each integer d ≥ 0 ([7]).
Again in [7], Costa gives examples of (2, 1)-domains which are neither
(2, 0)-domains (fields) nor (1, 1)-domains (Prüfer), and in [8], Costa and
Kabbaj give examples of (2, 2)-domains which are neither (2, 1)-domains
nor (1, 2)-domains. Later, in [21, 23], the author gives a class of (2, d)domains which are neither (2, d − 1)-domains nor (1, d)-domains for each
integer d ≥ 1, and a class of (2, d)-rings (not domains) which are neither
(2, d − 1)-rings (for d ≥ 1) nor (1, d)-rings for each integer d ≥ 0. Next, in
[19], the authors construct a class of (3, d)-rings which are neither (3, d − 1)rings (for d ≥ 1) nor (2, d)-rings for each integer d ≥ 0. Finally, in [22], the
author gives a sufficient condition to resolve Costa’s first conjecture for each
positive integer n and d with n ≥ 4. The second main goal of this paper is
the constructions of the second class of (3, d)-rings for each integer d ≥ 0,
and (2, d)-rings for d ≤ 2, after the first class of cost’s conjecture given by
the authors in [19, 21, 23].
Let A be a ring, E be an A-module, and R := A ∝ E be the set of
pairs (a, e) with pairwise addition and multiplication given by (a, e)(b, f ) =
(ab, af + be). R is called the trivial ring extension of A by E (also called the
idealization of E over A). Considerable work, part of it summarized in Glaz
[17] and Huckaba [18], has been concerned with trivial ring extensions. These
have proven to be useful in solving many open problems and conjectures for
various contexts in (commutative and noncommutative) ring theory. See for
instance [2, 3, 17, 18, 19, 20, 24].
N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA
3
The first section of this work examines the transfer of the properties of
n-coherence and strong n-coherence to the amalgamated algebra A ⊲⊳f J.
Thereby, new examples are provided which, particularly, enriches the current
literature with new classes of n-coherent rings (n ≥ 2) that are non-coherent
rings.
2. Transfer of the properties of (strong) n-coherence (n ≥ 1)
The first main result of this section (Theorem 2.2) examines the transfer
of the properties of strong n-coherence and n-coherence (n ≥ 1) to the
amalgamation algebra along an ideal A ⊲⊳f J issued from local rings.
First, it is worthwhile recalling that the function f n : An → B n defined by
fn Jn
n
i=n
f
n ∼ n
f ((αi )i=n
i=1 ) = (f (αi ))i=1 is a ring homomorphism, (A ⊲⊳ J) = A ⊲⊳
and f n (αa) = f (α)f n (a) for all α ∈ A and a ∈ An (see [1]).
Next, before we announce the main result of this section (Theorem 2.2),
we make the following useful remark.
Remark 2.1. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J 2 = 0. Then A ⊲⊳f J is
a local ring and M ⊲⊳f J is its maximal ideal.
Indeed, by [10, Proposition 2.6 (5)], M ax(A ⊲⊳f J) = {m ⊲⊳f Jm ∈
M ax(A)}∪{Q} with Q ∈ M ax(B) not containing V (J) and Q := {(a, f (a)+
j)a ∈ A, j ∈ J, f (a) + j ∈ Q}. Since J 2 = 0, then J ⊆ Rad(B), and
then J ⊆ Q for all Q ∈ M ax(B). So, M ax(A ⊲⊳f J) = {m ⊲⊳f Jm ∈
M ax(A)} = M ⊲⊳f J since (A, M ) is a local ring. Therefore (A ⊲⊳f J, M ⊲⊳f
J) is a local ring, as desired.
Theorem 2.2. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated
ideal of (f (A) + J), J 2 = 0 and f (M )J = 0. Then:
(1) A ⊲⊳f J is strong n-coherent ring if and only if so is A.
(2) A ⊲⊳f J is n-coherent ring if and only if so is A.
The proof of Theorem 2.2 draws on the following results.
4
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
Lemma 2.3. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J 2 = 0 and f (M )J = 0.
p
Let p, n ∈ N, and let U be a sub-module of M p . Then U ⊲⊳f J p is a nfinitely presented (A ⊲⊳f J)-module if and only if U is a n-finitely presented
A-module, and J is a finitely generated ideal of f (A) + J.
Proof. Proceed by induction on n. The property is true for n =
Indeed,
P0.
p
i=r
f
by [1, Lemma 2.4], it remains to show that if U ⊲⊳f J p :=
i=1 (A ⊲⊳
J)(ui , f p (ui ) + ki ) is a finitely generated ideal of A ⊲⊳f J, where, ui ∈
U and ki ∈ J p for all 1P
≤ i ≤ r, then J is a finitely generated ideal
i=r
p
p
of (f (A) + J). Clearly,
i=1 (f (A) + J)ki ⊆ J . Let k ∈ J . Then,
Pi=r
(0, k) = i=1 (αi , f (αi ) + ji )(ui , f p (ui ) + ki ) for some αi ∈ A and ji ∈ J. So
Pi=r
Pi=r
P
αi ui = 0, and k = i=1
(f (αi )+ji )(f p (ui )+ki ) = i=r
(αi )+ji )ki ∈
i=1 (fP
Pi=1
i=r
i=r
p (U )J ⊆ f p (M p )J = 0). Thus J p ⊆
(f
(A)+
J)k
(since
f
i
i=1
i=1 (f (A)+
P
i=r
p
J)ki . Therefore, J = i=1 (f (A) + J)ki , and then J is a finitely generated
ideal of f (A) + J. Assume that the property is true for n, and assume that
P
p
f
p
U ⊲⊳f J p = i=r
i=1 A ⊲⊳ J(ui , f (ui ) + ki ) is a (n + 1)-finitely presented
f
(A ⊲⊳ J)-module, where ui ∈ U and ki ∈ J p for all i ∈ {1, .....r}. Clearly,
Pi=r
U =
assume that {(ui , f p (ui ) + ki )i=r
i=1 } is a minimal
i=1 Aui . We may
p
p
f
generating set of U ⊲⊳ J . Consider the exact sequence of A-modules:
0 → Kerv → Ar → U → 0
(1)
Pi=r
i=r
where v((αi )i=1 ) = i=1 αi ui . On the other hand consider the exact sequence of (A ⊲⊳f J)-modules:
p
(2)
0 → Keru → (A ⊲⊳f J)r → U ⊲⊳f J p → 0
where
i=r
X
i=r
(αi , f (αi ) + ji )(ui , f p (ui ) + ki )
u((αi , f (αi ) + ji )i=1 ) =
i=1
i=r
X
= (
αi ui ,
i=r
X
i=1
i=1
f (αi )(f p (ui ) + ki )).
P
Pi=r
p
Then Keru =
∈ (A
J)r i=r
i=1 αi ui = 0,
i=1 f (αi )(f (ui )+
ki ) = 0}.
Pi=r
r
i=r
i=r
r
fr J r
So, Keru = {((αi )i=r
i=1 , f ((αi )i=1 ) + (ji )i=1 ) ∈ A ⊲⊳
i=1 αi ui =
Pi=r
0, i=1 f (αi )ki = 0}. Since A ⊲⊳f J is a local ring by Remark 2.1 and
p
{(ui , f p (ui ) + ki )i=r
} is a minimal generating set of U ⊲⊳f J p , then Keru ⊆
i=1
r
r
i=r
i=r
r
f r J r (α )i=r ∈
M r ⊲⊳f J r . So, Keru = {((αi )i=r
i i=1
i=1 , f r ((αi )i=1 )+(ji )i=1 ) ∈ A ⊲⊳
Kerv}. Therefore Keru = Kerv ⊲⊳f J r .
p
Since U ⊲⊳f J p is a (n + 1)-finitely presented (A ⊲⊳f J)-module, then Keru
is a n-finitely presented (A ⊲⊳f J)-module (by a sequence (2)). So, Kerv
is a n-finitely presented A-module and J is a finitely generated ideal of
(f (A) + J) by induction (since Kerv ⊆ M r ). Thus, U is a (n + 1)-finitely
presented A-module (by a sequence (1)). Conversely, assume that U is a
{(αi , f (αi )+ji )i=r
i=1
⊲⊳f
N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA
5
(n + 1)-finitely presented A-module and J is a finitely generated ideal of
p
(f (A) + J), then U ⊲⊳f J p is a finitely generated (A ⊲⊳f J)-module by inP
p
f
p
k ), where ui ∈ U
duction, and then U ⊲⊳f J p = i=r
i=1 A ⊲⊳ J(ui , f (ui ) +
Pi
p
and ki ∈ J for all i ∈ {1, .....r}. It is obvious that U = i=r
i=1 Aui . Since U
is a (n + 1)-finitely presented A-module, then Kerv is a n-finitely presented
r
A-module (by a sequence (1)). So, Keru(= Kerv ⊲⊳f J r ) is a n-finitely
p
generated (A ⊲⊳f J)-module by induction, and then U ⊲⊳f J p is a (n + 1)finitely presented (A ⊲⊳f J)-module (by a sequence (2)), as desired.
Lemma 2.4. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J 2 = 0 and f (M )J = 0.
P
f
p
p
p
Let p, n ∈ N∗ , W := i=r
i=1 (A ⊲⊳ J)(ui , f (ui )+ki ) where, ui ∈ M , ki ∈ J ,
Pi=r
f
and let U = i=1 Aui . Then W is a n-finitely presented (A ⊲⊳ J)-module if
and only if U is a n-finitely presented A-module and J is a finitely generated
ideal of f (A) + J.
P
Pi=r
f
p
Proof. Let W := i=r
i=1 (A ⊲⊳ J)(ui , f (ui ) + ki ) and U =
i=1 Aui . We
may assume that {(ui , f p (ui ) + ki )i=r
}
is
a
minimal
generating
set of W .
i=1
Consider the exact sequence of A-modules:
0 → Kerv → Ar → U → 0
(1)
Pi=r
i=r
where v((αi )i=1 ) = i=1 αi ui . On the other hand consider the exact sequence of (A ⊲⊳f J)-modules:
0 → Keru → (A ⊲⊳f J)r → W → 0
(2)
where
i=r
X
i=r
(αi , f (αi ) + ji )(ui , f p (ui ) + ki )
u((αi , f (αi ) + ji )i=1 ) =
i=1
i=r
X
= (
i=1
αi ui ,
i=r
X
f (αi )(f p (ui ) + ki ))
i=1
Pi=r
Pi=r
f
p
Then Keru = {(αi , f (αi )+ji )i=r
i ui = 0,
i=1 ∈ (A ⊲⊳ J)
i=1 α
i=1 f (αi )ki =
r
r
0}. Since Keru ⊆ M r ⊲⊳f J r , then Keru = Kerv ⊲⊳f J r .
By Lemma 2.3, Keru is a n-finitely presented (A ⊲⊳f J)-module if and only
if Kerv is a n-finitely presented A-module and J is a finitely generated
ideal of f (A) + J (since Kerv ⊆ M r ). So, W is a (n + 1)-finitely presented
(A ⊲⊳f J)-module if and only if U is a (n + 1)-finitely presented A-module
and J is a finitely generated ideal of f (A) + J, as desired.
Proof of Theorem 2.2.
(1) Recall that R is a strong n-coherent ring if and only if every (n − 1)presented submodule of a finitely generated free R-module is
Pn-presented.
Assume that A ⊲⊳f J is strong n-coherent ring and let U := i=r
i=1 Aui be a
6
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
P
f
(n − 1)-finitely presented A-module, where ui ∈ M p , then W : i=r
i=1 (A ⊲⊳
J)(ui , f p (ui )) is a (n − 1)-finitely presented (A ⊲⊳f J)-module by Lemma
2.4. So, W is n-finitely presented (A ⊲⊳f J)-module since A ⊲⊳f J is strong
n-coherent ring. Therefore U is n-finitely presented A-module by Lemma
2.4. Thus, A is strong n-coherent
ring. Conversely, assume that A is strong
Pi=r
n-coherent ring and let W := i=1 A ⊲⊳f J(ui , f p (ui ) + ki ) be a (n − 1)finitely presented (A ⊲⊳f J)-module, where ui ∈ M p , and ki ∈ J p . Then
P
U := i=r
i=1 Aui is a (n − 1)-finitely presented A-module by Lemma 2.4. So,
U is n-finitely presented A-module since A is strong n-coherent ring, and
then W is a n-finitely presented (A ⊲⊳f J)-module by Lemma 2.4. Hence,
A ⊲⊳f J is strong n-coherent ring.
(2) The same reasoning as in the proof of (1) shows that A ⊲⊳f J is ncoherent ring if and only if so is A.
The following corollaries are an immediate consequence of Theorem 2.2.
Corollary 2.5. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated
ideal of (f (A) + J), J 2 = 0 and f (M )J = 0. Then, A ⊲⊳f J is a (strong)
n-coherent ring which is non-(strong) (n − 1)-coherent if and only if so is
A.
Corollary 2.6. Let (A, M ) be a local ring and I be a finitely generated ideal
of A such that M I = 0. Then:
(1) A ⊲⊳ I is a strong n-coherent ring if and only if so is A.
(2) A ⊲⊳ I is a n-coherent ring if and only if so is A.
In particular, Theorem 2.2 enriches the literature with new examples of
2-coherent rings which are non-coherent rings.
Example 2.7. Let k be a field, K be a field containing k as a subfield such
that [K : k] = ∞, T = K[[X]] = K + M , where X is an indeterminate over
K and M = XT be the maximal ideal of T , A = k + M .
Set B := A/M 2 , J := Bf (m) be an ideal of B, where m ∈ M such that
f (m) 6= 0, and consider the canonical ring homomorphism f : A → B
(f (x) = x). Then:
(1) By Theorem 2.2, A ⊲⊳f J is 2-coherent ring since A is by [7, Corollary 5.2].
(2) By [17, Theorem 4.1.5], A ⊲⊳f J is non-coherent ring since A is
non-coherent domain by [7, Corollary 5.2].
N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA
7
Example 2.8. Let K be a field and E be a K-vector space of infinite dimen′
sion. Let A := K ∝ E be trivial extension ring of K by E. Set I := 0 ∝ E ,
′
where E is a finitely generated K-subspace of E. Then:
(1) By Corollary 2.6, A ⊲⊳ I is a 2-coherent ring since A is by [21,
Theorem 3.4].
(2) By [17, Theorem 4.1.5] A ⊲⊳ I is non-coherent ring since A is noncoherent ring by [20, Theorem 2.6].
3. Transfer of the (n, d)-property
For integers n, d ≥ 0, Costa asks in [7] whether there is an (n, d)-ring
which is neither an (n, d − 1)-ring nor an (n − 1, d)-ring? The answer is
affirmative for (0, d)-rings, (1, d)-rings, (2, d)-rings, (3, d)-rings, and (n +
4, d)-rings for all integers n, d (See for instance [7, 8, 19, 20, 21, 23, 25, 22]).
The goal of This section is to give a second class of cost’s conjecture after the
first given by the authors in [19, 21, 23]. At the end of this work, we will be
able to give examples of (2, d)-rings which is neither a (1, d)-ring (d = 0, 1, 2)
nor a (2, d − 1)-ring (d = 1, 2), and examples of (3, d)-rings which is neither
a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring ( for each integer d).
The following Theorem 3.1 allows us to provide new examples of (2, 0), (2, 1),
and (2, 2)-ring, to resolve cost’s conjecture.
Theorem 3.1. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that f (M )J = 0 and J 2 = 0.
Then:
(1) (a) A ⊲⊳f J is a (2, 0)-ring provided J is a not finitely generated
ideal of f (A) + J.
(b) If A ⊲⊳f J is a (2, 0)-ring, then M is not a finitely generated
ideal of A or J is not a finitely generated ideal of f (A) + J.
(c) Assume that M is a finitely generated ideal of A. Then A ⊲⊳f J
is a (2, 0)-ring if and only if J is a not finitely generated ideal
of f (A) + J.
(2) A ⊲⊳f J is a non-(1, 2)-ring. In particular, A ⊲⊳f J is a non-von
Neumann regular ring.
Proof of Theorem 3.1
(1) (a) Let K be a 2-finitely presented (A ⊲⊳f J)-module, and let {(ki )i=p
i=1 }
be a minimal generating set of K. We want to show that K is a projective
(A ⊲⊳f J)-module. For this, consider the exact sequence of (A ⊲⊳f J)modules:
0 → Keru(= H) → (A ⊲⊳f J)p → K → 0
8
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
Pi=p
where u((αi )i=1,.....,p) = i=1
αi ki . Then H ⊂ (M ⊲⊳f J)p since {(ki )i=p
i=1 }
f
is a minimal generating set of K, A ⊲⊳ J is a local ring with maximal
ideal M ⊲⊳f J by Remark 2.1. We prove that H = 0. Otherwise, H 6=
0. Let (mi , f p (mi ) + ki ){i=1,...,r} be a minimal generating set of H, where
mi ∈ M p , ki ∈ J p for each i = 1, ......., r. Consider the exact sequence of
(A ⊲⊳f J)-modules
0 → Kerv → (A ⊲⊳f J)r → H → 0
P
p
where v((αi , f (αi ) + ji )i=1,.....,r ) = i=r
i=1 (αi mi , (f (αi ) + ji )(f (mi ) + ki )) =
Pi=r
Pi=r
( i=1 αi mi , i=1 f (αi )(f p (mi ) + ki )). But Kerv ⊂ (M ⊲⊳f J)r . Hence
P
r
Kerv = U ⊲⊳f J r . Where U = {(αi )i=1,...,r ∈ Ar i=r
i=1 αi mi = 0}. Since
K is a 2-presented (A ⊲⊳f J)-module, then Kerv is a finitely generated
(A ⊲⊳f J)-module. So, J is a finitely generated ideal of (f (A) + J) by
Lemma 2.3 (since U ⊆ M r ). A contradiction since J is a not finitely generated ideal of f (A) + J by hypothesis. So H = 0. Hence, K ∼
= (A ⊲⊳f J)p is
f
a projective (A ⊲⊳ J)-module.
(b) Let k(6= 0) ∈ J, I = (A ⊲⊳f J)(0, k), and consider the exact sequence
of (A ⊲⊳f J)-modules:
0 → Keru → A ⊲⊳f J → I → 0
where u(α, f (α) + j) = (0, f (α)k). So, Keru = M ⊲⊳f J is a not finitely
generated ideal of A ⊲⊳f J since A ⊲⊳f J is a (2, 0)-ring, and I is not projective ideal of A ⊲⊳f J (otherwise, I is a free ideal of A ⊲⊳f J since A ⊲⊳f J is
a local ring, absurd since (0, k)I = 0). Therefore, M is a not finitely generated ideal of A or J is a not finitely generated ideal of f (A)+J by Lemma 2.3.
(c) Follows immediately from (a) an (b).
(2) Let I = (A ⊲⊳f J)(0, k), where k(6= 0) ∈ J, and consider the exact
sequence of (A ⊲⊳f J)-modules:
0 → M ⊲⊳f J → A ⊲⊳f J → I → 0
Since A ⊲⊳f J is a local ring and M ⊲⊳f J is not a free ideal of A ⊲⊳f J (since
(0, k)(M ⊲⊳f J) = 0), then M ⊲⊳f J is not a projective ideal of A ⊲⊳f J. So,
f
pdA⊲⊳f J ( A⊲⊳I J ) > 2 (i.e. A ⊲⊳f J is a not a (1, 2)-ring), and this completes
the proof of Theorem 3.1.
The next corollary is an immediate consequence of Theorem 3.1.
Corollary 3.2. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that f (M )J = 0 and J 2 = 0.
Let A1 = A ⊲⊳f J, d ≤ 2 be an integer, A2 be a Noetherian ring of global
dimension d, and let C = A1 × A2 the direct product of A1 and A2 .
Assume that J is a not finitely generated ideal of f (A) + J. Then C is a
N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA
9
(2, d)-ring which is neither a (1, d)-ring (d = 0, 1, 2) nor a (2, d − 1)-ring
(d = 1, 2).
Proof. Let d ≤ 2 be an integer. By [21, Theorem 2.4], C = A1 × A2 is a
(2, d)-ring since Ai is a (2, d)-ring for each i = 1, 2, and C is not (1, d)-ring
since A1 is not (1, d)-ring by Theorem 3.1 (2). It remains to show that C is
not a (2, d − 1)-ring for 1 ≤ d ≤ 2. Assume that C is a (2, d − 1)-ring. By
[21, theorem 2.4], A2 is also a (2, d − 1)-ring and then is a (0, d − 1)-ring by
[7, Theorem 2.4] since A2 is a Noetherian ring. Thus, gldim(A2 ) ≤ d − 1,
but this is a contradiction since gldim(A2 ) = d, as desired.
Now, we are able to give a new examples of (2, 0), (2, 1), and (2, 2)-ring,
to resolve cost’s conjecture.
Example 3.3. Let (R, m) be a local ring such that m is a finitely generated
R
Z 2Z
, 4Z )), E be an m
-vector
ideal of R and m2 = 0 (for instance ((R, m) = ( 4Z
′
space with finite rank, and let A := R ∝ E and M := m ∝ E. Let E be
′
′
A
-vector space of infinite dimension, B := A ∝ E , J := 0 ∝ E , and
a M
consider the ring homomorphism f : A → B (f (a) = (a, 0)). Let K be
a field, A1 = A ⊲⊳f J, and let A2 := K[X1 ] and A3 := K[X1 , X2 ] where
X1 , X2 are indeterminate over K. Then, by Corollary 3.2:
(1) A1 is a (2, 0) ring that is not a (1, 0)-ring.
(2) A1 ×A2 is a (2, 1)-ring which is neither a (1, 1)-ring nor a (2, 0)-ring.
(3) A1 ×A3 is a (2, 2)-ring which is neither a (1, 2)-ring nor a (2, 1)-ring.
The aim of Theorem 3.4 is to construct a class of (3, d)-rings which are
neither (3, d − 1)-rings (for each positive integer d) nor (2, d)-rings for each
integer d ≥ 0.
Theorem 3.4. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that f (M )J = 0 and J 2 = 0.
(1) A ⊲⊳f J is a (3, 0)-ring provided M is not a finitely generated ideal
of A.
(2) Assume that J is a finitely generated ideal of f (A) + J and M contains a regular element. Then:
(a) A ⊲⊳f J is not a (2, d)-ring for each positive integer d.
(b) Let A1 = A ⊲⊳f J, d be an integer, A2 be a Noetherian ring of
global dimension d, and let C = A1 × A2 the direct product of
A1 and A2 . Assume that M is not finitely generated ideal of A.
Then C is a (3, d)-ring which is neither a (2, d)-ring (d ≥ 0)
nor a (3, d − 1)-ring (d ≥ 1).
10
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
The proof of this theorem requires the next result.
Lemma 3.5. Let (A, M ) be a local ring, f : A → B be a ring homomorphism, and let J be a proper ideal of B such that J is a finitely generated
ideal of f (A) + J, f (M )J = 0 and J 2 = 0. Then pdA⊲⊳f J (M ⊲⊳f J) and
pdA⊲⊳f J ({0} × J) are infinite.
Proof. Consider the exact sequence of (A ⊲⊳f J)-modules
0 → M ⊲⊳f J → A ⊲⊳f J →
A⊲⊳f J
M ⊲⊳f J
→0
A⊲⊳f J
We claim that M ⊲⊳f J is not projective. Otherwise, the sequence splits.
Hence, M ⊲⊳f J is generated by an idempotent element (m, f (m) + k) =
(m, f (m)+k)(m, f (m)+k) = (m2 , f (m2 )). So M ⊲⊳f J = (A ⊲⊳f J)(m, f (m)) =
Am ⊲⊳f 0, the desired contradiction (since J 6= 0). It follows from the above
sequence that
f
A⊲⊳ J
pdA⊲⊳f J (M ⊲⊳f J) + 1 = pdA⊲⊳f J ( M
)
(1)
⊲⊳f J
Let {(mi )i∈I } be a set of generators of M , where mi ∈ M for all i ∈ I, and
let {(gi )i=p
i=1 } be a minimal generating set of J. Consider the exact sequence
f
of (A ⊲⊳ J)-modules
L
0 → Keru → (A ⊲⊳f J)I (A ⊲⊳f J)p → M ⊲⊳f J → 0
where
X
u((αi , f (αi ) + ji )i∈I , (βi , f (βi ) + ki )i=p
(αi , f (αi ) + ji )(mi , f (mi ))
i=1 ) =
i∈I
+
i=p
X
(βi , f (βi ) + ki )(0, gi )
i=1
i=p
X
X
(0, f (βi )gi )
=
(αi mi , f (αi mi )) +
i=1
i∈I
L
P
Keru = U ⊲⊳ J I (M ⊲⊳f J)p . Where U = {(αi )i∈I ∈ AI i∈I αi mi =
0} (since {(gi )i=p
i=1 } be a minimal generating set of J). Therefore, we have
the isomorphism of (A ⊲⊳f J)-modules
(A⊲⊳f J)I L (A⊲⊳f J)p
M ⊲⊳f J ∼
=
I
f
p
fI
U ⊲⊳f J I
(M ⊲⊳ J)
It follows that
A⊲⊳f J
) ≤ pdA⊲⊳f J (M ⊲⊳f J)
pdA⊲⊳f J ( M
⊲⊳f J
⊲⊳f
(2)
Clearly, (1) and (2) force pdA⊲⊳f J (M
J) to be infinite. Now the exact
f
sequence of (A ⊲⊳ J)-modules
0 → M ⊲⊳f J → A ⊲⊳f J → {0} × J → 0
where v(α, f (α)+j) = (α, f (α)+j)(0, k) = (0, f (α)k), easily yields pdA⊲⊳f J ({0}×
J) = ∞, as desired.
N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA
11
Proof of Theorem 3.4
(1) Let K3 be a 3-finitely presented (A ⊲⊳f J)-module, and let {(ki )i=p
i=1 }
be a minimal generating set of K3 . We want to show that K3 is a projective
(A ⊲⊳f J)-module. For this, consider the exact sequence of (A ⊲⊳f J)modules:
0 → Keru(= K2 ) → (A ⊲⊳f J)p → K3 → 0
P
i=p
f
p
where u((αi )i=1,.....,p) = i=p
i=1 αi ki . Then K2 ⊂ (M ⊲⊳ J) since {(ki )i=1 }
is a minimal generating set of K3 , A ⊲⊳f J is a local ring with maximal ideal
M ⊲⊳f J. We prove that K2 = 0. Otherwise, K2 6= 0. Let (mi , f p (mi ) +
ki ){i=1,...,r} be a minimal generating set of K2 , where mi ∈ M p , ki ∈ J p for
each i = 1, ......., r. Consider the exact sequence of (A ⊲⊳f J)-modules
0 → Kerv(= K1 ) → (A ⊲⊳f J)r → K2 → 0
Pi=r
where v((αi , f (αi ) + ji )i=1,.....,r ) = i=1
(αi mi , (f (αi ) + ji )(f p (mi ) + ki )) =
Pi=r
Pi=r
p
( i=1 αi mi , i=1 f (αi )(f (mi ) + ki )). But K1 ⊂ (M ⊲⊳f J)r . Hence K1 =
P
r
U ⊲⊳f J r . Where U = {(αi )i=1,...,r ∈ Ar i=r
i=1 αi mi = 0}. Since K3 is
f
a 3-presented (A ⊲⊳ J)-module, then K1 is a finitely presented (A ⊲⊳f J)module. By Lemma 2.3, U is a finitely generated A-module and J is a finitely
generated ideal of f (A) + J. Let {(ui )i=s
i=1 } be a set of generators of U , and
let {(gi )i=s+t
}
be
a
minimal
generating
set of J r , where ui ∈ M r , gi ∈ J r .
i=s+1
Consider the exact sequence of (A ⊲⊳f J)-modules
0 → Kerw(= K0 ) → (A ⊲⊳f J)s+t → K1 → 0
P
P
(αi , f (αi )+
(αi , f (αi )+ji )(ui , f r (ui ))+ i=s+t
where w((αi , f (αi )+ji )i=1,.....,s+t) = i=s
i=1
Pi=s
Pi=s+t
Pi=s
Pi=s+1
i=s r
r
ji )(0, gi ) = i=1 (αi ui , f (αi ui ))+ i=s+1 (0, f (αi )gi )) = ( i=1 αi ui , i=1 f (αi ui )+
L
Pi=s+t
t
s
that K0 ∼
= W ⊲⊳f J s M t ⊲⊳f J t , where
i=s+1 f (αi )gi ). It follows
P
i=s+t
W = {(αi )i=1,...,s ∈ As i=s
i=1 αi ui = 0} (since {(gi )i=s+1 } is a minimal
r
generating set of J ). By the above sequence K0 is a finitely generated
(A ⊲⊳f J)-module. So M is a finitely generated ideal of A, the desired contradiction.
(2) (a) Assume that M contains a regular element m and J is a finitely
generated ideal of (f (A) + J). We must show that A ⊲⊳f J is not a (2, d)ring, for each integer d > 0. Let K = (A ⊲⊳f J)(m, f (m)) and consider the
exact sequence of (A ⊲⊳f J)-modules
0 → Kerv → A ⊲⊳f J → K → 0
(∗)
where v(α, f (α) + j) = (α, f (α) + j)(m, f (m)) = (αm, f (αm)). Clearly
Kerv = {0} × J that is a finitely generated ideal of (A ⊲⊳f J) and hence
K is a finitely presented ideal of (A ⊲⊳f J) by a sequence (∗). On the
other hand, pdA⊲⊳f J (Ker(v)) = pdA⊲⊳f J ({0} × J) = ∞ by Lemma 3.5. So
pdA⊲⊳f J (K) = ∞. Finally, the exact sequence of (A ⊲⊳f J)-modules
0 → K → A ⊲⊳f J →
A⊲⊳f J
K
→0
12
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
f
yields A⊲⊳K J a 2-presented (A ⊲⊳f J)-module with infinite projective dimension (i.e., A ⊲⊳f J is not a (2, d)-ring, for each d > 0).
(b) The same reasoning as in the proof of Corollary 3.2 shows that C is a
(3, d)-ring which is neither a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring (d ≥ 1),
and this completes the proof of Theorem 3.4.
The following Corollary is an immediate consequence of Theorem 3.4.
Corollary 3.6. Let (A, M ) be a local domain such that M is not finitely
generated ideal of A, f : A → B be a ring homomorphism, and let J be
a proper ideal of B such that J is a finitely generated ideal of f (A) + J,
f (M )J = 0 and J 2 = 0. Then:
(1) A ⊲⊳f J is a (3, 0)-ring which is not a (2, 0)-ring.
(2) Let A1 = A ⊲⊳f J, d be an integer, A2 be a Noetherian ring of global
dimension d, and let C = A1 × A2 the direct product of A1 and
A2 . The ring C is a (3, d)-ring which is neither a (2, d)-ring nor a
(3, d − 1)-ring.
Theorem 3.4 enriches the literature with new examples of (3, d)-rings
which are neither a (2, d)-ring (d ≥ 0) nor a (3, d − 1)-ring (d ≥ 1), as
shown below.
Example 3.7. Let k be any field and X1 , X2 , ..., Xn , ... be indeterminate over
K. Let A = K[[X1 , X2 , .., Xn , ..]] the power series ring in infinite variables
over K, and Let M be its maximal ideal. Set B := A/M 2 , J := Bf (m) be
an ideal of B, where m ∈ M such that f (m) 6= 0, and consider the canonical
ring homomorphism f : A → B (f (x) = x). Let C = Z[X1 , X2 , ..., Xd−1 ],
where d ≥ 1. Then by Corollary 3.6, (A ⊲⊳f J) × C is a (3, d)-ring which is
neither a (2, d)-ring nor a (3, d − 1)-ring.
Example 3.8. Let k be a field and let A = K[[X]] = K + M , where M =
XA. Set B := A/M 2 , J := Bf (m) be an ideal of B, where m ∈ M such
that f (m) 6= 0, and consider the canonical ring homomorphism f : A → B
(f (x) = x). Then A ⊲⊳f J is not an (n, d)-ring, for any integers n, d ≥ 0.
Proof. A ⊲⊳f J is Noetherian ring since A is by [9, Proposition 5.6] and by
Lemma 3.5, pdA⊲⊳f J ({0} × J) = ∞, whence gldim(A ⊲⊳f J) = ∞. Then by
[7, Theorem 1.3], A ⊲⊳f J is not an (n, d)-ring, for any integers n, d ≥ 0, as
desired.
N-COHERENCE AND (N, D)- PROPERTIES IN AMALGAMATED ALGEBRA
13
References
1. K. Alaoui and N. Mahdou, Coherence in amalgamated algebra along an ideal, Bulletin of the Iranian Mathematical Society, Accepted for publication. See: arXiv:
submit/0631069 [math.AC] 12 Jan 2013.
2. C. Bakkari, S. Kabbaj and N. Mahdou, Trivial extention defined by Prüfer conditions,
J. Pure. Appl. Algebra 214 (2010), 53-60.
3. S. Bazzoni and S. Glaz, Gaussian properties of total rings of quotients, J. Algebra
310 (2007), 180-193.
4. M. B. Boisen and P. B. Sheldon, CPI-extension: Over rings of integral domains with
special prime spectrum, Canad. J. Math. 29 (1977), 722-737.
5. N. Bourbaki, Algèbre Commutative, chapitres 1-4, Masson: Paris, 1985.
6. W. Brewer and E. Rutter, D + M constructions with general overrings, Michigan
Math. J. 23 (1976), 33–42.
7. D. Costa, Parameterizing families of non-Noetherian rings, Comm. Algebra 22
(1994), 3997–4011.
8. D. Costa and S. Kabbaj, Classes of D+M rings defined by homological conditions,
Comm. Algebra (1996), 24, 8917906.
9. M. D’Anna, C. A. Finocchiaro and M. Fontana, Amalgamated algebras along an ideal,
in: Commutative Algebra and Applications, Proceedings of the Fifth International
Fez Conference on Commutative Algebra and Applications, Fez, Morocco, 2008, W.
de Gruyter Publisher, Berlin (2009), 155–172.
10. M. D’Anna, C. A. Finocchiaro and M. Fontana, Properties of chains of prime ideals
in amalgamated algebras along an ideal, J. Pure Applied Algebra 214 (2010), 16331641.
11. M. D’Anna, A construction of Gorenstein rings, J. Algebra 306 (2) (2006), 507-519.
12. M. D’Anna and M. Fontana, Amalgamated duplication of a ring along a
multiplicative-canonical ideal, Ark. Mat. 45 (2) (2007), 241-252.
13. M. D’Anna and M. Fontana, An amalgamated duplication of a ring along an ideal:
the basic properties, J. Algebra Appl. 6 (3) (2007), 443-459.
14. D. E. Dobbs, S. Kabbaj and N. Mahdou, n-coherent rings and modules, Lecture
Notes in Pure and Appl. Math., Dekker, 185 (1997), 269–281.
15. D. E. Dobbs, S. Kabbaj, N. Mahdou and M. Sobrani, When is D + M n-coherent
and an (n, d)-domain?, Lecture Notes in Pure and Appl. Math., Dekker, 205 (1999),
257–270.
16. D. E. Dobbs and I. Papick, When is D + M coherent?, Proc. Amer. Math. Soc. 56
(1976), 51–54.
17. S. Glaz, Commutative coherent rings, Lecture Notes in Mathematics, 1371, SpringerVerlag, Berlin, 1989.
18. J. A. Huckaba, Commutative rings with zero divisors, Marcel Dekker, New YorkBasel, 1988.
19. S. Kabbaj and N. Mahdou, Trivial extensions of local rings and a conjecture of Costa,
Lecture Notes in Pure and Appl. Math., Dekker, 231 (2003), 301–311.
20. S. Kabbaj and N. Mahdou, Trivial extensions defined by coherent-like conditions,
Comm. Algebra 32 (10) (2004), 3937–3953.
21. N. Mahdou, On Costa’s conjecture, Comm. Algebra 29 (2001), 2775–2785.
22. N. Mahdou, Sufficient Condition to Resolve Costa’s First Conjecture,.......
23. N. Mahdou, On 2-Von Neumann regular rings, Comm. Algebra 33 (10) (2005): 34893496.
24. I. Palmér and J. Roos, Explicit formulae for the global homological dimensionsof
trivial extensions of rings, J. Algebra 27 (1973), 380-413.
25. D. Zhou, On n-coherent rings and (n, d)-rings. Comm. Algebra 32 (2004), 2425-2441.
14
KARIMA ALAOUI ISMAILI AND NAJIB MAHDOU
Karima Alaoui Ismaili, Department of Mathematics, Faculty of Science and
Technology of Fez, Box 2202, University S.M. Ben Abdellah Fez, Morocco.
E − mail address : [email protected] r
Najib Mahdou, Department of Mathematics, Faculty of Science and Technology of Fez, Box 2202, University S.M. Ben Abdellah Fez, Morocco.
E − mail address : [email protected]
| 0math.AC
|
1
Real-Time Residential-Side Joint Energy Storage
Management and Load Scheduling with Renewable
Integration
arXiv:1511.08585v2 [cs.SY] 13 Apr 2016
Tianyi Li, Student Member, IEEE, and Min Dong, Senior Member, IEEE
Abstract—We consider joint energy storage management and
load scheduling at a residential site with integrated renewable
generation. Assuming unknown arbitrary dynamics of renewable
source, loads, and electricity price, we aim at optimizing the
load scheduling and energy storage control simultaneously in
order to minimize the overall system cost within a finite time
period. Besides incorporating battery operational constraints and
costs, we model each individual load task by its requested power
intensity and service durations, as well as the maximum and
average delay requirements. To tackle this finite time horizon
stochastic problem, we propose a real-time scheduling and storage control solution by applying a sequence of modification and
transformation to employ Lyapunov optimization that otherwise
is not directly applicable. With our proposed algorithm, we show
that the joint load scheduling and energy storage control can
in fact be separated and sequentially determined. Furthermore,
both scheduling and energy control decisions have closed-form
solutions for simple implementation. Through analysis, we show
that our proposed real-time algorithm has a bounded performance guarantee from the optimal T -slot look-ahead solution
and is asymptotically equivalent to it as the battery capacity
and time period goes to infinity. The effectiveness of joint load
scheduling and energy storage control by our proposed algorithm
is demonstrated through simulation as compared with alternative
algorithms.
Index Terms—Load scheduling, energy storage, renewable
generation, real-time algorithm, stochastic optimization, finite
time horizon
I. I NTRODUCTION
The rising global demand of energy has resulted in high
prices for electricity and also caused the growing environmental concern due to excess carbon emission from power
generation. Integrating renewable energy sources into the grid
system has become a vital green energy solution to reduce
the energy cost and build a sustainable society and economy.
Although promising, renewable energy is often intermittent
and difficult to predict, making it less reliable for both gridlevel operation and as a local energy source for consumers.
Energy storage and flexible loads are considered as two
promising management solutions to mitigate the randomness
of renewable generation, as well as to reduce electricity cost
[2], [3]. In particular, energy storage can be exploited to shift
energy across time, while flexible loads can be controlled to
This work was supported by the National Sciences and Engineering
Research Council (NSERC) of Canada under Discovery Grant RGPIN-201405181.
A preliminary version of this work [1] was presented at the 41st IEEE International Conference on Acoustic Speech and Signal Processing (ICASSP),
Shanghai, China, March 2016.
The authors are with Department of Electrical, Computer, and Software
Engineering, University of Ontario Institute of Technology, Oshawa, Ontario,
Canada L1H 7K4 (email: [email protected], [email protected]).
shift demand across time. For grid operators, they can be
utilized to counter the fluctuation in renewable generation
and to increase reliability. For consumers, energy storage
and load scheduling can provide effective means for energy
management to reduce electricity cost.
As renewable penetration into the power supply increases,
the renewable generation with storage solutions at residential
homes (such as roof-top solar panels) will become increasingly
popular. Thus, developing a cost effective energy storage management system to maximally harness energy from renewable
sources is of critical importance. At the same time, many smart
appliances have been developed, creating more controllable
loads at the consumer side. They can be controlled to benefit
from the dynamic price set at the utility, and help shift the
energy demand from high-peak to low-peak periods to reduce
energy bills. Providing effective management solution that
combines both energy storage and load scheduling will be
the most promising future solution for consumers to reduce
energy costs and is the goal of this paper.
Developing an effective joint energy storage management
and load scheduling solution is important, but faces unique
challenges. For energy storage, the cost reduction by storage
comes with an additional cost from battery degradation due
to charging and discharging; finite battery capacity makes
the storage control decisions coupled over time which are
difficult to optimize. For load scheduling, while minimizing
the electricity cost, it needs to ensure the delay requirements
for each load and for the overall service are met. In particular,
load scheduling decision affects the energy usage and storage
and vise versa. Thus, storage control and load scheduling
decisions are coupled with each other and over time, making
it especially challenging for a joint design.
Energy storage management alone has been considered for
power balancing to counter the fluctuation of renewable generation and increase grid reliability [4]–[6], and for consumers
to reduce electricity costs [7]–[14]. Off-line storage control
strategies for dynamic systems have been proposed [4], [7],
[8]. In these works, renewable energy arrivals are assumed
known ahead of time and the knowledge of load statistics is
assumed. For real-time storage management design, [9] has
formulated the storage management control as a Markov Decision Process (MDP) and solved it by Dynamic Programming
(DP). Lyapunov optimization technique [15] has been recently
employed for designing real-time storage control at either
grid operator side or consumer side under different system
models and optimization goals [5], [6], [10]–[14]. Among
these works, [11], [12] have considered renewable generation
without modeling the battery operational cost. Both renewable
2
generation and battery operation cost have been modeled in
[5], [6], [13], [14]. Except for [14], which considers the storage
management design within a finite time period, all the above
works consider the long-term average system cost.
Load (demand) scheduling through demand side management has been studied by many for shaping the aggregate
load at utility through direct load control [16]–[18] or pricing
optimization [19], [20], and at consumer through load scheduling to reduce electricity bill in response to the dynamic price
[21]–[26]. With the electricity price known ahead of time,
linear programming [21], [22] and DP [23] techniques are
applied for load scheduling. Without assuming known future
prices, MDP formulation has been considered in [24], [25],
and opportunistic load scheduling based on optimal stopping
rule has been proposed in [26]. Combining both utility side
and demand side management is also considered in [27],
[28], where game theoretic approach is applied for distributed
energy management.
Few existing works consider joint optimization of energy
storage management and load scheduling. A joint design has
been developed in [29], in which the electricity price is
assumed to be known ahead of time and the storage model
is simplified without the battery operational cost. Real-time
energy storage management with flexible loads has been considered in [30] and [31]. While [30] focuses on local demand
side, [31] combines both grid operator and demand side
management using distributed storage. In these works, flexible
loads are only modeled in terms of the aggregated energy
request; There is no individual task modeling or scheduling
being conducted. Furthermore, in these works, renewable
generation, loads, and electricity price are assumed to be
independent and identically distributed. With the increasing
penetration of renewable generation and energy storage in the
grid, future energy demand and supply are expected to be quite
dynamic. Renewable generation, loads, and electricity price
may all fluctuate randomly1 with their statistics likely being
non-stationary, making them difficult to predict accurately.
However, most of existing works design solutions assuming
either the future values or statistical knowledge of them to be
known. In addition, although long-term time averaged cost is
typically considered in these existing works, the consumers
may prefer a cost saving solution in a period of time defined
by their own needs. It is important to provide a solution to
meet such need. We aim at proposing a real-time algorithm
for joint energy storage and load scheduling to address these
issues.
In this paper, we consider joint energy storage management
and load scheduling at a residential site equipped with a
renewable generator and a storage battery. For renewable
source, loads, and electricity price, we assume their dynamics
to be arbitrary which can be non-stationary and their statistics
are unknown. For the residential load, we characterize each
individual load task with its own requested power intensity
and service duration, and consider both per load maximum
delay and average delay requirements. For battery storage, we
1 Energy pricing design is considered to respond to the energy demand and
supply status and to shape the load for demand management. As a result, the
real-time price in the future grid could fluctuate much more randomly and
quickly, and likely to have complicated statistical behaviors.
actively model the battery operational constraints and cost due
to charging and discharging activities.
We aim at designing a real-time solution for joint energy
storage management and load scheduling to minimize the
overall system cost over a finite time period, subject to battery
operation and load delay constraints. The interaction of load
scheduling and energy storage, the finite battery capacity, and
finite time period for optimization complicate the scheduling
and energy control decision making over time. To tackle this
difficult stochastic problem, we develop techniques through a
sequence of problem modification and transformation which
enable us to employ Lyapunov optimization to design a realtime algorithm that otherwise is not directly applicable. Interestingly, we show that the joint load scheduling and energy
storage control can be separated and sequentially determined
in our real-time optimization algorithm. Furthermore, both
load scheduling and energy control decisions have closed-form
solutions, making the real-time algorithm simple to implement.
We further show that our proposed real-time algorithm not
only provides a bounded performance guarantee to the optimal
T -slot look-ahead solution which has full future information
available, but is also asymptotically equivalent to it as the
battery capacity and the considered time period for design
go to infinity. Simulation results demonstrate the effectiveness
of joint load scheduling and energy storage control by our
proposed algorithm as compared with alternative solutions
considering neither storage nor scheduling, or storage only.
Different from our recent work [14], in which the energy
storage problem without flexible loads has been considered,
in this work, we explore both energy storage and flexible
load scheduling to reduce system cost. Given the individual
load modeling, load delay requirements imposed, and the load
interaction with energy usage over time, it is highly non-trivial
to formulate the joint design problem, develop techniques for a
real-time solution, and provide performance analysis. Through
our developed techniques, we show that the joint optimization
of load scheduling and storage control can in fact be separated
and sequentially solved. Thus, we are able to obtain the load
scheduling solution in closed-form and apply the result in [14]
for the storage control. Furthermore, we demonstrate that a
lower system cost can be achieved with joint load scheduling
and energy storage control than with just energy storage alone.
Comparing with existing works, our proposed algorithm has
the following features and advantages: 1) The battery storage
operation and associated cost, as well as individual load and its
quality of service, are thoroughly modeled; 2) The algorithm
provides a real-time joint solution for both energy storage
control and load task scheduling; 3) The solution only relies
on the current price, renewable generation, or loads, and does
not require any statistical knowledge of them; 4) The solution
is designed for a specified period of time which may be useful
for practical needs; 5) The solution is provided in closed-form
requiring minimum complexity for practical implementation.
The rest of this paper is organized as follows. In Section II,
we describe the system model. In Section III, we formulate
the joint energy management and load scheduling problem.
In Section IV, we propose a real-time algorithm for our
joint optimization problem. In Section V, we analyze the
performance of algorithm. After presenting our simulation
3
TABLE I
L IST OF MAIN SYMBOLS
Et − Qt
Pt
Grid
Et
− Qt
Battery Dt
+
Loads
Wt
user’s load arriving at time slot t (kWh)
ρt
load intensity (kWh)
λt
load duration (number of slots)
dt
delay incurred for Wt before it is served (number of slots)
dmax
t
maximum delay allowed for Wt before it is served (number
of slots)
dw
average delay of all arrived loads within the To -slot period
(number of slots)
dmax
maximum average delay (number of slots) for the loads within
the To -slot period
Cd (·)
cost function associated with the average delay dw
Et
energy purchased from conventional grid at time slot t (kWh)
Emax
maximum amount of energy that can be bought from the grid
per slot (kWh)
Pt
unit price of buying energy at time slot t ($/kWh)
Pmax
maximum unit energy price ($/kWh)
Pmin
minimum unit energy price ($/kWh)
St
renewable energy harvested at time slot t (kWh)
A. Load Scheduling
Sw,t
amount of renewable energy directly supplied user’s loads to
be served at time slot t (kWh)
Sr,t
amount of renewable energy stored into battery at time slot t
(kWh)
Qt
portion of Et stored into battery at time slot t (kWh)
Rmax
maximum charging amount (kWh) per slot allowed for the
battery
Dt
amount of energy discharged from the battery at time slot t
(kWh)
Dmax
maximum discharging amount per slot allowed from the battery (kWh)
We assume the user has load tasks in various types arriving
over time slots. An example of the scheduling time line of two
loads is shown in Fig. 2. Let Wt denote the load arriving at the
beginning of time slot t. It is given by Wt = ρt λt , where ρt
and λt are the load intensity and duration for Wt , respectively.
We assume λt is an integer multiple of time slots, and the
minimum duration for any load is 1, i.e., λt ∈ {1, 2, . . .}. Let
dmax
denote the maximum delay allowed for Wt before it is
t
served (multiple of time slots), and let dt denote the actual
delay incurred for Wt before it is served. We have
Bt
battery energy level at time slot t (kWh)
Bmin
minimum energy level required in the battery (kWh)
Bmax
maximum energy level allowed in the battery (kWh)
Crc
entry cost for battery due to each charging activity ($)
Cdc
entry cost for battery due to each discharging activity ($)
xe,t
entry cost for battery at time slot t as xe,t = 1R,t Crc +
1D,t Cdc ($)
xu,t
net amount of energy change in battery at time slot t, as
xu,t = |Qt + Sr,t − Dt | (kWh)
xe
average entry cost for battery over the To -slot period ($)
xu
average net amount of energy change in battery over the To slot period (kWh)
Cu (·)
cost function associated with average usage amount xu ($)
α
weight for the cost of scheduling delay
at
energy storage control action vector at time slot t
∆u
desired change of battery energy level within To slots (kWh)
µ
weight for delay related queues in Lyapunov function
studies in Section VI, we conclude our paper in Section VII.
Notations: The main symbols used in this paper are summarized in Table I.
II. S YSTEM M ODEL
We consider a residential-side electricity consuming entity
powered by the conventional grid and a local renewable generator (RG) (e.g., wind or solar generators). An energy storage
battery is co-located with RG to store energy from both power
Sr,t
Renew. St
Gen.
Fig. 1.
−
Contrl.
t
X
τ =0
Sw,t
ρτ 1S,t (dτ )
00
11
00
11
00
11
11111
00000
00
11
0000000000
1111111111
00000
11111
0000000000
1111111111
t
The residential energy storage management system.
sources and supply power to the user. The energy storage
management (ESM) system is shown in Fig. 1. As a part of the
ESM system, a load scheduling mechanism is implemented to
schedule each load task to meet its delay requirements. We
assume the ESM system operates in discrete time slots with
t ∈ {0, 1, · · · }, and all operations are performed per time slot
t. Each component of the EMS system is described below.
dt ∈ {0, 1 . . . , dmax
}, ∀t.
t
(1)
Thus, the earliest serving time duration for Wt is [t, t + λt ],
and the latest serving time duration is [t+dmax
, t+dmax
+λt ].
t
t
We define an indicator function 1S,t (dτ ) , {1 : if t ∈ [τ +
dτ , τ + dτ + λτ ); 0 : otherwise}, for ∀τ ≤ t. It indicates
whether or not the load Wτ is being served at time slot t.
Consider a To -slot period. We define dw as the average delay
of all arrived loads within this To -slot period, given by2
dw ,
To −1
1 X
dτ .
To τ =0
(2)
Besides the per load maximum delay dmax
constraint in (1),
t
we impose a constraint on the average delay dw as
dw ∈ [0, dmax ]
(3)
where dmax is the maximum average delay for the loads
within the To -slot period. It is straightforward to see
that for constraint (3) to be effective, we have dmax ≤
maxt∈[0,To −1] {dmax
}, for ∀t. The average delay dw reflects
t
the average quality of service for the loads within the To slot period. We define a cost function Cd (dw ) associated with
dw . A longer delay reduces the quality of service and incurs
a higher cost. Thus, we assume Cd (·) to be a continuous,
convex, non-decreasing function with derivative Cd′ (·) < ∞.
2 Without
loss of generality, we start the To -period at time slot t = 0.
4
Wt1
...
0
t1
dmax
t1
Wt2
...
...
t
2
dt1
ρt
1110101011
00
00
10
00
00 . . . 11
11
001001. .0. 11
11
00
11
1000
11
ρt1
dt2
Let Bt denote the battery energy level at time slot t. With a
finite capacity, Bt is bounded by
dmax
t2
2
λt1
...
To − 1
λt2
Fig. 2. An example of load scheduling for two arrival loads Wt1 and Wt2 .
B. Energy Sources and Storage
1) Power Sources: The user can purchase energy from the
conventional grid with a real-time price. Let Et denote the
amount of energy bought in time slot t. It is bounded by
Et ∈ [0, Emax ]
(4)
where Emax is the maximum amount of energy that can be
bought from the grid per slot. This amount can be used to
directly supply the user’s loads and/or be stored into the
battery. Let Pt denote the unit price of buying energy at
time slot t. It is bounded as Pt ∈ [Pmin , Pmax ], where Pmin
and Pmax are the minimum and maximum unit energy prices,
respectively. We assume Pt is known to the user at time slot
t and is kept unchanged within the slot duration. The average
cost for the purchased energy from the grid over a To -slot
PTo −1
∆
Et Pt .
period is defined by J = T1o t=0
Renewable generator: An RG is used as an alternative
energy source in the ESM system. Let St denote the amount
of renewable energy harvested at time slot t. We assume St is
first used to supply the loads scheduled to be served at time
slot t. Denote this portion by Sw,t , we have
( t
)
X
Sw,t = min
(5)
ρτ 1S,t(dτ ), St
τ =0
where the first term in (5) represents the total energy over
those scheduled loads that need to be served at time slot t.
The remaining portion of St , if any, can be stored into the
battery. Since there is a cost associated to the battery charging
activity, we use a controller to determine whether or not to
store the remaining portion into the battery. Let Sr,t denote
the amount of renewable energy charged into the battery at
time slot t. It is bounded by
Sr,t ∈ [0, St − Sw,t ] .
(6)
2) Battery Operation: The battery can be charged from
either the grid, the renewable generator, or both at the same
time. Let Qt denote the portion of Et from the grid that is
stored into the battery at time slot t. The total charging amount
at time slot t is bounded by
Qt + Sr,t ∈ [0, Rmax ]
(7)
where Rmax is the maximum charging amount per slot for the
battery. Similarly, let Dt denote the discharging amount from
the battery at time slot t, bounded by
Dt ∈ [0, Dmax ]
(8)
where Dmax is the maximum discharging amount per slot
allowed from the battery. We assume there is no simultaneous
charging and discharging activities at the battery, i.e.,
(Qt + Sr,t ) · Dt = 0.
(9)
Bt ∈ [Bmin , Bmax ]
(10)
where Bmin and Bmax are the minimum energy required and
maximum energy allowed in the battery, respectively. The
dynamics of Bt over time due to charging and discharging
activities are given by3
Bt+1 = Bt + Qt + Sr,t − Dt .
(11)
It is known from battery technology that frequent charging/discharging activities cause a battery to degrade over time
[32]–[34].4 Both the frequency of charging or discharging and
the amount that is charged or discharged affect the battery
lifetime. Given this, we model two types of battery operational
costs associated with the charging/discharging activities: entry
cost and usage cost.
The entry cost is a fixed cost incurred due to
each charging or discharging activity. Define two indicator functions to represent charging and discharging activities as 1R,t , {1 : if Qt + Sr,t > 0; 0 : otherwise} and
1D,t , {1 : if Dt > 0; 0 : otherwise}, respectively. Let Crc
denote the entry cost for each charging activity and Cdc for
that of the discharging activity. Let xe,t denote the entry cost
at time slot t. It is given by xe,t , 1R,t Crc + 1D,t Cdc . We
define thePtime-averaged entry cost over the To -slot period as
To −1
xe,t .
xe , T1o t=0
The usage cost is defined as the cost associated with the
∆
battery charging and discharging amount. Let xu,t = |Qt +
Sr,t − Dt | denote the net amount of energy change in battery
at time slot t due to charging or discharging. From (7) and
(8), it follows that xu,t is bounded by
xu,t ∈ [0, max {Rmax , Dmax }] .
(12)
In general, the battery usage cost is associated with charge
cycles5 . Each charge cycle typically lasts for a period of
time in a day [35]. To approximate this, we consider the
average net amount of energy change inPthe battery over
To −1
the To -slot period, defined as xu , T1o t=0
xu,t . From
(12), it is straightforward to see that xu is bounded by
xu ∈ [0, max {Rmax , Dmax }]. We model the usage cost as
a function of xu , denoted by Cu (xu ). It is known that faster
charging/discharging within a fix period has a more detrimental effect on the life time of the battery. Thus, we assume
Cu (xu ) is a continuous, convex, non-decreasing function with
derivative Cu′ (xu ) < ∞.6
Based on the above, the average battery operational cost
over the To -slot period due to charging/discharging activities
is given by xe + Cu (xu ).
3 We consider an ideal battery model with no leakage of stored energy over
time and full charging/discharging efficiency.
4 The lifetime of battery can be coarsely measured by the number of full
charge cycles.
5 Charging the battery and then discharging it to the same level is considered
a charge cycle.
6 Such a convex cost function has also been adopted in literature [36], [37].
5
C. Supply and Demand Balance
For each load Wτ arrived at time slot τ , if it is scheduled
to be served at time slot t (≥ τ ), the energy supply needs
to meet the amount ρτ scheduled for Wτ . The overall energy
supply must be equal to the total demands from those loads
which need to be served at time slot t. Thus, we have supply
and demand balance relation given by
Et − Qt + Sw,t + Dt =
t
X
ρτ 1S,t (dτ ), ∀t.
(13)
τ =0
A. Problem Modification
Due to the finite battery capacity constraint, the control
actions {at } are coupled over time. To remove the time
coupling, similar to the technique used in our previous work
[14] for energy storage only problem, we remove the finite
battery capacity constraint, and instead we impose a constraint
on the change of battery energy level over the To -slot period.
Specifically, by (11), the change of P
battery energy level over
o −1
(Qt + Sr,t − Dt ).
the To -slot period is BTo − B0 = Tt=0
We now set this change to be a desired value ∆u , i.e.,
To −1
∆u
1 X
(Qt + Sr,t − Dt ) =
.
To t=0
To
III. J OINT E NERGY S TORAGE M ANAGEMENT AND L OAD
S CHEDULING : P ROBLEM F ORMULATION
Our goal is to jointly optimize the load scheduling and
energy flows and storage control for the ESM system to
minimize an overall system cost over the To -slot period.
The loads, renewable generation, and price {Wt , St , Pt } have
complicated statistical behaviors which may be non-stationary
and thus are often difficult to acquire or predict in practice.
In our design, we assume arbitrary dynamics for {Wt , St , Pt }
and do not assume their statistical knowledge being known. We
intend to develop a real-time control algorithm that is capable
to handle such arbitrary and unknown system inputs.
We model the overall system cost as a weighted sum of the
cost from energy purchase and battery degradation, and the
cost of scheduling delay. Define at , [Et , Qt , Dt , Sw,t , Sr,t ]
as the control action vector for the energy flow in the ESM
system at time slot t. Our goal is to find an optimal policy
{at , dt } that minimizes the time-averaged system cost. This
optimization problem is formulated as follows
P1: min
{at ,dt }
J + xe + Cu (xu ) + αCd (dw )
s.t. (1), (3), (4), (6), (9), (13), and
0 ≤ Sr,t + Qt ≤ min {Rmax , Bmax − Bt } (14)
0 ≤ Dt ≤ min {Dmax , Bt − Bmin }
(15)
where α is the positive weight for the cost of scheduling delay;
It sets the relative weight between energy related cost and load
delay incurred by scheduling in the joint optimization.
Note that in P1, {Wt , St , Pt } are random, and their future
values are unknown at time slot t. Thus, P1 is a finite time
horizon joint stochastic optimization problem which is difficult
to solve. Joint energy storage control and load scheduling
complicates the problem, making it much more challenging
than each separate problem alone. The finite battery capacity
imposes a hard constraint on the control actions {at }, making
{at } correlated over time, due to the time-coupling dynamics
of Bt in (11). Furthermore, the finite time horizon problem
is much more difficult to tackle than the infinite time horizon
problem as considered in most existing energy storage works.
New techniques need to be developed for a real-time control
solution.
In the following, we focus on proposing a real-time algorithm to provide a suboptimal solution to P1 with a certain
performance guarantee. To do this, we first modify P1 to allow
us to design a real-time algorithm for joint energy storage
control and load scheduling at every time slot. We later discuss
how our solution can meet the constraints of P1.
(16)
Note that, ∆u is only a desired value we set, which may not be
achieved by a control algorithm at the end of To -slot period.
We will quantify the amount of mismatch with respect to ∆u
under our proposed control algorithm in Section V. By the battery capacity and (dis)charging constraints, it is easy to see that
∆
|∆u | ≤ ∆max = min{Bmax − Bmin , To max{Rmax , Dmax }}.
We now modify P1 to the follow optimization problem
by adding the new constraint (16), and removing the battery
capacity constraint (10)
P2: min
{at ,dt }
J + xe + Cu (xu ) + αCd (dw )
s.t. (1), (3) − (9), (13), (16).
Note that by removing the battery capacity constraint (10),
we remove the dependency of per-slot charging/discharging
amount on Bt in constraints (14) and (15), and replace them
by (7) and (8), respectively.
B. Problem Transformation
In P2, both battery average usage cost Cu (xu ) and scheduling delay cost Cd (dw ) are functions of time-averaged variables, which complicates the problem. Using the technique
introduced in [38], we now transform the problem into one that
only contains the time-average of the functions. Specifically,
we introduce auxiliary variables γu,t and γd,t for xu,t and dt ,
respectively, and impose the following constraints
∆
0 ≤ γu,t ≤ max{Rmax , Dmax }, ∀t
γu = xu
(17)
(18)
0 ≤ γd,t ≤ min{dmax
, dmax }, ∀t
t
(19)
γd = dw
1 PTo −1
(20)
where γi = To τ =0 γi,t , for i = u, d. The above constraints
ensure that each auxiliary variable lies in the same range as
its original variable, and its time average is the
as that
PTsame
o −1
Ci (γi,t )
of its original variable. Define Ci (γi ) , T1o t=0
as the time average of Ci (γi,t ) over To slots, for i = u, d.
Applying (18) and (20) to the objective of P2, and defining
π t , [at , dt , γu,t , γd,t ], we transform P2 into the following
optimization problem
P3: min J + xe + Cu (γu ) + αCd (γd )
{π t }
s.t. (1), (3) − (9), (13), (16) − (20)
where the terms in the objective are all To -slot time-averaged
cost functions. We can show that P2 and P3 are equivalent,
6
i.e., they have the same optimal control solution {a∗t , d∗t } (See
Appendix A).
Although P3 is still difficult to solve, it enables us to design
a dynamic control and scheduling algorithm for joint energy
storage control and load scheduling by adopting Lyapunov
optimization technique [15]. In the following, we propose
our real-time algorithm for P3, and then design parameters
to ensure the proposed solution meets the battery capacity
constraint in the original P1 which is removed in P2.
IV. J OINT E NERGY S TORAGE M ANAGEMENT AND L OAD
S CHEDULING : R EAL -T IME A LGORITHM
By Lyapunov optimization, we first introduce virtual queues
for each time-averaged inequality and equality constraints of
P3 to transform them into queue stability problems. Then, we
design a real-time algorithm based on the drift of Lyapunov
function defined on these virtual queues.
A. Virtual Queues
We introduce a virtual queue Xt to meet constraint (3),
evolving as follows
Xt+1 = max (Xt + dt − dmax , 0) .
(21)
From (2), the above results in dw ≤ dmax + (XTo − X0 )/To .
Thus, formulating the virtual queue Xt in (21) will guarantee
to meet the average delay constraint (3) with a margin (XTo −
X0 )/To . In Section V, we will further discuss this constraint
under our proposed algorithm.
For constraint (16), dividing both sides by To gives the timeaveraged net change of battery energy level per slot being
∆u /To . To meet this constraint, we introduce a virtual queue
Zt , evolving as follows
Zt+1 = Zt + Qt + Sr,t − Dt −
∆u
.
To
∆
∆u
t.
To
L(Θt ) ,
1 2
2
2
Zt + Hu,t
+ µ Xt2 + Hd,t
2
(26)
where µ is a positive weight to adjust the relative importance
of load delay related queues in the Lyapunov function. We
define a one-slot sample path Lyapunov drift as ∆(Θt ) ,
L (Θt+1 ) − L(Θt ), which only depends on the current system
inputs {Wt , St , Pt }.
Instead of directly minimizing the system cost objective in
P3, we consider the drift-plus-cost metric given by ∆(Θt ) +
V [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]. It is a weighted sum
of the drift ∆(Θt ) and the system cost at time slot t with
V > 0 being the relative weight between the two terms.
Directly using the drift-plus-cost function to determine
control action π t is still challenging. In the following, we use
an upper bound of this drift-plus-cost function to design our
real-time algorithm. The upper bound is derived in Appendix
B as (34). Using this upper bound, we formulate a per-slot
real-time optimization problem and solve it at every time slot
t. By removing all the constant terms independent of control
action πt , we arrive at the following optimization problem
P4 : min Zt [Et + Sr,t + Sw,t − ρt 1S,t (dt )] − |Hu,t | Sw,t
πt
+ Hu,t [γu,t − (Et + Sr,t )] + |Hu,t | ρt 1S,t (dt )
+ µXt dt + µHd,t (γd,t − dt )
+ V [Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]
s.t. (1), (4) − (9), (13), (17), (19).
(23)
u
The linear time function ∆
To t in At is to ensure that constraint
(16) is satisfied. Due to this shift At , the range of Zt is
expanded to the entire real line, i.e., Zt ∈ R for Bt ∈ R+ .
Note that Ao is a design parameter. Later, we design Ao to
ensure that our control solution {at } for the energy flows in
our proposed algorithm satisfies the battery capacity constraint
(10) imposed in P1.
Finally, to meet constraints (18) and (19), we establish
virtual queues Hu,t and Hd,t , respectively, as follows
Hu,t+1 = Hu,t + γu,t − xu,t
Hd,t+1 = Hd,t + γd,t − dt .
Note that Zt and Hu,t are the virtual queues related to
the battery operation, while Xt and Hd,t are those related
to the scheduling delay. Let Θt , [Zt , Hu,t , Xt , Hd,t ] denote
the virtual queue vector. We define the quadratic Lyapunov
function L(Θt ) for Θt as follows
(22)
From Bt in (11) and Zt above, we can show that they are
different by a time-dependent shift as follows
Zt = Bt − At , where At = Ao +
B. Real-Time Algorithm
(24)
(25)
From Lyapunov optimization, it can be shown that satisfying
constraints (3), (16), (18), and (19) is equivalent to maintaining
the stability of queues Xt , Zt , Hu,t , and Hd,t , respectively
[15].
Pt
Note that the term τ =0 ρτ 1S,t (dτ ) in the upper bound (34)
is the total energy demand from the scheduled loads at time
slot t. Since delay dτ for τ ∈ {0, 1, . . . , t − 1} are determined
in previous time slot τ ≤ t − 1 by solving P4, only ρt 1S,t (dt )
is a function of π t at time slot t, and is part of the objective
of P4.
Denote the optimal solution of P4 by π ∗t
,
∗
∗
∗ ∗
, γd,t
]. After regrouping the terms in the objective
[at , dt , γu,t
of P4 with respect to different control variables, we show
that P4 can be separated into four sub-problems to be solved
sequentially and variables in π ∗t can be determined separately.
The steps are described below.
∗
S1) Determine d∗t and γd,t
by solving the following P4a1 and
P4a2 , respectively.
P4a1 : min µdt (Xt − Hd,t ) − ρt 1S,t (dt ) (Zt − |Hu,t |)
dt
s.t. (1).
P4a2 : min µHd,t γd,t + V αCd (γd,t ) s.t. (19).
γd,t
∗
S2) Determine Sw,t
in (5) using d∗t obtained in S1).
∗
∗
S3) Using Sw,t obtained in S2) in (13), determine γu,t
and
7
a∗t by solving the following P4b1 and P4b2 , respectively.
P4b1 : min Hu,t γu,t + V Cu (γu,t ) s.t. (17).
γu,t
P4b2 : min Et (Zt − Hu,t + V Pt ) + Sr,t (Zt − Hu,t )
at
+ V (1R,t Crc + 1D,t Cdc )
s.t.
(4) − (9), (13).
Remark: An important and interesting observation of the
above is that the joint optimization of load scheduling and
energy storage control can in fact be separated: The scheduling
decision d∗t is determined first in P4a1 . Based on the resulting
energy demand in the current time slot t, energy storage
control decision a∗t is then determined in P4b2 . Note that
the two sub-problems are interconnected through the current
virtual queue backlogs Zt and Hu,t for the battery energy
level Bt and battery energy net change xu,t , respectively. The
storage control decision a∗t will further change the battery
energy level and affect Hu,t at the next time slot. Thus,
although the scheduling and storage decisions are separately
determined, they are interconnected through battery energy
level and usage, and sequentially influence each other.
In the following, we solve each subproblem and obtain a
closed-form solution. As a result, the optimal solution π ∗t is
obtained in closed-form.
1) The optimal d∗t : The optimal scheduling delay d∗t for
P4a1 is given below.
Proposition 1: Let ωo , −ρt (Zt − |Hu,t |), ω1 ,
(Xt − Hd,t ).
, µdmax
µ (Xt − Hd,t ), and ωdmax
t
t
(
0 if ωo ≤ ω1
1) If Xt − Hd,t ≥ 0, then d∗t =
1 otherwise;
(
0
if ωo ≤ ωdmax
t
2) If Xt − Hd,t < 0, then d∗t =
max
dt
otherwise.
∗
Lemma 1: The optimal γi,t
, for i = d, u, is given by
if Hi,t ≥ 0
0
′
∗
γi,t = Γi
(27)
if Hi,t < −V βi Ci (Γi )
H
Ci′−1 − i,t
otherwise.
V βi
where βu = 1, βd = α/µ, Γu , max{Rmax , Dmax }, and
Γd , min{dmax
, dmax }.
t
Proof: See Appendix D.
3) The optimal a∗t : Once the scheduling decision d∗t for
Wt is determined,
the total energy demand from the scheduled
P
loads, i.e., tτ =0 ρτ 1S,t(d∗τ ), is determined. Given this energy
demand, P4b2 is solved to obtain the optimal control solution
∗
[Et∗ , Q∗t , Dt∗ , Sr,t
] in a∗t . This subproblem for energy storage
and control is essentially the same as in [14], where the energy
storage only problem is considered. Thus, the closed-form
solution can be readily obtained from [14]. Here we directly
state the result.
Pt
∗
Define L∗t ,
τ =0 ρτ 1S,t (dτ ) as the current energy
demand at time slot t. Define the idle state of the battery
as the state where there is no charging or discharging activity. The control solution under this idle state is denoted
id
id
by [Etid , Qid
t , Dt , Sr,t ]. By supply-demand balancing equation
∗
id
id
(13), it is given by Etid = L∗t − Sw,t
, Qid
t = Dt = Sr,t = 0.
Let ξt denote the objective value in P4b2 for the battery being
∗
in the idle state. We have ξt = (L∗t − Sw,t
)(Zt − Hu,t + V Pt ).
′
∗
′
′
′
′
Denote at = [Et , Qt , Dt , Sw,t , Sr,t ]. The optimal control
solution a∗t of P4b2 is given in three cases below.
i ) For Zt − Hu,t + V Pt ≤ 0: The battery is in either charging
or idle state. The solution a′t in charging state is given by
Dt′ = 0,
S ′ = min S − S ∗ , R
max
r,t
w,t
t
.
∗
∗
′
Q′t = min Rmax − Sr,t
,
E
max − Lt + Sw,t
′
∗
′
Et = min L∗t + Rmax − Sw,t
− Sr,t
, Emax
′
If Et′ (Zt −Hu,t +V Pt )+(Zt −Hu,t )Sr,t
+V Crc 1R,t < ξt ,
then a∗t = a′t ; Otherwise, a∗t = aid
.
t
ii ) For Zt − µu Hu,t < 0 ≤ Zt − Hu,t + V Pt : The batProof: See Appendix C.
tery is either in charging, discharging, or idle state. The
are the objective
Remark: Note that ωo , ω1 , and ωdmax
t
or discharging state is given by
solution a′t in
max
charging
values of P4a1 when dt = 0, 1, and dt , respectively.
∗
′
∗
=
min
L
−
S
,
Dmax
D
t
w,t
t
Furthermore, wo depends on the virtual queue backlogs (Zt
S ′ = min S − S ∗ , R
t
max
and Hu,t ) related to the battery energy level, while ω1 and
r,t
w,t
.
′
depend
on
the
virtual
queue
backlogs
(X
and
H
)
ωdmax
=
0,
Q
t
d,t
t
t
+
′ ∗
∗
related to load delay. Proposition 1 shows that the scheduling
− Dmax
Et = Lt − Sw,t
∗
′
decision for load Wt is to either immediately serve it (dt = 0)
If Et′ (Zt − Hu,t + V Pt ) + (Zt − Hu,t )Sr,t
+ V (Crc 1R,t +
∗
′
or delay its serving time (d∗t = 1 or dmax
). This decision
t
Cdc 1D,t ) < ξt , then at = at ; Otherwise, a∗t = aid
t .
depends on whether the battery energy is high enough (so Wt
will be served immediately) or the delays for the scheduled iii ) For 0 ≤ Zt − Hu,t < Zt − Hu,t + V Pt : The′ battery is in
either discharging or idle
state. Thesolution at in dischargloads so far are low enough (so Wt will be delayed). When the
′
∗
∗
Dt = min Lt − Sw,t , Dmax
load is delayed to serve, the delay should be either minimum
′
.
ing state is given by Sr,t
= Q′t = 0,
or maximum depending on the existing scheduling delays of
∗
+
′
∗
the past loads.
Et = Lt − Sw,t − Dmax
′
∗
∗
If
E
(Z
−
H
+
V
P
) + V Cdc 1D,t < ξt , then a∗t = a′t ;
t
u,t
t
t
2) The optimal γd,t and γu,t : Since Cd (·) and Cu (·) are
∗
id
Otherwise, at = at .
both convex, the objectives of P4a2 and P4b1 are convex. Let
′−1
′
Ci (·) denote the first derivative of Ci (·), and Ci (·) denote
In each case above, the cost of charging or discharging is
the inverse function of Ci′ (·), for i = d, u. We obtain the compared with the cost ξt of being in an idle state, and the
∗
, i = d, u, for P4a2 and P4b1 as follows. control solution of P4b2 is the one with the minimum cost.
optimal solutions γi,t
The condition for each case depends on Zt , Hu,t and Pt , where
8
Algorithm 1 Real-Time Joint Load Scheduling and Energy
Storage Management
Set the desired value of ∆u . Set Ao and V as in (28) and (29),
respectively.
At time slot 0: Set Z0 = X0 = Hu,0 = Hd,0 = 0.
At time slot t: Obtain the current values of {Wt , St , Pt }
1) Load scheduling: Determine d∗t according to Proposi∗
tion 1 and γd,t
according to (27), respectively.
2) Energy Storage Control:
∗
a) Renewable contribution: Determine Sw,t
in (5)
using d∗t obtained above.
∗
b) Energy purchase and storage: Determine γu,t
according to (27) and a∗t according to Cases i)-iii) in
Section IV-B3.
3) Updating virtual queues: Use π ∗t to update Bt based on
(11), and Xt , Zt , Hu,t , Hd,t based on (21)−(25).
Zt and Hu,t are rated to battery energy level Bt and usage
cost xu,t , respectively. Thus, Cases i)-iii) represent the control
actions at different battery energy levels (i.e., low, moderate,
or high) and electricity prices.
4) Feasibility of a∗t to P1: Recall that we have removed
the battery capacity constraint (10) when modifying P1 to P2.
Thus, this constraint is no longer imposed in P4b2 , and our
real-time algorithm may not provide feasible control solutions
{a∗t } to P1. To ensure the solution is still feasible to the
original problem P1, we design our control parameters Ao and
V . The result readily follows [14, Proposition 2]. We omit the
details and only state the final result below.
Proposition 2: For the optimal solution a∗t of P4b2 , the
resulting Bt satisfies the battery capacity constraint (10), and
{a∗t } is feasible to P1, if Ao in (23) is given by
(
A′o
if ∆u ≥ 0
Ao =
(28)
A′o − ∆u if ∆u < 0
where A′o = Bmin + V Pmax + V Cu′ (Γu ) + Γu + Dmax +
and V ∈ [0, Vmax ] with
Vmax =
∆u
To ,
Bmax − Bmin − Rmax − Dmax − 2Γu − |∆u |
. (29)
Pmax + Cu′ (Γu )
C. Discussions
We summarize the proposed real-time joint load scheduling
and energy storage control in Algorithm 1. Due to the separation of joint optimization, the algorithm provides a clear
sequence of control decisions at each time slot t.
Recall that we modify the original joint optimization problem P1 to P3, and apply Lyapunov optimization to propose a
real-time algorithm for P3 which is to solve the per-slot optimization problem P4. We then design system parameters Ao
and Vmax to ensure our solution satisfies the battery capacity
constraint, which is removed when we modify P1 to P4. As
a result, our proposed solution by Algorithm 1 is feasible to
P1. Furthermore, we have the following discussions.
1) In modifying P1, we remove the battery capacity constraint
(10) and instead impose a new constraint (16) on the overall
change of battery energy level over To slots to be ∆u . Note
that this constraint is set as a desired outcome, i.e., ∆u is a
desired value. The actual solution a∗t in the proposed algorithm
may not satisfy this constraint at the end of the To -slot period,
and thus may not be feasible to P3. Nonetheless, setting Ao
and V as in (28) and (29) guarantees that {a∗t } satisfy the
battery capacity constraint (10) and therefore are feasible to
P1.
2) In designing the real-time algorithm by Lyapunov framework, virtual queue Xt in (21) which we introduce for the
average delay constraint (3) can only ensure the constraint
is satisfied with a margin as indicated below (21). As a
result, constraint (3) can only be approximately satisfied.
However, this relaxation is mild in practice for the average
delay performance. Note that the per-load maximum delay
constraint (1) is strictly satisfied for d∗t by Algorithm 1. We
will show in simulation that the achieved average delay dw by
Algorithm 1 in fact meets constraint (3).
3) We point out that the load scheduling and energy storage
control decisions are provided in closed-form by Algorithm 1.
Thus, the algorithm is particularly suitable for real-time implementation with a constant computational complexity O(1).
Furthermore, no statistical assumptions on the loads, renewable source, and pricing {Wt , St , Pt } are required in the algorithm. They can be non-stochastic or stochastic with arbitrary
dynamics (including non-stationary processes). This allows
the algorithm to be applied to general scenarios, especially
when these statistics are difficult to predict. Finally, despite
that Algorithm 1 is a suboptimal solution for P1, we will
show in the following that it provides a provable performance
guarantee.
V. P ERFORMANCE A NALYSIS
In this section, we analyze the performance of Algorithm 1
and discuss the mismatch involved in some constraints as a
result of the real-time algorithm design.
A. Algorithm Performance
To evaluate the proposed algorithm, we consider a T -slot
look-ahead problem. Specifically, we partition To slots into T
frames with To = M T , for M, T ∈ N+ . For each frame, we
consider the same problem as P1 but the objective is the T slot averaged cost within the frame and the constraints are all
related to time slots within the frame. In addition, we assume
{Wt , St , Pt } for the entire frame are known beforehand. Thus,
the problem becomes a non-causal static optimization problem
and we call it a T -slot lookahead problem. Let uopt
m be the
corresponding minimum objective value achieved by a T -slot
look-ahead optimal solution over the mth frame. We intend to
bound the performance of Algorithm 1 (with no knowledge of
future values of {Wt , St , Pt }) to the optimal T -slot lookahead
performance (with full knowledge of {Wt , St , Pt } in a frame).
We denote the objective value of P1 achieved by Algorithm 1 over To -slot period by u∗ (V ), where V is the weight
value used in Algorithm 1. The following theorem provides a
bound of the cost performance under our proposed real-time
algorithm to uopt
m under the T -slot lookahead optimal solution.
Theorem 1: Consider {Wt , St , Pt } being any arbitrary processes over time. For any M, T ∈ N+ satisfying To = M T ,
1
M
uopt
m ≤
m=0
L(Θ0 ) − L(ΘTo )
GT
+
V
V To
C ′ (Γu )(Hu,0 − Hu,To ) + αCd′ (Γd )(Hd,0 − Hd,To )
(30)
+ u
To
where G is given in (43) and the upper bound is finite. In
particular, as To → ∞, we have
1
lim u∗ (V ) − lim
To →∞
To →∞ M
M−1
X
m=0
uopt
m
GT
.
≤
V
(31)
B. Design Approximation
1) Average scheduling delay dmax : Recall that, by Algorithm 1, using the virtual queue Xt in (21), the average delay
constraint (3) is approximately satisfied with a margin, i.e.,
dw ≤ dmax + ǫd , where ǫd , (XTo − X0 )/To is the margin.
We now bound ǫd below.
Proposition 3: Under Algorithm 1, the margin ǫd for constraint (3) is bounded as follows
s
L(Θo ) |X0 |
2G
+
+
.
(32)
|ǫd | ≤
µTo
µTo
To
Proof: See Appendix F.
Proposition 3 indicates that the margin ǫd → 0 as To → ∞.
Thus, the average delay is asymptotically satisfied. Note that,
for X0 = 0, ǫd ≥ 0. If X0 > 0, it is possible that ǫd < 0 and
constraint (3) is satisfied with a negative margin. However, this
will drive d∗t to be smaller which may cause higher system
cost. Thus, we set X0 = 0 in Algorithm 1.
2) Mismatch of ∆u : In our design, we set ∆u to be a
desired value for the change of battery energy level over
To -slot period as in new constraint (16). This value may
not bePachieved by Algorithm 1. Define the mismatch by
o −1
ǫu , τT=0
(Qτ +Sr,τ −Dτ )−∆u . The bound for ǫu follows
the result in [14, Proposition 3] and is shown below.
(33)
Note that Vmax in (29) increases as |∆u | decreases, and a
larger Vmax is preferred for better performance by Theorem 1.
PTo −1
To → ∞, constraint (16) becomes limTo →∞ T1
τ =0 (Qτ +
o
− Dτ ) = 0 as in the infinite time horizon problem [39].
7 As
Sr,τ
0.05
0
5
10
15
20
15
20
25
Hour
0.2
Sm
St
0.1
Sl
Sh
0
0
5
10
25
Hour
0.2
0
Wm
Wt
0.1
Wl
Wh
0
5
10
15
20
25
Hour
Proof: See Appendix E.
Remark: Theorem 1 shows that our proposed algorithm is
able to track the “ideal” T -slot lookahead optimal solution
with a bounded gap, for all possible M and T . Also, for
the best performance, we should always choose V = Vmax .
The bound in (31) gives the asymptotic performance as To
increase. Since Vmax in (29) increases with Bmax , it follows
that Algorithm 1 is asymptotically equivalent to the optimal
T -slot look-ahead solution as the battery capacity and To go
to infinity. Note that, as To → ∞, P1 becomes an infinite time
horizon problem with average sample path cost objective7. The
bound in (31) provides the performance gap of long-term timeaveraged sample-path system cost of our proposed algorithm
to the T -slot look-ahead policy.
|ǫu | ≤ 2Γu + Rmax + V Pmax + V Cu′ (Γu ) + Dmax .
Pt
0.1
Energy (kWh)
u∗ (V ) −
M−1
X
Load (kWh)
the To -slot average system cost under Algorithm 1 is bounded
by
Unit price (CAD)
9
Fig. 3. Mean load W t , mean renewable generation S t , and real-time
price Pt over 24 hours.
Thus, a smaller |∆u | is preferred. Note also that our simulation
study shows that the actual mismatch ǫu is much smaller than
this upper bound.
VI. S IMULATION R ESULTS
We set each slot to be 5 minutes and consider a 24-hour
duration. Thus, we have To = 288 slots for each day. We
assume Pt , St and Wt do not change within each slot. We
collect data from Ontario Energy Board [40] to set the price Pt .
As shown Fig. 3 top, it follows a three-stage price pattern as
{Ph , Pm , Pl } = {$0.118, $0.099, $0.063} and is periodic every 24 hours. We assume {St } to be solar photovoltaic energy.
It is a non-stationary process, with the mean amount S t =
E[St ] changing periodically over 24 hours, and having threestage values as {S h , S m , S l } = {1.98, 0.96, 0.005}/12 kWh
per slot8 and standard deviation as σSi = 0.4S i , for i =
h, m, l, as shown in Fig. 3 middle. We assume the load {Wt }
is a non-stationary process, having three-stage mean values
W t = E[Wt ] as {W h , W m , W l } = {2.4, 1.38, 0.6}/12 kWh
per slot9 with standard deviation as σWi = 0.2W i , for
i = h, m, l, as shown in Fig. 3 bottom. For each load Wt , we
generate λt from a uniform distribution with interval [1, 12],
and ρt = Wt /λt . We set dmax
in (1) to be identical for all t.
t
We set the battery related parameters as follows: Rmax =
Dmax = 0.165 kWh10 , Crc = Cdc = 0.001, Bmin = 0, and the
battery initial energy level B0 = 0. Unless specified, we set
Bmax = 3 kWh. We set Emax = 0.3 kWh. Also, we set the
weights α = 1 and µ = 1 as the default values. Since Vmax
increases as |∆u | decreases, to achieve best performance11, we
set ∆u = 0 and V = Vmax .
We consider an exemplary case where the battery usage
cost and the delay cost are both quadratic functions, given
8 We set the mean renewable amount to be {S , S , S }
=
m
h
l
{1.98, 0.96, 0.005} kWh per hour. Converting to per slot energy amount
with 5 minutes duration, we have {1.98, 0.96, 0.005}/12 kWh per slot. We
set these values based on that the average energy harvested by photovoltaic
is about 20 kWh within a day for a residential home.
9 Similar as S , the mean load is converted from energy amount per hour to
t
per slot. The mean values are set based on that the each residential household
on average consumes 1 ∼ 2 kWh per hour.
10 Assuming a household consumes 1 ∼ 2 kWh per hour on average, we
set the values of Rmax and Dmax to be in the same range for load supply.
Thus, per slot, we have Rmax = Dmax = 1.98 kWh/12 = 0.165 kWh.
11 A detailed study of ∆ can be found in [14].
u
10
2
by Cu (xu ) = ku xu 2 and Cd (dw ) = kd dw . The constant
ku > 0 is a battery cost coefficient depending on the battery
characteristics. We set it as ku = 0.2.12 The constant kd > 0 is
a normalization factor based on the desired maximum average
delay dmax in (3). It is set as kd = 1/(dmax )2 , such that the
cost for an average delay dw = dmax is normalized to 1.13 The
∗
′
optimal γi,t
can be determined with Ci (Γi ) = 2ki Γi ,
in (27)
H
and Ci′−1 − V i,t
βi
Loads
Serving
Delay
Empty
H
= − 2βi ki,ti V , for i = u, d.
} ρt
A. An Example of Load Scheduling
305
12 The value of k depends on the type of battery and current battery
u
technology. We have tested a range of values for ku and studied the effect of
ku on the system cost performance in our previous work [14].
13 The normalization by k ensures the delay cost is properly defined.
d
Intuitively, a longer delay is encouraged in order to allow more energy cost
saving, as long as the desired maximum average delay is satisfied. Thus, the
cost Cd (dw ) should not be affected by the absolute delay value dw , but rather
2
its relative value to dmax , i.e., dw /(dmax )2 .
14 We set the value of α to ensure that the weighted delay cost αC (d ) is
d w
comparable to the other two costs in the objective of P1. Thus, both delay and
energy cost are active factors in making the storage and scheduling decision
in simulation.
315
320
325
330
335
340
345
350
Fig. 4. A trace of load scheduling results over (dmax
= dmax = 18,
t
α = 0.005).
5.2
×10 -3
α=0.001
α=0.005
5
4.8
B. Effect of Scheduling Delay Constraints
1) Effect of dmax
and dmax : We study how the average
t
system cost objective of P1 under our proposed algorithm
varies with different delay requirements. We set dmax
= dmax ,
t
max
∀t, and plot the average system cost vs. dt
in Fig. 5, for
different values of weight α in the cost objective. As can
be seen, the system cost decreases as dmax (dmax
) increases.
t
This shows that relaxing the average delay constraint gives
more flexibility to load scheduling, where each load can be
scheduled at lower electricity price, resulting in lower system
cost. This demonstrates that flexible load scheduling is more
beneficial to the overall system cost. In addition, we see that
a larger value α gives more weight on minimizing the delay
in the objective, resulting in a higher system cost.
Next, we study the effect of load delay constraints on the
monetary cost, i.e., the cost of energy purchasing and battery
degradation, given by J + xe + Cu (xu ) in the objective of
P1. The monetary cost indicates how much saving a consumer
could actually have, by allowing longer service delay. In Fig. 6,
we plot the monetary cost vs. dmax for dmax
= 216. We
t
see a clear trade-off between the monetary cost and the load
delay. The trade-off curve can be used to determine the desired
operating point. For comparison, we also consider the case
in which all loads are served immediately after arrival, i.e.,
dmax
= 0. This is essentially the case with only energy storage
t
310
Time slot t
Avg. sys. cost
In Fig. 4, we show a fraction of the load scheduling results
by Algorithm 1, where we set dmax
= dmax = 18 slots and
t
14
α = 0.005. Each horizontal bar represents a scheduled load
Wt with the width representing the load intensity ρt and the
length representing the total duration from arrival to service
being completed. For a delayed load, the delay is indicated in
different color before the load is scheduled. In this example,
we see some loads are immediately scheduled, while others
are scheduled at dmax
. The total energy demand at each time
t
slot is the vertical summation over all loads that are scheduled
in this time slot.
4.6
4.4
4.2
4
3.8
3.6
3.4
60
80
100
120
140
160
180
200
220
dmax
(dmax )
t
Fig. 5.
Average system cost vs. dmax
(dmax = dmax
).
t
t
but no load scheduling. Thus, the monetary cost is independent
of dmax . We see a substantial gap between the two curves and
the gap increases with dmax . This clearly shows the benefit of
joint load scheduling and energy storage management.
2) Average delay dw : We now study the average delay dw
achieved by our proposed algorithm vs. dmax for various dmax
t
in Fig. 7. As we see, the actual averaged delay dw increases
with the average delay dmax requirement. This is because, with
a more relaxed constraint on the delay, loads can be shifted
to a later time in order to reduce the system cost, resulting in
larger average delay. However, the increase is sublinear with
respect to dmax . Similarly, we observe that increasing the per
load maximum delay dmax
increases dw . Finally, recall that
t
we study the margin for average delay constraint (3) under our
proposed algorithm in Proposition 3. To see how the resulting
dw meets constraint (3), we plot the line dmax in Fig. 7. As
we see, dw is below dmax for all values of dmax and dmax
.
t
3) Effect of µ: Weight µ is used to control the relative
importance of virtual queues related to the battery and those
to delay in Lyapunov function L(Θt ) in (26) and Lyapunov
drift ∆(Θt ). For Lyapunov drift ∆(Θt ), if µ is large, the two
queues Xt and Hd,t related to the load delay will dominate the
drift. This will affect the drift-plus-cost objective considered
in our proposed algorithm and thus the performance. To study
the effect of µ on the performance, in Fig. 8, we evaluate the
average system cost for different values of µ. We see that a
lower system cost is achieved by smaller value of µ. This is
11
−3
×10 -3
5.4
5.2
5
3.7
dmax
=0
t
dmax
=216
t
3.6
3.5
4.8
4.6
µ=1
µ=0.00001
4.4
4.2
4
3.4
3.8
3.6
60
3.3
0
50
100
150
d
Fig. 6.
x 10
3.8
Avg. sys. cost
Avg. monetary cost ($/slot)
3.9
200
250
80
100
120
140
160
180
200
220
dmax (dmax)
max
t
Monetary cost vs. dmax (α = 0.005).
Fig. 8.
Average system cost vs. dmax (dmax
= dmax ).
t
4.8
150
×10 -3
4.6
max
d
Avg. sys. cost
4.4
dw
100
max
dt =72
dmax=144
t
dmax=216
t
max
dt =288
50
0
0
50
100
150
200
250
Algorithm 1
4
3.8
3.6
3.4
3.2
1
300
dw vs. dmax (α = 0.005).
because, with smaller µ, the drifts of Xt related to delay is
less significant in the overall drift. This allows wider difference
between dw and dmax , i.e., smaller dw and lower delay cost.
C. Performance vs. Battery Capacity
We consider two other algorithms for comparison: A) No
storage or scheduling: In this case, neither energy storage
nor load scheduling is considered. Each load is served immediately using energy purchased from the conventional grid
and/or renewable generator. B) Storage only: In this method,
only battery storage is considered but every load is served
immediately without a delay. This is essentially the algorithm
provided in [14].
In Fig. 9, we compare our proposed algorithm to the above
two alternative algorithms under various battery capacity
Bmax . Since algorithm A does not use a battery, the system
cost is unchanged over Bmax and is 0.01. We do not plot
the curve as the cost is much higher than the rest of two
algorithms we considered. For algorithm B and our proposed
Algorithm 1, as can be seen, the system costs reduces as Bmax
increases. This is because a larger battery capacity allows
charging/discharging to be more flexible based on the current
demand and electricity price, resulting in a lower system cost.
Comparing the two, we see that joint load scheduling and
energy storage control provides further reduction in system
cost.
2
3
4
5
6
7
8
9
10
B max (kWh)
max
d
Fig. 7.
Storage only
4.2
Fig. 9.
Average system cost vs. Bmax (α = 0.001).
VII. C ONCLUSION
In this work, we have considered joint energy storage
management and load scheduling for the ESM system, where
renewable source, loads, and price may be non-stationary and
their statistics are unknown. For load scheduling, we have
characterized each load task by its power intensity and service
duration, and have considered the maximum per load delay
and maximum average delay requirements. For storage control,
our storage model includes details of the battery operational
constraints and cost. Aiming at minimizing the overall system
cost over a finite period of time, we have designed a real-time
algorithm for joint load scheduling and energy storage control,
where we have provided a closed-form per slot scheduling
and energy storage decisions. As a result, we have shown that
the joint load scheduling and energy storage control can in
fact be separately and sequentially determined in our real-time
algorithm. Furthermore, we have shown that our proposed realtime algorithm has a bounded performance guarantee from
an optimal T -slot look-ahead solution and is asymptotically
equivalent to the optimal T -slot look-ahead solution, as the
battery capacity and time period go to infinity. Simulation
results have demonstrated the gain of joint load scheduling
and storage control provided by our proposed algorithm over
other real-time schemes which consider neither storage nor
scheduling, or with storage only.
12
P ROOF
OF
A PPENDIX A
E QUIVALENCE OF P2 AND P3
Proof: The proof follows the same approach as in [14,
Lemma 1]. Let uo2 and uo3 denote the minimum objective values
of P2 and P3, respectively. Since the optimal solution of P2
satisfies all constraints of P3, it is a feasible solution of P3.
Thus, we have uo3 ≤ uo2 . By Jensen’s inequality and convexity
of Ci (·) for i = d, u, we have Cd (γd ) ≥ Cd (γd ) = Cd (dw )
and Cu (γu ) ≥ Cu (γu ) = Cu (xu ). This means uo3 ≥ uo2 .
Hence, we have uo2 = uo3 and P3 and P2 are equivalent.
U PPER B OUND
A PPENDIX B
D RIFT-P LUS -C OST F UNCTION
ON
The following lemma presents an upper bound on the drift
∆(Θt ).
Lemma 2: The one-slot Lyapunov drift ∆(Θt ) is upper
bounded by
!
t
X
∆u
ρτ 1S,t (dτ ) −
∆(Θt ) ≤ Zt Et + Sr,t + Sw,t −
To
τ =0
+ Hu,t γu,t − Hu,t (Et + Sr,t ) + µXt (dt − dmax ) + G
!
t
X
− |Hu,t | Sw,t −
ρτ 1S,t (dτ ) + µHd,t (γd,t − dt ) (34)
τ =0
2
2
∆u
u
where G = 12 max
+
,
D
+
Rmax − ∆
max
To
To
µ
1
2
2
max 2
) , (dmax
− dmax )2 +
t
2 max{Rmax , Dmax } + 2 max (d
µ max 2
) .
2 (dt
Proof: From the definition of ∆(Θt ), we have
∆(Θt ) , L(Θt+1 ) − L(Θt )
1 2
2
2
= [Zt+1
− Zt2 + (Hu,t+1
− Hu,t
)]
2
µ 2
2
2
(Xt+1 − Xt2 + Hd,t+1
− Hd,t
)
(35)
+
2
2
where from queue (22), Zt+1
− Zt2 can be presented by
2
Zt+1
− Zt2
∆u
= Zt Qt + Sr,t − Dt −
2
To
u 2
(Qt + Sr,t − Dt − ∆
To )
+
.
(36)
2
u
Note that from (16), we have ∆
To ≤ max{Rmax , Dmax }. For
u 2
a given value of ∆u , byn (7) and (8), (Qt + Sr,t − Dt − o∆
To )
∆u 2
u 2
is upper bound by max (Rmax − ∆
. By
To ) , (Dmax + To )
the supply-demand balance (13), the first term on RHS of (36)
can be replaced by
∆u
Zt Qt + Sr,t − Dt −
To
!
t
X
∆u
ρτ 1S,t (dτ ) −
= Zt Et + Sr,t + Sw,t −
. (37)
To
τ =0
2
2
From (24), Hu,t+1
− Hu,t
in (35) can be presented by
2
2
Hu,t+1
− Hu,t
(γu,t − xu,t )2
= Hu,t (γu,t − xu,t ) +
. (38)
2
2
Note that from (12) and (17), the second term of RHS in (38)
2
2
is upper bounded by (γu,t − xu,t )2 ≤ max{Rmax
, Dmax
}.
We now find the upper bound for −Ht xu,t in the first term
on RHS of (38). By the supply-demand balance (13), −Ht xu,t
can be replaced by
−Ht xu,t = −Hu,t (|Qt + Sr,t − Dt |)
!
t
X
ρτ 1S,t(dτ ) . (39)
= −Hu,t Et + Sr,t + Sw,t −
τ =0
The upper bound of −Ht xu,t in (39) is obtained as follows.
1 ) For Hu,t ≥ 0: We have
!
t
X
ρτ 1S,t (dτ )
− Hu,t Et + Sr,t + Sw,t −
τ =0
t
X
≤ −Hu,t Et + Sr,t + Sw,t −
!
ρτ 1S,t (dτ )
τ =0
= −Hu,t (Et + Sr,t ) − Hu,t Sw,t −
t
X
!
ρτ 1S,t (dτ ) .
τ =0
2 ) For Hu,t < 0: We have
− Hu,t
Et + Sr,t + Sw,t −
t
X
ρτ 1S,t (dτ )
τ =0
≤ −Hu,t |Et + Sr,t | + Sw,t −
t
X
!
ρτ 1S,t (dτ )
τ =0
≤ −Hu,t Et + Sr,t +
t
X
ρτ 1S,t (dτ ) − Sw,t
τ =0
= −Hu,t (Et + Sr,t ) + Hu,t Sw,t −
t
X
!
!
!
ρτ 1S,t (dτ ) .
τ =0
Combine the above cases for Hu,t , we have −Ht xu,t in (39)
upper bounded by
!
t
X
− Hu,t Et + Sr,t + Sw,t −
ρτ 1S,t (dτ )
τ =0
≤ −Hu,t (Et + Sr,t ) − |Hu,t | Sw,t −
t
X
!
ρτ 1S,t (dτ ) .
τ =0
2
2
From (21), we have Xt+1
≤ (Xt + dt − dmax ) . Thus,
2
2
(Xt+1 − Xt ) in (35) is bounded by
2
Xt+1
− Xt2
1
2
≤ Xt (dt − dmax ) + (dt − dmax )
(40)
2
2
where by (1), the last term
n in RHS of (40) is upperobounded
2
2
max 2
by (dt − d
) ≤ max (dmax ) , (dmax
− dmax ) .
t
2
2
From (25), Hd,t+1
− Hd,t
in (35) can be presented by
2
2
Hd,t+1
− Hd,t
(γd,t − dt )2
= Hd,t (γd,t − dt ) +
2
2
1 max 2
(41)
≤ Hd,t (γd,t − dt ) + (dt )
2
where the last inequality is derived from the bounds of γd in
(19) and dt in (1). We give the upper bond of (35) as follows
∆(Θt ) , L(Θt+1 ) − L(Θt )
!
t
X
∆u
ρτ 1S,t (dτ ) −
≤ Zt Et + Sr,t + Sw,t −
To
τ =0
13
− |Hu,t | Sw,t −
t
X
!
ρτ 1S,t (dτ )
τ =0
+ Hu,t γu,t − Hu,t (Et + Sr,t ) + µXt (dt − dmax )
(42)
where G includes all constant terms from the upper bounds
of (36), (38), (40) and (41), and is defined as
(
2
2 )
1
∆u
∆u
G , max
Rmax −
, Dmax +
2
To
To
µ
1
2
2
max{Rmax
, Dmax
} + (dmax
)2
2
2 t
µ
− dmax )2 .
+ max (dmax )2 , (dmax
t
2
+
P ROOF
A PPENDIX E
P ROOF OF T HEOREM 1
+ µHd,t (γd,t − dt ) + G
(43)
A PPENDIX C
OF P ROPOSITION 1
Proof: To determine the optimal scheduling delay d∗t , we
need to compare the objective values of P4a1 under all serving
options. The optimal delay d∗t is the one that achieves the
minimum objective value. Because dt · 1S,t(dt ) = 0, we have
the following cases:
1) If the load is immediately served, we have 1S,t (dt ) = 1
and dt = 0. The objective value becomes ωo ;
2) If the load is delayed, we have dt > 0 and 1S,t (dt ) = 0.
The objective function is reduced to µdt (Xt −Hd,t ). For
Xt − Hd,t ≥ 0, the objective value is ω1 ; Otherwise, the
.
value is ωdmax
t
, we obtain d∗t .
Comparing ωo to ω1 or ωdmax
t
Proof: A T -slot sample path Lyapunov drift is defined by
∆T (Θt ) , L(Θt+T ) − L(Θt ). We upper bound it as follows
2
2
2
Zt+T
− Zt2 + Hu,t+T
− Hu,t
∆T (Θt ) =
2
2
2
2
µ Xt+T − Xt2 + Hd,t+T
− Hd,t
+
2
t+T
X−1
∆u
≤ Zt
Qτ + Sr,τ − Dτ −
To
τ =t
"t+T −1
#2
∆u
1 X
Qτ + Sr,τ − Dτ −
+
2 τ =t
To
"
#2
t+T
t+T −1
X−1
1 X
+ Hu,t
(γu,τ − xu,τ ) +
(γu,τ − xu,τ )
2 τ =t
τ =t
"t+T −1
#2
t+T
X−1
µ X
max
max
(dt − d
)
+ Xt
(dτ − d
)+
2 τ =t
τ =t
"t+T −1
#2
t+T
X−1
µ X
+ Hd,t
(γd,τ − xd,τ ) +
(γd,τ − xd,τ )
2 τ =t
τ =t
t+T
X−1
∆u
≤ Zt
Qτ + Sr,τ − Dτ −
To
τ =t
+ Hu,t
+ Hd,t
A PPENDIX D
P ROOF OF L EMMA 1
t+T
X−1
(γτ − xu,τ ) + Xt
τ =t
t+T
X−1
t+T
X−1
(dτ − dmax )
τ =t
(γd,τ − xd,τ ) + GT 2
(44)
τ =t
Proof: Since µ, α and V are all positive weights, and
Ci (γt )’s are assumed to be continuous, convex and nondecreasing functions with respect to γi,t with maximum
∗
derivatives Ci′ (Γi ) < ∞, for i = d, u, the optimal γi,t
’s
are determined by examining the derivatives of the objective
functions of P4a2 and P4b1 . Note that, given γu,t in (17) and
γd,t in (19), Ci′ (γi,t ) ≥ 0 and increases with γi,t for i = d, u.
For βi defined in Lemma 1, we have
1 ) For Hi,t ≥ 0: We have µd Hd,t + V αCd′ (γd,t ) > 0 and
Hu,t +V Cu′ (γu,t ) > 0. Thus, the objectives of P4a2 and P4b1
are both monotonically increasing functions, and the minimum
∗
values are obtained with γi,t
= 0 for i = d, u.
′
2 ) For Hi,t < −V βCi (Γi ): Since V Ci′ (Γi ) ≥ V Ci′ (γi,t )
for i = d, u, we have µd Hd,t + V αCd′ (γd,t ) < 0 and
Hu,t + V Cu′ (γu,t ) < 0. The objectives of P4a2 and P4b1
are both monotonically decreasing functions. From (19), the
∗
minimum objective value of P4a2 is reached with γd,t
= Γd
max max
where Γd , min{dt , d
}; The minimum objective value
∗
of P4b1 is reached with γu,t
= Γu where by (17), we have
Γu , min{Rmax , Dmax };
∗
3 ) For −V βi Ci′ (Γi ) ≤ Hi,t ≤ 0: In this case, γd,t
and
′
∗
γu,t are the roots of µd Hd,t + V αCd (γd,t ) = 0 and Hu,t +
where G is defined in Lemma 2.
Assume To = M T . We consider a per-frame optimization
problem below, with the objective of minimizing the timeaveraged system cost within the mth frame of length T time
slots.
1
{at ,γt } T
Pf : min
(m+1)T −1
X
[Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]
t=mT
s.t (1), (4), (6), (9), (13) − (15), (17) − (20).
We show that Pf is equivalent to P1 in which To is replaced
by T . Let ufm denote the minimum objective value of Pf .
The optimal solution of P1 satisfies all constraints of Pf and
opt
therefore is feasible to Pf . Thus, we have ufm ≤ um . By
Jensen’s inequality and convexity of Ci (·) for i = d, u, we
have Cd (γd ) ≥ Cd (γd ) = Cd (dw ) and Cu (γu ) ≥ Cu (γu ) =
Cu (xu ). Note that introducing the auxiliary variables γu,t with
constraints (17) and (18), and γd,t with constraints (19) and
(20) does not modify the problem. This means ufm ≥ uopt
m.
Hence, we have ufm = uopt
and
P
and
P1
are
equivalent.
m
f
From (44) and the objective of Pf , we have the T -slot driftplus-cost metric for the mth frame upper bounded by
H
∗
= Ci′−1 − V i,t
V Cu′ (γu,t ) = 0, respectively. We have γi,t
βi
for i = d, u.
∗
Thus, we have γi,t
for i = d, u as in (27).
(m+1)T −1
∆T (Θt ) + V
X
[Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]
t=mT
14
(m+1)T −1
≤ Zt
X
∆u
Qt + Sr,t − Dt −
To
t=mT
t+T
X−1
+ Hu,t
X
+ Xt
Similarly, we have
max
(dτ − d
)
τ =t
t+T
X−1
(γu,τ − xu,τ ) + GT 2 + Hd,t
τ =t
(m+1)T −1
+V
t+T
X−1
(γd,τ − xd,τ )
τ =t
[Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )] .
(45)
t=mT
Let {π̃t } denote a set of feasible solutions of Pf , satisfying
the following relations
(m+1)T −1
(m+1)T
X
X −1
∆u
Q̃t + S̃r,t =
D̃t +
(46)
To
t=mT
(m+1)T −1
(m+1)T −1
X
γ̃i,t =
X
X
d˜t ≤
t=mT
t=mT
(m+1)T −1
x̃i,t , for i = u, d
(47)
t=mT
(m+1)T −1
t=mT
X
dmax
(48)
t=mT
with the corresponding objective value denoted as ũfm .
Note that comparing with P1, we impose per-frame constraints (46)-(48) as oppose to (16), (18), (20) and (3) for the
To -slot period, respectively. Let δ ≥ 0 denote the gap of ũfm
opt
f
to the optimal objective value uopt
m , i.e., ũm = um + δ.
Among all feasible control solutions satisfying (46)-(48),
there exists a solution which leads to δ → 0. The upper bound
in (45) can be rewritten as
(m+1)T −1
X
∆T (Θt ) + V
[Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]
t=mT
2
opt
≤ GT 2 + V T lim uopt
m + δ = GT + V T um .
δ→0
(49)
Summing both sides of (49) over m for m = 0, . . . , M − 1,
and dividing them by V M T , we have
M−1 (m+1)T
X −1
1 X
[Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]
M T m=0
t=mT
+
M−1
GT
1 X opt
L(ΘTo ) − L(Θ0 )
≤
+
u .
V MT
V
M m=0 m
(50)
Since P
Ci (γi ) ≤ Ci (γi ) for the convex function Ci (·) where
To −1
γi,t for i = u, d, from (50), we have
γi , T1o t=0
!
To −1
1 X
Et Pt + xe + Cu (γu ) + αCd (γd )
To t=0
To −1
1 X
[Et Pt + xe,t + Cu (γu,t ) + αCd (γd,t )]
≤
To t=0
(51)
For a continuously differentiable convex function f (·), it
satisfies f (x) ≥ f (y) + f ′ (y)(x − y). Applying this to Cu (xu )
and Cu (γu ), we have
Cu (xu ) ≤ Cu (γu ) + Cu′ (xu )(xu − γu )
≤ Cu (γu ) + Cu′ (Γu )(xu − γu )
Hu,To − Hu,0
= Cu (γu ) − Cu′ (Γu )
To
(52)
Cd (dw ) ≤ Cd (γd ) − Cd′ (Γd )
Hd,To − Hd,0
.
To
(53)
Apply the inequalities in (52) and (53) to Cu (γu ) and Cd (γd )
respectively at LHS of (51), and combining (50) and (51), we
have the bound of the objective value u∗ (V ) of P1 in (30)
achieved by our proposed algorithm.
To show the bound in (31), as To → ∞, it is suffice to show
that both Hu,t and Hd,t in (30) are bounded. To show these
bounds, we need to show that the one-slot Lyapunov drift in
(35) is upper bounded as follows
L(Θt+1 ) − L(Θt ) ≤ G.
(54)
To show the above bound for the drift, we choose an alternative
feasible solution π̃ t satisfying the following per slot relations:
u
i) Q̃t + S̃r,t = D̃t + ∆
To ; ii) γ̃i,t = x̃i,t , for i = u, d; and
iii) d˜t ≤ dmax . With these relations, and by choosing d˜t =
dmax , the terms at RHS of (36), (38), (40) and (41) become
zeros, and we have (54). Averaging (54) over To -slot period,
we have T1o [L(ΘTo ) − L(Θ0 )] ≤ G. For any initial value of
L(Θ0 ) < +∞, by (26), we have
1 2
L(Θ0 )
2
2
. (55)
+ µ XT2o + Hd,T
Z + Hu,T
≤G+
o
o
2To To
To
p
2Tp
It follows that Hu,To ≤
o G + 2L(Θ0 ) and Hd,To ≤
p
(2To G + 2L(Θ0 ))/µ. Since 2To G + 2L(Θ0 )/To → 0 as
To → ∞, for any initial values of Hu,0 and Hd,0 , the third
term in RHS of (30) goes to zero. Thus, we have (31).
P ROOF
A PPENDIX F
OF P ROPOSITION 3
Proof: To prove ǫd is bounded, we note that
|XTo | + |X0 |
|XTo − X0 |
≤
.
(56)
T0
T0
p
From (55), it follows that |XTo | ≤ (2To G + 2L(Θ0 ))/µ.
Substituting the above upper bound of |XTo | in (56), we have
(32).
|ǫd | =
R EFERENCES
[1] T. Li and M. Dong, “Real-time joint energy storage management and
load scheduling with renewable integration,” in Proc. IEEE Int. Conf.
Acoust. Speech Signal Process. (ICASSP), Mar. 2016.
[2] A. Castillo and D. F. Gayme, “Grid-scale energy storage applications
in renewable energy integration: A survey,” Energy Convers. Manag.,
vol. 87, pp. 885–894, Nov. 2014.
[3] D. Callaway and I. Hiskens, “Achieving controllability of electric loads,”
Proc. IEEE, vol. 99, pp. 184–199, Jan. 2011.
[4] H.-I. Su and A. El Gamal, “Modeling and analysis of the role of energy
storage for renewable integration: Power balancing,” IEEE Trans. Power
Syst., vol. 28, no. 4, pp. 4109–4117, Nov. 2013.
[5] S. Sun, M. Dong, and B. Liang, “Real-time welfare-maximizing regulation allocation in dynamic aggregator-EVs system,” IEEE Trans. Smart
Grid, vol. 5, no. 3, pp. 1397–1409, May 2014.
[6] ——, “Real-time power balancing in electric grids with distributed
storage,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 6, pp. 1167–
1181, Dec. 2014.
[7] Y. Wang, X. Lin, and M. Pedram, “Adaptive control for energy storage
systems in households with photovoltaic modules,” IEEE Trans. Smart
Grid, vol. 5, no. 2, pp. 992–1001, Mar. 2014.
[8] M. Lin, A. Wierman, L. L. H. Andrew, and E. Thereska, “Dynamic rightsizing for power-proportional data centers,” IEEE/ACM Trans. Netw.,
vol. 21, no. 5, pp. 1378–1391, Oct. 2013.
15
[9] Y. Zhang and M. van der Schaar, “Structure-aware stochastic storage
management in smart grids,” IEEE J. Sel. Topics Signal Process., vol. 8,
no. 6, pp. 1098–1110, Dec. 2014.
[10] R. Urgaonkar, B. Urgaonkar, M. J. Neely, and A. Sivasubramaniam,
“Optimal power cost management using stored energy in data centers,”
in Proc. ACM SIGMETRICS, Jun. 2011, pp. 115–120.
[11] L. Huang, J. Walrand, and K. Ramchandran, “Optimal demand response
with energy storage management,” in Proc. 3rd IEEE Int. Smart Grid
Commun. (SmartGridComm), Nov. 2012, pp. 61–66.
[12] S. Salinas, M. Li, P. Li, and Y. Fu, “Dynamic energy management for
the smart grid with distributed energy resources,” IEEE Trans. Smart
Grid, vol. 4, no. 4, pp. 2139–2151, Dec. 2013.
[13] T. Li and M. Dong, “Online control for energy storage management with
renewable energy integration,” in Proc. IEEE Int. Conf. Acoust. Speech
Signal Process. (ICASSP), May 2013, pp. 5248–5252.
[14] ——, “Real-time energy storage management with renewable integration: Finite-time horizon approach,” IEEE J. Select. Areas Commun.,
vol. 33, no. 12, pp. 2524–2539, Dec. 2015.
[15] M. J. Neely, Stochastic Network Optimization with Application to
Communication and Queueing Systems. USA: Morgan & Claypool,
2010.
[16] C. Chen, J. Wang, and S. Kishore, “A distributed direct load control
approach for large-scale residential demand response,” IEEE Trans.
Power Syst., vol. 29, no. 5, pp. 2219–2228, Sep. 2014.
[17] M. He, S. Murugesan, and J. Zhang, “A multi-timescale scheduling
approach for stochastic reliability in smart grids with wind generation
and opportunistic demand,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp.
521–529, Mar. 2013.
[18] I. Koutsopoulos and L. Tassiulas, “Optimal control policies for power
demand scheduling in the smart grid,” IEEE J. Sel. Areas Commum.,
vol. 30, no. 6, pp. 1049–1060, Jul. 2012.
[19] C. Joe-Wong, S. Sen, S. Ha, and M. Chiang, “Optimized day-ahead
pricing for smart grids with device-specific scheduling flexibility,” IEEE
J. Sel. Areas Commum., vol. 30, no. 6, pp. 1075–1085, Jul. 2012.
[20] P. Samadi, A. H. Mohsenian-Rad, R. Schober, V. W. S. Wong, and
J. Jatskevich, “Optimal real-time pricing algorithm based on utility
maximization for smart grid,” in Proc. 1st IEEE Int. Conf. Smart Grid
Commun. (SmartGridComm), Oct. 2010, pp. 415–420.
[21] A. H. Mohsenian-Rad and A. Leon-Garcia, “Optimal residential load
control with price prediction in real-time electricity pricing environments,” IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 120–133, Sep. 2010.
[22] P. Du and N. Lu, “Appliance commitment for household load scheduling,” IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 411–419, Jun. 2011.
[23] S. Kishore and L. V. Snyder, “Control mechanisms for residential
electricity demand in smartgrids,” in Proc. 1st IEEE Int. Conf. Smart
Grid Commun. (SmartGridComm), Oct. 2010, pp. 443–448.
[24] T. T. Kim and H. V. Poor, “Scheduling power consumption with price
uncertainty,” IEEE Trans. Smart Grid, vol. 2, no. 3, pp. 519–527, Sep.
2011.
[25] T. H. Chang, M. Alizadeh, and A. Scaglione, “Real-time power balancing via decentralized coordinated home energy scheduling,” IEEE Trans.
Smart Grid, vol. 4, no. 3, pp. 1490–1504, Sep. 2013.
[26] P. Yi, X. Dong, A. Iwayemi, C. Zhou, and S. Li, “Real-time opportunistic
scheduling for residential demand response,” IEEE Trans. Smart Grid,
vol. 4, no. 1, pp. 227–234, Mar. 2013.
[27] A. H. Mohsenian-Rad, V. W. S. Wong, J. Jatskevich, R. Schober,
and A. Leon-Garcia, “Autonomous demand-side management based
on game-theoretic energy consumption scheduling for the future smart
grid,” IEEE Trans. Smart Grid, vol. 1, no. 3, pp. 320–331, Dec. 2010.
[28] B. G. Kim, S. Ren, M. van der Schaar, and J. W. Lee, “Bidirectional
energy trading and residential load scheduling with electric vehicles in
the smart grid,” IEEE J. Select. Areas Commun., vol. 31, no. 7, pp.
1219–1234, Jul. 2013.
[29] S. Chen, N. B. Shroff, and P. Sinha, “Heterogeneous delay tolerant task
scheduling and energy management in the smart grid with renewable
energy,” IEEE J. Sel. Areas Commum., vol. 31, no. 7, pp. 1258–1267,
Jul. 2013.
[30] Y. Huang, S. Mao, and R. M. Nelms, “Adaptive electricity scheduling
in microgrids,” IEEE Trans. Smart Grid, vol. 5, no. 1, pp. 270–281, Jan.
2014.
[31] S. Sun, M. Dong, and B. Liang, “Distributed real-time power balancing
in renewable-integrated power grids with storage and flexible loads,”
IEEE Trans. Smart Grid, vol. PP, no. 99, pp. 1–1, 2015.
[32] P. Ramadass, B. Haran, R. White, and B. N. Popov, “Performance study
of commercial licoo2 and spinel-based li-ion cells,” J. Power Sources,
vol. 111, pp. 210–220, Sep. 2002.
[33] Z. Ma, S. Zou, and X. Liu, “A distributed charging coordination for
large-scale plug-in electric vehicles considering battery degradation
[34]
[35]
[36]
[37]
[38]
[39]
[40]
cost,” IEEE Trans. Control Syst. Technol., vol. 23, no. 5, pp. 2044–2052,
Sep. 2015.
N. Michelusi, L. Badia, R. Carli, L. Corradini, and M. Zorzi, “Energy
management policies for harvesting-based wireless sensor devices with
battery degradation,” IEEE Trans. Commun., vol. 61, no. 12, pp. 4934–
4947, Dec. 2013.
I. Duggal and B. Venkatesh, “Short-term scheduling of thermal generators and battery storage with depth of discharge-based cost model,”
IEEE Trans. Power Syst., vol. 30, no. 4, pp. 2110–2118, Jul. 2015.
Y. Guo, M. Pan, Y. Fang, and P. P. Khargonekar, “Decentralized
coordination of energy utilization for residential households in the smart
grid,” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1341–1350, Sep. 2013.
Z. Ma, S. Zou, and X. Liu, “A distributed charging coordination for
large-scale plug-in electric vehicles considering battery degradation
cost,” IEEE Trans. Control Syst. Technol., vol. 23, no. 5, pp. 2044–2052,
Sep. 2015.
M. J. Neely, “Universal scheduling for networks with arbitrary traffic,
channels, and mobility,” Tech. Rep. arXiv: 1001.0960v1, Jan. 2010.
T. Li and M. Dong, “Real-time energy storage management with
renewable energy of arbitrary generation dynamics,” in Proc. of Asilomar
Conf. on Signals, Systems and Computers, Nov. 2013, pp. 1714–1718.
Ontario Energy Board (2012). Electricity Price. [Online]. Available:
http://www.ontarioenergyboard.ca/OEB/Consumers/Electricity
Tianyi Li (S’11) received the B.S degrees in communication engineering from North China University of Technology, Beijing, China, and in telecommunication engineering technology from Southern
Polytechnic State University, Marietta, GA, USA
both in 2009, and the M.Sc degree in electrical engineering from Northwestern University, Evanston,
IL, USA in 2011. He obtained his Ph.D degree in
2015 from the Department of Electrical, Computer
and Software Engineering, University of Ontario
Institute of Technology, Oshawa, Ontario, Canada,
and currently is a research associate in the same university. He received
the best student paper in the Technical Track of Signal Processing for
Communications and Networking (SP-COM) at IEEE ICASSP in 2016. His
research interests include stochastic optimization and control in energy storage
management and demand side management of smart grid.
Min Dong (S’00-M’05-SM’09) received the B.Eng.
degree from Tsinghua University, Beijing, China, in
1998, and the Ph.D. degree in electrical and computer engineering with minor in applied mathematics
from Cornell University, Ithaca, NY, in 2004. From
2004 to 2008, she was with Corporate Research
and Development, Qualcomm Inc., San Diego, CA.
In 2008, she joined the Department of Electrical,
Computer and Software Engineering at University
of Ontario Institute of Technology, Ontario, Canada,
where she is currently an Associate Professor. She
also holds a status-only Associate Professor appointment with the Department
of Electrical and Computer Engineering at University of Toronto. Her research
interests are in the areas of statistical signal processing for communication networks, cooperative communications and networking techniques, and stochastic
network optimization in dynamic networks and systems.
Dr. Dong received the Early Researcher Award from Ontario Ministry of
Research and Innovation in 2012, the Best Paper Award at IEEE ICCC in
2012, and the 2004 IEEE Signal Processing Society Best Paper Award. She
is a co-author of the best student paper in the Technical Track of Signal
Processing for Communications and Networking (SP-COM) at IEEE ICASSP
in 2016. She served as an Associate Editor for the IEEE TRANSACTIONS
ON SIGNAL PROCESSING (2010-2014), and as an Associate Editor for the
IEEE SIGNAL PROCESSING LETTERS (2009-2013). She was a symposium
lead co-chair of the Communications and Networks to Enable the Smart Grid
Symposium at the IEEE International Conference on Smart Grid Communications (SmartGridComm) in 2014. She has been an elected member of
IEEE Signal Processing Society Signal Processing for Communications and
Networking (SP-COM) Technical Committee since 2013.
| 3cs.SY
|
Suelen Gasparin
Pontifical Catholic University of Paraná, Brazil
Julien Berger
Pontifical Catholic University of Paraná, Brazil
Denys Dutykh
arXiv:1701.07059v3 [cs.CE] 28 Mar 2017
CNRS, Université Savoie Mont Blanc, France
Nathan Mendes
Pontifical Catholic University of Paraná, Brazil
Stable explicit schemes for
simulation of nonlinear moisture
transfer in porous materials
arXiv.org / hal
Last modified: March 29, 2017
Stable explicit schemes for simulation of
nonlinear moisture transfer in porous
materials
Suelen Gasparin∗, Julien Berger, Denys Dutykh, and Nathan Mendes
Abstract. Implicit schemes have been extensively used in building physics to compute
the solution of moisture diffusion problems in porous materials for improving stability
conditions. Nevertheless, these schemes require important sub-iterations when treating
nonlinear problems. To overcome this disadvantage, this paper explores the use of improved explicit schemes, such as Dufort–Frankel, Crank–Nicolson and hyperbolisation approaches. A first case study has been considered with the hypothesis of linear
transfer. The Dufort–Frankel, Crank–Nicolson and hyperbolisation schemes were
compared to the classical Euler explicit scheme and to a reference solution. Results have
shown that the hyperbolisation scheme has a stability condition higher than the standard Courant-Friedrichs-Lewy (CFL) condition. The error of this schemes depends
on the parameter τ representing the hyperbolicity magnitude added into the equation.
The Dufort–Frankel scheme has the advantages of being unconditionally stable and
is preferable for nonlinear transfer, which is the three others cases studies. Results have
shown the error is proportional to O(∆t) . A modified Crank–Nicolson scheme has
been also studied in order to avoid sub-iterations to treat the nonlinearities at each time
step. The main advantages of the Dufort–Frankel scheme are (i) to be twice faster
than the Crank–Nicolson approach; (ii) to compute explicitly the solution at each time
step; (iii) to be unconditionally stable and (iv) easier to parallelise on high-performance
computer systems. Although the approach is unconditionally stable, the choice of the
time discretisation ∆t remains an important issue to accurately represent the physical
phenomena.
Key words and phrases: moisture diffusion; numerical methods; finite differences; explicit schemes; CFL condition; Dufort–Frankel scheme
MSC: [2010] 35R30 (primary), 35K05, 80A20, 65M32 (secondary)
PACS: [2010] 44.05.+e (primary), 44.10.+i, 02.60.Cb, 02.70.Bf (secondary)
Key words and phrases. moisture diffusion; numerical methods; finite differences; explicit schemes;
CFL condition; Dufort–Frankel scheme.
∗
Corresponding author.
Contents
1
Introduction
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2
Moisture transfer in porous materials . . . . . . . . . . . . . . . . . . . . . . . 6
3
Numerical schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1 The Crank–Nicolson scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 The Euler explicit scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3 Improved explicit scheme: Dufort–Frankel method . . . . . . . . . . . . . . . . . . . . . . . 10
3.4 Hyperbolisation scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Dispersion relation analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Error estimate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Discretisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.5 Validation of the numerical solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4
Numerical application: linear transfer . . . . . . . . . . . . . . . . . . . . . . 14
5
Extension for nonlinear transfer . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.1 The modified Crank–Nicolson scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.2 The Dufort–Frankel scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.3 Numerical application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.4 Further nonlinear case studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Driving rain case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Capillary adsorption case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Results and discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6
Conclusion
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
A
Stability analysis of the Dufort–Frankel scheme . . . . . . . . . . . . . . . . 30
B
Dimensionless parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
B.1 Case from Section 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
B.2 Case from Section 5.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
B.3 Case from Section 5.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
References
4 / 34
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5 / 34
Stable explicit schemes
1. Introduction
Excessive levels of moisture may lead to mould growth and may affect the indoor air
quality, the thermal comfort of the occupants and HVAC energy consumption and demand. Moreover, it can deteriorate building façades and decrease envelope durability
[3, 11]. Assessment of relative humidity in constructions is also important for management
and performance of HVAC systems.
Models for moisture transfer in porous building materials have been implemented as
building simulation tools since the nineties in software such as Delphin [2], MATCH
[25], MOIST [4], WUFI [9] and UMIDUS [17, 19] among others. Moisture models have
also been implemented in whole-building simulation tools and tested in the frame of the
International Energy Agency Annex 41, which reported on most of detailed models and
their successful applications for accurate assessment of hygrothermal transfer in buildings
[32].
Moisture transfer is represented by a diffusion equation, formulated as:
∂u
= ∇ · ( ν ∇u ) ,
∂t
associated to boundary and initial conditions, where ν is the diffusion of the material and
where u (x, t) is the moisture potential being diffused in the spatial domain Ω x during the
time interval Ω t .We denote ∆x and ∆t the spatial and time discretisation within those
the domains. Due to the nonlinearities of the material properties and due to the nonperiodicity of the boundary conditions, the models use numerical techniques to compute
the moisture content from the partial differential governing equation.
Due to its property of unconditional stability, the Euler implicit scheme has been used
in many works reported in the literature [2, 9, 12, 13, 18, 26, 28]. However, it has the order
of accuracy O (∆t + ∆x 2 ) , while the Crank–Nicolson scheme can be used to increase
the accuracy to O (∆t 2 + ∆x 2 ) . For the same time and space discretisation, numerical
results obtained with this scheme are more accurate than those obtained from Euler implicit scheme. The Crank–Nicolson scheme has been implemented for instance in [31].
Nevertheless, at every time step, one has to use a tridiagonal solver to invert the linear system of equations to determine the solution value at the following time layer. For instance
in [18], a multi-tridiagonal matrix algorithm has been developed to compute the solution of
coupled equations of nonlinear heat and moisture transfer, using an Euler implicit scheme.
Furthermore, when dealing with nonlinearities of the material properties for instance, one
has to perform sub-iterations to linearise the system, increasing thus the total number of
iterations. In [12], thousands of iterations are required to converge to the solution of a
mass diffusion problem.
On the other hand, an explicit scheme enables a direct computation of the the solution
at the following time layer. Some examples of works based on explicit schemes can be
found in the literature as [16, 29]. Nevertheless, this scheme is conditionally stable under
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
6 / 34
the Courant–Friedrichs–Lewy (CFL) condition:
1
∆t 6
∆x 2 .
2ν
The CFL condition is restrictive for fine discretisations, explaining why few works have
used this approach in building physics.
This paper is devoted to explore the use of improved explicit schemes to overcome the
instability limitation of the standard explicit scheme. The proposed schemes are evaluated
to solve nonlinear transfer of moisture in porous material. The advantages and drawbacks are discussed for two numerical applications. Next Section aims at describing the
physical phenomena of moisture transfer in porous material. In Section 3, basics of the
Dufort–Frankel and the hyperbolisation explicit schemes, are detailed. Then, linear
and nonlinear moisture transfer cases are considered to verify the features of the proposed
approaches.
2. Moisture transfer in porous materials
The physical problem involves one-dimension moisture diffusion through a porous material defined by the spatial domain Ω x = [ 0, L ]. The moisture transfer occurs according
to the liquid and vapour diffusion. The physical problem can be formulated as [12]:
∂P c
∂
∂P v
∂ρ l+v
kl
,
(2.1)
=
+ kv
∂t
∂x
∂x
∂x
where ρ l+v is the volumetric moisture content of the material and k v and k l , the vapour
and liquid permeabilities.
Eq. (2.1) can be written using the vapour pressure P v as the driving potential. For this,
we consider the physical relation, known as the Kelvin equation, between P v and P c :
Pv
P c = R v · T · ln
P s (T )
Rv T
∂P c
=
.
∂P v
Pv
Thus we have:
∂P c ∂P v
∂P c ∂T
∂P c
=
·
+
·
.
∂x
∂P v ∂x
∂T ∂x
As we consider the mass transfer under isothermal conditions, the second term vanishes
and we obtain:
∂P c
R v T ∂P v
=
·
.
∂x
Pv
∂x
In addition, we have:
∂ρ l+v ∂φ ∂P v
∂ρ l+v ∂T
∂ρ l+v ∂φ ∂P v
∂ρ l+v
=
·
·
+
·
≃
·
·
.
∂t
∂φ
∂P v ∂t
∂T
∂t
∂φ
∂P v ∂t
7 / 34
Stable explicit schemes
Considering the relation ρ l+v = f(φ) = f(P v , T ) , obtained from material properties and
from the relation between the vapour pressure P v and the relative humidity φ , we get:
∂ρ l+v
1 ∂P v
= f ′ (P v )
.
∂t
P s ∂t
Eq. (2.1) can be therefore rewritten as:
∂P
1 ∂P v
∂ Rv T
v
f (P v )
kl
.
=
+ kv
P s ∂t
∂x
Pv
∂x
′
(2.2)
The material properties f ′ (P v ), k l and k v depend on the vapour pressure P v . At the
material bounding surfaces, Robin-type boundary conditions are considered:
Rv T
kl
+ kv
Pv
Rv T
+ kv
− kl
Pv
∂P v
= h vL · P v − P vL − g lL ,
∂x
∂P v
= h vR · P v − P vR − g lR ,
∂x
x = 0,
(2.3)
x = L,
(2.4)
where P vL and P vR are the vapour pressure of the ambient air, g lL and g lR are the liquid
flow (driving rain) at the two bounding surfaces. We consider a uniform vapour pressure
distribution as initial condition:
P v = P vi ,
t = 0.
(2.5)
While performing a mathematical and numerical analysis of a given practical problem, it
is of capital importance to obtain a unitless formulation of governing equations, due to a
number of good reasons. First of all, it enables to determine important scaling parameters
(Biot numbers for instance). Henceforth, solving one dimensionless problem is equivalent
to solve a whole class of dimensional problems sharing the same scaling parameters. Then,
dimensionless equations allow to estimate the relative magnitude of various terms, and thus,
eventually to simplify the problem using asymptotic methods [21]. Finally, the floating
point arithmetics is designed such as the rounding errors are minimal if you manipulate
the numbers of the same magnitude [15]. Moreover, the floating point numbers have the
highest density in the interval (0, 1) and their density decays exponentially when we move
further away from zero. So, it is always better to manipulate numerically the quantities at
the order of O(1) to avoid severe round-off errors and to likely improve the conditioning of
Rv T
+ k v as a global moisture
the problem in hands. Therefore, we denote d m = k l ·
Pv
1
as the moisture storage coefficient and define the
transport coefficient, c m = f ′ (P v )
Ps
8 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
following dimensionless quantities:
u =
Pv
,
P vi
uR =
P vR
,
P vi
uL =
P vL
,
P vi
x⋆ =
t⋆ =
t
,
t0
⋆
cm
=
c m · L2
,
d 0m · t 0
⋆
dm
=
dm
,
d 0m
Bi Lv =
Bi R
v =
hR
v ·L
,
d 0m
g l,⋆ L =
g lL · L
,
0 ·Pi
dm
v
g l,⋆ R =
x
,
L
h Lv · L
,
d 0m
g lR · L
.
0 ·Pi
dm
v
In this way, the dimensionless governing equations are then written as:
c ⋆m
⋆
dm
−d ⋆m
∂
∂u
=
⋆
∂t
∂x ⋆
d ⋆m
∂u
∂x ⋆
,
∂u
L
L
=
Bi
·
u
−
u
− g l,⋆ L ,
v
⋆
∂x
∂u
R
R
=
Bi
·
u
−
u
− g l,⋆ R ,
v
⋆
∂x
u = 1,
t⋆ > 0 ,
x⋆ ∈
t⋆ > 0 ,
x⋆ = 0 ,
(2.6b)
t⋆ > 0 ,
x⋆ = 1 ,
x ⋆ ∈ 0, 1 .
(2.6c)
t⋆ = 0 ,
0, 1 ,
(2.6a)
(2.6d)
3. Numerical schemes
In order to describe numerical schemes, let us consider a uniform discretisation of the
interval Ω x
Ωh :
Ωh =
N
−1
[
[ x j , x j+1 ] ,
j =0
xj+1 − x j ≡ ∆x ,
∀j ∈
0, 1, . . . , N − 1 .
The time layers are uniformly spaced as well t n = n ∆t , ∆t = const > 0 , n =
def
0, 1, 2, . . . , N t The values of function u(x, t) in discrete nodes will be denoted by u jn := u (x j , t n ) .
For the sake of simplicity and without loosing the generality, the numerical schemes are
d⋆
explained considering d ⋆m and c ⋆m as constant, noting ν = ⋆m and the linear diffusion
cm
equation:
∂u
= ∇ · ( ν ∇u ) .
∂t
(3.1)
9 / 34
Stable explicit schemes
(a) Euler Explicit
(b) Crank–Nicolson
(c) Dufort–Frankel
(d) Hyperbolisation
Figure 1. Stencils of the numerical schemes.
3.1. The Crank–Nicolson scheme
A very useful method was proposed by Crank & Nicolson (CN) and it can be successfully applied to the diffusion equation (3.1) as well:
n+1
n+1
n
u j−1
− 2 u jn + u nj+1
u j−1
− 2 u jn+1 + u j+1
u jn+1 − u jn
= ν
+
ν
,
∆t
2 ∆x 2
2 ∆x 2
j = 1, . . . , N − 1 ,
n ≥ 0 . (3.2)
This scheme is O(∆t2 + ∆x 2 ) accurate and unconditionally stable. That is why numerical
results obtained with the CN scheme will be more accurate than implicit scheme predictions.
The stencil of this scheme is depicted in Figure 1(b). The CN scheme has all advantages
and disadvantages (except for the order of accuracy in time) of the implicit scheme. At
every time step one has to use a tridiagonal solver to invert the linear system of equations
to determine solution value at the following time layer t = t n+1 .
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
10 / 34
3.2. The Euler explicit scheme
The standard explicit scheme can be written as:
n
u jn+1 − u nj
u j−1
− 2 u jn + u nj+1
= ν
,
j = 1, . . . , N − 1 ,
n > 0 . (3.3)
∆t
∆x 2
The stencil of this scheme is depicted in Figure 1(a). This discretisation is completed using
the two boundary conditions:
u 0n+1 = ψ L (t n+1 , u n+1
, ...),
1
n+1
n+1
uN
= ψ R (t n+1 , u N
−1 , . . . ) ,
where functions ψ l, r ( • ) may depend on adjacent values of the solution whose number
depends on the approximation order of the scheme (here we use the second order in space).
For instance, for the left boundary conditions, we have
−3 u 0n+1 + 4 u 1n+1 − u 2n+1
d ⋆m
= Bi Lv · u 0n+1 − u L − g l,⋆ L .
2 ∆x
By solving Eq. (3.3) with respect to u jn+1, we obtain a discrete dynamical system
∆t
n
n
n
u
−
2
u
+
u
,
u jn+1 = u nj + ν
j−1
j
j+1
∆x 2
whose starting value is directly obtained from the initial condition:
u j0 = 1 .
It is well-known that scheme (3.3) approximates the continuous operator to order O(∆t +
∆x 2 ) . The explicit scheme is conditionally stable under the following CFL-type condition:
1
∆t 6
∆x 2 .
(3.4)
2ν
Unfortunately, this condition is too restrictive for sufficiently fine discretisations.
3.3. Improved explicit scheme: Dufort–Frankel method
Using the so-called Dufort–Frankel method, the numerical scheme is expressed as:
n
n
u jn+1 − u jn−1
u j−1
− u jn−1 + u jn+1 + u j+1
= ν
,
j = 1, . . . , N − 1 ,
n > 0,
2 ∆t
∆x 2
(3.5)
where the term 2 u jn is replaced by u jn−1 + u jn+1. The scheme (3.5) has the stencil depicted
in Figure 1(c). At first glance, the scheme (3.5) looks like an implicit scheme, however, it
is not truly the case. Eq. (3.5) can be easily solved for u jn+1 to give the following discrete
dynamical system:
1 − λ n−1
λ
n
u jn+1 =
u nj+1 + u j−1
,
uj
+
1 + λ
1 + λ
11 / 34
Stable explicit schemes
where:
∆t
.
∆x 2
The standard von Neumann stability analysis (detailed in the Appendix) shows that the
Dufort–Frankel scheme is unconditionally stable.
The consistency error analysis of the scheme (3.5) shows the following result:
def
λ := 2 ν
L nj = ν
where
3
∆t 2 ∂ 2 u
∂u
∂2u
2 ∂ u
1
∆t
+
−
ν
+
6
∆x 2 ∂t2
∂t
∂x2
∂t3
∆t 4
4
∂3 ∂2u
2 ∂ u
2
1
1
− 12 ν ∆t ∆x 3 2 + O
, (3.6)
− 12 ν ∆x
∂x4
∂x ∂t
∆x 2
n
u nj−1 − u jn−1 + u n+1
+ u j+1
u jn+1 − u jn−1
j
− ν
.
2 ∆t
∆x 2
So, from the asymptotic expansion for L nj we obtain that the Dufort–Frankel scheme
is second order accurate in time and:
• First order accurate in space if ∆t ∝ ∆x 3/2
• Second order accurate in space if ∆t ∝ ∆x 2
It is important to note that the boundary condition have to be discretised to the second
order of accuracy O(∆x 2 ) to maintain the method features uniformly.
def
L nj :=
3.4. Hyperbolisation scheme
From Eq. (3.6), it can be noted that the Dufort–Frankel scheme is unconditionally
consistent with the so-called hyperbolic heat conduction equation. Thus, the scheme is a
hidden way to add a small amount of ’hyperbolicity’ into the model (3.1). In this Section
we shall invert the order of operations: first, we perturb Eq. (3.1) in an ad-hoc way and
only after we discretise it with a suitable method. We consider the 1−dimension Eq. (3.1)
perturbed by adding a low magnitude term containing the second derivative in time:
∂u
∂2u
∂2u
+
=
ν
.
(3.7)
∂t2
∂t
∂x2
This is the hyperbolic diffusion equation already familiar to us since it appeared in
the consistency analysis of the Dufort–Frankel scheme. Here we perform a singular
perturbation by assuming that
τ
∂2u
∂u
k
≪
k
k.
∂t2
∂t
The last condition physically means that the new term has only limited influence on the
solution of Eq. (3.7). Here τ is a small ad-hoc parameter whose value is in general related
to physical and discretisation parameters τ = τ (ν, ∆x, ∆t) .
One can notice Eq. (3.7) requires two initial conditions to obtain a well-posed initial
value problem. However, the parabolic Eq. (3.1) is only first order in time and it only
kτ
12 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
requires the knowledge of the initial temperature field distribution. When we solve the
hyperbolic Eq. (3.7), the missing initial condition is simply chosen to be
∂u
= 0,
∂t
t = 0.
3.4.1 Dispersion relation analysis
The classical dispersion relation analysis looks at plane wave solutions:
u(x, t) = u 0 e i (κ x
− ω t)
.
(3.8)
By substituting this solution ansatz into Eq. (3.1) we obtain the following relation between
wave frequency ω and wavenumber k :
ω(κ) = − i ν κ 2 .
(3.9)
The last relation is called the dispersion relation even if the diffusion Eq. (3.1) is not
dispersive but dissipative. The real part of ω contains information about wave propagation
properties (dispersive if Re ω(κ)
6= const and non-dispersive otherwise) while the imaginary
κ
part describes how different modes κ dissipate (if Im ω(κ) < 0) or grow (if Im ω(κ) > 0 ).
The dispersion relation (3.9) gives the damping rate of different modes.
The same plane wave ansatz (3.8) can be substituted into the hyperbolic heat Eq. (3.7)
as well to give the following implicit relation for the wave frequency ω :
− τ ω2 − i ω + ν κ2 = 0 .
By solving this quadratic equation with complex coefficients for ω , we obtain two branches:
√
− i ± 4 ν κ2 τ − 1
ω ± (κ) =
.
2τ
This dispersion relation will be analysed asymptotically with τ ≪ 1 being the small
parameter. The branch ω − (κ) is not of much interest to us since it is constantly damped,
i.e.
i
+ O(1) .
ω − (κ) = −
τ
It is much more instructive to look at the positive branch ω + (κ) :
ω + (κ) = − i ν κ 2 1 + ν κ 2 τ + 2 ν 2 κ 4 τ 2 + O(τ 3 ) .
The last asymptotic expansion shows that for small values of parameter τ , we obtain a
valid asymptotic approximation of the dispersion relation (3.9) for the diffusion equation
(3.1).
13 / 34
Stable explicit schemes
3.4.2 Error estimate
It is legitimate to ask the question how far the solutions u h (x, t) of the hyperbolic
equation (3.7) are from the solutions u p (x, t) of the parabolic diffusion equation (3.1) (for
the same initial condition). This question for the initial value problem was studied in [20]
and we shall provide here only the obtained error estimate. Let us introduce the difference
between two solutions:
def
δu (x, t) := u h (x, t) − u p (x, t) .
Then, the following estimate holds
√
4
√
2
2 π2
| δu (x, t) | ≤ τ M 1 + √
8 2τ +
T ,
π
2
where T > 0 is the time horizon and
∂ 2u p
def
(ξ, ζ) ,
M := sup
∂ t2
Ω ξ, ζ
and the domain Ω ξ, ζ is defined as
n
def
Ω ξ, ζ := (ξ, ζ) : 0 ≤ ζ ≤ t ,
t − ζ
t − ζo
x − √
.
≤ ξ ≤ x + √
τ
τ
3.4.3 Discretisation
Eq. (3.7) is discretised on the stencil depicted in Figure 1(d):
def
L nj := τ
n
n
u jn+1 − u jn−1
u jn+1 − 2 u jn + u jn−1
u j+1
− 2 u jn + u j−1
+
−
ν
= 0,
∆t 2
2 ∆t
∆x 2
j = 1, . . . , N − 1 ,
n > 0 , (3.10)
Using the standard Taylor expansions, it can be proven that the scheme is consistent
with hyperbolic heat Eq. (3.7) to the second order in space and in time O(∆t 2 + ∆x 2 ) .
The stability of the scheme (3.10) was studied in [7] and the following stability condition
was obtained:
r
∆t
τ
6
.
(3.11)
∆x
ν
The choice of parameter τ is therefore an important issue and will be discussed in next
Sections.
3.5. Validation of the numerical solution
One possible comparison of the numerical schemes can be done by computing the L ∞
error between the solution u num and a reference solution u ref :
def
ε :=
u ref − u num
∞
(3.12a)
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
14 / 34
The computation of the reference solution is detailed in further Sections.
4. Numerical application: linear transfer
A first case of linear moisture transfer is considered. From a physical point of view, the
numerical values correspond to a material length L = 0.1 m. The moisture properties are
d m = 1.97 · 10−10 s and c m = 7.09 · 10−3 kg/m3 /Pa. The initial vapour pressure in the
material is considered uniform P vi = 1.16 · 103 Pa , corresponding to a relative humidity of
50%. The reference time is t 0 = 1 h, thus the total time of simulation corresponds to 120
hours, or five days. The boundary conditions, represented by the relative humidity φ are
given in Figure 2. The sinusoidal variations oscillates between dry and moist state during
the 120 hours. The convective vapour coefficients are set to 2 · 10−7 s/m and 3 · 10−8 s/m
for the left and right boundary conditions, respectively. As the readers may be interested
in testing the numerical schemes proposed, in the present paper dimensionless values are
provided in Appendix B.
The solution of the problem has been first computed for a discretisation ∆x = 10−2
and ∆t = 10−4 , respecting the CFL condition ∆t 6 4.3 · 10 −4. For the hyperbolisation
scheme, τ = ∆t. The physical phenomena are thus well represented, as illustrated in
Figure 3(a) with the time evolution of the vapour pressure at x = 0. The variations follow
the ones of the left boundary conditions. It can be noted a good agreement between the
four numerical schemes. Furthermore, the vapour pressure profile is shown in Figure 3(b)
for t = 19 h and t = 52 h , corresponding to the highest and lowest vapour pressure
values. All the numerical methods give accurate results as illustrated with the L2 error
calculated as a function of x in Figure 4. The error for the hyperbolisation method is lower
than the others. Indeed the hyperbolisation numerical scheme is of the order O(∆t2 ) and
the numerical solution is therefore more accurate.
A numerical analysis of the behaviour of the four numerical schemes has been carried
out for different values of the temporal discretisation ∆t. The spatial discretisation is
maintained to ∆x = 10−2 and τ = ∆t for the hyperbolisation scheme. The reference
solution has been computed using the Matlab open source package Chebfun [8]. Using the
function pde23t, it enables to compute a numerical solution of a partial derivative equation
using the Chebyshev functions. Results of the L 2 error ε are shown in Figure 5(a).
Before the CFL limit, the errors of the Euler, Dufort–Frankel and hyperbolisation
schemes are proportional to O(∆t). As expected, the Euler scheme enables to compute
the solution as far the CFL condition is respected. Above this limit, the solution diverges.
After the CFL limit, as unconditionally stable, the Dufort–Frankel scheme computes
the solution. An interesting point is that the error is proportional to O(∆t2 ). The error
of the Dufort–Frankel scheme computed solution becomes too high for ∆t > 3 · 10 −2 .
3
For this case, ∆t ∝ ∆x 2 , therefore, the Dufort–Frankel scheme is first order accurate
in space O(∆x), explaining why the error is lower for the hyperbolisation scheme.
As the Euler scheme, the hyperbolisation scheme has a stability condition to respect as
reported in Eq. (3.11). For the case τ = ∆t, it corresponds to ∆t 6 9 · 10 −4 . This limit
15 / 34
Stable explicit schemes
lef t
right
1.2
Φ (-)
1
0.8
0.6
0.4
0.2
0
0
20
40
60
t (h)
80
100
120
Figure 2. Boundary conditions.
3500
C heb.
Euler
Duf ort
H yp.
3000
2000
t = 19h
2500
P v (Pa)
P v (Pa)
1500
2000
1500
1000
C heb.
Euler
Duf ort
H yp.
1000
500
t = 53h
500
0
0
20
40
60
t (h)
(a)
80
100
120
0
0
0.02
0.04
0.06
x (m)
0.08
0.1
(b)
Figure 3. Vapour pressure time evolution at x = 0 m (a) and profiles for
t ∈ {19, 53} h (b).
is higher than the CFL condition for the Euler scheme. The error of the hyperbolisation
scheme varies with the choice of the parameter τ . Figure 5(b) gives the variation of the
error ε, for the hyperbolisation scheme, as a function of ∆t, for different values of parameter
τ . The error ε reaches a limit lower than the parameter τ . It can be verified that for the
3
choice τ = ν ∆x , the stability condition corresponds to ∆x 2 . For this case, the choice
τ 6 ∆t permits to compute the solution with the best accuracy.
16 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
−2
10
ε (-)
Euler
Duf ort
H yp.
−3
10
−4
10
0
0.02
0.04
0.06
x (m)
0.08
0.1
Figure 4. L 2 error for fixed ∆t = 10 −4 .
−1
10 1
10
-1
Euler
Dufort
Hyp.
Crank
O(∆t2 )
O(∆t)
−2
10
10 -2
ε (-)
ε (-)
10
0
10
CF L
−3
10
10 -3
τ = 5 · 10 −2
τ = 5 · 10 −3
τ = 10 −3
τ = 10 −4
τ = ∆t
O(∆t)
−4
10
10
-4
10 -5
10 -4
C F L = ∆x3/2
10 -3
10 -2
∆t (-)
(a)
10 -1
10 0
−4
10
−3
10
∆t (-)
−2
10
(b)
Figure 5. L 2 error as a function of ∆t for the Euler, Dufort–Frankel and
hyperbolisation schemes (∆x = 10−2 , τ = ∆t) (a) and for the hyperbolisation
scheme (∆x = 10−2 ).
5. Extension for nonlinear transfer
The previous case study investigated the use of three numerical schemes for computing
the solution of a linear problem of moisture diffusion. This second case study considers
now nonlinear diffusion, due to material properties depending on the moisture content
17 / 34
Stable explicit schemes
⋆
⋆
dm
( u ) and c m
( u ). This case will be investigated via the Dufort–Frankel and the
improved Crank–Nicolson schemes. The hyperbolisation approach is not considered,
as a stability condition was observed previously in the linear case. First, the Dufort–
Frankel and Crank–Nicolson schemes are detailed for the nonlinear case. For this,
Eq. (2.6) is re-called with a simplified notation:
"
#
∂u
∂u
∂
c(u)
d(u)
.
(5.1)
=
∂t
∂x
∂x
5.1. The modified Crank–Nicolson scheme
The straightforward application of the Crank–Nicolson scheme to Eq. (5.1) yields
the following scheme:
"
n+ 1
n+ 1 #
n+1
n
2
2
u
−
u
∂u
∂u
1
j
j
c nj
d
− d
,
(5.2)
=
∆t
∆x
∂x j+ 1
∂x j− 1
2
2
with
d
∂u
∂x
n+ 1
2
1
j+
2
=
1
2
"
d
∂u
∂x
n+1
1
j+
2
+
d
∂u
∂x
n
j+
1
2
#
#
"
1
n+1
.
=
d n+1 u j+1
− u jn+1 + d n 1 u nj+1 − u jn
j+
2 ∆x j+ 21
2
However, this approach leads to deal with nonlinearities due to the evaluation of quantities
(as d n+11 ) at the upcoming time layer t = t n+1 . To deal with this issue, linearisation
j+
2
techniques as Picard or Newton–Raphson ones [5, 23], requiring a high number of subiterations. To overcome these difficulties, it is possible to evaluate the diffusion coefficient
at the actual time layer instead of the upcoming [1]. Thus, the diffusion flux at the interface
becomes:
"
#
n+ 1
2
1
∂u
n+1
n
=
d n 1 u n+1
d
.
+ d n 1 u j+1
− u jn
j+1 − u j
j+
∂x j+ 1
2 ∆x j+ 2
2
2
Finally, the modified Crank–Nicolson schemes yields to:
"
#
∆t
∆t
∆t
n+1
u jn+1 −
−
dn 1 + dn 1
d n 1 u j+1
d n u n+1
1 +
2
2
2 j− 1 j−1
j−
j+
j+
2 ∆x
2
∆x
2
∆x
2
2
2
2
"
#
∆t
∆t
∆t
n
= 1 −
dn 1 + dn 1
d n 1 u j+1
dn un .
u jn +
+
2
2
2 j− 1 j−1
j+
j+
j−
2 ∆x
2
∆x
2
∆x
2
2
2
2
18 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
The combination of implicit-explicit (IMEX) approaches clearly appear in this formulation.
The major advantage over the classical Crank–Nicolson scheme is to avoid sub-iterations
in the solution procedure, without loosing the accuracy and the stability.
5.2. The Dufort–Frankel scheme
In the nonlinear case, the Dufort–Frankel numerical schemes is written as:
"
n
n #
n+1
n−1
u
−
u
∂u
∂u
1
j
j
c nj
d
− d
.
=
2 ∆t
∆x
∂x j+ 1
∂x j− 1
2
(5.3)
2
The right-hand side term can be expressed as:
n
n !
∂u
∂u
1
1
n
n
n
n
n
n
d
d 1 u j+1 + d 1 u j−1 − d 1 + d 1 u jn
− d
=
j+
j−
j+
j−
∆x
∂x j+ 1
∂x j− 1
∆x2
2
2
2
2
2
2
(5.4)
u n+1
+ u jn−1
j
.
2
Thus, considering Eq. (5.3), the Dufort–Frankel schemes can be expressed as an explicit scheme:
Using the Dufort–Frankel stencil (see Figure 1(c)), the term u jn is replaced by
u n+1
=
j
λ2
λ0 − λ3
λ1
n
n
· u j+1
+
· u j−1
+
· u jn−1 ,
λ0 + λ3
λ0 + λ3
λ0 + λ3
with
def
def
λ 2 :=
2 ∆t n
d 1,
∆x2 j+ 2
∆t
def
n
n
:=
d 1 +d 1 .
j−
j+
∆x2
2
2
def
λ 0 := c nj ,
λ 1 :=
2 ∆t n
d 1,
∆x2 j− 2
λ3
When dealing with the nonlinearities of the material properties, an interesting feature of
explicit schemes is that it does not require any sub-iterations (using Newton–Raphson
approach for instance). At the time iteration n, the material properties c j , dj+ 1 , dj− 1 are
2
2
explicitly calculated at t n . It should be noted that the material properties evaluated at
j + 21 is formulated as:
uj + uæ+1
dj+ 1 = d
.
2
2
5.3. Numerical application
From a physical point of view, the storage and diffusion coefficients are given in Figures
6(a) and 6(b). Their variations with the relative humidity are similar to the load bearing
material from [12]. The initial vapour pressure is uniform P vi = 1.16 · 10 3 Pa. No
19 / 34
Stable explicit schemes
moisture flow is taken into account at the boundaries. The ambient vapour pressure at the
boundaries are illustrated in Figure 7. At the left boundary, it has a fast drop until the
saturation state and at the right boundary, it has a sinusoidal variation. The material is
thus excited until the capillary state. The convective vapour transfer coefficients are set
to 2 · 10−7 s/m and 3 · 10−8 s/m for the left and right boundary conditions, respectively.
The final simulation time is also fixed to 120 hours. As in the previous case study, the
dimensionless values can be found in Appendix B.
The solution of the problem has been computed with the following discretisation parameters: ∆t = 10 −4 and ∆x = 10 −2 . For this, the Dufort–Frankel, the modified
Crank–Nicolson and the standard Crank–Nicolson numerical schemes have been
used. A sufficiently converged solution, computed with a Euler explicit scheme, is taken
as reference. For the latter, the tolerance is set to ǫ 6 0.01 · ∆t2 to ensure the convergence
of the sub-iterations. The time variation of the vapour pressure according for the bounding
points is given in Figure 8(a). The vapour pressure in the material is increasing according
to the variation at the left boundary condition. There is a delay between the vapour pressure at the left (x = 0 m) and right (x = 0.1 m) bounding points. This increase can also
be observed on the four profiles of vapour pressure illustrated in Figure 8(b). Furthermore,
a break in the slope of the increase of the vapour pressure can be noticed at t = 12 h , due
to the nonlinear behaviour of the material. The vapour pressure at x = 0.1 m slowly oscillated according to the right boundary condition. All the solutions, computed with each
different numerical schemes, have good agreement to represent the physical phenomena
and their L 2 error with the reference solution is lower than 10 −3 , as reported in Figure 9.
The solution has been computed for different values of ∆t, maintaining ∆x = 10 −2 . For
each value of ∆t, the L2 error has been computed between the numerical and a sufficiently
converged reference solution. Results are given in Figure 10. The equivalent CFL condition
has been computed as:
∆t 6
∆x2
.
⋆
2 max dc ⋆m(( uu ))
m
As for the linear case, the Euler explicit scheme enables to compute the solution
while the CFL condition is respected. The Dufort–Frankel and modified Crank–
Nicolson numerical schemes are unconditionally stable. An interesting observation is
that the error of the Dufort–Frankel and modified Crank–Nicolson schemes are
proportional to O(∆t). The modification of the Crank–Nicolson scheme, in order to
avoid the sub-iterations due to nonlinearities, loose the O(∆t2 ) accuracy.
Even with ∆t increasing, the schemes are able to compute a solution. However, the
choice of the time discretisation is an important issue to represent accurately the physical
phenomenon. Figures 11(a) and 11(b) show the vapour pressure evolution computed with
∆t = 10 −1 . The solution lacks of accuracy comparing to the reference solution. For
instance, at t = 40, the solution does not represent accurately the decrease of the vapour
pressure. At x = 0.1 m , ∆t is too large to follow the dynamic of the boundary condition.
The error due to the time discretisation of a sinusoidal boundary condition can be expressed
20 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
as:
ǫ = A ω cos ( ωn∆t ) − A
sin ( ω ( n + 1 ) ∆t ) − sin ( ωn∆t )
,
∆t
where A and ω are the amplitude and the frequency of the signal. The error ǫ is given in
Figure 12 as a function of ∆t for this case study. If an accuracy of ǫ 6 10 −1 is required, a
time discretisation lower than ∆t 6 2 · 10 −2 is needed. Therefore, for an unconditionally
stable scheme, the choice of the time discretisation depends on the variation of the boundary
conditions, as well as the diffusion time in the material, in order to compute a solution
representing accurately the physical phenomenon.
With N, the number points due to spatial discretisation, at each time iteration t n the
numbers of operations for each schemes scales with:
Euler implicit:
Crank–Nicolson:
Euler explicit:
O(N NL · N) ,
O(N NL · 2 · N) ,
O(N) ,
Dufort–Frankel
O(N) ,
modified Crank–Nicolson:
O(2 · N) .
The standard Euler implicit and Crank–Nicolson schemes require N NL sub-iterations
to treat the nonlinearities (using Newton–Raphson approach for instance). The Crank–
Nicolson approach needs twice more operations as it combines explicit and implicit approaches. The number of operations of the explicit schemes, as Euler and Dufort–
Frankel, scales with the direct computation of the solution u n . The modified Crank–
Nicolson does not require sub-iterations as the coefficients are expressed at the current
time layer. Thus, the number of operations required is O(2 · N). Generally O(N NL ) ≫ 1,
as reported in [12] where the number of sub-iterations scales between 10 to 30 . Therefore,
for the same discretisation, the Crank–Nicolson scheme requires much more operations
per time step than Dufort–Frankel or modified Crank–Nicolson. For this numerical application, the CPU time of each approach, using ∆t = 10 −4 , has been evaluated
using Matlab platform on a computer with Intel i7 CPU and 8GB of RAM and reported
in Table 1. It has been preferred to focus on the ratio of computer run time rather
than on absolute values, that are system-dependent. However as expected, the Dufort–
Frankel scheme is twice faster than the modified Crank–Nicolson one. The average
number of sub-iterations is O(N NL ) = 3 and as expected, the CPU time of the standard
Crank–Nicolson scheme is six time longer. In addition, another computational advantage of explicit schemes over the implicit ones is their ease to be parallelised. They allow
to achieve almost perfect scaling on high-performance computer systems [7].
Resuming these results, the main advantages of the Dufort–Frankel schemes are (i)
to avoid sub-iterations to treat the nonlinearities and thus be faster than the Crank–
Nicolson approach, (ii) to compute explicitly the solution at each time step, (iii) to be
unconditionally stable, as well as (iv) the ease to be parallelised.
21 / 34
Stable explicit schemes
0
10
−7
10
−8
dM (s)
cM (kg/m3 /s)
10
−1
10
−9
10
−10
10
−11
−2
10
10
0
0.2
0.4
0.6
φ (-)
0.8
(a)
0
0.2
0.4
φ (-)
0.6
0.8
(b)
Figure 6. Variation of the moisture storage c m (a) and diffusion d m (b) as a
function of the relative humidity φ .
Uniform discretization approaches are commonly used in building simulation codes such
as Delphin [2] or WUFI [9] to name a few. They allow to meet a prescribed tolerance
parameter. In the case of a conditionally stable scheme, the time step limitation is imposed
by a CFL-type condition to be met. In other cases, the constraint is imposed by the sharp
variations of the field, which has been illustrated in Figs. 5(a) with the choice of the time
step according to the variation of the boundary condition. This limitation comes indirectly
from the solution accuracy requirement. Comparing it to a scheme with a uniform grid (in
space), it might allow to reduce the CPU-time of the code by redistributing the nodes. On
the other hand, non-uniform grids might degrade the solution accuracy as illustrated in [14].
Non-uniform grids can be also combined with the Dufort–Frankel numerical scheme.
However, their implementation requires further development in order to not reduce the
order of accuracy, which is certainly an interesting theme for further investigation.
5.4. Further nonlinear case studies
Previous subsection illustrated the relevancy of using the explicit Dufort–Frankel scheme
to compute the solution of moisture transfer through porous material. The purpose is now
to explore the use of this numerical scheme for further case studies, typical cases of moisture transfer in building materials [12]. The length of the material is fixed to L = 0.1
m . The initial vapour pressure is P vi = 1.16 · 10 3 Pa , equivalent to a relative humidity
φ = 0.5. To test the robustness of the scheme, with strong nonlinearities, the properties
22 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
lef t
right
1.2
Φ (-)
1
0.8
0.6
0.4
0.2
0
0
20
40
60
t (h)
80
100
120
Figure 7. Boundary conditions.
1600
1550
Euler
Duf ort
mod. C rank
C rank
x = 0m
1500
1600
t = 40 h
1550
1500
1450
1400
P v (Pa)
P v (Pa)
1450
1350
1300
1510
t = 50 h
1400
1350
1300
t = 20 h
1500
1250
1250
1490
1200
1150
0
1200
1480
x = 0.1m
20
1470
40
40
45
60
t (h)
80
(a)
1150
50
100
120
0
Euler
Duf ort
mod. C rank
C rank
0.02
t = 10 h
0.04
0.06
x (m)
0.08
0.1
(b)
Figure 8. Vapour pressure time evolution at x ∈ {0, 0.1} m (a) and profiles for
t ∈ {10, 20, 40, 50} h (b).
of a load bearing material are taken from the HAMSTAD benchmark 4 [10] and are considered for both cases. For each one, the solution is compared to a sufficiently converged
solution obtained with an Euler explicit scheme. Dimensionless values for each case can
also be found in Appendix B.
23 / 34
Stable explicit schemes
Duf ort
mod. C rank
C rank
−3
ε (-)
10
−4
10
0
0.02
0.04
0.06
x (m)
0.08
0.1
Figure 9. L 2 error for a fixed ∆t = 6 · 10 −6 .
1
10
0
10
−1
CFL
ε (-)
10
−2
10
−3
10
Duf ort
Euler
C rank
O(∆t)
−4
10
−4
10
−3
10
−2
10
−1
10
0
10
∆t (-)
Figure 10. L 2 error (a) as a function of ∆t .
5.4.1 Driving rain case
The first additional case represents the increase of moisture in the material caused by
driving rain at one of the bounding surfaces. For this, at x = 0 m a moisture flux
g lL = 3.4 kg/m2 /s is imposed and there is no transfer with the ambient air. The relative
humidity of the ambient air varies according to a sinusoidal variation, with an amplitude of
24 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
1300
1600
Duf ort
mod. C rank
Ref.
1250
1400
P v (Pa)
P v (Pa)
1500
1300
1200
1150
Duf ort
mod. C rank
Ref.
1100
0
1200
20
40
60
t (h)
80
1100
0
100
(a)
5
10
t (h)
15
20
(b)
Figure 11. Comparison of reference solution and the one computed with
Dufort–Frankel and modified Crank–Nicolson schemes for ∆t = 10 −1 at
x = 0 m (a) and x = 0.1 m (b).
1
10
Error
∆t = 0.025
0
10
−1
ǫ (-)
10
−2
10
−3
10
−3
10
−2
10
∆t (-)
−1
10
Figure 12. Error due to time discretisation for the right boundary condition u R
(A = 0.8 and ω = 2π).
0.2, a frequency of 1h and a mean of 0.5, at x = 0.1 m. The convective vapour coefficient
equals 3 · 10−8 s/m and the final simulation time is 30 h.
25 / 34
Stable explicit schemes
5.4.2 Capillary adsorption case
This case simulates a capillary adsorption of the material. Thus, the left bounding
surface of the material is maintained at a saturated state (φ = 1). In such case, the
Robin type boundary condition Eq. (2.3) is modified in order to get a Dirichlet one:
P v = P vL .
Here, P vL = 2.33 · 10 3 Pa. The vapour pressure of the ambient air is maintained constant
at P vR = 1.16 · 10 3 Pa, at x = 0.1 m, with a convective vapour coefficient set to 3 · 10−8
s/m. The solution is computed for a final simulation time of 1 h.
5.4.3 Results and discussion
The discretisations used to compute the solution of both cases are ∆x = 0.01 and
∆t = 10−5 . The evolution of the vapour pressure at x = 0 m and x = 0.1 m is given in
Figure 13(a) for the driving rain benchmark. At x = 0 m, the vapour pressure increases
due to the constant rain flux g lL imposed at the surface. At x = 0.1 m, for t 6 5 h, the
vapour pressure varies according to the sinusoidal fluctuations of the boundary conditions.
Then, as the moisture from the rain flux has diffused through the material, the vapour
pressure starts increasing after t = 5 h. By t = 30 h, the whole material is saturated.
The vapour pressure profiles at different times are illustrated in Figure 13(b) for the
capillary adsorption benchmark. At x = 0 m, the vapour pressure is fixed to the saturation
state. The pressure diffuses in the material along the time until reaching the saturation
state in the whole material at t = 0.3 h. The dimensionless moisture transfer coefficient
⋆
dm
, represented in Figure 14, highlights the nonlinearities of the material properties. The
coefficient has O(103 ) orders of variation during the simulation.
The L 2 error has been computed between the numerical solution obtained with the
Dufort–Frankel scheme and the reference one for both cases and illustrated in Figure 15. The error is of the order O(10−6 ) and proves the high accuracy of the solution
computed with the explicit Dufort–Frankel scheme. Furthermore, the solution has
been computed using the standard Crank–Nicolson scheme, with a tolerance set to
ǫ 6 10 −2 · ∆t2 , and the CPU times of the schemes are given in Table 1. For both cases,
the algorithm using the Crank–Nicolson scheme requires around 5 sub-iterations per
time step to meet the tolerance. The Dufort–Frankel scheme computes the solution
almost ten time faster. These additional results enhance the relevance of using the explicit
Dufort–Frankel scheme to compute the solution of moisture transfer problems.
6. Conclusion
Most of the Numerical methods applied to mathematical models used in building physics
are commonly based on implicit schemes to compute the solution of diffusion problems. The
main advantage is due to the stability conditions for the choice of the time discretisation ∆t.
26 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
2600
2200
Euler
Duf ort
t = 0.3 h
2400
x = 0m
2200
2000
1800
P v (Pa)
P v (Pa)
2000
1600
1400
1800
1600
t = 0.1 h
1400
1200
1200
x = 0.1m
Euler
Duf ort
1000
0
10
20
1000
0
30
t = 0.01 h
0.02
t = 0.05 h
0.04
0.06
x (m)
t (h)
(a)
0.08
0.1
(b)
Figure 13. Vapour pressure time evolution for the driving rain benchmark (a)
and profiles for the capillary adsorption benchmark (b).
t ⋆ = 0.3
3
10
2
d ⋆m (-)
10
1
10
0
10
t ⋆ = 0.01
0
0.2
t ⋆ = 0.05
0.4
0.6
t ⋆ = 0.1
0.8
1
x ⋆ (-)
Figure 14. Profiles of the dimensionless moisture transfer coefficient d ⋆m for the
capillary adsorption benchmark.
However, implicit schemes require important sub-iterations when treating nonlinear problems. This work was therefore devoted to explore some improved schemes and more specifically, the Dufort–Frankel, the Crank–Nicolson and the hyperbolisation schemes.
The first one is first- or second-order accurate in space, depending on the choice of ∆t and
has the advantage of being unconditionally stable. The second one is also unconditionally
27 / 34
Stable explicit schemes
−4
10
Rain benchm.
C apillary adsorption benchm.
−5
ε (-)
10
−6
10
−7
10
0
0.02
0.04
0.06
x (m)
0.08
0.1
Figure 15. L 2 error for the driving rain and the capillary adsorption benchmarks.
Table 1. Computational time required for the numerical schemes.
Hygroscopic adsorption
Numerical Scheme
CPU time (s) Average number of iterations
Dufort–Frankel
87
0
modified Crank–Nicolson
190
0
Crank–Nicolson
550
3
Driving rain
Numerical Scheme
CPU time (s) Average number of iterations
Dufort–Frankel
284
0
Crank–Nicolson
2220
5
Capillary adsorption
Numerical Scheme
CPU time (s) Average number of iterations
Dufort–Frankel
180
0
Crank–Nicolson
1410
5
stable and second-order accurate in space and time. The latter is second-order accurate in
time and in space O(∆t2 ) and consistent with the hyperbolic diffusion equation.
The first case study considered a linear diffusive transfer through a porous material. The
Dufort–Frankel, Crank–Nicolson and hyperbolisation schemes were compared to
the classical Euler explicit scheme and to a reference solution obtained using Chebyshev
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
28 / 34
functions. Results have shown that the hyperbolisation scheme has a stability condition
higher than the standard CFL. The error of this scheme depends on parameter τ representing the amount of hyperbolicity added in the equation. An optimal choice seems to
be τ = ∆t . As expected, the Dufort–Frankel and Crank–Nicolson schemes are
unconditionally stable and enable to compute the solution for any choice of the time discretisation ∆t . In addition, for ∆t 6 10−3 , the error of the Dufort–Frankel scheme is
first-order accurate in time, and for ∆t > 10−3 second-order accurate in time. The first
∆x 2
conclusions revealed that for ∆t 6
, it is preferable to use the hyperbolisation scheme,
2ν
for its accuracy. For larger ∆t values, or for nonlinear cases, the Dufort–Frankel and
Crank–Nicolson schemes are preferable due to their stability.
The second case study focused on nonlinear transfer model, with material properties
strongly dependent on the vapour pressure field. The extension of the Dufort–Frankel and
Crank–Nicolson schemes were given specially to treat the nonlinearities of the problem.
A modified Crank–Nicolson was proposed in order to avoid sub-iterations at each time
step of the algorithm. Both Dufort–Frankel and modified Crank–Nicolson schemes
were used to compute the solution of the problem. Results have shown that the error is
proportional to O(∆t). The modified Crank–Nicolson is twice longer than the Dufort–
Frankel to compute the solution, due to the operations required to compute the implicit
and explicit parts of the scheme. The main advantages of the Dufort–Frankel schemes
is (i) to avoid sub-iterations to treat the nonlinearities, (ii) to compute explicitly the solution at each time step, (iii) the unconditionally stable property, as well as (iv) the ease
to be parallelised. Additional case-studies with stronger nonlinearities and sharper profiles
were analysed, enhancing the advantages of such approach. Attention should be paid for
every scheme unconditionally stable because the choice of the time discretisation ∆t is an
important issue to represent accurately the physical phenomena. As mentioned in [22]:
An inexperienced user often interprets this [the unconditionally stable property] to imply that a physically realistic solution will result no matter how
large is the time step, and such user is, therefore surprised to encounter oscillatory solutions. The ’stability’ in a mathematical sense simply ensures that
these oscillations will eventually die out, but it does not guarantee physically
plausible solutions.
Some examples of unrealistic solutions and some advices on the choice of ∆t, considering
the time variations of the boundary conditions, were provided in this study. Keeping this
in mind, the Dufort–Frankel scheme is a valuable option to compute the solution of
nonlinear problems of moisture diffusion in porous materials. Results are encouraging for
the use of this approach for treating problems of coupled heat and moisture transfer in
two- or three-dimensions and explore other methods such as proposed by Saulyev in [27]
to integrate parabolic equations.
29 / 34
Stable explicit schemes
Acknowledgements
The authors acknowledge the Brazilian Agencies CAPES of the Ministry of Education
and CNPQ of the Ministry of Science, Technology and Innovation, for the financial support.
Nomenclature
cm
g
hv
k
L
Pc
Ps
Pv
Rv
T
φ
ρ
Latin letters
moisture storage capacity
liquid flux
vapour convective transfer coefficient
permeability
length
capillary pressure
saturation pressure
vapour pressure
water gas constant
temperature
Greek letters
relative humidity
specific mass
[kg/m3 /Pa]
[kg/m2 /s]
[s/m]
[s]
[m]
[Pa]
[Pa]
[Pa]
[J/(kg · K)]
[K]
[−]
[kg/m3 ]
30 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
A. Stability analysis of the Dufort–Frankel scheme
The stability analysis is performed for the Initial Value Problem of the linear diffusion
equation:
∂u
∂ 2u
− ν
= 0,
x ∈ R,
∂t
∂x 2
The Dufort–Frankel numerical scheme yields to:
n
u j−1
− u jn−1 + u jn+1 + u nj+1
u jn+1 − u jn−1
= ν
,
2 ∆t
∆x 2
ν > 0.
j ∈ Z,
(A.1)
n > 0.
(A.2)
Using the von Neumann’s stability analysis [6], we seek for discrete plane wave solutions
of the form:
u nj = α u 0 e i j k ∆x ,
(A.3)
where k ∆x is the wave length (k > 1), u 0 is the initial wave amplitude (t = 0) and α
is the amplification factor between two successive time layers.
In general α = α( k ∆x ) and we shall compute this factor for the Dufort–Frankel scheme,
knowing that:
1 n
n
u jn+1 = α u jn ,
u jn−1 =
u ,
u j±1
= e ± i k ∆x u nj .
α j
Thus, Eq. (A.2) becomes:
1
1
α −
= µ 2 cos(σ) − α −
,
(A.4)
α
α
def
def 2 ν ∆t
.
∆x2
where σ := k ∆x and µ :=
α+
α−
Eq. (A.4) admits two roots:
p
1 − µ 2 sin 2 (σ)
µ cos(σ) +
,
=
1 + µ
p
µ cos(σ) −
1 − µ 2 sin 2 (σ)
=
,
1 + µ
In Figures 16(a) and 16(b), we show the dependence of the absolute value of the amplification factors α ± on cos(σ) for two fixed values of the parameter µ — one below
and one above the critical CFL value µ = 1 . It is important to notice that α ± 6 1
for all values of the parameter σ . It can be shown (see [24]) that this property holds for
all values of µ . This observation completes the proof of the unconditional stability of the
DF scheme. The Boundary Value Problem (BVP) for equation Eq. (A.1) was studied in
[30]. Namely, it was shown that the same conclusions on the unconditional stability of the
Dufort–Frankel scheme hold for BVP demonstrated that the boundary conditions are
appropriately discretised.
31 / 34
Stable explicit schemes
1
1
- -α 2 -
0.8
- -α 1 -
- -α 2 -
0.8
- -α-
0.6
- -α-
0.6
- -α 1 -
0.4
0.4
0.2
0.2
0
0
-1
-0.5
0
cos(σ)
0.5
1
-1
-0.5
(a)
0
cos(σ)
0.5
1
(b)
Figure 16. Amplification factors for the Dufort–Frankel scheme for
µ = 0.95 (a) and µ = 1.125 (b).
B. Dimensionless parameters
B.1. Case from Section 4
Problem (2.6) is considered with g l,⋆ L = g l,⋆ R = 0 . The dimensionless properties of
the material are equal to d ⋆m = 1 and c ⋆m = 8.6 . The final simulation time is fixed
to τ ⋆ = 120, while Biot numbers are Bi Lv = 101.5 and Bi R
v = 15.2 . The boundary
conditions are expressed as:
1
1
2π t ⋆
2π t ⋆
L ⋆
u (t ) = 1 +
+
,
sin
sin
2
24
2
4
2π t ⋆
4
R ⋆
.
sin
u (t ) = 1 +
5
12
B.2. Case from Section 5.3
The dimensionless properties of the materials are:
h
2 i
,
d ⋆m = 1 + 0.91 u + 600 · exp −10 u − 1.9
i
h
2
.
c ⋆m = 900 − 656 u + 104 · exp −5 u − 1.9
The Biot numbers are also assumed to be Bi Lv = 101.5 and Bi R
v = 15.2 . The ambient
water vapour pressure at the boundaries are different from the previous case study. At the
32 / 34
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
left boundary, u L has a fast drop until the saturation state u L = 2, ∀t ∈ 10, 40 and at
the right boundary, u R = 1 + 0.8 sin ( 2π t ⋆ ) .
B.3. Case from Section 5.4
For both case-studies, an analytic expression of the material properties has been fitted,
which dimensionless formulation is:
h
2 i
⋆
dm
= 0.85 u −0.71 + 900 exp −8 u − 2
,
h
2 i
⋆
2 −0.53
c m = 1.69 · 10 u
+ 3 exp −9 u − 1.3
.
The dimensionless parameters for the driving rain case (Section 5.4.1) are:
g l,⋆ L = 14.7 , Bi Lv = 0 , Bi R
u R = 1 + 0.4 sin 2 π t ⋆ , τ ⋆ = 30 ,
v = 15.2 ,
while, for the capillary adsorption case (Section 5.4.2), they are:
uL = 2 ,
Bi R
v = 15.2 ,
uR = 1 ,
τ ⋆ = 1.
References
[1] U. M. Ascher, S. J. Ruuth, and B. T. R. Wetton. Implicit-Explicit methods for timedependent partial differential equations. SIAM J. Numer. Anal., 32(3):797–823, 1995. 17
[2] B. Bauklimatik Dresden.
Simulation program for the calculation of coupled
heat, moisture, air, pollutant, and salt transport.
http://www.bauklimatikdresden.de/delphin/index.php?aLa=en, 2011. 5, 21
[3] J. Berger, S. Guernouti, M. Woloszyn, and C. Buhe. Factors governing the development of
moisture disorders for integration into building performance simulation. J. Building Eng.,
3:1–15, sep 2015. 5
[4] D. M. Burch. An Analysis of Moisture Accumulation in Walls Subjected to Hot and Humid
Climates. ASHRAE Transactions, 93(16):429–439, 1993. 5
[5] E. Cajori. Historical note on the Newton-Raphson method ofapproximation. Amer. Math.,
18:29–32, 1911. 17
[6] J. G. Charney, R. Fjörtoft, and J. Neumann. Numerical Integration of the Barotropic Vorticity Equation. Tellus, 2(4):237–254, nov 1950. 30
[7] B. N. Chetverushkin and A. V. Gulin. Explicit schemes and numerical simulation using
ultrahigh-performance computer systems. Doklady Mathematics, 86(2):681–683, sep 2012.
13, 20
[8] T. A. Driscoll, N. Hale, and L. N. Trefethen. Chebfun Guide. Pafnuty Publications, Oxford,
2014. 14
[9] I. Fraunhofer. Wufi. http://www.hoki.ibp.fhg.de/wufi/wufi_frame_e.html, 2005. 5, 21
[10] C.-E. Hagentoft, A. S. Kalagasidis, B. Adl-Zarrabi, S. Roels, J. Carmeliet, H. Hens,
J. Grunewald, M. Funk, R. Becker, D. Shamir, O. Adan, H. Brocken, K. Kumaran, and
R. Djebbar. Assessment Method of Numerical Prediction Models for Combined Heat, Air
Stable explicit schemes
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
33 / 34
and Moisture Transfer in Building Components: Benchmarks for One-dimensional Cases. J.
Building Phys., 27(4):327–352, apr 2004. 22
S. Y. Harris. Building Pathology: Deterioration, Diagnostics, and Intervention. Wiley, New
York, 2001. 5
H. Janssen. Simulation efficiency and accuracy of different moisture transfer potentials.
Journal of Building Performance Simulation, 7(5):379–389, sep 2014. 5, 6, 18, 20, 21
H. Janssen, B. Blocken, and J. Carmeliet. Conservative modelling of the moisture and heat
transfer in building components under atmospheric excitation. Int. J. Heat Mass Transfer,
50(5-6):1128–1140, mar 2007. 5
L. Jianchun, G. A. Pope, and K. Sepehrnoori. A high-resolution finite-difference scheme for
nonuniform grids. Appl. Math. Model., 19(3):162–172, mar 1995. 21
W. Kahan and J. Palmer. On a proposed floating-point standard. ACM SIGNUM Newsletter,
14(si-2):13–21, oct 1979. 7
A. S. Kalagasidis, P. Weitzmann, T. R. Nielsen, R. Peuhkuri, C.-E. Hagentoft, and C. Rode.
The International Building Physics Toolbox in Simulink. Energy and Buildings, 39(6):665–
674, jun 2007. 5
N. Mendes. Models for prediction of heat and moisture transfer through porous building
elements. PhD thesis, Federal University of Santa Catarina - UFSC, 1997. 5
N. Mendes and P. C. Philippi. A method for predicting heat and moisture transfer through
multilayered walls based on temperature and moisture content gradients. Int. J. Heat Mass
Transfer, 48(1):37–51, 2005. 5
N. Mendes, I. Ridley, R. Lamberts, P. C. Philippi, and K. Budag. Umidus: A PC program
for the Prediction of Heat and Mass Transfer in Porous Building Elements. In IBPSA 99,
pages 277–283, Japan, 1999. International Conference on Building Performance Simulation.
5
E. E. Myshetskaya and V. F. Tishkin. Estimates of the hyperbolization effect on the heat
equation. Comp. Math. Math. Phys., 55(8):1270–1275, aug 2015. 13
A. Nayfeh. Perturbation Methods. Wiley-VCH, New York, 1 edition, 2000. 7
S. V. Patankar. Numerical Heat Transfer and Fluid Flow. CRC Press, United States of
America, 1980. 28
J. Raphson. Analysis aequationum universalis seu adaequationes algebraicas resolvendas
methodus generalis, et expedita, ex nova infinitarum serierum doctrina deducta ac demonstrata. Microfilm copy: University Microfilms, Ann Arbor(MI), 1690. 17
R. D. Richtmyer and K. W. Morton. Difference Methods for Initial-Value Problems. Interscience Publishers, New York, 1967. 30
C. Rode and K. Grau. Whole Building Hygrothermal Simulation Model. ASHRAE Transactions, 109(1):572–582, 2003. 5
S. Rouchier, M. Woloszyn, G. Foray, and J.-J. Roux. Influence of concrete fracture on the
rain infiltration and thermal performance of building facades. Int. J. Heat Mass Transfer,
61:340–352, jun 2013. 5
V. K. Saulyev. Integration of parabolic equations by the grid method. Fizmatgiz, Moscow,
1960. 28
H.-J. Steeman, M. Van Belleghem, A. Janssens, and M. De Paepe. Coupled simulation
of heat and moisture transport in air and porous materials for the assessment of moisture
related damage. Building and Environment, 44(10):2176–2184, oct 2009. 5
S. Gasparin, J. Berger, D. Dutykh & N. Mendes
34 / 34
[29] F. Tariku, K. Kumaran, and P. Fazio. Transient model for coupled heat, air and moisture
transfer through multilayered porous media. Int. J. Heat Mass Transfer, 53(15-16):3035–
3044, jul 2010. 5
[30] P. J. Taylor. The stability of the Du Fort-Frankel method for the diffusion equation with
boundary conditions involving space derivatives. The Computer Journal, 13(1):92–97, jan
1970. 30
[31] M. T. van Genuchten. A comparison of numerical solutions of the one-dimensional unsaturated - saturated flow and mass transport equations. Adv. in Water Ressources, 5(1):47–55,
mar 1982. 5
[32] M. Woloszyn and C. Rode. Tools for performance simulation of heat, air and moisture
conditions of whole buildings. Building Simulation, 1(1):5–24, mar 2008. 5
S. Gasparin: Thermal Systems Laboratory, Mechanical Engineering Graduate Program, Pontifical Catholic University of Paraná, Rua Imaculada Conceição, 1155, CEP:
80215-901, Curitiba – Paraná, Brazil
E-mail address: [email protected]
URL: https://www.researchgate.net/profile/Suelen_Gasparin/
J. Berger: Thermal Systems Laboratory, Mechanical Engineering Graduate Program,
Pontifical Catholic University of Paraná, Rua Imaculada Conceição, 1155, CEP: 80215901, Curitiba – Paraná, Brazil
E-mail address: [email protected]
URL: https://www.researchgate.net/profile/Julien_Berger3/
D. Dutykh: LAMA, UMR 5127 CNRS, Université Savoie Mont Blanc, Campus Scientifique, 73376 Le Bourget-du-Lac Cedex, France
E-mail address: [email protected]
URL: http://www.denys-dutykh.com/
N. Mendes: Thermal Systems Laboratory, Mechanical Engineering Graduate Program, Pontifical Catholic University of Paraná, Rua Imaculada Conceição, 1155, CEP:
80215-901, Curitiba – Paraná, Brazil
E-mail address: [email protected]
URL: https://www.researchgate.net/profile/Nathan_Mendes/
| 5cs.CE
|
arXiv:1608.06012v1 [cs.PL] 21 Aug 2016
A Vision for Online Verification-Validation
Matthew A. Hammer
Bor-Yuh Evan Chang
David Van Horn
University of Colorado Boulder
[email protected]
University of Colorado Boulder
[email protected]
University of Maryland, College Park
[email protected]
Abstract
1
2
Today’s programmers face a false choice between creating software that is extensible and software that is correct. Specifically, dynamic languages permit software that
is richly extensible (via dynamic code loading, dynamic object extension, and various forms of reflection), and today’s
programmers exploit this flexibility to “bring their own language features” to enrich extensible languages (e.g., by using common JavaScript libraries). Meanwhile, such librarybased language extensions generally lack enforcement of
their abstractions, leading to programming errors that are
complex to avoid and predict.
To offer verification for this extensible world, we propose
online verification-validation (OVV), which consists of language and VM design that enables a “phaseless” approach to
program analysis, in contrast to the standard static-dynamic
phase distinction. Phaseless analysis freely interposes abstract interpretation with concrete execution, allowing analyses to use dynamic (concrete) information to prove universal
(abstract) properties about future execution.
In this paper, we present a conceptual overview of OVV
through a motivating example program that uses a hypothetical database library. We present a generic semantics for
OVV, and an extension to this semantics that offers a simple
gradual type system for the database library primitives. The
result of instantiating this gradual type system in an OVV
setting is a checker that can progressively type successive
continuations of the program until a continuation is fully
verified. To evaluate the proposed vision of OVV for this example, we implement the VM semantics (in Rust), and show
that this design permits progressive typing in this manner.
1.
let authors
let authorsUS
= openDb("authors.csv")
= filterDb(authors, (author) =>
author.citizenship === "US")
(a) Open a database with an implicit schema and filter the content.
name, citizenship, institution
Evan Chang, US, University of Colorado
Roly Perera, UK, University of Glasgow
Matthew Hammer, US, University of Colorado
David Van Horn, US, University of Maryland
(b) File authors.csv, example content.
Figure 1. Programming with dynamically-determined tables and objects in JavaScript
of field value—see Figure 1b for example content. In line 1
of Figure 1a, the programmer filters the author list down
to those that have US citizenship using the field projection
author.citizenship.
Suppose the programmer merely wants to know that
their code will not access undefined fields—-that, in this
respect, the program is well-typed. Given that these object fields are defined by the dynamic-generation of data
structures via openDb, the validity of this field projection
author.citizenship is generally unknowable until after line 1
when the structure of the authors table is defined based on
the contents of authors.csv. At the same time, this field projection is clearly valid because of the special first line in
specifically this authors.csv shown in Figure 1b.
There is a tension here between static and dynamic checking. On one hand, once the authors table has been determined, the programmer would like the field projections from
the rows to be statically verified. But on other hand, how
would static checking be feasible if the schema of authors
database is dynamically-determined—what would be the
type of the openDb function?
To resolve this tension, our key insight is to imagine
pausing the concrete execution of Figure 1a right after line 1
and before line 2. Then, imagine reflecting the continuation
of the program’s execution to apply abstract interpretation or
other static techniques to prove the validity of all subsequent
field projections on the rows of the authors table.
Our vision centers around a new paradigm for verification and validation that we call online verification-validation
Introduction
We consider the problem of typing unknown, dynamicallydetermined data obtained from the environment. To illustrate
what we mean by unknown, dynamically-determined data,
consider the code in Figure 1a that loads a comma-separated
value (CSV) file authors.csv using the openDb("authors.csv")
call on line 1. The contents of this file are organized into
lines, where each line is a row of field values. The first line
of the file is special and contains a list of field names instead
1
2016/8/23
(OVV). In contrast to today’s phasic analysis techniques,
OVV is phaseless: “static” analysis is freely interposed
with “dynamic” execution. By virtue of this mixed approach, OVV transcends the conventional phase distinctions
of “static” and “dynamic” analysis. To avoid confusion in
this phaseless setting, we refer to static analysis techniques
as those for ∀-analysis, since they demonstrate universal
properties of future program’s states. Likewise, we refer
to the techniques used in dynamic analysis as those for ∃analysis, since they demonstrate existential properties about
the past program’s states.
In this paper, we make the following contributions:
1
2
3
4
let authors
let authorsUS
= openDb("authors.csv")
= filterDb(authors, (author) =>
author.citizenship === "US")
let books
= openDb("books.csv")
let authbooksUS = joinDb(authorsUS, "name",
books, "author")
(a) The joinDb(db1,key1,db2,key2) library function accesses the key
fields using run-time reflection (e.g., db1[i][key1]).
author, title, year, publisher
...
(b) File books.csv, example content.
Figure 2. Continuing the example from Figure 1a with subsequent dynamically-determined data.
• We define λ-VMF, an abstract machine semantics that
enables a form of phaseless, online verification-validation
(Section 3). The key idea is annotating potentially faulting operations (e.g., field projection) with a certain (!) or
uncertain (?) flag, indicating whether or not that operation can be verified. Executing uncertain operations gets
stuck, so it is up to the OVV program to progressively
rewrite uncertain operations into certain ones by proving
the safety of the potentially faulting operation.
State
State Set
Dynamic / Concrete
Initial state
• We present a case study of instantiating online verifica-
tion-validation with a simple, bidirectional gradual type
system for dynamic field projection and databases with
dynamic schemas (Section 4). The result of instantiating
a gradual type system in an online verification-validation
setting is a checker that can progressively type successive
continuations of the program until a continuation is fully
verified (i.e., “statically” typed).
Line 1
Line 2
2
3
4
1
e
e
ne ine
in Lin
Li
L
Static Phase L
Initial
States
Line 3
Dynamic Phase
Line 4
(a) Phaseless, online verificationvalidation.
Initial
State
(b) Phasic, offline verification and
online validation.
Figure 3. Typical type checkers are phasic with an offline
static verifier and an online dynamic validator.
steps that compute over previously-defined data types (the
filtering and joining steps in lines 2 and 4).
• We implement the proposed design for λ-VMF in Rust
Phaseless Analysis. The essence of online verificationvalidation is pausing concrete execution to interleave it with
abstract interpretation. Pictorially, this interleaving of concrete and abstract execution can be visualized as a twodimensional grid, as in Figure 3a. The vertical axis represents the extent of concrete execution and dynamic, ∃analysis (measured by program line), and for each such
point, the horizontal axis represents the extent of abstract interpretation and static, ∀-analysis performed at this dynamic
execution point. As shown, abstract interpretation explores
the states after lines 2–4 after pausing at line 1, but revisits
the state after line 4 again after pausing at line 3. That is, we
imagine suspending the concrete execution of the program in
Figure 2a after the openDb call on line 1 and then interpreting
the continuation to statically compute, under an abstraction,
the set of reachable future states from this suspended current
state (the horizontal axis).
This online look-ahead would permit us to check the
projections of author.citizenship and db1[i]["name"] (on
lines 2 and 4, respectively) before the running program executes them concretely. However, the other projection in the
joinDb call on line 4—the projection of the author field (i.e.,
db2[j]["author"])—cannot be proven valid in this continua-
to demonstrate that the proposed instantiation of OVV
indeed realizes progressive typing. Our implementation
is public: https://github.com/cuplv/vmfuture.
In the next section, we dig deeper into what we term
online verification-validation by following the progressive
typing of the example program from Figure 1a.
2.
Static / Abstract
2
3
4
1
ne
ne ine
Li
Li
L
Li
ne
Overview
In Figure 2a, consider an extension of the example from
Figure 1a with two additional lines. The file books.csv is
opened on line 3 and contains a CSV file with book information (shown in Figure 2b). The final line (line 4) creates a
table of books written by US authors, along with the information about those authors.
Observe that this code alternates between dynamically
determining the types of the rows and tables (by reading the
two files authors.csv and books.csv on lines 1 and 3) and
computing over those tables (on lines 2 and 4). This example is a simple version of a pervasive pattern in dynamic languages, where execution interleaves dynamic steps that create new data types (the tables loaded in lines 1 and 3) and
2
2016/8/23
tion because the books.csv database has not yet been loaded.
But imagine similarly suspending the concrete execution
again after line 3 (shown as the bottom horizontal execution
in Figure 3a). Now in this continuation, an abstract interpretation can easily verify this last remaining projection on all
future concrete executions from this point.
For exposition, this example is short, and the distance between the concrete points for static checks and the future
concrete points of potential failure (a bad projection) are
tiny: they only consist of one or two lines. In the general
case, however, the distance between these points can be arbitrarily large. For instance, a long-running scientific workload may last days or weeks, and in these cases, it is critical
to know about possible future execution failures as soon as
possible, to minimize interruption due to programming errors.
1
2
3
4
function openDb(file) {
var table = openDbInternal(file)
{{ reflect/cc (chk_state, return table) }}
}
Figure 4. The openDb library function synthesizes a type for
the loaded table before returning via reflect/cc.
Online Verification-Validation. OVV programs consist of
two stratified layers that interact during execution. First, the
object layer expresses ordinary execution. Execution can escape into the meta layer, which is capable of inspecting the
run-time representation of the object layer. Code at the meta
layer expresses ∀-analysis and ∃-analysis over object programs. During ordinary execution, the meta layer plays a
passive role until special primitives transfer control. In particular, reflect/cc transfers control, along with a reflected
view of the current (object layer) continuation. Further, the
meta layer has access to read and write hidden annotations
on object layer values (e.g., to store program facts, such as
types). Collectively, these hidden annotations can be viewed
as providing a “shadow heap” for tracking dynamic, metalevel information, in the service of performing ∃-analyses.
For maximum extensibility, the object layer lacks a static
type system, relying on checking at the other layer. For convenience in expressing analysis over object programs, the
meta layer may employ a language that employs a static type
system (a la ML), but this is not a requirement. For concreteness in presentation, we use JavaScript syntax for object layer code and Rust-like syntax for meta layer code, and
we may consider language choice as an orthogonal concern.
Related Work: Traditional Analyses are Phasic. Typical,
existing program analyses impose phase distinctions between static and dynamic steps, forcing each phase to use
one approach or the other. At one extreme, today’s techniques for static verification explore all possible execution
paths, but have no knowledge of the dynamic execution environment. At the other extreme, dynamic validation explores
one path of execution: the path determined by concrete execution.
Type system design is, in general, a tradeoff in checking
in an offline, static phase (e.g., are function application expressions well-typed?) and checking in the online, dynamic
phase (e.g., is an array-index in bounds?). We illustrate this
phasic architecture in Figure 3b where the static and dynamic phases are sequenced and independent.
Some techniques attempt to “blend” these static and dynamic phases, so that information gleaned from one phase
feeds into the other. For instance, gradual typing [35, 36] enables shifting type checking between the static and dynamic
phases. Or, the notion of using a set of dynamic runs to glean
information before static verification appears several times
in the literature for call resolution [15], reflection instantiation [9] and for eval [20, 40]. We consider such techniques
phasic if there is some sequencing (rather than interleaving)
of static, ∀-analysis and dynamic, ∃-analysis phases.
While phasic analyses dominate the literature, there exist
some non-phasic analysis techniques, such as the “proofsfrom-tests” approach [6], that mix ∃-analysis information
during ∀-analysis (e.g., via directed-random automated testing [22]). In these works, the goal is to perform offline static
verification whose abstraction selection leverages ∃-analysis
information from testing. This is distinct from our vision,
where concrete execution is interposed with analyses (not
vice versa). However, this work shares our concern with incremental exploration of a state space, and it possible that
our proposed incremental substrate would also be beneficial
in the context of “proofs-from-tests.”
reflect/cc. The implementor of openDb uses reflect/cc to
mediate between concrete execution in the object layer,
and interposed code in the meta layer that performs online ∀-analysis (shown in Figure 4). First, openDb uses
openDbInternal to load the given file and construct a table
from its CSV content (line 2). Next, line 3 uses reflect/cc
to invoke the meta-level function chk_state, which determines types for the table’s content (failing with an error
if this content is malformed). As a side effect, it writes to a
meta layer field on the table variable to record the type of the
rows of the table so that it can be consumed in a subsequent
meta layer execution. In particular, the reflect/cc primitive
pauses the execution of the object program, giving control
to a meta language function, here chk_state. Before transferring control, the primitive reflects the current continuation as
a first-class data structure and uses it as an argument to the
given meta language code, here chk_state, as we illustrate in
Figure 5.
By using this reflected structure, the meta language code
can perform arbitrarily complex ∀-analysis. When it finishes,
it returns control to the object program by returning a transformed program state. In this case, openDb uses chk_stk to
type-check the program’s continuation at each call, given
3
2016/8/23
State
State Set
Object Language
reflect/cc
(either ∀-analysis or ∃-analysis). In particular, meta layer
function chk_stk performs a ∀-analysis (type-inference and
checking), and uses these universal program facts to improve
the efficiency of ∃-analyses that will occur in the future.
At a high level, chk_stk traverses the frames of a VM
stack (from top to bottom), and checks whether the form of
the frame is consistent with the given computation type ct.
There are three cases to consider, depending on whether the
stack is empty (Halt), or has a top-most frame for a let
binding or function application.
The computation type Ret(vt) indicates that the local continuation will return a value of type vt, and that the stack
should contain a let body that is expecting to bind this value.
The frame FrLet(env,x,e) consists of a saved VM environment env (mapping local variables to values), a variable to
let-bind x, and a body e in which the variable is scoped. To
check this case, the code first attempts to synthesize a typing environment from env; if this fails, the stack does not
check, and verification fails. Otherwise, the meta-level function syn_tenv synthesizes a typing environment and returns
an annotated version of the given environment, env2. Next,
the case attempts to synthesize a type et for the let body, e.
When successful, synthesis produces a type et and an annotated term e. Finally, the case checks the recursive structure
of the stack; when successful, it returns a transformed stack,
whose environments, terms and values are annotated.
The computation type Arr(vt,ct2) indicates that the local continuation is a function abstraction that will consume
a value of type vt, and that the stack should contain an argument value with this type. Similar to above, the case checks
the value has the correct type vt, and checks the stack recursively; when successful, it returns a transformed (annotated)
stack.
Meta Language
2
3
4
1
e
ne
ne ine
n
Li
Li
L
Li
Line 1
Line 2
1
2
3
4
Line 3
Line 4
(a) The transfer of control moves
from the object program to the meta
program via reflect/cc.
let
let
let
let
...
...
...
...
=
=
=
=
openDb(. . .)
filterDb(. . .)
openDb(. . .)
joinDb(. . .)
(b) Sketch of the example code
from Figure 2a.
Figure 5. Illustrating online verification-validation.
enum Stk {
Halt,
FrLet(Env,Var,Exp,Stk),
FrApp(Val,Stk)
}
enum CTyp {
Ret(VTyp),
Arr(VTyp, CTyp)
}
meta chk_stk (st:StTyp, stk:Stk, ct:CTyp) -> Option<Stk>
{ match (ct, stk) {
_,
Halt => Some(stk),
Ret(vt), FrLet(env, x, e, stk2) =>
{ match syn_tenv(st, env) { None => None,
Some(tenv,env2) =>
{ let tenv = tenv_ext(tenv, x, vt) ;
match syn_exp(st, tenv, e) { None => None,
Some(et, e2) =>
{ match chk_stack (st, stk2, et) { None => None,
Some(stk3) => Some(FrLet(env2, x, e2, stk3))
}}
}}
}}
Arr(vt,ct), FrApp(v,stk2) => {
match ( check_value(st, emp, v, vt),
check_stack(st, stk2, c) ) {
(Some(v3), Some(stk3)) => Some(App(v3,stk3)),
_
=> None,
}}
}}
Defining and using OVV. Below, Section 3 defines the
syntax and dynamic semantics of λ-VMF in detail; building
on these definitions, Section 4 revisits the algorithm shown
in Figure 6, showing it in the context of a larger system for
gradually-typing programs that compute with databases, like
the one shown in Figure 5.
Figure 6. Type checking continuations.
the type of the loaded table. Based on this type information,
openDb either signals errors (if there is a type error), or transforms future validation checks (if type analysis succeeds in
proving that these validation checks are redundant).
3.
OVV Machine Semantics
We present λ-VMF, an abstract machine semantics for
libraries and programs that employ OVV. In Section 4, we
instantiate this OVV framework with a gradual type system
for checking programs that compute with simple databases.
The Meta Program Expresses Online Meta Theory. Figure 6 lists the meta-layer function chk_stk, which checks a
VM stack against a store typing and computation type. We
adopt Rust-like syntax (a recent dialect of ML). In particular,
this meta-level code interacts with the store typing, stack and
computation types as values, as if they are persistent (purely
functional, applicative) inductively-defined structures, a la
ordinary ML. (The top of Figure 6 defines these structures
in Rust-like syntax). Because the meta layer has meta-level
access to the semantic structures of the object layer, it is
sufficiently powerful to compute meta-theoretical properties
Program Syntax. Figure 7 gives the syntax for λ-VMF
programs. To streamline the definition of analyses and dynamic interpretation, λ-VMF syntactically separates program structure into expressions e and values v . Further, to
permit a meta-layer, extension-defined analysis to annotate
λ-VMF programs (as illustrated in Section 4), the recursive
syntax of expressions and values consists of annotated preexpressions ė and annotated pre-values v̇, respectively. The
4
2016/8/23
operational semantics of λ-VMF programs, defined below,
does not directly depend on these annotations. However, an
extension may use its annotations to prove properties that
verify sound online program transformations. In these cases,
the annotations can indirectly impact program behavior, i.e.,
by aiding a meta-level program transformation.
Pre-values consist of open and closed thunks, which represent suspended expressions, including all higher-order
data (othunk e and thunk ρ e); closed thunks employ a
closing environment ρ that maps the free variables of e to
(closed) values. Base types consist of numbers (num n),
strings (str s), boolean bits (bool b) and reference cells (loc `).
Dictionaries map values to values (dict δ), modeling a row
of a database, or a record, where the typical notion of a field
name is generalized to any value in λ-VMF.
Pre-expressions consist of forcing a suspended expression (force v ), function abstraction (λx.e), function application (e v ), let-binding a returned value (let x = e1 in e2 ),
returning a value (ret v ), allocating, mutating and accessing mutable storage (ref v , set v1 v2 , get v , respectively),
updating the field of a record (ext v1 v2 v3 ), projecting the
field of a record (v1 [v2 ]aop ).
Finally, λ-VMF includes special forms for ascribing a
sub-expression with a manual annotation (e ?: ae ), and reflectively inspecting (and transforming) the current continuation via reflect/cc as core primitive, rcc em e. Notably,
execution pauses before executing the local continuation e,
and a common idiom consists of using a manual ascription
there, to be discharged via the use of rcc.
As explained below, using rcc to prove and discharge ascriptions is actually necessary in λ-VMF, since they have
no other form of dynamic semantics. For this purpose,
the meta-level program em transforms the program state before its continuation resumes. We do not model the modellevel programming language here; our current implementation uses Rust.
VM State syntax. Figure 8 defines the global state of the
λ-VMF program: It consists of a store, mapping locations to
mutable values (µ); a stack of evaluation context frames (κ),
an environment mapping variables to values (ρ), and a preexpression ė that gives the current local continuation. Nonempty stacks give evaluation contexts for let bodies (κ ::
(ρ, x.e)) and function application (κ :: v ).
v ::= v̇ @: av
v̇ ::= othunk e
| thunk ρ e
| dict δ
| num n
| str s
| bool b
| loc `
| ()
|x
δ ::= ε | δ, v1 7→ v2
Value
Pre-Val.
Dict.
e ::= ė @: ae
ė ::= force v
| λx.e
|ev
| let x = e1 in e2
| ret v
| ref v
| set v1 v2
| get v
| ext v1 v2 v3
| v1 [v2 ]aop
| e ?: ae
| rcc em e
aop ::= ? | !
av ::= · · ·
ae ::= · · ·
em ::= · · ·
Expr.
Pre-Expr.
Annot.
Meta Expr.
Annotated pre-value
Open thunk
Closed thunk
Dictionary
Number
String
Boolean
Store location
Unit value
Value variable
Dictionaries of values
Annotated pre-expression
Unsuspend (force) thunk
Function abstraction
Function application
Bind computed value
Produce a value
Allocate store reference
Store mutation
Store projection
Dictionary extension
Dictionary projection
Annotation ascription
Reflect current continuation
Uncertain vs. certain
Value annotation
Expression annotation
Meta-level programs
Figure 7. Syntax of λ-VMF Programs
State
Store
Stack
Environment
σ ::= hµ; κ; ρ; ėi
µ ::= ε | µ, ` 7→ v
κ ::= halt
| κ :: (ρ, x.e)
| κ :: v
ρ ::= ε | ρ, x 7→ v
Maps locations to values
Empty stack
Waiting for return
Fun. application argument
Maps variables to values
Figure 8. VM State: The store, stack and environment.
a (possibly empty) dictionary; and dictionary projection selects a given field’s associated value, returning it.
What makes λ-VMF particularly interesting is that there
are no stepping rules for ?-mode field projection or for ascription. To avoid getting stuck at these operations, these operations should be either verified progressively or validated,
perhaps immediately before executing, when all relevant information is available. To do so, the program uses rcc em e,
which runs the meta-level program em on a reflected version of the current VM state: the rule constructs the current
continuation, reflects this program state into a data structure, runs the meta-level term em , and then injects the resulting program state into a transformed continuation σ 0 . In
OVV, this step sometimes verifies and validates operations
before the program attempts to execute them, transforming
Dynamics of λ-VMF Programs. Figure 9 defines a smallstep operational semantics over λ-VMF states. The rules for
let and function application each push the stack with a frame
that is eliminated by the rules for ret and function abstraction, respectively. In both cases, eliminating the frame consists of binding a value to a variable, and continuing the program. Forcing a thunk consists of unpacking its environment
and expression, and continuing execution with them. Rules
for allocating, mutating and accessing a reference cell in the
store are each standard. Dictionary extension adds a field to
5
2016/8/23
σ −→ σ 0 λ-VMF state σ steps to state σ0 .
hµ; κ; ρ
hµ; κ; ρ
hµ; κ :: (ρ, x.(ė @: )); ρ0
hµ; κ :: v ; ρ
hµ; κ; ρ
hµ; κ; ρ
hµ; κ; ρ
hµ, ` 7→ v2 ; κ; ρ
hµ; κ; ρ
hµ; κ; ρ
let x = (ė1 @: ) in e2 i
(ė @: ) v i
ret v i
λx.(ė @: )i
force v i
ref v i
set v1 v2 i
get v1 i
ext v1 v2 v3 i
v1 [v2 ]!
−→
−→
−→
−→
−→
−→
−→
−→
−→
−→
hµ; κ :: (ρ, x.e2 ); ρ; ė1 i
hµ; κ :: ρ(v ); ρ; ėi
hµ; κ; ρ, x 7→ ρ(v ); ėi
hµ; κ; ρ, x 7→ v ; ėi
hµ; κ; ρ0 ; ėi
hµ, ` 7→ v ; κ; ρ; ret (loc ` @: ?)i
hµ, ` 7→ ρ(v2 ); κ; ρ; ret (() @: ?)i
hµ, ` 7→ v2 ; κ; ρ; ret v2 i
hµ; κ; ρ; ret (dict (δ, ρ(v2 ) 7→ ρ(v3 )) @: ?)i
hµ; κ; ρ; ret v3 i
hµ; κ; ρ
hµ; κ; ρ
v1 [v2 ]?
e ?: ae i
no stepping rule
no stepping rule
hµ; κ; ρ
rcc em (ė @: )i
−→
σ0
when
when
when
when
when
when
ρ(v ) = (thunk ρ0 (ė @: ) @: )
` 6∈ µ
ρ(v1 ) = (loc ` @: )
ρ(v1 ) = (loc ` @: )
ρ(v1 ) = (dict δ @: )
ρ(v1 ) = (dict (δ, ρ(v2 ) 7→ v3 ) @: )
when
em ([[hµ; κ; ρ; ėi]]) ⇓meta [[σ 0 ]]
Figure 9. Small-step, abstract machine semantics of λ-VMF
e ::= · · ·
| openDbaop v
| filterDbaop v1 v2
| joinDbaop v1 v2 v3 v4
Existing forms (Figure 7)
Open database by file path
Filter DB by predicate
Join DBs using keys’ value
Annotations
Value Types
Figure 10. Database Library Forms
the program to remove or modify them. In contrast to traditional phasic static verification or dynamic validation (cf.
Figure 3b), this step does not need to be either eagerly before the entire execution or lazily just before the potentially
faulting operation. By choosing the placement of rcc, the
program can choose how eager or lazy the checking should
be anywhere between these two extremes. We give a detailed
example below.
4.
Dictionary
Computation
Types
av ::= A
ae ::= C
A, B ::= U C
| Dict ∆
| Num
| Str
| Bool
| Ref A
|1
|?
| Db A
∆ ::=
Value annotation
Expression annotation
Thunked computation
Dictionary
Number
String
Boolean
Reference cell
Unit
Unknown value type
Database; multiset of As
ε | ∆, v 7→ A Maps values to types
C , D ::= A → C
| FA
Function abstraction
Value production
Figure 11. Type Syntax: Annotations for Values and Expressions
Gradual Typing for Simple Databases
Types for λ-VMF and libDb. Figure 11 instantiates the
λ-VMF framework for a gradual type system. This system has (bidirectional, algorithmic) rules to reason about
λ-VMF code as well as the libDb extension. Value types
consist of types for thunked computations (U C ) 1 , dictionaries (Dict ∆, where ∆ maps field values to field types),
numbers (Num), strings (Str), booleans (Bool), reference cells (Ref A), unit (1), unknown (?) and databases
(Db A). Computation types consist of the arrow type for
functions (A → C ) and value types for value-producing
computations (F A).
In this section we present a gradual type system for λVMF and libDb, an extension that permits us to express the
motivating example from Figure 2a. We tour the type system
and illustrate how OVV progressively types and validates the
operations in this example.
Syntax for libDb. Figure 10 extends the syntax from Figure 7 with the three operations implemented by libDb, for
opening databases, filtering them with a predicate, and joining them using named fields. Each operation is parameterized by one or more argument values, and an operation annotation aop that determines how to type operation. As with
record field projection, this annotation determines whether
the operation’s pre-conditions for success have been fully
verified via OVV. The gradual type system for libDb presented here uses different rules for certain (!) versus uncertain (?) reasoning modes.
Typing λ-VMF program states. Figure 12 lists typing
judgement forms for λ-VMF program states and for stacks.
1
We follow conventions from the literature on call-by-push-value (CBPV)
in our type syntax for thunked and value-returning computations, which
uses special letters U and F, respectively [29, 30].
6
2016/8/23
hold, in the case of true, we also construct an annotated
term, possibly with transformations (e.g., changing operation annotations from uncertain ? to certain !).
|µ| ` ρ ⇒ Γ
|µ| , Γ ` ė ⇒ C
|µ| ` κ ⇐ C
state
For instance, we implement the type relation for program
hµ; κ; ρ; ėi ok
states as a total function from program states to (optional)
Γ ` κ ⇐ C Under Γ, stack κ eliminates a computation of type C . program states with annotations; and when the algorithm
fails, it returns None: Furthermore, this algorithm plays the
role of em in libDb’s use of rcc em e.
Γ1 ` ρ ⇒ Γ2
The ability to phrase the typing relations as functional alΓ2 , x : A ` e ⇒ C
Γ1 ` κ ⇐ C
gorithms stems the fact that the rules treat certain positions
k-emp
k-let
of their (bidirectional) relations consistently as inputs and
Γ ` halt ⇐ C
Γ1 ` κ :: (ρ, x.e) ⇐ F A
outputs, and that outputs are determined functionally from
Γ`v ⇐A
inputs. As an example, Figure 6 gives the algorithmic verΓ`κ⇐C
sion of the stack-checking relation Γ ` κ ⇐ C , which rek-app
Γ ` κ :: v ⇐ A → C
sembles an ordinary function in ML. The remainder of the
rules transform in a similar manner, so that checking relations produce an optional, annotated term structure, while
Figure 12. Stack typing and State typing
synthesizing relations produce an optional pair of annotated
term structure and synthesized type. When these functions
produce None, the corresponding typing relation is not derivTo type a program state, we assume that the stored values
able. The dynamic semantics of λ-VMF do not permit exeare annotated, and we use these annotations as a store typcution to continue when this occurs.
ing, written |µ|, which maps reference locations to values
types. To type a program state, we assume this store typTyping core λ-VMF terms bidirectionally. For simplicity,
ing |µ| and attempt to verify the the other VM machinery,
we use a bidirectional type system to encode the gradual type
consisting of the current environment ρ, program term ė,
systems of the λ-VMF core calculus and its libDb extension.
and stack κ. Three judgements compute type properties for
Figure 13 defines type checking (above) and synthesis (bethese components: Assuming a store typing Γ, the judgelow) for program terms. For space reasons, we elide some
0
ment Γ ` ρ ⇒ Γ computes from an environment (mapsynthesis cases, as well as the checking and synthesis judge0
ping variables to values), a typing context Γ (mapping variments for value forms; the rules shown give a representative
ables to types). Assuming a typing context Γ, the judgement
flavor for the complete definition.
Γ ` e ⇒ C computes a type from a term e. Assuming
The analytical (checking) judgement form Γ ` e ⇐ C
a typing context Γ and computation type C for a terminal
can
be read as, “Under typing context Γ, term e checks
computation, the judgement Γ ` κ ⇐ C checks that the
against
computation type C .” Specifically, the type C is
stack κ either correctly continues execution or halts.
given
as
an input to the checking judgement, when viewed as
The remainder of the figure gives three rules for typean
algorithm.
The synthesizing judgement form Γ ` e ⇒ C
checking the stack. First, k-emp says that halting stacks are
can
be
read
as,
“the typing context Γ and term e synthesize
always permitted. Next, k-let and k-app handle the recursive
the
computation
type C .” Specifically, the algorithm comcases of the stack, where the topmost frame can be viewed as
putes
the
type
C
,
when given Γ and e. For the core forms
eliminating the terminal computation type, call it D. In the
of
λ-VMF,
the
bidirectional
rules for values and computacase of k-let, we have that D is F A, which types the terminal
tions
follow
the
usual
patterns
found in bidirectional type
computation that returns a value of type A; we check that the
systems
[10,
16].
We
show
several
standard-looking rules,
top of the stack holds the body of the let, which can use the
sub,
lam,
app
and
annot.
In
particular,
the annotation form of
let-bound variable (of type A), for which we can synthesize
e
λ-VMF,
e
?:
a
,
which
asserts
the
annotation
ae correctly
another computation type C that checks against the rest of
describes the program e, plays the role of type ascription
the stack. In the case of k-app, we have that D is A → C ,
in the bidirectional rules; the annot rule says that terms are
the type of a function abstraction; we check that the top of
checked against their type annotations, and these annotated
the stack is an argument value of type A, and the rest of the
terms synthesize the annotation type. Because it has no dystack checks against the type of the abstraction’s body, C .
namic semantics, λ-VMF uses OVV to prove and discharge
Transforming λ-VMF program states. Though the gradthis form earlier by rewriting it to e sometime before evalual type system defined here is stated propositionally, it conuation; if this rewrite fails, then the program terminates (by
stitutes an algorithm, and we demonstrate this fact by implefailing) early, as a result of OVV failing, not execution.
menting these relational definitions as a (mutually) recursive
As is customary in bidirectional systems, type annotatotal functions. However, instead of merely returning true
tions mediate between synthesizing and checking. This proor false to indicate the success or failure of the relation to
vides one the ability to place checking-only terms (such as
σ ok State σ is well-typed.
7
2016/8/23
lambda abstractions) in positions that require the sub-term
synthesize a type (such as the abstraction position of an application). See typing rules lam and app, respectively, to see
the details; both are standard. Finally, as is customary, type
subsumption allows less specific types to check against terms
that synthesize more specific types. Rule sub uses a definition of type consistency (written C ≈? D), which behaves
like type equality, modulo the uncertain type ?, which is
consistent with all other types. This notion of consistency
is standard in some gradual typing literature [35].
Γ ` e ⇐ C Under Γ, expression e checks against type C .
Γ`e⇒C
C ≈? D
Γ`e⇐D
Γ, x : A ` e ⇐ C
sub
Γ ` λx.e ⇐ A → C
lam
Γ ` e ⇒ C Under Γ, expression e synthesizes type C .
Γ`e⇐C
Γ ` e ?: C ⇒ C
Γ ` v1 ⇒ ?
Γ ` v2 ⇒ B
Γ ` v1 [v2 ]? ⇒ F ?
Γ`e⇒A→C
Γ`v ⇐A
annot
p?
Γ`ev ⇒C
Γ ` v1 ⇒ Dict (∆, v2 7→ A)
Γ ` v2 ⇒ B
Γ ` v1 [v2 ]! ⇒ F A
Γ ` v ⇒ Str
Γ ` openDb? v ⇒ F (Db ?)
Gradual typing for dictionary projection. The typing rules
for uncertain and certain projection differ in what is known
about the record and field values, and illustrate a form of
gradual typing. In the uncertain case, rule p? synthesizes
return type ?, since nothing is known about the dictionary
of values being projected. By contrast, in the certain case,
the dictionary type is known to rule p!, and this dictionary
maps the given field value to a corresponding field type. In
this case, the soundness of the type system means that the
projection must succeed in all possible future program states,
and moreover, that the projected value has the given type.
p!
openDb?
Γ ` v1 ⇒ Db ?
Γ ` v2 ⇐ U (? → F Bool)
Γ ` filterDb? v1 v2 ⇒ F (Db ?)
Γ ` v1 ⇒ Db A
?∈
/A
Γ ` v2 ⇐ U (A → F Bool)
Γ ` filterDb! v1 v2 ⇒ F (Db A)
Γ ` v1 ⇒ Db ?
Γ ` v3 ⇒ Db ?
app
filterDb?
Typing the libDb operations. The rule openDb? is uncertain and has no certain counterpart: The type of the database
is not known until after the operation completes, just before execution resumes with its continuation; before then,
the database could hold any type, so the rule types the returned database as Db ?.
Following similar reasoning, since filtering and joining
databases occur after a database is loaded, it is possible to
type these operations in both uncertain and certain modes.
The rule filterDb? says that filtering a database of uncertain
values leads to another database of values with an uncertain
type; since it merely assumes the type of the database is ?,
it does not prove that the predicate will not “go wrong”,
e.g., by projecting the wrong field from its argument. By
contrast, the rule filterDb! says that filtering a database of
known type using a predicate that checks against this type
leads to a database with the same known type; in this case,
the soundness of the type system means that the predicate
must always succeed.
Similarly, the rules for joinDb? and joinDb! follow the
pattern set above: the uncertain rule assumes nothing about
the argument values, beyond the arguments actually consisting of databases. The certain rule assumes that the database
arguments’ types are fully known, that the chosen field values are mapped in these types, and that the chosen fields
share a common type (we want to compare values of this
field for equality to perform the join).
filterDb!
Γ ` v2 ⇒ B 2
Γ ` v4 ⇒ B 4
Γ ` joinDb? v1 v2 v3 v4 ⇒ F (Db ?)
joinDb?
∆ = ∆1 , v2 7→ A, ∆3 , v4 7→ A
Γ ` v1 ⇒ Db (Dict (∆1 , v2 7→ A))
Γ ` v2 ⇒ B2
Γ ` v3 ⇒ Db (Dict (∆3 , v4 7→ A))
Γ ` v4 ⇒ B4
Γ ` joinDb! v1 v2 v3 v4 : F (Db (Dict ∆))
joinDb!
Figure 13. Selected typing rules for computation typing
(checking and synthesis).
Typing (horizontal) across Execution (vertical).
Line 1
Line 2
Line 3
Line 4
openDb filterDb openDb joinDb
1: openDb
?
?
?
?
2: filterDb
—
!
?
?
3: openDb
—
—
?
?
4: joinDb
—
—
—
!
···
—
?
!/?
!/?
!
Figure 14. Progressive typing for Figure 2a: As execution
progresses (vertically) over Lines 1 and 3, the continuation’s
typing becomes more certain: After Line 1 executes, Line
2 types in the certain modality (!) instead of the uncertain
modality (?); similarly, after Line 3, Lines 4 onward type
using the certain modality. (The dashed horizontal lines indicate these progressions).
Gradual Typing, Progressively via OVV. Figure 14 illustrates using the typing rules of Figure 13 to perform progressive typing our four-line motivating example (Figure 2a).
The vertical and horizontal dimensions of the table list each
of the four lines; the vertical axis represents concrete ex8
2016/8/23
ecution, and the horizontal axis represents typing the four
right-hand-sides of the program’s four let-bindings, and in
particular, for filterDb (on Line 2) and joinDb (on Line 4),
the table indicates whether the operation was typed in the
uncertain or certain modality. As execution progresses (vertically) over Lines 1 and 3, the typing of the program continuation’s becomes more certain: After Line 1 executes, Line
2 types in the certain modality (!) instead of the uncertain
modality (?); similarly, after Line 3, Lines 4 onward type
using the certain modality. As the final column shows, the
certainty of code using these tables in the remainder of the
program (Line 5 onwards) increases after each of the two
calls to openDb. Between the two calls, some information is
known (relating to the first two tables defined on Lines 1 and
2), but some information is still missing (relating to the two
tables defined in Lines 3 and 4).
Our current Rust-based prototype of λ-VMF is powerful
enough to express this example, including the progressive
typing discussed above. In Section 5, we discuss the potential to use incremental computation in the context of such
progressive typing; the goal is to improve performance by
exploiting the redundancy of re-typing the program’s continuation.
5.
State
State Set
Concrete Execution
reflect/cc
State
Abstract Execution
2
3
4
1
ne ine
ne ine
L
Li
L
Li
reflect/cc
Abstract Execution
2
3
4
1
ne ine
ne ine
L
Li
L
Li
Validate
Residual
Line 1
Line 2
State Set
Progressive
Verification
δ
Line 3
Line 4
(a) Progressive verification
Regressive
Validation
Program
Transform
(b) Regressive validation
Figure 15. Progressive verification and regressive validation are complementary ways of seeing the interplay between ∀-analysis and ∃-analysis enabled by online
verification-validation.
be used to elide run-time ∃-analysis checks that concern
the authors table, including the asserts for the projections
of author.name. Pictorially, we think of regressive validation
as introducing a third dimension that consists of all possible outcomes of a program transformation on the object program (shown in Figure 15b). After performing an online verification, the meta layer transforms the continuation, either
eliding certain downstream validation checks (labeled validate), or introducing residual checks that reduce the original checks’ complexity (labeled residual). As illustrated in
Section 4, progressive typing can, before executing the operation, eliminate residual checks by rewriting uncertain operations to certain operations (which require no run-time type
checks). More aggressive verification techniques can hope
to regress even more aggressive validation checks to simpler
forms. For instance, global heap-based properties present an
interesting challenge.
Discussion
In this section, we discuss future challenges and directions for the vision of OVV presented in this paper. Specifically, we discuss the design of the meta-level programming
language, and its use in expressing progressive verification
and regressive validation.
Incremental Computation for Progressive Verification.
In the motivating example from Section 2, the chk_stk calls
performed by openDb use progressive typing to check their
continuations. In fact, these two continuations are related:
The earlier version lacks type information about the table
loaded in line 3, whereas the later version has access to this
type information. Progressive typing could exploit this incremental relationship to avoid re-computing all of the typing
facts about the program state that have not changed.
Progressive typing is a specific instance of progressive
verification. Pictorially, progressive verification relates distinct abstract executions (shown horizontally in Figure 15a),
by exploiting their similarity (a small change, depicted as δ,
extending vertically). The task of a progressive verifier is a
∀-analysis, just like a classical static verifier, which attempts
to prove that all executions to an assertion satisfy a particular
safety property.
Implicitly-Incremental Meta-Level Computation. In sum,
the example chk_stk above encodes a theory about online
typing, along with a mechanism for using this type information to optimize the dynamic run-time checks that would otherwise be used. The meta layer should have an in-built ability to implicitly express progressive verification as ordinary
verification, so that the system, not the programmer, takes
into account execution environment changes across these
progressive stages. Further, when the meta layer uses this
progressive verification to enable regressive validation in the
future execution down stream, the system, not the programmer, accounts for these changes when doing future stages of
progressive verification. In other words, the VM that runs the
meta language and object language should have an in-built
ability to express interaction among the levels in terms of
implicitly-incremental computation. In Section 6, we discuss
the challenges that OVV poses to work on general-purpose
incremental computation.
More Aggressive Regressive Validation. After type checking the continuation for line 1, regressive validation consists of eliminating dynamic checks within the library calls
of lines 2 and 4 (filterDb and joinDb, respectively). In particular, if the continuation type-checks under the partiallyknown type information, the known type information can
9
2016/8/23
6.
and implement reflective towers in simpler terms; these efforts are named after various hair colors: Brown [19, 39],
Blond [13] and most recently, Black [3, 4].
Compared to the impressive and mind-bending work on
metacircular interpreters, the vision for λ-VMF is more
modest: Two levels suffice to perform OVV. Having said
that, if meta-level programmers want to verify their metalevel programs as object programs (to “bootstrap” a typed
meta level), the work mentioned above will likely provide
further insights.
Related Work
This section supplements the related work in Section 2.
General-Purpose Incremental Computation. Section 5
proposes an implicitly incremental meta-level language for
λ-VMF, which challenges current research on (generalpurpose, programming language-based) incremental computation (IC). Consider the desired incremental behavior of
chk_stk in the motivating example, where it occurs after lines
1 and 3, when the program states are similar, but not identical. In particular, both continuations include the AST of
the call in line 4, and onward, which chk_stk will process
in both verification stages. The central challenge is reusing
the redundant work performed by chk_stk, despite the fact
that the AST and store typing are not equal to that in the
prior stage, which creates challenges for incremental computing via memoization, a key implementation mechanism
used across many specific IC approaches.
To understand why these “small” changes are challenging
for typical memoization, consider the structural recursion of
the chk_stk function from Figure 6. One approach to memoization identifies each saved invocation by the entire store
typing st and entire stack stk, including all of their recursive sub-structure, e.g., via hash-consing [18]. This approach
is commonly taken by past work on incremental computation [7, 8, 17, 23, 24, 32, 33, 33], however, it is brittle and
overly sensitive to small changes, since they alter the identity
of the whole recursive structure. Recent work addresses this
shortcoming by introducing unique names that are special
to incremental computing [25]. This naming mechanism can
overcome the challenges outlined above for chk_stk, since
the presence of names isolates changed components of the
store typing, stack and local environments.
However, several key challenges remain before these
techniques can fully realize OVV: We want to use these
names correctly (to avoid unsound incremental results), use
them efficiently (to isolate changes and avoid sub-redundant
computations) and use them implicitly (so that the meta-level
programs look like ML). Further, we may want to control
how fine-grained the IC techniques track program dependencies, to reduce constant-factor overhead.
Program Analysis for Dynamic Languages. The ultimate
aim of online verification-validation is offer “strong checking” in an extensible, dynamic language environment. And
thus we seek to build on the substantial amount of research
activity on program analysis for dynamic languages. Since
by definition, dynamic languages lack a built-in static typing
discipline, much of the static verification work focuses on
either retrofitting rich typing or specification disciplines [11,
12, 21] or applying whole-program flow analysis for inferring and checking type properties (e.g., for JavaScript [5, 26,
27] or for Ruby [1]).
The dynamic language features that make widely-used libraries like jQuery possible also make retrofitting static techniques incredibly challenging [2, 28, 34, 38]. Much of this
work focuses on finding the right kinds of context-sensitivity
to try to more precisely resolve the flow of values to dynamic features like dynamic property read in a static analysis [2, 31, 38] or to determine when dynamically-observed
information is sufficient to apply in a static verification [34].
We expect such techniques to be not only applicable and useful but strengthened in an OVV context. In the end, static
techniques in a phasic setting are limited by what is indeed
available statically, and dynamic techniques are limited by
what can be observed in testing runs. As exhibited in Section 2, the vision of OVV enables these techniques to be
strengthened with a flexible interleaving of “static” and “dynamic” analysis (i.e., ∀-analysis and ∃-analysis).
7.
Conclusion
This paper presents a vision for online verificationvalidation (OVV), an approach to ease the tension between
extensibility (of dynamic languages) and safety (of static
languages). The key insight of OVV is that analysis in a VM
can be phaseless, allowing analyses to run progressively on
the object program by pausing execution, reflecting on the
current continuation, and transforming the continuation to
replace uncertain (?) operations with certain (!) ones.
In this paper, we formalize an approach for OVV as a language semantics and Rust-based implementation called λVMF. We explore a proof-of-concept instantiation of OVV
by defining a gradual type system for dynamic field projection and databases with dynamic schemas, and we observed
that the result is a progressive type checker.
Reflective Towers of Interpreters. As proposed in Section 5, future work on λ-VMF should permit library extension authors to write meta programs and object programs in
an integrated way. Fortunately, many researchers have proposed designs that allow interesting interplay between the
interpreter’s viewpoint (where the meta-level program runs)
and the program being interpreted (where the object program
runs). Conceptually, this work begins with 3-LISP [14, 37],
which gives the programmer access to an infinite tower of
(so-called meta-circular) interpreters, allowing them to redefine the language from within the language. Following
(theoretical) work on 3-LISP, researchers give various approaches that attack practical concerns in how to express
10
2016/8/23
References
morphism with existentials and indexed types.
abs/1601.05106, 2016.
[1] Jong-hoon (David) An, Avik Chaudhuri, and Jeffrey S. Foster.
Static typing for Ruby on Rails. In Automated Software
Engineering (ASE), 2009.
[17] Sebastian Erdweg, Oliver Bracevac, Edlira Kuci, Matthias
Krebs, and Mira Mezini. A co-contextual formulation of
type rules and its application to incremental type checking.
In Object-Oriented Programming Systems, Languages, and
Applications (OOPSLA), 2015.
[2] Esben Andreasen and Anders Møller. Determinacy in static
analysis for jQuery. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2014.
[18] Jean-Christophe Filliâtre and Sylvain Conchon. Type-safe
modular hash-consing. In Proceedings of the 2006 Workshop
on ML. ACM, 2006.
[3] Kenichi Asai. Reflection in direct style. In Generative Programming and Component Engineering (GPCE), 2011.
[19] Daniel P. Friedman and Mitchell Wand. Reification: Reflection without metaphysics. In LISP and Functional Programming, 1984.
[4] Kenichi Asai, Satoshi Matsuoka, and Akinori Yonezawa. Duplication and partial evaluation for a better understanding of
reflective languages. Lisp and Symbolic Computation, 9(2-3),
1996.
[20] Michael Furr, Jong hoon (David) An, and Jeffrey S. Foster.
Profile-guided static typing for dynamic scripting languages.
In Object-Oriented Programming Systems, Languages, and
Applications (OOPSLA), 2009.
[5] SungGyeong Bae, Hyunghun Cho, Inho Lim, and Sukyoung
Ryu. SAFEWAPI: web API misuse detector for web applications. In Foundations of Software Engineering (FSE), 2014.
[21] Philippa Gardner, Sergio Maffeis, and Gareth David Smith.
Towards a program logic for JavaScript. In Principles of
Programming Languages (POPL), 2012.
[6] Nels E. Beckman, Aditya V. Nori, Sriram K. Rajamani,
Robert J. Simmons, Sai Deep Tetali, and Aditya V. Thakur.
Proofs from tests. IEEE Transactions on Software Engineering, 2010.
[22] Patrice Godefroid, Nils Klarlund, and Koushik Sen. DART:
Directed automated random testing. In Programming Language Design and Implementation (PLDI), 2005.
[7] Pramod Bhatotia, Alexander Wieder, Rodrigo Rodrigues,
Umut A. Acar, and Rafael Pasquin. Incoop: MapReduce
for incremental computations. In Cloud Computing (SoCC),
2011.
[23] Philip J. Guo and Dawson Engler. Using automatic persistent
memoization to facilitate data analysis scripting. In Software
Testing and Analysis (ISSTA), 2011.
[8] Pramod Bhatotia, Pedro Fonseca, Umut A. Acar, Björn B.
Brandenburg, and Rodrigo Rodrigues. iThreads: A threading
library for parallel incremental computation. In Conference
on Architectural Support for Programming Languages and
Operating Systems (ASPLOS), 2015.
[24] Matthew A. Hammer, Yit Phang Khoo, Michael Hicks, and
Jeffrey S. Foster. Adapton: Composable, demand-driven incremental computation. In Programming Language Design
and Implementation (PLDI), 2014.
[25] Matthew A. Hammer, Joshua Dunfield, Kyle Headley,
Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, and
David Van Horn. Incremental computation with names. In
Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2015.
[9] Eric Bodden, Andreas Sewe, Jan Sinschek, Hela Oueslati,
and Mira Mezini. Taming reflection: Aiding static analysis
in the presence of reflection and custom class loaders. In
International Conference on Software Engineering (ICSE),
2011.
[10] Adam Chlipala, Leaf Petersen, and Robert Harper.
bidirectional type checking. 2005.
CoRR,
[26] Simon Holm Jensen, Anders Møller, and Peter Thiemann.
Type analysis for JavaScript. In Static Analysis (SAS), 2009.
Strict
[27] Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John
Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann,
and Ben Hardekopf. JSAI: a static analysis platform for
JavaScript. In Foundations of Software Engineering (FSE),
2014.
[11] Ravi Chugh, David Herman, and Ranjit Jhala. Dependent
types for JavaScript. In Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), 2012.
[12] Ravi Chugh, Patrick Maxim Rondon, and Ranjit Jhala. Nested
refinements: a logic for duck typing. In Principles of Programming Languages (POPL), 2012.
[28] Benjamin S. Lerner, Liam Elberty, Jincheng Li, and Shriram Krishnamurthi. Combining form and function: Static
types for jQuery programs. In Object-Oriented Programming
(ECOOP), 2013.
[13] Olivier Danvy and Karoline Malmkjær. Intensions and extensions in a reflective tower. In LISP and Functional Programming, 1988.
[29] Paul Blain Levy. Call-by-push-value: A subsuming paradigm.
In Typed Lambda Calculi and Applications (TLCA), 1999.
[14] Jim des Rivières and Brian Cantwell Smith. The implementation of procedurally reflective languages. In LISP and Functional Programming, 1984.
[30] Paul Blain Levy. Call-by-push-value: A Functional/imperative Synthesis, volume 2. 2003.
[15] Bruno Dufour, Barbara G. Ryder, and Gary Sevitsky. Blended
analysis for performance understanding of framework-based
applications. In Software Testing and Analysis (ISSTA), 2007.
[31] Changhee Park and Sukyoung Ryu. Scalable and precise static
analysis of JavaScript applications via loop-sensitivity. In
Object-Oriented Programming (ECOOP), 2015.
[16] Joshua Dunfield and Neelakantan R. Krishnaswami. Sound
and complete bidirectional typechecking for higher-rank poly-
[32] William Pugh.
Incremental Computation via Function
Caching. PhD thesis, Cornell University, 1988.
11
2016/8/23
[37] Brian Cantwell Smith. Reflection and semantics in Lisp. In
Principles of Programming Languages (POPL), 1984.
[33] William Pugh and Tim Teitelbaum. Incremental computation via function caching. In Principles of Programming Languages (POPL), 1989.
[38] Manu Sridharan, Julian Dolby, Satish Chandra, Max Schäfer,
and Frank Tip. Correlation tracking for points-to analysis
of JavaScript. In Object-Oriented Programming (ECOOP),
2012.
[34] Max Schäfer, Manu Sridharan, Julian Dolby, and Frank Tip.
Dynamic determinacy analysis. In Programming Language
Design and Implementation (PLDI), 2013.
[39] Mitchell Wand and Daniel P. Friedman. The mystery of the
tower revealed: A nonreflective description of the reflective
tower. Lisp and Symbolic Computation, 1(1), 1988.
[35] Jeremy G. Siek and Walid Taha. Gradual typing for functional languages. In Scheme and Functional Programming
Workshop, 2006.
[40] Shiyi Wei and Barbara G. Ryder. Practical blended taint
analysis for JavaScript. In Software Testing and Analysis
(ISSTA), 2013.
[36] Jeremy G. Siek and Walid Taha. Gradual typing for objects.
In Object-Oriented Programming (ECOOP), 2007.
12
2016/8/23
| 6cs.PL
|
arXiv:1503.08080v2 [math.AC] 25 Jan 2016
ALGEBRAICALLY RIGID SIMPLICIAL COMPLEXES AND
GRAPHS
KLAUS ALTMANN, MINA BIGDELI, JÜRGEN HERZOG AND DANCHENG LU
Abstract. We call a simplicial complex algebraically rigid if its Stanley-Reisner
ring admits no nontrivial infinitesimal deformations, and call it inseparable if
it does not allow any deformation to other simplicial complexes. Algebraically
rigid simplicial complexes are inseparable. In this paper we study inseparability
and rigidity of Stanley-Reisner rings, and apply the general theory to letterplace
ideals as well as to edge ideals of graphs. Classes of algebraically rigid simplicial
complexes and graphs are identified.
Introduction
In the study of monomial ideals it is a popular technique to polarize in order to
obtain squarefree monomial ideals. Let S = K[x1 , . . . , xn ] be the polynomial ring
in n indeterminates over the field K. Given a monomial ideal I ⊆ S, the polarized
ideal I ℘ of I is a squarefree monomial ideal defined in a larger polynomial ring S ℘
and S/I is obtained from S ℘ /I ℘ by reduction modulo a regular sequence of linear
forms consisting of differences of variables, see [7, page 19] for details. In other
words, S ℘ /I ℘ may be viewed an unobstructed deformation of S/I over a suitable
affine space.
The natural question arises whether S ℘ /I ℘ or any other K-algebra defined by
a squarefree monomial ideal admits further unobstructed deformations, or at least
non-trivial infinitesimal deformations. This may be indeed the case as the third
author learned from Fløystad.
Separation. Let I ⊆ S be a squarefree monomial ideal, and let y be an indeterminate
over S. Fløystad (see [4]) calls a monomial ideal J ⊆ S[y] a separation of I for the
variable xi if the following conditions hold:
(i) the ideal I is the image of J under the K-algebra homomorphism S[y] → S
with y 7→ xi and xj 7→ xj for all 1 ≤ j ≤ n;
(ii) xi and y divide some minimal generators of J;
(iii) y − xi is a non-zero divisor of S[y]/J.
The ideal I is called separable if it admits a separation, otherwise it is called inseparable.
2010 Mathematics Subject Classification. Primary 13D10, 13C13; Secondary 05E40.
Key words and phrases. infinitesimal deformations, rigidity, Stanley-Reisner ideals, edge ideals.
The paper was written while the second and the fourth authors were visiting the Department of
Mathematics of University Duisburg-Essen. They want to express their thanks for the hospitality.
Corresponding author: Dancheng Lu.
1
If J ⊆ S[y] is a separation of I for the variable xi , then K[t] → S[y]/J, t 7→ y −xi ,
is a non-trivial unobstructed deformation of S/I over A1 = Spec K[t]. The simplest
example of a squarefree monomial ideal which admits a separation is the ideal I =
(x1 x2 , x1 x3 , x2 x3 ). One possible separation of I is the ideal J = (x1 y, x1x3 , x2 x3 ).
Infinitesimal deformations. But even if I ⊆ S is inseparable, it still may admit
infinitesimal deformations. We denote by ε a non-zero term with ε2 = 0. Let
J ⊆ S[ε] be an ideal. Then S[ε]/J is called an infinitisimal deformation of S/I if
the canonical K-algebra homomorphism K[ε] → S[ε]/J is flat and if S/I is obtained
from S[ε]/J by reduction modulo ε. Thus if I = (f1 , . . . , fm ), then J = (f1 +
g1 ε, . . . , fm + gm ε) and K[ε] → S[ε]/J is flat if and only if ϕ : I → S/I with fi 7→
gi + I is a well-defined S-module homomorphism. In other words, the infinitesimal
deformations of S/I are in bijection to the elements of I ∗ = HomS (I, S/I).
Cotangent functors. Recall that a K-linear map ∂ : S → S is called a K-derivation
if ∂f g = f ∂g + g∂f . The set of K-derivations has a natural structure as an Smodule, and is denoted DerK (S). In fact, DerK (S) is a free S-module whose basis
consists of the partial derivatives ∂/∂xi . The infinitesimal deformation S[ε]/J of
S/I is called trivial if there exists a K-algebra automorphism S[ε] → S[ε] which
maps J to IS[ε]. This is the case, if and only if there exists ∂ ∈ DerK (S) such that
J = (f1 +∂f1 ε, . . . , fm +∂fm ε). Thus if we consider the natural map δ ∗ : DerK (S) →
I ∗ which assigns to ∂ ∈ DerK (S) the element δ ∗ (∂) with δ ∗ (∂)(fi ) = ∂fi + I, then
the non-zero elements of Coker δ ∗ are in bijection to the isomorphism classes of
non-trivial infinitesimal deformations of S/I, see for example [6, Lemma 2.4]. This
cokernel is denoted by T 1 (S/I) and is called the first cotangent functor of S/I. The
cotangent functors have been first introduced by Lichtenbaum and Schlessinger [9].
The K-algebra S/I is called rigid if it does not admit any non-trivial infinitesimal
deformations. Hence S/I is rigid if and only if T 1 (S/I) = 0. For simplicity we call
I rigid if S/I is rigid. The simplest example of a squarefree monomial ideal which is
inseparable but not rigid, is the ideal I = (x1 x2 , x2 x3 , x3 x4 ), see Proposition 3.7(a)
and Theorem 3.10. We recommend the reader to consult [10, Section 3] for general
basic facts about deformation theory.
Rigidity of simplicial complexes. In the case that I ⊆ S is a monomial ideal, T 1 (S/I)
is a Zn -graded S-module. If moreover I is a squarefree monomial ideal, then the
Zn -graded components of T 1 (S/I) have a combinatorial interpretation as was shown
by the first author and Christophersen in [2] and [1]. We recall some of these results
in Section 1 of this paper because they are crucial for later applications.
Recall that a simplicial complex ∆ on the vertex set V is a collection of subset of
V such that whenever F ∈ ∆ and G ⊂ F , then G ∈ ∆. Frequently we denote the
vertex set of ∆ by V (∆).
Since I is a squarefree monomial ideal, there exists a unique simplicial complex
∆ such that I = I∆ , where I∆ is the Stanley–Reisner ideal of ∆. As usual, S/I∆ is
denoted by K[∆] and is called the Stanley–Reisner ring of ∆. For simplicity we will
write T 1 (∆) for T 1 (K[∆]). We say that ∆ is algebraically rigid (with respect to K)
if K[∆] is rigid. Actually it is shown in Section 1 that algebraic rigidity of simplicial
2
complexes does not depend on K. There is the concept of rigid simplicial complexes,
meaning that the simplicial complex does not admit any non-trivial automorphism.
In this paper rigidity means algebraic rigidity, and will simply say that ∆ is rigid if
it is algebraically rigid.
Description of contents. The aim of this paper is to characterize rigid simplicial
complexes in combinatorial terms and exhibit classes of them. By what we said
before, it follows that ∆ is rigid if and only if T 1 (∆)c = 0 for all c ∈ Zn . The
important facts, shown in [2], regarding the graded components of T 1 (∆) that will
be used throughout the paper, are the following: write c = a − b with a, b ∈ Nn
and supp a ∩ supp b = ∅. Here for a vector a, supp a is defined to be the set
{i ∈ [n] : ai 6= 0} where the ai are the components of a. Then
(i) T 1 (∆)a−b = 0 if b 6∈ {0, 1}n, and if b ∈ {0, 1}n , then T 1 (∆)a−b depends
only on supp a and supp b;
(ii) T 1 (∆)a−b = T 1 (link∆ supp a)−b .
We say that ∆ is ∅-rigid if T 1 (∆)−b = 0 for all b ∈ {0, 1}n. Thus, by (ii), ∆
is rigid, if and only if all its links are ∅-rigid. These and other facts are recalled
in Section 1. We close the section by applying the general theory to characterize
inseparable simplicial complexes. Say, ∆ is a simplicial complex on the vertex set
[n]. To each vertex i of ∆ one attaches a graph G{i} (∆) whose vertices are those
faces F ∈ ∆ for which F ∪ {i} 6∈ ∆. The edges of G{i} (∆) are those {F, G} for
which F ( G or G ( F . In Theorem 1.8 we show that ∆ is inseparable if and only
if G{i} (∆) is connected for i = 1, . . . , n, and that this is equivalent to the condition
that T 1 (∆)−ei = 0 for i = 1, . . . , n. Here ei denotes the ith canonical basis vector
of Zn .
Let dimK T 1 (∆)−ei = k. Iterating simple separation steps one can construct a
e on the vertex set ([n] \ {i}) ∪ {v0 , v1 , . . . , vk } defined as ksimplicial complex ∆
e −b = 0 for all b with
separation of ∆ for the vertex i having the property that T 1 (∆)
e by cutting down
supp b ⊆ {v0 , . . . , vk }, and such that K[∆] is obtained from K[∆]
by a regular sequence consisting of differences of variables.
In Section 2 we consider various operations on simplicial complexes and study
their behaviour with respect to rigidity. In Proposition 2.3 it is shown that the join
∆1 ∗ ∆2 of the simplicial complexes ∆1 and ∆2 is rigid if and only if this is the case
for ∆1 and ∆2 .
More complicated is the situation for the disjoint union of two simplicial complexes
∆1 and ∆2 . Here we assume that none of the two simplicial complexes is the empty
set and that their 0-dimensional faces correspond to their vertex set, a condition
that we do not require in general. Under these (very weak) assumptions it is shown
in Theorem 2.5 that ∆1 ∪ ∆2 is inseparable if and only if ∆1 and ∆2 are simplices,
and that ∆1 ∪ ∆2 is rigid if and only in addition one of the simplices has positive
dimension. As a consequence we see that a disconnected simplicial complex of
positive dimension is never rigid, unless all its components are simplices.
Finally in Theorem 2.10 we consider what we call the circ of two simplicial
complexes, denoted by ∆1 ◦ ∆2 . Suppose that Vi is the vertex set of ∆i and
3
that V1 ∩ V2 = ∅. Then, by definition, F ⊆ V1 ∪ V2 is a face of ∆1 ◦ ∆2 if
and only if either F ∩ V1 is a face of ∆1 or F ∩ V2 is a face of ∆2 . Note that
∆1 ◦ ∆2 = (∆1 ∗ hV2 i) ∪ (hV1 i ∗ ∆2 ) and that I∆1 ◦∆2 = (I∆1 I∆2 ). It turns out that
∆1 and ∆2 are rigid if ∆1 ◦ ∆2 is rigid and I∆1 , I∆2 6= 0. The converse is true only
under some additional assumptions.
A motivation for us to study the circ-operation resulted from the desire to classify
the rigid letterplace ideals, see [4]. Given two finite posets P and Q, one assigns a
monomial ideal L(P, Q), which in the case P = [n] or Q = [n] is called a letterplace
ideal or a co-letterplace ideal, respectively. Letterplace and co-letterplace ideals have
been considered before in [3]. In the paper [4] it is shown that all letterplace ideals
are inseparable. Here we show that L(P, Q) is rigid if and only if no two elements of
P are comparable, see Theorem 2.12. In the proof of one direction of this theorem
we need the circ-construction.
The last section of this paper is concerned with the rigidity of edge ideals. Given a
finite simple graph on the vertex set [n] one assigns to it the so-called edge ideal I(G)
generated by the monomials xi xj with {i, j} an edge of G. Obviously I(G) = I∆(G)
for some simplicial complex ∆(G). This simplicial complex is called the independence
complex of G. Indeed, its faces are the independent sets of G, that is, the subsets
of [n] which do not contain any edge of G. We say that G is rigid if ∆(G) is
rigid. Again there exist already various concepts of rigid graphs which should not
be confused with the definition of rigidity used in this paper. Similarly, we say that
G is inseparable if I(G) is inseparable. The ultimate goal would be to classify all
rigid and inseparable graphs. It is not clear whether a nice description of these
classes of graphs is possible. However with some additional assumptions on the
graphs, inseparable or rigid graphs can be characterized combinatorially. Recall
that a vertex i of G is called a free vertex if it belongs to only one edge, and an edge
is called a leaf if it has a free vertex. Finally an edge e of G is called a branch, if
there exists a leaf e′ with e′ 6= e such that e ∩ e′ 6= ∅. Our main result on rigidity of
graphs is formulated in Theorem 3.10: Let G be a graph on the vertex set [n] such
that G does not contain any induced cycle of length 4, 5 or 6. Then G is rigid if
and only if each edge of G is a branch and each vertex of a 3-cycle of G belongs to
a leaf. Theorem 3.10 has several consequences. In Corollary 3.11 it is shown that a
chordal graph G is rigid if and only if each edge of G is a branch and each vertex
of a 3-cycle of G belongs to a leaf. Another consequence is the fact that a graph
with the property that all cycles have length ≥ 7 is rigid if and only if each of its
edges is a branch, see Corollary 3.12. This result implies in particular that a forest
consisting only of branches is rigid. Finally we notice in Corollary 3.13 that a cycle
is rigid if and only if it is a 4- or 6-cycle.
1. The cotangent functor T 1 and rigid and inseparable
Stanley–Reisner rings
The cotangent functor T 1 . Let ∆ be a simplicial complex on the vertex set V (∆) =
[n] where [n] = {1, . . . , n}. We denote by [∆] the set of elements i ∈ [n] with
{i} ∈ ∆. Let F1 , . . . , Fm ⊆ [n]. We denote by hF1 , . . . , Fm i the smallest simplicial
4
complex ∆ with Fi ∈ ∆ for i = 1, . . . , m. The elements of ∆ are called faces. A
facet of ∆ is a face of ∆ which is maximal with respect to inclusion. The set of
facets of ∆ will be denoted by F (∆).
We fix a field K. The ideal I∆ denotes the Stanley-Reisner ideal in S = K[x1 , . . . , xn ],
that is,Qthe ideal generated by the monomial xN with N ⊆ [n] a non-face of ∆. Here
xN = i∈N xi . The K-algebra K[∆] = S/I∆ is called the Stanley-Reisner ring of
∆.
The cotangent cohomology modules T i (K[∆]) which we denote by T i (∆) are Zn graded. We quote several facts about the Zn -graded components of T i (∆) which
were shown in [2].
We write c ∈ Zn as a − b with a, b ∈ Nn and supp a ∩ supp b = ∅, and set
A = supp a and B = supp b. Here N denotes the set of non-negative integers,
and as in the introduction the support of a vector a ∈ Nn is defined to be the set
supp a = {i ∈ [n] : ai 6= 0}.
Theorem 1.1 ([2], Theorem 9). (a) T i (∆)a−b = 0 if b 6∈ {0, 1}n .
(b) Assuming b ∈ {0, 1}n , T i (∆)a−b depends only on A and B.
Recall that for a subset A of [n], the link of A is defined to be
link∆ A = {F ∈ ∆ : F ∩ A = ∅, F ∪ A ∈ ∆}
with vertex set V (link∆ A) = [n] \ A.
We will also need the following result:
Proposition 1.2 ([2], Proposition 11). (a) T i (∆)a−b = 0, unless
A∈∆
and
∅=
6 B ⊆ [link∆ A].
(b) T i (∆)a−b = T i (link∆ A)−b .
In the present paper, we are only interested in T 1 . Because of Proposition 1.2(b)
it is important to know how to compute T 1 (∆)−b for B ⊆ [∆]. For this purpose we
introduce some notation.
Let Y be a collection of subsets of [n]. We set K0 (Y) = {λ : Y → K} and
K1 (Y) = λ : {(Y0 , Y1 ) ∈ Y 2 : Y0 ∪ Y1 ∈ Y} → K
and define the K-linear map d : K0 (Y) → K1 (Y) by (dλ)(Y0, Y1 ) = λ(Y1 ) − λ(Y0 ).
Next given B ⊆ [n] and ∆, we define
NB (∆) = {F ∈ ∆ : F ∩ B = ∅, F ∪ B ∈
/ ∆},
′
eB (∆) = {F ∈ NB (∆) : there exists B ( B with F ∪ B ′ ∈
N
/ ∆}.
With the notation introduced one has
Proposition 1.3 ([2], Corollary 6). (a) Suppose |B| ≥ 2. Then
(d,r)
eB (∆)) ,
T 1 (∆)−b = Ker K0 (NB (∆)) −→ K1 (NB (∆)) ⊕ K0 (N
where d : K0 (NB (∆)) → K1 (NB (∆)) is the map as defined above and r : K0 (NB (∆)) →
eB (∆)) is the restriction map.
K 0 (N
5
(b) For |B| = 1, the K-dimension of T 1 (∆)−b is one less than the K-dimension
of the kernel given in (a).
Rigidity. The simplicial complex ∆ is called ∅-rigid if T 1 (∆)−b = 0 for all b ∈
{0, 1}n . For ∅-rigidity it is enough to check the vanishing of T 1 (∆)−b for b ∈ {0, 1}n
with supp b ⊆ [∆]. It follows from Proposition 1.2 that ∆ is rigid if and only if
link∆ A is ∅-rigid for all A ∈ ∆. Thus we will assume a = 0 from now on.
As an immediate consequence of Proposition 1.3 one obtains
Corollary 1.4. (a) Suppose that |B| ≥ 2. Then T 1 (∆)−b = ΛB (∆), where
ΛB (∆) = {λ : NB (∆) → K : λ|NeB (∆) = 0 and λ(F ) = λ(G) whenever F ⊆ G}.
(b) dimK T 1 (∆)−b = dimK ΛB (∆) − 1 if |B| = 1.
Let B be a subset of [n]. We define GB (∆) to be the graph whose vertex set is
NB (∆) and for which {F, G} is an edge of GB (∆) if and only if F ( G or G ( F . It
follows that λ ∈ ΛB (∆) is constant on the connected components of GB (∆). Note
eB (∆) = ∅. We see that if |B| ≥ 2, then
that if |B| = 1, then N
(1)
dimK T 1 (∆)−b = number of connected components of GB (∆)
eB (∆),
which contain no element of N
and if B = {i}, then
(2)
dimK T 1 (∆)−ei = number of connected components of G{i} (∆) − 1
Hence the rigidity of a simplicial complex is independent of the field K.
Examples 1.5. (a) Let 2[n] = h[n]i be the simplex on the vertex set [n]. For each
eB (2[n] ) = ∅. This implies that 2[n] is ∅-rigid. Moreover, for each
B ⊆ [n] we have N
[n]
A ∈ 2 , its link is a simplex, too. Thus, 2[n] is rigid. Of course, this is known before
because K[2[n] ] = K[x1 , . . . , xn ].
(b) Fix n ≥ 2, and let Γ = 2[n] \{[n]} be the boundary of 2[n] . Then N[n] (Γ) = {∅},
e[n] (Γ) = ∅. In particular, dimK T 1 (Γ)−b = 1 for b = (1, . . . , 1). Again this
but N
follows also directly from the fact that K[Γ] = K[x1 , . . . , xn ]/(x1 x2 · · · xn ).
(c) let ∆ = h{1}, . . . , {n}i. Then ∆ is 0-dimensional. The set B = {1} yields
eB (∆) = ∅. Hence, T 1 (∆)−b 6= 0 for n ≥ 3, and so ∆
NB (∆) = {{2}, . . . , {n}} and N
is not rigid. Note that K[∆] = K[x1 , . . . , xn ]/(xi xj : i 6= j).
The ideal (xi xj : i 6= j) may be interpreted as the edge ideal of the complete
graph on the vertex set [n]. Rigidity of edge ideals will be discussed in details in
Section 3.
The following lemma tells us when T 1 (∆)−b vanishes if supp b 6∈ ∆. We denote
by 2B the simplex on the vertex set B.
Lemma 1.6. Let ∆ be a simplicial complex on the vertex set [n], and let b ∈ {0, 1}n .
Let B = supp b and assume that B 6∈ ∆.
6
eB (∆) 6= ∅.
(a) Suppose that |B| ≥ 2. Then T 1 (∆)−b = 0 if and only if N
1
B
B
Moreover, T (∆)−b 6= 0 implies that the boundary 2 \{B} of 2 is contained
in ∆.
(b) Suppose that |B| = 1. Then T 1 (∆)−b = 0.
Proof. Since B 6∈ ∆ it follows that ∅ ∈ NB (∆). Therefore, λ(F ) = λ(∅) for all
λ ∈ ΛB (∆). Thus the K-vector space ΛB (∆) is generated by one element λ0 which
eB (∆) 6= ∅ and which may be chosen to be the
is forced to be the 0-element if N
constant map with λ0 (∅) = 1, otherwise. This proves (a). Also (b) follows from
this considerations keeping in mind Corollary 1.4(b). Alternatively, statement (b)
follows from Lemma 1.2(a).
Separation. Let, as before, ∆ be a simplicial complex on the vertex set [n]. We say
that ∆ is separable, if for some i, I∆ admits a separation for xi . Otherwise, we say
that ∆ is inseparable. In the further discussions we refer to the conditions (i), (ii)
and (iii) for separation, as given in the introduction.
Let I = I∆ be minimally generated by the monomials u1 , . . . , um . We first observe:
Lemma 1.7. If J is a separation of I for the variable xi , then T 1 (∆)−ei 6= 0.
Proof. By condition (iii), S/I is obtained from S[y]/J by reduction modulo a linear
form which is a regular element on S[y]/J. This implies that I and J are minimally
generated by the same number of generators. Let J be minimally generated by
v1 , . . . , vm . We may assume that y divides v1 , . . . , vk but does not divide the other
generators of J. We may furthermore assume that for all i, vi is mapped to ui under
the K-algebra homomorphism (i). Then we may write
J = (u1 + (u1 /xi )(y − xi ), . . . , uk + (uk /xi )(y − xi ), uk+1, . . . , um ).
From this presentation and by (iii) it follows that S[y]/J is an unobstructed deformation of S/I induced by the element [ϕ] ∈ T 1 (S/I)−ei , where ϕ ∈ I ∗ is the
S-module homomorphism with ϕ(uj ) = uj /xi + I for j = 1, . . . , k and ϕ(uj ) = 0,
otherwise.
Condition (ii) makes sure that S[y]/J is a non-trivial deformation of S/I. Indeed,
suppose [ϕ] = 0. Observe, that deg ϕ = −ei . Therefore, ϕ ∈ (Im δ ∗ )−ei , which is the
K-vector space spanned by ϕi = δ ∗ (∂/∂xi ). Here δ ∗ : DerK (S) → I ∗ is the map as
defined in the introduction with δ ∗ (∂)(f ) = ∂f + I for ∂ ∈ DerK (S) and f ∈ I. It
follows that ϕ = λϕi for some λ ∈ K. Since ϕ(u1) = u1 /xi + I = λϕi (u1 ) it follows
that λ = 1. On the other hand, by condition (ii), there exists j > k such that xi |uj
and ϕ(uj ) = I 6= uj /xi + I = ϕi (uj ). This is a contradiction.
It follows from the above result that ∆ is inseparable if T 1 (∆)−ei = 0 for i =
1, . . . , n. Moreover the deformation K[y] → S[y]/J induces an infinitesimal deformation K[ε] → S[ε]/J¯ by reduction modulo y 2. As explained in the introduction,
this infinitesimal deformation yields an element in T 1 (∆). This assignment is called
the Kodaira-Spencer map. The arguments given above, even show that the image of the deformation K[y] → S[y]/J in T 1 (∆) via the Kodaira-Spencer map is
non-trivial.
7
Finally we obtain
Theorem 1.8. The following conditions are equivalent:
(a) ∆ is inseparable.
(b) G{i} (∆) is connected for i = 1, . . . , n.
(c) T 1 (∆)−ei = 0 for i = 1, . . . , n.
Proof. (c) ⇒ (a) follows from Lemma 1.7, and (b) ⇐⇒ (c) follows from the equality
(2) in the preceding subsection.
(a) ⇒ (b): Suppose G{i} (∆) is not connected for some i. Then the vertex set of
G{i} (∆) can be written as a disjoint union V (G{i} (∆)) = A ∪ B such that for all
F ∈ A and all G ∈ B, neither F ( G nor G ( F .
Let I = I∆ , I(A) = (xF : F ∈ A) and I(B) = (xG : G ∈ B). Then
I = (xi I(A), xi I(B), u1 , u2, . . . , ut ),
where none of the uj is divisible by xi .
Note that if {xF1 , . . . , xFr } is the minimal set of monomial generators of I(A) and
{xG1 , . . . , xGs } is the minimal set of monomial generators of I(B), then
{xi xF1 , . . . , xi xFr , xi xG1 , . . . , xi xGs }
is the set of monomials of the minimal monomial set of generators of I which are
divisible by xi . Thus, the ideal J = (yI(A), xiI(B), u1 , u2 , . . . , ut) ⊆ S[y] satisfies
the conditions (i) and (ii) of a separation of I. We will show that y − xi is a
non zero-divisor of S[y]/J. This will then imply that ∆ is separable, yielding a
contradiction.
Indeed, suppose y−xi is a zero-divisor of S[y]/J. Then y−xi belongs to a minimal
prime ideal P of J. Since P is a monomial prime ideal it follows that y, xi ∈ P .
Now let F ∈ A and G ∈ B and suppose that F ∪ G ∈ ∆. Then F ∪ G ∈ N{i} (∆),
and hence F ∪ G ∈ A since F ( F ∪ G, and similarly F ∪ G ∈ B since G ( F ∪ G.
This is a contradiction. Therefore, F ∪G 6∈ ∆ for all F ∈ A and G ∈ B. This implies
that I(A)I(B) ⊆ I. It follows that I(A)I(B) ⊆ J, since xi does not divide any of
the generators of I(A)I(B). Now since I(A)I(B) ⊆ P we conclude that I(A) ⊆ P
or I(B) ⊆ P . As P is a minimal prime ideal of J, we see that y 6∈ P if I(A) ⊆ P
and xi 6∈ P if I(B) ⊆ P . In any case we obtain a contradiction.
k-Separation. Let A and B be two finite collections of sets with F ∩ G = ∅ for all
F ∈ A and G ∈ B. As it is common, we denote by A ∗ B the join of A and B,
where A ∗ B = {F ∪ G : F ∈ A, G ∈ B}. If Γ and Σ are simplicial complexes,
then the join Γ ∗ Σ is again a simplicial complex. The vertex set of Γ ∗ Σ is the set
1
V (Γ) ∪ V (Σ). In [1, Lemma 4.3], it was shown that all T−e
(X) vanish whenever X
i
is a combinatorial manifold without boundary. Now we will show that beyond this
special case the deformations in degree −ei are unobstructed. More precisely, we
prove the following statement:
Proposition 1.9. Assume that V (∆) = [n] and dimK T 1 (∆)−ei = k. Then there
e on the vertex set ([n]\{i})∪{v0 , . . . , vk } such that I e is
exists a simplicial complex ∆
∆
8
e −b = 0
obtained from I∆ by k times separations for the variable xi . Moreover T 1 (∆)
for any b whose support supp b ⊆ {v0 , . . . , vk }.
Proof. We may decompose ∆ as a disjoint union
{∅, {i}} ∗ link∆ {i} ∪ N{i} (∆).
Since dimK T 1 (∆)−ei = k, we have N{i} (∆) splits into k + 1 connected components
N{i} (∆) = A0 ∪ A1 ∪ . . . ∪ Ak .
As in the proof of Theorem 1.8, we can express I∆ as
I∆ = ({xi xF : F ∈
k
[
Aℓ }, u1 , . . . , ut ),
ℓ=0
where the generators uj are not divisible by xi .
e on the vertex set ([n]\{i})∪{v0 , v1 , . . . , vk }
We define a new simplicial complex ∆
by
k
[
e = Ω ∗ link∆ {i} ∪ (Ωℓ ∗ Aℓ ).
∆
ℓ=0
Here Ω = h{v0 , . . . , vk }i, and Ωℓ = h{v0 , . . . , vk } \ {vℓ }i for ℓ = 0, . . . , k.
Set T = K[x1 , . . . , xi−1 , xi+1 , . . . , xn , y0 , . . . , yk ]. Then I∆e is an ideal of T and
I∆e = ({yℓ xF : ℓ = 0, . . . , k, F ∈ Aℓ }, u1 , . . . , ut).
Theorem 1.7 provides the induction step of proving the k-separability. Thus applying induction it can be shown that S/I is isomorphic to T /I∆e modulo the regular
e −b = 0 for any b whose
sequence y1 − y0 , . . . , yk − yk−1 , and furthermore T 1 (∆)
support supp b ⊆ {v0 , . . . , vk }.
We call I∆e a k-separation of I∆ .
2. Joins, disjoint unions and circs of simplicial complexes
In this section we consider simplicial complexes arising from pairs of simplicial
complexes and study their behaviour with respect to rigidity. Part of the results
will be applied to classify rigid algebras defined by letterplace ideals.
Monomial localization. In the following localization will be one of the tools in the
proofs. Let K be a field, S = K[x1 , . . . , xn ] the polynomial ring over K, I ⊆ S a
monomial ideal and P ⊆ S a monomial prime ideal. Then P = PF where F ⊆ [n]
and PF = (xi : i ∈ F ).
We observe that if (S/I)P denotes ordinary localization of S/I with respect to the
prime ideal P , then (S/I)P = SP /I(P )SP , where I(P ) ⊆ S(P ) := K[xi : i ∈ F ] is
the monomial ideal which is obtained from I by the substitution xi 7→ 1 for i 6∈ F .
The ideal I(P ) is called the monomial localization of I with respect to P .
Lemma 2.1. Let I ⊆ S be a monomial ideal, P ⊆ S a monomial prime ideal, and
F ⊆ [n].
9
(a) T 1 (S/I)P ∼
= (T 1 (S(P )/I(P ))[xi : i 6∈ P ])P .
(b) Suppose that T 1 (S(P )/I(P )) 6= 0. Then T 1 (S/I) 6= 0.
(c) Let I be a squarefree monomial ideal. Let ∆ be the simplicial complex on
the vertex set [n] with I∆ = I. Then S(PF )/I∆ (PF ) = S(PF )/IΓ , where
F = [n] \ F and Γ = link∆ (F ). In particular, Γ is rigid if ∆ is rigid.
Proof. (a) Note that DerK (S) = HomS (ΩS/K , S), where ΩS/K is module of differentials of S/K, see [5, Definition, p. 384]. Since ΩS/K localizes (see [5, Proposition
16.6], the same holds true for DerK (S). In other words, DerK (S)P = DerK (SP ).
From this fact one easily deduces that T 1 (S/I) localizes, that is T 1 (S/I)P = T 1 ((S/I)P ).
Therefore,
/ P ])P
T 1 (S/I)P ∼
= T 1 ((S(P )/I(P ))[xi : xi ∈
= T 1 ((S/I(P )S)P ) ∼
= T 1 ((S/I)P ) ∼
1
∼
= (T (S(P )/I(P ))[xi : i 6∈ P ])P .
The last isomorphism follows from the fact that T 1 (R[y]) ∼
= T 1 (R) ⊗R R[y] =
1
T (R)[y] for a polynomial extension R → R[y].
(b) Suppose that T 1 (S(P )/I(P )) 6= 0 and let mP be the graded maximal ideal of
S(P ) . Then T 1 (S(P )/I(P ))mP 6= 0 because mP ∈ Supp(T 1 (S(P )/I(P ))). It follows
that (T 1 (S(P )/I(P ))[xi : i 6∈ P ])P 6= 0, since mP S = P . Hence the assertion follows
from part (a).
(c) Since F (Γ) = {G \ F : G ∈ F (∆), F ⊆ G}, we obtain that IΓ ⊆ S(PF ) is
given by
\
\
PG .
IΓ =
PF \(G\F ) =
G∈F (∆),F ⊆G
G∈F (∆),F ⊆G
On the other hand,
I∆ (PF ) =
\
PG (PF ) =
\
PG .
G∈F (∆),F ⊆G
G∈F (∆)
Hence IΓ = I∆ (PF ).
Note that the fact stated in Lemma 2.1(c) which says that each link of a rigid
simplicial complex is again rigid can also be deduced from Proposition 1.2(b).
Example 2.2. Let I be a squarefree monomial ideal of K[x1 , . . . , xn ] generated in
degree (n − 1).
(a) If n = 3, then I is rigid if and only if I is generated by two monomials.
(b) If n ≥ 4, then I is not rigid.
Proof. In the following we may assume that I is not a principal ideal, because in
this case I is a complete intersection generated in degree ≥ 2, and hence I is not
rigid.
(a) For n = 3, I is an edge ideal of a nonempty simple graph with 3 vertices.
Edge ideals will be treated in detail on Section 3. A nonempty simple graph with
3 vertices is an isolated edge or a path of length 2 or a triangle. It follows from
Theorem 3.10 that in those graph, only the second is rigid. This proves our result.
10
(b) We proceed by induction on n. Assume n = 4. If I is generated by 4
monomials, then the monomial localization I(P ) of I with respect to P = (x1 , x2 , x3 )
is the edge ideal of a triangle, and so I(P ) is not rigid because of Theorem 3.10. By
Lemma 2.1(b) it follows that I is not rigid. If I is generated by 3 monomials, then I
is the product of a variable, say x1 , and the edge ideal (x2 x3 , x2 x4 , x3 x4 ) of a triangle,
and so it is not rigid. Indeed, this follows again from Lemma 2.1(b) by monomial
localization with respect to P = (x2 , x3 , x4 ). If I is generated by 2 monomials, then
it is the product of a monomial of degree 2 and an ideal generated by variables, and
again I is not rigid. Assume n > 4. If I is generated by n monomials, then the
monomial localization I(P ) of I with respect to P = (x1 , x2 , x3 ) is the edge ideal of
a triangle, and so I is not rigid. If I is generated by less than n monomials, then I
is the product of a variable and an ideal J which is generated in degree n − 2 in the
remaining n − 1 variables. It follows from the induction hypothesis that J is not
rigid and so I is not rigid.
Joins. Note that the notation “join” has been defined in the first section. Thus, if
∆1 and ∆2 are simplicial complexes on disjoint vertex sets, then the join ∆1 ∗ ∆2 is
a simplicial complex on the vertex set V (∆1 ) ∪ V (∆2 ).
In the remaining part of this subsection we always assume that ∆1 and ∆2 are
simplicial complexes with disjoint vertex sets.
Proposition 2.3. Let I∆1 ⊆ K[x1 , . . . , xn ] and I∆2 ⊆ K[y1 , . . . , ym ]. Then
T 1 (∆1 ∗ ∆2 ) = T 1 (∆1 )[y1 , . . . , ym ] ⊕ T 1 (∆2 )[x1 , . . . , xn ].
In particular ∆1 ∗ ∆2 is rigid if and only if ∆1 and ∆2 are rigid.
Proof. Set I = I∆1 ∗∆2 . Then I = I1 + I2 , where I1 = I∆1 S, I2 = I∆2 S and where
S = K[x1 , . . . , xn , y1 , . . . , ym]. We set R = S/I.
Furthermore let
α
· · · −→ F2 −→ F1 −→ S −→ S/I1 −→ 0
be the a resolution of I1 and let
β
· · · −→ G2 −→ G1 −→ S −→ S/I2 −→ 0
be the a resolution of I2 . Then, since TorSi (S/I1 , S/I2 ) = 0 for i > 0, the tensor
product of the two above resolutions produces the following free S-resolution of S/I:
γ
· · · −→ F2 ⊕ (F1 ⊗ G1 ) ⊕ G2 −→ F1 ⊕ G1 −→ I −→ 0
Let f ⊗ g ∈ F1 ⊗ G1 . Then γ(f ⊗ g) = β(g)f − α(f )g ∈ I(F1 ⊕ G1 ). It follows that
(F1 ⊗ G1 → F1 ⊕ G1 ) ⊗S R = 0. This implies that
(3)
I ∗ = Ker(F1∗ ⊕ G∗1 −→ F2∗ ⊕ G∗2 ) = I1∗ ⊕ I2∗ .
Here M ∗ = HomS (M, S/I) for any graded S-module M.
Assume that I1 is minimally generated by u1 , . . . , ur and I2 is minimally generated
by v1 , . . . , vs . Let f1 , . . . , fr be the basis of F1 , where fi is mapped to ui in I1 for
1 ≤ i ≤ r and let g1 , . . . , gs be the basis of G1 , where gj is mapped to vj in I2 for
1 ≤ j ≤ s. Also we denote by f1∗ , . . . , fr∗ the basis F1∗ dual to f1 , . . . , fr . In other
11
words, fi∗ (fj ) = 1 ∈ S if i = j and fi∗ (fj ) = 0 if i 6= j. Similarly, we denote by
g1∗ , . . . , gs∗ the dual basis of g1 , . . . , gs .
Then Im δ ∗ ⊆ F1∗ ⊕ G∗1 is generated by the elements
r
s
r
X
∂uk ∗ X ∂vl ∗ X ∂uk ∗
(4)
fk +
gl =
fk
∂x
∂x
∂x
i
i
i
k=1
l=1
k=1
for i = 1, . . . , n, and
(5)
r
X
∂uk
k=1
∂yj
fk∗
s
s
X
∂vl ∗ X ∂vl ∗
+
g =
g
∂yj l
∂yj l
l=1
l=1
for j = 1, . . . , m.
Here we use that ∂vl /∂xi = 0 for l = 1, . . . , s and ∂uk /∂yj = 0 for k = 1, . . . , r.
Since T 1 (∆1 ∗ ∆2 ) ∼
= I ∗ / Im δ ∗ , (3), (4) and (5) imply that T 1 (∆1 ∗ ∆2 ) =
T 1 (S/I1 ) ⊕ T 1 (S/I2 ). This yields the desired isomorphism because
S/I1 ∼
= (K[x1 , . . . , xn ]/I∆ )[y1 , . . . , ym ] and S/I2 ∼
= (K[y1 , . . . , ym ]/I∆ )[x1 , . . . , xn ].
1
2
Corollary 2.4. For all a − b ∈ Zn+m , we have
T 1 (∆1 ∗ ∆2 )a−b ∼
= (T 1 (∆1 )[y1 , . . . , ym ])a−b ⊕ (T 1 (∆2 )[x1 , . . . , xn ])a−b .
Proof. The assertion follows immediately from Proposition 2.3. However we give an
alternative and more direct proof for this isomorphism:
(i) Observing that links commute with joins, it is enough to prove that
T 1 (∆1 ∗ ∆2 )−(b1 +b2 ) = (T 1 (∆1 )[y1 , . . . , ym])−(b1 +b2 ) ⊕ (T 1 (∆2 )[x1 , . . . , xn ])−(b1 +b2 ) ,
where Bi := supp bi ⊆ V (∆i ) for i = 1, 2.
(ii) First we show that
NB1 ∪B2 (∆1 ∗ ∆2 ) = [NB1 (∆1 ) ∗ (∆2 \ B2 )] ∪ [(∆1 \ B1 ) ∗ NB2 (∆2 )],
where ∆i \ Bi = {F ∈ ∆i : F ∩ Bi = ∅} for i = 1, 2.
Let F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ∗ ∆2 ) with Fi ∈ ∆i for i = 1, 2. Then Fi ∈ ∆i \ Bi for
i = 1, 2 and (F1 ∪ F2 ) ∪ (B1 ∪ B2 ) ∈
/ ∆1 ∗ ∆2 by definition. It follows that for at
least one i ∈ {1, 2}, Fi ∪ Bi ∈
/ ∆i , namely, Fi ∈ NBi (∆i ). This actually proves the
containment ⊆. The other containment can be proved similarly.
(iii) Suppose that Bi 6= ∅ for i = 1, 2. We will show that both sides of the identity
in step (i) vanishes.
Let F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ∗ ∆2 ) with Fi ∈ ∆i for i = 1, 2. Then Fi ∈ NBi (∆i ),
for at least one i ∈ {1, 2} by the proof of (ii), say i = 1. It follows that (F1 ∪ F2 ) ∪
eB ∪B (∆1 ∗ ∆2 ). Hence
B1 ∈
/ ∆1 ∗ ∆2 . Since B1 ( B1 ∪ B2 , we have F1 ∪ F2 ∈ N
1
2
eB1 ∪B2 (∆1 ∗ ∆2 ). This implies that the left side of the identity
NB1 ∪B2 (∆1 ∗ ∆2 ) = N
in step (i) vanishes.
To see that the right side also vanishes, we note that a multi-homogeneous eleam
ment in T 1 (∆1 )[y1 , . . . , ym ] has the form ty1a1 · · · ym
, where t is a multi-homogeneous
12
am
has the multielement in T 1 (∆1 ) and ai ≥ 0 for i = 1, . . . , m. But y1a1 · · · ym
homogeneous degree for which each coordinate is greater or equal than zero. Hence
(T 1 (∆1 )[y1 , . . . , ym ])−(b1 +b2 ) = 0. Similarly (T 1 (∆2 )[x1 , . . . , xn ])−(b1 +b2 ) = 0.
(iv) If one of the Bi is the empty set, say B2 = ∅, then (ii) implies that
eB1 (∆1 ∗ ∆2 ) = N
eB1 (∆1 ) ∗ ∆2 .
NB1 (∆1 ∗ ∆2 ) = NB1 (∆1 ) ∗ ∆2 and N
This yields T 1 (∆1 ∗ ∆2 )−b1 = T 1 (∆1 )−b1 = (T 1 (∆1 )[y1 , . . . , ym ])−b1 , as desired.
Disjoint unions. Next we consider the simplicial complex ∆1 ∪ ∆2 which is the
disjoint union of ∆1 and ∆2 . The vertex set of ∆1 ∪ ∆2 is V (∆1 ) ∪ V (∆2 ) and
F ∈ ∆1 ∪ ∆2 if and only if F ∈ ∆1 or F ∈ ∆2 .
Theorem 2.5. Let ∆1 6= {∅} and ∆2 6= {∅} be simplicial complexes with disjoint
vertex sets. Assume that for i = 1, 2, V (∆i ) = [∆i ], that is, {j} ∈ ∆i for all
j ∈ V (∆i ).
(a) The following conditions are equivalent:
(1) ∆1 ∪ ∆2 is inseparable;
(2) ∆1 and ∆2 are simplices.
(b) The following conditions are equivalent:
(1) ∆1 ∪ ∆2 is rigid;
(2) ∆1 ∪ ∆2 is ∅-rigid;
(3) ∆1 and ∆2 are simplices with dim ∆1 + dim ∆2 > 0.
Proof. Let ∆ = ∆1 ∪ ∆2 .
(a) (1) ⇒ (2): Since ∆ is inseparable, Theorem 1.8 implies that the graph G{i} (∆)
is connected for all i ∈ V (∆1 ) ∪ V (∆2 ). Let i ∈ V (∆1 ). By assumption we have
{i} ∈ ∆. It follows that N{i} (∆) = N{i} (∆1 ) ∪ ∆2 \ {∅}. Since N{i} (∆1 ) and ∆2 \ {∅}
belong to different connected components of G{i} (∆) and since G{i} (∆) is connected,
it follows that either N{i} (∆1 ) = ∅ or ∆2 \ {∅} = ∅. The second case is ruled out
by assumption. Hence, N{i} (∆1 ) = ∅. This implies that i ∈ F for all F ∈ F (∆1 ).
Since i is an arbitrary element in V (∆1 ) we see that F (∆1 ) = {V (∆1 )}. Starting
with i ∈ V (∆2 ), the same argument proves that ∆2 is also a simplex.
(2) ⇒ (1): By Theorem 1.8, it is enough to show that G{i} (∆) is connected for
all i ∈ V (∆1 ) ∪ V (∆2 ). Let i ∈ V (∆1 ). As mentioned above we have N{i} (∆) =
N{i} (∆1 )∪∆2 \{∅}. Since ∆1 is a simplex and {i} ∈ ∆1 it follows that N{i} (∆1 ) = ∅.
Thus N{i} (∆) = ∆2 \ {∅}. Therefore G{i} (∆) is connected because ∆2 is a simplex.
A similar argument shows that G{i} (∆) is also connected for all i ∈ V (∆2 ).
(b) (1) ⇒ (2) is obvious.
(2) ⇒ (3): Since ∆ is ∅-rigid we have T 1 (∆)−b = 0 for all b ∈ {0, 1}V (∆1 )∪V (∆2 ) .
In particular, T 1 (∆)−ei = 0 for all i ∈ V (∆1 ) ∪ V (∆2 ). So by Theorem 1.8, ∆ is
inseparable. Thus using part (a) we have that ∆1 and ∆2 are simplices. Suppose
that dim ∆1 + dim ∆2 = 0. Then dim ∆1 = dim ∆2 = 0, and hence I∆ is of the form
(xy). It follows that T 1 (∆)−(1,1) 6= 0, a contradiction.
13
(3) ⇒ (1): The assumptions imply that I∆ is of the form (xi yj : i = 1, . . . , n, j =
1, . . . , m) with n ≥ 2 or m ≥ 2. Corollary 2.11 implies that ∆ is rigid.
Corollary 2.6. Let ∆ be simplicial complex. Then ∆ is separable if ∆ has more
than two connected components.
Circs. For i = 1, 2, let ∆i be a simplicial complex on the vertex set Vi and assume
that V1 ∩ V2 = ∅. Then the circ of ∆1 and ∆2 is the simplicial complex ∆1 ◦ ∆2 with
vertex set V1 ∪ V2 whose faces are those subsets F of V1 ∪ V2 for which either F ∩ V1
is a face of ∆1 or F ∩ V2 is a face of ∆2 .
It is worthwhile to note that if I∆1 ⊆ S1 = K[x1 , . . . , xn ] and I∆2 ⊆ S2 =
K[y1 , . . . , ym ] then I∆1 ◦∆2 = I∆1 I∆2 S, where S = K[x1 , . . . , xn , y1 . . . , ym ].
In the following we set MB (∆) = {F ⊆ V (∆) : F ∈
/ ∆ and F ∩ B = ∅} for any
B ⊆ V (∆). For later use we list a few obvious facts in the next lemmata.
Lemma 2.7. Let B = B1 ∪ B2 with ∅ =
6 Bi ⊆ Vi for i = 1, 2. Then
(a) NB (∆1 ◦ ∆2 ) = NB1 (∆1 ) ∗ NB2 (∆2 ) ∪ NB1 (∆1 ) ∗ MB2 (∆2 )
∪ MB1 (∆1 ) ∗ NB2 (∆2 ).
(b) NB1 (∆1 ◦ ∆2 ) = NB1 (∆1 ) ∗ M∅ (∆2 ) and NB2 (∆1 ◦ ∆2 ) = M∅ (∆1 ) ∗ NB2 (∆2 ).
Lemma 2.8. Let B = B1 ∪ B2 with ∅ =
6 Bi ⊆ Vi for i = 1, 2. Then
eB (∆1 ◦ ∆2 ) = NB1 (∆1 ) ∗ N
eB2 (∆2 ) ∪ N
eB1 (∆1 ) ∗ NB2 (∆2 )
(a) N
∪ NB1 (∆1 ) ∗ MB2 (∆2 ) ∪ MB1 (∆1 ) ∗ NB2 (∆2 ).
eB1 (∆1 ◦ ∆2 ) = N
eB1 (∆1 ) ∗ M∅ (∆2 ) and N
eB2 (∆1 ◦ ∆2 ) = M∅ (∆1 ) ∗ N
eB2 (∆2 ).
(b) N
We use these lemmata to prove
Proposition 2.9. Let ∆1 and ∆2 be two simplicial complexes on the vertex sets V1
and V2 , respectively, and let bi ∈ {0, 1}Vi , Bi = supp bi for i = 1, 2. Assume that
I∆i 6= 0 for i = 1, 2.
(a) Suppose that b1 , b2 6= 0. Then
eB ∪B (∆1 ◦ ∆2 ) = ∅ and NB ∪B (∆1 ◦ ∆2 ) 6= ∅,
K, if N
1
∼
1
2
1
2
T (∆1 ◦ ∆2 )−(b1 +b2 ) =
0, otherwise.
(b) dimK T 1 (∆1 ◦ ∆2 )−bi = dimK T 1 (∆i )−bi for i = 1, 2.
Proof. First we observe that for each i = 1, 2, I∆i 6= 0 if and only if Vi ∈
/ ∆i , which
is equivalent to Mφ (∆i ) 6= ∅.
eB1 ∪B2 (∆1 ◦∆2 ) = ∅ and NB1 ∪B2 (∆1 ◦∆2 ) 6= ∅. Lemma 2.7(a) to(a) Assume that N
gether with Lemma 2.8(a) imply that NB1 (∆1 ) ∗ NB2 (∆2 ) 6= ∅. Therefore NBi (∆i ) 6=
eB1 ∪B2 (∆1 ◦ ∆2 ) = ∅ it follows from Lemma 2.8(a) that
∅ for i = 1, 2. Since N
eB (∆i ) = ∅ for
eB1 (∆1 ) ∗ NB2 (∆2 ) = ∅, and so N
eB2 (∆2 ) = ∅ and N
NB1 (∆1 ) ∗ N
i
i = 1, 2. The same argument shows that MBi (∆i ) = ∅ for i = 1, 2.
14
Since MBi (∆i ) = ∅ for i = 1, 2, we have Vi \Bi ∈ ∆i and hence Vi \Bi ∈ NBi (∆i ) for
i = 1, 2. It follows that any λ ∈ T 1 (∆1 ◦ ∆2 )−(b1 +b2 ) is constant on NB1 ∪B2 (∆1 ◦ ∆2 ),
because for any F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ◦ ∆2 ) with Fi ⊆ Vi for i = 1, 2 we have
F1 ∪ F2 ⊆ (V1 \ B1 ) ∪ (V2 \ B2 ). Hence T 1 (∆1 ◦ ∆2 )−(b1 +b2 ) ∼
= K.
1
If NB1 ∪B2 (∆1 ◦ ∆2 ) = ∅, then T (∆1 ◦ ∆2 )−(b1 +b2 ) = 0. Assume now that
e
NB1 ∪B2 (∆1 ◦ ∆2 ) 6= ∅. Let λ ∈ Λ1 (∆1 ◦ ∆2 )−(b1 +b2 ) (see its definition in CoroleB1 ∪B2 (∆1 ◦ ∆2 ) with Fi ⊆ Vi , i = 1, 2. It
lary 1.4) and F1 ∪ F2 ∈ NB1 ∪B2 (∆1 ◦ ∆2 ) \ N
eB (∆i ) for i = 1, 2. By
follows from Lemmata 2.7(a) and 2.8(a) that Fi ∈ NBi (∆i )\ N
i
eB (∆i ), i = 1, 2 and MB (∆i ), i = 1, 2 is nonempty.
Lemma 2.8(a), at least one of N
i
i
First suppose that MB1 (∆1 ) 6= ∅. Then we take G1 ∈ MB1 (∆1 ). Note that
eB1 ∪B2 (∆1 ◦ ∆2 ) and (G1 ∪ F2 ) ∪ (F1 ∪ F2 ) ∈ ∆1 ◦ ∆2 . Therefore
G1 ∪ F2 ∈ N
λ(F1 ∪ F2 ) = 0. Similarly, we can conclude that λ(F1 ∪ F2 ) = 0 if MB2 (∆2 ) 6= ∅ or
eB (∆i ) 6= ∅ for i = 1 or i = 2. So we have proved that λ = 0 in any case. Thus
N
i
T 1 (∆1 ◦ ∆2 )−(b1 +b2 ) = 0.
(b) We prove the statement for i = 1. The same argument holds for i = 2.
Since M∅ (∆2 ) 6= ∅, we have NB1 ∪B2 (∆1 ◦ ∆2 ) = ∅ if and only if NB1 (∆1 ) = ∅ by
Lemma 2.7(b). Hence we only need to consider the case when NB1 ∪B2 (∆1 ◦ ∆2 ) 6= ∅.
We define a homomorphism ϕ from Λ1 (∆1 )−b1 to Λ1 (∆1 ◦ ∆2 )−b1 as follows:
for λ1 ∈ Λ1 (∆1 )−b1 , ϕ(λ1 ) is given by ϕ(λ1 )(F1 ∪ G1 ) = λ1 (F1 ) for any F1 ∈
NB1 (∆1 ) and G1 ∈ M∅ (∆2 ). One can check that ϕ(λ1 ) belongs to Λ1 (∆1 ◦ ∆2 )−b1
and that ϕ is injective. To see that ϕ is surjective, one only need to notice that
for any λ ∈ Λ1 (∆1 ◦ ∆2 )−b1 , λ(F1 ∪ G1 ) = λ(F1 ∪ G2 ) for any F1 ∈ NB1 (∆1 ) and
G1 , G2 ∈ M∅ (∆2 ). Hence ϕ is an isomorphism of K-vector spaces. This implies that
dimK T 1 (∆1 ◦ ∆2 )−b1 = dimK T 1 (∆1 )−b1 , using Corollary 1.4.
For simplicity we say that a simplicial complex ∆ on the vertex set [n] is special
if either ∆ has a unique facet, which is a maximal proper subset of [n], or ∆ has
exactly two facets, one of which contains a unique element say i and the other one
of which is [n] \ {i}. We see that ∆ is special if and only if I∆ is of the form zP ,
where z is a variable in S with z 6∈ P , and P is either a monomial prime ideal of S
or P = S.
Theorem 2.10. (a) Suppose that ∆1 ◦ ∆2 is rigid, and that I∆i 6= 0 for i = 1, 2.
Then ∆1 and ∆2 are rigid.
(b) Conversely, suppose that ∆1 and ∆2 are rigid simplicial complexes with disjoint vertex sets V1 and V2 , respectively. Then ∆1 ◦ ∆2 is rigid if and only if for
either j = 1 or j = 2, link∆j F is not special for all F ∈ ∆j . In algebraic terms, for
j = 1 or j = 2, none of the monomial localizations of I∆j is of the form zP , where
z is a variable in Sj with z 6∈ P , and P ⊆ Sj is either a monomial prime ideal or
P = Sj .
Proof. Let S1 = K[x1 , . . . , xn ], S2 = K[y1 , . . . , ym ] and S = K[x1 , . . . , xn , y1 , . . . , yn ].
We may assume that I∆1 ⊆ S1 and I∆2 ⊆ S2 .
(a) Let P1 = (x1 , . . . , xn ) and P2 = (y1 , . . . , ym ). Since
I∆1 ◦∆2 (Pi ) = (I∆1 I∆2 S)(Pi ) = I∆i
15
for i = 1, 2, we see that
T 1 (K[∆1 ◦ ∆2 ](Pi )) ∼
= T 1 (K[∆i ]).
Thus the assertion follows from Lemma 2.1(b).
(b) First suppose that ∆1 ◦ ∆2 is rigid, and suppose that there exist F1 ∈ ∆1 and
F2 ∈ ∆2 such that the Stanley–Reisner ideal Ilink∆j Fj is of the form zj Pj where zj is
a variable in Sj with zj 6∈ Pj , Pj ⊆ Sj is either a monomial prime ideal or Pj = Sj .
Since link∆1 ◦∆2 F1 ∪ F2 = link∆1 F1 ◦ link∆2 F2 , it follows that
(Ilink∆1 ◦∆2 F1 ∪F2 )S = Ilink∆1 F1 Ilink∆2 F2 S = (z1 z2 )P1 P2 S
is not rigid because the ideal (z1 z2 ) is not rigid, a contradiction (see Proposition 1.2(b) or Lemma 2.1(c)).
Suppose that ∆1 ◦ ∆2 is not rigid. Then there exist a, b ∈ {0, 1}V1 ∪V2 with
supp a ∩ supp b = ∅ such that T 1 (∆1 ◦ ∆2 )a−b 6= 0. Let a = a1 + a2 and b = b1 + b2
with a1 , b1 ∈ {0, 1}V1 and a2 , b2 ∈ {0, 1}V2 . We set B = supp b, Bi = supp bi for
i = 1, 2, and denote by Γi the simplicial complex link∆i (supp ai ) for i = 1, 2. Since
link∆1 ◦∆2 (supp a) = Γ1 ◦ Γ2 , we have T 1 (Γ1 ◦ Γ2 )−b 6= 0 by using Proposition 1.2(b).
Note that Γi is rigid for i = 1, 2 by Lemma 2.1(c).
Since T 1 (Γ1 ◦ Γ2 )−b 6= 0 we have (IΓ1 IΓ2 ) = IΓ1 ◦Γ2 6= 0. This implies that IΓi 6= 0
for i = 1, 2. Suppose b1 = 0. Since T 1 (Γ1 ◦ Γ2 )−b2 = T 1 (Γ2 )−b2 (see Proposition 2.9(b)), we have T 1 (Γ1 ◦ Γ2 )−b2 = 0, because Γ2 is rigid. This is a contradiction. Therefore b1 6= 0, and similarly b2 6= 0. Now Proposition 2.9(a) implies
eB ∪B (Γ1 ◦ Γ2 ) = ∅. By a similar argument used
that NB1 ∪B2 (Γ1 ◦ Γ2 ) 6= ∅ and N
1
2
eB (Γi ) = ∅ for i = 1, 2.
in Proposition 2.9, we have NBi (Γi ) 6= ∅ and MBi (Γi ) = N
i
Therefore, for i = 1, 2 the map λi : NBi (Γi ) → K, which maps each element of
NBi (Γi ) to 1, defines a nonzero element in Λ(Γi )−bi . Since Γi is rigid it follows from
Corollary 1.4(a) that |Bi | = 1 for i = 1, 2. Without loss of generality we may assume
that B1 = {x1 } and B2 = {y1 }. Then V (Γ1 ) \ {x1 } ∈ Γ1 and V (Γ2 ) \ {y1} ∈ Γ2 since
MBi (Γi ) = ∅ for i = 1, 2. Now we consider the following cases:
Case 1: |V (Γ1 )| = 1. Since IΓ1 is not zero we have IΓ1 = (x1 ) and so Γ1 is special.
Case 2: |V (Γ1 )| = 2. Assume V (Γ1 ) = {x1 , x2 }. Then {x2 } ∈ Γ1 . Since IΓ1 6= 0,
we have {x1 , x2 } ∈
/ Γ1 and since IΓ1 is rigid we have Γ1 6= h{x1 }, {x2 }i. Hence
Γ1 = h{x2 }i and IΓ1 = (x1 ). This implies that Γ1 is special again.
Case 3: |V (Γ1 )| ≥ 3. Since V (Γ1 ) \ {x1 } ∈ Γ1 , we have either Γ1 = hV (Γ1 ) \ {x1 }i
or Γ1 = hV (Γ1 ) \ {x1 }, F1 , . . . , Fk i, where k ≥ 1 and x1 ∈ Fj for j = 1, . . . , k. In the
first case we have IΓ1 = (x1 ) and we are done. In the second one, we set G = F1 \{x1 }.
Then linkΓ1 G = hV (Γ1 ) \ F1 , {x1 }i and V (linkΓ1 G) = (V (Γ1 ) \ F1 ) ∪ {x1 }. Write
V (Γ1 ) \ F1 = {x2 , . . . , xs }. Since linkΓ1 G is rigid, we have s ≥ 3 and so IlinkΓ1 G =
(x1 )(x2 , . . . , xs ) = x1 P . This also implies that Γ1 is special.
The similar argument is applied to Γ2 .
Corollary 2.11. (a) Let I be a squarefree monomial ideal and let P be a nonprincipal monomial prime ideal in a disjoint set of variables. Then IP is rigid if
and only if I is rigid.
16
(b) Let P1 , . . . Q
, Pt be monomial prime ideals generated by pairwise disjoint sets of
variables. Then ti=1 Pi is rigid if and only if at most one Pi is a principal ideal.
Proof. (a) Let ∆1 and ∆2 be two simplicial complexes with I∆1 = I and I∆2 = P .
Suppose IP is rigid. It follows from Theorem 2.10(a) that I is rigid. Conversely,
suppose that I is rigid. Note that the links of ∆2 correspond to monomial localizations of P by Lemma 2.1(c). Since monomial localization of P with respect to
any monomial prime ideal is never of the form (z) or zQ with Q a monomial prime
ideal, Theorem 2.10(b) yields the desired conclusion.
(b) follows immediately from (a).
Letterplace ideals. We conclude this section with applications to letterplace ideals.
In [4], letterplace and co-letterplace ideals are introduced and it is shown that these
are all inseparable monomial ideals. In this section we consider rigidity of this class
of ideals.
More generally, let P and Q be two partially ordered sets. A map ϕ : P → Q is
called isotone or order preserving, if p ≤ p′ implies ϕ(p) ≤ ϕ(p′ ). The set of isotone
maps is denoted by Hom(P, Q). Note that Hom(P, Q) is again a partially ordered
set with φ ≤ ψ if φ(p) ≤ ψ(p) for all p ∈ P.
We fix a field K and consider the polynomial ring S over K in the variables
xp,q with p ∈ P and q ∈ Q. Attached to P and Q we define the monomial ideal
L(P, Q) ⊆ S generated by the monomials
Y
uϕ =
xp,ϕ(p) , ϕ ∈ Hom(P, Q).
p∈P
Theorem 2.12. Let P and Q be finite posets. The following conditions are equivalent:
(a) L(P, Q) is rigid.
(b) No two distinct elements of P are comparable.
Proof. (a) ⇒ (b): Assume there exist a, b ∈ P with a < b. We consider the
monomial prime ideal P = (xp,q : p ∈ {a, b}, q ∈ Q), and claim that L(P, Q)(P ) =
L({a, b}, Q), where {a, b} is the poset with a < b. In fact, for any minimal generator
u ∈ L(P, Q)(P ), there exists ϕ ∈ Hom(P, Q) such that u is obtained from uϕ by
setting xp,ϕ(p) = 1 if p ∈
/ {a, b}, that is, u = xa,ϕ(a) xb,ϕ(b) . This proves L(P, Q)(P ) ⊆
L({a, b}, Q).
Conversely, let u = xa,c xb,d ∈ L({a, b}, Q), where c, d ∈ Q and c ≤ d. Let n = |P|.
Since any finite partial order can be extended to a total order, there exists an isotone
bijective map from P to [n], which we denote by f . We now define a map ϕ : P → Q
as follows:
c, if f (p) < f (b),
ϕ(p) =
d, otherwise.
Then ϕ ∈ Hom(P, Q) and ϕ(a) = c, ϕ(b) = d, and hence u ∈ L(P, Q)(P ). Thus our
claim follows.
It follows from Corollary 3.6 and its proof that S(P )/L({a, b}, Q) is not rigid.
Therefore, Lemma 2.1(b) implies that S/L(P, Q) is not rigid.
17
(b) ⇒ (a): Let P = {p1 , . . . , pm } with pi and pj incomparable for all i 6= j and
let Q = {q1 , . . . , qn }. Then
m
Y
L(P, Q) =
(xpi ,q1 , xpi ,q2 , . . . , xpi ,qn ).
i=1
Thus the assertion follows from Corollary 2.11(b).
For an integer n ∈ N we denote by [n] the totally ordered set {1 < 2 < · · · < n}.
The ideal L([n], P) is called the nth letterplace ideal, while L(P, [n]) is called the nth
co-letterplace ideal. They are Alexander dual to each other if we identify xi,p with
xp,i for any i ∈ [n] and p ∈ P. In particular, the facets of the simplicial complex
associated with L([n], P) are in bijection with the generators of L(P, [n]), and vice
versa.
Corollary 2.13. Let P a finite poset.
(a) L([n], P) is rigid if and only if n = 1.
(b) L(P, [n]) is rigid if and only if no two distinct elements of P are comparable.
3. Rigidity of graphs
In this section we apply the results of Section 1 to study the rigidity of edge ideals
of a graph.
Inseparable graphs. Let G be a finite simple graph with vertex set [n]. The edge
set of G will be denoted by E(G). Let K be a field and S = K[x1 , . . . , xn ] the
polynomial ring over K in n indeterminates x1 , . . . , xn . The edge ideal I(G) ⊆ S of
G is defined to be the ideal generated by all products xi xj with {i, j} ∈ E(G). Let
∆(G) be the simplicial complex with I(G) = I∆(G) Then
∆(G) = {F ⊆ [n] : F does not contain any edges of G},
The simplicial complex ∆(G) is called the independence complex of G. The faces of
∆(G) are called the independent sets of G.
We call G inseparable if I(G) is inseparable. Let i ∈ [n]. Then N(i) = {j : {j, i} ∈
E(G)} is called the neighborhood of i. We denote by G(i) the complementary graph
of the restriction GN (i) of G to N(i). In other words, V (G(i) ) = N(i) and E(G(i) ) =
{{j, k} : j 6= k, j, k ∈ N(i) and {j, k} 6∈ E(G)}. Note that G(i) is disconnected if
and only if N(i) = A ∪ B, where A, B 6= ∅, A ∩ B = ∅ and all vertices of A are
adjacent to those of B.
Theorem 3.1. The following conditions are equivalent:
(a) The graph G is inseparable;
(b) G(i) is connected for all i;
(c) T 1 (S/I(G))−ei = 0 for all i.
18
Proof. We set ∆ = ∆(G). By Theorem 1.8, it suffices to prove that G{i} (∆) is
connected if and only if G(i) is connected for each i. First we note that V (G(i) ) ⊆ [n]
and
V (G{i} (∆)) = {F ⊆ [n] : F is an independent set of G and F ∩ V (G(i) ) 6= ∅}.
Assume G(i) is connected. Given F1 , F2 ∈ V (G{i} (∆)), there exist k1 , k2 ∈ V (G(i) )
with ki ∈ Fi for i = 1, 2. Suppose that k1 = k2 . Then F1 , {k1}, F2 is a path in
G{i} (∆), and thus F1 is connected to F2 . Next suppose that k1 6= k2 . Since G(i)
is connected, there is a path k1 = j0 , j1 , . . . , js = k2 in G(i) . Note that {jℓ , jℓ+1 } ∈
V (G{i} (∆)) for all ℓ = 0, . . . , s − 1. Therefore,
F1 , {k1}, {j0 , j1 }, {j1 }, {j1 , j2 }, {j2 }, . . . , {js−1 , js }, {k2}, F2
is a path in G{i} (∆), and so F1 is connected to F2 . It follows that G{i} (∆) is
connected.
Conversely, assume that G{i} (∆) is connected. Given k1 , k2 ∈ V (G(i) ), there is a
path {k1 }, F1 , F2 , . . . , F2t−1 , {k2 } in G{i} (∆). Hence
{k1 } ⊆ F1 ⊇ F2 ⊆ F3 ⊇ . . . ⊆ F2t−1 ⊇ {k2 }.
We use the induction on t to show that there is a path from k1 to k2 in G(i) . If
t = 1 then {k1 , k2 } ⊆ F1 and so k1 is adjacent to k2 (in G(i) ). For t > 1, let
k0 ∈ F2 ∩ V (G(i) ). Then k1 is adjacent to k0 , and by induction hypothesis there is a
path in G(i) from k0 to k2 . Hence there is a path in G(i) from k1 to k2 and it follows
that G(i) is connected.
Considering the proof of Theorem 3.1 one even shows that the graphs G{i} (∆)
and G(i) have the same number of connected components.
Corollary 3.2. If G contains no triangle, then G is inseparable.
The conditions (α) and (β). Let G be a finite graph on the vertex set [n] and
∆(G) be the independence complex of G. Let A be a subset of [n]. Then link A of
∆(G) can be interpreted as the independence complex of a suitable graph if A is an
independent subset of G. In order to show this we introduce some notation.
The set
[
N(A) =
N(i)
i∈A
is called the neighborhood of A (in G), and the set
N[A] = A ∪ N(A)
is called the closed neighborhood of A (in G).
Let B ⊂ [n]. The induced subgraph of G with vertex set B, is the graph GB with
edges {i, j} ∈ E(G) and such that i, j ∈ B. An induced cycle of G is a cycle of G
which is of the form GB . By G \ A we denote the induced subgraph of G on the
vertex set [n] \ A.
Lemma 3.3. Let A ⊆ [n] be an independent subset of G. Then link∆(G) A is the
independence complex of the graph G \ N[A].
19
Proof. Note that F ∈ link∆(G) A if and only if F ⊆ [n] \ A and F ∪ A ∈ ∆(G). The
last condition is equivalent to saying that F ∪ A does not contain any edge of G.
Thus F ∈ link∆(G) A if and only if F ⊆ [n] \ N[A] and F does not contain any edge
of G. Since the set of edges of G in [n] \ N(A) is the same as the set of edges of G
in G \ N(A), the desired conclusion follows.
For a given subset B ⊆ [n], we may easily express the sets
eB (∆(G)) ⊆ NB (∆(G)) ⊆ [n]
N
in terms of G:
NB (∆(G)) = {F ⊆ [n] : F ∩ B = ∅, F contains no edges of G, but F ∪ B does},
eB (∆(G)) =
and N
{F ∈ NB (∆(G)) : there exists B ′ ( B such that F ∪ B ′ contains an edge of G}.
The following lemma lists some obvious properties of these sets.
Lemma 3.4. Let B ⊆ [n]. Then the following statements hold:
eB (∆(G)).
(a) If |B| ≥ 3 or |B| = 2 and B is not an edge of G, then NB (∆(G)) = N
eB (∆(G)) = ∅ if and only B is an
(b) If B is an edge, then ∅ ∈ NB (∆(G)), and N
isolated edge of G, i.e. it does not have a common vertex with any other edge of G.
Combining this lemma with Corollary 1.4 we obtain
Corollary 3.5. Let b ∈ {0, 1}n and let B = supp b. Suppose that |B| ≥ 2. Then
T 1 (∆(G))−b = 0 unless B is an isolated edge in G. On the other hand, if B is an
isolated edge in G, then T 1 (∆(G))−b is one-dimensional.
Let G be a graph on the vertex set [n]. Based on Theorem 3.1 and Corollary 3.5
we see that ∆(G) is ∅-rigid, (i.e., T 1 (∆(G))−b = 0 for every b ∈ {0, 1}n ) if and only
if G(i) is connected for all i ∈ [n] and G contains no isolated edge. Combining this
fact with Proposition 1.2 and Lemma 3.3 we obtain the following combinatorial conditions for a graph to be rigid: the graph G is rigid if and only if for all independent
sets A ⊆ V (G) one has:
(α) (G \ N[A])(i) is connected for all i ∈ [n] \ N[A];
(β) G \ N[A] contains no isolated edge.
It is obvious from Corollary 3.2 that any bipartite graph is inseparable and so
it satisfies the condition (α), since any induced graph of a bipartite graph is again
bipartite. But, by far, not all bipartite graphs are rigid. For example we have
Corollary 3.6. Let G be a Cohen–Macaulay bipartite graph (i.e., S/I(G) is Cohen–
Macaulay). Then G is not rigid.
Proof. By Proposition 2.3 we may assume that G is connected. By [8, Theorem
3.4] the graph G, after a suitable relabeling of its vertices, arises from a finite
poset P = {p1 , . . . , pn } as follows: V (G) = {p1 , . . . , pn , q1 , . . . , qn } and E(G) =
{{pi , qj } : pi ≤ pj }. We may assume that p1 is a minimal element in P . Let
A = {p2 , . . . , pn }. Then N[A] = {p2 , . . . , pn , q2 , . . . , qn }, and G \ N[A] = {p1 , q1 }. It
follows from (β) that G is not rigid.
20
Recall that a vertex v is called a free vertex if deg v = 1, and an edge e is called
a leaf if it has a free vertex. An edge e of G is called branch, if there exists a leaf e′
with e′ 6= e such that e ∩ e′ 6= ∅.
Let e = {i, j} ∈ E(G). We denote by N0 (e) the set (N(i) ∪ N(j)) \ {i, j}.
In the next proposition we present sufficient conditions for graph to satisfy (α) or
(β).
Proposition 3.7. Let G be a finite graph on the vertex set [n].
(a) Suppose that each vertex of a 3-cycle in G belongs to a leaf. Then G satisfies
(α), and hence G is inseparable. In particular, if G does not contain any
3-cycle, then G is inseparable.
(b) Suppose that each edge of G is a branch. Then G satisfies (β).
(c) Suppose that each edge of G is a branch and each vertex of a 3-cycle of G
belongs to a leaf. Then G is rigid.
Proof. (a) Suppose that (α) is not satisfied. Then there exists an independent set
A ⊆ [n] and i ∈ [n] \ N[A] such that N(i) ∩ [n] \ N[A] = B ∪ C with B, C 6= ∅ and
B ∩ C = ∅ and {j, k} ∈ E(G \ N[A]) ⊆ E(G) for all j ∈ B and all k ∈ C. Since
B, C 6= ∅ there exist j ∈ B and k ∈ C such that {j, k} ∈ E(G). Thus i is a vertex of
a 3-cycle in G. By assumption there exists a leaf {i, t} in G. Suppose that t ∈ N[A].
If t ∈ A then i ∈ N[A], a contradiction. Thus t ∈ N(A). Since deg t = 1 it follows
that i ∈ A, again a contradiction. Therefore we see that t ∈ [n] \ N[A]. This implies
that t ∈ B ∪ C. We may assume that t ∈ B. So {t, k} ∈ E(G), a contradiction since
N(t) = {i}.
It follows from Theorem 3.1 that G is inseparable if it satisfies (α). Suppose now
that G does not contain any 3-cycle. Then, by the first part of the statement, G
satisfies condition (α), and so it is inseparable.
(b) Suppose that G does not satisfy (β). Then there exists an independent set
A of the vertices of G such that G \ N[A] contains an isolated edge, say e = {i, j}.
We show that e is not a branch of G and so we get a contradiction. Let v ∈ N0 (e)
and let deg v = 1. Then we have either N(v) = {i} or N(v) = {j}. Without loss of
generality we may assume that N(v) = {i}. Since e is an isolated edge in G \ N[A]
we have v ∈ N[A]. Suppose that v ∈ A. Then {i} = N(v) ⊆ N(A), a contradiction.
Thus v ∈ N(A), and so there exists t ∈ A such that v ∈ N(t). Since N(v) = {i} it
follows that t = i. This implies that i ∈ A, which is again a contradiction. Hence
deg v ≥ 2, as desired.
(c) follows from (a) and (b).
Rigid graphs. The next two lemmata will help us to classify the rigid chordal graphs
and rigid graphs without induced cycles of length 4,5 or 6.
Recall that a graph G is chordal if any cycle of length ≥ 4 has chord. A chord of
a cycle C is an edge {i, j} of G with i, j ∈ V (C) which is not an edge of C
Lemma 3.8. Let G be a rigid graph on the vertex set [n], and let A be an independent
set of vertices of G. Then G \ N[A] is rigid.
21
Proof. Let B be an independent set of vertices of G \ N[A]. Then A ∪ B is an
independent set of vertices of G. Indeed, suppose that {i, j} ∈ E(G) for some i ∈ A
and some j ∈ B. Then j ∈ N(i) implies that j ∈ N(A) ⊆ N[A]. Since N[A] ∩B = ∅
it follows that j ∈
/ B which is a contradiction.
Clearly, N[A]∪N[B] = N[A∪B]. Thus, ([n]\N[A])\N[B] = [n]\N[A∪B]. Since
for any subset C of [n], G\C is an induced subgraph of G, we have (G\N[A])\N[B] =
G \ N[A ∪ B]. Since rigidity is characterized by (α) and (β), the statement follows.
Let G be a graph on the vertex set [n]. For each e = {i, j} ∈ E(G) we define the
set OG (e) as follows:
[
OG (e) = {v ′ : v ′ ∈
N(v), N(v ′ ) ∩ {i, j} = ∅}.
v∈N0 (e)
Lemma 3.9. Let G be a rigid graph on the vertex set [n] which does not contain
any induced 4-cycle, and let e = {i, j} be an edge of G which is not a branch. Then
OG (e) 6= ∅.
Proof. First we show that for all v ∈ N0 (e) we have N(v)\{i, j} =
6 ∅. Note that since
G is rigid the edge e is not isolated, and so N0 (e) 6= ∅. Suppose that there exists
v ∈ N0 (e) such that N(v) ⊆ {i, j}. Without loss of generality we may assume that
v ∈ N(i). Since e is not a branch we have deg v ≥ 2. It follows that N(v) = {i, j}.
Therefore G(v) consists of two isolated vertices i and j which contradicts the fact
that G is rigid.
Now suppose that OG (e) = ∅, i.e., for all v ∈ N0 (e) and for all v ′ ∈ N(v) we have
N(v ′ ) ∩ {i, j} =
6 ∅. Since N0 (e) 6= ∅ we may assume that there exists v ∈ N(i) with
v 6= j. As shown above N(v) \ {i, j} =
6 ∅. Suppose that for all v ′ ∈ N(v) \ {i, j}
we have i ∈ N(v ′ ). Then i is an isolated vertex in G(v) , a contradiction. Thus
there exists v ′ ∈ N(v) \ {i, j} such that v ′ ∈
/ N(i). Hence v ′ ∈ N(j) which implies
that v ∈ N(j) because G does not contain any induced 4-cycle. Since v ′ ∈ N(j) and
v ′ 6= i, j we have v ′ ∈ N0 (e). So N(v ′′ )∩{i, j} =
6 ∅ for all v ′′ ∈ N(v ′ ). As shown above
′
N(v ) \ {i, j} =
6 ∅. Suppose that there exists v ′′ ∈ N(v ′ ) \ {i, j} such that v ′′ ∈
/ N(j).
Then v ′′ ∈ N(i). It follows that G contains the induced 4-cycle with vertices i, j, v ′
and v ′′ , a contradiction. Consequently, v ′′ ∈ N(j) for all v ′′ ∈ N(v ′ ) \ {i, j}. Then j
′
is an isolated vertex in G(v ) , a contradiction. This completes the proof.
Theorem 3.10. Let G be a graph on the vertex set [n] such that G does not contain
any induced cycle of length 4, 5 or 6. Then G is rigid if and only if each edge of G
is a branch and each vertex of a 3-cycle of G belongs to a leaf.
Proof. By using part (c) of Proposition 3.7 it is enough to show that if a rigid graph
G does not contain any induced cycle of length 4, 5 or 6, then each edge of G is a
branch and each vertex of a 3-cycle of G belongs to a leaf.
Suppose that e = {i, j} ∈ E(G) is not a branch. By Lemma 3.9, OG (e) 6= ∅.
We claim that there exists A ⊆ OG (e) such that A is independent in G and e is an
isolated edge in G \ N[A]. This will imply that G is not rigid, a contradiction. Let
G′ be the induced subgraph of G on the vertex set OG (e) and let C1 , . . . , Cm be the
22
connected components of G′ . Let u, v ∈ V (Ck ) such that {u, v} ∈ E(G). We show
that either N(u) ∩ N0 (e) ⊆ N(v) ∩ N0 (e) or N(v) ∩ N0 (e) ⊆ N(u) ∩ N0 (e).
Assume that N(u) ∩ N0 (e) 6⊆ N(v) ∩ N0 (e). Then there exists x ∈ N(u) ∩ N0 (e)
such that {v, x} is not an edge in G. Without loss of generality we may assume that
i ∈ N(x).
Let y ∈ N(v) ∩ N0 (e), and first suppose that y ∈ N(i). Then we have the 5-cycle
with vertices i, x, u, v and y. Since v, u ∈ OG (e) it follows that {u, i}, {v, i} ∈
/ E(G)
and since {v, x} ∈
/ E(G) it follows that {u, y} ∈ E(G) because G does not contain
any induced cycle of length 4 and 5. Therefore y ∈ N(u) ∩ N0 (e). On the other
hand if y ∈ N(j), then we have the 6-cycle with vertices i, x, u, v, y and j. Note
that {v, x}, {u, i}, {u, j}, {v, i}, {v, j} ∈
/ E(G). This implies that {v, y} ∈ E(G)
since G does not contain any induced cycle of length 4, 5 and 6. Thus either
N(u) ∩ N0 (e) ⊆ N(v) ∩ N0 (e) or N(v) ∩ N0 (e) ⊆ N(u) ∩ N0 (e), as desired.
Now given Ck we choose a maximal set Dk = {u1 , . . . , ul } ⊆ V (Ck ) with the
property that the sets N(ur ) ∩ N0 (e) are pairwise different. After having defined the
set Dk for each Ck we are ready to define the set A.
We let A be the unique subset of OG (e) such that A ∩ Ck consists of all elements
ur ∈ Dk with the property that N(ur ) ∩ N0 (e) 6⊆ N(us ) ∩ N0 (e) for all us ∈ Dk with
s 6= r.
In order to complete the proof we show that A is independent in G and e is an
isolated edge in G \ N[A]. Let u, v ∈ a and assume that {u, v} ∈ E(G). Then there
exists k such that u, v ∈ Dk ⊆ V (Ck ). Therefore either N(u)∩N0 (e) ⊆ N(v)∩N0 (e)
or N(v) ∩ N0 (e) ⊆ N(u) ∩ N0 (e). Thus by the choice of A, it follows that u = v, a
contradiction. So A is an independent set of G.
Finally we show that e is an isolated edge of G′′ := G \ N[A]. Note that for
any v ∈ N0 (e) ∩ V (G′′ ) and for any v ′ ∈ N(v) \ {i, j} we have N(v ′ ) ∩ {i, j} 6= ∅.
In fact, suppose that there exists v1 ∈ N(v) such that N(v1 ) ∩ {i, j} = ∅. So
v1 ∈ V (Ck ) for some k. If v1 ∈ A, then v ∈ N(A) ⊆ N[A], a contradiction. Hence
v1 ∈
/ A. Therefore, by the choice of A, there exists v2 ∈ A such that N(v1 ) ∩ N0 (e) ⊆
N(v2 )∩N0 (e). Since v ∈ N(v1 )∩N0 (e) we have v ∈ N(v2 ) and so v ∈ N(A) ⊆ N[A],
a contradiction. This shows that OG′′ (e) = ∅.
Suppose that e is not an isolated edge of G′′ , i.e., N0 (e) ∩ V (G′′ ) 6= ∅. We observe
that e is not a branch in G′′ . Indeed, if e is a branch, then since e is not isolated,
there exists v ∈ N0 (e) ∩ V (G′′ ) such that degree of v in G′′ is one. We may assume
that v ∈ N(i) \ N(j). Since e is not a branch in G we have N(v) \ {i, j} =
6 ∅ and
for any v ′ ∈ N(v) \ {i, j} we have v ′ ∈ N[A]. This implies that for any v ′ ∈ N(v),
v ′ ∈ N(A) because if v ′ ∈ a, then v ∈ N(A) ⊆ N[A] and hence v ∈
/ V (G′′ ), a
contradiction. As seen in the previous paragraph, for any v ′ ∈ N(v) \ {i, j} we have
N(v ′ ) ∩ {i, j} 6= ∅. If v ′ ∈
/ N(i), then v ′ ∈ N(j). Since v ∈
/ N(j) we will get the
induced 4-cycle with the vertices i, v, v ′ and j, a contradiction. So v ′ ∈ N(i) for
any v ′ ∈ N(v). It follows that i is an isolated vertex in G(v) , a contradiction. Thus
e is not a branch in G′′ .
Lemma 3.8 implies that G′′ is rigid and hence by Lemma 3.9 it follows that
OG′′ (e) 6= ∅, a contradiction. So indeed e is isolated in G′′ .
23
Now we prove that each vertex of a 3-cycle of G belongs to a leaf. Suppose that
there exists i ∈ [n], i belongs to a 3-cycle in G and it does not belong to a leaf. So for
all v ∈ N(i) we have deg v ≥ 2. Let j and k be the two other vertices of this 3-cycle.
If N(i) = {j, k}, then j and k are isolated vertices of G(i) , contradicting (α). So
N(i) \ {j, k} =
6 ∅. Since each edge of the graph G is a branch, for any v ∈ N(i) the
edge {i, v} is a branch. Since i does not belong to a leaf it follows that any v ∈ N(i)
belongs
S to a leaf. Thus for any v ∈ N(i) there exists iv ∈ N(v) with deg iv = 1. Set
a = v∈N (i)\{j,k} {iv }. Clearly, A is an independent set of the vertices of G and j, k
are two isolated vertices in (G \ N[A])(i) , a contradiction. Consequently, i belongs
to a leaf, as desired.
Corollary 3.11. Let G be a chordal graph. Then G is rigid if and only if each edge
of G is a branch and each vertex of a 3-cycle of G belongs to a leaf.
Corollary 3.12. Let G be a graph on the vertex set [n]. Suppose that all cycles of
G have length ≥ 7 (which for example is the case when G is a forest). Then G is
rigid if and only if each edge of G is a branch.
Proof. Since G does not contain any 3-cycle, the statement follows from Theorem 3.10.
As another application we have
Corollary 3.13. Let C be a cycle. Then C is rigid if and only if C is a 4-cycle or
a 6-cycle.
Proof. Suppose that |C| =
6 4, 5, 6. Then by Theorem 3.10, C is not rigid. Suppose
now that |C| = 5. Then C \ N[A] is an isolated edge, where A = {i} for some vertex
i of C, and hence the condition (β) is not satisfied. So C is not rigid also when
|C| = 5. In conclusion, C is not rigid if |C| ∈
/ {4, 6}.
Next suppose that |C| ∈ {4, 6}. Since C does not contain a 3-cycle, it follows
that C satisfies (α) by Proposition 3.7(a).
Note that for any nonempty independent subset A of V (C), C \ N[A] is either an
empty graph (i.e., a graph containing no edge) or a path of length 3. Therefore, the
cycle C also satisfies the condition (β). Hence C is rigid.
Acknowledgement: We would like to express our deep gratitude to the referee
for his/her careful reading and for his/her excellent advices, which improved the
presentation of this paper considerably.
References
[1] K. Altmann, J.A. Christophersen, Deforming Stanley-Reisner schemes, Math. Ann. 348(3)
(2010), 513–537.
[2] K. Altmann, J.A. Christophersen, Cotangent cohomology of Stanley-Reisner rings. Manuscripta
Math. 115(3) (2004), 361–378.
[3] V. Ene, J. Herzog, F. Mohammadi, Monomial ideals and toric rings of Hibi type arising from
a finite poset, European Journal of Combinatorics 32(3) (2011), 404–421.
[4] G. Fløystad, B.M. Greve, J. Herzog, Letterplace and co-letterplace ideals of posets,
http://arxiv.org/abs/1501.04523v1
24
[5] D. Eisenbud, Commutative Algebra with a View Toward Algebraic Geomtry, Springer, 1994.
[6] J. Herzog, Deformation von Cohen-Macaulay Algebren, Journal fr die reine und angewandte
Mathematik 318 (1980), 83–105.
[7] J. Herzog, and T. Hibi, Monomial Ideals, Graduate Text in Mathematics, Springer, 2011.
[8] J. Herzog, T. Hibi, Distributive lattices, bipartite graphs and Alexander duality, J. Algebraic
Combin. 22(3) (2005), 289–302.
[9] S. Lichtenbaum, M. Schlessinger, The Cotangent Complex of a Morphism , Trans. Amer. Math.
Soc. 128(1) (1967), 41–70.
[10] J. Stevens, Deformations of singularities, Lecture Notes in Mathematics (1811), Berlin:
Springer, 2003.
Klaus Altmann, Institut für Mathematik, Freie Universität Berlin, Arnimallee
3, D-14195 Berlin, Germany
E-mail address: [email protected]
Mina Bigdeli, Department of Mathematics, Institute for Advanced Studies in
Basic Sciences (IASBS), Gava zang, 45195-1159 Zanjan, 45137-66731 Iran
E-mail address: [email protected]
Jürgen Herzog, Fakultät für Mathematik, Universität Duisburg-Essen, 45117
Essen, Germany
E-mail address: [email protected]
Dancheng Lu, Department of Mathematics, Soochow University, 215006 Suzhou,
P.R.China
E-mail address: [email protected]
25
| 0math.AC
|
1
Decentralized Online Learning with Kernels
Alec Koppel§ , Santiago Paternain? , Cédric Richard† and Alejandro Ribeiro?
arXiv:1710.04062v1 [math.OC] 11 Oct 2017
Abstract
We consider multi-agent stochastic optimization problems over reproducing kernel Hilbert spaces (RKHS).
In this setting, a network of interconnected agents aims to learn decision functions, i.e., nonlinear statistical
models, that are optimal in terms of a global convex functional that aggregates data across the network, with
only access to locally and sequentially observed samples. We propose solving this problem by allowing each agent
to learn a local regression function while enforcing consensus constraints. We use a penalized variant of functional
stochastic gradient descent operating simultaneously with low-dimensional subspace projections. These subspaces
are constructed greedily by applying orthogonal matching pursuit to the sequence of kernel dictionaries and weights.
By tuning the projection-induced bias, we propose an algorithm that allows for each individual agent to learn, based
upon its locally observed data stream and message passing with its neighbors only, a regression function that is
close to the globally optimal regression function. That is, we establish that with constant step-size selections agents’
functions converge to a neighborhood of the globally optimal one while satisfying the consensus constraints as
the penalty parameter is increased. Moreover, the complexity of the learned regression functions is guaranteed to
remain finite. On both multi-class kernel logistic regression and multi-class kernel support vector classification with
data generated from class-dependent Gaussian mixture models, we observe stable function estimation and state of
the art performance for distributed online multi-class classification. Experiments on the Brodatz textures further
substantiate the empirical validity of this approach.
I. I NTRODUCTION
We consider decentralized online optimization problems: a network G = (V, E) of agents aims to
minimize a global objective that is a sum of local convex objectives available only to each node.
The problem is online and distributed because data samples upon which the local objectives depend
are sequentially and locally observed by each agent. In this setting, agents aim to make inferences
as well as one which has access to all data at a centralized location in advance. Instead of assuming
agents seek a common parameter vector w ∈ Rp , we focus on the case where agents seek to learn a
common decision function f (x) that belong to a reproducing kernel Hilbert space (RKHS). Such functions
represent, e.g., nonlinear statistical models [2] or trajectories in a continuous space [3]. Learning in multiagent settings arises predominately in two technological settings: industrial-scale machine learning, where
optimizing statistical model parameters is decentralized across a parallel processing architecture to attain
computational speedup; and networked intelligent systems such as sensor networks [4], multi-robot teams
[5], [6], and Internet of Things [7], [8]. In the later setting, decentralized processing justified as opposed
to using a fusion center when the communication cost of centralization exceeds the cost of distributed
information protocols. This is true of multi-agent systems with streaming data considered here.
Efforts to develop optimization tools for multi-agent online learning have thus far been restricted to
the case where each agent learns a linear statistical model [9] or a task-driven dictionary [10] that is
as good as one with data aggregated across the network. However, these efforts exclude the state of the
art tools for statistical learning based on nonlinear interpolators: namely, kernel methods [11], [12] and
neural networks [13], [14]. We note that instabilities associated with non-convexity which are only a
minor issue in centralized settings [15] become both theoretically and empirically difficult to overcome
This work in this paper is supported by NSF CCF-1017454, NSF CCF-0952867, ONR N00014-12-1-0997, ARL MAST CTA, and ASEE
SMART.Part of the results in this paper appeared in [1].
§
Computational and Information Sciences Directorate, U.S. Army Research Laboratory, Adelphi, MD, 20783. Email:
[email protected]
?
Department of ESE, University of Pennsylvania, 200 South 33rd Street, Philadelphia, PA 19104. Email: {spater, aribeiro}@seas.upenn.edu
†
Laboratory Lagrange - UMR CNRS 7293, Observatory of the French Riviera University of Nice Sophia-Antipolis, Nice, France, 06108
2
in settings with consensus constraints [10], and therefore efforts to extend neural network learning to
multi-agent online learning likely suffer the same drawbacks.1 Therefore, we focus on extending kernel
methods to decentralized online settings, motivated both by its advantageous empirical performance, as
well as the theoretical and practical benefits of the fact that the optimization problem defined by their
training is convex. This stochastic convex problem, however, is defined over an infinite dimensional space,
and therefore it is not enough to solve the optimization problem, but one must also solve it in an optimally
sparse way. Doing so in multi-agent settings is the goal of this work.
To contextualize our solution methodology, consider centralized vector-valued stochastic convex programming, which has classically been solved with stochastic gradient descent (SGD) [16]. SGD involves
descending along the negative of the stochastic gradient rather than the true gradient to avoid the fact that
computing the gradient of the average objective has complexity comparable to the training sample size,
which could be infinite. In contrast, the setting considered in this work is a stochastic program defined
over a function space, which is in general an intractable variational inference problem. However, when
the function space is a RKHS [17], the Representer Theorem allows us to transform a search over an
infinite space into one over a set of weights and data samples [18]. Unfortunately, the feasible set of the
resulting problem has complexity comparable to the sample size N , and thus is intractable for N → ∞
[19]. Compounding this problem is that the storage required to construct the functional generalization of
SGD is comparable to the iteration index of the algorithm, which is untenable for online settings.
Efforts to mitigate the complexity of the function representation (“the curse of kernelization”) have
been previously developed. These combine functional extensions of stochastic gradient method with
compressions of the function parameterization independently of the optimization problem to which they are
applied [20]–[24] or approximate the kernel during training [25]–[29], and at best converge on average.
In contrast, a method was recently proposed that combines greedily constructed [30] sparse subspace
projections with functional stochastic gradient method and guarantees exact convergence to the minimizer
of the average risk functional. This technique, called parsimonious online learning with kernels (POLK),
tailors the parameterization compression to preserve the descent properties of the underlying RKHS-valued
stochastic process [31], and inspires the approach considered here.
In this work, we extend the ideas in [31] to multi-agent settings. Multiple tools from distributed
optimization may be used to do so; however, we note that the Representer Theorem [18] has not been
established for general stochastic saddle point problems in RKHSs. Therefore, we adopt an approximate
primal-only approach based on penalty methods [32], [33], which in decentralized optimization is known
as distributed gradient descent (DGD). Using functional stochastic extensions of DGD, together with the
greedy Hilbert subspace projections designed in POLK, we develop a method such that each agent, through
its local data stream and message passing with only its neighbors, learns a memory-efficient approximation
to the globally optimal regression function with probability 1. Such global stability guarantees are in
contrast to specialized results for multi-agent kernel learning [34], [35] and alternative distributed online
nonlinear function estimation methods such as dictionary learning [10], [15], [36] or neural networks [14],
which suffer from instability due to the non-convexity of the optimization problem their training defines.
The result of the paper is organized as follows. In Section II we clarify the problem setting of stochastic
programming in RKHSs in the centralized and decentralized case. In Section III, we propose a new
penalty functional that permits deriving a decentralized online method for kernel regression without any
complexity bottleneck by making use of functional stochastic gradient method (Section III-A) combined
with greedy subspace projections (Section III-B). In Section IV we present our main theoretical results,
which establishes that the function sequence of each agent generated by the proposed technique converges
to a neighborhood of the globally optimal function with probability 1. In Section V, we present numerical
examples of decentralized online multi-class kernel logistic regression and kernel support vector machines
with data generated from Gaussian mixtures, and observe a state of the art trade-off between Lyapunov
1
In general, globally convergent decentralized online training of neural networks is an open problem, whose solution requires fundamentally
new approaches to stochastic global optimization.
3
stability and statistical accuracy. We then apply the resulting method to the benchmark Brodatz texture
dataset [37] and observe state of the art decentralized online multi-class classification performance.
II. P ROBLEM F ORMULATION
A. Decentralized Functional Stochastic Programming
Consider the problem of expected risk minimization, where the goal is to learn a regressor that minimizes
a loss function quantifying the merit of a statistical model averaged over a data set. We focus on the case
when the number of training examples N is very large or infinite. In this work, input-output examples,
(xn , yn ), are i.i.d. realizations drawn from a stationary joint distribution over the random pair (x, y) ∈
X × Y, where X ⊂ Rp and Y ⊂ R. Here, we consider finding regressors that are not vector valued
parameters, but rather functions f˜ ∈ H in a hypothesized function class H, which allows for learning
nonlinear statistical models rather than generalized linear models that rarely achieve satisfactory statistical
error rates in practice [12], [38]. The merit of the function f˜ is evaluated by the convex loss function
` : H×X ×Y → R that quantifies the merit of the estimator f˜(x̃) evaluated at feature vector x̃. This loss is
averaged over all possible training examples to define the statistical loss L̃(f˜) := Ex,y [`(f˜(x), y)], which
we combine with a Tikhonov regularizer to construct the regularized loss R̃(f˜) := argminf˜∈H L̃(f˜) +
(λ/2)kf˜k2H [39], [40]. We then define the optimal function as
h
i λ
(1)
f˜∗ = argmin R̃(f˜) := argmin Ex̃,ỹ `(f˜ x̃), ỹ + kf˜k2H
2
f˜∈H
f˜∈H
In this work, we focus on extensions of the formulation in (1) to the case where data is scattered across
an interconnected network that represents, for instance, robotic teams [10], communication systems [41],
or sensor networks [4]. To do so, we define a symmetric, connected, and directed network G = (V, E)
with |V| = V nodes and |E| = E edges and denote as ni := {j : (i, j) ∈ E} the neighborhood of agent
i. For simplicity we assume that the number of edges E is even. Each agent i ∈ V observes a local data
sequence as realizations (xi,n , yi,n ) from random pair (xi , yi ) ∈ X × Y and seeks to learn a common
globally optimal regression function f . This setting may be mathematically captured by associating to
each node i a convex loss functional `i : H × X × Y → R that quantifies the merit of the estimator fi (xi )
evaluated at feature vector xi , and defining the goal for each node as the minimization of the common
global loss
h
X
i λ
∗
2
f = argmin
Exi ,yi `i (f xi ), yi + kf kH
(2)
2
f ∈H
i∈V
Observe that this global loss is a network-wide average (scaled by V ) of all local losses, and therefore the
minimizers of (1) and (2) coincide when (xi , yi ) have a common joint distribution for each i. However,
in multi-agent optimization, this is not generally the case, thus when selecting a regression function f
with only local data, different agents will learn a different decision function fi∗ that it is not optimal
as compared to one selected in a centralized manner, i.e., with the data gathered by all agents. To
overcome this limitation we allow message passing between agents and we impose a consensus constraint
on the regression function among neighbors fi = fj , (i, j) ∈ E. Thus we consider the nonparametric
decentralized stochastic program:
h
X
i λ
∗
2
f = argmin
Exi ,yi `i (fi x), yi + kfi kH
2
{fi }⊂H
i∈V
such that
fi = fj , (i, j) ∈ E
(3)
For further define the product Hilbert space HV of functions aggregated over the network whose elements
are stacked functions f (·) = [f1 (·); · · · ; fV (·)] that yield vectors of length V when evaluated at local
random vectors f (x) = [f1 (x1 ); · · · ; fV (xV )] ∈ RV . Moreover, define the stacked random vectors x =
4
[x1 ; · · · ; xV ] ∈ X V ⊂ RV p and y = [y1 ; · · · yV ] ∈ RV that represents V labels or physical measurements,
for instance.
The goal of this paper is to develop an algorithm to solve (3) in distributed online settings where nodes
do not know the distribution of the random pair (xi , yi ) but observe local independent training examples
(xi,n , yi,n ) sequentially.
B. Function Estimation in Reproducing Kernel Hilbert Spaces
The optimization problem in (1), and hence (3), is intractable in general, since it defines a variational
inference problem integrated over the unknown joint distribution P(x, y). However, when H is equipped
with a reproducing kernel κ : X × X → R (see [12], [42]), a function estimation problem of the form
(1) may be reduced to a parametric form via the Representer Theorem [19], [43]. Thus, we restrict the
Hilbert space in Section II-A to be one equipped with a kernel κ that satisfies for all functions f˜ : X → R
in H:
(i) hf˜, κ(xi , ·))iH = f˜(xi ), (ii) H = span{κ(xi , ·)}
(4)
for all xi ∈ X . Here h·, ·iH denotes the Hilbert inner product for H. Further assume that the kernel
is positive semidefinite, i.e. κ(xi , x0i ) ≥ 0 for all xi , x0i ∈ X . Function spaces of this type are called
reproducing kernel Hilbert spaces (RKHS).
In (4), property (i) is the reproducing property (via Riesz Representation Theorem [43]). Replacing f˜
by κ(x0i , ·) in (4) (i) yields hκ(x0i , ·), κ(xi , ·)iH = κ(xi , x0i ) which is the origin of the term “reproducing
kernel.” This property induces a nonlinear transformation of the input space X : denote by φ(·) a nonlinear
map of the feature space that assigns to each xi the kernel function κ(·, xi ). The reproducing property
yields that the inner product of the image of distinct feature vectors xi and x0i under the map φ requires
only kernel evaluations: hφ(xi ), φ(x0i )iH = κ(xi , x0i ) (the ’kernel trick’).
Moreover, property (4) (ii) states that functions f˜ ∈ H may be written as a linear combination of kernel
evaluations. For kernelized and regularized empirical risk minimization (ERM), the Representer Theorem
[17], [18] establishes that the optimal f˜ in hypothesized function class H admit an expansion in terms of
kernel evaluations only over training examples
N
X
˜
f (xi ) =
wi,n κ(xi,n , xi ) ,
(5)
n=1
T
N
where wi = [wi,1 , · · · , wi,N ] ∈ R denotes a set of weights. The upper index N in (5) is referred
to as the model order, and for ERM the model order and training sample size are
d equal. Common
choices κ include the polynomial and radial basis kernels, i.e., κ(xi , x0i ) = xTi x0i + b and κ(xi , x0i ) =
exp{−kxi − x0i k22 /2d2 }, respectively, where xi , x0i ∈ X .
Suppose, for the moment, that we have access to N i.i.d. realizations of the random pairs (xi , yi ) for
each agent i such that the expectation in (3) is computable, and we further ignore the consensus constraint.
Then the objective in (3) becomes:
N
1 XX
λ
`(fi (xi,n ), yi,n ) + kfi k2H
f = argmin
2
f ∈HV N n=1 i∈V
∗
(6)
Then, by substituting the Representer Theorem [cf. (5)] into (3), we obtain that optimizing in HV reduces
to optimizing over the set of N V weights:
N
1XX
λ
f ∗=argmin
`i (wiTκXi(xi,n),yi,n)+ wiT KXi ,Xiwi ,
2
{wi}∈RN Nn=1 i∈V
(7)
where we have defined the Gram (or kernel) matrix KXi ,Xi ∈ RN ×N , with entries given by the kernel
evaluations between xi,m and xi,n as [KXi ,Xi ]m,n = κ(xi,m , xi,n ). We further define the vector of kernel
5
evaluations κXi (·) = [κ(xi,1 , ·) . . . κ(xi,N , ·)]T , which are related to the kernel matrix as KXi ,Xi =
[κXi (xi,1 ) . . . κXi (xi,N )]. The dictionary of training points associated with the kernel matrix is defined as
Xi = [xi,1 , . . . , xi,N ].
By exploiting the Representer Theorem, we transform a nonparametric infinite dimensional optimization problem in HV (6) into a finite N V -dimensional parametric problem (7). Thus, for empirical risk
minimization, the RKHS provides a principled framework to solve nonparametric regression problems as
a search over RV N for an optimal set of coefficients.
However, to solve problems of the form (6) when training examples (xi,n , yi,n ) become sequentially
available or their total number N is not finite, the objective in (6) becomes an expectation over random
pairs (xi , yi ) as [11]
X
X
f ∗ = argmin
Exi ,yi [`i (
wi,n κ(xi,n , xi ), yi )]
wi ∈RI ,{xi,n }n∈I i∈V
n∈I
λ X
wi,n wi,m κ(xi,m , xi,n )k2H ,
+ k
2 n,m∈I
(8)
where we substitute the Representer Theorem generalized to the infinite sample-size case established in
[19] into the objective (3) with I as some countably infinite indexing set. That is, as the data sample size
N → ∞, the representation of fi becomes infinite as well. Thus, our goal is to solve (8) in an approximate
manner such that each fi admits a finite representation near fi∗ , while satisfying the consensus constraints
fi = fj for (i, j) ∈ E (which were omitted for the sake of discussion between (6) - (8)).
III. A LGORITHM D EVELOPMENT
We turn to developing an online iterative and decentralized solution to solving (3) when the functions
{fi }i∈V are elements of a RKHS, as detailed in Section II-B. To exploit the properties of this function
space, we require the applicability of the Representer Theorem [cf. (5)], but this result holds for any
regularized minimization problem with a convex functional. Thus, we may address the consensus constraint
fi = fj , (i, j) ∈ E in (3) by enforcing approximate consensus on estimates fi (xi ) = fj (xi ) in expectation.
This specification may be met by introducing the penalty functional
h
X
i λ
ψc (f ) =
Exi ,yi `i (fi xi ), yi + kfi k2H
2
i∈V
cX
2
(9)
+
Ex [fi (xi )−fj (xi )]
2j∈n i
i
The reasoning for the definition (9) rather than one that directly addresses the consensus constraint
deterministically is given in Remark 1, motivated by following the algorithm derivation. For future
reference, we also define the local penalty as
h
i λ
ψi,c (fi ) = Exi ,yi `i (fi xi ), yi + kfi k2H
2
cX
+
Exi [fi (xi )−fj (xi )]2
(10)
2j∈n
i
P
and we observe from (9) - (10) that ψc (f ) = i ψi,c (fi ). Further define fc∗ = argminf ∈HV ψc (f ). We
note that in the vector-valued decision variable case, other techniques to address the constraint in (3) are
possible such as primal-dual methods [9] or dual methods [44], but the Representer Theorem has not been
established for RKHS-valued stochastic saddle point problems. It is an open question whether expressions
of the form (5) apply to problems with general functional constraints, but this matter is beyond the scope
of this work. Therefore, these other approaches which make use of Lagrange duality do not readily extend
to the nonparametric setting considered here.
6
Algorithm 1 Greedy Projected Penalty Method
Require: {xt , yt , ηt , t }t=0,1,2,...
initialize fi,0 (·) = 0, Di,0 = [], w0 = [], i.e. initial dictionary, coefficients are empty for each i ∈ V
for t = 0, 1, 2, . . . do
loop in parallel for agent i ∈ V
Observe local training example realization (xi,t , yi,t )
Send obs. xi,t to nodes j ∈ ni , receive scalar fj,t (xi,t )
Receive obs. xj,t from nodes j ∈ ni , send fi,t (xj,t )
Compute unconstrained stochastic grad. step [cf. (22)]
f˜i,t+1 (·) = (1 − ηt λ)fi,t − ηt ∇fi ψ̂i,c (fi (xi,t ), yi,t ) .
Update params: D̃i,t+1 = [Di,t , xi,t ], w̃i,t+1 [cf. (23)]
Greedily compress function using matching pursuit
(fi,t+1, Di,t+1,wi,t+1) = KOMP(f˜i,t+1 ,D̃i,t+1 ,w̃i,t+1 ,t)
end loop
end for
A. Functional Stochastic Gradient Method
Given that the data distribution P(x, y) is unknown, minimizing ψc (f ) directly via variational inference is not possible. Rather than postulate a specific distribution for (x, y), we only assume access to
sequentially available (streaming) independent and identically distributed samples (xt , yt ) from their joint
density. Then, we may wield tools from stochastic approximation to minimize (9), which in turn yields
a solution to (3). Begin by defining, ψ̂c (f (xt ), yt ), the stochastic approximation of the penalty function
ψc (f ), evaluated at a realization (xt , yt ) of the stacked random pair (x, y):
X
λ
`i (fi xi,t ), yi,t + kfi k2H
ψ̂c (f (xt ), yt ) =
2
i∈V
X
c
+
(fi (xi,t )−fj (xi,t ))2
(11)
2 j∈n
j
and the local instantaneous penalty function ψ̂i,c (fi (xi,t ), yi,t ) similarly. To compute the functional stochastic gradient of ψc (f ) evaluated at a sample point (xt , yt ), we first address the local loss `i (fi xi,t ), yi,t )
in (11) as [22], [31]:
∇fi `i (fi (xi,t ), yi,t )(·) =
∂`i (fi (xi,t ), yi,t ) ∂fi (xi,t )
(·)
∂fi (xi,t )
∂fi
(12)
where we have applied the chain rule. Now, define the short-hand notation
`0i (fi (xi,t ), yi,t ) := ∂`i (fi (xi,t ), yi,t )/∂fi (xi,t )
for the derivative of `i (f (xi,t ), yi,t ) with respect to its first scalar argument fi (xi,t ) evaluated at xi,t . To
evaluate the second term on the right-hand side of (12), differentiate both sides of the expression defining
the reproducing property of the kernel [cf. (4)(i)] with respect to fi to obtain
∂fi (xi,t )
∂hfi , κ(xi,t , ·)iH
=
= κ(xi,t , ·)
∂fi
∂fi
(13)
7
Then, given (12) - (13), we may compute the overall gradient of the instantaneous penalty function
ψ̂c (f (xt ), yt ) in (11) as
h
∇f ψ̂c (f (xt ), yt ) = vec `0i (fi (xi,t ), yi,t )κ(xi,t , ·)+ λfi
(14)
i
X
+c (fi (xi,t )−fj (xi,t ))κ(xi,t , ·)
j∈ni
where on the right-hand side of (14), we have defined the vector stacking notation vec[·] to denote the
stacking of V component-wise functional gradients, each associated with function fi , i ∈ V, and used the
fact that the variation of the instantaneous approximate of the cross-node term, [fi (xi )−fj (xi )]2 , by the
same reasoning as (12) - (13), is 2[fi (xi,t )−fj (xi,t )]κ(xi,t , ·). With this computation in hand, we present
the stochastic gradient method for the λ-regularized multi-agent expected risk minimization problem in
(3) as
h
ft+1 = (1 − ηt λ)ft − ηt vec `0i (fi,t (xi,t ), yi,t )κ(xi,t , ·)
i
X
+c (fi,t (xi,t )−fj,t (xi,t ))κ(xi,t , ·) ,
(15)
j∈ni
where ηt > 0 is an algorithm step-size either chosen as diminishing with O(1/t) or a small constant –
see Section IV. We may glean from (15) that the update for the network-wide P
function ft decouples into
ones for each agent i ∈ V, using the node-separability of the penalty ψc (f ) = i ψi,c (fi ), i.e.,
h
fi,t+1 = (1 − ηt λ)fi,t − ηt `0i (fi,t (xi,t ), yi,t )κ(xi,t , ·)
i
X
+c (fi,t (xi,t )−fj,t (xi,t ))κ(xi,t , ·) .
(16)
j∈ni
We further require that, given λ > 0, the step-size satisfies ηt < 1/λ and the global sequence is initialized
as f0 = 0 ∈ HV . With this initialization, the Representer Theorem (5) implies that, at time t, the function
fi,t admits an expansion in terms of feature vectors xi,t observed thus far as
fi,t (x) =
t−1
X
T
wi,n κ(xi,n , x) = wi,t
κXi,t (x) .
(17)
n=1
On the right-hand side of (17) we have introduced the notation Xi,t = [xi,1 , . . . , xi,t−1 ] ∈ Rp×(t−1) ,
κXi,t (·) = [κ(xi,1 , ·), . . . , κ(xi,t−1 , ·)]T , and wi,t = [wi,1 , . . . wi,t−1 ] ∈ Rt−1 . Moreover, observe that the
kernel expansion in (17), taken together with the functional update (15), yields the fact that performing the
stochastic gradient method in HV amounts to the following V parallel parametric updates on the kernel
dictionaries Xi and coefficients wi :
Xi,t+1 = [Xi,t , xi,t ] ,
(
(1
− ηt λ)[wi,t ]u for 0 ≤ u ≤ t − 1
P
[wi,t+1 ]u=
0
−ηt `i (fi,t (xi,t),yi,t)+c j∈ni(fi,t (xi,t)−fj,t (xi,t)) ,
(18)
where the second case on the last line of (18) is for u = t. Observe that this update causes Xi,t+1 to have
one more column than Xi,t . We define the model order as number of data points Mi,t in the dictionary
of agent i at time t (the number of columns of Xt ). FSGD is such that Mi,t = t − 1, and hence grows
unbounded with iteration index t. Next we address this intractable memory growth such that we may
execute stochastic descent through low-dimensional projections of the stochastic gradient, inspired by
[31]. First, we clarify the motivation for the choice of the penalty function (9).
8
Remark 1 In principle, it is possible to address the RKHS-valued consensus constraint in (3) directly,
through primal-only stochastic methods, by introducing the penalty function
h
X
i λ
cX
kfi −fj k2H
(19)
ψ̃c (f ) =
Exi ,yi `i (fi xi ), yi + kfi k2H +
2
2
j∈n
i∈V
i
Observe, however, that FSGD applied to (19), using comparable reasoning to that which leads to (16)
from (9), yields
h
fi,t+1 = (1 − ηt λ)fi,t − ηt ∇fi `0i (fi,t (xi,t ), yi,t )κ(xi,t , ·)
i
X
+c (fi,t −fj,t ) .
(20)
j∈ni
Unfortunately, we cannot inductively define a parametric representation of (20) for node i in terms of its
own kernel dictionaries and weights independently of the entire function associated to node j, since the
last term in (20) lives directly in the Hilbert space. Thus, to implement (20) each agent would need to store
the entire kernel dictionary and weights of all its neighbors at each step, which is impractically costly. The
use of (9) rather than (19) is further justified that under a hypothesis regarding the mean transformation
of the local data spaces, Exi [κ(xi , ·)], consensus with respect to the Hilbert norm, in addition to the mean
square sense, is achieved when the penalty coefficient is c → ∞ (see Section IV for details).
B. Sparse Subspace Projections
To mitigate the complexity growth noted in Section III-A, we approximate the function sequence
(15) by one that is orthogonally projected onto subspaces HD ⊆ H that consist only of functions that
can
some dictionary D = [d1 , . . . , dM ] ∈ Rp×M , i.e., HD = {f : f (·) =
PM be represented using
T
M
n=1 wn κ(dn , ·) = w κD (·)} = span{κ(dn , ·)}n=1 , and {dn } ⊂ {xu }u≤t . For convenience we define
[κD (·) = κ(d1 , ·) . . . κ(dM , ·)], and KD,D as the resulting kernel matrix from this dictionary. We enforce
function parsimony by selecting dictionaries Di with Mi,t << O(t) for each i [31].
To be specific, we propose replacing the local update (16) in which the dictionary grows at each iteration
Mt+1
by its projection onto subspace HDi,t+1 = span{κ(di,n , ·)}n=1
as
2
fi,t+1 = argmin f − fi,t −ηt ∇fi ψ̂i,c (fi (xi,t ), yi,t )
H
f ∈HDi,t+1
h
:= PHDi,t+1 (1 − ηt λ)fi,t − ηt ∇fi `i (fi,t (xi,t ), yi,t )
i
X
+c (fi,t (xi,t )−fj,t (xi,t ))κ(xi,t , ·) .
(21)
j∈ni
where we define the projection operator P onto subspace HDi,t+1 ⊂ H by the update (21).
Coefficient update The update (21), for a fixed dictionary Di,t+1 ∈ Rp×Mt+1 , yields one in the coefficient
space only. This fact may be observed by defining the un-projected stochastic gradient step starting at
function fi,t parameterized by dictionary Di,t and coefficients wi,t :
f˜i,t+1 = fi,t − ηt ∇fi ψ̂i,c (fi (xi,t ), yi,t ) .
(22)
This update may be represented using dictionary and weights
D̃i,t+1 = [Di,t , xi,t ] ,
(
(1
− ηt λ)[wi,t ]u for 0 ≤ u ≤ t − 1
P
[w̃i,t+1 ]u=
0
−ηt `i (fi,t (xi,t),yi,t)+c j∈ni(fi,t (xi,t)−fj,t (xi,t)) ,
(23)
9
where the last coefficient is for u = t. Note that D̃i,t+1 has M̃ = Mi,t +1 columns, which is also the length
of w̃i,t+1 . For a fixed Di,t+1 , the stochastic projection (21) is a least-squares update on the coefficient
vector: the Representer Theorem allows us to rewrite (21) in terms of kernel expansions as in Section 3.2
of [31], which yields
wi,t+1 = K−1
(24)
Di,t+1 Di,t+1 KDi,t+1 D̃i,t+1 w̃i,t+1 ,
where we define the cross-kernel matrix KDi,t+1 ,D̃i,t+1 whose (n, m)th entry is given by κ(di,n , d̃i,m ). The
other kernel matrices KD̃i,t+1 ,D̃i,t+1 and KDi,t+1 ,Di,t+1 are defined similarly. Observe that Mi,t+1 is the
number of columns in Di,t+1 , while M̃i = Mi,t + 1 is the number of columns in D̃t+1 [cf. (23)]. Given
that the local projections of f˜i,t+1 onto stochastic subspaces HDi,t+1 , for a fixed node-specific dictionaries
Di,t+1 , is a least-squares problem, we now detail the kernel dictionary Di,t+1 selection from past data
{xi,u , yi,u }u≤t .
Dictionary Update The selection procedure for the kernel dictionary Di,t+1 is based upon greedy compression [45]: function f˜i,t+1 defined by the stochastic gradient method without projection is parameterized
by dictionary D̃i,t+1 [cf. (23)] of model order M̃i = Mi,t + 1. We form Di,t+1 by selecting a subset of
Mi,t+1 columns from D̃i,t+1 that best approximate f˜i,t+1 in terms of Hilbert norm error, which may be
done by executing kernel orthogonal matching pursuit (KOMP) [30], [46] with error tolerance t to find
a kernel dictionary matrix Di,t+1 based on the one which adds the latest sample point D̃i,t+1 . This choice
is due to the fact that we can tune its stopping criterion to guarantee stochastic descent, and guarantee
the model order of the learned function remains finite – see Section IV for details.
We now describe the variant of KOMP we propose using, called Destructive KOMP with Pre-Fitting
(see [46], Section 2.3). Begin with an input a candidate function f˜ of model order M̃ parameterized by
kernel dictionary D̃ ∈ Rp×M̃ and coefficients w̃ ∈ RM̃ . The method then approximates f˜ by a function
f ∈ H with a lower model order. Initially, this sparse approximation is the original function f = f˜ so
that its dictionary is initialized with that of the original function D = D̃, with corresponding coefficients
w = w̃. Then, the algorithm sequentially removes dictionary elements from the initial dictionary D̃,
yielding a sparse approximation f of f˜, until the error threshold kf − f˜kH ≤ t is violated, in which case
it terminates. See Appendix A for further details.
We summarize the key steps of the proposed method in Algorithm 1 for solving (3) while maintaining a
finite model order, thus allowing for the memory-efficient learning of nonparametric regression functions
online in multi-agent systems. The method, Greedy Projected Penalty Method, executes the stochastic
projection of the functional stochastic gradient iterates onto sparse subspaces HDi,t+1 stated in (21). Initial
functions are set to null fi,0 = 0, i.e., it has empty dictionary Di,0 = [] and coefficient vector wi,0 = [].
The notation [] is used to denote the empty matrix or vector respective size p × 0 or 0. Then, at each
step, given an independent training example (xi,t , yi,t ) and step-size ηt , we compute the unconstrained
functional stochastic gradient iterate (22) with respect to the instantaneous penalty function (11) which
admits the parameterization D̃i,t+1 and w̃i,t+1 as stated in (23). These parameters are then fed into KOMP
with approximation budget t , such that (fi,t+1 , Di,t+1 , wi,t+1 ) = KOMP(f˜i,t+1 , D̃i,t+1 , w̃i,t+1 , t ).
IV. C ONVERGENCE A NALYSIS
We turn to establishing that the method presented in Algorithm 1 converges with probability 1 to the
minimizer of the penalty function ψc (f ) [cf. (9)] when attenuating algorithm step-sizes are used, and to
a neighborhood of the minimizer along a subsequence when constant step-sizes are used. Moreover, for
the later case, the kernel dictionary that parameterizes the regression function fi for each agent i remains
finite in the worst case. This analysis is an application of Section IV of [31], but these results, together
with the properties of the penalty function ψc (f ) allow us to establish bounds on the deviation for each
individual in the network from the common globally optimal regression function.
Before analyzing the proposed method developed in Section III, we define key quantities to simplify
the analysis and introduce standard assumptions which are necessary to establish convergence. Define the
10
local projected stochastic functional gradient associated with the update in (21) as
˜ f ψ̂i,c (fi,t (xi,t), yi,t ) =
∇
i
h
i
fi,t − PHDi,t+1 fi,t − ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt
(25)
such that the local update of Algorithm 1 [cf. (21)] may be expressed as a stochastic descent using
˜ f ψ̂i,c (fi,t (xi,t), yi,t ) . The definitions of (25) and the local
projected functional gradients fi,t+1 = fi,t − ηt ∇
i
stochastic gradient ∇fiψ̂i,c (fi,t (xi,t), yi,t ) may be stacked to analyze the global convergence behavior of
the algorithm. For further reference, we define the stacked projected functional stochastic gradient of the
˜ f ψ̂c (ft (xt ), yt ) = [∇
˜ f1 ψ̂1,c (f1,t (x1,t), y1,t ); · · · ; ∇
˜ f ψ̂V,c (fV,t (xV,t), yV,t )]. Then the
penalty function as ∇
V
stacked global update of the algorithm is
˜ f ψ̂c (ft (xt ), yt ) .
ft+1 = ft − ηt ∇
(26)
Moreover, observe that the stochastic functional gradient in (14), based upon the fact that (xt , yt ) are
independent and identically distributed realizations of the random pair (x, y), is an unbiased estimator of
the true functional gradient of the penalty function ψc (f ) in (9), i.e.
E[∇f ψ̂c (f (xt ), yt ) Ft ] = ∇f ψc (f )
(27)
for all t. In (27), we denote as Ft the sigma algebra which measures the algorithm history for times
u ≤ t, i.e. Ft = {xu , yu , uu }tu=1 . Next, we formally state technical conditions on the loss functions, data
domain, and stochastic approximation errors that are necessary to establish convergence.
Assumption 1 The feature space X ⊂ Rp and target domain Y ⊂ R are compact, and the kernel map
may be bounded as
p
sup κ(x, x) = X < ∞
(28)
x∈X
Assumption 2 The local losses `i (fi (x), y) are convex and differentiable with respect to the first (scalar)
argument fi (x) on R for all x ∈ X and y ∈ Y. Moreover, the instantaneous losses `i : H × X × Y → R
are Ci -Lipschitz continuous for all z ∈ R for a fixed y ∈ Y
|`i (z, y) − `i (z 0 , y)| ≤ Ci |z − z 0 |
(29)
with C := maxi Ci as the largest modulus of continuity.
Assumption 3 The projected functional gradient of the instantaneous penalty function defined by stacking
(25) has finite conditional second moments:
˜ f ψ̂c (ft (xt ), yt )k2 | Ft ] ≤ σ 2
E[k∇
H
(30)
Assumption 1 holds in most settings by the data domain itself, and justifies the bounding of the loss.
Taken together, these conditions permit bounding the optimal function fc∗ in the Hilbert norm, and imply
that the worst-case model order is guaranteed to be finite. Variants of Assumption 2 appear in the analysis
of stochastic descent methods in the kernelized setting [47], [48], and is satisfied for supervised learning
problems such as logistic regression, support vector machines with the square-hinge-loss, the square loss,
among others. Moreover, it is standard in the analysis of descent methods (see [49]). Assumption 3 is
common in stochastic methods, and ensures that the stochastic approximation error has finite variance.
Next we establish a few auxiliary results needed in the proof of the main results. Specifically, we
introduce a proposition which quantifies the error due to sparse projections in terms of the ratio of the
compression budget to the learning rate.
11
Proposition 1 Given independent realizations (xt , yt ) of the random pair (x, y), the difference between
the stacked projected stochastic functional gradient and the its un-projected variant defined by (25) and
(14), respectively, is bounded as
t V
(31)
ηt
where ηt > 0 denotes the algorithm step-size and t > 0 is the approximation budget parameter of
Algorithm 2.
˜ f ψ̂c (ft (xt ), yt ) − ∇f ψ̂c (f (xt ), yt )kH ≤
k∇
Proof: See Appendix B.
With the error induced by sparse projections quantified, we may now shift focus to analyzing the
Hilbert-norm sub-optimality of the stacked iterates generated by Algorithm 1. Specifically, we have a
descent property of the sequence {ft }.
Lemma 1 (Stochastic Descent) Consider the sequence generated {ft } by Algorithm 1 with f0 = 0. Under
Assumptions 1-3, the following expected descent relation holds.
E kft+1 − fc∗ k2H Ft ≤ kft −fc∗ k2H −2ηt [ψc (ft )−ψc (fc∗ )]
+ 2t V kft − fc∗ kH +ηt2 σ 2
(32)
Proof: See Appendix B.
Now that Lemma 1 establishes a descent-like property, we may apply the proof of Theorem 1 in [31]
to kft − fc∗ kH with diminishing step-sizes. Thus we have the following corollary.
Corollary 1 Consider the sequence {ft } generated by Algorithm 1 with f0 = 0 and regularizer λ > 0.
Under Assumptions 1-3 and the hypothesis that the projection sets HDi,t in (21) are intersected with some
finite Hilbert-norm ball kf kH ≤ D for all t, with diminishing step-sizes and compression budget, i.e.,
∞
X
t=0
ηt = ∞ ,
∞
X
ηt2 < ∞ ,
t = ηt2 ,
(33)
t=0
such that ηt < 1/λ, the sequence converges exactly to the minimizer of the penalty [cf. (9)]: ft → fc∗ with
probability 1.
To attain exact convergence to the minimizer of the penalty, fc∗ , we require the compression budget
determining the error t incurred by sparse projections to approach null. This means that to have exact
convergence, we require the function representation to require an increasing amount of memory which is,
in the limit, of infinite complexity. In contrast, when constant step-size and compression budget are used,
then the algorithm settles to a neighborhood, as we state next.
Theorem 1 The sequence {ft } generated by Algorithm 1 with f0 = 0 and regularizer λ > 0, under
Assumptions 1-3, with constant step-size selection ηt = η < 1/λ and constant compression budget t =
= Kη 3/2 for a positive constant K, converges to a neighborhood of fc∗ with probability 1:
√ h
i
√
η
√
∗
lim inf kft −fc kH ≤
KV + K 2 V 2 +λσ 2 = O( η) a.s.
(34)
t
λ
Proof: See Appendix D.
Empirically, the use of constant step-sizes has the effect of maintaining consistent algorithm adaptivity in
the face of new data, at the cost of losing exact convergence. But this drawback is more than compensated
for by the fact that in this case we may apply Theorem 3 of [31], which guarantees the model order of
the function sequence remains finite, and in the worst case, is related to the covering number of the data
domain
12
2
2
2
1
1
1
0
0
0
-1
-1
-1
-2
-2
-2
-3
-2
-1
0
1
2
(a) Gaussian Mixtures data.
3
-2
0
2
(b) Logistic Decision surface.
-3
-2
-1
0
1
2
3
(c) Hinge Decision surface.
Fig. 1: Visualizations of the Gaussian mixture data set (Figure 1a) as in [24] and the learned low-memory multi-class kernel
logistic regressor of a randomly chosen agent in the network (Figure 1b), which attains 95.2% classification accuracy on a
hold-out test set. Curved black lines denote decision boundaries between classes; dotted lines denote confidence intervals; bold
black dots denote kernel dictionary elements associated to an arbitrary i ∈ V. Kernel dictionary elements concentrate at peaks
of the Gaussian clusters and near points of overlap between classes. In Figure 1c we plot the resulting decision surface learned
by kernel SVM which attains 95.7% accuracy – the state of the art.
Corollary 2 Denote ft ∈ HV as the stacked function sequence defined by Algorithm 1 with constant
step-size ηt = η < 1/λ and approximation budget = Kη 3/2 where K > 0 is an arbitrary positive scalar.
Let Mt be the model order of the stacked function ft i.e., the number of columns of the dictionary Dt
which parameterizes ft . Then there exists a finite upper bound M ∞ such that, for all t ≥ 0, the model
order is always bounded as Mt ≤ M ∞ .
Thus, only constant step-sizes attain a reasonable tradeoff between performance relative to fc∗ and the
complexity of storing the function sequence {ft }: in this setting, we obtain approximate convergence to
fc∗ while ensuring the memory requirements are always finite, as stated in Corollary 2.
We are left to analyze the goodness of the solution fc∗ as an approximation of the solution of the original
problem (3). In particular, we establish consensus in the mean square sense. Let us start by establishing
that the penalty term is bounded by a p∗ /c, where p∗ is the primal value of the optimization problem (3)
and c is the barrier parameter introduced in (9).
Proposition 2 Let Assumptions 1 - 3 hold. Let fc∗ be the minimizer of the penalty function (9) and let p∗
be the primal optimal value of (3). Then, it holds that
∗
1 XX
p∗
∗
Exi [fc,i
(xi )−fc,j
(xi )]2 ≤ .
(35)
2 i∈Vj∈n
c
i
Proof: See Appendix E.
Proposition 2 establishes a relationship between the choice of penalty parameter c and constraint
satisfaction. This result may be used to attain convergence in mean square of each individual agent’s
regression function to ones which coincide with one another. Under an additional hypothesis, we obtain
exact consensus, as we state next.
Theorem 2 Let Assumptions 1 - 3 hold. Let fc∗ be the minimizer of the penalty function (9). Then, suppose
∗
∗
the penalty parameter c in (9) approaches infinity c → ∞, and that the node-pair differences fi,c
− fj,c
are not orthogonal to mean transformation Exi [κ(xi , ·)] of the local input spaces xi for all (i, j) ∈ E.
∗
∗
Then fi,c
= fj,c
for all (i, j) ∈ E.
Proof: As a consequence, the limit of (35) when c tends to infinity yields consensus in L2 sense, i.e.,
∗
1 XX
∗
Exi [fc,i
(xi )−fc,j
(xi )]2 = 0,
(36)
lim
c→∞ 2
i∈V j∈n
i
13
0.6
0.4
0.2
0
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
Mi,t , Model Order
Network Disagreement
Global Objective
20
10-11
1.6
1.4
1.2
1
0.8
10-12
10-13
10-14
10-15
0
1000
2000
3000
4000
5000
t, number of samples processed
t, number of samples processed
15
10
5
0
0
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
t, number of samples processed
(c) Model Order Mi,t vs. samples pro(a) Global objective vs. samples processed (b) Disagreement vs. samples processed
cessed
P
Fig. 2: In Fig. 2a, we plot the global objective i∈V (Exi ,yi [`i (fi,t x), yi ]) versus P
the number of samples processed, and
observe convergence. In Fig. 2b we display the Hilbert-norm network disagreement (i,j)∈E kfi,t − fj,t k2H with a penalty
parameter c that doubles every 200 samples. As c increases, agents attain consensus. In Fig. 2c, we plot the model order of a
randomly chosen agent’s regression function, which stabilizes to 18 after 162 samples.
which, by pulling the limit outside the sum in (36), yields
∗
∗
lim Exi [fc,i
(xi )−fc,j
(xi )]2 = 0 ,
c→∞
(37)
for all (i, j) ∈ E. Consensus in the mean square sense is a less stringent constraint that equality in the
Hilbert norm as desired in (3). In particular, for any (i, j) ∈ E, if fi = fj , then consensus in the mean
square sense is satisfied as well. Then, apply the reproducing property of the kernel (4)(i), to write
∗
∗
−fc,j
, k(xi , ·) >
(38)
0 = lim Exi < fc,i
c→∞
∗
∗
≥ lim Exi < fc,i
−fc,j
, k(xi , ·) >
c→∞
∗
∗
= lim < fc,i
−fc,j
, Exi k(xi , ·) >
c→∞
where in the previous expression we pull the absolute value outside the expectation, and in the later we
apply linearity of the expectation. Thus, (38) implies consensus is achieved with respect to the Hilbert
∗
∗
are not orthogonal to Exi [κ(xi , ·)], the mean of the
− fc,j
norm, whenever the function differences fc,i
transformation of the local input data xi .
V. N UMERICAL E XPERIMENTS
We consider the task of kernel logistic regression (KLR) (Section V-A) from multi-class training data
scattered across a multi-agent system in two settings: classification of data from a Gaussian mixture model
and texture classification. In Section V-B, we consider kernel support vector machines (KSVM).2
A. Kernel Logistic Regression
For KLR, the merit of a particular regressor for agent i is quantified by its contribution to the classconditional probability. We define a set of class-specific functions fi,k : X → R, and denote them jointly
as fi ∈ HD , where {1, . . . , D} denotes the set of classes. Then, define the probabilistic model
exp(fi,d (xi ))
P (yi = d | xi ) := P
.
d0 exp(fi,d0 (xi ))
(39)
2
We thank Garrett Warnell and Ethan Stump of the U.S. Army Research Laboratory for invaluable assistance in the algorithm
implementation.
14
which models the odds ratio of a sample being in class d versus all others. The negative log likelihood
defined by (39) is the instantaneous loss (see, e.g., [50]) at sample (xi,n , yi,n ):
`i (fi , xi,n , yi,n ) = −log P (yi = yi,n |xi,n ).
(40)
For a given set of activation functions, classification decisions d˜ for xi is given by the maximum likelihood
estimate, i.e., d˜ = argmaxd∈{1,...,D} fi,d (x).
Gaussian Mixture Model Following [24], [31], we generate a data set from Gaussian mixture models,
which consists N = 5000 feature-label pairs for training and 2500 for testing. Each label yn was drawn
uniformly at random from the label set. The corresponding feature vector xn ∈ Rp was
P then drawn from
2
a planar (p = 2), equitably-weighted Gaussian mixture model, i.e., x y ∼ (1/3) 3j=1 N (µy,j , σy,j
I)
2
where σy,j = 0.2 for all values of y and j. The means µy,j are themselves realizations of their own
Gaussian distribution with class-dependent parameters, i.e., µy,j ∼ N (θ y , σy2 I), where {θ 1 , . . . , θ D } are
equitably spaced around the unit circle, one for each class label, and σy2 = 1.0. We fix the number of
classes D = 5, meaning that the feature distribution has, in total, 15 distinct modes. The data is plotted
in Figure 1a.
Each agent in a V = 20 network observes a unique stream of training examples from this common data
set. Here the communications graph is a random network with edges generated randomly between nodes
with probability 1/5 repeatedly until we obtain one that is connected, and then symmetrize it. We run
Algorithm 1 when the entire training set is fed to each agent in a streaming fashion, a Gaussian kernel is
used with bandwidth d = 0.6, with constant learning rate η = 3, compression budget chosen as = η 3/2
with parsimony constant K = 0.04, mini-batch size 32, and regularizer λ = 10−6 . The penalty coefficient
is initialized as c = 0.01 and doubled after every 200 training examples.
We plotPthe results of this implementation
in Figures 1b and 2. In Figure 2a, we plot the global
objective i∈V (Exi ,yi [`i (fi,t x), yi ]) relative to the number of training examples processed, and observe
stable
convergence to a global minimum. In Figure 2b we display Hilbert-norm network disagreement
P
2
(i,j)∈E kfi,t − fj,t kH versus observed sample points. Since each regression function is initialized as null,
initially the disagreement is trivially null, but it remains small over the function sample path as model
training occurs. Moreover, the model order of an arbitrarily chosen agent i = 15 versus samples processed
is given in Figure 2c: observe that the model order stabilizes after only a couple hundred training examples
to 18, which is only a couple more than 15, the number of modes of the joint data density function. The
resulting decision surface of node 15 is given in Figure 1b, which achieves 95.2% classification accuracy
on the test set which is comparable to existing centralized batch approaches (see Table 2 of [31]) to kernel
logistic regression.
Texture Classification We generated the brodatz data set using a subset of the images provided in
[37]. Specifically, we used 13 texture images (i.e. D=13), and from them generated a set of 256 textons
[51]. Next, for each overlapping patch of size 24-pixels-by-24-pixels within these images, we took the
feature to be the associated p = 256-dimensional texton histogram. The corresponding label was given
by the index of the image from which the patch was selected. We then randomly selected N = 10000
feature-label pairs for training and 5000 for testing. Each agent in network with V = 5 observes a unique
stream of training examples from this common data set. Here the communication graph is a random
network with edges generated randomly between nodes with probability 1/5 repeatedly until we obtain
one that is connected, and then symmetrize it. To train the classifier we run Algorithm 1 ten epoches:
in each epoch we fed the entire training set to each agent in a streaming fashion. A Gaussian kernel
is used with bandwith σ 2 = 0.1, with constant learning rate η = 4, compression budget = η 3/2 with
parsimony constant K = 0.04, mini-batch size 32 and regularizer λ = 10−5 . The penalty coefficient is set
to c = 0.02.
PWe plot the results of this experiment in Figure 3. In Figure 3a we display the global objective
convergence to
i∈V (Exi ,yi [`i (fi,t x), yi ]) relative to the number of observed examples, and observe
P
a global minimum. In Figure 3b we plot the Hilbert norm network disagreement (i,j)∈E kfi,t − fj,t k2H .
Since the initial regression function is null for all agents the disagreement is zero and as observed in Figure
15
3
5000
10 -10
2
2.5
4000
1.5
2
3000
1.5
1
2000
1
0.5
0.5
0
0
2
4
6
8
10
10 4
1000
0
0
0
2
4
6
8
10
10
0
4
5
10
10 4
(a) Global Objective vs. samples pro- (b) Disagreement vs. samples processed (c) Model Order Mi,t vs. samples processed
cessed
P
Fig. 3: In Fig. 3a, we plot the global objective i∈V (Exi ,yi [`i (fi,t x), yi ]) versus P
the number of samples processed, and
observe convergence. In Fig. 3b we display the Hilbert-norm network disagreement (i,j)∈E kfi,t − fj,t k2H with a penalty
parameter c = 0.02. In Fig. 3c, we plot the model order of a randomly chosen agent’s regression function, which stabilizes to
4299.
3b it remains small over the training. Moreover, the model order of an agent chosen at random versus
samples processed is given in Figure 3c. The resulting decission function achives 93.5% classification
accuracy over the test set which is comparable with the accuracy of the centralized version (95.6%) [31].
However the model order requiered is more than twice the model order in the centralized case (4358
in average v.s. 1833 [31]). Compared to other distributed classification algorithms the current algorithm
outperforms them. For instance D4L achieves around 75% classification accuracy [10].
B. Kernel Support Vector Machines
Now we address the problem of training a multi-class kernel support vector machine online in a multiagent systems. The merit of a particular regressor is defined by its ability to maximize its classification
margin, which may be formulated by first defining a set of class-specific activation functions fi,d : X → R,
and denote them jointly as fi ∈ HD . In Multi-KSVM, points are assigned the class label of the activation
function that yields the maximum response. KSVM is trained by taking the instantaneous loss ` to be
the multi-class hinge function which defines the margin separating hyperplane in the kernelized feature
space, i.e.,
`i (fi , xn , yn ) = max(0, 1 + fi,r (xn ) − fi,yn (xn )),
(41)
where r = argmaxd0 6=y fi,d0 (x). See [50] for further details.
We consider an implementation where each agent in a V = 20 network observes a unique stream of
training examples from the Gaussian mixtures data set (see Figure 1a). Moreover, the communications
graph is fixed as a random network with edges generated randomly between nodes with probability 1/5
repeatedly until we obtain one that is connected, and then symmetrize it. We run Algorithm 1 when the
entire training set is fed to each agent in a streaming fashion, a Gaussian kernel is used with bandwidth
σ̃ 2 = 0.6, with constant learning rate η = 3, compression budget chosen as = η 3/2 with parsimony
constant K = 0.04, mini-batch size 32, and regularizer λ = 10−6 . The penalty coefficient is initialized as
c = 0.01 and doubled after every 200 training examples.
We plot the results
in Figures 1c and 4. In Figure 4a, we observe that the
P of this implementation
global objective
(E
[`
(f
x),
y
])
converges
stably to a global minimum as P
the number of
xi ,yi i i,t
i
i∈V
samples processed increases. In Figure 4b we display Hilbert-norm network disagreement (i,j)∈E kfi,t −
fj,t k2H versus observed sample points. Since each regression function is initialized as null, initially the
disagreement is trivially null, but it remains small over the function sample path as model training occurs,
and periodically spikes when the penalty parameter is increased. Moreover, the model order of an arbitrarily
0.3
0.2
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
t, number of samples processed
Mi,t , Model Order
25
0.4
0
30
100
0.8
0.7
0.6
0.5
Network Disagreement
Global Objective
16
10-5
10
-10
10-15
0
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
t, number of samples processed
20
15
10
5
0
0
500 1000 1500 2000 2500 3000 3500 4000 4500 5000
t, number of samples processed
(b) Disagreement vs. samples
(a) Global objective vs. samples
(c) Model Order Mi,t vs. samples
P
Fig. 4: In Fig. 4a, we plot the global objective i∈V (Exi ,yi [`i (fi,t x), yi ]) versus the number of samples processed, and
observe convergence,
albeit more noisily than for the differentiable logistic loss. In Fig. 4b we display the Hilbert-norm network
P
disagreement (i,j)∈E kfi,t − fj,t k2H with a penalty parameter c that doubles every 200 samples. As c increases, agents attain
consensus with respect to the Hilbert norm. In Fig. 4c, we plot the model order of a randomly chosen agent’s regression
function, which stabilizes to 22 after 354 samples. Here we obtain a slightly higher complexity classifier that achieves slightly
better accuracy.
chosen agent i = 6 versus samples processed is given in Figure 4c: the model order stabilizes after only
a couple hundred training examples to 22, which is only a couple more than 15, the number of modes
of the joint data density function. The resulting decision surface of node 6 is given in Figure 1c, which
achieves 95.7% classification accuracy, which is approximately state of the art.
VI. C ONCLUSION
In this paper, we extended the ideas in [31] to multi-agent settings with the intent of developing a
method such that a network of autonomous agents, based on their local data stream, may learn a kernelized
statistical model which is optimal with respect to information aggregated across the entire network. To do
so, we proposed an unusual penalty function whose structure is amenable to efficient parameterizations
when developing stochastic approximation-based updates. By applying functional stochastic gradient
method to this node-separable penalty combined with greedily constructed subspace projections, we
obtain a decentralized online algorithm for memory-efficient nonparametric function approximation that
is globally convergent. We obtain a controllable trade-off between optimality and memory requirements
through the design of the greedy subspace projections. Moreover, for large penalty parameter selections,
agents achieve consensus.
The empirical performance of this protocol, the Greedy Projected Penalty Method, yields state of the art
statistical accuracy for a team of interconnected agents learning from streaming data for both multi-class
kernel logistic regression and multi-class kernel support vector machines problems. These results provide
a mathematical and empirical foundation for accurate and stable multi-agent statistical inference in online
settings while preserving memory-efficiency.
A PPENDIX A: D ETAILS OF M ATCHING P URSUIT
The removal procedure is as follows: at each step, a single dictionary element j of D is selected to
be removed which contributes the least to the Hilbert-norm error minf ∈HD\{j} kf˜ − f kH of the original
function f˜, when dictionary D is used. Since at each stage the kernel dictionary is fixed, this amounts
to a computation involving weights w ∈ RM −1 only;P
that is, the error of removing dictionary point dj is
˜
computed for each j as γj = minwI\{j} ∈RM −1 kf (·) − k∈I\{j} wk κ(dk , ·)k. We use the notation wI\{j} to
denote the entries of w ∈ RM restricted to the sub-vector associated with indices I \ {j}. Then, we define
the dictionary element which contributes the least to the approximation error as j ∗ = argminj γj . If the
error incurred by removing this kernel dictionary element exceeds the given compression budget γj ∗ > t ,
17
Algorithm 2 Kernel Orthogonal Matching Pursuit (KOMP)
Require: function f˜ defined by dict. D̃ ∈ Rp×M̃ , coeffs. w̃ ∈ RM̃ , approx. budget t > 0
initialize f = f˜, dictionary D = D̃ with indices I, model order M = M̃ , coeffs. w = w̃.
while candidate dictionary is non-empty I =
6 ∅ do
for j = 1, . . . , M̃ do
Find minimal approximation error with dictionary element dj removed
X
γj =
min
kf˜(·) −
wk κ(dk , ·)kH .
wI\{j} ∈RM −1
k∈I\{j}
end for
Find index minimizing approx. error: j ∗ = argminj∈I γj
if minimal approx. error exceeds threshold γj ∗ > t
stop
else
Prune dictionary D ← DI\{j ∗ }
Revise set I ← I \ {j ∗ }, model order M ← M − 1.
Update weights w defined by current dictionary D
w = argminkf˜(·) − wT κD (·)kH
w∈RM
end
end while
return f, D, w of model order M ≤ M̃ such that kf − f˜kH ≤ t
the algorithm terminates. Otherwise, this dictionary element dj ∗ is removed, the weights w are revised
based on the pruned dictionary as w = argminw∈RM kf˜(·) − wT κD (·)kH , and the process repeats as long
as the current function approximation is defined by a nonempty dictionary. This procedure is summarized
in Algorithm 2.
A PPENDIX B: P ROOF OF P ROPOSITION 1
˜ f ψ̂c (ft (xt), yt )
Consider the square-Hilbert-norm difference of the stacked projected stochastic gradient ∇
and its un-projected variant ∇f ψ̂c (ft (xt ), yt ) defined in (25) and (14), respectively,
˜ f ψ̂c (ft (xt ), yt ) − ∇f ψ̂c (f (xt ), yt )k2H
k∇
h
i
= vec fi,t −PHDi,t+1 fi,t −ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt
2
− vec ∇fi ψ̂i,c (fi,t (xi,t ), yi,t )
H
h
i
2
≤ V max fi,t −PHDi,t+1 fi,t −ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt
(42)
i∈V
2
− ∇fi ψ̂i,c (fi,t (xi,t ), yi,t )
H
where we apply the fact that the functional gradient is a concatenation of functional gradients associated
with each agent in (42) for the first equality, and for the second inequality we consider the worst-case
estimate across the network. Now, let’s focus on the term inside the Hilbert-norm on the right-hand side.
18
Multiply and divide ∇fi ψ̂i,c (fi,t (xi,t ), yi,t ), the last term, by ηt , and reorder terms to write
h
i
fi,t −PHDi,t+1 fi,t −ηt∇fi ψ̂i,c (fi,t (xi,t),yi,t) /ηt
2
− ∇fi ψ̂i,c (fi,t (xi,t ), yi,t )
H
1
=
fi,t −ηt ∇fi ψ̂i,c (fi,t (xi,t ), yi,t )
ηt
h
i
1
− PHDi,t+1 fi,t −ηt ψ̂i,c (fi,t (xi,t ), yi,t )
ηt
1
= 2 kf˜i,t+1 − fi,t+1 k2H
ηt
2
H
(43)
where we have substituted the definition of f˜i,t+1 and fi,t+1 in (22) and (21), respectively, and pulled
the nonnegative scalar ηt outside the norm. Now, observe that the KOMP residual stopping criterion in
Algorithm 2 is kf˜i,t+1 − fi,t+1 kH ≤ t , which we may apply to the last term on the right-hand side of
(43). This result with the inequality (42) yields (31).
A PPENDIX C: P ROOF OF L EMMA 1
Begin by considering the square of the Hilbert-norm difference between ft+1 and fc∗ = argmin ψc (f )
which minimizes (9), and expand the square to write
˜ f ψ̂c (ft (xt ), yt )k2H
kft+1 − fc∗ k2H = kft − ηt ∇
˜ f ψ̂c (ft (xt ), yt)iH
= kft −f ∗ k2 −2ηt hft −f ∗ , ∇
+
H
c
2 ˜
ηt k∇f ψ̂c (ft (xt ), yt )k2H
(44)
Add and subtract the functional stochastic gradient of the penalty function ∇f ψ̂c (ft (xt ), yt) defined in (14)
to the second term on the right-hand side of (44) to obtain
kft+1 − fc∗ k2H = kft −fc∗ k2H −2ηt hft −fc∗ ,∇f ψ̂c (ft (xt ), yt)iH
˜ f ψ̂c (ft (xt ), yt)−∇f ψ̂c (ft (xt ), yt)iH
−2ηthft −f ∗ ,∇
+
c
2 ˜
ηt k∇f `(ft (xt ), yt )k2H
(45)
We deal with the third term on the right-hand side of (45), which represents the directional error
associated with the sparse stochastic projections, by applying the Cauchy-Schwartz inequality together
with Proposition 1 to obtain
kft+1 −fc∗ k2H = kft −fc∗ k2H −2ηt hft −fc∗ ,∇f ψ̂c (ft (xt ), yt)iH
˜ f `(ft (xt ), yt )k2H
+2t V kft −fc∗ kH +ηt2 k∇
Now compute the expectation of (46) conditional on the algorithm history Ft
E kft+1 −fc∗ k2H Ft = kft −fc∗ k2H + 2t V kft − fc∗ kH + ηt2 σ 2
−2ηthft −fc∗, ∇f ψc (ft )iH
(46)
(47)
where we have applied the fact that the stochastic functional gradient in (14) is an unbiased estimator [cf.
(27)] for the functional gradient of the penalty function in (9), as well as the fact that the variance of the
functional projected stochastic gradient is finite stated in (30) (Assumption 3). Observe that since ψc (f )
is an expectation of a convex function, it is also convex, which allows us to write
ψc (ft ) − ψc (fc∗ ) ≤ hft − fc∗ , ∇f ψc (ft )iH ,
(48)
19
which we substitute into the second term on the right-hand side of the relation given in (47) to obtain
E kft+1 − fc∗ k2H Ft ≤ kft −fc∗ k2H −2ηt [ψc (ft )−ψc (fc∗ )]
(49)
+ 2t V kft − fc∗ kH + ηt2 σ 2 .
Thus the claim in Lemma 1 is valid.
A PPENDIX D: P ROOF OF T HEOREM 1
The use of the regularizer (λ/2)kf k2H in (9) implies that the penalty is λ-strongly convex in f ∈ H,
yielding
λ
(50)
kft − fc∗ k2H ≤ ψc (ft ) − ψc (fc∗ )
2
Substituting the relation (50) into the second term on the right-hand side of the expected descent relation
stated in Lemma 1, with constant step-size ηt = η and budget t = , yields
E[kft+1 − fc∗ k2H Ft ]
≤ (1 − ηλ)kft − fc∗ k2H + 2V kft − fc∗ kH + η 2 σ 2 .
(51)
The expression in (51) may be used to construct a stopping stochastic process , which tracks the suboptimality of kft − fc∗ k2H until it reaches a specific threshold, as in the proof of Theorem 2 of [31]. In doing
so, we obtain convergence
to a neighborhood. We may define a stochastic process δt that qualifies as a
supermartingale, i.e. E δt+1 Ft ≤ δt by considering (51) and solving for the appropriate threshold by
analyzing when the following holds true
E[kft+1 − fc∗ k2H Ft ]
≤ (1 − ηλ)kft − fc∗ k2H + 2V kft − fc∗ kH + η 2 σ 2
≤ kft − fc∗ k2H .
(52)
which may be rearranged to obtain the sufficient condition
−ηλkft − fc∗ k2H + 2V kft − fc∗ kH + η 2 σ 2 ≤ 0 .
(53)
Note that (53) defines a quadratic polynomial in kft − fc∗ kH , which, using the quadratic formula, has roots
p
V
±
2 V 2 + λη 3 σ 2
kft − fc∗ kH =
(54)
λη
Observe (53) is a downward-opening polynomial in kft − fc∗ kH which is nonnegative. Thus, focus on
the positive root, substituting the approximation budget selection = Kη 3/2 to define the radius of
convergence as
p
√
√
η
V + 2 V 2 +λη 3 σ 2
=
KV + K 2 V 2 +λσ 2
(55)
∆ :=
λη
λ
(55) allows us to construct a stopping process: define δt as
δt = kft − fc∗ kH
o
n
× 1 min −ηλkfu − fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 > ∆
(56)
u≤t
where 1{E} denotes the indicator process of event E ∈ Ft . Note that δt ≥ 0 for all t, since both kft −f ∗ kH
and the indicator function are nonnegative. The rest of the proof applies the same reasoning as that of
20
Theorem 2 in [31]: in particular, given the definition (56), either minu≤t −ηλkfu − fc∗ k2H + 2V kfu −
fc∗ kH + η 2 σ 2 > ∆ holds, in which case we may compute the square root of the condition in (52) to write
E[δt+1 Ft ] ≤ δt
(57)
Alternatively, minu≤t −ηλkfu − fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 ≤ ∆, in which case the indicator function
is null for all s ≥ t from the use of the minimum inside the indicator in (56). Thus in either case, (57) is
valid, implying δt converges almost surely to null, which, as a consequence we obtain the fact that either
limt→∞ kft − fc∗ kH − ∆ = 0 or the indicator function is null for large t, i.e. limt→∞ 1{minu≤t −ηλkfu −
fc∗ k2H + 2V kfu − fc∗ kH + η 2 σ 2 > ∆} = 0 almost surely. Therefore, we obtain that
√
√
η
∗
2
2
KV + K +λσ
a.s. ,
(58)
lim inf kft −fc kH ≤ ∆ =
t→∞
λ
as stated in Theorem 1.
A PPENDIX E: P ROOF OF P ROPOSITION 2
Let
be the minimizer of ψc (f ) defined in (9) and f ∗ be the solution of the problem (3). Since the
former is the minimizer of ψc (f ) it holds that
h
X
i λ
Exi ,yi `i (fi∗ xi ), yi + kfi∗ k2H
ψc (fc∗ ) ≤ ψc (f ∗ ) =
2
i∈V
∗
cX
∗
2
+
Ex [f (xi )−fj (xi )]
.
(59)
2j∈n i i
fc∗
i
Where the equality follows from the definition of ψc (f ) in (9). Since f ∗ is solution to the problem (3) it
satisfies that fi = fj for all (i, j) ∈ E, thus
Exi [fi∗ (xi ) − fj∗ (xi )]2 = 0 ,
(60)
for all (i, j) ∈ E. As a consequence, replacing ψc (fc∗ ) by its expression in the first equality in (59) and
rearranging terms yields a bound the constraint violation of fc∗ as
∗
1
1 XX
∗
Exi [fc,i
(xi )−fc,j
(xi )]2 ≤ (R(f ∗ ) − R(fc∗ )) ,
(61)
2 i∈Vj∈n
c
i
where R(f ) is the global regularized objective in (2), i.e.,
h
X
i λ
2
R(f ) =
Exi ,yi `i (fi xi ), yi + kfi kH .
2
i∈V
(62)
The fact that by definition p∗ = R(f ∗ ) yields (35).
R EFERENCES
[1] A. Koppel, S. Paternain, C. Richard, and A. Ribeiro, “’decentralized efficient nonparametric stochastic optimization’,” in Signal and
Information Processing (GlobalSIP), 2017 IEEE Global Conference on (to appear). IEEE, 2017.
[2] M. Anthony and P. L. Bartlett, Neural network learning: Theoretical foundations. cambridge university press, 2009.
[3] Z. Marinho, B. Boots, A. Dragan, A. Byravan, G. J. Gordon, and S. Srinivasa, “Functional gradient motion planning in reproducing
kernel hilbert spaces,” in Proceedings of Robotics: Science and Systems, Ann Arbor, MI, July 2016.
[4] R. J. Kozick and B. M. Sadler, “Source localization with distributed sensor arrays and partial spatial coherence,” IEEE Transactions
on Signal Processing, vol. 52, no. 3, pp. 601–616, 2004.
[5] A. Koppel, J. Fink, G. Warnell, E. Stump, and A. Ribeiro, “Online learning for characterizing unknown environments in ground robotic
vehicle models,” in Proc. Int. Conf. Intelligent Robots and Systems.
[6] M. Schwager, P. Dames, D. Rus, and V. Kumar, “A multi-robot control policy for information gathering in the presence of unknown
hazards,” in Robotics Research. Springer, 2017, pp. 455–472.
[7] J. Liu, Q. Chen, and H. D. Sherali, “Algorithm design for femtocell base station placement in commercial building environments,” in
INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 2951–2955.
21
[8] A. Ghosh and S. Sarkar, “Pricing for profit in internet of things,” in Information Theory (ISIT), 2015 IEEE International Symposium
on. IEEE, 2015, pp. 2211–2215.
[9] A. Koppel, F. Jakubiec, and A. Ribeiro, “A saddle point algorithm for networked online convex optimization,” IEEE Trans. Signal
Process., p. 15, Oct 2015.
[10] A. Koppel, G. Warnell, E. Stump, and A. Ribeiro, “D4l: Decentralized dynamic discriminative dictionary learning,” IEEE Trans. Signal
and Info. Process. over Networks, vol. (submitted), June 2017, available at http://www.seas.upenn.edu/ aribeiro/wiki.
[11] K. Slavakis, P. Bouboulis, and S. Theodoridis, “Online learning in reproducing kernel hilbert spaces,” Signal Processing Theory and
Machine Learning, pp. 883–987, 2013.
[12] J.-B. Li, S.-C. Chu, and J.-S. Pan, Kernel Learning Algorithms for Face Recognition. Springer, 2014.
[13] S. Haykin, “Neural networks: A comprehensive foundation,” 1994.
[14] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural
information processing systems, 2012, pp. 1097–1105.
[15] J. Mairal, F. Bach, and J. Ponce, “Task-driven dictionary learning,” Pattern Analysis and Machine Intelligence, IEEE Transactions on,
vol. 34, no. 4, pp. 791–804, 2012.
[16] H. Robbins and S. Monro, “A stochastic approximation method,” Ann. Math. Statist., vol. 22, no. 3, pp. 400–407, 09 1951.
[17] G. Kimeldorf and G. Wahba, “Some results on tchebycheffian spline functions,” Journal of mathematical analysis and applications,
vol. 33, no. 1, pp. 82–95, 1971.
[18] B. Schölkopf, R. Herbrich, and A. J. Smola, “A generalized representer theorem,” Subseries of Lecture Notes in Computer Science
Edited by JG Carbonell and J. Siekmann, p. 416.
[19] V. Norkin and M. Keyzer, “On stochastic optimization and statistical learning in reproducing kernel hilbert spaces by support vector
machines (svm),” Informatica, vol. 20, no. 2, pp. 273–292, 2009.
[20] Y. Engel, S. Mannor, and R. Meir, “The kernel recursive least-squares algorithm,” IEEE Transactions on Signal Processing, vol. 52,
no. 8, pp. 2275–2285, Aug 2004.
[21] W. Liu, P. P. Pokharel, and J. C. Principe, “The kernel least-mean-square algorithm,” Signal Processing, IEEE Transactions on, vol. 56,
no. 2, pp. 543–554, 2008.
[22] J. Kivinen, A. J. Smola, and R. C. Williamson, “Online Learning with Kernels,” IEEE Transactions on Signal Processing, vol. 52, pp.
2165–2176, August 2004.
[23] O. Dekel, S. Shalev-Shwartz, and Y. Singer, “The forgetron: A kernel-based perceptron on a fixed budget,” in Advances in Neural
Information Processing Systems 18. MIT Press, 2006, p. 259266. [Online]. Available: http://research.microsoft.com/apps/pubs/default.
aspx?id=78226
[24] J. Zhu and T. Hastie, “Kernel Logistic Regression and the Import Vector Machine,” Journal of Computational and Graphical Statistics,
vol. 14, no. 1, pp. 185–205, 2005.
[25] B. Dai, B. Xie, N. He, Y. Liang, A. Raj, M.-F. F. Balcan, and L. Song, “Scalable kernel methods via doubly stochastic gradients,” in
Advances in Neural Information Processing Systems, 2014, pp. 3041–3049.
[26] T. Le, V. Nguyen, T. D. Nguyen, and D. Phung, “Nonparametric budgeted stochastic gradient descent,” in Artificial Intelligence and
Statistics, 2016, pp. 654–572.
[27] T. Le, T. Nguyen, V. Nguyen, and D. Phung, “Dual space gradient descent for online learning,” in Advances in Neural Information
Processing Systems, 2016, pp. 4583–4591.
[28] J. Lu, S. C. Hoi, J. Wang, P. Zhao, and Z.-Y. Liu, “Large scale online kernel learning,” Journal of Machine Learning Research, vol. 17,
no. 47, p. 1, 2016.
[29] D. Calandriello, A. Lazaric, and M. Valko, “Second-order kernel online convex optimization with adaptive sketching,” in International
Conference on Machine Learning, 2017.
[30] Y. Pati, R. Rezaiifar, and P. Krishnaprasad, “Orthogonal Matching Pursuit: Recursive Function Approximation with Applications to
Wavelet Decomposition,” in Proceedings of the Asilomar Conference on Signals, Systems and Computers, 1993.
[31] A. Koppel, G. Warnell, E. Stump, and A. Ribeiro, “Parsimonious online learning with kernels via sparse projections in function space,”
arXiv preprint arXiv:1612.04111, 2016.
[32] B. Johansson, T. Keviczky, M. Johansson, and K. Johansson, “Subgradient methods and consensus algorithms for solving convex
optimization problems,” in Proc. of the 47th IEEE Conference on Decision and Control, Cancun, Mexico, 2008, pp. 4185–4190.
[33] S. Ram, A. Nedic, and V. Veeravalli, “Distributed stochastic subgradient projection algorithms for convex optimization,” J Optimiz.
Theory App., vol. 147, no. 3, pp. 516–545, Sep. 2010.
[34] X. Nguyen, M. J. Wainwright, and M. I. Jordan, “Nonparametric decentralized detection using kernel methods,” IEEE Transactions on
Signal Processing, vol. 53, no. 11, pp. 4053–4066, 2005.
[35] P. A. Forero, A. Cano, and G. B. Giannakis, “Consensus-based distributed support vector machines,” Journal of Machine Learning
Research, vol. 11, no. May, pp. 1663–1707, 2010.
[36] P. Chainais and C. Richard, “Learning a common dictionary over a sensor network,” in Computational Advances in Multi-Sensor
Adaptive Processing (CAMSAP), 2013 IEEE 5th International Workshop on. IEEE, 2013, pp. 133–136.
[37] P. Brodatz, Textures: A Photographic Album for Artists and Designers. Dover, 1966.
[38] S. Mukherjee and S. K. Nayar, “Automatic generation of rbf networks using wavelets,” Pattern Recognition, vol. 29, no. 8, pp. 1369–
1383, 1996.
[39] S. Shalev-Shwartz, O. Shamir, N. Srebro, and K. Sridharan, “Learnability, stability and uniform convergence,” Journal of Machine
Learning Research, vol. 11, no. Oct, pp. 2635–2670, 2010.
[40] T. Evgeniou, M. Pontil, and T. Poggio, “Regularization networks and support vector machines,” Advances in computational mathematics,
vol. 13, no. 1, pp. 1–50, 2000.
[41] A. Ribeiro, “Ergodic stochastic optimization algorithms for wireless communication and networking,” IEEE Transactions on Signal
Processing, vol. 58, no. 12, pp. 6369–6386, 2010.
22
[42] K. Müller, T. Adali, K. Fukumizu, J. C. Principe, and S. Theodoridis, “Special issue on advances in kernel-based learning for
signal processing [from the guest editors],” IEEE Signal Process. Mag., vol. 30, no. 4, pp. 14–15, 2013. [Online]. Available:
http://dx.doi.org/10.1109/MSP.2013.2253031
[43] R. Wheeden, R. Wheeden, and A. Zygmund, Measure and Integral: An Introduction to Real Analysis, ser. Chapman & Hall/CRC
Pure and Applied Mathematics. Taylor & Francis, 1977. [Online]. Available: https://books.google.com/books?id=YDkDmQ hdmcC
[44] T. Suzuki, “Dual averaging and proximal gradient descent for online alternating direction multiplier method,” in Proc. 30th Int. Conf.
Machine Learning, vol. 28, no. 1, Atlanta, GA, USA, Jun. 16-21 2013, pp. 392–400.
[45] D. Needell, J. Tropp, and R. Vershynin, “Greedy signal recovery review,” in Signals, Systems and Computers, 2008 42nd Asilomar
Conference on. IEEE, 2008, pp. 1048–1050.
[46] P. Vincent and Y. Bengio, “Kernel matching pursuit,” Machine Learning, vol. 48, no. 1, pp. 165–187, 2002.
[47] M. Pontil, Y. Ying, and D. xuan Zhou, “Error analysis for online gradient descent algorithms in reproducing kernel hilbert spaces,”
Tech. Rep., 2005.
[48] Y. Ying and D. X. Zhou, “Online regularized classification algorithms,” IEEE Transactions on Information Theory, vol. 52, no. 11, pp.
4775–4788, Nov 2006.
[49] Y. Nesterov, “Introductory lectures on convex programming volume i: Basic course,” 1998.
[50] K. Murphy, Machine Learning: A Probabilistic Perspective. MIT press, 2012.
[51] T. Leung and J. Malik, “Representing and Recognizing the Visual Appearence of Materials using Three-dimensional Textons,”
International Journal of Computer Vision, vol. 43, no. 1, pp. 29–44, 1999.
| 10math.ST
|
Simple groups, fixed point ratios
and applications
arXiv:1707.03564v1 [math.GR] 12 Jul 2017
Timothy C. Burness
School of Mathematics, University of Bristol, Bristol BS8
1TW, United Kingdom
Abstract. The study of fixed point ratios is a classical topic in permutation group theory, with a long history stretching back to the origins
of the subject in the 19th century. Fixed point ratios arise naturally in
many different contexts, finding a wide range of applications. In this
survey article we focus on fixed point ratios for simple groups of Lie
type, highlighting some of the main results, applications and related
problems.
1. Introduction
The study of fixed point ratios is a classical topic in permutation group
theory, with a long history stretching all the way back to the early days
of group theory in the 19th century. The concept arises naturally in many
different contexts, finding a wide range of interesting (and often surprising)
applications. One of the main aims of this survey article is to highlight some
of these applications. For instance, we will explain how fixed point ratios
play a key role in the study of some remarkable generation properties of finite
groups. We will also see how probabilistic methods, based on fixed point
ratio estimates, have revolutionised the search for small bases of primitive
permutation groups. In a completely different direction, we will also describe
how bounds on fixed point ratios can be used to investigate the structure of
monodromy groups of coverings of the Riemann sphere.
In this introductory section we start by recalling some basic properties
of fixed point ratios and we present several standard examples that will
be useful later. We also highlight connections to some classical notions in
permutation group theory, such as minimal degree, fixity and derangements.
To whet the appetite of the reader, we close the introduction by presenting
three very different group-theoretic problems. It is interesting to note that
none of these problems have an obvious connection to fixed point ratios, but
we will show later that recent advances in our understanding of fixed point
ratios (in particular, recent results for (almost) simple groups of Lie type)
play an absolutely essential role in their solution.
Some of the main theorems on fixed point ratios will be highlighted in
Section 2, where we focus on the simple groups of Lie type. Finally, in
Sections 3, 4 and 5 we will discuss the three motivating problems mentioned
above. Here we will explain the connection to fixed point ratios and we will
sketch some of the main ideas. In particular, we will see how some of the
results presented in Section 2 play a key role, and we will report on more
recent developments and open problems.
Finally, we have also included an extensive bibliography, which we hope
will serve as a useful guide for further reading.
Acknowledgments. This article is based on a lecture series I gave at the
workshop Some problems in the theory of simple groups at the Centre Interfacultaire Bernoulli at the École Polytechnique Fédérale de Lausanne in
September 2016. This workshop was part of the semester programme Local
representation theory and simple groups at the CIB. It is a pleasure to thank
the organisers of this programme for inviting me to participate and for their
1. INTRODUCTION
3
generous hospitality. I would also like to thank Gunter Malle and Donna
Testerman for their helpful comments on an earlier version of this article.
1.1. Preliminaries. We start with some preliminary definitions. Let
G 6 Sym(Ω) be a permutation group on a finite set Ω. For α ∈ Ω we will
write Gα = {x ∈ G : αx = α} for the stabiliser of α in G. Similarly, the set
of fixed points of x ∈ G will be denoted by
CΩ (x) = {α ∈ Ω : αx = α}.
Definition 1.1. The fixed point ratio of x ∈ G, denoted by fpr(x, Ω) =
fpr(x), is the proportion of points in Ω fixed by x, i.e.
fpr(x) =
|CΩ (x)|
.
|Ω|
Notice that fpr(x) is the probability that a randomly chosen element of Ω
is fixed by x (with respect to the uniform distribution on Ω). This viewpoint
is often useful for applications. Indeed, in recent years probabilistic methods
have been used to solve many interesting problems in finite group theory.
Typically, the aim is to establish an existence result through a probabilistic
approach (rather than an explicit construction, for example) – this has been
a standard technique in combinatorics, number theory and other areas for
many years. As we will see later, bounds on fixed point ratios play a central
role in several applications of this flavour.
It is also worth noting that a fixed point ratio is a special type of character ratio; if π : G → C is the corresponding permutation character, then
fpr(x) =
π(x)
.
π(1)
The following lemma records some basic properties.
Lemma 1.2. Let G be a permutation group on a finite set Ω and let x be
an element of G.
(i) fpr(x) = fpr(y) for all y ∈ xG .
(ii) fpr(x) 6 fpr(xm ) for all m ∈ Z.
(iii) If G is transitive with point stabiliser H, then
fpr(x) =
|xG ∩ H|
.
|xG |
(iv) If the derived subgroup G0 is transitive, then there is a non-linear
irreducible constituent χ of the permutation character such that
fpr(x) 6
1 + |χ(x)|
.
1 + χ(1)
Proof. Parts (i) and (ii) are trivial.
4
(iii) For β ∈ Ω, g ∈ G define (β, g) = 1 if β g = β, otherwise (β, g) = 0.
Then
X
X X
|xG | |CΩ (x)| =
|CΩ (g)| =
(β, g)
g∈xG
g∈xG
β∈Ω
=
X
X
(β, g) =
g∈xG
β∈Ω
X
|xG ∩ Gβ |,
β∈Ω
which is equal to |Ω| |xG ∩ H| by the transitivity of G.
(iv) Set f = fpr(x) and write π = 1 + χ1 + · · · + χt with χi ∈ Irr(G).
Note that the transitivity of G0 implies that each χi is non-linear.
If 1 + |χi (x)| < f (1 + χi (1)) for all i then
X
X
f |Ω| = 1 +
χi (x) 6 1 +
|χi (x)|
i
i
=
X
(1 + |χi (x)|) − (t − 1)
i
<f
!
X
(1 + χi (1)) − (t − 1)
i
= f |Ω| − (1 − f )(t − 1),
which is a contradiction.
The formula in part (iii) of the previous lemma is a key tool for computing fixed point ratios for transitive groups. Indeed, it essentially reduces the
problem to determining the fusion of H-classes in G, which may be more
tractable.
Example 1.3. Sym(n) on 2-sets.
Let G = Sym(n) be the symmetric group of degree n > 5, let x = (1, 2,3) ∈
G and let Ω be the set of 2-element subsets of {1, . . . , n}. Then |Ω| = n2 and
the action of G is transitive, with point stabiliser H = Sym(n − 2) × Sym(2).
We compute fpr(x) in three different ways:
a. Direct calculation.
We have CΩ (x) = {{a, b} : a, b ∈ {4, . . . , n}}, so
n−3
|CΩ (x)| = 2 and thus
(1.1)
fpr(x) =
(n − 3)(n − 4)
.
n(n − 1)
b. Permutation character. Let π be the permutation character. The action
of G on Ω has rank 3 (that is, H has three orbits on Ω) and by Young’s
Rule we have
π = 1 + χ(n−1,1) + χ(n−2,2) ,
where χλ is the character of the irreducible Specht module S λ corresponding
to the partition λ of n (see [61, Section 14], for example). By applying
1. INTRODUCTION
5
the Hook Formula for dimensions and the Murnaghan-Nakayama Rule for
character values (see [61, Sections 20 and 21]), we calculate that
χ(n−1,1) (x) = χ(n−4,1) (1) = n − 4
and
χ(n−2,2) (x) = χ(n−5,2) (1) = (n − 3)(n − 6)/2
if n > 7 (one can check that χ(3,2) (x) = −1 and χ(4,2) (x) = 0), so
fpr(x) =
1 + (n − 4) + (n − 3)(n − 6)/2
(n − 3)(n − 4)
=
.
n(n − 1)/2
n(n − 1)
c. Conjugacy classes. All the 3-cycles in G are conjugate, so xG ∩ H is the
set of 3-cycles in H. This gives
n−2
n
G
H
G
|x ∩ H| = |x | = 2
, |x | = 2
3
3
and thus Lemma 1.2(iii) implies that (1.1) holds.
Example 1.4. GLn (q) on vectors.
Consider the action of G = GLn (q) on its natural module V = Fnq . For
x ∈ G we have fpr(x) = q d−n , where d is the dimension of the 1-eigenspace
of x on V .
Example 1.5. PGLn (q) on 1-spaces.
Similarly, we can consider the transitive action of G = PGLn (q) = GLn (q)/Z
on the set of 1-dimensional subspaces of V . Suppose q is odd and set x =
x̂Z ∈ G, where x̂ ∈ GLn (q) is the block-diagonal matrix [−I1 , In−1 ] with
respect to a basis {e1 , . . . , en } for V (here, and elsewhere, we use Im to
denote the m × m identity matrix). Then x fixes he1 i and every 1-space in
he2 , . . . , en i, and no others, so
fpr(x) =
q n−1 −1
q−1
q n −1
q−1
1+
=
q n−1 + q − 2
1
∼ .
n
q −1
q
Alternatively, note that a point stabiliser H = q n−1 :(GL1 (q) × GLn−1 (q))/Z
is a maximal parabolic subgroup of G and one checks that xG ∩ H is a union
of two H-classes. More precisely,
|GLn−1 (q)|
|GLn (q)|
|xG ∩ H| = q n−1 + q ·
, |xG | =
|GLn−2 (q)||GL1 (q)|
|GLn−1 (q)||GL1 (q)|
which provides another way to compute fpr(x) via Lemma 1.2(iii).
1.2. Problems. It is natural to consider the following problems, either
in the context of a specific permutation group, or more typically for an interesting family of permutation groups, such as primitive groups and almost
simple groups.
1. Given a permutation group G and x ∈ G, compute fpr(x).
2. Obtain upper and lower bounds on fpr(x) (in terms of parameters
depending on G and x).
6
3. Compute (or bound) the minimal and maximal fixed point ratios
min{fpr(x) : x ∈ G} and max{fpr(x) : 1 6= x ∈ G}.
4. We can also consider “local” versions. For example, given a (normal) subset S ⊆ G \ {1}, compute (or bound) min{fpr(x) : x ∈ S}
and max{fpr(x) : x ∈ S}.
For instance, we may be interested in the case where S is the set of
elements of prime order in G, or the set of involutions, etc. Note
that max{fpr(x) : 1 6= x ∈ G} and max{fpr(x) : x ∈ G, |x| prime}
are equal by Lemma 1.2(ii).
As we will see later, bounds on fixed point ratios (in particular, upper
bounds) are often sufficient for the applications we have in mind.
The above problems are closely related to some classical notions in permutation group theory. To see the connection, let us fix a permutation group
G 6 Sym(Ω) of degree n.
a. Minimal degree: The minimal degree µ(G) of G is defined to be the
smallest number of points moved by any non-identity element, i.e.
µ(G) = min (n − |CΩ (x)|) = n 1 − max fpr(x) .
16=x∈G
16=x∈G
For example, µ(Sym(n)) = 2 and µ(Alt(n)) = 3. This is a classical invariant
studied by Jordan, Bochert, Manning and others (see Section 2.2).
b. Fixity: Similarly, the largest number of fixed points of a non-identity
element is called the fixity of G, denoted by
f (G) = n max fpr(x) = n − µ(G).
16=x∈G
In addition, max16=x∈G fpr(x) is sometimes referred to as the fixity ratio.
This has been studied by Liebeck, Saxl, Shalev and others.
If we take S to be the set of involutions in G, then n (maxx∈S fpr(x))
is the involution fixity of G. This concept was studied by Bender in the
early 1970s, who classified the transitive groups with involution fixity 1 (for
example, the 3-transitive action of PSL2 (2m ) on the projective line has this
property). See [32, 35, 82] for more recent results in the context of almost
simple primitive groups.
c. Derangements: An element x ∈ G is a derangement if fpr(x) = 0, so
min fpr(x) = 0 ⇐⇒ G contains a derangement.
16=x∈G
The existence and abundance of derangements has been intensively studied
for many years, finding a wide range of applications. We refer the reader to
[25, Chapter 1], and the references therein.
1.3. Applications. The above problems have an intrinsic interest in
their own right, but much of the motivation for studying fixed point ratios
stems from the wide range of applications. In order to motivate some of these
applications, we close this introduction by presenting three very different
2. SIMPLE GROUPS
7
problems involving simple groups where fixed point ratios play a key role.
We will return to these problems in Sections 3, 4 and 5.
1. Generating graphs.
Let G be a finite group. The generating graph Γ(G) is a graph on the nonidentity elements of G so that two vertices x, y are joined by an edge if and
only if G = hx, yi.
Problem A. Let G be a nonabelian finite simple group. Prove that Γ(G)
is a connected graph with diameter 2.
2. Monodromy groups.
Let g be a non-negative integer and let E(g) be the set of nonabelian nonalternating composition factors of monodromy groups of branched coverings
f : X → P1 (C) of the Riemann sphere, where X is a compact connected
Riemann surface of genus g.
Problem B. Prove that E(g) is finite.
3. Bases.
Let G 6 Sym(Ω) be a permutation group. A subset B ⊆ Ω is a base for G
if the pointwise stabiliser of B in G is trivial. The base size b(G) of G is the
minimal size of a base for G.
Problem C. Let G 6 Sym(Ω) be a transitive nonabelian finite simple
group with point stabiliser H satisfying the following conditions:
(i) If G = Alt(m), then H acts primitively on {1, . . . , m}.
(ii) If G is a classical group, then H acts irreducibly on the natural
module.
Prove that b(G) 6 7, with equality if and only if G is the Mathieu group M24
in its natural action on 24 points.
2. Simple groups
In this section we focus on fixed point ratios for primitive simple groups
of Lie type. We start with a brief discussion of primitivity in Section 2.1,
before turning our attention to the connection between fixed point ratios and
the classical notion of minimal degree. In Section 2.3 we introduce a theorem
of Liebeck and Saxl (see Theorem 2.6), which provides an essentially best
possible upper bound on fixed point ratios for simple groups of Lie type.
For the remainder of the section, we look at ways in which this theorem can
be strengthened in special cases of interest. For example, we will explain
how much stronger bounds have been established for so-called non-subspace
actions of classical groups – later we will see that these improved fixed point
ratio estimates are essential for the applications we have in mind.
Finally, a word or two on notation. For the remainder of this article we
will adopt the notation for simple groups used by Kleidman and Liebeck
8
(see [68, Section 5.1]). Notice that this differs slightly from the notation in
the Atlas [34]. For instance, we will write PΩn (q) for a simple orthogonal
group (where = ± when n is even) and On (q) is the isometry group of the
underlying quadratic form.
2.1. Primitivity. Let G 6 Sym(Ω) be a permutation group, with orbits Ωi , i ∈ I. Then G induces a transitive permutation group GΩi on each
Ωi ; these are called the transitive constituents of G. In some sense, G is built
from its transitive constituents; indeed, G is a subdirect product of the GΩi
(that is, the corresponding projection maps G → GΩi are surjective). For
example, G = {1, (1, 2)(3, 4)} has orbits Ω1 = {1, 2} and Ω2 = {3, 4} on
Ω = {1, 2, 3, 4}, and G is a proper subdirect product of GΩ1 = {1, (1, 2)}
and GΩ2 = {1, (3, 4)}. For the purposes of studying fixed point ratios, it is
natural to assume that G is transitive.
In turn, the transitive constituents themselves may be built from smaller
permutation groups in a natural way. This leads us to the notion of primitivity. This is an important irreducibility condition that allows us to define
the primitive groups, which are the basic building blocks of all permutation
groups.
Definition 2.1. A transitive group G 6 Sym(Ω) is imprimitive if Ω
admits a nontrivial G-invariant partition, otherwise G is primitive.
Here the trivial partitions are {Ω} and {{α} : α ∈ Ω}. It is an easy
exercise to show that G is primitive if and only if a point stabiliser H = Gα
is a maximal subgroup of G, which is a useful characterisation. For instance,
the action of G = Sym(n) on the set of k-element subsets of {1, . . . , n} is
primitive for all 1 6 k < n, k 6= n/2 (note that G is imprimitive if k = n/2
since Gα < Sym(n/2) o Sym(2) < G). Any transitive group of prime degree
is primitive and all 2-transitive groups are primitive.
It turns out that the abstract structure of a finite primitive group G
is rather restricted (observe that transitivity alone imposes no structural
restrictions whatsoever). For example, the socle of G (denoted soc(G)) is a
direct product of isomorphic simple groups (recall that the socle of a group
is the product of its minimal normal subgroups). In fact, we can say much
more. The main result is the O’Nan-Scott theorem (see [38, Chapter 4], for
example), which describes the structure and action of a primitive group in
terms of its socle. This is a very powerful tool for studying primitive groups.
Indeed, in many situations it can be used to reduce a general problem to
a much more specific problem concerning almost simple groups, at which
point one can appeal to the Classification of Finite Simple Groups (CFSG)
and the vast literature on simple groups and their subgroups, conjugacy
classes and representations. (Recall that a finite group G is almost simple
if soc(G) = G0 is a nonabelian simple group, so G0 6 G 6 Aut(G0 ).)
In view of these observations, in this article we will focus our attention
on fixed point ratios for almost simple primitive permutation groups.
2. SIMPLE GROUPS
9
2.2. Minimal degree. Let G 6 Sym(Ω) be a primitive permutation
group of degree n. Recall that
µ(G) = min (n − |CΩ (x)|) = n 1 − max fpr(x)
16=x∈G
16=x∈G
is the minimal degree of G. This invariant has been studied since the 19th
century. In particular, a classical problem is to find lower bounds on µ(G)
in terms of n, assuming G 6= Alt(n), Sym(n), which is equivalent to finding
upper bounds on max16=x∈G fpr(x). We record some results:
• Jordan [62], 1871: µ(G) tends to infinity as n tends to infinity.
In particular, there are only finitely many primitive groups with a
given minimal degree bigger than 3.
• Bochert [12], 1892: µ(G) > n/4 − 1 if G is 2-transitive.
√
• Babai [7, 8], 1981/2: µ(G) > ( n − 1)/2 (independent of CFSG).
√
• Liebeck & Saxl [75], 1991: µ(G) > 2( n − 1) (using CFSG).
Remark 2.2. The bounds obtained by Babai and Liebeck & Saxl are
essentially best possible. To see this, consider the primitive product action
of G = Sym(m) o Sym(2) on n = m2 points (with m > 3), so
((γ1 )x1 , (γ2 )x2 ) if π = 1
(x1 ,x2 )π
(γ1 , γ2 )
=
((γ2 )x2 , (γ1 )x1 ) if π = (1, 2)
for all γ1 , γ2 ∈ {1, . . . , m} and (x1 , x2 )π ∈ G. One checks that every nonidentity element x ∈ G moves at least 2m points, with equality if and only
2
if x is of the form (y, 1) or (1, y) in
√ the base group Sym(m) , where y is a
transposition. Therefore µ(G) = 2 n.
The following theorem of Guralnick and Magaard is a simplified version
of [52, Theorem 1]; it is the best known result on the minimal degree of
primitive groups.
Theorem 2.3. Let G 6 Sym(Ω) be a primitive group of degree n with
µ(G) < n/2. Then one of the following holds:
(i) G = Sym(n) or Alt(n);
(ii) G 6 L o Sym(r) acts with its product action on Ω = Γr for some
r > 1, where L 6 Sym(Γ) is an almost simple primitive group with
socle L0 and either
(a) L0 = Alt(m) and Γ is the set of k-element subsets of {1, . . . , m}
for some k > 1; or
(b) L0 = Ωm (2) is an orthogonal group over F2 and Γ is a set of
1-dimensional subspaces of the natural L0 -module.
By carefully analysing the cases arising in (b), Guralnick and Magaard
establish the following striking corollary (see [52, Corollary 1]).
Corollary 2.4. Let G be a finite primitive group and assume that the
socle of G is not a product of alternating groups. Then
4
max fpr(x) 6 .
16=x∈G
7
10
Remark 2.5.
(i) The upper bound in Corollary 2.4 is best possible. For example,
suppose
G = O7 (2) ∼
= Sp6 (2), H = Gα = O−
6 (2)
and x ∈ G is a transvection (in other words, x is an involution
with Jordan form [J2 , J14 ] on the natural module for Sp6 (2), where
Ji denotes a standard unipotent Jordan block of size i). All the
transvections in H (and also in G) are conjugate, so
|xG ∩ H| = |xH | =
|O−
|Sp (2)|
6 (2)|
= 36, |xG | = 5 6
= 63
2|Sp4 (2)|
2 |Sp4 (2)|
and thus fpr(x) = 36/63 = 4/7 (the respective centraliser orders
can be read off from [6, Sections 7 and 8], noting that x is a b1 -type
involution in both H and G).
(ii) Note that the conclusion is false if we allow groups whose socle is
a product of alternating groups. For instance, in Example 1.3 we
observed that
lim
max fpr(x) = 1
n→∞
16=x∈G
for the action of G = Sym(n) on 2-sets.
We refer the reader to [66] for results on the minimal degree of arbitrary
finite permutation groups and some interesting applications to quantum
computing.
2.3. Fixed point ratios for simple groups. In this section we discuss fixed point ratios for almost simple groups of Lie type. With a view
towards applications, we are primarily interested in obtaining upper bounds,
so it is natural to focus on primitive actions and prime order elements.
We start by recalling a theorem of Liebeck and Saxl [75, Theorem 1],
which is the most general result in this area.
Theorem 2.6. Let G 6 Sym(Ω) be a transitive almost simple group
of Lie type over Fq with socle G0 and point stabiliser H. Assume G0 6=
PSL2 (q). Then either
(2.1)
max fpr(x) 6
16=x∈G
4
3q
or G0 ∈ {PSL4 (2), PSp4 (3), PΩ−
4 (3)}.
Remark 2.7.
(i) This is a simplified version of [75, Theorem 1], which includes the
case G0 = PSL2 (q) and gives a precise description of the triples
(G, H, x) with fpr(x) > 4/3q.
(ii) The upper bound is essentially best possible. For instance, in Example 1.5 (G = PGLn (q) on 1-spaces) we observed that there are
elements x ∈ G with fpr(x) ∼ 1/q.
2. SIMPLE GROUPS
11
(iii) Consider the special case G0 = PSL4 (2) ∼
= Alt(8) appearing in the
statement of the theorem. If G = G0 .2 = Sym(8), |Ω| = 8 and
x = (1, 2), then fpr(x) = 6/8 > 4/6.
The proof of Theorem 2.6 proceeds by induction, with the ultimate goal
of eliminating the existence of a minimal counterexample (minimal with
respect to the order of the group). The details of the argument are somewhat
complicated by the fact that there are a small number of groups for which
the bound in (2.1) is false. To give a flavour of the main ideas, we provide a
brief sketch to show that (2.1) holds when G = PSLn (q) with n > 6. Below
we use the notation Pm for the stabiliser in G of an m-dimensional subspace
of the natural module V for G.
Sketch proof of Theorem 2.6 (G = PSLn (q), n > 6). Suppose
fpr(x) > 4/3q for some 1 6= x ∈ G. Set H = Gα and write x = x̂Z, where
x̂ ∈ SLn (q) and Z = Z(SLn (q)). In view of Lemma 1.2, we may assume that
H is maximal (so G is primitive) and x has prime order r, so x is either
semisimple (if r 6= p) or unipotent (if r = p), where p is the characteristic of
Fq . Replacing x by a suitable conjugate, if necessary, we may assume that
x ∈ H. Note that
(2.2)
|Ω| <
3q|CG (x)|
4
by Lemma 1.2(iii).
Our first goal is to reduce to the case where x stabilises a nontrivial
decomposition V = V1 ⊕ V2 . Suppose otherwise.
If x is semisimple then it acts irreducibly on V and we deduce that
|CG (x)| 6 (q n − 1)/(q − 1). In view of (2.2), this implies that H = P1 (the
smallest permutation representation of G has degree (q n − 1)/(q − 1)), which
means that x fixes a 1-space. This is incompatible with the irreducibility
of x. Similarly, if x is unipotent then it must be regular (i.e. it has Jordan
form [Jn ] on V ) and by considering |CG (x)| we again deduce that H = P1 .
But a regular unipotent element fixes a unique 1-dimensional subspace of
V , so |CΩ (x)| = 1 and once again we have reached a contradiction.
Let V = V1 ⊕ V2 be a nontrivial decomposition fixed by x with 1 6 a1 6
a2 , where ai = dim Vi . Assume a1 is minimal. We claim that a1 6 2.
Suppose a1 > 3. Set Ai = SLai (q), Bi = GLai (q) and write x̂ =
(x̂1 , x̂2 ) ∈ B1 × B2 . Let
X = hA1 × A2 , x̂i 6 SLn (q).
Let xi be the automorphism of the simple group Ai /Z(Ai ) induced by x̂i .
The minimality of a1 implies that neither x̂1 nor x̂2 is a scalar, so each xi is
nontrivial.
The key step in the proof is to study the orbits Ω1 , . . . , Ωk of X on
Ω, together with the action of A1 and A2 on each orbit. The case where
H = Pa1 can be handled directly, so assume otherwise. For convenience,
let us also assume that neither A1 /Z(A1 ) nor A2 /Z(A2 ) are exceptions to
the statement of the main theorem. Then using induction and a technical
12
lemma [75, Lemma 2.8] one can show that |CΩj (x)| 6 4|Ωj |/3q for each j,
which implies that fpr(x) 6 4/3q, a contradiction.
We now have a1 6 2 and a2 > 4 since n > 6. By considering the orbits of
A2 on Ω and applying induction, one can reduce to the case where A2 6 H.
From here it follows that H = P1 or P2 (using work of Kantor [64], given
the fact that H contains long root elements of G), and it is not too difficult
to eliminate these two possibilities.
2
Theorem 2.6 plays a central role in the proof of√[75, Theorem 2], which
yields the aforementioned lower bound µ(G) > 2( n − 1) on the minimal
degree of a primitive group G of degree n that does not contain Alt(n). To
derive this bound, it suffices to show that µ(G) > n/3 unless G satisfies the
conditions in part (ii)(a) of Theorem 2.3. We briefly sketch the argument.
Consider a counterexample G 6 Sym(Ω) of minimal order, with point
stabiliser H. Fix x ∈ H of prime order such that fpr(x) > 2/3. By applying
the O’Nan-Scott theorem, we can reduce to the case where G is almost
simple. For example, if G is either an affine group or a twisted wreath
product, then N = soc(G) is regular (that is, H ∩ N = 1), so
|CΩ (x)| = |CN (x)| 6
n
|N |
=
2
2
and thus fpr(x) 6 1/2, a contradiction.
Now assume G is almost simple with socle G0 . If G0 is a simple group of
Lie type over Fq then Theorem 2.6 immediately gives µ(G) > n/2 if q > 2,
and µ(G) > n/3 if q = 2. If G0 is a sporadic group and µ(G) > n/2 then
Lemma 1.2(iv) implies that
1 + |χ(x)| >
1 + χ(1)
2
for some non-linear character χ ∈ Irr(G). By inspecting the relevant character tables in the Atlas [34], one checks that no such character exists.
Finally, suppose G0 = Alt(m) is an alternating group and consider the
action of H on Γ = {1, . . . , m}. The situation where H is intransitive or
imprimitive on Γ can be handled directly, working with a concrete description of the action of G on subsets or partitions. Suppose H is primitive.
The minimality of |G| implies that µ(H) > m/3 with respect to the action
of H on Γ. This immediately translates into a lower bound of the form
|xG | > f (m) for some function f and thus |H| > 23 f (m) since fpr(x) > 2/3.
But H is a primitive group of degree m, so |H| < g(m) for some function
g (for instance, we can take g(m) = 4m by a theorem of Praeger and Saxl
[91]). Together, these bounds imply that m 6 750 and by inspecting lists of
small degree primitive groups one can reduce this to m 6 24. The remaining
possibilities can be eliminated one-by-one.
2.4. Classical groups. As observed in Remark 2.7, the upper bound
in Theorem 2.6 is essentially best possible. However, it would be desirable
to have bounds on fpr(x) that depend on the element x in some way. We
might also try to establish stronger bounds, at the expense of excluding some
2. SIMPLE GROUPS
13
specific actions. In this section we report on recent work in this direction
for almost simple classical groups.
Let G 6 Sym(Ω) be an almost simple primitive classical group over Fq
with socle G0 and point stabiliser H. Let V be the natural module for G0
and set n = dim V . Write q = pf with p prime. The possibilities for G0 are
recorded in Table 2.1. Note that we may assume the given conditions on n
and q due to several exceptional isomorphisms among the low-dimensional
classical groups (see [68, Proposition 2.9.1] for example).
Type
Linear
Unitary
Symplectic
Notation
PSLn (q)
PSUn (q)
PSpn (q)0
Ωn (q)
Orthogonal
PΩ±
n (q)
Conditions
n > 2, (n, q) 6= (2, 2), (2, 3)
n > 3, (n, q) 6= (3, 2)
n > 4 even
nq odd, n > 7
n > 8 even
Table 2.1. The finite simple classical groups
Since G is primitive, H is a maximal subgroup of G with G = G0 H. The
possibilities for H are described by a fundamental theorem of Aschbacher.
In [2], Aschbacher introduces eight geometric families of subgroups of G,
denoted by C1 , . . . , C8 , which are defined in terms of the underlying geometry
of V . For example, these collections include the stabilisers of certain types
of subspaces of V , and the stabilisers of appropriate direct sum and tensor
product decompositions. Roughly speaking, Aschbacher’s main theorem
implies that H is either contained in one of the Ci collections, or H is almost
simple and the socle of H acts absolutely irreducibly on V . Following [68],
we use S to denote the latter collection of non-geometric subgroups. In
turn, we write S = S1 ∪ S2 where a subgroup H ∈ S is in S1 if its socle is
a group of Lie type in the defining characteristic p. A brief description of
these subgroup collections is presented in Table 2.2.
Some further conditions are imposed on the subgroups in S to avoid
containment in a geometric subgroup collection. For instance, suppose G0 =
PSLn (q) and H ∈ S has socle H0 . Let
b 0 → GL(V )
ρ:H
b 0 is the
be the corresponding absolutely irreducible representation (where H
b 0 ) does not fix a non-degenerate form
full covering group of H0 ). Then ρ(H
on V and the representation cannot be realised over a proper subfield of Fq
b 0 )).
(see [68, p.3] for a complete list of the conditions satisfied by ρ(H
It turns out that a small additional subgroup collection (denoted by N )
arises when G0 = PSp4 (q)0 (with q even) or PΩ+
8 (q), due to the existence
of certain exceptional automorphisms (the maximal subgroups in the latter
case have been determined by Kleidman [67]).
The definitive reference for information on the structure, maximality and
conjugacy of the geometric subgroups is the book by Kleidman and Liebeck
14
C1
C2
C3
C4
C5
C6
C7
C8
S
N
Stabilisers of subspaces, or pairs of subspaces, of V
L
Stabilisers of decompositions V = ti=1 Vi , where dim Vi = a
Stabilisers of prime degree extension fields of Fq
Stabilisers of decompositions V = V1 ⊗ V2
Stabilisers of prime index subfields of Fq
Normalisers of symplectic-type r-groups, r 6= p
N
Stabilisers of decompositions V = ti=1 Vi , where dim Vi = a
Stabilisers of nondegenerate forms on V
Almost simple absolutely irreducible subgroups
0
Novelty subgroups (G0 = PΩ+
8 (q) or PSp4 (q) (p = 2), only)
Table 2.2. Aschbacher’s subgroup collections
[68]. More recently, the maximal subgroups of the low-dimensional classical
groups with n 6 12 have been completely determined by Bray, Holt and
Roney-Dougal in [14].
Example 2.8. If G0 = PSL6 (q) then the subgroups comprising the geometric Ci collections are described below (note that the C6 and C7 collections
are empty). Here we refer to the type of a subgroup H, which provides an
approximate description of the group-theoretic structure of H (the precise
structure is presented in [14, 68]).
C1 : Parabolic subgroups Pm with m ∈ {1, 2, 3, 4, 5}, where Pm = GU for
an m-dimensional subspace U of V .
In addition, if G contains a graph (or graph-field) automorphism τ of
G0 then C1 also includes the stabilisers of the form GU,W , where U, W are
non-zero subspaces of V with 6 = dim U + dim W and either U ⊂ W or
V = U ⊕ W . (Note that if G = hG0 , τ i and m 6= 3 then Pm < G0 < G since
dim U τ = 6 − m.)
C2 : Stabilisers of direct sum decompositions of the form V = V1 ⊕ V2 or
V = U1 ⊕ U2 ⊕ U3 , where dim Vi = 3 and dim Ui = 2. These subgroups are
of type GL3 (q) o Sym(2) and GL2 (q) o Sym(3), respectively.
C3 : Field extension subgroups of type GL3 (q 2 ) and GL2 (q 3 ).
C4 : Tensor product subgroups of type GL3 (q) ⊗ GL2 (q).
C5 : Subfield subgroups of type GL6 (q0 ), where q = q0k for some prime k.
C8 : Classical subgroups of type Sp6 (q) and O±
6 (q) (with q odd in the
2
latter case), and also type GU6 (q0 ) if q = q0 .
In addition, the possible socles of the subgroups in S are as follows (see
[14, Table 8.25]):
Alt(6), Alt(7), PSL2 (11), M12 , PSL3 (4), PSU4 (3), PSL3 (q).
Note that the latter subgroup arises from the symmetric-square representation S 2 (W ) of SL3 (q), where W is the natural module for SL3 (q).
2. SIMPLE GROUPS
15
When studying fixed point ratios for classical groups, it is natural to
distinguish between those actions which permute subspaces of the natural
module and those which do not. This leads us naturally to the following
definition.
Definition 2.9. Let G 6 Sym(Ω) be an almost simple primitive classical group over Fq with socle G0 , natural module V and point stabiliser H.
The action of G on Ω is a subspace action if one of the following holds for
each maximal subgroup M of G0 containing H ∩ G0 :
(i) M is the stabiliser in G0 of a proper non-zero subspace U of V ,
where U is totally singular, non-degenerate or, if G0 is orthogonal
and q is even, a non-singular 1-space (U can be any subspace if
G0 = PSLn (q)).
(ii) M = O±
n (q) if G0 = Spn (q) and q is even.
Example 2.10. If G0 = PSp6 (q) then the subspace actions correspond
to the following maximal subgroups H of G:
C1 : H = Pm = GU is a maximal parabolic subgroup, where U is a
totally singular m-space and m ∈ {1, 2, 3}.
C1 : H = GW is of type Sp4 (q) × Sp2 (q), where W is a non-degenerate
2-space.
−
C8 : H is of type O+
6 (q) or O6 (q), and q is even.
Note that a subgroup H of the latter type is the stabiliser of a non-degenerate
quadratic form on V . However, if we consider the isomorphism Sp6 (q) ∼
=
O7 (q) (where O7 (q) is the isometry group of a non-singular quadratic form
on a 7-dimensional space over Fq ), then H corresponds to the stabiliser of
an appropriate non-degenerate 6-space. This explains why we include these
subgroups in Definition 2.9.
In general, notice that subspace actions correspond to maximal subgroups in the collection C1 (in addition to the special C8 -subgroups that
arise when G is a symplectic group in even characteristic).
As previously remarked, it is sensible to make a distinction between subspace and non-subspace actions when studying fixed point ratios for classical
groups. In general, the stabilisers for subspace actions tend to be large subgroups, such as maximal parabolic subgroups, so it is natural to expect that
fpr(x) = |xG ∩ H|/|xG | will also be large in this situation. For example,
we demonstrated the sharpness of Theorem 2.6 by considering the action
of PGLn (q) on 1-spaces. Therefore, it is reasonable to expect that better
bounds can be established if we exclude subspace actions. In addition, we
have a very concrete description of subspace actions, which may permit direct calculation, so it also makes sense to treat them separately from this
point of view.
2.5. Subspace actions of classical groups. Let G 6 Sym(Ω) be a
primitive almost simple classical group over Fq in a subspace action with
socle G0 and natural module V . Fix an element x ∈ G ∩ PGL(V ) and write
x = x̂Z, where x̂ ∈ GL(V ) and Z denotes the centre of GL(V ). Since we
can identify Ω with a collection of subspaces (or pairs of subspaces) of V , it
16
is natural to expect that fpr(x) will reflect certain properties of the action
of x on V . For instance, in Example 1.4 we observed that fpr(x) = q d−n
for the natural action of GLn (q) on V = Fnq , where d = dim CV (x) is the
dimension of the 1-eigenspace of x on V . To formalise this, we introduce the
following notation (recall that if y ∈ GL(W ), then [W, y] is the subspace of
W spanned by the vectors of the form w − wy, for w ∈ W ).
Definition 2.11. For x ∈ PGL(V ), let x̂ be a pre-image of x in GL(V )
and define
ν(x) = min{dim[V̄ , λx̂] : λ ∈ K × },
where V̄ = V ⊗ K and K is the algebraic closure of Fq . Note that ν(x) is
equal to the codimension of the largest eigenspace of x̂ on V̄ .
Example 2.12. Consider the action of G = PSpn (q) on the set Ω of
2-dimensional non-degenerate subspaces of V . Assume q is odd and set
x = x̂Z, where x̂ = [−Im , In−m ] and 0 < m < n/2 with respect to an
appropriate symplectic basis of V . The eigenspaces U and W of x̂ are nondegenerate, so m = dim U = ν(x) is even and x stabilises the orthogonal
decomposition V = U ⊥ W . Since G acts transitively on Ω we have
|Ω| =
|Spn (q)|
∼ q 2(n−2) .
|Sp2 (q)||Spn−2 (q)|
Clearly, x fixes a non-degenerate 2-space if and only if it is contained in
either U or W , so
|CΩ (x)| =
|Spn−m (q)|
|Spm (q)|
+
∼ q 2(m−2) + q 2(n−m−2)
|Sp2 (q)||Spm−2 (q)| |Sp2 (q)||Spn−m−2 (q)|
∼ q 2(n−m−2)
and thus fpr(x) ∼ q −2m = q −2ν(x) .
The most general result for subspace actions is the following theorem
of Frohardt and Magaard [44], which shows that the previous example is
typical for all subspace actions.
Theorem 2.13. Fix > 0 and let G 6 Sym(Ω) be a primitive almost
simple classical group over Fq with natural module V , where Ω is an appropriate set of k-subspaces of V . Then there exists an integer N = N (q, )
such that if dim V > N then
fpr(x) < q −ν(x)k +
for all 1 6= x ∈ G ∩ PGL(V ).
This is a somewhat simplified version of their main result. Indeed, [44]
provides a suitably modified version of the theorem that holds for all nonidentity elements in G, together with explicit upper and lower bounds on
fpr(x). For instance, [44, Theorem 1] states that if G0 = PSLn (q), n > 5
and Ω is the set of k-dimensional subspaces of V , then either
(a) fpr(x) 6 9q −(n−1)/2 , or
(b) x ∈ G ∩ PGL(V ), ν(x) 6 n/2k and
q −ν(x)k − q −n 6 fpr(x) 6 q −ν(x)k + 11q −n/2 .
2. SIMPLE GROUPS
17
We also refer the reader to [51, Section 3] for some alternative upper
bounds on max16=x∈G fpr(x) for subspace actions (this work of Guralnick and
Kantor was motivated by very different applications, which we will discuss
in Section 3).
2.6. Non-subspace actions of classical groups. Now let us turn to
the non-subspace actions of classical groups. Here it is natural to distinguish between geometric and non-geometric actions. For geometric actions,
we have a rather concrete description of the embedding of H = Gα in G,
which permits a detailed analysis of the conjugacy classes in H and, more
importantly, their fusion in G. In this way, it is possible to compute accurate
fixed point ratio estimates for geometric actions.
Example 2.14. Suppose G = PSp12 (q) and H is a C2 -subgroup of G of
type Sp4 (q) o Sym(3), so H is the stabiliser of an orthogonal decomposition
V = V1 ⊥ V2 ⊥ V3 and each Vi is a nondegenerate 4-space. Let Z denote
the centre of Sp12 (q). Assume q ≡ 1 (mod 3) and set x = x̂Z ∈ G where
x̂ = [I6 , λI3 , λ2 I3 ] and λ ∈ Fq is a primitive cube root of unity (here we are
thinking of x̂ as a diagonal matrix, with respect to an appropriate basis).
Since two semisimple elements in a symplectic group are conjugate if and
only if they have the same eigenvalues (in a splitting field), we see that
H
3
xG ∩ H = xH
1 ∪ x2 where x̂1 , x̂2 ∈ Sp4 (q) are as follows:
x̂1 = ([I4 ], [I2 , λ, λ2 ], [λI2 , λ2 I2 ]), x̂2 = ([I2 , λ, λ2 ], [I2 , λ, λ2 ], [I2 , λ, λ2 ]).
Therefore
|Sp4 (q)|
|Sp4 (q)|
·
+
|x ∩ H| = 3! ·
|Sp2 (q)||GL1 (q)| |GL2 (q)|
G
|Sp4 (q)|
|Sp2 (q)||GL1 (q)|
3
∼ 6q 12 + q 18
and
|xG | =
|Sp12 (q)|
∼ q 48 ,
|Sp6 (q)||GL3 (q)|
so fpr(x) ∼ q −30 ∼ |xG |−5/8 (we refer the reader to [25, Chapter 3] for
detailed information on the centralisers of elements of prime order in finite
classical groups).
We require different methods to handle the non-geometric actions of
classical groups. Indeed, in general we are unable to determine the maximal
subgroups H ∈ S for a given classical group G. Of course, we do not even
know the dimensions of the irreducible representations of simple groups,
let alone information on the embedding of H in G that might allow us
to understand the fusion of the relevant conjugacy classes! However, as
described below in Section 2.7, there are ways to overcome these obstacles
for the purposes of estimating fixed point ratios.
A key result on non-subspace actions is the following theorem of Liebeck
and Shalev [81], which plays a major role in several important applications.
A nice feature of this result is that the upper bound depends on the size of
the conjugacy class of the element.
18
Theorem 2.15. There is an absolute constant > 0 such that
fpr(x) < |xG |−
for all x ∈ G of prime order and for every primitive almost simple classical
group G in a non-subspace action.
It is easy to see that this result does not extend to subspace actions.
For example, if we consider the action of G = PGLn (q) on 1-spaces and
we choose x ∈ G with ν(x) = 1 then |xG | ∼ q 2n−2 but fpr(x) ∼ q −1 .
In particular, Theorem 2.15 implies that fpr(x) tends to 0 as |G| tends to
infinity (for classical groups acting on subspaces of a fixed dimension, we
only get this limiting behaviour as the field size tends to infinity).
The constant in Theorem 2.15 is undetermined and with applications
in mind it is desirable to pin down an explicit estimate. The main theorem
of [19] implies that ∼ 1/2 is optimal.
Theorem 2.16. Let G be a primitive almost simple classical group in a
non-subspace action with point stabiliser H and natural module of dimension
n. Then
1
fpr(x) < |xG |− 2 +η
for all x ∈ G of prime order, where η → 0 as n → ∞.
This is a simplified version of [19, Theorem 1], which is proved in the
sequence of papers [20, 21, 22]. Indeed, one can take −1/2 + 1/n + δ for
the exponent, where δ = 0, or (G, H, δ) is one of a small number of known
exceptions (in every case, δ → 0 as n → ∞). The next example shows that
there is not much room for improvement in this exponent.
Example 2.17. Suppose G = PSLn (q) and H is a C8 -subgroup of type
O+
(q),
so n is even and q is odd. Let x ∈ G be an involution such that
n
x̂ = [−Im , In−m ] with m even. Then
|xG ∩ H| =
|O+
n (q)|
+
|Om (q)||O+
n−m (q)|
and
|xG | =
+
|O+
n (q)|
−
|Om (q)||O−
n−m (q)|
∼ q m(n−m)
|GLn (q)|
∼ q 2m(n−m)
|GLm (q)||GLn−m (q)|
so fpr(x) ∼ q −m(n−m) ∼ |xG |−1/2 .
There are many other examples that demonstrate the accuracy of the
bound in Theorem 2.16. For instance, if q = q02 and H is a subfield subgroup
of G defined over Fq0 then |xG ∩ H| ∼ |xG |1/2 for all x ∈ G with fixed points,
so fpr(x) ∼ |xG |−1/2 .
The proof of Theorem 2.16 is given in [20, 21, 22]. To handle the
relevant geometric actions we combine detailed information on the structure
of the maximal geometric subgroups in [68] (which is organised according
to the subgroup collections arising in Aschbacher’s theorem) with a careful
analysis of the conjugacy classes and fusion of elements of prime order.
A different approach is needed to deal with the non-geometric actions
corresponding to the maximal subgroups in the collection S. We will briefly
describe the main ingredients in the next section.
2. SIMPLE GROUPS
19
2.7. S-actions of classical groups. Let G, H and n be given as in
the statement of Theorem 2.16. Let G0 be the socle of G, which is a simple
classical group over Fq (for q = pf , p prime) with natural module V of
b 0 → GL(V ) be the
dimension n. Assume H ∈ S has socle H0 and let ρ : H
corresponding absolutely irreducible representation.
If n is small, say n 6 5, then the possibilities for (G, H, ρ) are well known
(see [14]) and it is straightforward to work directly with the representation
ρ (and its Brauer character) to obtain sufficient information on the fusion
of H-classes in G to compute (or accurately estimate) fixed point ratios.
Now assume n > 6. Let us write H ∈ A if q = p, H0 = Alt(m) is an
alternating group and V is the fully deleted permutation module for H0 over
Fq (in which case n = m − 2 or m − 1). We can now state the following
result, which combines the main theorem of [73] with [54, Theorem 7.1].
Theorem 2.18. Let G be a primitive almost simple classical group over
Fq with socle G0 , point stabiliser H ∈ S \ A and natural module V of dib 0 → GL(V ) be the corresponding representation.
mension n > 6. Let ρ : H
Then the following hold:
(i) |H| < q 3nα , where α = 2 if G0 is unitary, otherwise α = 1;
√
(ii) Either ν(x) > max{2, n/2} for all 1 6= x ∈ H ∩ PGL(V ), or
n 6 10 and (G, H, ρ) belongs to a short list of known exceptions.
Remark 2.19.
(a) The bound in part (i) of the theorem can be sharpened, at the
expense of some additional (known) exceptions. For instance, see
[73, Theorem 4.2] and [27, Theorem 2.10] for improvements with
q 3nα replaced by q (2n+4)α and q 2n+4 , respectively (for example, the
case (G, H) = (PSL27 (q), E6 (q)) is an exception to the bound |H| <
q 2n+4 ).
(b) We can view the bound in (ii) as a linear analogue of the aforementioned bounds of Babai, Liebeck and Saxl on the minimal degree
of a primitive permutation group (with irreducibility in place of
primitivity); see Section 2.2.
(c) The bound in (ii) is close to best possible if we impose the condition
that the only exceptions occur in small dimensions. To see this,
suppose n = m2 where m > 3 is odd. If q is chosen appropriately
then G = PSLn (q) has a maximal subgroup H ∈ S with socle H0 =
PSLm (q 2 ), which is embedded in G via the module W ⊗ W (q) for
b 0 = SLm (q 2 ), where W is the natural module for H0 and W (q) is
H
the q-power Frobenius twist of W . If we take x =
√ [−Im−1 , I1 ] ∈ H0
then it is easy to check that ν(x) = 2m − 2 < 2 n.
The proof of Theorem 2.15 also uses the bound in part (i) of Theorem
2.18, but the bound in (ii) is a crucial new ingredient in the proof of Theorem
2.16. The cases in A, and also the small number of low-dimensional exceptions arising in part (ii) of Theorem 2.18, are well understood embeddings
and they can be handled directly.
Generically, Theorem 2.18 tells us that H is small and the elements
in H ∩ PGL(V ) have relatively small eigenspaces on V . In particular, the
20
latter property yields a lower bound |xG | > f (n, q) for all x ∈ H ∩ PGL(V )
of prime order, so we get
(2.3)
fpr(x) =
|xG ∩ H|
|H|
q 3nα
<
<
.
|xG |
|xG |
f (n, q)
Note that if x ∈ H \ PGL(V ) has prime order then x is either a field, graph
or graph-field automorphism of G0 and it is straightforward to check that
the inequality |xG | > f (n, q) still holds, so (2.3) is valid for all x ∈ H of
prime order.
Example 2.20. Suppose G = PSLn (q), H ∈ S \ A and√n > 10. Let
x ∈ H be an element of prime order with ν(x) = s, so s > d n/2e = β by
Theorem 2.18(ii). It is not too difficult to show that
1
|xG | > q 2β(n−β)
2
(see [20, Corollary 3.38]) so we get fpr(x) < |xG |−1/2 if
1
q 6n < q 2β(n−β) .
2
One checks that this inequality holds if n > 36, so we may assume that
n 6 36. In fact, if we replace the bound in part (i) of Theorem 2.18 by
|H| < q 2n+4 (at the expense of a small number of known exceptions (see
[73, Theorem 4.2]), which can be handled separately), then we can reduce
to the case where n 6 16. At this point we can turn to results of Lübeck
[84] (in defining characteristic) and Hiss and Malle [59, 60] (in non-defining
characteristic) to determine the possibilities for (G, H, ρ) and we can then
work directly with these cases.
2.8. Exceptional groups. Finally, let us say a few words on fixed
point ratios for exceptional groups. Let G 6 Sym(Ω) be a primitive almost simple exceptional group of Lie type over Fq with socle G0 and point
stabiliser H. Recall that Theorem 2.6 gives
max fpr(x) 6
16=x∈G
4
3q
and it is natural to ask if this upper bound can be improved.
In [46], Frohardt and Magaard obtain close to best possible upper bounds
in the special case where the rank of G is at most 2. For example, they prove
that
(
1
if G0 ∈ {G2 (q), 2 G2 (q)} and q > 4,
q 2 −q+1
max fpr(x) =
1
if G0 = 3 D4 (q).
16=x∈G
q 4 −q 2 +1
In [71], using different methods, Lawther, Liebeck and Seitz present a
detailed analysis of fixed point ratios for all the exceptional groups. For
instance, [71, Theorem 1] gives
1
q8 (q4 −1) if G0 = E8 (q)
1
if G0 ∈ {E7 (q), 2 E6 (q)}
max fpr(x) 6
q 6 −q 3 +1
16=x∈G
1
if G0 ∈ {E6 (q), F4 (q)},
q 4 −q 2 +1
2. SIMPLE GROUPS
21
with equality if G0 = E6 (q), 2 E6 (q) or F4 (q). More detailed bounds are given
in [71, Theorem 2], which depend not only on G, but also on the choice of
H and x to some extent. For example, if G = E8 (q) and H does not contain
a maximal torus of G, then [71, Theorem 2] states that fpr(x) 6 q −48 for
all non-identity semisimple elements x ∈ G.
As for classical groups, the proofs rely on detailed information on the
subgroup structure and conjugacy classes of the finite exceptional groups.
In particular, there is a fundamental reduction theorem for subgroups due
to Liebeck and Seitz, which plays a similar role to Aschbacher’s theorem for
classical groups (see [77, Theorem 8], for example). We finish by highlighting
two other important ingredients in [71].
2.8.1. Parabolic actions. The special case where H is a maximal parabolic subgroup is studied using tools from the character theory of finite
groups of Lie type, such as the Deligne-Lusztig theory and Green functions.
These sophisticated techniques can be used to obtain very precise fixed point
ratio estimates.
For example, suppose G = E8 (q), H = P8 and x ∈ G is unipotent
(here our notation indicates that H corresponds to the 8-th node in the
Dynkin diagram of G, labelled in the usual way, so the Levi factor of H is
of type E7 (q)). Then |Ω| ∼ q 57 and one can show that the corresponding
permutation character admits the decomposition
X
1G
(x)
=
nφ Rφ (x)
H
c
φ∈W
= Rφ1,0 (x) + Rφ8,1 (x) + Rφ35,2 (x) + Rφ112,3 (x) + Rφ84,4 (x),
c = Irr(W ) and W is the Weyl group of G. The Rφ are almost
where W
characters of G and the coefficients are given by nφ = h1W
WP , φi, where WP
is the corresponding parabolic subgroup of W . The restriction of the Rφ
to unipotent elements x ∈ G are called Green functions; each Rφ (x) is a
polynomial in q with non-negative coefficients. Lübeck has implemented an
algorithm of Lusztig to compute the relevant Green functions (modulo a sign
issue for certain elements) and his calculations yield very precise estimates
for fpr(x) (see [71, Section 2] for more details). For example, if x ∈ G
is a long root element then 1G
H (x) can be computed precisely in this way;
we get a certain monic polynomial in q of degree 45, which implies that
fpr(x) 6 1/q 8 (q 4 − 1). This turns out to be the largest fixed point ratio for
any non-identity element of G.
2.8.2. Algebraic groups. Results on the dimensions of fixed point spaces
for primitive actions of exceptional algebraic groups also play a key role in
[71]. In the general set up, Ḡ is a simple algebraic group over the algebraic
closure K = F̄q and σ is a Frobenius morphism of Ḡ such that G0 is the
derived subgroup of Ḡσ = {x ∈ Ḡ : xσ = x}. Let H̄ be a σ-stable closed
subgroup of Ḡ and let Γ = Ḡ/H̄ be the corresponding coset variety, which
is naturally a Ḡ-variety over K. Then the fixed point space CΓ (x) is a
subvariety for each x ∈ Ḡ, and we may compare the dimensions of Γ and
CΓ (x). In analogy with Lemma 1.2(iii), we have
dim CΓ (x) − dim Γ = dim(xḠ ∩ H̄) − dim xḠ
22
for all x ∈ H̄ (see [70, Proposition 1.14]). Moreover, if we set H = H̄σ then
fpr(x) =
|xG ∩ H|
Ḡ
Ḡ
∼ q dim(x ∩H̄)−dim x
G
|x |
for all x ∈ H (see [71, Lemma 4.5], for example). In this way, if H corresponds to a σ-stable closed subgroup of Ḡ, then it is possible to use dimension bounds at the algebraic group level to study fixed point ratios for the
finite group G.
This interplay between finite and algebraic groups is applied repeatedly
in [71], using results obtained for primitive actions of exceptional algebraic
groups in the companion paper [70]. Similar considerations also play a role
in the analysis of geometric actions of finite classical groups in the proof of
Theorem 2.16, using results for classical algebraic groups in [18].
3. Generation and random generation
In this section we discuss applications of fixed point ratios to problems
concerning the generation and random generation of finite groups. In particular, we will explain how fixed point ratios play a key role in the solution to
Problem A on generating graphs of simple groups stated in the introduction.
3.1. Simple groups. Recall that a group is n-generated if it can be
generated by n elements. For instance, dihedral and symmetric groups are
2-generated, e.g. we have Sym(n) = h(1, 2), (1, 2, . . . , n)i. The following
theorem (essentially due to Steinberg [98]) is the starting point for the
investigation of many interesting problems.
Theorem 3.1. Every finite simple group is 2-generated.
The proof relies on CFSG. The alternating groups are easy:
h(1, 2, 3), (1, 2, . . . , n)i n odd,
Alt(n) =
h(1, 2, 3), (2, 3, . . . , n)i n even.
In [98], Steinberg presents explicit generating pairs for each simple group of
Lie type. For instance, PSL2 (q) = hxZ, yZi, where Z = Z(SL2 (q)) and
µ 0
−1 1
x=
, y=
−1 0
0 µ−1
with F×
q = hµi. In [4], Aschbacher and Guralnick complete the proof of the
theorem by showing that every sporadic group is 2-generated.
Remark 3.2. By a theorem of Dalla Volta and Lucchini [36], every
almost simple group is 3-generated (there are such groups that really need
3 generators, e.g. take G = Aut(PSLn (q)) with nq odd and q = p2f with p
prime).
In view of Theorem 3.1, it is natural to consider the abundance of generating pairs in a finite simple group (or a sequence of such groups), or the
existence of generating pairs with special properties (such as prescribed orders). Problems of this flavour have been intensively investigated in recent
years.
3. GENERATION AND RANDOM GENERATION
23
3.2. Random generation. Let G be a finite group, let k be a positive
integer and let
P(G, k) =
|{(x1 , . . . , xk ) ∈ Gk : G = hx1 , . . . , xk i}|
|G|k
be the probability that k randomly chosen elements generate G.
Conjecture 3.3 (Netto [88], 1882). “If we arbitrarily select two or
more substitutions of n elements, it is to be regarded as extremely probable
that the group of lowest order which contains these is the symmetric group,
or at least the alternating group.”
In our terminology, Netto is claiming that limn→∞ P(Alt(n), 2) = 1.
This remarkable conjecture was proved by Dixon [37] in a highly influential
paper published in 1969, which relies in part on the pioneering work of Erdös
and Turán in the mid-1960s on statistical properties of symmetric groups.
In the same paper, Dixon makes the bold conjecture that all finite simple
groups are strongly 2-generated in the sense of Netto.
Conjecture 3.4. Let (Gn ) be any sequence of finite simple groups such
that |Gn | tends to infinity with n. Then limn→∞ P(Gn , 2) = 1.
Dixon’s conjecture was eventually proved in the 1990s. In [65], Kantor
and Lubotzky establish the conjecture for classical groups and low rank
exceptional groups, and the remaining exceptional groups were handled by
Liebeck and Shalev [78].
In both papers, the strategy of the proof is based on an elementary
observation. Let M be the set of maximal subgroups of G and let x, y ∈ G
be randomly chosen elements. If G 6= hx, yi then x, y ∈ H for some H ∈ M.
The probability of this event is |G : H|−2 , so
X
1 − P(G, 2) 6
|G : H|−2 =: Q(G).
H∈M
By carefully studying M, using recent advances in our understanding of the
subgroup structure of the simple groups of Lie type (such as Aschbacher’s
theorem for classical groups), one shows that Q(G) → 0 as |G| tends to
infinity, and the result follows.
Note that this probabilistic approach shows that every sufficiently large
finite simple group is 2-generated, without the need to explicitly construct
a pair of generators. Many interesting related results have been established
in more recent years. For example, the following result is [87, Theorem 1.1].
Theorem 3.5. We have P(G, 2) > 53/90 for every finite simple group
G, with equality if and only if G = Alt(6).
3.3. Spread. The following 2-generation property was introduced by
Brenner and Wiegold [15] in the 1970s.
Definition 3.6. Let G be a finite group and let k be a positive integer.
Then G has spread at least k if for any non-identity elements x1 , . . . , xk ∈ G
there exists y ∈ G such that G = hxi , yi for all i. We say that G is 32 generated if it has spread at least 1.
24
We will also be interested in the more restrictive notion of uniform
spread, which was introduced more recently in [16].
Definition 3.7. We say that G has uniform spread at least k if there
exists a fixed conjugacy class C of G such that for any non-identity elements
x1 , . . . , xk ∈ G there exists y ∈ C such that G = hxi , yi for all i.
Clearly, every cyclic group has uniform spread at least k for all k ∈ N,
so for the remainder of this discussion let us assume G is non-cyclic. Set
s(G) = max{k ∈ N0 : G has spread at least k}
u(G) = max{k ∈ N0 : G has uniform spread at least k}
(so u(G) = 0 if G does not have uniform spread at least 1, etc.). Note that
u(G) 6 s(G) < |G| − 1 and there are examples with u(G) < s(G). For
example, if G = Sym(6) then u(G) = 0 and s(G) = 2. Note that G is
3
2 -generated if and only if s(G) > 1.
In [15], Brenner and Wiegold study the spread of the simple groups
Alt(n) and PSL2 (q). Among other things, they prove that s(Alt(2m)) = 4
if m > 4 and s(PSL2 (q)) = q − 2 if q is even.
The following theorem of Breuer, Guralnick and Kantor is the main
result on the spread of simple groups (see [16, Corollary 1.3]).
Theorem 3.8. Let G be a nonabelian finite simple group. Then u(G) >
2, with equality if and only if
(3.1)
G ∈ {Alt(5), Alt(6), Ω+
8 (2), Sp2m (2) (m > 3)}.
It turns out that u(G) = s(G) = 2 for each of the groups in (3.1).
Remark 3.9. The weaker bound u(G) > 1 was originally obtained by
Stein [97], and independently by Guralnick and Kantor [51]. In the latter
paper, the authors prove that there is a conjugacy class C of G such that
each non-identity element of G generates G with at least 1/10 of the elements
in C, and they also establish some related results for almost simple groups.
In [16], the constant 1/10 is replaced by 13/42 (for G = Ω+
8 (2), this is best
possible). In fact, with the exception of a known finite list of small groups,
plus the family of symplectic groups over F2 , 1/10 can be replaced by 2/3
(see [16, Theorem 1.1]). As explained below, this result is the key ingredient
in the proof of Theorem 3.8. We also note that in an earlier paper, Guralnick
and Shalev proved that u(G) > 2 for all sufficiently large simple groups G
(see [55, Theorem 1.2]).
Fixed point ratios play a central role in the proof of Theorem 3.8. Let
us explain the connection. Let G be a finite group. For x, y ∈ G, let
|{z ∈ y G : G = hx, zi}|
|y G |
be the probability that x and a randomly chosen conjugate of y generate G.
Set
Q(x, y) = 1 − P(x, y).
P(x, y) =
Lemma 3.10. Suppose there exists an element y ∈ G and a positive
integer k such that Q(x, y) < 1/k for all 1 6= x ∈ G. Then u(G) > k.
3. GENERATION AND RANDOM GENERATION
25
Proof. Let x1 , . . . , xk ∈ G be non-identity elements and let E denote
the event E1 ∩· · ·∩Ek , where Ei is the event that G = hxi , zi for a randomly
chosen conjugate z ∈ y G . Let P(E) be the probability that E occurs and let
Ē be the complementary event (and similarly for P(Ei ) and Ēi ). We need
to show that P(E) > 0. To see this, we note that
P(E) = 1 − P(Ē) = 1 − P(Ē1 ∪ · · · ∪ Ēk ) > 1 −
k
X
P(Ēi ) = 1 −
i=1
so P(E) > 1 − k ·
1
k
= 0 and the result follows.
k
X
Q(xi , y)
i=1
Let M(y) be the set of maximal subgroups of G containing y. The
following result is the main tool in the proof of Theorem 3.8.
Corollary 3.11. Suppose there is an element y ∈ G and a positive
integer k such that
X
1
fpr(x, G/H) <
k
H∈M(y)
for all elements x ∈ G of prime order. Then u(G) > k.
Proof. In view of Lemma 3.10, it suffices to show that
X
Q(x, y) 6
fpr(x, G/H)
H∈M(y)
for all 1 6= x ∈ G. Fix a non-identity element x ∈ G and let z ∈ y G . Then
G 6= hx, zi if and only if hx0 , yi 6 H for some x0 ∈ xG and H ∈ M(y), so we
have
X
Q(x, y) 6
Px (H),
H∈M(y)
where Px (H) is the probability that a randomly chosen conjugate of x lies
in H. Now
|xG ∩ H|
= fpr(x, G/H)
Px (H) =
|xG |
and the result follows.
The key step in applying Corollary 3.11 is to carefully choose y ∈ G
so that it belongs to very few maximal subgroups of G, with the essential
extra property that we can explicitly determine the subgroups in M(y), or
at least a collection of maximal subgroups containing M(y) that is not too
much bigger. This means that there is some flexibility in the approach – the
optimal choice of y is not always obvious (in practice, it seems that there
are many valid possibilities, but some will require more work than others).
Example 3.12. Let’s use this approach to prove that u(Alt(5)) > 2.
Set G = Alt(5) and y = (1, 2, 3, 4, 5) ∈ G. The maximal subgroups of
G are isomorphic to Sym(3), Alt(4) and D10 , and it is easy to see that
M(y) = {K} with
K = h(1, 2, 3, 4, 5), (1, 2)(3, 5)i = D10 .
26
We now compute
1/3 |x| = 2
0
|x| = 3
fpr(x, G/H) = fpr(x, G/K) =
1/6 |x| = 5
H∈M(y)
X
and thus u(G) > 2 by Corollary 3.11. In fact, we have u(G) = 2 (see
Theorem 3.8), which shows that the strictness of the inequality in Corollary
3.11 is essential. As an aside, one can check that the class of 3-cycles has
the uniform spread 1 property, but not spread 2.
Example 3.13. We claim that u(G) > 3 if G = Alt(n) and n > 8 is
even (recall the result of Brenner and Wiegold, which states that s(G) = 4).
To see this, set n = 2m and k = m − (2, m − 1). Fix y ∈ G with cycle-shape
[k, n − k] and note that (k, n − k) = 1. We claim that M(y) consists of
a single intransitive subgroup H of type Sym(k) × Sym(n − k). It is clear
that H is the only intransitive subgroup in M(y), so assume M ∈ M(y) is
transitive. The cycle-shape of y implies that M is primitive, but hyi contains
a k-cycle and thus M = G by a classical result of Marggraf (1892), which is
a contradiction (Marggraf’s theorem implies that the only primitive groups
of degree n containing a cycle of length ` < n/2 are Sym(n) and Alt(n); see
[101, Theorem 13.5]). This justifies the claim. It remains to estimate fixed
point ratios with respect to the action of G on k-sets. A straightforward
combinatorial argument shows that fpr(x) < 1/3 for all x ∈ G of prime
order (see the proof of [16, Proposition 6.3]) and the result follows.
Remark 3.14. The analysis of odd degree alternating groups is slightly
more complicated. In this situation, no elements have precisely two cycles,
so one is forced to work with n-cycles, which may belong to several maximal
subgroups.
Remark 3.15. By a theorem of Guralnick and Shalev [55, Theorem 1.1],
if Gi = Alt(ni ) and ni tends to infinity with i, then s(Gi ) tends to infinity if
and only if p(ni ) tends to infinity, where p(ni ) is the smallest prime divisor
of ni .
Let us also comment on the proof of Theorem 3.8 for classical groups,
which require the most work. To illustrate some of the main ideas, we
will assume that G = PSLn (q) and n > 13 is odd. Following [16], fix a
semisimple element y ∈ G preserving a decomposition V = U ⊕ W of the
natural module, where dim U = k = (n − 1)/2 and y acts irreducibly on U
and W . We claim that M(y) = {GU , GW }, which quickly implies that
X
1
fpr(x, G/H) = 2 · fpr(x, G/GU ) <
3
H∈M(y)
for all x ∈ G of prime order (note that the actions of G on k-subspaces
and (n − k)-subspaces of V are permutation isomorphic and fpr(x, G/GU ) =
fpr(x, G/GW ) for all x ∈ G). For example, if q > 8 then fpr(x, G/GU ) 6 1/6
by Theorem 2.6. In particular, we conclude that u(G) > 3.
In order to determine the subgroups in M(y), it is very helpful to observe
that |y| is divisible by a primitive prime divisor of q n−k − 1 (that is, a prime
r such that n − k is the smallest positive integer i such that r divides q i − 1;
3. GENERATION AND RANDOM GENERATION
27
a2
a3
a
ab
a3 b
b
a2 b
Figure 3.1. The generating graph of D8 = ha, b | a4 = b2 =
1, ab = a−1 i
a classical theorem of Zsigmondy (1892) establishes the existence of such
primes if n − k > 3 and (n − k, q) 6= (6, 2)). The subgroups of classical
groups containing such ppd elements are studied in [53], where the analysis
is organised according to Aschbacher’s subgroup structure theorem. The
main theorem of [53] severely limits the possible subgroups in M(y), and
many of these possibilities can be ruled out by considering the order of y
(which is roughly (q n − 1)/(q − 1) since (k, n − k) = 1). We refer the reader
to the proof of [16, Proposition 5.23] for the details.
3.4. Generating graphs. The following notion first appeared in a paper by Liebeck and Shalev [80] on random generation.
Definition 3.16. Let G be a finite group. The generating graph Γ(G)
is a graph on the non-identity elements of G so that two vertices x, y are
joined by an edge if and only if G = hx, yi.
This graph encodes many interesting generation properties of the group.
For example,
G is 2-generated ⇐⇒ The edge-set of Γ(G) is non-empty
G has spread 1 ⇐⇒ Γ(G) has no isolated vertices
G has spread 2 =⇒ Γ(G) is connected with diameter at most 2
Moreover, the interplay between groups and graphs suggests many natural problems. For instance, what is the (co)-clique number and chromatic
number of Γ(G)? Does Γ(G) contain a Hamiltonian cycle?
In view of Theorem 3.1, it makes sense to study the generating graphs
of finite simple groups. Moreover, the fact that simple groups are strongly
2-generated (in the probabilistic sense of Netto and Dixon (see Conjecture
3.4), for example, or in the sense of spread, as in Theorem 3.8) suggests that
the corresponding generating graphs should have lots of edges and therefore
strong connectivity properties.
Example 3.17. If G = Alt(5) then Γ(G) has 59 vertices and one checks
that there are 1140 edges. It also has clique number 8, chromatic number
28
9 and coclique number 15 (for example, a maximal coclique is given by the
set of 15 elements of order 2).
The following result summarises some of the main results on generating
graphs for simple groups.
Theorem 3.18. Let G be a nonabelian finite simple group and let Γ(G)
be its generating graph.
(i) Γ(G) has no isolated vertices.
(ii) Γ(G) is connected and has diameter 2.
(iii) Γ(G) contains a Hamiltonian cycle if |G| is sufficiently large.
Proof. Clearly, (ii) implies (i), and (ii) is an immediate corollary of
Theorem 3.8. Part (iii) is one of the main results in [17] and we briefly
sketch the argument in the case where G is a group of Lie type. The three
main ingredients are as follows:
(a) By the proof of Dixon’s conjecture, we know that P(G, 2) → 1 as |G|
tends to infinity. More precisely, a theorem of Liebeck and Shalev
(see [80, Theorem 1.6]) states that there is a positive constant c1
such that
c1
P(G, 2) > 1 −
m(G)
for any nonabelian finite simple group G, where m(G) is the minimal index of a proper subgroup of G. Note that G 6 Sym(m(G)),
so m(G) tends to infinity with |G|.
(b) Set |G| = m + 1 (so m is odd) and let di be the degree of the i-th
vertex of Γ(G), where the vertices are labelled so that di 6 di+1
for all i. By a theorem of Fulman and Guralnick [48], there is a
positive constant c2 such that
d1 > c2 (m + 1)
(the constant c2 is independent of the choice of G).
(c) Pósa’s criterion: Γ(G) has a Hamiltonian cycle if dk > k + 1 for
all k < m/2 (see [83, Exercise 10.21(b)]).
If di > m/2 for all i then Pósa’s criterion immediately implies that Γ(G)
has a Hamiltonian cycle, so assume otherwise. Let t be maximal such that
dt < m/2 and observe that
m
X
1
1
2
(m+1) ·P(G, 2) =
di < (m−1)t+(m−t)(m+1) < (m+1)2 − (m+1)t.
2
2
i=1
Therefore, applying (a) we get
c1
t
1−
6 P(G, 2) 6 1 −
m(G)
2(m + 1)
and thus
2c1 (m + 1)
t6
6 c2 (m + 1) − 1
m(G)
if |G| is sufficiently large, where c2 is the constant in (b). It follows that if
1 6 k 6 t then
dk > d1 > c2 (m + 1) > t + 1 > k + 1.
3. GENERATION AND RANDOM GENERATION
29
Similarly, if t + 1 6 k < m/2 then dk > (m + 1)/2 > k + 1. Therefore,
Pósa’s criterion is satisfied and we conclude that Γ(G) has a Hamiltonian
cycle.
Let G be a 2-generated finite group and let N be a nontrivial normal
subgroup of G. Observe that if Γ(G) has no isolated vertices, then G/N
is cyclic (indeed, if 1 6= x ∈ N and G = hx, yi for some y ∈ G, then
G/N = hyN i is cyclic). The following conjecture is a combination (and
strengthening) of conjectures in [16, 17]:
Conjecture 3.19. Let G be a finite group with |G| > 4. Then the
following are equivalent:
(i) G has spread 1.
(ii) G has spread 2.
(iii) Γ(G) has no isolated vertices.
(iv) Γ(G) is connected.
(v) Γ(G) is connected with diameter at most 2.
(vi) Γ(G) contains a Hamiltonian cycle.
(vii) G/N is cyclic for every nontrivial normal subgroup N .
Remark 3.20. Some comments on the status of this conjecture:
(a) Note that any of the first six statements implies (vii). The following
implications are also obvious:
(i) ⇐⇒ (iii), (ii) =⇒ (v), (vi) =⇒ (iv) =⇒ (iii),
(v) =⇒ (iv) =⇒ (iii)
(b) By [17, Proposition 1.1], (vi) and (vii) are equivalent for soluble
groups.
(c) The conjectured equivalence of (i) and (vii) is [16, Conjecture 1.8],
and that of (vi) and (vii) is [17, Conjecture 1.6].
Notice that if the conjecture is true, then there is no finite group with
spread 1, but not spread 2.
Let us focus on the following weaker conjecture of Breuer, Guralnick and
Kantor.
Conjecture 3.21. Let G be a finite group. Then G has spread 1 if and
only if G/N is cyclic for every nontrivial normal subgroup N of G.
As noted above, Conjecture 3.21 has been verified for soluble groups.
More importantly, Guralnick has recently established the following reduction
theorem.
Theorem 3.22. It is sufficient to prove Conjecture 3.21 for almost simple groups.
In view of this result, we focus our attention on almost simple groups G
of the form G = hG0 , xi, where G0 is simple and x ∈ Aut(G0 ). The goal is
to prove that G has spread 1 (in fact, we aim for s(G) > 2). This is work
in progress:
• G0 = Alt(n) or sporadic: s(G) > 2 by results in [16].
30
• G0 = PSLn (q): s(G) > 2 by the main theorem of [26].
• G0 ∈ {PSpn (q), Ωn (q) (nq odd)}: s(G) > 2 by work of Scott Harper
(2016) in his PhD thesis (see [58]).
The goal is to use Corollary 3.11 to show that u(G) > 2. To do this,
we need to find a suitable element y ∈ G0 x so that we can determine the
maximal overgroups M(y) and estimate
X
fpr(x, G/H)
H∈M(y)
for all x ∈ G of prime order (to get spread 1, recall that we need to show
that this sum is less than 1). The set-up here is complicated by the fact
that we have to choose y in the coset G0 x, where x is typically a field or
graph automorphism of G0 . The following example illustrates some of the
main ideas in the situation where x is a field automorphism.
Example 3.23 (Harper). Let G0 = Spn (q), where q = q0e is even, e > 5
and n = 2m with m > 3 odd. Let X = Spn (K) be the ambient simple
algebraic group over the algebraic closure K = F̄q and let σ : X → X be a
Frobenius morphism such that Xσe = G0 . Set H0 = Xσ = Spn (q0 ) < G0 .
Suppose G = hG0 , xi, where x is the restriction of σ to G0 (this is a
field automorphism of order e). By the Lang-Steinberg theorem (see [99,
Theorem 10.1]), for each sx in the coset G0 x there exists a ∈ X such that
s = a−σ a. This allows us to define a map
(3.2)
f : {G0 -classes in G0 x} → {H0 -classes in H0 }
by sending (sx)G0 to (a(sx)e a−1 )H0 . One checks that f is well-defined and
bijective (this map is sometimes called the Shintani correspondence). One
can also show that f has nice fixed point properties for suitable actions of
G and H0 (see [26, Theorem 2.14], for example).
The strategy is to choose an element z ∈ H0 so that the maximal overgroups of z in H0 are somewhat restricted; hopefully this will allow us to control the maximal subgroups of G containing a representative y ∈ G0 x of the
corresponding G0 -class in the coset G0 x. To do this, we take a semisimple
element of the form z = [A, B] ∈ H0 , where A ∈ Sp2 (q0 ) and B ∈ Spn−2 (q0 )
are irreducible (so z preserves an orthogonal decomposition V0 = U ⊥ W of
the natural module V0 for H0 , with dim U = 2). Fix an element y ∈ G0 x
such that f (y G0 ) = z H0 .
We need to determine the maximal subgroups of G containing y. To do
this, it is helpful to observe that (|A|, |B|) = 1 so ν(y ` ) = 2 for some positive
integer `. This quickly rules out maximal subgroups in the collections C3 ,
C4 and C7 , and [54, Theorem 7.1] (cf. Theorem 2.18) can be used to further
restrict the possibilities for H. By exploiting some additional properties of
the bijection in (3.2) one can show that there is a unique reducible subgroup
in M(y) (of type Sp2 (q) × Spn−2 (q)) and also a unique C8 -subgroup of type
O±
n (q).
By carefully studying the subgroups in C2 ∪C5 , and by applying the fixed
point ratio bounds in Theorems 2.6 and 2.16, one can show that
X
fpr(x, G/H) < α
H∈M(y)
4. MONODROMY GROUPS
31
for all x ∈ G of prime order, where
(4q + 4)1/2−1/2m
4
α = 2· + 1 + 2(m−1,e) + (log(e) + 1)(q0 + 1)(q0m−1 + 1) ·
3q
q m−1
Now q > 32 since q = q0e with e > 5, and it is straightforward to show that
α < 1/3. Therefore u(G) > 3 by Corollary 3.11.
4. Monodromy groups
In this section we turn to an application of fixed point ratios in the study
of coverings of Riemann surfaces, focussing on the solution to Problem B
stated in the introduction.
4.1. Preliminaries. Let X be a compact connected Riemann surface
of genus g > 0 and let Y = P1 (C) be the Riemann sphere. Let f : X → Y
be a branched covering of degree n. This means that f is a meromorphic
function with a finite set of branch points B = {y1 , . . . , yk } ⊂ Y (with
k > 2) such that the restriction of f to X 0 = X \ f −1 (B) is a covering map
of degree n (that is, |f −1 (y)| = n for all y ∈ Y 0 = Y \ B, so generically f is
an “n-to-1” mapping).
Fix y0 ∈ Y 0 and let Ω = f −1 (y0 ) = {x1 , . . . , xn } be the fibre of y0 . Let γ
be a loop in Y 0 based at y0 . For each xi ∈ Ω, we can lift γ via f to a path γ̃i
in X beginning at xi . The endpoint γ̃i (1) is also in Ω and the corresponding
map σγ : xi 7→ γ̃i (1) is a permutation of Ω, which is independent of the
homotopy type of γ. In this way, we obtain a homomorphism
ϕ : π1 (Y 0 , y0 ) → Sym(Ω), [γ] 7→ σγ
from the fundamental group of Y 0 with base point y0 . The image of this
map is a permutation group of degree n. Moreover, the path connectedness
of Y 0 implies that the group we obtain in this way is independent of the
choice of base point y0 ∈ Y 0 , up to permutation isomorphism. This allows
us to make the following definition.
Definition 4.1. The monodromy group Mon(X, f ) of f is defined to be
the image of ϕ.
Since X has genus g, we refer to Mon(X, f ) as a monodromy group of
genus g. The connectedness of X implies that Mon(X, f ) is a transitive
permutation group.
Example 4.2. Let n > 2 be an integer and consider the map f : X → Y
given by f (z) = z n , where X = Y = P1 (C). This is a branched covering of
degree n with branch points B = {0, ∞} and Ω = f −1 (1) = {e2πik/n : k =
0, 1, . . . , n − 1}. Here the monodromy group is cyclic of order n, generated
by the permutation α 7→ ζα of Ω, with ζ = e2πi/n .
There is a natural generating set {γ1 , . . . , γk } for π1 (Y 0 , y0 ), where γi is
a loop that encircles the i-th branch point yi (and no other branch point)
with the property that the γi only meet at y0 . Moreover, by relabelling if
necessary, one can show that the product γ1 · · · γk is homotopy equivalent
32
to the trivial loop based at y0 , so γ1 · · · γk = 1 and by a theorem of Hurwitz
(1891) we have
π1 (Y 0 , y0 ) = hγ1 , . . . , γk | γ1 · · · γk = 1i.
This implies that Mon(X, f ) = hσ1 , . . . , σk i and σ1 · · · σk = 1, where σi = σγi
as above.
Question. Which transitive permutation groups G 6 Sym(Ω) of degree
n occur as the monodromy group of a branched covering f : X → P1 (C) of
genus g and degree n?
A necessary and sufficient condition is provided by the Riemann Existence Theorem below (see [100] for a modern treatment). In the statement,
recall that ind(x) = n − t is the index of a permutation x ∈ Sym(Ω), where
t is the number of cycles of x on Ω. Equivalently, ind(x) is the minimal
` such that x is a product of ` transpositions.
P Note that if x1 , . . . , xk are
permutations of Ω with x1 · · · xk = 1, then i ind(xi ) is even.
Theorem 4.3 (Riemann Existence Theorem). Let G 6 Sym(Ω) be a
transitive group of degree n. Then G is isomorphic to a monodromy group
Mon(X, f ) for some compact connected Riemann surface X of genus g and
branched covering f : X → P1 (C) if and only if G has a generating set
{g1 , . . . , gk } such that g1 · · · gk = 1 and
(4.1)
k
X
ind(gi ) = 2(n + g − 1).
i=1
This fundamental result allows us to translate questions about monodromy groups to purely group-theoretic problems concerning finite permutation groups. One of the main problems is to understand the structure
of monodromy groups of genus g, specifically in terms of the composition
factors of such groups. This is formalised in a highly influential conjecture
of Guralnick and Thompson from 1990 [56], which we will discuss below.
Remark 4.4. There is a well understood connection between branched
covers of P1 (C) and finite extensions of the field C(t). More precisely, if
f : X → P1 (C) is a branched covering then C(X)/C(t) is a finite extension,
where C(X) and C(t) denote the function fields of X and P1 (C), respectively. It turns out that the Galois group of the normal closure of this
extension is the monodromy group Mon(X, f ). Therefore, Theorem 4.3 can
be interpreted in terms of the inverse Galois problem. In particular, this
viewpoint permits natural generalisations in which C is replaced by some
other algebraically closed field (of any characteristic). We will return to this
more general set-up at the end of the section.
4.2. The Guralnick-Thompson conjecture. Motivated by the discussion above, we define the genus of a finite group as follows.
Definition 4.5. Let G 6 Sym(Ω) be a finite transitive permutation
group and let E = {g1 , . . . , gk } be a generating set for G with g1 · · · gk = 1.
Define the genus g = g(G, Ω, E) as in (4.1) and define g(G, Ω) to be the
minimal value of g(G, Ω, E) over all such generating sets E (for any k). We
4. MONODROMY GROUPS
33
say that a finite group G has genus g if it has a faithful transitive G-set Ω
such that g(G, Ω) 6 g.
Example 4.6. Let G = hg1 i be a cyclic group of order n. Set E =
{g1 , g1−1 } and consider the regular action of G on itself. Then ind(g1 ) =
ind(g1−1 ) = n − 1, so (4.1) implies that G has genus zero.
Example 4.7. Let G = Sym(n) = hg1 , g2 , g2−1 g1−1 i, where g1 = (1, 2)
and g2 = (1, 2, . . . , n), and consider the natural action of G of degree n. The
indices of the respective generators are 1, n − 1 and n − 2, hence G has genus
zero. Similarly, every alternating group has genus 0.
Fix a non-negative integer g and let C(g) be the set of composition
factors of groups of genus g. Note that C(0) ⊆ C(g). In view of the above
examples, it follows that C(g) contains every simple cyclic and alternating
group. Therefore we focus on E(g), which is the set of nonabelian, nonalternating composition factors of groups of genus g.
The following theorem establishes a conjecture of Guralnick and Thompson [56], which we stated as Problem B in the introduction.
Theorem 4.8. E(g) is finite for each g.
Sketch proof. We briefly sketch the main steps, highlighting the central role played by fixed point ratios.
Step 1. Reduction to almost simple primitive groups.
By work of Aschbacher, Guralnick, Neubauer, Thompson and others
[3, 49, 56, 89], it is sufficient to show that there are only finitely many
primitive almost simple groups of Lie type of genus g. The key ingredient in
this highly nontrivial reduction is the Aschbacher-O’Nan-Scott theorem (as
formulated in [5]) on the structure of finite groups with a core-free maximal
subgroup. See [49, Section 5] for more details.
Step 2. Fixed point ratio estimates.
The next result provides the connection to fixed point ratios (see [49,
Corollary 2]).
Proposition 4.9. Let X be the set of nonabelian, non-alternating finite
simple groups such that
(4.2)
max fpr(x, Ω) 6
16=x∈G
1
86
for every almost simple primitive group G 6 Sym(Ω) with socle G0 ∈ X .
Then X ∩ E(g) is finite for every non-negative integer g.
Proof. Let G 6 Sym(Ω) be a primitive almost simple group of degree
n with socle G0 ∈ X , so (4.2) holds. Fix a generating set {g1 , . . . , gk } for G
such that g1 · · · gk = 1 and define g as in (4.1). Note that k > 3. Let di be
the order of gi and let orb(gi ) be the number of cycles of gi on Ω. Without
loss of generality, we may assume that di 6 di+1 for all i.
34
By the orbit-counting lemma we have
X
n
n
orb(gi ) =
fpr(x, Ω) = 1 +
di
di
x∈hgi i
X
fpr(x, Ω)
16=x∈hgi i
and thus
k
X
ind(gi ) =
i=1
k
X
i=1
k
85 X di − 1
.
(n − orb(gi )) > n
86
di
i=1
Since G is insoluble and G 6∼
= Alt(5), [56, Proposition 2.4] implies that
k
X
di − 1
(4.3)
i=1
di
>
85
.
42
(Note that equality holds if and only if k = 3 and (d1 , d2 , d3 ) = (2, 3, 7), so
G is a Hurwitz group, such as PSL2 (7).) Therefore
2(n + g − 1) =
k
X
ind(gi ) >
i=1
85 85
· n
86 42
and thus n 6 7224(g − 1). The result follows.
Step 3. Bounded rank.
We combine Proposition 4.9 with Theorem 2.6, noting that 4/3q 6 1/86
when q > 113 (the almost simple groups with socle PSL2 (q) excluded in
Theorem 2.6 can be handled separately).
Therefore, to complete the proof of the theorem we may assume that
G is an almost simple classical group of large rank (in other words, we
may assume that the dimension of the natural module of the socle of G is
arbitrarily large).
Step 4. Classical groups in non-subspace actions.
Let G 6 Sym(Ω) be an almost simple primitive group over Fq with socle
G0 in a non-subspace action (see Definition 2.9). Let m be the dimension
of the natural module for G0 . By Theorem 2.15 there is a constant δ > 0
such that
max fpr(x) < q −δm ,
16=x∈G
so there are at most finitely many groups G with max16=x∈G fpr(x) > 1/86.
Now apply Proposition 4.9.
Step 5. Classical groups in subspace actions.
To complete the proof it remains to handle the subspace actions of classical groups. It is sufficient to prove the following result (see [45]).
Proposition 4.10. Fix a prime power q and non-negative integer g.
Then there exists a constant N = N (q) such that if G 6 Sym(Ω) is any
primitive almost simple classical group over Fq in a subspace action of genus
g then either m 6 N or n 6 2000g, where m is the dimension of the natural
module and n is the degree of G.
4. MONODROMY GROUPS
35
In other words, if the dimension of the natural module V is large enough,
then the degree of G is bounded above by a (linear) function of g and the
result follows. The key tool is Theorem 2.13 – the details are rather technical,
so we only provide a rough outline of the argument.
Let G = hg1 , . . . , gk i be a generating set such that g1 · · · gk = 1 and (4.1)
holds. Let di be the order of gi and label the gi so that di 6 di+1 for all i.
Let ϕ be Euler’s function and set
ν(d) = min{ν(x) : x ∈ G, |x| = d},
1X
ϕ(a)q −ν(a)
α0 (d) = 1 −
d
a|d
for each natural number d. Note that α0 (d) > 1/4 if d > 2. Set
k
α(gi ) =
X
ind(gi )
, σ=
α(gi )
n
i=1
and observe that it suffices to show that σ > 2.001 if m is sufficiently large
(where m is the dimension of the natural module).
We may assume that m is large enough so that Theorem 2.13 gives
fpr(x) < q −ν(x) + 10−3
for all 1 6= x ∈ G ∩ PGL(V ). Then
di
di
X
j
1
1 X
fpr(gij ) > 1 −
q −ν(|gi |) − 10−3
α(gi ) = 1 −
di
di
j=1
j=1
1 X
=1−
ϕ(a)q −ν(a) − 10−3
di
a|di
= α0 (di ) − 10−3
which is at least 0.249, whence σ > 0.249k. Therefore, we may assume that
k 6 8. With further work it is possible to reduce to the minimal case k = 3,
where the final analysis splits into several subcases according to the values
of d1 , d2 and d3 . It is worth noting that an important tool in the latter
reduction is the fact that
k
X
ν(gi ) > 2m,
i=1
which follows from a well known theorem of Scott [93].
4.3. Genus zero groups. It remains an open problem to explicitly
determine the simple groups in E(g), although there has been some significant recent progress in the low genus cases, and in particular the special
case g = 0. For example, the sporadic groups in E(0) have been determined
by Magaard [85]; the examples are as follows:
M11 , M12 , M22 , M23 , M24 , J1 , J2 , Co3 , HS.
36
By work of Frohardt and Magaard [42, 43], the only exceptional groups in
E(0) are 2 B2 (8), G2 (2)0 ∼
= PSU3 (3) and 2 G2 (3)0 ∼
= PSL2 (8). The relevant
groups of the form PSL2 (q) and PSU3 (q) are determined in [40]:
PSL2 (q) : q ∈ {7, 8, 11, 13, 16, 17, 19, 25, 27, 29, 31, 32, 37, 41, 43, 64}
PSU3 (q) : q ∈ {3, 4, 5}
There is work in progress by Frohardt, Guralnick, Hoffman and Magaard
to extend the results in [40] to higher rank classical groups, leading to a
complete classification of all primitive permutation groups of genus zero. In
fact, the ultimate aim is to determine the primitive groups of genus at most
two, building on earlier work in [41]. It is anticipated that these results will
have interesting number-theoretic applications.
At a conference in July 2016 (Algebraic Combinatorics and Group Actions, Herstmonceux Castle, UK), Frohardt announced that the groups in
E(0) have been determined. The complete list is as follows:
PSL2 (q), 7 6 q 6 43, q 6= 9, 23
PSL2 (64)
PSL3 (q), q ∈ {3, 4, 5, 7}
PSL4 (3), PSL4 (4), PSL5 (2), PSL5 (3), PSL6 (2)
PSU3 (3), PSU3 (4), PSU3 (5)
PSp4 (3), PSp4 (4), PSp4 (5)
PSp6 (2), PSp8 (2)
−
PΩ+
8 (2), PΩ8 (2)
2 B (8)
2
M11 , M12 , M22 , M23 , M24 , J1 , J2 , Co3 , HS
Example 4.11. Notice that G = PSL2 (23) 6∈ E(0). To see that G does
not have a primitive genus zero action, first observe that G has five conjugacy
classes of maximal subgroups, represented by
Z23 :Z11 , D24 , D22 , Sym(4) (two classes).
Fix a maximal subgroup M and set n = |G : M |. As recorded in the
following table, it is straightforward to compute ind(x) for each non-identity
x ∈ G (with respect to the action of G on G/M ):
M
n 2n − 2 |x| = 2 3
4
6
11 12 23
Z23 :Z11 24
46
12
16 18 20 20 22 22
D24
253
504
120
168 186 208 230 230 242
D22
276
550
132
184 208 238 250 252 264
Sym(4) 253
504
122
166 186 208 230 230 242
Seeking
a contradiction, suppose that G = hg1 , . . . , gk i with g1 · · · gk = 1
P
and i ind(gi ) = 2n − 2. As before, let di denote the order of gi and assume
di 6 di+1 for all i.
Suppose M is the Borel subgroup Z23 :Z11 , so 2n − 2 = 46. From the
above
table, it follows that k = 3, d1 = 2 and d2 ∈ {2, 3}. If d2 = 2 then
P
(d
−
1)/di < 2, which contradicts the bound in (4.3). Therefore, d2 = 3
i i
5. BASES
37
and a second application of (4.3) forces d3 > 11. But this implies that
k
X
ind(gi ) > 12 + 16 + 20 > 46,
i=1
which is a contradiction. The other cases are similar.
4.4. Generalisations. As noted in Remark 4.4, there are natural generalisations to other fields. Let k be an algebraically closed field of characteristic p > 0 and let f : X → Y be a finite separable cover of smooth projective
curves over k. Let G be the corresponding monodromy group, which is the
Galois group of the normal closure of the extension k(X)/k(Y ) of function
fields. As for p = 0, in positive characteristic we can seek restrictions on the
structure of G according to the genus of X. There is still a translation of
the problem to group theory, but the set-up is much more complicated. For
example, there is no known analogue of Riemann’s Existence Theorem and
further complications arise if the given cover f is wildly ramified (the proof
of the Guralnick-Thompson conjecture goes through essentially unchanged
in the tamely ramified case).
The following conjecture of Guralnick is the positive characteristic analogue of the Guralnick-Thompson conjecture (see [50, Conjecture 1.6]). In
order to state the conjecture, let p be a prime and let S be a nonabelian
simple group. We say that S has genus g (in characteristic p) if S is a composition factor of the monodromy group of a finite separable cover f : X → Y
of smooth projective curves over an algebraically closed field of characteristic
p with X of genus at most g.
Conjecture 4.12. Let g > 0 be an integer and let Ep (g) be the set of
nonabelian non-alternating simple groups of genus g in characteristic p > 0.
Then
[
Ep (g) ∩
Lie(r)
r6=p
is finite, where Lie(r) is the set of finite simple groups of Lie type in characteristic r.
The condition r 6= p in the conjecture is necessary. For example, work
of Abhyankar (see [1] and the references therein) shows that Ep (0) contains
every simple classical group in characteristic p. Guralnick’s conjecture is
still open in its full generality, and we refer the reader to the survey article
[50] for further details. Here it is worth highlighting [50, Theorem 1.5],
which shows that the conjecture holds if we replace Lie(r) by the set of
finite simple groups of Lie type in characteristic r of bounded dimension.
5. Bases
In this final section we introduce the classical notion of a base for a
permutation group and we discuss how probabilistic methods, based on fixed
point ratio estimates, have been used to establish strong results on the
minimal size of bases for simple groups. In particular, we will sketch a
solution to Problem C in the introduction.
38
5.1. Preliminaries. We begin by defining the base size of a permutation group.
Definition 5.1. Let
T G 6 Sym(Ω) be a permutation group. A subset B
of Ω is a base for G if α∈B Gα = 1. The base size of G, denoted by b(G),
is the minimal cardinality of a base.
Examples 5.2.
1. b(G) = 1 if and only if G has a regular orbit on Ω.
2. b(G) = n − 1 for the natural action of G = Sym(n) on Ω =
{1, . . . , n}.
3. b(G) = dim V for the natural action of G = GL(V ) on Ω = V .
4. b(G) = dim V + 1 for the action of G = PGL(V ) on the set of
1-dimensional subspaces of V .
Remark 5.3. Bases arise naturally in several different contexts:
a. Abstract group theory. Let G be a finite group and let H be a corefree subgroup, so we may view G as a permutation group on Ω = G/H.
In
T this xcontext, b(G) is the size of the smallest subset S ⊆ G such that
x∈S H = 1.
b. Permutation group theory. Let G be a permutation group of degree n
and let B be a base for G. If x, y ∈ G then
\
αx = αy for all α ∈ B ⇐⇒ xy −1 ∈
Gα ⇐⇒ x = y
α∈B
n|B| .
and thus |G| 6
In this way, (upper) bounds on b(G) can be used to
bound the order of G.
c. Computational group theory. The concept of a base and strong generating
set was introduced by Sims [96] in the early 1970s, and it plays a fundamental role in the computational study of finite permutation groups (e.g.
for computing the order of the group, and testing membership). See [95,
Section 4] for more details.
d. Graph theory. Let Γ be a graph with vertices V and automorphism group
G = Aut(Γ) 6 Sym(V ). Then
b(G) = the fixing number of Γ
= the determining number of Γ
= the rigidity index of Γ
is a well-studied graph invariant. See the survey article by Bailey and
Cameron [9] for further details.
Let G be a permutation group of degree n. In general, it is very difficult
to compute b(G) precisely (indeed, algorithmically, this is known to be an
NP-hard problem; see [10]), so we focus on bounds, and in particular upper
bounds in view of applications. It is easy to see that
log |G|
6 b(G) 6 log2 |G|
(5.1)
log n
5. BASES
39
and it is straightforward to construct transitive groups G such that b(G)
is at either end of this range. A well known conjecture of Pyber [92] from
the early 1990s asserts that the situation for primitive groups is rather more
restrictive, in the sense that there is an absolute constant c such that
log |G|
b(G) 6 c
log n
for any primitive group G of degree n. This conjecture has very recently
been proved by Duyan, Halasi and Maróti [39], building on the earlier work
of many authors.
The following lemma reveals a connection between the base size and the
minimal degree of a transitive group (cf. Section 2.2).
Lemma 5.4. Let G 6 Sym(Ω) be a transitive group of degree n. Then
b(G)µ(G) > n.
Proof. Let B be a base of minimal size and let S be the support of an
element 1 6= g ∈ G of minimal degree. If B x ∩ S = ∅ for some x ∈ G, then
B x ⊆ Ω \ S, so g fixes every element of B x , but this is not possible since B x
is a base. Therefore |B x ∩ S| > 1 for all x ∈ G.
Next we claim that |{x ∈ G : α ∈ B x }| = |B||G|/n for all α ∈ Ω.
Consider α1 ∈ B. Fix y ∈ G such that αy = α1 . Then
{x ∈ G : α = α1x } = {x ∈ G : α = αyx } = {x ∈ G : yx ∈ Gα } = y −1 Gα ,
so |{x ∈ G : α ∈ B x }| = |B||Gα | = |B||G|/n as claimed. We conclude that
X
X
|G| 6
|B x ∩ S| =
|{x ∈ G : α ∈ B x }| = |S||B||G|/n
x∈G
α∈S
and thus µ(G)b(G) = |S||B| > n.
Let G 6 Sym(Ω) be a primitive group of degree n. Since
b(Sym(n)) = n − 1, b(Alt(n)) = n − 2
we will assume that G 6= Alt(n), Sym(n). Determining upper bounds on
b(G) in terms of n is an old problem. We record some results:
• Bochert [11], 1889: b(G) 6 n/2
√
• Babai [7], 1981: b(G) 6 c n log n for some constant c (independent
of CFSG)
√
• Liebeck [72], 1984: b(G) 6 c n (using CFSG)
Remark 5.5. It is easy to see that Liebeck’s bound is best possible. For
example, if G = Sym(m) and Ω is the√set of 2-element subsets of {1, . . . , m},
2
then n = m
2 and b(G) ∼ 3 m = O( n). For instance, if m ≡ 1 (mod 12)
then
{{1, 2}, {2, 3}, {4, 5}, {5, 6}, . . . , {m − 3, m − 2}, {m − 2, m − 1}}
is a base of size 2(m − 1)/3 (this is optimal).
Stronger bounds are attainable if we focus on specific families of primitive groups. For instance, a striking theorem of Seress [94] states that
b(G) 6 4 if G is soluble. For the remainder we will focus on almost simple
primitive groups.
40
5.2. Simple groups and probabilistic methods. Let G 6 Sym(Ω)
be a primitive almost simple group of degree n, with socle G0 and point
stabiliser H. In studying the base size of such groups, it is natural to make
a distinction between standard and non-standard groups, according to the
following definition (see Definition 2.9 for the notion of a subspace action of
a classical group).
Definition 5.6. We say that G is standard if one of the following holds:
(i) G0 = Alt(m) and Ω is an orbit of subsets or partitions of {1, . . . , m};
(ii) G is a classical group in a subspace action.
Otherwise, G is non-standard. (Note that we will only use the terms standard
and non-standard in the context of a primitive group.)
In general, if G is standard then H is “large” in the sense that |G| is
not bounded above by a polynomial in n = |G : H| of fixed degree. For
example, if we take the standard action of G = PGLm (q) on 1-spaces then
2
|G| ∼ q m −1 and n ∼ q m−1 . In view of (5.1), this implies that the base size
of such a standard group can be arbitrarily large (indeed, we already noted
that b(G) = m + 1 for the given action of PGLm (q)).
Now assume G is non-standard. By a theorem of Cameron, there is
an absolute constant c such that |G| 6 nc for any such group G. In later
work, Liebeck [72] showed that c = 9 is sufficient, and this was extended by
Liebeck and Saxl [76] to give the following.
Theorem 5.7. Let G be a non-standard group of degree n. Then either
|G| 6 n5 , or (G, n) = (M23 , 23) or (M24 , 24).
This result suggests that non-standard groups may admit small bases.
Indeed, the following striking theorem of Liebeck and Shalev [81] shows that
this is true in a very strong sense. The proof uses probabilistic methods
based on fixed point ratio estimates.
Theorem 5.8. There is an absolute constant c such that if G 6 Sym(Ω)
is a non-standard permutation group then the probability that a randomly
chosen c-tuple in Ω is a base for G tends to 1 as |G| tends to infinity.
Remark 5.9. This asymptotic result was conjectured by Cameron and
Kantor [33], and they showed that it holds for alternating and symmetric
groups with the best possible constant c = 2.
Let us explain the connection between fixed point ratios and base sizes.
Let c be a positive integer and let Q(G, c) be the probability that a randomly
chosen c-tuple of points in Ω is not a base for G, so
b(G) 6 c ⇐⇒ Q(G, c) < 1.
Observe that a c-tuple in Ω fails to be a base if and only if it is fixed by an
element x ∈ G of prime order, and note that the probability that a randomly
chosen c-tuple is fixed by x is equal to fpr(x)c . Let P be the set of elements
of prime order in G, and let x1 , . . . , xk represent the G-classes in P. Then
(5.2)
Q(G, c) 6
X
x∈P
fpr(x)c =
k
X
i=1
c
b
|xG
i | · fpr(xi ) =: Q(G, c).
5. BASES
41
We have thus established the following key lemma, which allows us to exploit
upper bounds on fixed point ratios to bound the base size.
b
Lemma 5.10. If Q(G,
c) < 1 then b(G) 6 c.
Sketch proof of Theorem 5.8. Let G0 denote the socle of G. In
view of the work of Cameron and Kantor in [33], we may assume that G0
is a group of Lie type over Fq .
First we claim that b(G) 6 500 if G0 is an exceptional group. To see
this, we apply Theorem 2.6, which states that
4
fpr(x) 6
3q
for all non-identity elements x ∈ G. Now |G| 6 |Aut(E8 (q))| < q 249 , so
500 X
500
k
4
4
G
b
|G|
Q(G, 500) 6 Q(G,
500) 6
|xi | <
3q
3q
i=1
q −1
q 249 .
which is at most
since |G| <
The claim follows. Similarly, if G0
is a non-standard classical group of rank r, then the same argument yields
b(G) 6 c(r) (with Q(G, c(r)) → 0 as q tends to infinity).
The key tool to handle the remaining non-standard classical groups of
arbitrarily large rank is Theorem 2.15, which states that there is a constant
> 0 such that
fpr(x) < |xG |−
(5.3)
for all x ∈ G of prime order (recall that the non-standard hypothesis is
essential). Let m be the dimension of the natural module for G0 . We need
two facts:
1. G has at most q 4m conjugacy classes of elements of prime order (for
example, this follows from [74, Theorem 1]); and
2. |xG | > q m/2 for all x ∈ G of prime order.
Set c = d11/e. Then
b
Q(G,
c) =
k
X
i=1
c
|xG
i | · fpr(xi ) <
k
X
−10
|xG
6 k · (q m/2 )−10 6 q −m
i |
i=1
and thus Q(G, c) tends to 0 as |G| tends to infinity, as required.
5.3. Further results. As the above sketch proof indicates, the constant c in Theorem 5.8 depends on the constant in (5.3), and is therefore
undetermined. However, by applying the stronger fixed point ratio estimates in [19, 20, 21, 22] and [71], it is possible to show that c = 6 is optimal. Indeed, the following result, which is proved in the sequence of papers
[23, 27, 30, 31], reveals a striking dichotomy for almost simple primitive
groups: either the base size can be arbitrarily large (standard groups), or
there exists an extremely small base (non-standard groups). This solves
Problem B as stated in the introduction.
Theorem 5.11. Let G 6 Sym(Ω) be a non-standard permutation group.
Then b(G) 6 7, with equality if and only if G = M24 in its natural action
42
on 24 points. Moreover, the probability that a random 6-tuple in Ω forms a
base for G tends to 1 as |G| tends to infinity.
Example 5.12. To illustrate the proof of Theorem 5.11 for exceptional
groups, let us briefly sketch an argument to show that b(G) 6 5 for G =
E8 (q).
b
First assume H is small, say |H| 6 q 88 , and write Q(G,
5) = α + β
where α is the contribution to the summation from elements x ∈ G with
|xG | 6 12 q 112 . Observe that
5
1 112 2|H| 5 1 112 2q 88
6 q
= 16q −8 .
β< q
2
q 112
2
q 112
Suppose x ∈ G has prime order and |xG | 6 12 q 112 . The sizes of the conjugacy
classes of elements of prime order in G are available in the literature and
by inspection we see that x is unipotent of type A1 or 2A1 (in terms of the
standard Bala-Carter labelling of unipotent classes). There are fewer than
2q 92 such elements in G, and [71, Theorem 2] implies that fpr(x) 6 2q −24 ,
hence
α < 2q 92 (2q −24 )5 = 64q −28
and the result follows.
To complete the analysis, we may assume |H| > q 88 . As discussed in
Section 2.8, if H is a maximal parabolic subgroup then it is possible to
compute very accurate fixed point ratio estimates using character-theoretic
methods (recall that for unipotent elements, this relies on Lübeck’s work
on Green functions for exceptional groups). This allows us to obtain strong
upper bounds on b(G) for parabolic actions. Moreover, when combined with
the trivial lower bound b(G) > log |G|/ log |Ω|, we get the exact base size
in all but one case (here Pi denotes the maximal parabolic subgroup of G
corresponding to the i-th node in the Dynkin diagram of G with respect to
the standard Bourbaki [13] labelling):
P1 P2 P3 P4 P5 P6
P7
P8
H
b(G) 4 3 3 3 3 3 3 or 4 5
Note that log |G|/ log |Ω| = 3 − o(1) when H = P7 , so we expect b(G) = 4 is
the correct answer in this case.
Finally, let us assume |H| > q 88 and H is non-parabolic. By applying
a fundamental subgroup structure theorem of Liebeck and Seitz (see [77,
Theorem 8]), we deduce that H is of type D8 (q), E7 (q)A1 (q) or E8 (q0 ) with
q = q02 . Let us assume H is of type D8 (q); the other cases are similar. Let
K be the algebraic closure of Fq and set Ḡ = E8 (K) and H̄ = D8 (K),
so we may view G as Ḡσ , and similarly H as H̄σ , for a suitable Frobenius
b
morphism σ of Ḡ. Write Q(G,
5) = α + β, where α is the contribution from
semisimple elements.
Let x ∈ G be a semisimple element of prime order. By applying [71,
Lemma 4.5], we have
|W (Ḡ):W (H̄)| · 2(q + 1)8
q + 1 8 −δ(x)
fpr(x) 6
= 270
q
,
q−1
q δ(x) (q − 1)8
5. BASES
43
where W (X̄) is the Weyl group of X̄ and δ(x) = dim xḠ − dim(xḠ ∩ H̄).
If CḠ (x)0 is not of type D8 , E7 T1 nor E7 A1 , then [70, Theorem 2] implies
that δ(x) > 80 and we deduce that fpr(x) < q −59 . Therefore, if α1 denotes
the contribution to α from these elements then
α1 < |G| · (q −59 )5 < q 248 · q −295 = q −47 .
There are fewer than q 130 remaining semisimple elements in G and by
applying [71, Theorem 2] we deduce that their contribution is less than
q 130 · (q −37 )5 = q −55 . In particular,
α < q −47 + q −55
is tiny.
For unipotent elements there is a distinction between the cases q even
and q odd (recall that we are only interested in elements of prime order).
In any case, the fusion in Ḡ of unipotent classes in H̄ has been determined
by Lawther [69] and using these results it is straightforward to show that β
is also small (and tends to zero as q tends to infinity). See the proof of [30,
Lemma 4.5] for the details.
For classical groups, Theorem 2.16 is the key ingredient in the proof of
Theorem 5.11, which roughly states that ∼ 1/2 is optimal in (5.3). In
order to use it, let m be the dimension of the natural module for G0 and set
ηG (t) =
k
X
−t
|xG
i |
i=1
for t ∈ R, where x1 , . . . , xk represent the G-classes of elements of prime order
in G. If m > 6, then careful calculation reveals that ηG (1/3) < 1. Therefore,
by combining this with the generic upper bound fpr(x) < |xG |−1/2+1/m from
Theorem 2.16, we deduce that
b
Q(G,
4) <
k
X
1
1
1+4(− 2 + m )
|xG
6 ηG (1/3) < 1
i |
i=1
if m > 6, and thus b(G) 6 4. In this way, we can establish the following
sharpened version of Theorem 5.11 for classical groups (see [23, Theorem
1]).
Theorem 5.13. Let G be a non-standard classical group with point stabiliser H. Then b(G) 6 5, with equality if and only if G = PSU6 (2).2 and
H = PSU4 (3).22 . Moreover, the probability that a random 4-tuple in Ω
forms a base for G tends to 1 as |G| tends to infinity.
The problem of determining the precise base size of every non-standard
group is an ongoing project of the author with Guralnick and Saxl. We
finish by reporting on some recent work towards this goal.
5.3.1. Alternating and sporadic groups. If G0 is a (non-standard) alternating or sporadic group, then b(G) has been calculated in all cases. For
example, if G0 = Alt(n) then [27, Theorem 1.1] implies that b(G) = 2 if
n > 12 (if G = Alt(12) and H = M12 , then b(G) = 3). Similarly, if G = M
44
is the Monster sporadic group, then b(G) = 2 unless H = 2.B, in which case
b(G) = 3 (see [31]).
To handle the symmetric and alternating groups, we first observe that
H is a primitive subgroup (this follows from the non-standard hypothesis),
so we can use a well known result of Maróti [86] to bound |H| from above.
This is combined with Theorem 2.3 on the minimal degree of H, which tells
us that either µ(H) > n/2, or H is a product-type group arising from the
action of a symmetric group on k-sets. The latter situation can be handled
directly, whereas in the general case we translate the bound on µ(H) into a
lower bound on |xG | for all x ∈ H of prime order. This is useful because
b
Q(G,
2) < |H|2 max |xG |−1 .
16=x∈H
The proof for sporadic groups relies heavily on computational methods,
together with detailed information on their conjugacy classes, irreducible
characters and subgroup structure that is available in GAP [47]. Further
work is needed to handle the Baby Monster and the Monster (see [31, 90]
for more details).
As an aside, it is worth noting that determining the exact base size for
the standard groups with an alternating socle is a difficult combinatorial
problem. Indeed, this is an open problem, even for the action of Sym(n) on
k-sets. See [57] for the best known results in this particular case.
5.3.2. Classical groups. Suppose G0 is a classical group, so H is either
geometric or non-geometric. In [28], probabilistic methods are used to determine the precise base size of all non-geometric actions of classical groups.
Here the key ingredient is Theorem 2.18, combined with a detailed analysis
of the low-dimensional irreducible representations of quasisimple groups. As
discussed in Section 2.7, the lower bound on ν(x) in part (ii) of Theorem
2.18 yields a lower bound on |xG |, so our approach is somewhat similar to
the one we used for symmetric and alternating groups (although the details
are more complicated in this situation).
The following result is a simplified version of [28, Theorem 1].
Theorem 5.14. Let G 6 Sym(Ω) be a non-standard classical group
with socle G0 and point stabiliser H ∈ S. Assume n > 8, where n is the
dimension of the natural module for G0 . Then one of the following holds:
(i) b(G) = 2;
−
(ii) b(G) = 3 and (G, H) = (O+
14 (2), Sym(16)), (O12 (2), Sym(13)),
−
−
(Ω12 (2), Alt(13)) or (Ω10 (2), Alt(12));
(iii) b(G) = 4 and (G, H) = (O−
10 (2), Sym(12)).
The analysis of the geometric actions of classical groups is more difficult,
and so far we only have partial results. For example, we can show that
b(G) = 2 if H is a subfield subgroup corresponding to a subfield of Fq of
odd prime index. The analysis in some cases is rather delicate; for example,
it can be difficult to decide if b(G) = 2 or 3. This sort of situation tends to
arise when |H| ∼ |G|1/2 , which often corresponds to a case where H is the
centraliser in G of an involution (at least when q is odd). We anticipate that
5. BASES
45
our recent work in [29] on base sizes for primitive actions of simple algebraic
groups will play a role in this analysis.
5.3.3. Non-standard groups with large base size. The proof of Theorem
5.11 reveals that there are infinitely many exceptional groups with b(G) >
5. In fact, it has recently been shown that there are infinitely many with
b(G) = 6 (see [29, Theorem 11]) and with some additional work it is possible
to determine them all (see [24]).
Theorem 5.15. Let G 6 Sym(Ω) be a non-standard permutation group
with socle G0 and point stabiliser H. Then b(G) = 6 if and only if one of
the following holds:
(i) (G, H) = (M23 , M22 ), (Co3 , McL.2), (Co2 , PSU6 (2).2),
or (Fi22 .2, 2.PSU6 (2).2);
(ii) G0 = E7 (q) and H = P7 ;
(iii) G0 = E6 (q) and H = P1 or P6 .
In cases (ii) and (iii), the usual estimates via fixed point ratios yield
b(G) ∈ {5, 6}, so more work is needed to pin down the precise answer. To
do this we apply some recent results from [29] on bases for simple algebraic
groups.
For example, consider case (ii). Let Ḡ = E7 and H̄ be the corresponding
algebraic groups over F̄q (so H̄ is a maximal parabolic subgroup of Ḡ with
Levi factor of type E6 ) and let σ be a Frobenius morphism of Ḡ such that
(Ḡσ )0 = G0 . We may assume that H̄ is σ-stable. In [29, Section 5] we
show that the generic 5-point stabiliser in Ḡ with respect to the action on
the coset variety Ḡ/H̄ is 8-dimensional (here generic means that there is
a non-empty open subvariety U of (Ḡ/H̄)5 such that the stabiliser in Ḡ of
any tuple in U is 8-dimensional). By considering the fixed points under σ,
we deduce that every 5-point stabiliser in the finite group G is nontrivial,
for any q, and the result follows. Note that the connected component of
the generic 5-point stabiliser is not a torus (because it is 8-dimensional), so
there are no complications with split tori when q = 2.
Bibliography
[1] S.S. Abhyankar and N. Inglis, Galois groups of some vectorial polymomials, Trans.
Amer. Math. Soc. 353 (2001), 2941–2969.
[2] M. Aschbacher, On the maximal subgroups of the finite classical groups, Invent. Math.
76 (1984), 469–514.
[3] M. Aschbacher, On conjectures of Guralnick and Thompson, J. Algebra 135 (1990),
277–343.
[4] M. Aschbacher and R. Guralnick, Some applications of the first cohomology group, J.
Algebra 90 (1984), 446–460.
[5] M. Aschbacher and L. Scott, Maximal subgroups of finite groups, J. Algebra 92 (1985),
44–80.
[6] M. Aschbacher and G.M. Seitz, Involutions in Chevalley groups over fields of even
order, Nagoya Math. J. 63 (1976), 1–91.
[7] L. Babai, On the order of uniprimitive permutation groups, Annals of Math. 113
(1981), 553–568.
[8] L. Babai, On the order of doubly transitive permutation groups, Invent. Math. 65
(1982), 473–484.
[9] R.F. Bailey and P.J. Cameron, Base size, metric dimension and other invariants of
groups and graphs, Bull. London Math. Soc. 43 (2011), 209–242.
[10] K.D. Blaha, Minimum bases for permutation groups: the greedy approximation, J.
Algorithms 13 (1992), 297–306.
[11] A. Bochert, Über die Zahl verschiedener Werte, die eine Funktion gegebener Buchstaben durch Vertauschung derselben erlangen kann, Math. Ann. 33 (1889), 584–590.
[12] A. Bochert, Ueber die Classe der transitiven Substitutionengruppen, Math. Ann. 40
(1892), 176–193.
[13] N. Bourbaki, Lie Groups and Lie Algebras (Chapters 4-6), Springer, 2002.
[14] J.N. Bray, D.F. Holt and C.M. Roney-Dougal, The Maximal Subgroups of the Lowdimensional Finite Classical Groups, London Math. Soc. Lecture Note Series, vol.
407, Cambridge University Press, 2013.
[15] J.L. Brenner and J. Wiegold, Two-generator groups I, Michigan Math. J. 22 (1975),
53–64.
[16] T. Breuer, R.M. Guralnick and W.M. Kantor, Probabilistic generation of finite simple
groups, II, J. Algebra 320 (2008), 443–494.
[17] T. Breuer, R.M. Guralnick, A. Lucchini, A. Maróti, and G.P. Nagy, Hamiltonian
cycles in the generating graph of finite groups, Bull. London Math. Soc. 42 (2010),
621–633.
[18] T.C. Burness, Fixed point spaces in actions of classical algebraic groups, J. Group
Theory 7 (2004), 311–346.
[19] T.C. Burness, Fixed point ratios in actions of finite classical groups, I, J. Algebra
309 (2007), 69–79.
[20] T.C. Burness, Fixed point ratios in actions of finite classical groups, II, J. Algebra
309 (2007), 80–138.
[21] T.C. Burness, Fixed point ratios in actions of finite classical groups, III, J. Algebra
314 (2007), 693–748.
[22] T.C. Burness, Fixed point ratios in actions of finite classical groups, IV, J. Algebra
314 (2007), 749–788.
[23] T.C. Burness, On base sizes for actions of finite classical groups, J. London Math.
Soc. 75 (2007), 545–562.
47
48
BIBLIOGRAPHY
[24] T.C. Burness, On base sizes for almost simple primitive groups, in preparation.
[25] T.C. Burness and M. Giudici, Classical groups, derangements and primes, vol. 25,
Lecture Notes Series of the Aust. Math. Soc., Cambridge University Press, 2016.
[26] T.C. Burness and S. Guest On the uniform spread of almost simple linear groups,
Nagoya Math. J. 209 (2013), 35–109.
[27] T.C. Burness, R.M. Guralnick and J. Saxl, On base sizes for symmetric groups, Bull.
London Math. Soc. 43 (2011), 386–391.
[28] T.C. Burness, R.M. Guralnick and J. Saxl, Base sizes for S-actions of finite classical
groups, Israel J. Math. 199 (2014), 711–756.
[29] T.C. Burness, R.M. Guralnick and J. Saxl, On base sizes for algebraic groups, J.
European Math. Soc. (JEMS) 19 (2017), 2269–2341.
[30] T.C. Burness, M.W. Liebeck and A. Shalev, Base sizes for simple groups and a
conjecture of Cameron, Proc. London Math. Soc. 98 (2009), 116–162.
[31] T.C. Burness and E.A. O’Brien and R.A. Wilson, Base sizes for sporadic simple
groups, Israel J. Math. 177 (2010), 307–334.
[32] T.C. Burness and A.R. Thomas, On the involution fixity of exceptional groups of Lie
type, preprint.
[33] P.J. Cameron and W.M. Kantor, Random permutations: some group-theoretic aspects,
Combin. Probab. Comput. 2 (1993), 257–262.
[34] J.H. Conway, R.T. Curtis, S.P. Norton, R.A. Parker and R.A. Wilson, Atlas of Finite
Groups, Oxford University Press, Eynsham, 1985.
[35] E. Covato, The involution fixity of simple groups, PhD thesis, University of Bristol,
2017.
[36] F. Dalla Volta and A. Lucchini, Generation of almost simple groups, J. Algebra 178
(1995), 194–223.
[37] J.D. Dixon, The probability of generating the symmetric group, Math. Z. 110 (1969),
199–205.
[38] J.D. Dixon and B. Mortimer, Permutation Groups, Springer Graduate Texts in Math.
163, Springer-Verlag, New York, 1996.
[39] H. Duyan, Z. Halasi and A. Maróti, A proof of Pyber’s base size conjecture, submitted
(arxiv:1611.09487).
[40] D. Frohardt, R. Guralnick and K. Magaard, Genus 0 actions of groups of Lie rank
1, in Arithmetic fundamental groups and noncommutative algebra (Berkeley, CA,
1999), 449–483, Proc. Sympos. Pure Math., vol. 70, Amer. Math. Soc., Providence,
RI, 2002.
[41] D. Frohardt, R. Guralnick and K. Magaard, Primitive monodromy groups of genus
at most two, J. Algebra 417 (2014), 234–274.
[42] D. Frohardt and K. Magaard, Monodromy composition factors among exceptional
groups of Lie type, in Group theory (Granville, OH, 1992), 134–143, World Sci. Publ.,
River Edge, NJ, 1993.
[43] D. Frohardt and K. Magaard, About a conjecture of Guralnick and Thompson, in
Groups, difference sets, and the Monster (Columbus, OH, 1993), 43–54, Ohio State
Univ. Math. Res. Inst. Publ., vol. 4, de Gruyter, Berlin, 1996.
[44] D. Frohardt and K. Magaard, Grassmannian fixed point ratios, Geom. Dedicata 82
(2000), 21–104.
[45] D. Frohardt and K. Magaard, Composition factors of monodromy groups, Annals of
Math. 154 (2001), 327–345.
[46] D. Frohardt and K. Magaard, Fixed point ratios in exceptional groups of rank at most
two, Comm. Algebra 30 (2002), 571–602.
[47] The GAP Group, GAP – Groups, Algorithms, and Programming, Version 4.4, 2004.
[48] J. Fulman and R.M. Guralnick, The probability of generating an irreducible subgroup,
in preparation.
[49] R.M. Guralnick, The genus of a permutation group, in Groups, combinatorics &
geometry (Durham 1990), 351–363, London Math. Soc. Lecture Note Ser. vol. 165,
Cambridge University Press, 1992.
BIBLIOGRAPHY
49
[50] R.M. Guralnick, Monodromy groups of coverings of curves, in Galois groups and
fundamental groups, Math. Sci. Res. Inst. Publ. 41, 1–46, Cambridge University
Press, 2003.
[51] R.M. Guralnick and W.M. Kantor, Probabilistic generation of finite simple groups, J.
Algebra 234 (2000), 743–792.
[52] R.M. Guralnick and K. Magaard, On the minimal degree of a primitive permutation
group, J. Algebra 207 (1998), 127–145.
[53] R. Guralnick, T. Pentilla, C.E. Praeger, and J. Saxl, Linear groups with orders having
certain large prime divisors, Proc. London Math. Soc. 78 (1999), 167–214.
[54] R.M. Guralnick and J. Saxl, Generation of finite almost simple groups by conjugates,
J. Algebra 268 (2003), 519–571.
[55] R.M. Guralnick and A. Shalev, On the spread of finite simple groups, Combinatorica
23 (2003), 73–87.
[56] R.M. Guralnick and J.G. Thompson, Finite groups of genus zero, J. Algebra 131
(1990), 303–341.
[57] Z. Halasi, On the base size for the symmetric group acting on subsets, Studia Sci.
Math. Hungar. 49 (2012), 492–500.
[58] S. Harper, On the uniform spread of almost simple symplectic and orthogonal groups,
J. Algebra, to appear.
[59] G. Hiss and G. Malle, Low dimensional representations of quasi-simple groups, LMS
J. Comput. Math. 4 (2001), 22–63.
[60] G. Hiss and G. Malle, Corrigenda: Low dimensional representations of quasi-simple
groups, LMS J. Comput. Math. 5 (2002), 95–126.
[61] G.D. James, The Representation Theory of the Symmetric Groups, Springer Lecture
Notes in Math. 682, Springer, Berlin, 1978.
[62] C. Jordan, Théorèmes sur les groupes primitifs, J. Math. Pures Appl. (Liouville) 16
(1871), 383–408.
[63] C. Jordan, Recherches sur les substitutions, J. Math. Pures Appl. (Liouville) 17
(1872), 351–367.
[64] W.M. Kantor, Subgroups of classical groups generated by long root elements, Trans.
Amer. Math. Soc. 248 (1979), 347–379.
[65] W.M. Kantor and A. Lubotzky, The probability of generating a finite classical group,
Geom. Dedicata 36 (1990), 67–87.
[66] J. Kempe, L. Pyber and A. Shalev, Permutation groups, minimal degrees and quantum
computing, Groups Geom. Dyn. 1 (2007), 553–584.
[67] P.B. Kleidman, The maximal subgroups of the finite 8-dimensional orthogonal groups
PΩ+
8 (q) and of their automorphism groups, J. Algebra 110 (1987), 173–242.
[68] P.B. Kleidman and M.W. Liebeck, The Subgroup Structure of the Finite Classical
Groups, London Math. Soc. Lecture Note Series, vol. 129, Cambridge University
Press, 1990.
[69] R. Lawther, Unipotent classes in maximal subgroups of exceptional algebraic groups,
J. Algebra 322 (2009), 270–293.
[70] R. Lawther, M.W. Liebeck and G.M. Seitz, Fixed point spaces in actions of exceptional
algebraic groups, Pacific J. Math. 205 (2002), 339–391.
[71] R. Lawther, M.W. Liebeck and G.M. Seitz, Fixed point ratios in actions of finite
exceptional groups of Lie type, Pacific J. Math. 205 (2002), 393–464.
[72] M.W. Liebeck, On minimal degrees and base sizes of primitive permutation groups,
Arch. Math. 43 (1984), 11–15.
[73] M.W. Liebeck, On the orders of maximal subgroups of the finite classical groups, Proc.
London Math. Soc. 50 (1985), 426–446.
[74] M.W. Liebeck and L. Pyber, Upper bounds for the number of conjugacy classes of a
finite group, J. Algebra 198 (1997), 538–562.
[75] M.W. Liebeck and J. Saxl, Minimal degrees of primitive permutation groups, with
an application to monodromy groups of coverings of Riemann surfaces, Proc. London
Math. Soc. 63 (1991), 266–314.
50
BIBLIOGRAPHY
[76] M.W. Liebeck and J. Saxl, Maximal subgroups of finite simple groups and their automorphism groups, Proceedings of the International Conference on Algebra, Part 1
(Novosibirsk, 1989), 243–259, Contemp. Math. 131, Amer. Math. Soc., 1992.
[77] M.W. Liebeck and G.M. Seitz, A survey of of maximal subgroups of exceptional groups
of Lie type, in Groups, combinatorics & geometry (Durham, 2001), 139–146, World
Sci. Publ., River Edge, NJ, 2003.
[78] M.W. Liebeck and A. Shalev, The probability of generating a finite simple group,
Geom. Dedicata 56 (1995), 103–113.
[79] M.W. Liebeck and A. Shalev, Classical groups, probabilistic methods, and the (2, 3)generation problem, Annals of Math. 144 (1996), 77–125.
[80] M.W. Liebeck and A. Shalev, Simple groups, probabilistic methods, and a conjecture
of Kantor and Lubotzky, J. Algebra 184 (1996), 31–57.
[81] M.W. Liebeck and A. Shalev, Simple groups, permutation groups, and probability, J.
Amer. Math. Soc. 12 (1999), 497–520.
[82] M.W. Liebeck and A. Shalev, On fixed points of elements in primitive permutation
groups, J. Algebra 421 (2015), 438–459.
[83] L. Lovász, Combinatorial problems and exercises, North-Holland, Amsterdam, 1979.
[84] F. Lübeck, Small degree representations of finite Chevalley groups in defining characteristic, LMS J. Comput. Math. 4 (2001), 135–169.
[85] K. Magaard, Monodromy and sporadic groups, Comm. Algebra 21 (1993), 4271–4297.
[86] A. Maróti, On the order of primitive groups, J. Algebra 258 (2002), 631–640.
[87] N.E. Menezes, M. Quick and C.M. Roney-Dougal, The probability of generating a
finite simple group, Israel J. Math. 198 (2013), 371–392.
[88] E. Netto, Substitutionentheorie und ihre Anwendungen auf die Algebra, Teubner,
Leipzig, 1882; English transl. 1892, second edition, Chelsea, New York, 1964.
[89] M.G. Neubauer, On monodromy groups of fixed genus, J. Algebra 153 (1992), 215–
261.
[90] M. Neunhöffer, F. Noeske, E.A. O’Brien and R.A. Wilson, Orbit invariants and an
application to the Baby Monster, J. Algebra 341 (2011), 297–305.
[91] C.E. Praeger and J. Saxl, On the orders of primitive permutation groups, Bull. London
Math. Soc. 12 (1980), 303–307.
[92] L. Pyber, Asymptotic results for permutation groups, in Groups and Computation
(eds. L. Finkelstein and W. Kantor), DIMACS Series, vol. 11, pp.197–219, 1993.
[93] L. Scott, Matrices and cohomology, Annals of Math. 105 (1977), 473–492.
[94] Á. Seress, The minimal base size of primitive solvable permutation groups, J. London
Math. Soc. 53 (1996), 243–255.
[95] Á. Seress, Permutation Group Algorithms, Cambridge Tracts in Mathematics 152,
Cambridge University Press, 2003.
[96] C.C. Sims, Computation with permutation groups, Proc. Second Sympos. on Symbolic
and Algebraic Manipulation, (ACM, New York), pp.23–28, 1971.
[97] A. Stein, 1 21 -generation of finite simple groups, Beiträge Algebra Geom. 39 (1998),
349–358.
[98] R. Steinberg, Generators for simple groups, Canad. J. Math. 14 (1962), 277–283.
[99] R. Steinberg, Endomorphisms of linear algebraic groups, Mem. Amer. Math. Soc. 80
(1968).
[100] H. Völklein, Groups as Galois Groups: An Introduction, Cambridge Studies in Advanced Math. 53, Cambridge University Press, 1996.
[101] H. Wielandt, Finite Permutation Groups, Academic Press, New York, 1964.
| 4math.GR
|
1
Coverage Analysis of a Vehicular Network
Modeled as Cox Process Driven by Poisson
Line Process
arXiv:1709.08577v1 [cs.IT] 25 Sep 2017
Vishnu Vardhan Chetlur and Harpreet S. Dhillon
Abstract
In this paper, we consider a vehicular network in which the wireless nodes are located on a system
of roads. We model the roadways, which are predominantly straight and randomly oriented, by a Poisson
line process (PLP) and the locations of nodes on each road as a homogeneous 1D Poisson point process
(PPP). Assuming that each node transmits independently, the locations of transmitting and receiving
nodes are given by two Cox processes driven by the same PLP. For this setup, we derive the coverage
probability of a typical receiver, which is an arbitrarily chosen receiving node, assuming independent
Nakagami-m fading over all wireless channels. Assuming that the typical receiver connects to its closest
transmitting node in the network, we first derive the distribution of the distance between the typical
receiver and the serving node to characterize the desired signal power. We then characterize coverage
probability for this setup, which involves two key technical challenges. First, we need to handle several
cases as the serving node can possibly be located on any line in the network and the corresponding
interference experienced at the typical receiver is different in each case. Second, conditioning on the
serving node imposes constraints on the spatial configuration of lines, which require careful analysis of
the conditional distribution of the lines. We address these challenges in order to accurately characterize
the interference experienced at the typical receiver. We then derive an exact expression for coverage
probability in terms of the derivative of Laplace transform of interference power distribution. We analyze
the trends in coverage probability as a function of the network parameters: line density and node density.
We also study the asymptotic behavior of this model and compare the coverage performance with that
of a homogeneous 2D PPP model with the same node density.
Index Terms
The authors are with Wireless@VT, Department of ECE, Virginia Tech, Blacksburg, VA (email: {vishnucr, hdhillon}@vt.edu).
The support of the US NSF (Grant IIS-1633363) is gratefully acknowledged.
Manuscript last updated: September 26, 2017.
2
Stochastic geometry, Cox process, Poisson line process, coverage probability, vehicular network,
road systems, Nakagami-m fading.
I. I NTRODUCTION
Vehicular communication, which collectively refers to vehicle-to-vehicle (V2V) and vehicleto-infrastructure (V2I) communication, has enabled the vehicular nodes to share information
with each other and also with roadside units (RSUs) to improve the road safety and transport
efficiency [1]–[3]. With autonomous vehicles becoming a reality in the near future, the data
traffic originating from vehicular networks is expected to increase many folds while also putting
more stringent latency and connectivity constraints compared to the networks of today. In order
to meet these stringent requirements, it is critical to understand the system-level performance
of these networks under different operational scenarios. In the recent years, stochastic geometry
has emerged as a powerful tool for modeling and system-level analysis of wireless networks.
The most popular approach is to model the locations of wireless nodes by a homogeneous 2D
Poisson point process (PPP) [4]–[7] and focus on the performance analysis of a randomly chosen
receiver in the network. Despite its simplicity and analytical tractability, PPP may not always
be a suitable model for all spatial configurations of nodes. In the context of this paper, the
locations of vehicular nodes and RSUs in vehicular networks are restricted to roadways, which
are predominantly linear and randomly oriented. The 2D PPP model, in which the location
of nodes are modeled by randomly distributed points in the 2D plane, does not capture the
coupling between the nodes and the underlying infrastructure (roads) in vehicular networks.
While modeling the locations of vehicular nodes, one has to consider two fundamental sources
of randomness: (i) the locations of nodes on each road are often irregular and can hence be
treated as a realization of a point process, and (ii) the layout of the roads is also often irregular,
which makes it possible to model the road system as a realization of a line process [8]–[12].
In short, it is necessary to consider doubly stochastic spatial models for vehicular nodes that
account for the randomness associated with the roads as well as the locations of nodes on these
roads. A well-known canonical model in the literature that readily meets this requirement is a
Cox process or doubly stochastic Poisson point process [13], [14], where the roads in a network
are modeled by a Poisson line process (PLP) and the location of nodes on the roads are modeled
by a 1D PPP. Despite the relevance of this canonical model in understanding the system-level
performance of vehicular networks, its coverage analysis is still an open problem, which is the
main focus of this paper. In particular, we develop tools to characterize serving distance as well
3
as conditional interference power distributions, which collectively provide exact characterization
of coverage probability and can also be readily applied to study many other aspects of vehicular
networks.
A. Related Work
While there is a significant volume of literature pertaining to the analysis of vehicular networks
using tools from stochastic geometry, the spatial models considered in these works are often
too simple [15]–[20] and are limited to a single road or an intersection of two roads. For
instance, a signal-to-interference plus noise ratio (SINR) based analysis to compute the optimum
transmission probability for vehicles on a single road, has been proposed in [15]. The trade-offs
between the aggregate packet progress and spatial frequency reuse for multi-hop transmission
between vehicles in a multi-lane highway setup were studied in [17]. In [19], [20], the authors
have analyzed the packet reception probability of a link at the intersection of two perpendicular
roads where the location of nodes are modeled as 1D PPP on each road. Since these models do
not accurately capture the irregular structure of roads and their effect on the performance, they
do not always offer reliable system-level insights that aid in the design.
Although relatively sparse, there are also a few works in the literature where more sophisticated
models that include the randomness associated with the road systems were studied [8]–[12], [21],
[22]. In [8], the authors have modeled the streets in an urban setting by a Manhattan Poisson
line process (MPLP) and the base stations on each road by a 1D PPP and characterized the
downlink coverage performance of mmWave microcells by adopting a Manhattan distance based
path-loss model. While this is a reasonable model for mmWave communication in an urban
setting, it may not be applicable to all scenarios due to the irregular structure of roads. A more
refined model for vehicular networks is presented in [10], [11], where the streets are modeled by
the edges of either a Poisson-Line tessellation (PLT), Poisson-Voronoi tessellation (PVT), or a
Poisson-Delaunay tessellation (PDT) and the nodes on each line are modeled by a homogeneous
1D PPP. Owing to its analytical tractability, PLT often gains preference over PVT and PDT in
modeling road systems (it has also been used in other related applications, such as in modeling
the effect of blockages in localization networks [23]). In [10], the authors have considered a
hierarchical two-tier network whose components are modeled as a Cox process on a PLT and
have characterized the mean shortest path on the streets connecting these components. Using
the same spatial model, a formula for probability density function of inter-node distances was
presented in [11]. In [12], the author has derived the uplink coverage probability for a setup
4
where the typical receiver is randomly chosen from a PPP and the locations of transmitter nodes
are modeled as a Cox process driven by a PLP. However, to the best of our knowledge, this paper
is the first to derive the coverage probability for a setup where both the receiver and transmitter
nodes are modeled by Cox processes driven by the same PLP. In other words, this paper is the
first to derive the coverage probability of a vehicular node located on a PLP when it connects
to another vehicular node on the same PLP. The technical challenges in this analysis originate
from the spatial coupling between the vehicular nodes induced by the underlying PLP. More
detailed account of our contributions is provided below.
B. Contributions
In this paper, we present an analytical procedure for performing the canonical coverage analysis
of a vehicular network. We consider a doubly-stochastic spatial model for wireless nodes, which
captures the irregularity in the spatial layout of roads by modeling them as a PLP and the spatial
irregularity in the locations of wireless nodes by modeling them as a 1D PPP on each road. In
order to mimic various fading scenarios, we choose Nakagami-m fading channel that allows us
to control the severity of fading. For this setup, we derive the signal-to-interference ratio (SIR)
based coverage probability of a typical receiver, which is an arbitrarily chosen receiving node in
the network, assuming that it connects to its closest transmitting node in the network. We then
study the trends in the coverage performance which offers useful system design insights. More
technical details about the coverage probability and system-level insights are provided next.
Coverage probability. We derive an exact expression for coverage probability by accurately
characterizing the interference experienced at the typical receiver. We first derive several fundamental distance distributions that are necessary to characterize the desired signal power at the
typical receiver. Since the distribution of nodes is coupled with the distribution of lines in the
network, it poses two key challenges to the exact coverage analysis. First, the serving node,
which is the closest transmitting node to the typical receiver, can possibly be located on any of
the lines in the network. Consequently, the interference measured at the typical receiver in each
of these cases is different and we have to handle each case separately. In order to address this
issue, we derive a generalized expression for coverage probability for all these cases. Second,
when a transmitting node on a particular line is chosen to be the serving node, it implies that
there can not be any line with a node whose distance to the typical receiver is smaller than the
distance between the typical receiver and the serving node. This additional constraint imposed by
the distribution of nodes impacts the conditional distribution of lines as observed at the typical
5
receiver. We determine the conditional distribution of the lines in order to accurately compute
the interference at the typical receiver. We then determine the coverage probability in terms of
derivative of Laplace transform of the distribution of the interference power.
System-level insights. Using our analytical results, we study the effect of two key network
parameters, namely, node density and line density, on the coverage probability of the typical
receiver. We observe that the coverage probability increases as the density of nodes on lines
increases. However, the coverage probability degrades as the density of the lines in the network
increases. The contrasting effect of node and line densities on the coverage probability offers
useful insights in the design and deployment of RSUs in the network. We also compare the
coverage probabilities of our setup with the results obtained from a homogeneous 2D PPP model,
which is a widely accepted model for 2D wireless networks and is often used as a preferred
approximation for more spohisticated point processes whose analysis may not be as tractable as
a PPP. This comparison reveals that the 2D PPP model may not serve as a good approximation
for our Cox process model, thereby highlighting the significance of our analytical results.
II. M ATHEMATICAL P RELIMINARY: P OISSON L INE P ROCESS
Since the PLP will be the main component of our model described in Section III, a basic
knowledge of its construction and properties will be useful in understanding the proposed model.
While we provide only a brief introduction to PLP and its properties in this section, a detailed
account of the underlying theory can be found in [13], [24].
Line process. A line process is simply a random collection of lines in a 2D plane. Any
undirected line L in R2 can be uniquely characterized by its perpendicular distance ρ from the
origin o ≡ (0, 0) and the angle θ subtended by the perpendicular dropped onto the line from the
origin with respect to the positive x-axis in counter clockwise direction, as shown in Fig. 1. The
pair of parameters ρ and θ can be represented as the coordinates of a point on the cylindrical
surface C ≡ [0, 2π) × [0, ∞), which is termed as the representation space, as illustrated in
Fig. 2. Clearly, there is a one-to-one correspondence between the lines in R2 and points on the
cylindrical surface C. Thus, a random collection of lines can be constructed from a set of points
on C. Such a set of lines generated by a Poisson point process on C is called a Poisson line
process. In our system model, we also assume the PLP to be motion-invariant for analytical
simplicity. So, we will discuss the concept of motion-invariance for line processes and some
well-established results of PLP next.
6
𝑦
𝐿4
𝐿3
𝐿4
𝐿1
𝐿2
𝐿3
𝜌
𝜌
𝑜
𝜃
𝐿2
𝑥
0
Fig. 1.
𝐿1
Illustration of Poisson line process in two2
𝜃
2π
Fig. 2. Illustration of a point process on representation
space C ≡ [0, 2π) × [0, ∞).
dimensional plane R .
Stationarity and Motion-Invariance. The definition of stationarity for line processes is similar
to that of point processes. A line process Φl = {L1 , L2 , . . . } is said to be stationary if the
translated line process T Φl = {T (L1 ), T (L2 ), . . . } has the same distribution of lines as that of Φl
for any translation T in the plane. Upon translating the origin in the plane R2 by a distance t in a
direction that makes an angle β with respect to the positive x-axis, the equivalent representation of
a line L in C changes from (ρ, θ) to ρ−t cos(θ−β), θ . Therefore, for a stationary line process Φl ,
the point process ρL1 −t cos(θL1 −β), θL1 , ρL2 −t cos(θL2 −β), θL2 , . . . in the representation
space C has the same distribution as that of the point process
ρL1 , θL1 , ρL2 , θL2 , . . . .
Similarly, rotation of the axes about the origin by an angle γ in R2 changes the representation
of the line in C from (ρ, θ) to (ρ, θ − γ), where the operation θ − γ is modulo 2π. In addition
to translation-invariance, if a line process is also invariant to the rotation of the axes about the
origin, then it is said to be motion-invariant.
Line density. Line density µ of a line process Φl is defined as the mean line length per unit
area. If Φl is a motion-invariant line process, then the density of the corresponding point process
λ in the representation space C is given by λ =
µ
.
2π
Number of lines intersecting a disc. If Φl is a motion-invariant Poisson line process with line
density µ, then the number of lines that intersect a convex region K ⊆ R2 follows a Poisson
distribution with mean
τK =
µν(K)
= λν(K),
2π
(1)
where ν(K) is the perimeter of the convex region K. Therefore, the number of lines intersecting
a disc of radius d is Poisson distributed with mean 2πλd.
7
III. S YSTEM M ODEL
A. Spatial Modeling of Wireless Nodes
We first model the spatial distribution of road systems by a motion-invariant PLP Φl with
line density µl . We denote the density of equivalent PPP on the representation space C by λl .
We then model the locations of wireless nodes, which include vehicular nodes and RSUs, on
each line (road) by a homogeneous 1D PPP with density λn . Assuming that each wireless node
transmits independently with a probability p, the locations of transmitting nodes on each line
is then given by a thinned PPP with density λv = pλn . We denote the set of locations of the
transmitting nodes on a line L by {wL } ≡ ΨL . Similarly, the distribution of receiving nodes on
each line is also a thinned PPP with density λr = (1 − p)λn . Thus, the locations of transmitting
and receiving nodes are modeled by Cox processes Φt and Φr , which are driven by the same
PLP Φl . Our goal is to derive the SIR based coverage probability of a typical receiver from the
point process Φr . For analytical simplicity, we translate the origin o ≡ (0, 0) to the location of
the typical receiver. The translated point process Φr0 can be treated as the superposition of the
point process Φr , an independent 1D PPP with density λr on a line passing through the origin,
and an atom at the origin o [12]. This can be understood by applying Slivnyak’s theorem [13],
[14] in two steps: first, we add a point at the origin to the PPP in the representation space C,
thereby obtaining a PLP Φl0 = Φl ∪ {L0 } with a line L0 passing through the origin, and second,
we add a point at the origin to the 1D-PPP on the line L0 passing through the origin in R2 .
The line L0 passing through the origin will henceforth be referred to as the typical line. Since
both Φr and Φt are driven by the same line process, the translated point process Φt0 is also
the superposition of Φt and an independent PPP with density λv on L0 , as shown in Fig. 3.
Since the other receiver nodes in the network do not have any impact on the SIR measured at
the typical receiver in this setup, we will focus only on the distribution of transmitter nodes in
the network. For brevity, the transmitter nodes will henceforth be referred to as only nodes. We
denote the ith (i = 1, 2, . . . ) closest line to the origin o (excluding the typical line) by Li and
its perpendicular distance to the origin by Yi . The distance of the closest node on a line Li from
the projection of the origin onto Li is denoted by Xi , as illustrated in Fig. 3. Thus, the distance
p
to the closest node on Li from the origin is Si = Yi2 + Xi2 . For notational consistency, we
denote the distance of the typical line from the origin by Y0 ≡ 0 and the distance to the closest
node on L0 by S0 . We denote the number of lines that intersect a region A ⊂ R2 by Nl (A) and
the number of nodes in A by Nv (A). Throughout this paper, we denote the random variables
8
Typical Receiver
Serving node
𝐿0
Interfering nodes
𝑦𝑛
𝑜
𝑥𝑛
𝑟
𝐿𝑛
Fig. 3. Illustration of the system model.
by upper case letters and their corresponding realizations by lower case letters. For instance, Yn
denotes a random variable, whereas yn denotes its realization.
B. Transmitter Association Scheme and Propagation Model
We assume that the transmit power is the same for all the nodes and the antennas are isotropic.
We further assume that the typical receiver connects to its closest transmitting node in the
network. Note that the closest node does not necessarily have to be on the same line as that of
the typical receiver and can possibly be located on any of the other lines. We denote such an
event in which the serving node is located on the ith closest line (excluding the typical line) to
the origin by Ei (i = 1, 2, . . . ). We denote the event in which the serving node is located on the
typical line by E0 .
In wireless communication networks, the severity of fading between the transmitter and the
receiver depends on environmental factors and hence, the effect of fading can vary significantly
from an urban scenario consisting of several buildings to rural areas and highways which are
almost devoid of any tall structures. Therefore, in order to mimic a wide range of fading
environments, we choose Nakagami-m fading with parameter m. In the interest of analytical
tractability, we restrict the values of m to integers. For simplicity of exposition, we assume that
the system is interference limited and hence, the thermal noise is neglected. Thus, the signal-tointerference ratio (SIR) at the typical receiver is
SIR = P
Lj ∈Φl0
G0 R−α
P
wLj ∈ΨLj \b(o,R)
GwLj kwLj k−α
,
(2)
where α > 2 is the path-loss exponent, G0 is the channel fading gain between the typical
receiver and the serving node, GwLj is the channel fading gain between the typical receiver and
9
the interfering node at the location wLj , R is the Euclidean distance to the serving node from
the typical receiver, and kwLj k is the Euclidean distance of the interfering node from the typical
receiver.
IV. C OVERAGE P ROBABILITY
This is the main technical section of the paper, where we derive the coverage probability for
the setup described in the previous section. Recall that the serving node which is the closest
node to the typical receiver can possibly be located on any line Lk (k = 0, 1, . . . ). As a result,
the interference at the typical receiver will be different in each of these cases and hence, they
need to be handled separately. However, we can derive a generalized expression for the cases in
which the serving node does not lie on the typical line (E1 , E2 , . . . ). Therefore, in our analysis,
we will derive the coverage probability conditioned on the events E0 and En (n = 1, 2, . . . )
separately and obtain the final result using law of total probability. A key difference between the
events E0 and En is that the distance of the line on which the serving node is located is always
zero in case of E0 , whereas the distance of the line containing the serving node Yn in case of
En is a random variable. Therefore, in the computation of coverage probability conditioned on
En , we will derive the intermediate results by additionally conditioning on Yn . In the final step,
we obtain the overall coverage probability by taking expectation over Yn . While we can obtain
some of the results for the case E0 from the intermediate results pertaining to En by simply
substituting Y0 = 0 in place of Yn , we will provide detailed proofs for those results where this
approach is not applicable.
A. Preliminary Results
We begin our analysis with the derivation of some fundamental distance distributions which
will be used later in the computation of coverage probability. While it may be relatively straightforward to derive some of these results, they are presented here for completeness.
Lemma 1. The cumulative distribution function (CDF) and probability density function (PDF)
of the distance of the nth closest line from the origin Yn are
CDF: FYn (yn ) = 1 − exp(−2πλl yn )
n−1
X
(2πλl yn )k
k=0
PDF: fYn (yn ) = exp(−2πλl yn )
(2πλl yn )n
.
yn (n − 1)!
k!
,
(3)
(4)
10
Proof: From the definition of a PLP, recall that there is a one-to-one correspondence between
lines in R2 and points on C ≡ [0 2π) × [0 ∞). The abscissa and the ordinate of these points
represent the orientation of the line and the distance of the line from the origin, respectively.
We now consider the projections of these points onto the vertical axis of the cylindrical surface,
which represents the distance of the lines from the origin. Note that the number of projections
of points in a segment of length t on the vertical axis of C is the same as the number of points
in the area [0, 2π) × [0, t), which follows a Poisson distribution with mean 2πλl t. This means
that the projections of points onto the vertical axis of C forms a 1D PPP Ψl0 with density 2πλl .
Therefore, the distance of the nth closest line from the origin follows the same distribution as
that of the distance of nth closest point in a 1D PPP with density 2πλl , which is a well-known
result in stochastic geometry [14].
Lemma 2. Conditioned on the distance of the nth closest line to the origin Yn , the CDF of the
distance Xn between the projection of origin onto the line Ln and its closest node on Ln is
FXn (xn |yn ) = 1 − exp(−2λv xn ).
(5)
Proof: The proof follows from the void probability of a 1D PPP with density λv .
Lemma 3. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and
PDF of the distance to the closest node on the line Ln from the typical receiver Sn are
p
CDF: FSn (sn |yn ) = 1 − exp(−2λv s2n − yn2 ),
p
2λv sn
PDF: fSn (sn |yn ) = p
exp − 2λv s2n − yn2 .
s2n − yn2
(6)
(7)
Proof: The conditional CDF of Sn is given by
p
p
FSn (sn |yn ) = P(Sn < sn |Yn ) = P( Xn2 + yn2 < sn |Yn ) = P(Xn < s2n − yn2 |Yn )
p
p
= FXn ( s2n − yn2 |yn ) = 1 − exp(−2λv s2n − yn2 ).
The PDF fSn (sn |yn ) can be obtained by taking the derivative of FSn (sn |yn ) w.r.t. sn .
Corollary 1. The CDF and the PDF of the distance between the typical receiver at the origin
and its closest node on the typical line S0 are
CDF: FS0 (s0 ) = 1 − exp(−2λv s0 ),
(8)
PDF: fS0 (s0 ) = 2λv exp(−2λv s0 ).
(9)
11
Proof: The proof follows from substituting S0 and Y0 = 0 in place of Sn and Yn in Lemma
3.
Conditioned on the distance Yn , we will now derive the distribution of the distance of the
closest node to the typical receiver among the nodes that are located on the lines that are closer
and farther than the line of interest Ln in the following Lemmas. These results will be used in
the next subsection in the computation of the probability of occurrence of events E0 and En .
Lemma 4. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and
PDF of the distance Un between the typical receiver and its closest node among the n − 1 lines
{L1 , L2 , . . . Ln−1 } (excluding the typical line) that are closer than Yn are
CDF:
n−1
Z
p
un
1 un
2
2
, 0 ≤ un < yn ,
1 − 1 − yn + yn 0 exp − λv 2 un − z dz
" Z
FUn (un |yn ) =
n−1 #
yn
p
dz
exp − λv 2 u2n − z 2
,
yn ≤ un < ∞,
1 −
yn
0
(10)
PDF:
n−2
Z
p
un
1 un
2
2
(n − 1) 1 −
exp − λv 2 un − z dz
+
y
y
n
n
0
Z un
p
2λ
u
v
n
exp(−2λv u2n − z 2 ) p
×
dz ,
yn u2n − z 2
0
fUn (un |yn ) =
Z yn
p
dz n−2
2
2
exp − λv 2 un − z
(n − 1)
yn
0
Z yn
p
2λv un
×
exp(−2λv u2n − z 2 ) p
dz,
yn u2n − z 2
0
0 ≤ un < yn ,
yn ≤ un < ∞.
(11)
Proof: See Appendix A.
Lemma 5. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and
PDF of the distance Vn between the typical receiver and its closest node among the lines {Ln+1 ,
Ln+2 , . . . } that are farther than Yn are
CDF:
"
Z
vn
FVn (vn |yn ) = 1 − exp − 2πλl
yn
#
p
1 − exp(−2λv vn2 − z 2 ) dz ,
yn ≤ vn < ∞,
(12)
12
PDF:
Z
vn
p
2λv vn
vn2 − z 2 ) p
dz
vn2 − z 2
yn
"
#
Z vn
p
1 − exp(−2λv vn2 − z 2 ) dz ,
× exp − 2πλl
fVn (vn |yn ) = 2πλl
exp(−2λv
yn ≤ vn < ∞.
(13)
yn
Proof: See Appendix B.
We can easily specialize the results of Lemma 5 to obtain the CDF and PDF of the distance
between the typical receiver and its closest node among the lines that are farther than the typical
line as given in the following Corollary.
Corollary 2. The CDF and PDF of the distance V0 between the typical receiver and its closest
node among the lines that are farther than the typical line are
#
"
Z v0
q
CDF: FV0 (v0 ) = 1 − exp − 2πλl
1 − exp(−2λv v02 − z 2 ) dz ,
(14)
0
Z
v0
q
2λ v
v 0
exp − 2λv v02 − z 2 p 2
dz
v0 − z 2
0
"
#
Z v0
q
× exp − 2πλl
1 − exp(−2λv v02 − z 2 ) dz .
PDF: fV0 (v0 ) = 2πλl
(15)
0
Proof: The proof follows from substituting V0 and Y0 = 0 in place of Vn and Yn in Lemma
5.
B. Probabilities of Events En and E0
In this subsection, we will derive the probability with which the typical receiver connects to
a node on the nth closest line to the origin conditioned on the distance of the line from the
origin Yn and the probability with which the typical receiver connects to a node on the typical
line. These intermediate results hold the key to the derivation of conditional serving distance
distribution in the next subsection.
Lemma 6. Conditioned on Yn , the probability of occurrence of the event En is
Z ∞
P(En |Yn ) =
1 − FS0 (sn ) 1 − FUn (sn |yn ) 1 − FVn (sn |yn ) fSn (sn |yn )dsn ,
(16)
0
where FS0 (·), FUn (· |yn ), FVn (·|yn ), and fSn (sn |yn ) are given by Corollary 1, Lemmas 4, 5, and
3, respectively.
Proof: The typical receiver connects to a node on the nth closest line if the distance to the
closest node on the line Ln is smaller than the distance to the closest node on any other line.
13
In this case, we will group all the lines excluding the line of interest Ln into 3 sets: (i) the
typical line L0 , (ii) the lines that are closer than the line Ln (L1 , L2 , . . . , Ln−1 ), and (iii) the
lines that are farther than the line Ln (Ln+1 , Ln+2 , . . . ). The distance to the closest node on Ln
must be smaller than the distance to the closest node in each of these three sets, i.e., Sn must
be smaller than the minimum of S0 , Un , and Vn . Thus, the conditional probability of occurrence
of the event En is computed as
P(En |Yn ) = P(Sn < min{S0 , Un , Vn }|Yn ) = P(Sn < S0 , Sn < Un , Sn < Vn |Yn )
Z ∞
(a)
=
P(S0 > sn |Sn , Yn )P(Un > sn |Sn , Yn )P(Vn > sn |Sn , Yn )fSn (sn |yn )dsn
0
Z ∞
(b)
1 − FS0 (sn ) 1 − FUn (sn |yn ) 1 − FVn (sn |yn ) fSn (sn |yn )dsn ,
=
0
where (a) follows from the conditional independence of the variables S0 , Un , and Vn , and (b)
follows from the independence of the random variable S0 .
Corollary 3. The probability of occurrence of the event E0 is
Z ∞
FS0 (v0 )fV0 (v0 )dv0 ,
P(E0 ) =
(17)
0
where FS0 (·) and fV0 (·) are given by Corollaries 1 and 2, respectively.
Proof: The typical receiver at the origin connects to a node on the typical line when the
distance to the closest node on the typical line is smaller than the distance to the closest node
on any other line. Thus, the probability of occurrence of E0 is given by
Z ∞
P(S0 < v0 |V0 )fV0 (v0 )dv0
P(E0 ) = P(S0 < min{S1 , S2 , . . .}) = P(S0 < V0 ) =
0
Z ∞
=
FS0 (v0 )fV0 (v0 )dv0 ,
0
which completes the proof.
C. Serving Distance Distribution
In this subsection, we will derive the distribution of distance between the typical receiver and
the serving node conditioned on the events En and E0 . As stated in the previous subsection, in case
of En , the distance to the closest node on the nth closest line Sn must be smaller than the minimum
of S0 , Un , and Vn . Therefore, we first determine the distribution of Wn = min{S0 , Un , Vn } in
the following Lemma.
14
Lemma 7. Conditioned on the distance of the nth closest line to the origin Yn , the CDF and
PDF of Wn = min{S0 , Un , Vn } are
FWn (wn |yn ) = 1 − 1 − FS0 (wn ) 1 − FUn (wn |yn ) 1 − FVn (wn |yn ) ,
(18)
PDF: fWn (wn |yn ) = fS0 (wn ) 1 − FUn (wn |yn ) 1 − FVn (wn |yn ) + 1 − FS0 (wn ) fUn (wn |yn )
× 1 − FVn (wn |yn ) + 1 − FS0 (wn ) 1 − FUn (wn |yn ) fVn (wn |yn ), (19)
CDF:
where FS0 (·), fS0 (·) are given by Corollary 1, FUn (· |yn ), fUn (· |yn ) are given by Lemma 4, and
FVn (·|yn ), fVn (·|yn ) are given by Lemma 5.
Proof: The proof simply follows from the distribution of minimum of three independent
random variables [25].
Using the intermediate results derived thus far, we will now derive the conditional distribution
of the serving distance R in the following Lemma.
Lemma 8. Conditioned on the event En and the distance of the nth closest line Yn , the CDF
and PDF of the serving distance R are
Z ∞
1
FSn (wn |yn ) − FSn (r|yn ) fWn (wn |yn )dwn , (20)
CDF: FR (r|En , Yn ) = 1 −
P(En |Yn ) r
Z ∞
1
fSn (r|yn )fWn (wn |yn )dwn ,
(21)
PDF: fR (r|En , yn ) =
P(En |Yn ) r
where FSn (·|yn ), fSn (·|yn ) are given by Lemma 3, P(En |Yn ) and fWn (·|yn ) are given by Lemmas
6 and 7, respectively.
Proof: The conditional CDF of the serving distance R is computed as
FR (r|En , Yn )
P(Sn > r, Sn < min{S0 , Un , Vn }|Yn )
P(R > r, En |Yn ) (a)
= 1−
P(En |Yn )
P(En |Yn )
Z ∞
P(r < Sn < Wn |Yn )
1
=1−
=1−
P(r < Sn < wn |Wn , Yn )fWn (wn |yn )dwn
P(En |Yn )
P(En |Yn ) r
Z ∞
1
FSn (wn |yn ) − FSn (r|yn ) fWn (wn |yn )dwn ,
=1−
P(En |Yn ) r
where (a) follows from the condition for the occurrence of the event En . The conditional PDF
= 1 − P(R > r|En , Yn ) = 1 −
fR (r|En , yn ) can be computed by taking the derivative of FR (r|En , yn ) w.r.t. r.
Lemma 9. Conditioned on the event E0 , the CDF and PDF of the serving distance R are given
by
CDF:
1
FR (r|E0 ) = 1 −
P(E0 )
Z
r
∞
FS0 (v0 ) − FS0 (r) fV0 (v0 )dv0 ,
(22)
15
1
PDF: fR (r|E0 ) =
P(E0 )
Z
∞
fS0 (r)fV0 (v0 )dv0 ,
(23)
r
where FS0 (·), fS0 (·) are given by Corollary 1, fV0 (v0 ) and P(E0 ) are given by Corollaries 2 and
3, respectively.
Proof: The proof follows along the same lines as that of Lemma 8.
D. Conditional Probability Mass Function of Number of Lines
Now that we have derived the distribution of the serving distance R, the next main step is to
characterize the interference experienced at the typical receiver conditioned on R for the events
En and E0 . The sources of interference are all the nodes that are located at a distance farther
than R from the origin, i.e., the nodes that lie outside the disc b(o, R) centered at the origin
o with radius R. Please note that such nodes could also lie on lines which are located closer
than R. Please see Fig. 4 for an illustration. Therefore, in order to accurately characterize the
interference, we will have to first determine the distribution of lines. In order to explain this
concretely, let us consider the case of En , where the serving node is located at a distance R on
the nth closest line from the origin. From the properties of PLP, we know that the number of
lines intersecting a disc of fixed radius follows a Poisson distribution with mean equal to the
line density scaled by the perimeter of the disc. However, this does not hold for the conditional
distribution of the number of lines that intersect the disc b(o, R). This is because the lines that
intersect the disc b(o, R) must not contain any nodes in the chord segment inside the disc (since
we have already conditioned on the event that the serving node is located on Ln at a distance R
from the typical receiver). This additional constraint imposed by the distribution of nodes on the
lines impacts the conditional distribution of number of lines intersecting the disc b(o, R). Note
that the typical line is not included in the count of number of lines intersecting the disc b(o, R).
Now, conditioned on the event En , we know that there are at least n lines that intersect the disc
b(o, R) which include the n − 1 lines that are closer than the line of interest Ln and the line
Ln itself which is at a distance Yn ≤ R. In addition to these n lines, there are also a random
number of lines that are farther than Yn but closer than the serving distance R, as illustrated in
Fig. 4. Therefore, our immediate goal is to determine the conditional distribution of this random
number of lines that intersect the disc b(o, R) but do not intersect the disc b(o, Yn ), denoted by
Nl b(o, R) \ b(o, Yn ) .
16
Typical Receiver
𝐿𝑛
𝐿0
Serving node
Interfering nodes
𝑦𝑛
Typical Line
Line containing the
serving node
Lines that intersect 𝑏(𝑜, 𝑦𝑛 )
Lines that intersect
𝑏(𝑜, 𝑟) but not 𝑏(𝑜, 𝑦𝑛 )
Lines that do not intersect
𝑏(𝑜, 𝑟)
𝑜
𝑟
Fig. 4. Illustration of different sets of lines.
Lemma 10. Conditioned on the event En , the distance of the nth closest line Yn , and the serving
distance R, the probability mass function (PMF) of number of lines that are farther than Yn
and closer than R is
Z r
p
P Nl b(o, r) \ b(o, yn ) = k|En , Yn , R = exp − 2πλl
exp(−2λv r2 − y 2 )dy
yn
2πλl
×
Rr
exp(−2λv
yn
k
p
r2 − y 2 )dy
.
k!
(24)
Proof: See Appendix C.
Remark 1. Conditioned on the event En , serving distance R, and the distance of the nth closest
line to the origin Yn , we have derived the PMF of number of lines that are farther than Yn and
closer than R. However, it can be observed that the conditional distribution remains Poisson
p
Rr
but with a mean of 2πλl yn exp(−2λv r2 − y 2 )dy. Therefore, the conditional distribution of
Rr
µl
lines can be interpreted as a thinned Poisson line process with line density 2π(r−y
exp −
n ) yn
p
2λv r2 − y 2 dy.
Corollary 4. Conditioned on the event E0 and the serving distance R, the PMF of number of
lines (excluding the typical line) that are closer than R is
Z r
p
P(Nl b(o, R) = k|R, E0 ) = exp − 2πλl
exp(−2λv r2 − y 2 )dy
0
×
2πλl
Rr
0
exp(−2λv
k!
k
p
r2 − y 2 )dy
.
(25)
Proof: The proof follows from substituting E0 and Y0 = 0 in place of En and Yn in Lemma
10.
17
E. Laplace Transform of Interference Distribution
In this subsection, we will determine the Laplace transform of the distribution of the interference power conditioned on the serving distance R. We will first consider the case where the
typical receiver connects to the nth closest line to the origin. In this case, we group the sources
of interference into the following five sets: (i) the set of nodes present on the typical line, (ii)
the set of nodes present on the line that contains the serving node which is at a distance Yn , (iii)
the set of nodes present on the lines that are closer than Yn (excluding the typical line), (iv) the
set of nodes present on the lines that are farther than Yn but closer than the serving distance R
(an annular region), and (v) the set of nodes present on the lines whose distance from the origin
exceeds the serving distance R. We denote the interference from these five sets of nodes by I0 ,
In , Iin , Iann , and Iout , respectively. We will now derive the Laplace transform of distribution of
interference from each of these components.
The interference measured at the typical receiver from the nodes on the typical line is given
P
by I0 = wL ∈ΨL \b(o,R) GwL0 kwL0 k−α , where ΨL0 is the 1-D PPP on the typical line, GwL0
0
0
are the channel gains between the typical receiver and the interfering nodes at wL0 . While the
Laplace transform of distribution of interference from nodes of a 1D PPP is very well-known,
we still present the result in the following Lemma for completeness.
Lemma 11. Conditioned on the event En , serving distance R, and the distance of the nth closest
line Yn , the Laplace transform of distribution of interference from the nodes situated on the
typical line L0 is
"
Z
∞
LI0 (s|r, yn , En ) = exp − 2λv
r
#
sx−α −m
dx .
1− 1+
m
(26)
Proof: The distribution of nodes on the typical line is independent of the distance of the
nth closest line Yn . Thus, the Laplace transform of distribution of interference from nodes on
the typical line can be computed as
"
LI0 (s|r, yn , En ) = E[e−sI0 ] = E EG
#
Y
exp − sGxL0 kwL0 k
−α
wL0 ∈ΨL0 \b(o,R)
"
(a)
=E
Y
wL0 ∈ΨL0 \b(o,R)
#
"
#
Z ∞
sx−α −m
skwL0 k−α −m (b)
= exp − 2λv
1− 1+
dx ,
1+
m
m
r
where (a) follows from the Gamma distribution of channel fading gains, and (b) follows from
the PGFL of PPP and substituting x = kwL0 k.
18
Lemma 12. Conditioned on the event En , the serving distance R, and the distance of the nth
closest line form the origin Yn , the Laplace transform of distribution of interference from the
nodes on the line Ln is
"
Z
∞
LIn (s|r, yn , En ) = exp − 2λv √
2
r2 −yn
#
s(x2 + yn2 )−α/2 −m
1− 1+
dx .
m
(27)
Proof: The proof follows along the same lines as that of Lemma 11.
Lemma 13. Conditioned on the event En , serving distance R, and the distance of the nth closest
line Yn , the Laplace transform of distribution of interference from the nodes located on the lines
that are closer than Yn is
Z
LIin (s|r, yn , En ) =
yn
"
exp − 2λv
0
# !n−1
s(x2 + y 2 )−α/2 −m
dy
1− 1+
dx
.
√
m
yn
r2 −y 2
Z
∞
(28)
Proof: See Appendix D.
Lemma 14. Conditioned on the event En , serving distance R, and the distance of the nth closest
line from the origin Yn , the Laplace transform of distribution of interference from the nodes
located on the lines that are farther than Yn and closer than R is
Z
"
Z r
√
LIann (s|r, yn , En ) = exp
− 2πλl
exp(−2λv r2 − z 2 )dz
1−
yn
r
exp − 2λv
yn
∞
#
s(x2 + y 2 )−α/2 −m
dy
× √
.
1− 1+
dx
m
(r − yn )
r2 −y 2
Z
(29)
Proof: See Appendix E.
Lemma 15. Conditioned on the event En , serving distance R, and the distance of the nth closest
line from the origin Yn , the Laplace transform of the distribution of the interference from the
nodes located on the lines that are farther than the serving distance R is
"
Z ∞
Z ∞
LIout (s|r, yn , En ) = exp − 2πλl
1 − exp − 2λv
1
r
− 1+
Proof: See Appendix F.
0
s(x2 + y 2 )−α/2 −m
m
! #
dx dy
(30)
19
The aggregate interference at the typical receiver is given by I = I0 + Iin + In + Iann + Iout .
Conditioned on En , R, and Yn , the five components of interference are mutually independent
and hence, the conditional Laplace transform of the distribution of total interference power is
LI (s|r, yn , En ) = LI0 (s|r, yn , En )LIin (s|r, yn , En )LIn (s|r, yn , En )
× LIann (s|r, yn , En )LIout (s|r, yn , En ).
(31)
In case of event E0 , the five different sources of interference mentioned earlier is reduced to
three since the typical line and the line containing the serving node are the same and there are
no lines closer than the typical line. Therefore, the sources of interference in this case are: (i) the
set of nodes on the typical line, (ii) the set of nodes on the lines that are closer than the serving
distance R, and (iii) the set of nodes on the lines that are farther than the serving distance R.
We denote the interference from the three sets of nodes by I0 , Iin , and Iout , respectively. The
conditional Laplace transform of distribution of the interference from these three sources can be
directly obtained from the results in Lemmas 11, 14, and 15 by substituting E0 and Y0 = 0 in
place of En and Yn , as given in the following Corollary.
Corollary 5. Conditioned on the event E0 and the serving distance R, the Laplace transform of
interference power distribution is
LI (s|r, E0 ) = LI0 (s|r, E0 )LIin (s|r, E0 )LIout (s|r, E0 ),
(32)
where
"
∞
#
sx−α −m
LI0 (s|r, E0 ) = exp − 2λv
1− 1+
dx ,
m
r
"
Z
Z r
√
LIin (s|r, E0 ) = exp
− 2πλl
exp(−2λv r2 − z 2 )dz
1−
Z
0
Z
∞
× √
r2 −y 2
(33)
r
exp − 2λv
0
#
s(x2 + y 2 )−α/2 −m
dy
1− 1+
dx
,
m
r
(34)
and
"
Z
LIout (s|r, E0 ) = exp − 2πλl
∞
Z
1 − exp − 2λv
r
∞
1
0
! #
s(x2 + y 2 )−α/2 −m
dx dy .
− 1+
m
(35)
Now that we have determined the Laplace transform of distribution of interference power from
all the components for both the cases En and E0 , we will derive the coverage probability next.
20
F. Coverage Probability
The coverage probability is formally defined as the probability with which the SIR measured
at the receiver exceeds a predetermined threshold β required for a successful communication.
Using the results derived thus far, the total coverage probability at the typical receiver can be
obtained in terms of the conditional Laplace transform of the distribution of the interference
power as given in the following theorem.
Theorem 1. The coverage probability of the typical receiver Pc is
m−1
∞ m−1
X Z ∞ (−mβ)k ∂ k
X
X Z ∞ Z ∞ (−mβ)k
Pc = P(E0 )
L (s|r, E0 )
fR (r|E0 )dr +
−kα k!
k I
r
∂s
r−kα k!
α
0
yn
s=mβr
n=1 k=0 0
k=0
k
∂
(36)
LI (s|r, En , yn )
P(En |Yn )fR (r|En , yn )fYn (yn )drdyn .
×
∂sk
s=mβrα
Proof: The coverage probability can be computed as
∞
X
Pc = P(SIR > β) =
P(Ei )P(SIR > β|Ei )
i=0
= P(E0 )P(SIR > β|E0 ) +
∞
X
h
i
EYn P(En |Yn )P(SIR > β|En , Yn )
n=1
∞
h
i X
h
i
= P(E0 )ER P(SIR > β|E0 , R) +
EYn P(En |Yn )ER P(SIR > β|En , R, Yn )
n=1
Z
∞
= P(E0 )
P(SIR > β|E0 , R)fR (r|E0 )dr
0
+
∞ Z
X
n=1
0
∞
Z
∞
P(SIR > β|En , R, Yn )P(En |Yn )fR (r|En , yn )fYn (yn )drdyn
(37)
yn
Following the same approach presented in [26]–[28], we can obtain the final expression by
rewriting the conditional coverage probability in (37) in terms of derivative of Laplace transform
of the distribution of the interference power. This completes the proof.
V. N UMERICAL R ESULTS AND D ISCUSSION
In this section, we verify the accuracy of our analytical results by comparing the coverage
probabilities evaluated using the theoretical expressions with the results obtained from the MonteCarlo simulations. We also analyze the trends in coverage probability as a function of network
parameters. We then highlight the significance of our analysis by comparing our coverage
probability results with that of a homogeneous 2D PPP model with the same node density, which
is often used to approximate more sophisticated point processes that may not be as tractable as
a homogeneous PPP.
21
1
Coverage probability, Pc
Theory
Simulation
0.8
0.6
0.4
0.2
Coverage probability, Pc
1
Increasing µl = 15,
25, 35, 45 km/km2
0.8
0.6
0.4
0.2
0
-20
0
20
40
-20
-10
0
10
20
SIR threshold, β (dB)
SIR threshold, β (dB)
Fig. 5. Coverage probability of the typical receiver as a
2
Fig. 6. Coverage probability of the typical receiver as a
function of SIR threshold (µl = 35 km/km , λv = 35
function of SIR threshold (λv = 35 nodes/km, m = 1,
nodes/km, m = 1, and α = 4).
and α = 4).
A. Numerical Results
We simulate the Cox process model described in Section III in MATLAB with line density
µl = 35 km/km2 , node density λv = 35 nodes/km, and path-loss exponent α = 4. For this
setup, we evaluate the empirical coverage probability for a receiver located at the origin using
Monte-Carlo simulations. We observe that our analytical results match exactly with the MonteCarlo simulations as depicted in Fig. 5. The key network parameters that have an impact on the
coverage probability are the line density and the node density. Therefore, we will next study the
impact of each of these parameters separately on the coverage probability.
Impact of line density. We compute the coverage probability of the typical receiver for node
density of λv = 35 nodes/km and different line densities of µl = 15, 25, 35, and 45 km/km2 . It
can be observed from Fig. 6 that the coverage probability decreases as the line density increases.
This trend in the coverage probability can be easily understood by examining the case where
the receiver connects to a node on the typical line. In this case, an increase in the line density
does not have any effect on the serving distance, however, it increases the interference power
due to the reduced distance between the typical receiver and interfering nodes on other lines.
Impact of node density. We compare the coverage probability of the typical receiver for node
densities of λv = 20, 30, 40, and 50 nodes/km as a function of SIR threshold β. The other system
parameters were fixed at µl = 35 km/km2 , m = 1, and α = 4. It can be observed from Fig.
7 that the coverage probability increases as the density of nodes on the lines increases. Recall
that the distance from the typical receiver at the origin to any node on a line involves two
22
1
Coverage probability, Pc
Coverage probability, Pc
1
0.8
0.6
0.4
Increasing λv = 20, 30,
40, 50 nodes/km
µl = 10 km/km2 ,
λv = 100 nodes/km
µl = 35 km/km2 ,
λv = 35 nodes/km
µl = 150 km/km2 ,
λv = 5 nodes/km
2D PPP (λp = µl λv )
0.8
0.6
0.4
0.2
0.2
0
-20
-10
0
10
20
-20
SIR threshold, β (dB)
Fig. 7. Coverage probability of the typical receiver as a
2
function of SIR threshold (µl = 35 km/km , m = 1, and
-10
0
10
20
30
40
50
SIR threshold, β (dB)
Fig. 8. Coverage probability of the typical receiver as a
function of SIR threshold (m = 1 and α = 4).
α = 4).
components: (i) perpendicular distance of the line from the origin, and (ii) the distance of the
node (along the line) from the projection of the origin onto the line. When the density of nodes
increases, the nodes come closer along the direction of the line, which decreases the second
component of distance described above. Consequently, the decrement in the distance from the
typical receiver to the nodes located on the lines that are closer to the origin is relatively more
than the decrement in the distance to the nodes located on the lines that are farther away from
the origin. This increases the desired signal power at a faster rate than the interference power,
thus improving the SIR and hence the coverage probability at the typical receiver.
B. Comparison with a Homogeneous 2D PPP Model
In this subsection, we compare the coverage probability of the typical receiver obtained for the
Cox process driven by PLP described in Section III with the results from a homogeneous 2D PPP
model with the same node density, which is often used as a first-order approximation for more
sophisticated point processes whose analysis may not be as tractable as a homogeneous PPP. We
compute the coverage probability of the typical receiver for our setup with line density µl = 35
km/km2 and transmitter node density λv = 35 nodes/km. Thus, the equivalent node density
of a homogeneous 2D PPP is λp = µl λv = 1225 nodes/km2 . The notable difference between
the coverage probabilities obtained from the two models in Fig. 8 highlights the importance of
our model for the analysis of vehicular networks where the locations of nodes are restricted to
road systems. This suggests that the homogeneous 2D PPP is not a good approximation for the
proposed Cox process-based model in all operational scenarios. In order to glean better insights,
23
we will now study the asymptotic behavior of the proposed model by evaluating the coverage
probability for the extreme values of line and node densities.
Low line density and high node density. In this case, the collinearity of the locations of nodes
in the network is more distinct. Hence, the coverage probability for our setup with µl = 10
km/km2 and λv = 100 nodes/km deviates significantly from the results of 2D PPP model, as
shown in Fig. 8. Also, due to the high density of nodes on each line, the typical receiver almost
always connects to the closest node on the typical line. Therefore, the theoretical analysis for
this case is relatively simple and the corresponding results are already given in the Corollaries.
High line density and low node density. As the density of lines µl → ∞, it allows the nodes
to be positioned almost anywhere in R2 . In addition to this, if the density of nodes on each line
is low, only a small number of nodes appear to be aligned on a straight line. As a result, the
nodes appear to be uniformly distributed in the entire 2D plane like a PPP. This explains the
trend in Fig. 8, where the coverage probability of the typical receiver for our setup with a high
line density of µl = 150 km/km2 and low node density of λv = 5 nodes/km is quite close to
that of the 2D PPP model.
VI. C ONCLUSION
In this paper, we have presented an analytical method for the coverage analysis of a vehicular
network in which the locations of nodes are confined to road systems. We have modeled the
roads by a PLP and the nodes on each road by a homogeneous 1D PPP. Assuming that the typical
receiver connects to its closest node in the network, we began our analysis with the derivation of
several distance distributions which were necessary to determine the desired signal power at the
typical receiver. We then computed the conditional distribution of lines in order to accurately
characterize the interference at the typical receiver. We then derived an exact expression for
SIR-based coverage probability of the typical receiver in terms of the derivative of Laplace
transform of interference power distribution. We have verified the accuracy of our analytical
results numerically by comparing them with the results obtained from Monte-Carlo simulations.
Our analysis also reveals that the line density and the node density have a conflicting effect on
the coverage probability. We then highlighted the significance of our analysis by comparing our
coverage results with that of a homogeneous 2D PPP model with the same node density and
also studied the asymptotic behavior of our model.
This work has numerous extensions. First and foremost, the proposed model as well as the
canonical analysis presented in this paper can be readily applied to study other metrics of
24
interest, such as information throughput and area spectral efficiency, which were not directly
analyzed in this paper. The proposed approach can also be easily specialized to study the vehicular
network performance under specific system constraints, such as those imposed by the mmWave
frequencies, thus making the analysis relevant to a particular technology such as 5G. From
stochastic geometry perspective, it will be useful to develop appropriate generative models for
the proposed setup that simplify the analysis without compromising the accuracy of the results.
Finally, while the proposed model is a reasonable canonical model for vehicular networks, there is
always scope for making such models more accurate (often at the cost of reduced tractability) by
obtaining network parameters from the actual data [29]. Therefore, another worthwhile extension
of this work is to take a data-driven approach to vehicular network modeling, which will provide
useful insights into the parameter ranges that are of interest in different morphologies.
A PPENDIX
A. Proof of Lemma 4
The CDF of Un conditioned on Yn is
FUn (un |yn ) = 1 − P(Un > un |Yn ) = 1 − P Nv b(o, un ) = 0|Yn ,
where Nv (b(o, un )) denotes the number of nodes within the disc of radius un centered at o.
Therefore, we need to find the probability that there are no nodes on any of the lines that are
closer than Yn that intersect the disc b(o, un ). We know that there are n − 1 lines whose distance
from the origin is uniformly distributed in the range (0, yn ). Depending on the range of un , there
are two possible cases: (i) if un is smaller than yn , then the number of lines intersecting the disc
b(o, un ) follows a binomial distribution with parameters n − 1 and
un
,
yn
and (ii) if un exceeds
yn , then all the n − 1 lines intersect the disc b(o, un ). Thus, we obtain a piece-wise conditional
CDF for Un as follows:
FUn (un |yn )
n−1
X
1
−
P
N
b(o,
u
)
=
0|N
b(o,
u
)
=
j,
Y
v
n
l
n
n
j=0
=
×P Nl b(o, un ) = j|Yn ,
n−1
Y
1
−
P
N
L
∩
b(o,
u
)
=
0|Y
v
i
n
n
i=1
0 ≤ un < yn ,
yn ≤ un < ∞
25
(a)
=
n−1
j
X
1
−
P
N
L
∩
b(o,
u
)
=
0|Y
P
N
b(o,
u
)
=
j|Y
0 ≤ un < yn ,
v
n
n
l
n
n ,
j=0
n−1
1 − P Nv L ∩ b(o, un ) = 0|Yn
yn ≤ un < ∞,
(38)
where (a) follows from the independent and identically distributed (i.i.d.) locations of the nodes
on the lines. In step (a), L denotes an arbitrarily chosen line that intersects the disc b(o, un ). We
will now derive the expression for each term in (38). For the case 0 ≤ un < yn , we know that
the number of lines intersecting the disc b(o, un ) follows a binomial distribution. Therefore,
n − 1 u j
un n−1−j
n
1−
P Nl b(o, un ) = j|Yn =
.
(39)
yn
yn
j
We will now evaluate the probability that there are no nodes on the segment of an arbitrarily
chosen line L that intersects the disc b(o, un ). We denote the perpendicular distance of the line
from the origin by Z which is uniformly distributed in the range (0, un ) for the first case.
Conditioned on Z, the probability that there are no nodes on the segment that intersects b(o, un )
is given by
p
P Nv L ∩ b(o, un ) = 0|Z, Yn = exp − λv 2 u2n − z 2 .
This result follows from the void probability of 1D-PPP. By taking the expectation over Z, we
now obtain the probability that there are no nodes on the segment of a randomly chosen line
that intersects the disc b(o, un ) as
Z
P Nv L ∩ b(o, un ) = 0|Yn =
un
p
1
dz.
(40)
exp − λv 2 u2n − z 2
un
0
Similarly, for the second case where yn ≤ un < ∞, the distances of the lines that intersect
the disc b(0, un ) are uniformly distributed in the range (0, yn ). Therefore, the desired probability
in this case is given by
Z
P Nv L ∩ b(o, un ) = 0|Yn =
yn
p
1
dz.
(41)
exp − λv 2 u2n − z 2
yn
0
Upon substituting (39), (40), and (41) in (38) and simplifying the resulting expression, we
obtain the final result. The PDF of Un can then be computed by taking the derivative of
FUn (un |yn ) with respect to un .
B. Proof of Lemma 5
The CDF of Vn conditioned on Yn is
FVn (vn |yn ) = 1 − P(Vn > vn |Yn ) = 1 − P Nv b(o, vn ) \ b(o, yn ) = 0|Yn
26
∞
nl
X
= 1−
P Nl b(o, vn ) \ b(o, yn ) = nl |Yn P Nv L ∩ {b(o, vn ) \ b(o, yn )} = 0|Yn
,
(a)
nl =0
(42)
where (a) follows from the i.i.d. locations of nodes on the lines. Note that L denotes an arbitrarily
chosen line whose distance from the origin is greater than vn and smaller than yn . From the
definition of PLP, we know that the number of lines whose distances from the origin are in the
range (yn , vn ) follows a Poisson distribution with mean 2πλl (vn − yn ). Thus,
exp − 2πλ (v − y ) 2πλ (v − y )nl
l n
n
l n
n
.
(43)
P Nl b(o, vn ) \ b(o, yn ) = nl |Yn =
nl !
The evaluation of the second term in the equation (42) is similar to that of (40) in the proof of
Lemma 4. The only change is that the distances of the lines in this case are uniformly distributed
in the range (yn , vn ). Hence, the desired probability is obtained as
Z vn
p
P Nv L ∩ {b(o, vn ) \ b(o, yn )} = 0|Yn =
exp − λv 2 vn2 − z 2
1
dz. (44)
(vn − yn )
yn
Substituting (43) and (44) in (42), we obtain the final expression. The conditional PDF of Vn
can then be obtained by taking the derivative of FVn (vn |yn ) w.r.t. vn .
C. Proof of Lemma 10
The conditional PMF of number of lines can be computed as
(a) P En Nl b(o, r) \ b(o, yn ) = k, Yn , R
P Nl b(o, r) \ b(o, yn ) = k En , Yn , R =
P En |Yn , R
× P Nl b(o, r) \ b(o, yn ) = k|Yn , R , (45)
where (a) follows from the application of Bayes’ theorem. We now need to determine each term
in (45) to compute the desired conditional PMF. The first term in the numerator is nothing but
the probability that there are no nodes inside a disc of radius r centered at the origin, given that
there are k lines that are farther than yn and closer than r. In addition to these k lines, there
are n − 1 lines that are closer than yn , one line at a distance of yn , and the typical line that
intersect the disc b(o, r). Therefore, the probability that there are no nodes on any of these lines
that intersect the disc b(o, r) can be computed as follows:
P En Nl b(o, r) \ b(o, yn ) = k, Yn , R
= P Nv b(o, r) = 0 Nl b(o, r) \ b(o, yn ) = k, Yn , R
n−1
Y
= P Nv L0 ∩ b(o, r) = 0|Yn , R
P Nv Li ∩ b(o, r) = 0|Yn , R
i=1
27
k
Y
× P Nv Ln ∩ b(o, r) = 0|Yn , R
P Nv Ln+j ∩ b(o, r) = 0|Yn , R
(46)
j=1
n−1
p
p
dy
2
2
exp − 2λv r2 − yn2
exp(−2λv r − y )
= exp(−2λv r)
yn
0
Z r
k
p
dy
2
2
exp − 2λv r − y
×
.
(r − yn )
yn
Z
yn
(47)
The second term in the numerator in (45) is the probability that there are k lines that are farther
than yn and closer than r. Since both r and yn are fixed, the number of lines that are farther than
yn and closer than r simply follows a Poisson distribution with mean 2πλl (r − yn ). Therefore,
the second term in the numerator is given by
exp − 2πλ (r − y ) 2πλ (r − y )k
l
n
l
n
.
P Nl b(o, r) \ b(o, yn ) = k|Yn , R =
k!
(48)
The denominator in (45) is the probability of occurrence of event En conditioned on both Yn
and R. This is nothing but the probability that there are no nodes inside the disc of radius r.
This can be easily computed using law of total probability as follows:
∞
X
P En |Yn , R =
P En Nl b(o, r) \ b(o, yn ) = k, Yn , R P Nl b(o, r) \ b(o, yn ) = k|Yn , R
k=0
n−1
p
p
dy
exp(−2λv r2 − y 2 )
exp − 2λv r2 − yn2
yn
0
k Z r
k
∞
p
X
dy
2πλl (r − yn )
2
2
exp − 2λv r − y
× exp − 2πλl (r − yn )
k!
(r − yn )
yn
k=0
Z
r
p
p
= exp − 2λv r − 2λv r2 − yn2 − 2πλl
1 − exp − 2λv r2 − y 2 dy
Z
(a)
= exp(−2λv r)
yn
(49)
yn
Z
×
yn
exp(−2λv
0
p
dy
r2 − y 2 )
yn
n−1
,
(50)
where (a) follows from substituting (47) and (48) in (49).
Substituting (47), (48), and (50) in (45), we obtain the final expression.
D. Proof of Lemma 13
We know that there are n − 1 lines (excluding the typical line) closer than Yn whose distances
from the origin are uniformly distributed in the range (0, yn ). The Laplace transform of distribution of interference from an arbitrarily chosen line L, conditioned on its distance from the
origin Y is given by
"
Z
∞
LIL (s|r, yn , En , y) = exp − 2λv √
r2 −y 2
#
s(x2 + y 2 )−α/2 −m
1− 1+
dx .
m
(51)
28
This expression is similar to the result obtained in Lemma 12. The lower limit of the integral
follows from the condition that there must be no nodes closer than r. Now, taking the expectation
over Y which is uniformly distributed in the range (0, yn ), we obtain the conditional Laplace
transform of distribution of interference from a single line as follows:
Z yn
dy
LIL (s|r, yn , En , y)
LIL (s|r, yn , En ) =
yn
Z0 yn "
Z ∞
#
dy
s(x2 + y 2 )−α/2 −m
exp − 2λv √
dx
.
=
1− 1+
m
yn
(52)
r2 −y 2
0
Owing to the i.i.d. locations of nodes on the lines, the conditional Laplace transform of distribution of interference from the nodes on all the n − 1 lines is given by
n−1
LIin (s|r, yn , En ) = LIL (s|r, yn , En )
Z yn "
Z ∞
# !n−1
s(x2 + y 2 )−α/2 −m
dy
=
exp − 2λv √
.
1− 1+
dx
m
yn
(53)
r2 −y 2
0
E. Proof of Lemma 14
We know that the distances of the random number of lines that are farther than yn and closer
than r are uniformly distributed in the range (yn , r). As given in (51), the Laplace transform of
interference from an arbitrarily chosen line L conditioned on the distance of the line from the
origin Y is
"
∞
#
2
2 −α/2 −m
s(x + y )
dx .
1− 1+
√
m
r2 −y 2
Z
LIL (s|r, yn , En , y) = exp − 2λv
Thus, the conditionalZLaplace transform of distribution of interference from a single line is
"
Z ∞
r
#
dy
s(x2 + y 2 )−α/2 −m
.
exp − 2λv √
dx
LIL (s|r, yn , En ) =
1− 1+
m
(r − yn )
r2 −y 2
yn
(54)
Owing to the i.i.d. locations of nodes on the lines, the conditional Laplace transform of interference distribution from all the lines that are farther than Yn and closer than R can be computed
as
∞
i
X
LIann (s|r, yn , En ) =
P Nl b(o, r) \ b(o, yn ) = i LIL (s|r, yn , En )
(55)
i=0
(a)
= exp
"
Z
r
√
exp(−2λv r2 − z 2 )dz
− 2πλl
#
1 − LIL (s|r, yn , En )
,
yn
(56)
where (a) follows from the substitution of the PMF given by Lemma 10 in (55). Substituting
(54) in (56), we obtain the final expression.
29
F. Proof of Lemma 15
Following the same approach as in Lemma 14, we first determine the conditional Laplace
transform of distribution of interference from an arbitrary line L at a distance Y from the origin
as follows:
"
Z
∞
LIL (s|r, yn , En , y) = exp − 2λv
0
#
s(x2 + y 2 )−α/2 −m
dx .
1− 1+
m
(57)
Owing to the independent distribution of nodes on the lines, for a given realization of the line
process, the conditional Laplace transform of interference distribution is simply the product of
the Laplace transform of distribution of interference from each of these lines. Therefore, we
can write the Laplace transform of distribution of interference conditioned on the line process
Φl0 ≡ Φl ∪ L0 as
LIout (s|r, yn , En , Φl0 ) =
Y
LIL (s|r, yn , En , y),
(58)
y∈Ψl0
where Ψl0 represents the set of distances of the lines from the origin, which is a 1D PPP with
density 2πλl as shown in the proof of Lemma 1. By taking the expectation over Ψl0 , we obtain
the desired result as follows:
LIout (s|r, yn , En ) = EΨl0
Y
LIL (s|r, yn , En , y)
y∈Ψl0
(a)
Z
∞
= exp − 2πλl
1 − LIL (s|r, yn , En , y) dy ,
(59)
r
where (a) follows from the PGFL of PPP Ψl0 . We obtain the final expression upon substituting
(57) in (59).
R EFERENCES
[1] H. Hartenstein and L. P. Laberteaux, “A tutorial survey on vehicular ad hoc networks,” IEEE Commun. Magazine, vol. 46,
no. 6, pp. 164–171, Jun. 2008.
[2] S. Biswas, R. Tatchikou, and F. Dion, “Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic
safety,” IEEE Commun. Magazine, vol. 44, no. 1, pp. 74–82, Jan. 2006.
[3] P. Papadimitratos, A. D. L. Fortelle, K. Evenssen, R. Brignolo, and S. Cosenza, “Vehicular communication systems:
Enabling technologies, applications, and future outlook on intelligent transportation,” IEEE Commun. Magazine, vol. 47,
no. 11, pp. 84–95, Nov. 2009.
[4] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and analysis of K-tier downlink heterogeneous
cellular networks,” IEEE Journal on Sel. Areas in Commun, vol. 30, no. 3, pp. 550–560, Apr. 2012.
[5] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans.
on Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011.
[6] J. G. Andrews, A. K. Gupta, and H. S. Dhillon, “A primer on cellular network analysis using stochastic geometry,” arXiv
preprint, Oct. 2016, available online: arxiv.org/abs/1604.03183.
30
[7] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling and analysis of cellular networks using stochastic
geometry: A tutorial,” IEEE Communications Surveys Tutorials, vol. 19, no. 1, pp. 167–203, Firstquarter 2017.
[8] Y. Wang, K. Venugopal, A. F. Molisch, and R. W. Heath Jr., “MmWave vehicle-to-infrastructure communication: Analysis
of urban microcellular networks,” 2017, available online: arxiv.org/abs/1702.08122.
[9] F. Baccelli, M. Klein, M. Lebourges, and S. Zuyev, “Stochastic geometry and architecture of communication networks,”
Telecommunication Systems, vol. 7, no. 1, pp. 209–227, Jun. 1997.
[10] C. Gloaguen, F. Fleischer, H. Schmidt, and V. Schmidt, “Analysis of shortest paths and subscriber line lengths in
telecommunication access networks,” Networks and Spatial Economics, vol. 10, no. 1, pp. 15–47, Mar. 2010.
[11] F. Voss, C. Gloaguen, F. Fleischer, and V. Schmidt, “Distributional properties of Euclidean distances in wireless networks
involving road systems,” IEEE Journal on Sel. Areas in Commun., vol. 27, no. 7, pp. 1047–1055, Sep. 2009.
[12] F. Morlot, “A population model based on a Poisson line tessellation,” in Proc., Modeling and Optimization in Mobile, Ad
Hoc and Wireless Networks, May 2012, pp. 337–342.
[13] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications. John Wiley & Sons, 2013.
[14] M. Haenggi, Stochastic Geometry for Wireless Networks.
Cambridge University Press, 2013.
[15] B. Blaszczyszyn, P. Muhlethaler, and Y. Toor, “Maximizing throughput of linear vehicular Ad-hoc NETworks (VANETs)
– a stochastic approach,” in European Wireless Conf., May 2009, pp. 32–36.
[16] S. Busanelli, G. Ferrari, and R. Gruppini, “Performance analysis of broadcast protocols in VANETs with Poisson vehicle
distribution,” in Intl. Conf. on ITS Telecommunications, Aug 2011, pp. 133–138.
[17] M. J. Farooq, H. ElSawy, and M. S. Alouini, “A stochastic geometry model for multi-hop highway vehicular communication,” IEEE Trans. on Wireless Commun., vol. 15, no. 3, pp. 2276–2291, Mar. 2016.
[18] M. Mabiala, A. Busson, and V. Veque, “Inside VANET: Hybrid network dimensioning and routing protocol comparison,”
in Proc., IEEE Veh. Technology Conf., Apr. 2007, pp. 227–232.
[19] M. Ni, M. Hu, Z. Wang, and Z. Zhong, “Packet reception probability of VANETs in urban intersecton scenario,” in Intl.
Conf. on Connected Vehicles and Expo, Oct. 2015, pp. 124–125.
[20] E. Steinmetz, M. Wildemeersch, T. Q. S. Quek, and H. Wymeersch, “A stochastic geometry model for vehicular
communication near intersections,” in Proc., IEEE Globecom Workshops, Dec. 2015, pp. 1–6.
[21] C. Gloaguen, F. Fleischer, H. Schmidt, and V. Schmidt, “Simulation of typical Cox Voronoi cells with a special regard to
implementation tests,” Mathematical Methods of Operations Research, vol. 62, no. 3, pp. 357–373, 2005.
[22] B. Blaszczyszyn and P. Muhlethaler, “Random linear multihop relaying in a general field of interferers using spatial Aloha,”
IEEE Trans. on Wireless Commun., vol. 14, no. 7, pp. 3700–3714, Jul. 2015.
[23] S. Aditya, H. S. Dhillon, A. F. Molisch, and H. Behairy, “Asymptotic blind-spot analysis of localization networks under
correlated blocking using a Poisson line process,” IEEE Wireless Commun. Letters, to appear.
[24] R. Schneider and W. Weil, Stochastic and Integral Geometry.
Springer Berlin Heidelberg, 2008.
[25] A. Leon-Garcia, Probability, Statistics, and Random Processes For Electrical Engineering.
Pearson Education, 2011.
[26] V. V. Chetlur and H. S. Dhillon, “Downlink coverage analysis for a finite 3D wireless network of unmanned aerial vehicles,”
IEEE Trans. on Commun., to appear.
[27] R. Tanbourgi, H. S. Dhillon, J. G. Andrews, and F. K. Jondral, “Dual-branch MRC receivers under spatial interference
correlation and Nakagami fading,” IEEE Trans. on Commun., vol. 62, no. 6, pp. 1830–1844, Jun. 2014.
[28] Y. J. Chun, S. L. Cotton, H. S. Dhillon, A. Ghrayeb, and M. O. Hasna, “A stochastic geometric analysis of device-todevice communications operating over generalized fading channels,” IEEE Trans. on Wireless Commun., vol. 16, no. 7,
pp. 4151–4165, Jul. 2017.
[29] C. Gloaguen, F. Fleischer, H. Schmidt, and V. Schmidt, “Fitting of stochastic telecommunication network models via
distance measures and Monte–Carlo tests,” Telecommunication Systems, vol. 31, no. 4, pp. 353–377, Apr. 2006.
| 7cs.IT
|
ACO Implementation for Sequence Alignment
with Genetic Algorithms
Aaron Lee
[email protected]
Livia King
[email protected]
December 1, 2002
Abstract
In this paper, we implement Ant Colony Optimization (ACO) for sequence alignment. ACO is a meta-heuristic recently
developed for nearest neighbor approximations in large, NP-hard search spaces. Here we use a genetic algorithm approach
to evolve the best parameters for an ACO designed to align two sequences. We then used the best parameters found to
interpolate approximate optimal parameters for a given string length within a range. The basis of our comparison is the
alignment given by the Needleman-Wunsch algorithm. We found that ACO can indeed be applied to sequence alignment.
While it is computationally expensive compared to other equivalent algorithms, it is a promising algorithm that can be readily
applied to a variety of other biological problems.
Motivation
found, the ants would start to wander back along the path
that they had traversed to the ant colony. Because the ant
who came back first with food would double the pheromone
on the trail, the next ant to leave the ant colony in search of
food who have a higher chance to take that path because ants
will tend to follow trails that have the highest pheromone
concentration [1].
In nature, it was found that this often led to suboptimal
solutions. The decay of the pheromone was occasionally not
fast enough to cause the ants to seek other solutions; hence,
there was a slight propensity to follow the path of the ant
that returned back to the ant colony first. In other words,
there was too much of a weight on the ant that reached the
first food source, because the first food source found was not
necessarily the closest food source globally.
In computers, this limitation was easily avoided by adding
a pheromone evaporation effect where the ants’ pheromones
would decrease in concentration as time progressed, preventing the early convergence onto local minimums [5].
Ant colony optimization (ACO) is a novel algorithm recently developed for nearest neighbor approximations in
large, NP-hard search spaces [1]. The algorithm itself is more
accurately described as a meta-heuristic that must be applied
differently to different problems. ACOs have been applied
successfully to both the Traveling Salesman Problem (TSP)
[2] and the Quadratic Assignment Problem (QAP) [3].
More recently, better methods of attaining optimal values for ACOs have been developed. In 1998, Bottee et al.
used genetic algorithms on top of ACOs to achieve locally
optimal values for ACOs very quickly [4].
As far as we have been able to tell, the ACO algorithm has
not yet been applied to biological problems. Most biological problems today face the same difficulty as other NP-hard
computational problems. The ACO algorithm seems particularly well-suited for these kinds of applications.
We propose using ant colony optimization with genetic
algorithms and applying the resulting ACO to two sequence
alignment.
Critical Review
Introduction
Dorigo, Caro, and Gambardella outlined in their 1999 paper
the basic characteristics of the ant algorithm and reported
on some of the uses for which it has been tested. They
list the ant algorithm as deriving many of its characteristics
from real ant colonies. For example, artificial ants, like real
ants, are part of a colony of cooperating individuals, and use
pheromones to facilitate indirect communication between
Ant Colony Optimization is a meta-heuristic that was developed after studying the behavior of ants and learning how
ants were able to solve constraint optimization problems in
nature. It was found that ants laid down pheromone trails
as they traversed the ground. As soon as a food source was
1
themselves and other ants. Although each of the individuals in a population is simple and not capable of deriving a
good solution to a problem, the population as a whole can
come up with a good solution, concept that is now known
as swarm intelligence. Both real ants and artificial ants make
decisions using local information.
Unlike real ants, however, artificial ants have some abilities that allow them to derive higher quality solutions than
their natural counterparts. Artificial ants can keep a memory of past actions. Their methods of pheromone depositing are also different. They may deposit varying amounts of
pheromones based on the quality of the solution found and
might deposit pheromones after the generation of a complete solution rather than step by step. Other abilities like
the ability to look ahead several steps, or to backtrack, can
also be added to artificial ants.
The first problem ant algorithms were applied to was the
traveling salesman problem (TSP), a commonly researched
NP hard problem in which a theoretical salesman has to
find the shortest path connecting n cities. Three algorithms based on the ACO meta-heuristic were defined, and
the ”ant-cycle” algorithm (later called Ant System, or AS),
a variation in which the ants deposited pheromone after
they finished constructing their solution was found to be
the most effective. The ant algorithm performed as well as
several other general purpose heuristics on relatively small
problems (involving 30 to 75 cities). However, the ant algorithm was not able to come up with the best known solution when it was applied to larger problems, although it was
able to find good solutions quickly. Later variations on the
AS algorithm, most notably ant colony systems (ACS), were
more successful and beat many other heuristics in terms of
solution quality and CPU time when run on standard TSP
problems.
ACO was next applied to the Quadratic Assignment
problem, which involves assigning n facilities to n locations
so as to minimize cost. In this case, the ACO algorithms
tested are the best available heuristic. ACO has also been
shown to be the best available heuristic by far in the sequential ordering problem. Other problems to which ACO has
been applied include Job shop scheduling, vehicle routing,
graph coloring, shortest common supersequence, connection oriented network routing, and connection-less network
routing.
From the results listed by Dorigo et. al, it can be seen that
ACO is a valid approach that has been successful for many
problems. However, there are some limitations to ACO’s
potential. First, because of the ant algorithm’s random nature, the success of ant algorithms very problem dependent
and it is hard to predict what variations on the algorithm
will be successful without actually implementing the algorithm and testing it. There are also limitations as to which
problems can be solved with ACO. The problem must lend
itself to being represented by ants traveling across a virtual
space. Each state available to the ant must also not have
many neighbor states, as too many neighbor states will minimize the chance of two ants appearing in the same state,
and render the pheromone communication worthless.
Design
ACO
We closely modeled our approach after Bottee and
Bonabeau’s algorithm for solving the traveling salesman
problem.
A sequence alignment between two sequences n and m
bases long is represented by a n x m Needleman-wunsch
scoring matrix. At the beginning of every generation, a set
number of ants start at the bottom right corner (which represents the end of an alignment) of the matrix, and traverse
the matrix until they reach the beginning of the alignment
(when the ant reaches either the top or left edge of the matrix). From any given position, an ant can move in one of
three directions: up, left, or diagonally up-left. As is the case
with the Needleman-Wunsch algorithm, a move in the former two directions represents a gap in one of the strands,
while a diagonal move is either a match or a mismatch.
At every step, the ants use a scoring algorithm to decide
what direction to move in. Every direction (up, left, or diagonal) is assigned a score based on the following formula:
Wφ
φi
· M Wm · R Wr
Where φi is the pheromones level for step i in a particular direction, M has a value of 2 if going in that direction
will result in a match and 1 if it results in a mismatch, R is
the regional weighting score that encourages ants to move
toward the diagonal of the matrix, and Wφ , Wm , and Wr
are the weights assigned to those values. The ant chooses a
number pi . If pi is greater than the parameter p, then the ant
simply moves in the direction with the highest score. If pi
is less than p, the ant chooses the direction using a weighted
probability based on the scores.
After each ant moves, it leaves a pheromone trail according to the formula.
φi+1 = (φi + φstep ) · ql
Where φi is the old pheromone level, phii+1 is the new
pheromone level, and ql is a number between 0 and 1 that
represents the local decay of pheromones.
As each ant moves, it also scores its path using a
Needleman-Wunsch like scoring scheme that adds points for
matches and subtracts points for mismatches and gaps. At
the end of each generation, the best path is reinforced according to the formula.
φi+1 = (φi + φstep · (Sg /Sh )
2
Variable
g
a
φ0
φstep
Wφ
Wm
Wr
ql
qg
p
Range
10 - 40
5 - 30
0-1
0-1
0 - 10
0 - 10
0 - 10
0-1
0-1
0-1
In calculating the output of the ACO given a set of parameters, we first showed empirically that the distribution
of scores followed a normal distribution. This allowed us to
easily throw out the data points that were outside x ± σ and
calculate a corrected mean (x corr ) during the evolution of the
parameters. This prevents random extreme values from affecting the mean and is a valid procedure after verifying that
the output from the ACO is normally distributed. We also
measured the total time to run all the trials of for each parameter (ttrials ). Using these two variables we can assign a
score to each parameter (Pi ) 1 :
Score(Pi ) =
Table 1: Variables optimized for in the genetic algorithm.
x corr (i)3
ttrials (i)
(1)
Using this scoring function, we were able to make a relative ranking of the current population of the highest scoring
parameters. We then kept the top 1% of the population
as “parents.” The next generation was then generated using
various parents and copy mutations (see Appendix to see the
actual implementation of the genetic algorithm).
Several runs for each string length was preformed, in
hopes of finding a set of parameters that came up often
which would represent a locally optimal solution. After the
best parameters for each of the strings were found, we can
interpolate and approximate the best set of parameters for
any string length up to a length of 100 characters.
where Sg is the score of the best path of this generation, and
Sh is the best score obtained so far overall. The entire matrix
also undergoes a global decay:
φi+1 = φi · qg
where qg is the global decay parameter.
The simulation keeps on looping through generations until the score for the best alignment converges, or until the
maximum number of generations is reached.
Genetic Algorithm
Results
The motivation for using a genetic algorithm is simple: all
the parameters above can be approximately determined using a genetic algorithm which evolves for the best set of parameters. Since hand-tweaking of ACO parameters can be a
futile exercise and often a waste of time, genetic algorithms
provide a convenient alternative albeit it may sometimes be
inaccurate. We used a very simple implementation of genetic algorithms to quickly find a set of parameters that were
locally optimal at discrete steps of search string length.
At the beginning of every generation, two strings are randomly generated. The first string is the template string
which is simply a random string filled with four possible
values (0, 1, 2, 3) at every given position. The second string
is generated by performing approximately 33% to 66% random mutations of the template string. This includes insertions of a random value, deletion at a given position, and a
point mutation of changing one value to another value at a
given point in the string. This generation process hopefully
produces two strings that are mostly similar but at the same
time contain significant differences in their sequences.
Using a fixed string length size for the two similar strings
that will be aligned, we evolved a best set of parameters.
Table 1 shows the variables and their possible range. We then
used a series of string lengths (10, 20, 30, 40, 50, 60, 70, 80,
90, 100) and attempted to evolve the best set of parameters
for each of these parameters.
Ant Colony Optimization Results
Using the same string generators for the genetic algorithm,
a string length of 50 was set. Then a random set of parameters were chosen. Afterwards, the ACO was run with these
parameters and the chosen strings for 100 repetitions. The
outputting scores were then gathered and compiled into a
histogram. This process was repeated several times. Figure
1 shows one such histogram. All of the outputs from the
ACOs followed a similar distribution to the one shown in
Figure 1.
Hence we were able to conclude that to a first order approximation, we can expect the ACO output to be normally
distributed. Given that the distribution is normal, we use
this knowledge to save time during the genetic algorithm
run and to make a good approximation of the mean score
given by a set of parameters as was shown above.
Genetic Algorithm Results
We explored the range of 10 - 100 characters for the string
length. Our genetic algorithm probed this string length
1 It was found that if x
corr is not more emphasized than time, then the
GA will start sacrificing score for faster and faster times. This is an undesirable result; raising to the third power provided better results.
3
range by attempting to find the best set of parameters in
10 character increments: we ran a separate genetic algorithm
for the string lengths 10, 20, 30, 40, 50, 60, 70, 80, 90,
and 100 characters. Each of these string lengths were run
multiple times with a population of 500 parameter sets, and
the genetic algorithm was stopped after the population had
reached an equilibrium for about 10 generations.
Figure 2 and Figure 3 show the trends for each of the variables.2 It is clear from these trends that most of the variables
follow a linear trend. The only exceptions are g and a which
both seem to require a lower limit and then proceed to grow
starting at 80 string length. (There is not enough data to
support what kind of growth the trend follows.) All other
variables increase linearly, decrease linearly, or remain constant.
Using these variables we were able to interpolate values
for any string length between 10 to 100. Using this system of
approximation, we were able to design an optimized form of
the ACO implementation that first calculated approximate
optimal values for the parameter set and then runs the ACO
on the input strings.
14
12
10
+
+
+|
+|
|
|
|
|
+
+
+
+
8
|
+
×|
+
×
|
6
|
×
×
×
×
×
×
×
×
4
2
0
0
20
40
60
80
100
String Length
Figure 2: This figure shows the trends for the variables in
the range of 0 to 15.
represents g. × represents a. +
|
represents Wφ . represents Wm . represents Wr .
provided a sanity check to make sure that the our algorithm
did indeed provide a satisfactory alignment.
In testing unalignable pairs of sequences, we choose sequences that were reversed of each other and no character
appears twice in these sequences. Type II alignments provide a test to see how the ACO deals with pairs of sequences
that it had not evolved to handle.
In order to test Type III, we generate a pair of sequences
in the similar manner as we did during the evolutions of the
parameters for genetic algorithms. Theoretically, it is these
sequences that should provide the most interesting alignments.
Table 2 shows an example alignment for each one of these
categories. There is not an objective measurement that
would provide a quantitative degree of similarity between
the alignments, hence we only provide a representative alignment of each of the categories instead.
Optimized ACO Results
Using the parameter set given above, we modified our ACO
implementation to use the parameter table and interpolate approximately optimal parameters for a given input
string (See Appendix A for the actual implementation). We
provide here some of the sample alignments outputted by
our implementation and compare them to the NeedlemanWunsch sequence alignment.
We divide the category of pairs of sequences into one of
three types: highly similar (Type I), unalignable (Type II),
and in between (Type III). This provides a qualitative basis
for comparison between the Needleman-Wunsch and our
ACO implementation.
To test highly similar pairs of sequences, we choose sequences that were nearly the same. Thus Type I alignments
2 Note: variables with similar ranges were grouped together to save
space.
Type
I
60
50
40
30
II
III
20
10
0
ACO
Needleman-Wunsch
abcdefgggghijklmnopq
|||||||
||||||||||
abcdefg---hijklmnopq
qpo-nmlkjihgfedcba
|
-abcdefghijklmnopq
-CACTTTTTCAGATCTATTG
|||||||||||| ||||
CTACTTTTTCAGATATATTC
abcdefgggghijklmnopq
|||||||
||||||||||
abcdefg---hijklmnopq
qponmlkjihgfedcba
|
abcdefghijklmnopq
C-ACTTTTTCAGATCTATTG
| |||||||||||| ||||
CTACTTTTTCAGATATATTC
Table 2: Sample alignments from both ACO and
Needleman-Wunsch. Type I are pairs of sequences that are
highly similar. Type II are pairs of sequences that are unalignable. Finally, Type III are pairs of sequences that are
somewhere in between.
45 47 49 51 53 55 57 59 61 63 65 67 69 71
Figure 1: A histogram of output of one ACO run with same
set of parameters for a 100 runs.
4
+
1.0
|
+
0.8
|
+
|
+
|
+
|
|
|
|
|
|
250
+
+
+
+
0.6
+
+
0.4
×
×
×
×
×
×
200
150
×
×
300
×
×
100
50
0.2
0
0
0
20
40
60
80
100
−50
String Length
++ + +
+++++ + +
+ +
++ ++ +++++++ ++++++
+++++++ + +
+++++++
+++ ++++++++++
+
+
+
+
+
+
+
+
+
+
+
+
+ +
+++++ +
+++++++++++++++++++++
++ +++ +++
++++++++++ +++
++++ ++++++++++ +
+
+
+
+
+
+
+
+ ++ +++++++++++++++++++++++++++++++++++++++
+
+ ++++++++
++++
+++++++++++++
++++++++
+++
+
+++++++++
++++
+++++++++
+++++
+++++++ +
++++++++++++++++
++++++++++
++++++
++++++++++++
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ +++++++++++++++++++
++++++++++++++++++++
++++++
+++
++++
+++++++++++++++
+++
+++++++ ++ ++
++++
+++
+++++
+++++
++
++
+++++
+++++++++ ++++++++++
+++
+++
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
++
+
+
+
+
+
++++ ++ + ++
+
+++++++++
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
++
+++++++++++++++++++ ++ ++ + + + ++
++
+
+++
+++++++++
+++
++++++ ++++++
+
+
+
+
+
+
+
+
+
+
+
+
+
+ +
++++
++++ + +
+
+++++++
+ ++
+++++
++
+++++++ + +++
++
++++++++ + + + ++ +++
++++++++++++
+
+
+
+
+
+
+
+
++ + + +
+
+
50
100
150
200
250
300
350
Figure 4: This is a scatter plot of scores from
both Needleman-Wunsch and ACO. The x-axis is the
Needleman-Wunsch scores, and the y-axis is the ACO
scores.
Figure 3: This figure shows the trends for the variables in
the range of 0 to 1. + represents φ0 . × represents φstep .
represents qg . represents qg . | represents p.
Some problems and sources of error were encountered
during the course of experimental runs of our implementation. We realize that there is an error in our genetic algorithm in that we should have optimized for high scoring consistency and low run time instead of optimizing for
high average score and low run time. This produced parameter sets for the ACO that were suboptimal for the problem
that we were addressing. Due to the time constraint of the
project, we were not able to fix this issue in time for the
deadline.
Also, the higher string lengths such as the 90 and 100
case were based on data that was not completely reliable in
that we did not have enough time to run the genetic algorithm multiple times with many generations due to the
highly computationally expensive nature of this algorithm.
This produced possibly suboptimal parameter sets for these
string lengths and hence cannot be as well trusted as the parameter sets generated for the lower part of the string length
range.
Finally, we realize that genetic algorithms have the danger
of producing suboptimal results, but we are confident in the
results we have obtained because multiple runs of the genetic
algorithm for a given string length gave results that were very
similar to each other, an indication that the parameter sets
generated were indeed near the global optimum.
A few improvements could be made to the ACO implementation for sequence alignment as well. The way that
it is currently implemented, there is a limitation in the accuracy of the outputted alignments. The ants crawling up
from the bottom right of the scoring matrix to the upper left
cause alignments to be very accurate at the beginning of the
traversal but not at the end of the alignment since the paths
of the ants will diverge towards the end. This limitation can
be easily overcome by adding an additional feature of having
Discussion
Analysis
At first glance, Table 2 provides some very promising results.
It shows that the ACO actually preforms at a level of reaching nearly the mathematically optimal solution. In Type I,
the alignments are exactly the same. For Type II, the ACO
alignment is suboptimal compared with the NeedlemanWunsch because there is an extra gap that is not necessary.
For Type III, the alignment is again nearly optimal: the main
difference comes at the beginning of the alignment where
the ACO could have made an extra match. It is interesting
to note that on several other alignments, the main difference between ACO and Needleman-Wunsch comes at the
beginning, a matter that we will address later.
Hence even from a completely qualitative standpoint, it
can be said that the ACO does provide satisfactory results.
While it can not be considered to be faster or more efficient
than Needleman-Wunsch, it can, nevertheless, be applied to
sequence alignment.
Conclusion
As the results of the optimized ACO runs have shown, the
ACO algorithm is a powerful algorithm that can be readily
applied to sequence alignment. While it is true that this particular implementation of the ACO with respect to sequence
alignment is not algorithmically faster or more efficient than
the Needleman-Wunsch dynamic programming equivalent,
the purpose of this paper was to show that the ACO is a
viable algorithm that can be used to solve computational biology problems perhaps more efficiently when searching an
NP hard search space.
5
non-scoring ants dropped in random places on the scoring
matrix. This way, areas around where the ants were dropped
will have better alignment paths for when the scoring ants
which started in the lower left corner reached the paths that
were reinforced by the non-scoring ants. If local alignment
is desired, then the random ants can be simply considered
to be scoring.
In conclusion, we found that the ACO algorithm is an
algorithm that can be used to solve biological problems.
While in this case, it is not necessarily better than the existing algorithm for two sequence alignment; we are confident that the ACO can be readily adapted for much more
complicated problems such as Multi-Sequence Alignment
(MSA). In this case, the search space is much larger and the
Needleman-Wunsch algorithm is out of the question; hence,
a good adaption of the ACO meta-heuristic might provide
a solution that rivals even the fastest MSA implementation
today. Additional applications of ACO to biological problems could be such problems as clustering or even an ACO
adapted algorithm for protein folding.
Contributions
Thanks to Qian Zhang for his suggestions on ways of improving our algorithm. To Charles Duan for helping us with
LATEX. To the Harvard NICE computing environment. To
our TF, Jon Radoff for answering our never-ending questions. And to Professor Church for his instruction of this
class.
References
[1] Dorigo, M. and Gambardella, L.M. (1997). Ant Colony System: A Cooperative Learning Approach to the Traveling Salesman Problem. IEEE Trans. Evol. Comp. 1, 53-66.
[2] Lawler, E.L., Lenstra, J.K., Rinnooy-Kan, A.H.G., and
Shmoys, D.B. (eds) (1985). The Travelling Salesman Problem.
New York, NY: Wiley.
[3] Gambardella, L.M., Taillard, E.D. and Dorigo, M. (1998). Ant
Colonies for the QAP J. Operational Res. Soc. 1998. (in press).
[4] Bottee, H. and Bonabeau, E. (1998). Evolving Ant Colony Optimization Adv. Complex Systems 1998. 1, 149-159
[5] Colorni, A., Dorigo, M., Maniezzo, V. and Trubian, M. (1993).
Ant system for job-shop scheduling. Belg. J. Oper. Res., Stat.
and Comput. Sci. 34, 39-53.
6
Appendix
A ACO Implementation
1
2
3
4
#!/usr/local/bin/perl
use strict;
# Ant.pl
# Authors: Li-Wei King, Aaron Lee
5
6
7
8
9
10
11
12
13
14
15
16
17
18
###################################
# Default values just in case something goes terribly wrong
my $NUM_ANTS
= 10;
my $MAX_GEN
= 50;
my $PHER_STEP
= .1;
my $PHER_WEIGHT = .1;
my $MATCH_WEIGHT = .1;
my $REGION_WEIGHT = .00001;
my $PROB_PROB
= .5;
# Must be between 0 and 1. It is the probability
#
that the direction will be chosen based on probability.
my $INIT_PHER = .01;
# The amount of pheremone that an untraveled path has.
my $L_DECAY = .7;
# Local decay. Cannot be larger than 1.
my $G_DECAY = .7;
# Global decay. Cannot be larger than 1.
19
20
21
22
23
# Constants that won’t eventually be passed to the program.
use constant MATCH_BONUS => 5;
use constant GAP_PENALTY => -4;
use constant MISMATCH_PENALTY => -3;
24
25
26
27
28
29
30
31
############
# Useful abbreviations
#For encoding the direction an ant moves
use constant D => 0;
use constant L => 1;
use constant U => 2;
use constant N => -1;
# Undefined direction
32
33
34
35
36
37
# The index at which certain information is stored in the $ants array
use constant X_INDEX => 0;
use constant Y_INDEX => 1;
use constant DIR_INDEX => 2;
# Where the ant decides to move from that position
use constant SCORE_INDEX => 3; # The current score at that position
38
39
40
41
42
43
44
45
###########
# Table of GA optimized
my @GA_TABLE;
$GA_TABLE[10][0] = 10;
$GA_TABLE[40][0] = 10;
$GA_TABLE[70][0] = 10;
$GA_TABLE[100][0] = 15;
values
$GA_TABLE[20][0]
$GA_TABLE[50][0]
$GA_TABLE[80][0]
= 10; $GA_TABLE[30][0]
= 10; $GA_TABLE[60][0]
= 10; $GA_TABLE[90][0]
= 10;
= 10;
= 12;
46
47
48
49
50
$GA_TABLE[10][1]
$GA_TABLE[40][1]
$GA_TABLE[70][1]
$GA_TABLE[100][1]
=
=
=
=
5; $GA_TABLE[20][1]
5; $GA_TABLE[50][1]
5; $GA_TABLE[80][1]
10;
= 5; $GA_TABLE[30][1]
= 5; $GA_TABLE[60][1]
= 5; $GA_TABLE[90][1]
= 5;
= 5;
= 8;
$GA_TABLE[10][2]
$GA_TABLE[30][2]
$GA_TABLE[50][2]
$GA_TABLE[70][2]
$GA_TABLE[90][2]
=
=
=
=
=
.411191490;
.453581583;
.432201854;
.417636990;
.341437549;
$GA_TABLE[20][2]
$GA_TABLE[40][2]
$GA_TABLE[60][2]
$GA_TABLE[80][2]
$GA_TABLE[100][2]
=
=
=
=
=
.438349294;
.517059770;
.436950953;
.366514982;
.329430526;
$GA_TABLE[10][3]
$GA_TABLE[30][3]
$GA_TABLE[50][3]
$GA_TABLE[70][3]
$GA_TABLE[90][3]
=
=
=
=
=
9.434392207;
9.353249096;
9.290221874;
9.149204714;
9.332940631;
$GA_TABLE[20][3]
$GA_TABLE[40][3]
$GA_TABLE[60][3]
$GA_TABLE[80][3]
$GA_TABLE[100][3]
=
=
=
=
=
9.423857194;
9.284172996;
9.282690356;
9.064648465;
9.259328124;
$GA_TABLE[10][4]
$GA_TABLE[30][4]
$GA_TABLE[50][4]
$GA_TABLE[70][4]
$GA_TABLE[90][4]
=
=
=
=
=
6.109820365;
9.343075608;
10;
10;
10;
$GA_TABLE[20][4]
$GA_TABLE[40][4]
$GA_TABLE[60][4]
$GA_TABLE[80][4]
$GA_TABLE[100][4]
=
=
=
=
=
6.926580738;
9.244311660;
10;
10;
10;
$GA_TABLE[10][5]
$GA_TABLE[30][5]
$GA_TABLE[50][5]
$GA_TABLE[70][5]
=
=
=
=
3.909960135;
2.224402772;
2.142958734;
1.736982155;
$GA_TABLE[20][5]
$GA_TABLE[40][5]
$GA_TABLE[60][5]
$GA_TABLE[80][5]
=
=
=
=
2.350289525;
1.853908945;
1.915834968;
1.878705913;
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
7
74
$GA_TABLE[90][5]
= 1.856936304; $GA_TABLE[100][5] = 1.862138526;
$GA_TABLE[10][6]
$GA_TABLE[30][6]
$GA_TABLE[50][6]
$GA_TABLE[70][6]
$GA_TABLE[90][6]
=
=
=
=
=
0.853763237;
0.827315180;
0.798933405;
0.730894471;
0.622498305;
$GA_TABLE[20][6]
$GA_TABLE[40][6]
$GA_TABLE[60][6]
$GA_TABLE[80][6]
$GA_TABLE[100][6]
=
=
=
=
=
0.830586273;
0.827352487;
0.728488635;
0.620157623;
0.628942392;
$GA_TABLE[10][7]
$GA_TABLE[30][7]
$GA_TABLE[50][7]
$GA_TABLE[70][7]
$GA_TABLE[90][7]
=
=
=
=
=
0.660878498;
0.606102419;
0.571805707;
0.579124731;
0.519128179;
$GA_TABLE[20][7]
$GA_TABLE[40][7]
$GA_TABLE[60][7]
$GA_TABLE[80][7]
$GA_TABLE[100][7]
=
=
=
=
=
0.635274652;
0.595236898;
0.577967010;
0.532124853;
0.515925041;
$GA_TABLE[10][8]
$GA_TABLE[30][8]
$GA_TABLE[50][8]
$GA_TABLE[70][8]
$GA_TABLE[90][8]
=
=
=
=
=
0.917907684;
1;
1;
1;
1;
$GA_TABLE[20][8]
$GA_TABLE[40][8]
$GA_TABLE[60][8]
$GA_TABLE[80][8]
$GA_TABLE[100][8]
=
=
=
=
=
1;
0.965550166;
1;
1;
1;
$GA_TABLE[10][9]
$GA_TABLE[30][9]
$GA_TABLE[50][9]
$GA_TABLE[70][9]
$GA_TABLE[90][9]
=
=
=
=
=
0.990544051;
1;
1;
1;
1;
$GA_TABLE[20][9]
$GA_TABLE[40][9]
$GA_TABLE[60][9]
$GA_TABLE[80][9]
$GA_TABLE[100][9]
=
=
=
=
=
1;
1;
1;
1;
1;
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
####################################
if ($#ARGV != 1) {
print "Usage: \n";
print "
ant.pl <SEG1> <SEG2>\n";
exit;
}
107
108
109
my $SEG1 = $ARGV[0];
my $SEG2 = $ARGV[1];
110
111
112
113
114
115
116
my $strlenavg = length($SEG1) + length($SEG2) / 2;
if ($strlenavg < 10 || $strlenavg > 100) {
print "The string lengths of SEG1 and SEG2 must have an average string
length betweeen 10 and 100!\n";
exit;
}
117
118
optimize_vars_run_aco($SEG1, $SEG2, $strlenavg);
119
120
121
122
123
124
125
126
127
sub optimize_vars_run_aco {
my $str1 = shift;
my $str2 = shift;
my $len = shift;
my @opt;
my $lowten = (int $len / 10) * 10;
my $highten = (int $len / 10) * 10 + 10;
my $wherex = $len - $lowten;
128
for (my $i = 0; $i <= 9; $i++) {
push(@opt, $wherex * ($GA_TABLE[$highten][$i]-$GA_TABLE[$lowten][$i])/10 + $GA_TABLE[$lowten][$i]);
}
129
130
131
132
run_aco($str1, $str2, $opt[0], $opt[1], $opt[2], $opt[3], $opt[4], $opt[5],
$opt[6], $opt[7], $opt[8], $opt[9]);
133
134
135
}
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
sub run_aco {
# Arguments to the array
my $seq1 = shift;
my $seq2 = shift;
my $MAX_GEN = shift;
my $NUM_ANTS = shift;
my $PHER_STEP = shift;
my $PHER_WEIGHT = shift;
my $MATCH_WEIGHT = shift;
my $REGION_WEIGHT = shift;
my $INIT_PHER = shift;
my $L_DECAY = shift;
my $G_DECAY = shift;
my $prob_prob = shift;
151
152
153
#Other variables
my $high_score;
8
154
155
156
157
158
my
my
my
my
my
@best_path_x;
@best_path_y;
@best_path_dir;
$prev_score = 0;
# Used to figure out if there are repeats or not
$repeat_counter = 0;
159
160
print "Aligning: $seq1 with $seq2\n";
161
162
163
164
# Store the sequences in arrays
my @seqy = split(’’, $seq1);
my @seqx = split(’’, $seq2);
165
166
167
168
169
170
171
172
173
174
175
my @pher;
# Stores the pheremone values
# begin matrix initialization.
for (my $i = 0; $i <= $#seqy; $i++) {
for (my $j = 0; $j <= $#seqx; $j++) {
$pher[$i][$j][D] = $INIT_PHER;
$pher[$i][$j][L] = $INIT_PHER;
$pher[$i][$j][U] = $INIT_PHER;
}
}
176
177
178
179
180
# begin main generation loop
for (my $gen = 0; $gen < $MAX_GEN; $gen++) {
my %done = ();
# This hash stores a 1 if the ant is finished, 0 if it isn’t
my @ants = ();
# Stores the information for all the ants
181
182
183
184
185
186
187
188
189
190
191
192
193
194
# reinitialize ants. The ant array is organized thus:
# $ants[ant_id][move_number][information for that move]
for (my $ant = 0; $ant < $NUM_ANTS; $ant++) {
$ants[$ant][0][X_INDEX] = $#seqx;
$ants[$ant][0][Y_INDEX] = $#seqy;
$done{$ant} = 0;
if ($seqx[$#seqx] eq $seqy[$#seqy]) {
#$ants[$ant][0][SCORE_INDEX] = MATCH_BONUS;
$ants[$ant][0][SCORE_INDEX] = 0;
} else {
$ants[$ant][0][SCORE_INDEX] = 0;
}
}
195
196
197
my $ants_done = 0;
for (my $step = 0; $ants_done < $NUM_ANTS; $step++) {
198
199
200
# simulate the ants:
for (my $ant = 0; $ant < $NUM_ANTS; $ant++) {
201
202
203
204
205
#If the ant is done, then skip it.
if ($done{$ant} == 1) {
next;
}
206
207
208
209
# pick up where we left off:
my $ant_x = $ants[$ant][$step][X_INDEX];
my $ant_y = $ants[$ant][$step][Y_INDEX];
210
211
212
213
214
215
# get the direction that the ant should take, and update
# the direction index
my $dir = get_dir($ant_x, $ant_y,\@pher, $PHER_WEIGHT, $MATCH_WEIGHT,
$REGION_WEIGHT, $prob_prob, \@seqx, \@seqy);
$ants[$ant][$step][DIR_INDEX] = $dir;
216
217
218
219
220
# update pher matrix
$pher[$ant_y][$ant_x][$dir] += $PHER_STEP;
# Do local decay
$pher[$ant_y][$ant_x][$dir] *= $L_DECAY;
221
222
223
224
225
226
227
228
229
230
231
232
233
# move in the chosen direction and update the score.
# The score stored at each square includes
# match/mismatch score for this square as well as well
# as any gap penalty for the move that got the ant to
# that position .
if ($dir == D) {
$ants[$ant][$step + 1][X_INDEX] = $ant_x - 1;
$ants[$ant][$step + 1][Y_INDEX] = $ant_y - 1;
$ants[$ant][$step + 1][SCORE_INDEX] = $ants[$ant][$step][SCORE_INDEX];
if ($seqx[$ants[$ant][$step][X_INDEX]] eq $seqy[$ants[$ant][$step][Y_INDEX]]) {
$ants[$ant][$step + 1][SCORE_INDEX] += MATCH_BONUS;
} else {
9
$ants[$ant][$step + 1][SCORE_INDEX] += MISMATCH_PENALTY;
234
}
235
236
} elsif ($dir == U) {
$ants[$ant][$step
$ants[$ant][$step
$ants[$ant][$step
} elsif ($dir == L) {
$ants[$ant][$step
$ants[$ant][$step
$ants[$ant][$step
}
237
238
239
240
241
242
243
244
245
+ 1][X_INDEX] = $ant_x;
+ 1][Y_INDEX] = $ant_y - 1;
+ 1][SCORE_INDEX] = $ants[$ant][$step][SCORE_INDEX] + GAP_PENALTY;
+ 1][X_INDEX] = $ant_x - 1;
+ 1][Y_INDEX] = $ant_y;
+ 1][SCORE_INDEX] = $ants[$ant][$step][SCORE_INDEX] + GAP_PENALTY;
246
#Check if the ant is done and update score if needed
if ($ants[$ant][$step + 1][X_INDEX] == 0 || $ants[$ant][$step + 1][Y_INDEX] == 0) {
$ants[$ant][$step + 1][DIR_INDEX] = N;
$done{$ant} = 1;
if ($seqx[$ants[$ant][$step+1][X_INDEX]] eq $seqy[$ants[$ant][$step+1][Y_INDEX]]) {
$ants[$ant][$step + 1][SCORE_INDEX] += MATCH_BONUS;
} else {
$ants[$ant][$step + 1][SCORE_INDEX] += MISMATCH_PENALTY;
}
247
248
249
250
251
252
253
254
255
256
$ants_done++;
257
}
258
}
259
260
}
261
262
263
264
265
266
267
268
#Do a global update
#Find the best score
my $max_gen_score = $ants[0][$#{$ants[0]}][SCORE_INDEX];
my $max_score_ant = 0;
my @best_gen_path_x = ();
# The best path of the generation:
my @best_gen_path_y = ();
my @best_gen_path_dir = ();
x coordinates
269
270
271
272
273
274
275
for (my $a = 1; $a <= $#ants; $a++) {
if ($ants[$a][$#{$ants[$a]}][SCORE_INDEX] > $max_gen_score) {
$max_gen_score = $ants[$a][$#{$ants[$a]}][SCORE_INDEX];
$max_score_ant = $a;
}
}
276
277
278
279
280
281
282
#Get the best path
for(my $s = 0; $s <= $#{$ants[$max_score_ant]}; $s++) {
push (@best_gen_path_x, $ants[$max_score_ant][$s][X_INDEX]);
push (@best_gen_path_y, $ants[$max_score_ant][$s][Y_INDEX]);
push (@best_gen_path_dir, $ants[$max_score_ant][$s][DIR_INDEX]);
}
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
#Find out if the high score this time is the all time high.
if ($gen == 0) {
$high_score = $max_gen_score;
for (my $i = 0; $i <= $#best_gen_path_x; $i++) {
push (@best_path_x, $best_gen_path_x[$i]);
push (@best_path_y, $best_gen_path_y[$i]);
push (@best_path_dir, $best_gen_path_dir[$i]);
}
} elsif ($max_gen_score > $high_score) {
@best_path_x = ();
@best_path_y = ();
@best_path_dir = ();
$high_score = $max_gen_score;
for (my $i = 0; $i <= $#best_gen_path_x; $i++) {
push (@best_path_x, $best_gen_path_x[$i]);
push (@best_path_y, $best_gen_path_y[$i]);
push (@best_path_dir, $best_gen_path_dir[$i]);
}
}
303
304
305
306
307
308
309
310
311
#Reinforce the best path again based on how good it is. I’m
#using < rather than <= because the last direction is undefined.
if ($max_gen_score > 0 && $high_score > 0) {
for (my $i = 0; $i < $#best_gen_path_x; $i++) {
$pher[$best_gen_path_y[$i]][$best_gen_path_x[$i]][$best_gen_path_dir[$i]]
+= ($max_gen_score/$high_score) * $PHER_STEP;
}
}
312
313
#global_decay(\@pher, $G_DECAY);
10
314
#Check for convergence
if ($max_gen_score == $prev_score) {
$repeat_counter++;
} else {
$max_gen_score = $prev_score;
$repeat_counter = 0;
}
315
316
317
318
319
320
321
322
#If we get the same score 5 times, we’ll stop the calculation
if ($repeat_counter == 5) {
last;
}
323
324
325
326
}
327
328
my
my
my
my
329
330
331
332
@alignment = get_alignment(\@best_path_x, \@best_path_y, \@seqx, \@seqy);
$x_alignment = $alignment[0];
$dashes = $alignment[1];
$y_alignment = $alignment[2];
333
print
print
print
print
print
334
335
336
337
338
"The best alignment obtained was: \n";
"$x_alignment\n";
"$dashes\n";
"$y_alignment\n";
"The high score was: $high_score \n";
339
340
}
341
342
343
344
345
346
347
sub get_alignment {
#Arguments
my $best_x_ref = shift;
my $best_y_ref = shift;
my $seq_x_ref = shift;
my $seq_y_ref = shift;
# Stores the x coordinates of the best path
348
349
350
351
352
353
354
#Other variables
my $last_x;
my $last_y;
my $x_result = "";
my $y_result = "";
my $dashes = "";
# The x coordinate of the last step we traced
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
# Handle the cases where the alignment doesn’t start in the 0,0
# position
if($best_x_ref->[$#{@$best_x_ref}] != 0) {
for (my $i = 0; $i < $best_x_ref->[$#{@$best_x_ref}]; $i++) {
$x_result = $x_result.$seq_x_ref->[$i];
$y_result = $y_result."-";
$dashes = $dashes." ";
}
} elsif ($best_y_ref->[$#{@$best_y_ref}] != 0) {
for (my $i = 0; $i < $best_y_ref->[$#{@$best_y_ref}]; $i++) {
$x_result = $x_result."-";
$y_result = $y_result.$seq_y_ref->[$i];
$dashes = $dashes." ";
}
}
372
373
374
375
376
377
378
#First step. Start from the beginning of the alignment (the end of
# the best_x_ref and best_y_ref arrays
$last_x = $best_x_ref->[$#{@$best_x_ref}];
$last_y = $best_y_ref->[$#{@$best_y_ref}];
$x_result = $x_result.$seq_x_ref->[$last_x];
$y_result = $y_result.$seq_y_ref->[$last_y];
379
380
381
382
383
384
if ($seq_x_ref->[$last_x] eq $seq_y_ref->[$last_y]) {
$dashes = $dashes."|";
} else {
$dashes = $dashes." ";
}
385
386
387
388
389
390
391
392
393
for (my $i = $#{@$best_x_ref} - 1; $i >= 0; $i--) {
# Gap in the x if the x index has not changed. Append a gap to
# the sequence.
if ($best_x_ref->[$i] eq $last_x) {
$last_y = $best_y_ref->[$i];
$x_result = $x_result."-";
$y_result = $y_result."$seq_y_ref->[$best_y_ref->[$i]]";
$dashes = $dashes." ";
11
} elsif ($best_y_ref->[$i] eq $last_y) {
# Gap in y
$last_x = $best_x_ref->[$i];
$y_result = $y_result."-";
$x_result = $x_result."$seq_x_ref->[$best_x_ref->[$i]]";
$dashes = $dashes." ";
} else {
#Diagonal move
$last_x = $best_x_ref->[$i];
$last_y = $best_y_ref->[$i];
$y_result = $y_result."$seq_y_ref->[$best_y_ref->[$i]]";
$x_result = $x_result."$seq_x_ref->[$best_x_ref->[$i]]";
if ($seq_y_ref->[$best_y_ref->[$i]] eq $seq_x_ref->[$best_x_ref->[$i]]) {
$dashes = $dashes."|";
} else {
$dashes = $dashes." ";
}
}
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
}
412
413
return ($x_result, $dashes, $y_result);
414
415
}
416
417
418
419
420
sub global_decay {
#Arguments
my $pher_ref = shift;
my $g_decay = shift;
421
for (my $x = 0; $x <= $#{ $pher_ref }; $x++) {
for (my $y = 0; $y <= $#{ $pher_ref->[$x] }; $y++ ) {
for (my $d = 0; $d < 3; $d++) {
$pher_ref->[$x]->[$y]->[$d] *= $g_decay;
}
}
}
422
423
424
425
426
427
428
429
}
430
431
432
433
434
435
436
437
438
439
440
441
sub get_dir {
#Arguments
my $x = shift;
my $y = shift;
my $pher_ref = shift;
my $pher_weight = shift;
my $match_weight = shift;
my $region_weight = shift;
my $prob_prob = shift;
my $seqx = shift;
my $seqy = shift;
442
443
444
445
#Calculate the regional weighting for these coordinates.
#assumes that both sequences are the same length.
#TODO: MAKE SURE TO CHANGE REGIONAL WEIGHTINGS
This
446
447
448
449
my $reg_w_up;
my $reg_w_left;
my $reg_w_diag;
450
451
452
453
454
455
456
457
458
459
460
461
462
463
if ($x == $y) {
$reg_w_up = 1;
$reg_w_left = 1;
$reg_w_diag = 2;
} elsif ($x > $y) {
$reg_w_up = 1;
$reg_w_diag = 1.5;
$reg_w_left = 2;
} else {
$reg_w_up = 2;
$reg_w_left = 1;
$reg_w_diag = 1.5;
}
464
465
466
467
468
#Figure out whether going up, diagonal, or left will give us a match
my $match_up;
my $match_left;
my $match_diag;
469
470
471
472
473
if ($seqx->[$x] eq $seqy->[$y - 1]) {
$match_up = 2;
} else {
$match_up = 1;
12
}
474
475
if ($seqx->[$x - 1] eq $seqy->[$y - 1]) {
$match_diag = 2;
} else {
$match_diag = 1;
}
476
477
478
479
480
481
if ($seqx->[$x - 1] eq $seqy->[$y]) {
$match_left = 2;
} else {
$match_left = 1;
}
482
483
484
485
486
487
#Figure out the scores for each direction
my $up_score;
my $diag_score;
my $left_score;
488
489
490
491
492
$up_score = exp(log($pher_ref->[$y]->[$x]->[U]) * $pher_weight
+ log($match_up) * $match_weight
+ log($reg_w_up) * $region_weight);
493
494
495
496
$diag_score = exp(log($pher_ref->[$y]->[$x]->[D]) * $pher_weight
+ log($match_diag) * $match_weight
+ log($reg_w_diag) * $region_weight);
497
498
499
500
$left_score = exp(log($pher_ref->[$y]->[$x]->[L]) * $pher_weight
+ log($match_left) * $match_weight
+ log($reg_w_left) * $region_weight);
501
502
503
504
#Decide whether we’re gonna decide the direction based on the best
#score, or based on a weighted probability.
#
if (rand(1) > $prob_prob) {
#If we’re just gonna do it based on best score
505
506
507
508
509
510
my $high_score = max($up_score, $diag_score, $left_score);
511
512
if ($high_score == $up_score) {
return U;
} elsif ($high_score == $diag_score) {
return D;
} else {
return L;
}
} else {
#Determine the direction using probabilities
513
514
515
516
517
518
519
520
521
522
my $total_score = $up_score + $diag_score + $left_score;
523
524
my $rand_num = rand($total_score);
525
526
$total_score -= $up_score;
if ($rand_num > $total_score) {
return U;
}
527
528
529
530
531
$total_score -= $diag_score;
if ($rand_num > $total_score) {
return D;
} else {
return L;
}
532
533
534
535
536
537
}
538
539
}
540
541
sub max {
542
my $max = $_[0];
543
544
for(my $i = 1; $i <= $#_; $i++) {
if ($_[$i] > $max) {
$max = $_[$i];
}
}
545
546
547
548
549
550
return $max;
551
552
}
13
B Genetic Algorithm Implementation
1
2
3
#!/usr/local/bin/perl -w
use Time::HiRes;
use strict;
4
5
### BEGIN VARIABLES
6
7
8
9
10
11
12
13
14
# Constants
my $STR_LENGTH
my $POP_LIMIT
my $RECORD_FREQ
my $NUM_TEST_IND
my $KEEP_PARENTS
my $CROSSOVER
my $ZERO
=
=
=
=
=
=
=
20;
1000;
5;
7;
int ($POP_LIMIT * .1);
.2;
0.0000000001;
15
16
17
18
19
20
# Global variables
my @pop;
my $cur_gen
my $file_num
my $SCORE_INDEX = 10;
= 0;
= 0;
21
22
my @range = ();
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
$range[0][0]
$range[0][1]
$range[1][0]
$range[1][1]
$range[2][0]
$range[2][1]
$range[3][0]
$range[3][1]
$range[4][0]
$range[4][1]
$range[5][0]
$range[5][1]
$range[6][0]
$range[6][1]
$range[7][0]
$range[7][1]
$range[8][0]
$range[8][1]
$range[9][0]
$range[9][1]
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
10;
40;
5;
30;
$ZERO;
1;
$ZERO;
10;
$ZERO;
10;
$ZERO;
5;
$ZERO;
1;
$ZERO;
1;
$ZERO;
1;
$ZERO;
1;
# $MAX_GEN
# $NUM_ANTS
# $PHER_STEP
# $PHER_WEIGHT
# $MATCH_WEIGHT
# $REGION_WEIGHT
# $INIT_PHER
# $L_DECAY
# $G_DECAY
# $PROB_PROB
44
45
46
### BEGIN MAIN PROGRAM
47
48
49
#randomize variables
randomize_vars();
50
51
52
53
54
while (1) {
#initialization
my $seq1 = getrandseq();
my $seq2 = mutate($seq1);
55
print
print
print
print
56
57
58
59
"Generation $cur_gen\n";
"-Testing sequences:\n";
"-Sequence 1 (".length($seq1)."): $seq1\n";
"-Sequence 2 (".length($seq2)."): $seq2\n";
60
61
test_pop($seq1, $seq2);
62
63
gen_next_pop();
64
65
if ($cur_gen == $RECORD_FREQ) {
print_pop();
$cur_gen = 0;
$file_num++;
}
66
67
68
69
70
71
$cur_gen++;
72
73
}
74
75
### BEGIN SUBROUTINES
76
77
sub getrandseq {
14
my $limit = $STR_LENGTH;
my $str = "";
78
79
80
for (my $i = 0; $i < $limit; $i++) {
my $aa = int rand(4);
81
82
83
$str .= $aa;
84
}
85
86
return $str;
87
88
}
89
90
91
92
sub mutate {
my $template = shift;
my $num_muts = int length($template) / (rand (2) + 1.5);
93
for (my $i = 0; $i < $num_muts; $i++) {
my $whichmut = int rand(3);
my $where = int rand(length($template));
94
95
96
97
if ($whichmut == 0) {
# Point mutation
substr($template,$where,1,int rand(4));
} elsif ($whichmut == 1) {
# Insertion
my $beg = substr($template,0,$where);
my $end = substr($template,$where);
my $num = int rand(4);
$template = "$beg$num$end";
} else {
# Deletion
my $beg = substr($template,0,$where);
my $end = substr($template,$where+1);
$template = "$beg$end";
}
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
}
113
114
return $template;
115
116
}
117
118
sub randomize_vars {
119
for (my $i = 0; $i < $POP_LIMIT; $i++) {
for (my $j = 0; $j <= $#range; $j++) {
$pop[$i][$j] = rand($range[$j][1]-$range[$j][0]) + $range[$j][0];
}
$pop[$i][0] = int $pop[$i][0];
$pop[$i][1] = int $pop[$i][1];
}
120
121
122
123
124
125
126
127
}
128
129
130
131
sub test_pop {
my $seq1 = shift;
my $seq2 = shift;
132
my @winners;
133
134
print "-- Beginning population testing...\n";
for (my $i = 0; $i < $POP_LIMIT; $i++) {
my $score = score_individual($i, $seq1, $seq2);
$pop[$i][$SCORE_INDEX] = $score;
}
135
136
137
138
139
140
# Sort so that the winners are at the top and losers are at the bottom
@pop = sort {$b->[$SCORE_INDEX] <=> $a->[$SCORE_INDEX]} @pop;
141
142
143
print "-- DONE! \n";
print "-- Top three scores: ";
print "$pop[0][$SCORE_INDEX], $pop[1][$SCORE_INDEX], $pop[2][$SCORE_INDEX]\n";
144
145
146
147
}
148
149
150
151
152
sub score_individual {
my $ind = shift;
my $seq1 = shift;
my $seq2 = shift;
153
154
my @scores = ();
155
156
157
my $totalscore = 0;
my $totaltime = 0;
15
158
print "-- Testing string length: $STR_LENGTH\n";
print "-- Generation: ".($file_num*$RECORD_FREQ+$cur_gen)."\n";
print "-- Testing individual $ind \n";
print "----- Ants : $pop[$ind][1] \n";
print "----- Gens : $pop[$ind][0] \n";
for (my $i = 0; $i < $NUM_TEST_IND; $i++) {
my $score;
my $before = Time::HiRes::time();
$score = run_aco($seq1, $seq2, int $pop[$ind][0], int $pop[$ind][1],
$pop[$ind][2], $pop[$ind][3], $pop[$ind][4],
$pop[$ind][5], $pop[$ind][6], $pop[$ind][7],
$pop[$ind][8], $pop[$ind][9]);
$totaltime += Time::HiRes::time() - $before;
$totalscore += $score;
push(@scores, $score);
}
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
my $mean = $totalscore / $NUM_TEST_IND;
print "------- Mean:$mean\n";
176
177
178
my $stddev = 0;
for (my $i = 0; $i < $NUM_TEST_IND; $i++) {
my $term = ($mean - $scores[$i])*($mean - $scores[$i]);
$stddev += $term;
}
$stddev = sqrt($stddev / ($NUM_TEST_IND + 1));
print "------- Standard dev:$stddev\n";
179
180
181
182
183
184
185
186
my $newmean = 0;
my $datapoints = 0;
my $thrownout = 0;
for (my $i = 0; $i < $NUM_TEST_IND; $i++) {
if ($scores[$i] >= $mean - $stddev && $scores[$i] <= $mean + $stddev) {
$newmean += $scores[$i];
$datapoints++;
} else {
$thrownout++;
}
}
if ($datapoints == 0) {
$newmean = -10000;
} else {
$newmean /= $datapoints;
}
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
my $ga_score =
print "------print "------print "------print "------print "-------
204
205
206
207
208
209
($newmean * $newmean * $newmean) / $totaltime;
Good datapoints: $datapoints\n";
Thrown out data: $thrownout\n";
Corrected mean: $newmean\n";
Average time: ".$totaltime/$NUM_TEST_IND."\n";
Final GA score: ".$ga_score."\n";
210
return ($ga_score);
211
212
}
213
214
215
216
217
sub gen_next_pop {
# Populate the next generation
for (my $i = $KEEP_PARENTS; $i < $POP_LIMIT; $i++) {
my $cur_parent = int rand($KEEP_PARENTS);
218
219
220
for (my $j = 0; $j < $SCORE_INDEX; $j++) {
$pop[$i][$j] = $pop[$cur_parent][$j];
221
222
223
224
225
226
# Copy mutation
my $which_mut = rand(10);
if ($which_mut < 2) {
# Plus case
$pop[$i][$j] += .1 * rand(1) * ($range[$j][1] - $range[$j][0]);
227
228
229
230
231
232
233
if ($pop[$i][$j] > $range[$j][1]) {
$pop[$i][$j] = $range[$j][1];
}
} elsif ($which_mut < 4) {
# Minus case
$pop[$i][$j] -= .1 * rand(1) * ($range[$j][1] - $range[$j][0]);
234
235
236
237
if ($pop[$i][$j] < $range[$j][0]) {
$pop[$i][$j] = $range[$j][0];
}
16
} else {
# Do nothing case
}
238
239
240
241
# Branch migration
if (rand(1) < $CROSSOVER) {
$cur_parent = int rand($KEEP_PARENTS);
}
242
243
244
245
}
246
}
247
248
}
249
250
251
sub print_pop {
my $filename = "out-$file_num.txt";
252
open(FH, "> $filename");
253
254
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
printf FH ("%13s
print FH "\n";
255
256
257
258
259
260
261
262
263
264
265
266
",
",
",
",
",
",
",
",
",
",
",
"MAX_GEN");
"NUM_ANTS");
"PHER_STEP");
"PHER_WEIGHT");
"MATCH_WEIGHT");
"REGION_WEIGHT");
"INIT_PHER");
"L_DECAY");
"G_DECAY");
"PROB_PROB");
"SCORE");
267
268
for (my $i = 0; $i < $POP_LIMIT; $i++) {
for (my $j = 0; $j <= $SCORE_INDEX; $j++){
printf FH ("%13.9f ", $pop[$i][$j]);
}
print FH "\n";
}
print FH "\n";
close FH;
269
270
271
272
273
274
275
276
277
}
278
279
280
281
282
283
284
####################################
# Put ACO code here
#
#
In the interest of space, the ACO code was not included here.
#
Please see Appendix A to see the implementation of the ACO.
#
The only change that was made was silencing all the output functions.
17
| 9cs.NE
|
Submitted
arXiv: 1509.07566
DETECTING SPARSE MIXTURES: RATE OF DECAY OF
ERROR PROBABILITY ¶
arXiv:1509.07566v2 [cs.IT] 24 Dec 2016
By Jonathan G. Ligok , George V. Moustakides†† and Venugopal
V. Veeravallik
University of Illinois at Urbana-Champaignk , University of Patras†† and
Rutgers University††
We study the rate of decay of the probability of error for distinguishing between a sparse signal with noise, modeled as a sparse
mixture, from pure noise. This problem has many applications in signal processing, evolutionary biology, bioinformatics, astrophysics and
feature selection for machine learning. We let the mixture probability tend to zero as the number of observations tends to infinity and
derive oracle rates at which the error probability can be driven to
zero for a general class of signal and noise distributions via the likelihood ratio test. In contrast to the problem of detection of non-sparse
signals, we see the log-probability of error decays sublinearly rather
than linearly and is characterized through the χ2 -divergence rather
than the Kullback-Leibler divergence for “weak” signals and can be
independent of divergence for “strong” signals. Our contribution is
the first characterization of the rate of decay of the error probability
for this problem for both the false alarm and miss probabilities.
1. Introduction. We consider the problem of detecting a sparse signal
in noise, modeled as a mixture, where the unknown sparsity level decreases
as the number of samples collected increases. Of particular interest is the
case where the unknown signal strength relative to the noise power is very
small. This problem has many natural applications. In signal processing, applications include detecting a signal in a multi-channel system [10, 16] and
detecting covert communications [11]. In evolutionary biology, the problem
manifests in the reconstruction of phylogenetic trees in the multi-species
coalescent model [20]. In bioinformatics, the problem arises in the context
of determining gene expression from gene ontology datasets [15]. In astrophysics, detection of sparse mixtures is used to compare models of the cosmic
microwave background to observed data [5]. Also, statistics developed from
the study of this problem have been applied in machine learning to anomaly
¶
Supported by the US National Science Foundation under grants CIF 1514245 and
CIF 1513373. This paper was partially presented at the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2016 as [19].
MSC 2010 subject classifications: Primary 62G10; secondary 62G20
Keywords and phrases: likelihood ratio test, sparse mixture, error exponents
1
2
J. G. LIGO ET AL.
detection on graphs [22] and high-dimensional feature selection when useful
features are rare and weak [12].
Prior work on detecting a sparse signal in noise has been primarily focused
on Gaussian signal and noise models, with the goal of determining the tradeoff in signal strength with sparsity required for detection with vanishing
probability of error. In contrast, this work considers a fairly general class
of signal and noise models. Moreover, in this general class of sparse signal
and noise models, we provide the first analysis of the rate at which the false
alarm (Type-I) and miss detection (Type-II) error probabilities vanish with
sample size. We also provide simple to verify conditions for detectability,
which are derived using simpler tools than previously used. In the problem
of testing between n i.i.d. samples from two known distributions, it is well
known that the rate at which the error probability decays is e−cn for some
constant c > 0 bounded by the Kullback-Leibler divergence between the
two distributions [6, 8]. In this work, we show for the problem of detecting a
sparse signal in noise that the error probability for an oracle detector decays
at a slower rate determined by the sparsity level and the χ2 -divergence
between the signal and noise distributions, with different behaviors possible
depending on the signal strength. In addition to determining the optimal
trade-off between signal strength and sparsity for consistent detection, an
important contribution in prior work has been the construction of adaptive
(and, to some extent, distribution-free) tests that achieve the optimal tradeoff without knowing the model parameters [1, 3, 4, 11, 16, 17, 23]. We discuss
prior work in more detail in Sec. 2.1. However, the adaptive tests that have
been proposed in these papers are not amenable to an analysis of the rate at
which the error probability goes to zero. We show that in a Gaussian signal
and noise model that an adaptive test based on the sample maximum has
miss detection probability that vanishes at the optimal rate when the sparse
signal is sufficiently strong.
2. Problem Setup. Let {f0,n (x)}, {f1,n (x)} be sequences of probability
density functions (PDFs) for real valued random-variables.
We consider the following sequence of composite hypothesis testing problems with sample size n, called the (sparse) mixture detection problem:
(2.1)
H0,n : X1 , . . . , Xn ∼ f0,n (x) i.i.d. (null)
(2.2)
H1,n : X1 , . . . , Xn ∼ (1 − n )f0,n (x) + n f1,n (x) i.i.d. (alternative)
where {f0,n (x)} is known, {f1,n (x)} is from some known family F of sequences
of PDFs, and {n } is a sequence of positive numbers such that n → 0. We
will also assume nn → ∞ so that a typical realization of the alternative is
distinguishable from the null.
DETECTING SPARSE MIXTURES
3
Let P0,n , P1,n denote the probability measure under H0,n , H1,n respectively,
and let E0,n , E1,n be the corresponding expectations, with respect to the
particular {f0,n (x)}, {f1,n (x)} and {n }. When convenient, we will drop the
f (x)
subscript n. Let Ln , f1,n
. When f0,n (x) = f0 (x) and f1,n (x) = f0 (x − µn ),
0,n (x)
we say that the model is a location model. For the purposes of presentation,
we will assume that {µn } is a positive and monotone sequence. When f0 (x)
is a standard normal PDF, we call the location model a Gaussian location
model. The distributions of the alternative in a location model are described
by the set of sequences {(n , µn )}.
The location model can be considered as one where the null corresponds
to pure noise, while the alternative corresponds to a sparse signal (controlled by n ), with signal strength µn contaminated by additive noise. The
relationship between n and µn determines the signal-to-noise ratio (SNR),
and characterizes when the hypotheses can be distinguished with vanishing
probability of error. In the general case, f0,n (x) can be thought of as the
noise and f1,n (x) as the signal distribution.
We define the probability of false alarm for a hypothesis test δn between
H0,n and H1,n as
(2.3)
PFA (n) , P0,n [δn = 1]
and the probability of missed detection as
(2.4)
PMD (n) , P1,n [δn = 0].
A sequence of hypothesis tests {δn } is consistent if PFA (n), PMD (n) → 0 as
n → ∞. We say we have a rate characterization for a sequence of consistent
hypothesis tests {δn } if we can write
(2.5)
lim
n→∞
log PFA (n)
= −c,
g0 (n)
lim
n→∞
log PMD (n)
= −d,
g1 (n)
where g0 (n), g1 (n) → ∞ as n → ∞ and 0 < c, d < ∞. The rate characterization describes decay of the error probabilities for large sample sizes.
All logarithms are natural. For the problem of testing between i.i.d. samples
from two fixed distributions, g0 (n) = g1 (n) = n, and c, d are called the error
exponents [6]. In the mixture detection problem, g0 (n) and g1 (n) will be
sublinear functions of n.
The log-likelihood ratio between the corresponding probability measures
of H1,n and H0,n is
(2.6)
LLR(n) =
n
X
i=1
log 1 − n + n Ln (Xi ) .
4
J. G. LIGO ET AL.
In order to perform an oracle rate characterization for the mixture detection
problem, we consider the sequence of oracle likelihood ratio tests (LRTs)
between H0,n and H1,n (i.e. with n , f0,n , f1,n known):
(
1 LLR(n) ≥ 0
(2.7)
δn (X1 , . . . , Xn ) ,
.
0 otherwise
It is well known that (2.7) is optimal for testing between H0,n and H1,n in the
MD (n)
sense of minimizing PFA (n)+P
, which is the average probability of error
2
when the null and alternative are assumed to be equally likely [18, 21]. It is
valuable to analyze PFA (n) and PMD (n) separately since many applications
incur different costs associated with false alarms and missed detections.
Location Model: The detectable region for a location model is the set
of sequences {(n , µn )} such that a sequence of consistent oracle tests {δn }
exist. For convenience of analysis, we introduce the parameterization
(2.8)
n = n−β
where β ∈ (0, 1) as necessary. Following the terminology of [1], when β ∈
(0, 12 ), the mixture is said to be a “dense mixture”. If β ∈ ( 21 , 1), the mixture
is said to be a “sparse mixture”.
2.1. Related Work. Prior work on mixture detection has been focused
primarily on the Gaussian location model. The main goals in these works
have been to determine the detectable region and construct optimally adaptive tests (i.e. those which are consistent independent of knowledge of {(n ,
µn )}, whenever possible). The study of detection of mixtures where the
mixture probability tends to zero was initiated by Ingster for the Gaussian
location model [16]. Ingster characterized the detectable region, and showed
that outside the detectable region the sum of the probabilities of false alarm
and missed detection is bounded away from zero for any test. Since the
generalized likelihood statistic tends to infinity under the null, Ingster developed an increasing sequence of simple hypothesis tests that are optimally
adaptive.
Donoho and Jin introduced the Higher Criticism test, which is optimally
adaptive and is computationally efficient relative to Ingster’s sequence of hypothesis tests, and also discussed some extensions to Subbotin distributions
and χ2 -distributions [11]. Cai et al. extended these results to the case where
f0,n (x) is standard normal and f1,n (x) is a normal distribution with positive
variance, derived limiting expressions for the distribution of LLR(n) under
both hypotheses, and showed that the Higher Criticism test is optimally
DETECTING SPARSE MIXTURES
5
adaptive in this case [3]. Jager and Wellner proposed a family of tests based
on φ-divergences and showed that they attain the full detectable region in
the Gaussian location model [17]. Arias-Castro and Wang studied a location model where f0,n (x) is some fixed but unknown symmetric distribution,
and constructed an optimally adaptive test that relies only on the symmetry of the distribution when µn > 0 [1]. In a separate paper, Arias-Castro
and Wang also considered mixtures of Poisson distributions and showed the
problem had similar detectability behavior to the Gaussian location model
[2].
Cai and Wu gave an information-theoretic characterization of the detectable region via an analysis of the sharp asymptotics of the Hellinger distance for a wide variety of distributions, and established a strong converse
result showing that reliable detection is impossible outside the detectable region in many cases if (2.7) is not consistent [4]. This work also gave general
conditions for the Higher Criticism test to be consistent. Our work complements [4] by providing conditions for consistency (as well as asymptotic
estimates of error probabilities) for optimal tests, with simple to verify conditions for a fairly general class of models. While the Hellinger distance
used in [4] provides bounds on PFA (n) + PMD (n) for the test specified in
(2.7), our analysis treats PFA (n), PMD (n) separately as they may have different rates at which they tend to zero and different acceptable tolerances
in applications. As we will show in Sec. 3.2 and Sec. 4, there are cases where
PFA (n) PMD (n) for adaptive tests and PFA (n) PMD (n) for an oracle
test.
Walther numerically showed that while the popular Higher Criticism
statistic is consistent, there exist optimally adaptive tests with significantly
higher power for a given sample size at different sparsity levels [23]. Our
work complements [23] by providing a benchmark to meaningfully compare
the sample size and sparsity trade-offs of different tests with an oracle test.
It should be noted that all of the work except [1, 3] has focused on the case
where β > 12 , and no prior work has provided an analysis of the rate at
which PFA (n), PMD (n) can be driven to zero with sample size.
3. Main Results for Rate Analysis.
3.1. General Case. Our main result is a characterization of the oracle
rate via the test given in (2.7). The sufficient conditions required for the
rate characterization are applicable to a broad range of parameters in the
Gaussian location model (Sec. 3.2).
We first look at the behavior of “weak signals”, where Ln has suitably
controlled tails under the null hypothesis. In the Gaussian location model
6
J. G. LIGO ET AL.
in Sec. 3.2, this theorem is applicable to small detectable µn .
Theorem 3.1. Let γ0 ∈ (0, 1) and assume that for all γ ∈ (0, γ0 ) the
following conditions are satisfied:
(Ln − 1)2
(3.1)
lim E0
1{Ln ≥1+ γ } = 0
n→∞
n
Dn2
(3.2)
n Dn → 0
√
(3.3)
nn Dn → ∞
where
(3.4)
Dn2 = E0 [(Ln − 1)2 ] < ∞.
Then for the test specified by (2.7),
(3.5)
log PFA (n)
1
=− .
2
2
n→∞
nn Dn
8
lim
Moreover, (3.5) holds if we replace PFA (n) with PMD (n).
The quantity Dn2 is known as the χ2 -divergence between f0,n (x) and f1,n (x)
[14]. In contrast to the problem of testing between i.i.d. samples from two
fixed distributions [8], the rate is not characterized by the Kullback-Leibler
divergence for the mixture detection problem.
Proof. We provide a sketch of the proof for PFA (n), and leave the details
to Supplemental Material. We first establish that
(3.6)
lim sup
n→∞
log PFA (n)
1
≤−
n2n Dn2
8
By the Chernoff bound applied to PFA (n) and noting X1 , . . . , Xn are i.i.d.,
s n
PFA (n) = P0 LLR(n) ≥ 0 ≤ min E0 1 − n + n Ln (X1 )
0≤s≤1
hp
in
(3.7)
≤ E0
1 − n + n Ln (X1 )
By direct computation, we see E0 [Ln (X1 )−1] = 0, and the following sequence
DETECTING SPARSE MIXTURES
7
of inequalities hold:
"
#
hp
i
1
2n (Ln (X1 ) − 1)2
E0
1 − n + n Ln (X1 ) = 1 − E0
p
2
2
1 + 1 + n (Ln (X1 ) − 1)
"
#
(Ln (X1 ) − 1)2
2n
p
≤ 1 − E0
1{n (Ln (X1 )−1)≤γ}
2
(1 + 1 + n (Ln (X1 ) − 1))2
(Ln (X1 ) − 1)2
2n Dn2
γ
√
E0
≤1−
1{Ln (X1 )≤1+ }
n
Dn2
2(1 + 1 + γ)2
2
2
2
(Ln (X1 ) − 1)
n Dn
√
1 − E0
=1−
1{Ln (X1 )≥1+ γ }
n
Dn2
2(1 + 1 + γ)2
Since the expectation in the previous line tends to zero by (3.1), for sufficiently large n it will become smaller than γ. Therefore we have by (3.7)
1
2n Dn2
log PFA (n)
√
≤ log 1 −
(1 − γ) .
n
2 (1 + 1 + γ)2
Dividing both sides by 2n Dn2 and taking the lim sup using (3.2),(3.3) estab(n)
1−γ
lishes lim supn→∞ lognP2FA
. Since γ can be arbitrarily small,
≤ − 21 (1+√
2
1+γ)2
n Dn
(3.6) is established.
We now establish that
log PFA (n)
1
(3.8)
lim inf
≥− .
2
2
n→∞
nn Dn
8
The proof of (3.8) is similar to that of Cramer’s theorem (Theorem I.4, [9]).
The key difference from Cramer’s theorem is that LLR(n) is the sum of
i.i.d. random variables for each n, but the distributions of the summands
defining LLR(n) in (2.6) change for each n under either hypothesis. Thus, we
modify the proof of Cramer’s theorem by introducing a n-dependent tilted
distribution, and replacing the standard central limit theorem (CLT) with
the Lindeberg-Feller CLT for triangular arrays (Theorem 3.4.5, [13]).
We introduce the tilted distribution f̃n (x) corresponding to f0,n (x) by
s
1 − n + n Ln (x) n
(3.9)
f̃n (x) =
f0,n (x)
Λn (sn )
s
where Λn (s) = E0 1 − n + n Ln (X1 ) , which is convex with Λn (0) =
Λn (1) = 1, and sn = arg min0≤s≤1 Λn (s). Let P̃, Ẽ denote the tilted measure and expectation, respectively (where we suppress the n for clarity). A
standard dominated convergence argument (Lemma 2.2.5, [8]) shows that
(3.10)
Ẽ log 1 − n + n Ln (X1 ) = 0.
8
J. G. LIGO ET AL.
Define the variance of the log-likelihood ratio for one sample as
h
2 i
(3.11)
σn2 = Ẽ log 1 + n (Ln (X1 ) − 1)
.
For sufficiently large n such that Lemma 7.1 (proved in Supplementary Material) holds, namely that C1 2n Dn2 ≥ σn2 ≥ C2 2n Dn2 , we have:
PFA (n) = P0 [LLR(n) ≥ 0] = E0 1{LLR(n)≥0}
h
i
= (Λn (sn ))n Ẽ e−LLR(n) 1{LLR(n)≥0}
h
i
= (Λn (sn ))n Ẽ e−LLR(n) |LLR(n) ≥ 0 P̃ [LLR(n) ≥ 0]
(3.12)
≥ (Λn (sn ))n e−Ẽ[LLR(n)|LLR(n)≥0] P̃ [LLR(n) ≥ 0]
Ẽ[LLR(n)1{LLR(n)≥0} ]
n −
P̃[LLR(n)≥0]
= (Λn (sn )) e
P̃ [LLR(n) ≥ 0]
(3.13)
≥ (Λn (sn ))n e
(3.14)
−
√
n −
≥ (Λn (sn )) e
−
≥ (Λn (sn ))n e
Ẽ[(LLR(n))2 ]
2
nσn
P̃[LLR(n)≥0]
√
−
P̃ [LLR(n) ≥ 0]
P̃[LLR(n)≥0]
√
= (Λn (sn ))n e
(3.15)
Ẽ[|LLR(n)|]
P̃[LLR(n)≥0]
2
nC1 2
n Dn
P̃[LLR(n)≥0]
P̃ [LLR(n) ≥ 0]
P̃ [LLR(n) ≥ 0]
P̃ [LLR(n) ≥ 0]
where (3.12) follows from Jensen’s inequality, (3.13) by LLR(n)1{LLR(n)>0}
≤ |LLR(n)|, (3.14) by Jensen’s inequality, and (3.15) by Lemma 7.1 proved
in the Supplementary Material.
Taking logarithms and dividing through by n2n Dn2 gives
√
log PFA (n)
1
log Λn (sn )
C1
log P̃ [LLR(n) ≥ 0]
√
≥
−
.
+
2
2
2
2
nn Dn
n Dn
n2n Dn2
P̃ [LLR(n) ≥ 0] nn Dn
Taking lim inf and applying Lemma 7.2, in which it is established that
P̃[LLR(n) ≥ 0] → 21 , and Lemma 7.4 in which it is established that
n (sn )
lim inf n→∞ logΛ
≥ − 18 , (see Supplementary Material), along with the
2 D2
n
n
(n)
assumption n2n Dn2 → ∞ establishes that lim inf n→∞ lognP2FA
≥ − 18 .
2
n Dn
The analysis under H1,n for PMD (n) relies on the fact that the Xi are
i.i.d. with pdf (1 − n + n Ln )f0,n (x), which allows the use of 1 − n + n Ln
to change the measure from the alternative to the null. The upper bound is
DETECTING SPARSE MIXTURES
9
established identically, by noting that the Chernoff bound furnishes
"
#!n
1
PMD (n) = P1,n − LLR(n) > 0 ≤ E1 p
1 − n + n Ln (X1 )
in
hp
1 − n + n Ln (X1 )
= E0
Similarly, the previous analysis can be applied to show that (3.8) holds with
PFA (n) replaced with PMD (n).
In order to study the behavior of tests when Thm 3.1 does not hold, we
rely on the following bounds for PMD (n), PFA (n):
Theorem 3.2.
(a) Let {δn } be any sequence of tests such that
lim sup PFA (n) < 1,
n→∞
then,
(3.16)
lim inf
n→∞
log PMD (n)
≥ −1.
nn
(b) The following upper and lower bounds for PFA (n) hold for the test specified by (2.7):
(3.17)
(3.18)
PFA (n) ≤ 1 − (P0 [Ln ≤ 1])n
" n
#
X
PFA (n) ≥ P0
log max 1 − n , n Ln (Xi ) ≥ 0 .
i=1
These bounds are easily proved by noting if all observations under H1,n
come from f0,n , then a miss detection occurs (a), and at least one sample
must have Ln ≥ 1 in order to raise a false alarm (b).
Note that these are universal bounds in the sense that they impose no
conditions on f1,n (x), f0,n (x) and n . Also note that the bound of Thm 3.2(a)
is independent of any divergences between f0,n (x) and f1,n (x), and it holds
for any consistent sequence of tests because PFA (n) → 0. This is in contrast
to the problem of testing between i.i.d. samples from fixed distributions,
where the rate is a function of divergence [8].
When the conditions of Thm 3.1 do not hold, we have the following rate
characterization for “strong signals”, where Ln is under the f1,n (x) distribution in an appropriate sense. In the Gaussian location model in Sec. 3.2, this
theorem is applicable to large detectable µn .
10
J. G. LIGO ET AL.
Theorem 3.3. Let M0 > 1, and assume that for all M > M0 , the
following condition is satisified:
h
i
(3.19)
E0 Ln 1{Ln >1+ M } → 1.
n
Then for the test specified by (2.7),
(3.20)
(3.21)
log PFA (n)
≤ −1
nn
n→∞
log PMD (n)
lim
= −1.
n→∞
nn
lim sup
Proof. We first prove (3.20). Let
φ(x) = 1 + sx − (1 + x)s .
By Taylor’s theorem, we see for s ∈ (0, 1) and x ≥ −1 that φ(x) ≥ 0. Since
E0 [Ln − 1] = 0,
E0 [(1 − n + n Ln (X1 ))s ] = 1 − E0 [φ(n (Ln (X1 ) − 1))].
Note this implies E0 [φ(n (Ln (X1 ) − 1))] ∈ [0, 1] since E0 [(1 − n + n Ln (X1 ))s ]
is convex in s and is 1 for s = 0, 1. As in the proof of Thm 3.1, by the Chernoff
bound,
PFA (n) ≤ (E0 [(1 − n + n Ln (X1 ))s ])n
for any s ∈ (0, 1). Thus, supressing the dependence on X1 , and assuming
M > M0 , we have
log PFA (n)
≤ log E0 [(1 − n + n Ln (X1 ))s ]
n
= log(1 − E0 [φ(n (Ln − 1))])
(3.22)
(3.23)
(3.24)
(3.25)
≤ −E0 [φ(n (Ln − 1))]
≤ −E0 φ(n (Ln − 1))1{n (Ln −1)≥M }
= −E0 (1 + sn (Ln − 1) − (1 + n (Ln − 1))s ) 1{n (Ln −1)≥M }
≤ −E0 (sn (Ln − 1) − (1 + n (Ln − 1))s ) 1{n (Ln −1)≥M }
≤ −E0 (sn (Ln − 1) − 2s sn (Ln − 1)s ) 1{n (Ln −1)≥M }
2s
= −E0 n (Ln − 1) s −
1{n (Ln −1)≥M }
(n (Ln − 1))1−s
2
≤ −E0 n (Ln − 1) s − 1−s 1{n (Ln −1)≥M }
M
11
DETECTING SPARSE MIXTURES
= −n s −
2
M 1−s
E0 Ln
"
1
1−
Ln
1{n (Ln −1)≥M }
!
#
1
1{n (Ln −1)≥M }
≤ −n s − 1−s E0 Ln 1 −
M
1+ M
n
!
2
1
1−
E
L
1
= −n s − 1−s
0
n
{
(L
−1)≥M
}
n
n
M
1+ M
n
2
where (3.22) follows from log(1 − x) ≤ −x for x ≤ 1, (3.23) follows from
φ(x) ≥ 0, (3.24) follows from (1 + x)s ≤ 2s xs for x ≥ 1 and taking M > M0 ,
(3.25) follows from s ∈ (0, 1). Dividing both sides of the inequality by n
and taking a lim supn→∞ establishes
lim sup
n→∞
log PFA
2
≤ −s + 1−s .
nn
M
Letting M → ∞ and optimizing over s ∈ (0, 1) establishes the (3.20). By a
change of measure between the alternative and null hypotheses, we see that
(3.20) also holds with PFA (n) replaced with PMD (n). Combining this with
Thm 3.2 establishes (3.21).
Theorem 3.3 shows that the rate of miss detection is controlled by the average number of observations drawn from f1,n (x) under H1,n , independent of
any divergence between f1,n (x) and f0,n (x) when (3.19) holds. Interestingly,
so long as the condition of Thm 3.3 holds, by Thm 3.2(a), no non-trivial
sequence of tests (i.e. lim supn→∞ PFA (n), PMD (n) < 1) can achieve a better
rate than (2.7) under H1,n . This is different from the case of testing i.i.d.
observations from two fixed distributions, where allowing for a slower rate
of decay for PFA (n) can allow for a faster rate of decay for PMD (n) (Sec. 3.4,
[8]).
In Sec. 3.2, we will show that Thm 3.3 is not always tight under H0,n ,
and the true behavior can depend on divergence between f0,n (x) and f1,n (x),
using the upper and lower bounds of Thm 3.2(b).
3.1.1. Comparison to Related Work. Cai and Wu [4] consider a model
which is essentially as general as ours, and characterize the detection boundary for many cases of interest, but do not perform a rate analysis. Note that
our rate characterization (3.5) depends on Dn , the χ2 -divergence between
f0,n and f1,n . While the Hellinger distance used in [4] can be upper bounded
in terms of the χ2 -divergence, a corresponding lower bound does not exist in
general [14], and so our results cannot be derived using the methods of [4]. In
fact, our results complement [4] in giving precise bounds on the error decay
12
J. G. LIGO ET AL.
for this problem once the detectable region boundary has been established.
Furthermore, as we will show in Thm 4.1, there are cases where the rates
derived by analyzing the likelihood ratio test are essentially achievable.
3.2. Gaussian Location Model. In this section, we specialize Thm 3.1
and 3.3 to the Gaussian location model. The rate characterization proved is
summarized in Fig. 1. We first recall some results from the literature for the
detectable region for this model.
Theorem 3.4. The boundary of the detectable region (in {(n , µn )} space)
is given by (with n = n−β ):
1
1. If 0 < β ≤ 12 , then µcrit,n = nβ− 2 . (Dense)
q
3
1
2. If 2 < β < 4 , then µcrit,n = 2(β − 12 ) log n. (Moderately Sparse)
p
√
3. If 34 ≤ β < 1, then µcrit,n = 2(1 − 1 − β)2 log n. (Very Sparse)
If in the dense case µn = nr , then the LRT (2.7) is consistent if r > β − 12 .
(a) Detectable
region (r versus β) where
√
µn = 2r log n, n = n−β
(b) Detectable region (r versus β) where
µn = nr , n = n−β
Fig 1: Detectable regions for the Gaussian location model. Unshaded regions
have PMD (n) + PFA (n) → 1 for any test (i.e. reliable detection is impossible). Green regions are where corollaries 3.5 and 3.6 provide an exact rate
characterization. The red region is where Thm 3.8 provides an upper bound
on the rate, but no lower bound. The blue region is where Cor. 3.7 holds,
and provides an upper bound on the rate for PFA (n) and an exact rate
characterization for PMD (n).
13
DETECTING SPARSE MIXTURES
Moreover, if r < β − 12 , then PFA (n) + P√MD (n) → 1 for any sequence of tests
as n → ∞. If in the sparse cases, µn = 2r log n, then the LRT is consistent
if µn > µcrit,n . Moreover, if µn < µcrit,n , then PFA (n) + PMD (n) → 1 for
any sequence of tests as n → ∞.
Proof. For the proof see [1, 3, 11].
We call the set of {(n , µn )} sequences where (2.7) is consistent the interior
of the detectable region. We now begin proving a rate characterization for
the Gaussian location model by specializing Thm 3.1. Note that Ln (x) =
1 2
2
eµn x− 2 µn and Dn2 = eµn −1. A simple computation shows that the conditions
in the theorem can be re-written as:
For all γ > 0 sufficiently small:
(3.26)
n
Q − 23 µn + µ1n log 1 + γn
+ µ21
Q − 32 µn + µ1n log 1 + γn
n
e −1
o
γ
1
1
−2Q − 2 µn + µn log 1 + n
+ Q 12 µn + µ1n log 1 + γn
→0
2
(3.27)
2n (eµn − 1) → 0
(3.28)
n2n (eµn − 1) → ∞
where Q(x) =
2
R∞
x
1 2
√1 e− 2 x dx.
2π
Corollary 3.5.
where h(n) → ∞ and
(3.29)
(Dense case) If n = n−β for β ∈ (0, 12 ) and µn =
lim supn→∞ q 2 µn
β log n
3
h(n)
1
n 2 −β
< 1, then
1
log PFA (n)
=− .
2
µ
2
n→∞ n (e n − 1)
8
n
lim
If µn → 0, (3.29) can be rewritten as
(3.30)
lim
n→∞
log PFA (n)
1
=− .
n2n µ2n
8
This result holds when replacing PFA (n) with PMD (n).
Proof. It is easy to verify (3.27) and (3.28) directly, and (3.26) if µn
does not tend to zero. To verify (3.26) it suffices to show: If µn → 0, for
any α ∈ R, then
Q(αµn + µ1 log(1+ γ ))
n
2
eµn −1
n
→ 0. Since ex − 1 ≥ x, it suffices to
14
J. G. LIGO ET AL.
show that
Q(αµn + µ1 log(1+ γ ))
n
n
µ2n
1 2
−2x
→ 0. This can be verified by the standard
bound Q(x) ≤ e
for x > 0, and noting that αµn +
for sufficiently large n and that exx−1 → 1 as x → 0.
1
µn
log(1 +
γ
n )
>0
The implication of this corollary is that our rate characterization of the
probabilities of error holds for a large portion of the detectable region up
to the detection boundary, as h(n) can be taken such that h(n)
→ 0 for any
nξ
ξ > 0, making it negligible with respect to µcrit,n in Thm 3.4.
Corollary 3.6. (Moderately sparse case) If n = n−β for β ∈ ( 12 , 43 )
q
then
and µn = 2(β + 12 + ξ) log n for any 0 < ξ < 3−4β
6
(3.31)
lim
n→∞
log PFA (n)
1
=−
2
µ
2
n
8
nn (e − 1)
and the same result holds replacing PFA (n) with PMD (n).
Proof. It is easy to verify (3.27) and (3.28) directly. To verify (3.26),
note since Q(·) ≤ 1 and µn → ∞, we need
1
n
−
Q − 32 µn + µ1n log 1 + γn
+ Q 12 µn +
2Q − 12 µn + µ1n log 1 + γn
2
eµn −1
1
µn
log 1 +
γ
n
o
→ 0.
Thus, it suffices to show thatQ − 23 µn + µ1n log(1 + γn ) → 0, or equivalently,
that − 23 µn + µ1n log(1 + γn ) → ∞ for any fixed γ > 0. Applying log(1 + γn ) ≥
log( γn ) = β log n + log γ shows that
log 1 + γn ≥
q
3
β log n + log γ
−
2(β − 12 + ξ) log n + q
2
2(β − 12 + ξ) log n
q
p
β
log γ
= − 32 2(β − 21 + ξ) + q
log n + q
2(β − 21 + ξ)
2(β − 12 + ξ) log n
(3.31)
− 32 µn +
1
µn
where the last
√ term tends to 0 with n. Thus, (3.31) tends to infinity if the
coefficient of log n is positive, i.e. if 12 (1−2ξ) < β < 14 (3−6ξ) , which holds
by the definition of ξ. Thus, (3.31) tends to infinity and (3.26) is proved.
15
DETECTING SPARSE MIXTURES
Note that ξ can be replaced with an appropriatelyq
chosen sequence tending to 0 such that (3.27) and (3.28) hold. For µn > 23 β log n, (3.26) does
not hold. However, Thm 3.3 and Thm 3.2 provide
√ a partial rate characterization for the case where µn grows faster than 2β log n which we present
in the following corollary.
Corollary 3.7.
then
If n = n−β for β ∈ (0, 1) and lim inf n→∞
(3.33)
If
nn
µ2n
lim
n→∞
√ µn
2β log n
> 1,
log PMD (n)
= −1.
nn
→ ∞, then
(3.34)
lim sup
n→∞
Otherwise, if
nn
µ2n
log PFA (n)
= −1
nn
→ 0, then
(3.35)
lim sup
n→∞
log PFA (n)
1
≤− .
µ2n
8
Proof. The condition for Thm 3.3 given by (3.19) is
1
Q µ1n log 1 + M
n − 2 µn → 1.
This holds if
1
µn
log(1 +
M
n )
− 12 µn → −∞, which is true if r > β.
(n)
n
≥ −1 if n
To show that lim inf n→∞ log PnFA
→ ∞, we can apply
µ2n
n
a similar argument to the lower bound for Thm 3.1 to the lower bound
given by (3.18) and is thus omitted. Instead, we show a short proof of
(n)
lim inf n→∞ log PnFA
≥ −C for C ≥ 1 using (3.18). Note that we can loosen
n
(3.18) to
" k
#
n
X
X
PFA (n) ≥ P0
log (1 − n ) +
log n Ln (Xi ) ≥ 0
i=1
i=k+1
for any k and explicitly compute a lower bound to PFA (n) in terms of the
standard normal cumulative distribution function. Optimizing this bound
(n)
≥ −C for some
over the choice of k establishes that lim inf n→∞ log PnFA
n
µ
n
√
constant C ≥ 1 (with C = 1 if log n → ∞). The lower bounding of (3.18)
in a manner similar to (3.1) recovers the correct constant when µn scales as
√
2r log n.
16
J. G. LIGO ET AL.
To see that the log-false alarm probability scales faster than nn when
→ 0, one can apply (3.17). In this case,
nn
µ2n
n
log PFA (n) ≤ log 1 − 1 − Q( 12 µn )
.
Applying the standard approximation
1 2
1 2
√
(3.36)
we see lim supn→∞
e− 2 x
xe− 2 x
≤ Q(x) ≤ √
for x > 0,
2π(1 + x2 )
x 2π
log PFA (n)
µ2n
≤ − 18 .
Note that (3.35) shows an asymmetry between the rates for the miss
detection and false alarm probabilities, since there is a fundamental lower
bound due to the sparsity under the alternative for the miss probability, but
not under the null.
√
Theorems 3.1 and 3.3 do not hold when √
n = n−β and µn = 2r log n
where r ∈ ( β3 , β) for β ∈ (0, 34 ) or r ∈ ((1 − 1 − β)2 , β) for β ∈ ( 34 , 1). For
the remainder of the detectable region, we have an upper bound on the rate
derived specifically for the Gaussian location setting. One can think of this
as a case of “moderate signals”.
√
Theorem 3.8. Let n = n−β and µn = 2r log n where r ∈ β3 , β for
√
β ∈ (0, 43 ) or r ∈ ((1 − 1 − β)2 , β) for β ∈ ( 34 , 1). Then,
(3.37)
lim sup
n→∞
log PFA (n)
1
≤− .
β
16
n2n e Φ 2r
− 32 µn
µ2n
Rx
2
where Φ(x) = 1 − Q(x) = −∞ √12π e−x /2 dx denotes the standard normal
cumulative distribution function.
Moreover, (3.37) holds replacing PFA with PMD .
Proof. The proof is based on a Chernoff bound with s = 21 . Details are
given in the Supplemental Material.
2
β
It is useful to note that n2n eµn Φ ( 2r
− 32 )µn behaves on the order of
2
n1−2β+2r−r(1.5−β/2r)
√
2r log n
for large n in Thm 3.8.
DETECTING SPARSE MIXTURES
17
4. Rates and Adaptive Testing in the Gaussian Location Model.
No adaptive tests prior to this work have had precise rate characterization.
Moreover, optimally adaptive tests for 0 < β < 1 such as the Higher Criticism (HC) [11] test or the sign test of Arias-Castro and Wang (ACW) ([1],
Sec. 1.4)1 are not amenable to rate analysis based on current analysis techniques. This is due to the fact that the consistency proofs of these tests
follow from constructing functions of order statistics that grow slowly under
the null and slightly quicker under the alternative via a result of Darling
and Erdös [7]. We therefore analyze the max test:
(
1 maxi=1,...,n Xi ≥ τn
(4.1)
δmax (X1 , . . . , Xn ) ,
0 otherwise
where τn is a sequence of test thresholds.
While the max test is not consistent everywhere (2.7) is [1, 11], it has a few
advantages over other tests that are adaptive to all {(n , µn )} possible (i.e.
optimally adaptive). The first advantage is a practical perspective; the max
test requires a linear search and trivial storage complexity to find the largest
element in a sample, whereas computing the HC or ACW test requires on
the order of n log n operations to compute the order statistics of a sample of
size n (which may lead to non-trivial auxiliary storage requirements), along
with computations depending on Q-functions or partial sums of the signs of
the data. Moreover, the max test has been shown to work in applications
such as astrophysics [5]. It does not require specifying the null distribution,
which allows it to be applied to the Subbotin location models as in [1]. The
second advantage is analytical, as the cumulative distribution function of the
maximum of an i.i.d. sample of size n with cumulative distribution function
F (x) has the simple form of F (x)n . This also provides a simple way to set
the test threshold to meet a pre-specified false alarm probability for a given
sample size n. As most applications focus on the regime where n = n−β
for β > 21 , the following theorem shows the max test provides a simple test
with rate guarantees for almost the entire detectable region in this case.
√ Theorem 4.1. For the max test given by (4.1) with threshold τn =
2 log n:
The rate under the null is given by
(4.2)
1
lim
n→∞
log PFA (n)
1
=− .
log log n
2
We avoid the use of the acronym CUSUM since it is reserved for the most popular
test for the quickest change detection problem in Sequential Analysis.
18
J. G. LIGO ET AL.
Under the alternative, if lim inf n→∞ √
(4.3)
> 1 with n = n−β ,
log PMD (n)
√
= −1.
n→∞ nn Q( 2 log n − µn )
lim
In particular, if lim inf n→∞
rate under the alternative
(4.4)
µn
√
2(1− 1−β)2 log n
√ µn
2 log n
lim
n→∞
> 1, the max test achieves the optimal
log PMD (n)
= −1.
nn
Otherwise, the max test is not consistent.
Proof. The error probabilities for the max test given by (4.1) with
threshold τn
(4.5)
PFA (n) = 1 − Φ(τn )n
(4.6)
n
PMD (n) = (1 − n )Φ(τn ) + n Φ(τn − µn )
follow from the cumulative distribution function of the maximum of an i.i.d.
sample. The rates (4.2),(4.3),(4.4) as well as the condition for inconsistency
are derived by applying the approximation (3.36) to (4.5) and (4.6).
Fig 2: Detectable region of the Max test. White denotes where detection is
impossible for any test. Black denotes where the max test is inconsistent.
Green denotes where the max test is consistent, but has suboptimal rate
under the alternative compared to (2.7). Blue denotes where the max test
achieves the optimal rate under the alternative. Compare to Fig. 1a.
DETECTING SPARSE MIXTURES
19
The√results of Thm. 4.1 are summarized
in Fig. 2. In particular, if we take
√
µn = 2r log n with r ∈ (1 − 1 − β)2 , 1 , we see log PMD (n) scales on the
√
1−β−(1− r)2
n √ √
. This is suboptimal compared to the rates achieved by
order of (1−
r) 2 log n
the (non-adaptive) likelihood ratio test (2.7), but is of polynomial order (up
to a sub-logarithmic factor). Note that the rate of decay of the sum error
probability can be slower than that of the miss detection probability, since
the false alarm probability is fixed by the choice of threshold, independent
of the true {(n , µn )} for adaptivity.
5. Numerical Experiments. In this section, we provide numerical
simulations to verify the rate characterization developed for the Gaussian location model as well as some results comparing the performance of adaptive
tests.
5.1. Rates for the Likelihood Ratio Test. We first consider the dense case,
with n = n−0.4 and µn = 1. The conditions of Cor. 3.5 apply here, and we
(n)
expect log2 PFA
→ − 18 . Simulations were done using direct Monte Carlo
µ2
nn (e
n −1)
simulation with 10000 trials for the errors for n ≤ 106 . Importance sampling
via the hypothesis alternate to the true hypothesis (i.e. H0,n for simulating
(a) Simulations of error probabilities in
the Gaussian location model with µn =
1, n = n−0.4 for the test (2.7). A best
fit line for log PMD (n) is given as a blue
dashed line and corresponding line for
log PFA (n) is given as a red dot-dashed
line.
(b) Simulations of error probabilities in
the Gaussian location model with µn =
p
2(0.19) log n, n = n−0.6 for the test
(2.7). A best fit line for log PMD (n) is
given as a blue dashed line and corresponding line for log PFA (n) is given as
a red dot-dashed line.
Fig 3: Simulation results for Cor. 3.5 and 3.6
20
J. G. LIGO ET AL.
PMD (n), H1,n for simulations PFA (n)) was used for 106 < n ≤ 2 × 107 with
between 10000 − 15000 data points. The performance of the test given (2.7)
is shown in Fig. 3a. The dashed lines are the best fit lines between the log2
error probabilities and n2n (eµn − 1) using data for n ≥ 350000. By Cor. 3.5,
we expect the slope of the best fit lines to be approximately − 18 . This is the
case, as the line corresponding to missed detection has slope −0.13 and the
line corresponding to false alarm has slope −0.12.
p
The moderately sparse case with n = n−0.6 and µn = 2(0.19) log n
is shown in Fig. 3b. The conditions of Cor. 3.6 apply here, and we expect
log PFA (n)
→ − 18 . Simulations were performed identically to the dense case.
2 µ2
nn (e
n −1)
The dashed lines are the best fit lines between the log-error probabilities
2
and n2n (eµn − 1) using data for n ≥ 100000. By Cor. 3.6, we expect the
slope of the best fit lines to be approximately − 18 . Both best fit lines have
slope of −0.11. It is important to note that PFA (n), PMD (n) are both large
even at n = 2 × 107 and simulation to larger sample sizes should show better
agreement with Cor. 3.6.
5.2. Adaptive Testing. In order to implement an adaptive test, the threshold for the test statistic must be chosen in order to achieve a target false
alarm probability. This can be done analytically for the max test by inverting (4.5). For other tests, which do not have tractable expressions for the
false alarm probability, we set the threshold by simulating the test statistic
under the null. The threshold is chosen such that the empirical fraction of
exceedances of the threshold matches the desired false alarm. As expected,
the adaptive tests cannot match the rate under the null with non-trivial behavior under the alternative, and therefore we report the results for adaptive
tests at the standard 0.05 and 0.10 levels. The miss detection probabilities
reported for the max test were computed analytically via (4.6). Note that
the likelihood ratio test (2.7) with threshold set to meet a given false alarm
level is the oracle test which minimizes the miss detection probability [8].
As multiple definitions of the Higher Criticism test exist in literature, we
use the following version from [3]: Given a sample X1 , . . . , Xn , let pi = Q(Xi )
for 1 ≤ i ≤ n. Let {p(i) } denote {pi } sorted in ascending order. Then, the
higher criticism statistic is given by
(5.1)
i
− p(i)
√
HC∗n = max HCn,i where HCn,i = q n
n
1≤i≤n
p(i) (1 − p(i) )
and the null hypothesis is rejected when HC∗n is large. The HC test is optimally adaptive, i.e. is consistent whenever (2.7) is.
21
DETECTING SPARSE MIXTURES
The ACW test [1] is implemented as follows: Given the samples X1 , . . . , Xn ,
let X[i] denote the i-th largest sample by absolute value. Then,
Pk
∗
(5.2)
S = max
1≤k≤n
i=1 sgn(X[i] )
√
k
and the null hypothesis is rejected when S ∗ is large. The ACW test is adaptive for β > 12 . It is unknown how the ACW test behaves for β ≤ 12 . Note
that like the Max test (and unlike the HC test), the ACW test does not exploit exact knowledge of the null distribution (but assumes continuity and
symmetry about zero).
The performance of test (2.7) is summarized in Table 1 with a comparison
of adaptive tests in the moderately sparse example from the previous section
is given in Table 2. We used 115000 realizations of the null and alternative.
The sample sizes illustrated were chosen to be comparable with applications
of sparse mixture detection, such as the WMAP data in [5] which has n ≈
7 × 104 . Thus, our simulations provide evidence for both larger and smaller
sample sizes than used in practice. We see there is a large gap in performance
between the likelihood ratio test (2.7) and the adaptive tests, but the Higher
Criticism test performs significantly better than the Max or ACW tests.
LRT
PFA (n) PMD (n)
0.307
0.388
0.258
0.320
0.213
0.256
0.166
0.193
0.119
0.134
0.074
0.084
Table
1
p
Error probabilities for µn = 2(0.19) log n, n = n−0.6 for the LRT given by (2.7).
n
10
102
103
104
105
106
PFA = 0.10
ACW
LRT
Max
HC
0.807
0.665 0.744 0.666
0.816
0.542 0.704 0.630
0.792
0.417 0.672 0.561
0.751
0.281 0.639 0.491
0.685
0.158 0.603 0.396
0.602
0.064 0.562 0.295
Table
2
p
Miss Detection probabilities for µn = 2(0.19) log n, n = n−0.6 , for
probability 0.05 and 0.10.
n
10
102
103
104
105
106
LRT
0.776
0.667
0.548
0.403
0.252
0.119
PFA = 0.05
Max
HC
0.845 0.790
0.814 0.775
0.789 0.728
0.762 0.688
0.733 0.623
0.699 0.546
ACW
0.706
0.722
0.653
0.617
0.539
0.446
False Alarm
22
J. G. LIGO ET AL.
LRT
PFA (n) PMD (n)
1.62e-1
2.75e-1
6.31e-2
1.12e-1
7.63e-3
1.36e-2
5.38e-5
8.83e-5
Table 3
p
Error probabilities for µn = 2(0.66) log n, n = n−0.6 for the LRT given by (2.7).
n
10
102
103
104
PFA = 0.10
ACW
LRT
Max
HC
5.88e-1
3.59e-1 4.36e-1 3.38e-1
4.80e-1
8.45e-2 1.61e-1 1.07e-1
1.33e-1
1.89e-3 1.80e-2 4.20e-3
4.43e-3
7.10e-8 1.32e-4 ≤ 1e-5
Table
4
p
Miss Detection probabilities for µn = 2(0.66) log n, n = n−0.6 for False
probability 0.05 and 0.10.
n
10
102
103
104
LRT
4.66e-1
1.28e-1
3.69e-3
2.12e-7
PFA = 0.05
Max
HC
5.66e-1 7.18e-1
2.56e-1 6.24e-1
4.40e-2 2.48e-2
8.08e-4 ≤ 1e-5
ACW
5.88e-1
4.80e-1
1.33e-1
1.25e-3
Alarm
p
For the case of strong signals, we calibrate as µn = 2(0.66) log n for n =
n−0.6 . This corresponds to the rates given by Thm. 3.3. The performance of
test (2.7) is summarized in Table 3 with a comparison of adaptive tests in
the moderately sparse example from the previous section is given in Table 4.
Here we used 180000 realizations of the null and alternative. As even the
max test has error probabilities sufficiently small for many applications in
this regime at moderate sample sizes (which are still on the order used in
applications [5]), we only consider sample sizes up to n = 104 . We see that
in the strong signal case, the likelihood ratio test performs better than the
adaptive tests, but all tests produce sufficiently small error probabilities for
most applications.
6. Conclusions and Future Work. In this paper, we have presented
an rate characterization for the error probability decay with sample size
in a general mixture detection problem for the likelihood ratio test. In the
Gaussian location model, we explicitly showed that the rate characterization
holds for most of the detectable region. A partial rate characterization (an
upper bound on the rate under both hypotheses and universal lower bound
on the rate under H1,n ) was provided for the remainder of the detectable
region. In contrast to usual large deviations results [6, 8] for the decay of
error probabilities, our results show that the log-probability of error decays
sublinearly with sample size.
There are several possible extensions of this work. One is to provide corresponding lower bounds for the rate in cases not covered by Thm 3.1.
DETECTING SPARSE MIXTURES
23
Another is to provide a general analysis of the behavior that is not covered
by Thm 3.1 and 3.3, present in Thm 3.8 in the Gaussian location model.
As noted in [3], in some applications it is natural to require PFA (n) ≤ α
for some fixed α > 0, rather than requiring PFA (n) → 0. While Thm 3.4
shows the detectable region is not enlarged under in the Gaussian location
model (and similarly for some general models [4]), it is conceivable that the
oracle optimal test which fixes PFA (n) (i.e. one which compares LLR(n) to
a non-zero threshold) can achieve a better rate for PMD (n). It is expected
that the techniques developed in this paper extend to the case where PFA (n)
is constrained to a level α. In the Gaussian location model, the analysis of
(2.7) constrained to level α problem has been studied in [16] via contiguity
arguments.
Finally, it is important to develop tests that are amenable to a rate analysis and are computationally simple to implement over 0 < β < 1. In the
case of weak signals in the Gaussian location model, we see that the error
probabilities for the likelihood ratio test, which establish the fundamental
limit on error probabilities, decay quite slowly even with large sample sizes.
In this case, closing the gap between the likelihood ratio test and adaptive
tests is important for applications where it is desirable to have high power
tests. In the case of strong signals, we see the miss detection probability for
even the simplest adaptive test, the max test, are very small for moderate
sample sizes at standard false alarm levels so the rate of decay is not as
important as the weak signal case for applications.
SUPPLEMENTARY MATERIAL
Supplemental Material for “Detecting Sparse Mixtures: Rate of
Decay of Error Probability”
(doi: COMPLETED BY THE TYPESETTER; .pdf). We provide details of
proofs of the main theorems.
References.
[1] Arias-Castro, E. and Wang, M. (2013). Distribution-free tests for sparse heterogeneous mixtures. arXiv preprint arXiv:1308.0346 [math.ST].
[2] Arias-Castro, E. and Wang, M. (2015). The sparse Poisson means model. Electron.
J. Statist. 9 2170–2201. MR3406276
[3] Cai, T. T., Jeng, X. J. and Jin, J. (2011). Optimal detection of heterogeneous and
heteroscedastic mixtures. Journal of the Royal Statistical Society: Series B (Statistical
Methodology) 73 629–662. MR2867452
[4] Cai, T. T. and Wu, Y. (2014). Optimal Detection of Sparse Mixtures Against a
Given Null Distribution. IEEE Trans. Info. Theory 60 2217–2232. MR3181520
[5] Cayon, L., Jin, J. and Treaster, A. (2005). Higher Criticism statistic: detecting
and identifying non-Gaussianity in the WMAP first-year data. Monthly Notices of
the Royal Astronomical Society 362 826–832.
24
J. G. LIGO ET AL.
[6] Cover, T. M. and Thomas, J. A. (2006). Elements of Information Theory. NY:
John Wiley and Sons, Inc. MR2239987
[7] Darling, D. A. and Erdös, P. (1956). A limit theorem for the maximum of normalized sums of independent random variables. Duke Math. J. 23 143–155. MR0074712
[8] Dembo, A. and Zeitouni, O. (2010). Large deviations techniques and applications
38. Springer Science & Business Media. MR2571413
[9] den Hollander, F. (2008). Large deviations 14. American Mathematical Soc.
MR1739680
[10] Dobrushin, R. L. (1958). A statistical problem arising in the theory of detection
of signals in the presence of noise in a multi-channel system and leading to stable
distribution laws. Theory of Probability & Its Applications 3 161–173.
[11] Donoho, D. and Jin, J. (2004). Higher criticism for detecting sparse heterogeneous
mixtures. Ann. Statist. 32 962–994. MR2065195
[12] Donoho, D. and Jin, J. (2008). Higher criticism thresholding: Optimal feature selection when useful features are rare and weak. Proceedings of the National Academy
of Sciences 105 14790–14795.
[13] Durrett, R. (2010). Probability: Theory and Examples, 4 ed. Cambridge University
Press. MR2722836
[14] Gibbs, A. L. and Su, F. E. (2002). On choosing and bounding probability metrics.
International statistical review 70 419–435.
[15] Goeman, J. J. and Bühlmann, P. (2007). Analyzing gene expression data in terms
of gene sets: methodological issues. Bioinformatics 23 980–987.
[16] Ingster, Y. and Suslina, I. A. (2003). Nonparametric goodness-of-fit testing under
Gaussian models 169. Springer Science & Business Media. MR1991446
[17] Jager, L. and Wellner, J. A. (2007). Goodness-of-fit tests via phi-divergences.
Ann. Statist. 35 2018–2053. MR2363962
[18] Lehmann, E. L. and Romano, J. P. (2006). Testing statistical hypotheses. Springer
Science & Business Media. MR2135927
[19] Ligo, J. G., Moustakides, G. V. and Veeravalli, V. V. (2016). Rate analysis for
detection of sparse mixtures. In 2016 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP) 4244-4248.
[20] Mossel, E. and Roch, S. (2015). Distance-based species tree estimation:
information-theoretic trade-off between number of loci and sequence length under
the coalescent. In Approximation, randomization, and combinatorial optimization.
Algorithms and techniques. LIPIcs. Leibniz Int. Proc. Inform. 40 931–942. Schloss
Dagstuhl. Leibniz-Zent. Inform.,Wadern,DE. MR3442006
[21] Poor, H. V. (1994). An Introduction to Signal Detection and Estimation, 2 ed.
Springer, New York, NY. MR1270019
[22] Saligrama, V. and Zhao, M. (2012). Local Anomaly Detection. In 2012 International Conference on Artificial Intelligence and Statistics (AISTATS) 969–983.
[23] Walther, G. (2013). The average likelihood ratio for large-scale multiple testing and
detecting sparse mixtures. In From probability to statistics and back: high-dimensional
models and processes. Inst. Math. Stat. (IMS) Collect. 9 317–362. Inst. Math. Statist.,
Beachwood, OH. MR3202643
DETECTING SPARSE MIXTURES
Coordinated Science Laboratory
and
Department of Electrical and
Computer Engineering
University of Illinois at
Urbana-Champaign
Urbana, IL 61801, USA
E-mail: [email protected]
[email protected]
25
Department of Electrical and
Computer Engineering
University of Patras
26500 Rio, Greece
and
Department of Computer Science
Rutgers University
New Brunswick, NJ 08854, USA
E-mail: [email protected]
Submitted
arXiv: 1509.07566
SUPPLEMENTAL MATERIAL FOR:
“DETECTING SPARSE MIXTURES: RATE OF DECAY OF
ERROR PROBABILITY”
By Jonathan G. Ligok , George V. Moustakides†† and Venugopal
V. Veeravallik
University of Illinois at Urbana-Champaignk , University of Patras†† and
Rutgers University††
7. Weak Signals: Supporting Lemmas. In this section, we provide
the proofs of the lemmas that are necessary for establishing the validity of
Theorem 3.1.
Lemma 7.1. Under the assumptions of Theorem 3.1, there exist positive
constants C1 , C2 such that for sufficiently large n we have
C1 2n Dn2 ≥ σn2 ≥ C2 2n Dn2 ,
where σn2 is defined in (3.11).
Proof. We first show that for sufficiently large n,
(7.1)
C1 ≥
σn2 Λn (sn )
.
2n Dn2
Note that
(log (1 + x))2 (1 + x)s ≤ 2x2 for s ∈ (0, 1) , x ≥ 1.
√
This follows from 0 ≤ log (1 + x) ≤ x for x ≥ 0 and 1 ≤ (1 + x)s ≤ 2x for
x ≥ 1 and s ∈ (0, 1). Also, note Λn (0) = Λn (1) = 1 implying sn ∈ (0, 1) by
convexity of Λn (Lemma 2.2.5, [8]).
For shorthand, we will write Ln = Ln (X1 ). Then,
h
i
Λn (sn )σn2 = E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn
h
i
= E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)>1}
h
i
(7.3)
+ E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤1}
(7.2)
¶
Supported by the US National Science Foundation under grants CIF 1514245 and
CIF 1513373.
1
2
J. G. LIGO ET AL.
We first consider E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)>1} .
By (7.2), we have on the event {n (Ln − 1) > 1} that
log (1 + n (Ln − 1))
2
1 + n (Ln − 1)
sn
≤ 2 n (Ln − 1)
2
.
Thus,
(7.4) E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)>1}
≤ E0 2 (n (Ln − 1))2 1{n (Ln −1)>1} ≤ 22n E0 (Ln − 1)2 = 22n Dn2 .
We now consider
h
i
E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤1} .
A simple calculus argument shows that (log (1 + x))2 ≤ 5x2 for x ≥ − 12 .
Note that since Ln ≥ 0, −n ≤ n (Ln − 1). Because n → 0, for sufficiently
large n we have that n < 12 and (log (1 + n (Ln − 1)))2 ≤ 5 (n (Ln − 1))2
holds. Also, (1 + n (Ln − 1))sn ≤ 2sn ≤ 2 on the event {n (Ln − 1) ≤ 1}.
Thus,
h
i
(7.5) E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤1}
h
i
h
i
≤ E0 10 (n (Ln − 1))2 1{n (Ln −1)≤1} ≤ 10 E0 (n (Ln − 1))2 = 10 2n Dn2 .
Using (7.4),(7.5) in (7.3), we see for sufficiently large n that
Λn (sn )σn2 ≤ 122n Dn2
establishing (7.1).
We now show that
(7.6)
C2 ≤
σn2 Λn (sn )
.
2n Dn2
DETECTING SPARSE MIXTURES”
3
Taking any γ < 12 , from Equation (3.1) of Theorem 3.1,
h
i
Λn (sn )σn2 = E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn
h
i
≥ E0 (log (1 + n (Ln − 1)))2 (1 + n (Ln − 1))sn 1{n (Ln −1)≤γ}
1
(7.7)
1{n (Ln −1)≤γ}
≥ E0 (log (1 + n (Ln − 1)))2
2
h
i
1
≥ E0 (n (Ln − 1))2 1{n (Ln −1)≤γ}
(7.8)
4
"
#
(n (Ln − 1))2
Dn2
E0
1{n (Ln −1)≤γ}
=
4
Dn2
#
"
Dn2
(n (Ln − 1))2
=
E0
1{Ln ≤1+ γ }
n
4
Dn2
#!
"
Dn2 2n
(Ln − 1)2
(7.9)
=
1 − E0
1{Ln ≥1+ γ }
n
4
Dn2
Where (7.7) follows from (1 + n (Ln − 1))sn ≥ (1 − n )sn ≥ 1 − n ≥ 12 for
sufficiently large n, as sn ∈ (0, 1) and n → 0. A simple calculus argument
shows that 12 x2 ≤ (log (1 + x))2 for x ∈ [− 21 , 12 ]. This, along the fact that
with − 12 < −n ≤ n (Ln − 1) ≤ γ < 12 on the event {n (Ln − 1) ≤ γ} for
sufficiently large n establishes (7.8). The definition of Dn2 furnishes (7.9).
2
Noting that E0 [ (LnD−1)
1{Ln ≥1+ γ } ] → 0 by the assumptions of Thm 2.1 in
2
n
n
the main text, (7.6) is established.
In order to remove the Λn (sn ) factor from the bounds, note that Λn (sn ) ≤
Λn (1) ≤ 1 and that Λn (s) ≥ (1 − n )s ≥ 21 for sufficiently large n. This along
with (7.1) and (7.6) establishes the lemma.
This lemma is established identically under H1,n by applying a change of
measure to P0,n (which replaces sn with 1 − sn in the argument above).
Lemma 7.2. Under the assumptions of Theorem 3.1, if we use the tilted
measure, we have
(7.10)
1
P̃ LLR (n) ≥ 0 →
2
as n → ∞.
Proof. For the proof, we will need the Lindeberg-Feller Central Limit
Theorem whose validity is demonstrated in Theorem 3.4.5, [13]:
4
J. G. LIGO ET AL.
Theorem 7.3. For each n, let Zn,i , 1 ≤ i ≤ n, be independent zero-mean
random variables. Suppose
n
X
2
lim
E Zn,i
= σ2 > 0
(7.11)
n→∞
i=1
and for all γ > 0,
n
h
i
X
lim
E |Zn,i |2 1{|Zn,i |>γ} = 0
(7.12)
n→∞
i=1
Then, Sn = Zn,1 + . . . + Zn,n converges in distribution to the normal
distribution with mean zero and variance σ 2 as n → ∞.
Let us now continue with the proof of Lemma 7.2. We draw i.i.d. {Xi }ni=1
from H0,n . Define for 1 ≤ m ≤ n
ξn,i
.
ξn,i = log 1 + n Ln (Xi ) − 1 , Zn,i = √
nσn
(7.13)
Note that
n
X
(7.14)
i=1
LLR(n)
Zn,i = √
.
nσn
Pn
We show i=1 Zn,i converges to a standard normal distribution under the
2 ] = 1.
tilted measure. As stated in the main text, Ẽ [Zn,i ] = 0 and Ẽ[Zn,i
n
Thus, (7.11) is satisfied with σ 2 = 1.
It remains to check (7.12). Since for fixed n, the Zn,i are i.i.d, it suffices
to verify that
#
"
2
2
ξn,1
Ẽ nZn,1 1{|Zn,1 |>γ} = Ẽ
1 2
→ 0,
σn2 { ξn,12 >γ 2 }
nσn
n → ∞. To simplify notation, let Ln = Ln (X1 ). By Lemma 7.1, it suffices
to show that
"
#
2
ξn,1
Ẽ 2 2 1 ξn,1
→0
2
n Dn { 2 2 >nγ 2 }
C2 n Dn
which changing to the P0 measure is equivalent to showing that for 0 < γ <
γ0
"
#
2
ξn,1
sn
→0
(7.15)
E0 2 2 (1 + n (Ln − 1)) 1 ξn,1
2
2
n Dn
{
2 2 >nγ }
C2 n Dn
DETECTING SPARSE MIXTURES”
5
since Λn (sn ) ∈ [ 12 , 1] for sufficiently large n.
We decompose (7.15) into
#
2
ξn,1
sn
(7.16) E0 2 2 (1 + n (Ln − 1)) 1 ξn,1
2
2
n Dn
{
2 >nγ }
C2 2
n Dn
"
#
2
ξn,1
= E0 2 2 (1 + n (Ln − 1))sn 1 ξn,1
2
2
n Dn
{
2 >nγ ,n (Ln −1)>1}
C2 2
n Dn
"
#
2
ξn,1
sn
+ E0 2 2 (1 + n (Ln − 1)) 1 ξn,1
2
2
n Dn
{
2 2 >nγ ,n (Ln −1)≤1}
"
C2 n Dn
and show that both parts in (7.16) tend to zero. For the first part applying
2
(7.2) and log(1 + x) ≤ x for x > 0,
"
#
2
ξn,1
sn
E0 2 2 (1 + n (Ln − 1)) 1 ξn,1
2
2
n Dn
{
2 >nγ ,n (Ln −1)>1}
C2 2
n Dn
#
"
22n (Ln − 1)2
≤ E0
1{ 2n (Ln −1)2 >nγ 2 , (L −1)>1}
n n
2n Dn2
2
C2 2
n Dn
(Ln − 1)2
√
= 2E0
1{ Ln√−1 >γ n,n (Ln −1)>1}
Dn2
Dn C2
2
(Ln − 1)
√ √
γ
1
≤ 2E0
{Ln >1+ C2 nDn n }
n
Dn2
2
(Ln − 1)
≤ 2E0
1{Ln >1+ γ } → 0
n
Dn2
√
where the last inequality holds because
nDn n → ∞ we can conclude
√ from
√
that for sufficiently large n we have C2 nDn n ≥ 1.
We now show that the second part in (7.16) tends to zero as well. We
observe that since Ln ≥ 0 we have −n ≤ n (Ln − 1). Using (log(1 + x))2 ≤
5x2 for x ≥ − 21 , and that (1 + n (Ln − 1))sn ≤ 2sn ≤ 2 on the event
6
J. G. LIGO ET AL.
{n (Ln − 1) ≤ 1}, we see that for n sufficiently large such that n < 21 ,
"
#
2
sn
ξn,1
E0 2 2 1 + n (Ln − 1) 1 ξn,1
2
2
n Dn
{
2 >nγ ,n (Ln −1)≤1}
C2 2
n Dn
"
#
2n (Ln − 1)2
≤ 10E0
1{ 52n (Ln −1)2 >nγ 2 , (L −1)≤1}
n n
2n Dn2
2
C2 2
n Dn
2
(Ln − 1)
q
≤ 10E0
1
C2 √
{|Ln −1|>
nDn γ}
Dn2
5
2
(Ln − 1)
q
= 10E0
1
C2 √
nDn γ}
{Ln >1+
Dn2
5
2
(Ln − 1)
≤ 10E0
1{Ln >1+ γ }
n
Dn2
√
The last equality follows from the fact that nn Dn → ∞, since this im√
plies that nDnq→ ∞, which suggests that for large
enough n we cannot
q √
C2 √
C2
have 1 − Ln >
nDn γ but only Ln − 1 >
nDn γ. Finally the
5
q5 √
last inequality is true for large enough n such that C52 nDn n ≥ 1, which
is always possible since this quantity tends to infinity because of our assumption in (3.3). Thus, (7.15) holds and the Lindeberg-Feller CLT shows
√
that LLR(n)
converges to a standard normal distribution under the tilted
nσn
measure. Therefore,
LLR(n)
1
(7.17)
P̃ [LLR(n) ≥ 0] = P̃ √
≥0 →
2
nσn
as n → ∞ establishing the lemma.
Verifying the Lindeberg-Feller CLT conditions for analyzing PMD is done
by changing from the P1 to the P0 measure.
Lemma 7.4.
(7.18)
Under the assumptions of Theorem 3.1 we have
lim inf
n→∞
log Λn (sn )
1
≥− .
2n Dn2
8
Proof. Consider the function (1 + x)s for s ∈ (0, 1) and x ∈ [−γ, γ]
where 0 < γ < 1. Then
1
1 (1 − s) (2 − s) 3
x
(1 + x)s = 1 + sx + s (s − 1) x2 +
2
6 (1 + ξ)3−s
1
1
γ
(7.19)
≥ 1 + sx − x2 −
x2 = 1 + sx − ω(γ)x2 ,
8
3 (1 − γ)3
DETECTING SPARSE MIXTURES”
where we define ω(γ) =
1
8
+
γ
1
3 (1−γ)3 .
7
The first equality holds for some
ξ ∈ [−γ, γ] by the mean value form of Taylor’s theorem. The inequality is obtained by minimizing the coefficient of x2 while for the last term we observe
that since x ≥ −γ we have x3 ≥ −γx2 ; furthermore (1 + ξ)3−s ≥ (1 − γ)3
and (1 − s)(2 − s) ≤ 2. When we substitute the previous inequalities we
obtain the lower bound in (7.19).
Using this, we can lower bound Λn (s) for all s ∈ (0, 1). Fix 0 < γ < 1. As
before, we will use the shorthand Ln = Ln (X1 ). Then, for sufficiently large
n we have n < γ suggesting that −γ ≤ n (Ln − 1). Therefore using (7.19)
and assuming n sufficiently large we can write
Λn (s) = E0 [(1 + n (Ln − 1))s ]
≥ E0 (1 + n (Ln − 1))s 1{n (Ln −1)≤γ}
≥ E0 (1 + sn (Ln − 1)) 1{n (Ln −1)≤γ} − ω(γ)2n Dn2
= 1 − ω(γ)2n Dn2 − E0 (1 + sn (Ln − 1)) 1{n (Ln −1)≥γ}
≥ 1 − ω(γ)2n Dn2 − E0 (1 + n (Ln − 1)) 1{n (Ln −1)≥γ}
1
1 2
2 2
2
≥ 1 − ω(γ)n Dn − E0
+
(Ln − 1) 1{n (Ln −1)≥γ}
γ2 γ n
(Ln − 1)2
2
γ
1{Ln ≥1+ } 2n Dn2
≥ 1 − ω(γ) + 2 E0
n
γ
Dn2
2
≥ 1 − ω(γ) + 2 γ 3 2n Dn2 ,
γ
where in the second equality we used the fact that E0 [Ln − 1] = 0 and
in the third inequality we replaced the maximum values of s = 1. In the
fourth inequality we used the property that on the set {Ln ≥ 1 + γn } we can
write γ12 2n (Ln − 1)2 ≥ 1 and γ1 2n (Ln − 1)2 ≥ n (Ln − 1). Finally in the last
inequality using the condition of Theorem 3.1 and assuming n sufficiently
large the expectation becomes smaller than γ 3 .
Using the previous result we obtain
log 1 − (ω(γ) + 2γ)2n Dn2
log Λn (sn )
lim inf
≥ lim inf
= −(ω(γ) + 2γ),
n→∞
n→∞
2n Dn2
2n Dn2
where for the equality we used the limit log(1−x)
→ −1 as x → 0 and the
x
assumption that n Dn → 0. Letting γ → 0 establishes the lemma since
ω(0) = 18 .
The proof is identical under H1,n , where the analogue of the lemma is
n)
lim inf n→∞ Λn(1−s
≥ − 18 .
2 D2
n
n
8
J. G. LIGO ET AL.
8. Moderate Signals: Gaussian Location Model. Assume
> 12 . Recall from the proof of Thm 3.1
hp
in
(8.1)
PFA (n) ≤ E0
1 − n + n Ln (X1 )
β
2r
3
2
>
and
hp
i
1
(8.2) E0
1 − n + n Ln (X1 ) = 1− E0
2
"
#
2n (Ln (X1 ) − 1)2
p
2 .
1 + 1 + n (Ln (X1 ) − 1)
We√write the observations as a multiple of µn , X = αµn . Then, taking
µn = 2r log n, we have
2
Ln (x) = e−µn /2+µn x = nr(2α−1) .
(8.3)
In view of (8.3),
n (Ln − 1) = nr(2α−1)−β − n−β .
(8.4)
Thus, if r(2α − 1) − β > 0 we have n (Ln − 1) → ∞ and if r(2α − 1) − β < 0
we have n (Ln − 1) → 0 as n → ∞.
2
2
3
β
Let κ = 2r
+ 12 . Note (1+√x1+x)2 ≥ x4 − x8 for x ≥ −1. Thus, on the event
{X1 < κµn },
2n (Ln (X1 ) − 1)2 3n (Ln (X1 ) − 1)3
2n (Ln (X1 ) − 1)2
≥
−
p
2
4
8
1 + 1 + n (Ln (X1 ) − 1)
(1 − n−β )
2
2 1
(8.5)
≥ n (Ln (X1 ) − 1)
−
4
8
2
2
(Ln (X1 ) − 1)
(8.6)
≥ n
8
where (8.5) follows from −1 ≤ −n ≤ n (Ln (X1 ) − 1) ≤ 1 − n−β on {X1 <
κµn }, and (8.6) follows from non-negativity of the terms involved. Then,
"
#
2n (Ln (X1 ) − 1)2
E0
p
2
1 + 1 + n (Ln (X1 ) − 1)
"
#
2n (Ln (X1 ) − 1)2
(8.7)
≥ E0
p
2 1{X1 <κµn }
1 + 1 + n (Ln (X1 ) − 1)
(8.8)
(8.9)
2n
E0 [(Ln (X1 ) − 1)2 1{X1 <κµn } ]
8
2 2
= n eµn Φ((κ − 2)µn ) − 2Φ((κ − 1)µ) + Φ(κµ)
8
≥
9
DETECTING SPARSE MIXTURES”
where (8.7) follows from non-negativity, (8.8) follows from (8.6) and Φ denotes the standard normal cumulative distribution function.
2
By the standard approximation Q(x) ≈ x√12π e−x /2 , we see that the domi2
nant term in (8.9) is 2n eµn Φ((κ−2)µn )/8 and is of the order of
β
which tends to zero by our assumption on 2r
. Thus, as in the proof of Thm
3.1, by (8.1)
log PFA (n)
2n µ2n
≤ log 1 −
e Φ((κ − 2)µn ) − 2Φ((κ − 1)µ) + Φ(κµ) .
n
16
2
Dividing both sides by 2n eµn Φ((κ − 2)µn ) and taking a lim sup yields
lim sup
n→∞
log PFA (n)
µ
2
nn e 2n Φ((κ − 2)µn )
2
≤−
2
n−2β+2r−r(1.5−β/2r)
√
2r log n
1
.
16
For consistency, it suffices to require n2n eµn Φ((κ − 2)µn ) → ∞. Thus, it
2
√
β
suffices to require 1 − 2β + 2r − r 32 − 2r
> 0, since log n is negligible
with respect to any positive power of n. Combining the constraints −2β +
2
2
β
β
β
< 0, 1 − 2β + 2r − r 32 − 2r
> 0, 23 > 2r
> 12 gives the
2r − r 32 − 2r
desired rate characterization.
The proof for PMD is identical. Note that this bound is likely not tight
(even if it has the right order), since we neglected the event {X1 ≥ κµn } to
form the bound.
10
Coordinated Science Laboratory
and
Department of Electrical and
Computer Engineering
University of Illinois at
Urbana-Champaign
Urbana, IL 61801, USA
E-mail: [email protected]
[email protected]
J. G. LIGO ET AL.
Department of Electrical and
Computer Engineering
University of Patras
26500 Rio, Greece
and
Department of Computer Science
Rutgers University
New Brunswick, NJ 08854, USA
E-mail: [email protected]
| 10math.ST
|
Short-term Memory of Deep RNN
arXiv:1802.00748v1 [cs.LG] 2 Feb 2018
Claudio Gallicchio
Department of Computer Science, University of Pisa
Largo Bruno Pontecorvo 3 - 56127 Pisa, Italy
Abstract. The extension of deep learning towards temporal data processing is gaining an increasing research interest. In this paper we investigate the properties of state dynamics developed in successive levels of
deep recurrent neural networks (RNNs) in terms of short-term memory
abilities. Our results reveal interesting insights that shed light on the nature of layering as a factor of RNN design. Noticeably, higher layers in a
hierarchically organized RNN architecture results to be inherently biased
towards longer memory spans even prior to training of the recurrent connections. Moreover, in the context of Reservoir Computing framework,
our analysis also points out the benefit of a layered recurrent organization
as an efficient approach to improve the memory skills of reservoir models.
1
Introduction
Deep learning is an attractive area of research in constant growth [1]. In particular, in the neuro-computing field, the study of deep neural networks composed
by multiple non-linear layers has proved able to learn feature representations at
progressively higher levels of abstraction, leading to eminent performance e.g.
in vision tasks. Extending the benefits of depth to recurrent neural networks
(RNNs) is an intriguing research direction that is recently gaining an increasing attention [2]. In this context, the study of deep RNNs has pointed out
that hierarchically organized recurrent models have the potentiality of developing multiple time-scales representations of the input history in their internal
states, which can be of great help, e.g., when dealing with text processing tasks
[3]. More recently, studies in the area of Reservoir Computing (RC) [4, 5] have
shown that the ability of developing such a structured state space organization
is indeed an intrinsic property of layered RNN architectures [6, 7]. The study
of deep RC networks on the one hand allowed the development of efficiently
trained deep models for learning in the temporal domain, and on the other hand
it paved the way to further studies on the properties of deep RNNs dynamics
even in the absence of (or prior to) learning of the recurrent connections.
An aspect of prominent relevance in the study of dynamical models is represented by the analysis of their memory abilities. In this paper, exploiting the
ground provided by the deep RC framework, we explicitly address the problem
of analyzing the short-term memory capacity of individual (progressively higher)
layers in deep recurrent architectures. Contributing to highlight the intrinsic diversification of transient state dynamics in hierarchically constructed recurrent
networks, our investigation aims at shedding more light on the bias of layering
in the RNN architectural design. Framed in the RC area, our analysis is also
intended to provide insights on the process of reservoir network construction.
2
Deep Stacked RNN
We consider deep RNNs [3] whose recurrent architecture is obtained by a stacked
composition of multiple non-linear recurrent hidden layers, as illustrated in
Fig. 1. The state computation proceeds by following the hierarchical network
organization, from the lowest layer to the highest one. Specifically, at each time
step t the first recurrent layer in the network is fed by the external input while
each successive layer is fed by the activation of the previous one.
Fig. 1: Hierarchical organization of hidden layers in a deep RNN.
Under a dynamical system perspective, a deep RNN implements an inputdriven discrete-time non-linear dynamical system, in which the state evolution
in each layer i is ruled by a state transition function F (i) . Here we denote the
input dimension by NU and assume, for the sake of simplicity, that each hidden
layer contains NR recurrent units. In the following, we use u(t) and x(i) (t),
respectively, to indicate the external input and state of i-th hidden layer at time
step t. Based on this notation, the state in the first layer is updated according
to the following equation:
x(1) (t) = F (1) (u(t), x(1) (t − 1)) = tanh(W(1) u(t) + Ŵ(1) x(1) (t − 1)),
(1)
where W(1) ∈ RNR ×NU is the input weight matrix and Ŵ(1) ∈ RNR ×NR is the
recurrent weight matrix for the first layer. For each successive layer i > 1, the
state is updated according to:
x(i) (t) = F (i) (x(i−1) (t), x(i) (t−1)) = tanh(W(i) x(i−1) (t)+ Ŵ(i) x(i) (t−1)), (2)
where W(i) ∈ RNR ×NR collects the weights for the inter-layer connections from
layer i − 1 to layer i and Ŵ(i) ∈ RNR ×NR is the recurrent weight matrix for
layer i. Note that in both above eq. 1 and 2, a tanh non-linearity is used as
element-wise applied activation function of recurrent units and bias terms are
omitted for the ease of notation. Here it is also worth observing that, although
the deep recurrent dynamics globally evolve as a whole, locally to each layer i
the state information coming from the previous level i − 1 actually acts as an
independent input information that encodes the history of the external input up
to the present time step.
Taking aside the aspects related to learning of the recurrent connections (and
the specific aspects involved by different training strategies), here we focus our
analysis on the case of untrained deep recurrent dynamics. To do so, we resort to
the recently introduced deep RC framework [6], according to which the recurrent
part of the deep RNN architecture is left untrained after initialization subject to
stability constraints [7]. Specifically, the network is initialized with weights from
a uniform distribution in [−1, 1] and then re-scaled to control for each layer i
the values of kW(i) k2 and ρ(Ŵ(i) ), where ρ(·) denotes the spectral radius of its
matrix argument (i.e. the maximum among the eigenvalues magnitudes). These
quantities are hyper-parameters of the model that influence its state dynamics
and that are typically set to small values in order to guarantee a stable regime,
a standard initialization approach also for trained networks. Notice that this
framework allows us on the one hand to investigate the fixed characterization of
state dynamics in successive levels of a deep RC network, and on the other hand
to study of the bias due to layering in deep recurrent architectures.
Output computation is implemented by using an output layer of size NY .
Though different choices are possible for the state-output connection settings
(see e.g. [3, 8]), following from our analysis aims here we consider output modules
that are individually applied to each layer of the recurrent network. This enables
us to study separately the characteristics of the state behavior emerging at the
different levels in the architecture. We use linear output modules, such that for
(i)
each layer i the output is computed as y(i) (t) = Wout x(i) (t), where matrices
(i)
NY ×NR
are trained for each layer individually, using a direct method
Wout ∈ R
such as pseudo-inversion. In the RC framework this setting also ensures the
same training cost for every layer.
3
Experiments
We investigate the short-term memory abilities of deep RNN architectures by
resorting to the Memory Capacity (MC) task [9]. This aims at measuring the
extent to which past input events can be recalled from present state activations.
Specifically, the recurrent system is tested in its ability to reconstruct delayed
versions of a stationary uni-variate driving input signal (NU = NY = 1), with
the MC at layer i computed as a squared correlation coefficient, as follows:
M C (i) =
∞
X
k=1
(i)
M Ck =
∞
(i)
X
Cov 2 (u(t − k), yk (t))
(i)
k=1
V ar(u(t)) V ar(yk (t))
,
(3)
(i)
where yk (t) is the activation of the output unit trained to reconstruct the u(t−k)
signal from the state of layer i, while Cov and V ar respectively denote the
covariance and variance operators. In order to maximally exercise the memory
capability of the systems, we used i.i.d. input signals from a uniform distribution
in [−0.8, 0.8], i.e. an unstructured temporal stream in which u(t) does not carry
information on previous inputs . . . , u(t−2), u(t−1). For this task, we considered
a 6000 time-step long sequence, where the first 5000 time steps were used for
training1 and the remaining 1000 for MC assessment.
1 The
first 1000 time steps were considered as transient to washout the initial conditions.
We considered deep RNNs with NL = 10 recurrent layers, each of which
containing NR = 100 recurrent units. Input and inter-layer weights were rescaled such that kW(i) k2 = 1 for i = 1, . . . , NL . Weights of recurrent connections
were re-scaled to the same spectral radius in all the layers, i.e. ρ = ρ(Ŵ(i) ) for
i = 1, . . . , NL , with ρ values ranging in [0.1, 1.5]. Note that, under the considered
experimental settings, for higher values of ρ > 1 the network dynamics tend
to exhibit a chaotic behavior, as shown in previous works in terms of local
Lyapunov exponents [10, 11]. Although recurrent dynamics in chaotic regimes
are generally not interesting under a practical point of view, in this paper we
consider also these cases (ρ > 1) for the scope of analysis. For each choice of
ρ we independently generated 50 networks realizations (with different seeds for
random generation), and averaged the achieved results over such realizations.
For practical assessment of the MC values, it is useful to recall a basic theoretical result provided in [9], which states that the MC of an NR -dimensional
recurrent system driven by an i.i.d. uni-variate input signal is upper bounded
by NR . Accordingly, we considered a maximum value for the delay k in eq. 3
equal to twice the size of the state space, i.e. 200, which is sufficient to account
for the correlations that are practically involved in our experimental settings.
Fig. 2 shows the MC values achieved in correspondence of progressively
higher layers in the architecture, and for the different cases of ρ considered for
network initialization. Results clearly point out that for recurrent networks in
the ordered regime (ρ not exceeding 1) higher layers in the deep architecture are
naturally biased toward progressively longer short-term memory abilities. For
networks in a chaotic regime (ρ above 1) higher layers tend to show a poorer
MC. The MC performance shown in Fig. 2 has a peak in correspondence of
50
45
(i)
9
40
8
35
Layer (i)
Memory Capacity (MC )
10
7
30
6
25
5
20
4
15
3
10
2
5
1
0.2
0.4
0.6
0.8
1
1.2
1.4
Spectral Radius ( )
Fig. 2: MC of different layers in deep RNNs for increasing values of ρ.
ρ = 0.9, in which case the score improves from 22.2 in the 1st layer, up to
50.1 in the 10th layer. Interestingly, our results also highlight the effectiveness
of layering and its striking advantage as a convenient process for RC networks
architectural design. The memory of an NR -dimensional reservoir can be indeed
easily improved by using an underlying stack of recurrent layers to filter the
external input signal. Note that such improvement comes at the only price of a
modestly increased cost for the state computation (that increases linearly with
the number of layers), while the cost for output training remains the same.
layer 1
layer 4
layer 7
layer 10
k
Memory Capacity (MC )
1
0.8
0.6
0.4
0.2
0
10
20
30
40
50
60
70
80
Delay (k)
Fig. 3: k-delay memory capacity of deep RNN layers at increasing height.
We further inquire into the memory structure developed by the layers of
deep RNNs by analyzing the MC values for increasing delays. Fig. 3 shows the
forgetting curves of individual (progressively higher) layers, i.e. the values of
(i)
M Ck as a function of k, obtained in the case of ρ = 0.9. The plot in Fig. 3
clearly reveals the diversification of memory spans in the components of the
deep recurrent architecture: higher layers are able to store information about
past inputs for longer times. While for the 1st layer the memory recall is almost
null after delay 30, the dynamics developed in the 10th layer lead to a value that
is above zero even for a delay of 60. We can also see that input signals with
smaller delays are better reconstructed in the lower layers, while higher layers are
characterized by a peak that tends to shift to the right (more evident for layer
10 in Fig. 3), and by a slope of the forgetting curve that tends to be increasingly
smoother. Besides, the highlighted diversification of short-term memory spans
among the successive layers in the deep RNN architecture is also interesting as
a way of characterizing (in a quantitative way) the intrinsic richness of state
representations globally developed by the deep recurrent system.
4
Conclusions
In this paper we have provided a computational analysis of short-term memory
in deep RNNs. To do so, we have resorted to the MC task as a mean to quantify
the memory of state dynamics in successive levels of a deep recurrent system.
Our results clearly showed that higher layers in a hierarchically organized
RNN architecture are inherently featured, even prior to learning of recurrent
connections, by an improved ability to latch input information for longer time
spans. The analysis provided in this paper also revealed interesting insights on
the diversification of the memory structure developed within deep stacked RNN
dynamics, showing that higher layers tend to forget the past input history more
slowly and more smoothly compared lower ones. Furthermore, framed within
the deep RC framework, our results provided evidence that support the practical
benefit of the layered recurrent organization as a way to improve the memory
skills of reservoir networks in a cost-effective fashion.
Overall, though further studies in this research direction are certainly demanded (e.g. on the theoretical side), we believe that the outcomes provided in
this paper can contribute to better understand and characterize the bias due to
layering in deep recurrent neural models.
References
[1] I. Goodfellow, Y. Bengio, and A. Courville. Deep learning. MIT press, 2016.
[2] P. Angelov and A. Sperduti. Challenges in deep learning. In Proc. of the 24th European
Symposium on Artificial Neural Networks (ESANN), pages 489–495. i6doc.com, 2016.
[3] M. Hermans and B. Schrauwen. Training and analysing deep recurrent neural networks.
In NIPS, pages 190–198, 2013.
[4] D. Verstraeten, B. Schrauwen, M. d’Haene, and D. Stroobandt. An experimental unification of reservoir computing methods. Neural networks, 20(3):391–403, 2007.
[5] M. Lukoševičius and H. Jaeger. Reservoir computing approaches to recurrent neural
network training. Computer Science Review, 3(3):127–149, 2009.
[6] C. Gallicchio, A. Micheli, and L. Pedrelli. Deep reservoir computing: A critical experimental analysis. Neurocomputing, 268:87–99, 2017.
[7] C. Gallicchio and A. Micheli. Echo state property of deep reservoir computing networks.
Cognitive Computation, 9(3):337–350, 2017.
[8] R. Pascanu, C. Gulcehre, K. Cho, and Y. Bengio. How to construct deep recurrent neural
networks. arXiv preprint arXiv:1312.6026v5, 2014.
[9] H. Jaeger. Short term memory in echo state networks. Technical report, German National
Research Center for Information Technology, 2001.
[10] C. Gallicchio, A. Micheli, and L. Silvestri. Local lyapunov exponents of deep rnn. In
Proc. of the 25th European Symposium on Artificial Neural Networks (ESANN), pages
559–564. i6doc.com, 2017.
[11] C. Gallicchio, A. Micheli, and L. Silvestri. Local lyapunov exponents of deep echo state
networks. Neurocomputing, 2017. (Accepted).
| 2cs.AI
|
arXiv:cs/0201011v1 [cs.PL] 16 Jan 2002
Under consideration for publication in Theory and Practice of Logic Programming
1
A Backward Analysis for
Constraint Logic Programs
ANDY KING
University of Kent at Canterbury, Canterbury, CT2 7NF, UK.
email: [email protected]
LUNJIN LU
Oakland University, Rochester, MI 48309, USA.
email: [email protected]
Abstract
One recurring problem in program development is that of understanding how to re-use
code developed by a third party. In the context of (constraint) logic programming, part of
this problem reduces to figuring out how to query a program. If the logic program does not
come with any documentation, then the programmer is forced to either experiment with
queries in an ad hoc fashion or trace the control-flow of the program (backward) to infer
the modes in which a predicate must be called so as to avoid an instantiation error. This
paper presents an abstract interpretation scheme that automates the latter technique.
The analysis presented in this paper can infer moding properties which if satisfied by the
initial query, come with the guarantee that the program and query can never generate any
moding or instantiation errors. Other applications of the analysis are discussed. The paper
explains how abstract domains with certain computational properties (they condense) can
be used to trace control-flow backward (right-to-left) to infer useful properties of initial
queries. A correctness argument is presented and an implementation is reported.
1 Introduction
The myth of the lonely logic programmer writing a program in isolation is just
that: a myth. Applications (and application components) are usually implemented
and maintained by a team. One consequence of this is a significant proportion of
the program development effort is devoted to understanding code developed by
another. One advantage of (constraint) logic programs for software development is
that their declarative nature makes them less opaque than, say, C++ programs. One
disadvantage of logic programs over C++ programs, however, is that the signature
(argument types) of a predicate do not completely specify how the predicate should
be invoked. In particular, a call to a predicate from an unexpected context may
generate an error if an argument of the call is insufficiently instantiated (even if
the program and query are well-typed). This is because logic programs contain
builtins and calls to these builtins often impose moding requirements on the query.
If the program is developed by another programmer, it may not be clear how to
2
Andy King and Lunjin Lu
query a predicate so as to avoid an instantiation error. In these circumstances, the
programmer will often resort to a trial and error tactic in their search for an initial
call mode. This can be both frustrating and tedious and, of course, cannot guarantee
coverage of all the program execution paths. This paper presents an analysis for
inferring moding properties which, if satisfied by the initial query, ensure that the
program does not generate instantiation errors. Of course, it does not mean that
the inferred call has the form exactly intended by the original programmer – no
analysis can do that – the analysis just recovers mode information. Nevertheless,
this is a useful first step in understanding the code developed by another.
The problem of inferring initial queries which do not lead to instantiation errors
is an instance of the more general problem of deducing how to call a program
so that it conforms to some desired property, for example, calls to builtins do not
error, the program terminates, or calls to builtins behave predictably. The backward
analysis presented in this paper is designed to infer conditions on the query which,
if satisfied, guarantee that resulting derivations satisfy a property such as one of
those above. Specifically, the analysis framework can be instantiated to solve the
following analysis problems:
• Builtins and library functions can behave unpredictably when called with
infinite rational trees. For example, the query ?- X = X + X, Y is X will
not terminate in SICStus Prolog because the arithmetic operator expects its
input to be a finite tree rather than an infinite rational tree. Moreover, the
standard term ordering of Prolog does not lift to rational trees, so the builtin
sort can behave unpredictably when sorting rational trees. These problems
(and related problems with builtins) motivate the use of dependency analysis
for tracking which terms are definitely finite (Bagnara et al., 2001). The basic
idea is to describe the constraint x = f (x1 , . . . , xn ) by the Boolean function
x ⇔ ∧ni=1 xi which encodes that x is bound to a finite tree iff each xi is
bound to a finite tree. Although not proposed in the context of backward
analysis (Bagnara et al., 2001), the framework proposed in this paper can be
instantiated with a finite tree dependency domain to infer finiteness properties
on the query which, if satisfied, guarantee that builtins are not called with
problematic arguments.
• Termination inference is the problem of inferring initial modes for a query
that, if satisfied, ensure that a logic program terminates. This problem generalises termination checking which verifies program termination for a class of
queries specified by a given mode. Termination inference dates back to (Mesnard, 1996) but it has been recently observed (Genaim & Codish, 2001) that
the missing link between termination checking and termination inference is
backward analysis. A termination inference analyser is reported in (Genaim
& Codish, 2001) composed from two components: a standard termination
checker (Codish & Taboch, 1999) and the backward analysis described in this
paper. The resulting analyser is similar to the cTI analyser of (Mesnard &
Neumerkel, 2001) – the main difference is its design as two existing black-
A Backward Analysis for Constraint Logic Programs
3
box components which, according to (Genaim & Codish, 2001), simplifies the
formal justification and implementation.
• Mode analysis is useful for implementing ccp programs. In particular (Debray
et al., 1992) explains how various low-level optimisations, such as returning
output values in registers, can be applied if goals can be scheduled left-toright without suspension. If the guards of the predicates are re-interpreted as
moding requirements, then the backward mode analysis can infer sufficient
conditions for avoiding deadlock under left-to-right scheduling. The analysis
presented in this paper thus has applications outside program development.
To summarise, the analysis presented in this paper can deduce properties of the call
which, if satisfied, guarantee that resulting derivations fulfill some desired property.
The analysis is unusual in that it applies lower approximation (see 2.4.1) as well
as upper approximation (see 2.3.1); it is formulated in terms of a greatest fixpoint
calculation (see 2.4) as well as least fixpoint calculation (see 2.3); the analysis also
imposes some unusual restrictions on the abstract domain (see 2.4.6).
1.1 Backward analysis
Backward analysis has been applied extensively in functional programming in,
among other things, projection analysis (Wadler & Hughes, 1987), stream strictness analysis (Hall & Wise, 1989), inverse image analysis (Dyber, 1991), etc. By
reasoning about the context of a function application, these analyses can identify
opportunities for eager evaluation that are missed by (forward) strictness analysis
as proposed by (Mycroft, 1981). Furthermore, backward reasoning on imperative
programs dates back to the early days of static analysis (Cousot & Cousot, 1982).
By way of contrast, backward analysis has been rarely applied in logic programming. One notable exception is the demand analysis of (Debray, 1993). This analysis
infers the degree of instantiation necessary for the guards of a concurrent constraint
program (ccp) to reduce. It is a local analysis that does not consider the possible
suspension of body calls. This analysis detects those (uni-modal) predicates which
can be implemented with specialised suspension machinery. A more elaborate backward analysis for ccp is presented by (Falaschi et al., 2000). This demand analysis
infers how much input is necessary for a procedure to generate a certain amount of
output. This information is useful for adding synchronisation (ask) constraints to a
procedure to delay execution and thereby increase grain size, and yet not introduce
deadlock. (Section 7 provides more extensive and reflective review of the related
work.)
1.2 Contributions
Our work is quite different. As far as we are aware, it is unique in that it focuses on
the backward analysis of (constraint) logic programs with left-to-right scheduling.
Specifically, our work makes the following practical and theoretical contributions:
• it shows how to compute an initial mode of a predicate which is safe in that
4
Andy King and Lunjin Lu
if a query is at least as instantiated as the inferred mode, the execution is
guaranteed to be free from instantiation errors. The modes inferred are often
disjunctive, sometimes surprising and, for the small predicates that we verified
by hand, appear to be optimal.
• it specifies a practical algorithm for calculating initial modes that is straightforward to implement in that it reduces to two bottom-up fixpoint calculations. Furthermore, this backward analysis problem cannot be solved with
any existing abstract interpretation machinery.
• to the best our knowledge, it is the first time domains that are closed under Heyting completion (Giacobazzi & Scozzari, 1998), or equivalently are
condensing (Marriott & Søndergaard, 1993), have been applied to backward
analysis. Put another way, our work adds credence to the belief that condensation is an important property in the analysis of logic programs.
The final point requires some unpacking. Condensation was originally proposed in
(Langen, 1991), though arguably the simplest statement of this property (Marriott
& Søndergaard, 1993) is for downward closed domains such as P os (Armstrong
et al., 1998) and the P os-like type dependency domains (Codish & Lagoon, 2000).
Suppose that f : X → X is an abstract operation on a downward closed domain
X equipped with an operation ∧ that mimics unification or constraint solving. X
is condensing iff x ∧ f (y) = f (x ∧ y) for all x, y ∈ X. Hence, if X is condensing, x ∧ f (true) = f (x) where true represents the weakest abstract constraint.
More exactly, if f (true) represents the result of the goal-independent analysis, and
f (x) the result of the goal-dependent one with an initial constraint x, then the
equivalence f (x) = x ∧ f (true) enables goal-dependent analysis to be performed
in a goal-independent way without loss of precision. This, in turn, can simplify
the implementation of an analyser (Armstrong et al., 1998). Because of this, domain refinement machinery has been devised to enrich a domain with new elements
to obtain the desired condensing property (Giacobazzi & Scozzari, 1998). It turns
out that it is always possible to systematically design a condensing domain for a
given downward closed property (Giacobazzi & Scozzari, 1998)[Theorem 8.2] by
applying Heyting completion. Conversely, under some reasonable hypotheses, all
condensing domains can be reconstructed by Heyting completion (Giacobazzi &
Scozzari, 1998)[Theorem 8.3]. One consequence of this is that condensing domains
come equipped with a (pseudo-complement) operator and this turns out to be an
operation that is important in backward analysis. To summarise, machinery has
been developed to synthesise condensing domains and condensing domains provide
operations suitable for backward analysis.
1.3 Organisation of the paper
The rest of the paper is structured as follows. Section 2 introduces the key ideas
of the paper in an informal way through a worked example. Section 3 introduces
the necessary preliminaries for the formal sections that follow. Section 4 presents
an operational semantics for constraint logic programs with assertions in which the
set of program states is augmented by a special error state. Section 5 develops a
A Backward Analysis for Constraint Logic Programs
5
semantics which computes those initial states that cannot lead to the error state.
The semantics defines a framework for backward analysis and formally argues correctness. Section 6 describes an instantiation of the framework for mode analysis.
Section 7 reviews the related work and section 8 concludes. Much of the formal
machinery is borrowed directly from (Giacobazzi et al., 1995; Giacobazzi & Scozzari, 1998) and in particular the reader is referred to (Giacobazzi et al., 1995) for
proofs of the semantic results stated in section 3 (albeit presented in a slightly different form). To aid continuity in the paper, the remaining proofs are relegated to
appendix A.
2 Worked example
2.1 Basic components
This section informally presents an abstract interpretation scheme which infers how
to query a given predicate so as to avoid run-time moding errors. In other words,
the analysis deduces moding properties of the call that, if satisfied, guarantee that
resulting derivations cannot encounter an instantiation error. To illustrate, consider
the Quicksort program listed in the left column of figure 1. This is the first ingredient
of the analysis: the input program. The second ingredient is an abstract domain
which, in this case, is P os. P os is the domain of positive Boolean functions, that is,
the set of functions f : {0, 1}n → {0, 1} such that f (1, . . . , 1) = 1. Hence x∨y ∈ P os
since 1 ∨ 1 = 1 but ¬x 6∈ P os since ¬1 = 0. P os is augmented with the bottom
element 0 with 1 being the top element. The domain is ordered by entailment |=
and, in this example, will be used to represent grounding dependencies.
P os comes equipped with the logical operations: conjunction ∧, disjunction ∨,
implication ⇒ (and thus bi-implication ⇔). Conjunction is used to conjoin the
information from different body atoms, while disjunction is used to combine the
information from different clauses. Conjunction and disjunction, in turn, enable two
projection operators to be defined: ∃x (f ) = f [x 7→ 0] ∨ f [x 7→ 1] and ∀x (f ) = f ′ if
f ′ ∈ P os otherwise ∀x (f ) = 0 where f ′ = f [x 7→ 0] ∧ f [x 7→ 1]. Note that although
f [x 7→ 0] ∨ f [x 7→ 1] ∈ P os for all f ∈ P os it does not follow that f [x 7→ 0] ∧ f [x 7→
1] ∈ P os for all f ∈ P os. Indeed, (x ⇐ y)[x 7→ 0] ∧ (x ⇐ y)[x 7→ 1] = ¬y. Both
operators are used to project out the body variables that are not in the head of
a clause. Specifically, these operators eliminate the variable x from the formula f .
They are dual in the sense that ∀x (f ) |= f |= ∃x (f ). These are the basic components
of the analysis.
2.2 Normalisation and abstraction
The analysis components are assembled in two steps. The first is a bottom-up analysis for success patterns, that is, a bottom-up analysis which infers the groundness
dependencies which are known to be created by each predicate regardless of the
calling pattern. This step is a least fixpoint (lfp) calculation. The second step is a
bottom-up analysis for input modes (the objective of the analysis). This step is a
6
Andy King and Lunjin Lu
qs([], s, s).
qs([m|xs], s, t) :pt(xs, m, l, h),
qs(l, s, [m|r]),
qs(h, r, t).
pt([], , [], []).
pt([x|xs], m, [x|l], h) :m =< x,
pt(xs, m, l, h).
pt([x|xs], m, l, [x|h]) :m > x,
pt(xs, m, l, h).
qs(t1 , s, t2 ) :t1 = [], t2 = s.
qs(t1 , s, t) :t1 = [m|xs],
t3 = [m|r],
pt(xs, m, l, h),
qs(l, s, t3 ),
qs(h, r, t).
pt(t1 , , t2 , t3 ) :t1 = [],
t2 = [], t3 = [].
pt(t1 , m, t2 , h) :t1 = [x|xs],
t2 = [x|l],
m =< x
pt(xs, m, l, h).
pt(t1 , m, l, t2 ) :t1 = [x|xs],
t2 = [x|h],
m > x,
pt(xs, m, l, h).
qs(t1 , s, t2 ) :1 ⋄ g1 .
qs(t1 , s, t) :1 ⋄ g2 ,
pt(xs, m, l, h),
qs(l, s, t3 ),
qs(h, r, t).
pt(t1 , , t2 , t3 ) :1 ⋄ g3 .
pt(t1 , m, t2 , h) :1 ⋄ g4 ,
=<’(m, x),
pt(xs, m, l, h).
pt(t1 , m, l, t2 ) :1 ⋄ g5 ,
>’(m, x),
pt(xs, m, l, h).
=<’(m, x) :- g6 ⋄ g6 .
>’(m, x) :- g6 ⋄ g6 .
Fig. 1. Quicksort: raw, normalised and abstracted
greatest fixpoint (gfp) computation. To simplify both steps, the program is put into
a form in which the arguments of head and body atoms are distinct variables. This
gives the normalised program listed in the centre column of figure 1. This program
is then abstracted by replacing each Herbrand constraint x = f (x1 , . . . , xn ) with
a formula x ⇔ ∧ni=1 xi that describes its grounding dependency. This gives the abstract program listed in the right column of figure 1. The formula 1 in the assertion
represents true whereas the formulae gi that appear in the abstract program are
as follows:
g1 = t1 ∧ (t2 ⇔ s)
g2 = t1 ⇔ (m ∧ xs) ∧ t3 ⇔ (m ∧ r)
g 3 = t1 ∧ t2 ∧ t3
g4 = t1 ⇔ (x ∧ xs) ∧ t2 ⇔ (x ∧ l)
g5 = t1 ⇔ (x ∧ xs) ∧ t2 ⇔ (x ∧ h)
g6 = m ∧ x
Builtins that occur in the source, such as the tests =< and >, are handled by
augmenting the abstract program with fresh predicates, =<′ and >′ , which express
the grounding behaviour of the builtins. The ⋄ symbol separates an assertion (the
required mode) from another P os formula describing the grounding behaviour of a
successful call to the builtin (the success mode). For example, the formula g6 left
of ⋄ in the =<′ clause asserts that the =< test will error if its first two arguments
are not ground, whereas the g6 right of ⋄ describes the state that holds if the
test succeeds. These formulae do not coincide for all builtins (see Table 1). For
quicksort, the only non-trivial assertions arise from builtins. This would change if
the programmer introduced assertions for verification (Puebla et al., 2000a).
A Backward Analysis for Constraint Logic Programs
7
2.3 Least fixpoint calculation
An iterative algorithm is used to compute the lfp and thereby characterise the
success patterns of the program. A success pattern is a pair consisting of an atom
with distinct variables for arguments paired with a P os formula over those variables.
Renaming and equality of formulae induce an equivalence between success patterns
which is needed to detect the fixpoint. The patterns hp(u, w, v), u ∧ (w ⇔ v)i and
hp(x1 , x2 , x3 ), (x3 ⇔ x2 ) ∧ x1 i, for example, are considered to be identical: both
express the same inter-argument groundness dependencies. Each iteration produces
a set of success patterns: at most one pair for each predicate in the program.
2.3.1 Upper approximation of success patterns
A success pattern records an inter-argument groundness dependency that describes
the binding effects of executing a predicate. If hp(~x), f i correctly describes the
predicate p, and g holds whenever f holds, then hp(~x), gi also correctly describes
p. Success patterns can thus be approximated from above without compromising
correctness.
Iteration is performed in a bottom-up fashion and commences with F0 = ∅. Fj+1
is computed from Fj by considering each clause p(~x) ← d ⋄ f, p1 (~x1 ), . . . , pn (~xn ) in
turn. Initially Fj+1 = ∅. The success pattern formulae fi for the n body atoms
are conjoined with f to obtain g = f ∧ ∧ni=1 fi . Variables not present in p(~x), Y
say, are then eliminated from g by computing g ′ = ∃Y (g) (weakening g) where
∃{y1 ...yn } (g) = ∃y1 (. . . ∃yn (g)). Weakening g does not compromise correctness because success patterns can be safety approximated from above.
2.3.2 Weakening upper approximations
If Fj+1 already contains a pattern of the form hp(~x), g ′′ i, then this pattern is replaced with hp(~x), g ′ ∨ g ′′ i, otherwise Fj+1 is revised to include hp(~x), g ′ i. Thus the
success patterns become progressively weaker on each iteration. Again, correctness
is preserved because success patterns can be safety approximated from above.
2.3.3 Least fixpoint calculation for Quicksort
For brevity, let ~u = hx1 , x2 i, ~v = hx1 , x2 , x3 i and w
~ = hx1 , x2 , x3 , x4 i. Then the lfp
for the abstracted Quicksort program is obtained (and checked) in the following 3
iterations:
hqs(~v ), x1 ∧ (x2 ⇔ x3 )i
hqs(~v ), x2 ⇔ (x1 ∧ x3 )i
hpt(w),
~ x1 ∧ x3 ∧ x4 i
hpt(w),
~ x1 ∧ x3 ∧ x4 i
F1 =
F
=
2
h=<′ (~u), x1 ∧ x2 i
h=<′ (~u), x1 ∧ x2 i
′
h> (~u), x1 ∧ x2 i
h>′ (~u), x1 ∧ x2 i
Finally, F3 = F2 . The space of success patterns forms a complete lattice which
ensures that a lfp (a most precision solution) exists. The iterative process will
always terminate since the space is finite and hence the number of times each
8
Andy King and Lunjin Lu
success pattern can be updated is also finite. Moreover, it will converge onto the
lfp since iteration commences with the bottom element F0 = ∅.
Observe that F2 , the lfp, faithfully describes the grounding behaviour of quicksort: a qs goal will ground its second argument if it is called with its first and third
arguments already ground and vice versa. Note that assertions are not considered
in the lfp calculation.
2.4 Greatest fixpoint calculation
A bottom-up strategy is used to compute a gfp and thereby characterise the safe
call patterns of the program. A safe call pattern describes queries that do not violate
the assertions. A call pattern has the same form as a success pattern (so there is one
call pattern per predicate rather than one per clause). One starts with assuming no
call causes an error and then checks this assumption by reasoning backwards over
all clauses. If an assertion is violated, the set of safe call patterns for the involved
predicate is strengthened (made smaller), and the whole process is repeated until
the assumptions turn out to be valid (the gfp is reached).
2.4.1 Lower approximation of safe call patterns
Iteration commences with D0 = {hp(~x), 1i | p ∈ Π} where Π is the set of predicate
symbols occurring in the program. An iterative algorithm incrementally strengthens
the call pattern formulae until they only describe queries which lead to computations that satisfy the assertions. Note that call patterns describe a subset (rather
than a superset) of those queries which are safe. Call patterns are thus lower approximations in contrast to success patterns which are upper approximations. Put
another way, if hp(~x), gi correctly describes some safe call patterns of p, and g holds
whenever f holds, then hp(~x), f i also correctly describes some safe call patterns
of p. Call patterns can thus be approximated from below without compromising
correctness (but not from above).
Dk+1 is computed from Dk by considering each p(~x) ← d ⋄ f, p1 (~x1 ), . . . , pn (~xn )
in turn and calculating a formula that characterises its safe calling modes. Initially
set Dk+1 = Dk . A safe calling mode is calculated by propagating moding requirements right-to-left by repeated application of the logical operator ⇒. More exactly,
let fi denote the success pattern formula for pi (~xi ) in the previously computed lfp
and let di denote the call pattern formula for pi (~xi ) in Dk . Set en+1 = 1 and then
compute ei = di ∧ (fi ⇒ ei+1 ) for 1 ≤ i ≤ n. Each ei describes a safe calling mode
for the compound goal pi (~xi ), . . . , pn (~xn ).
2.4.2 Intuition and explanation
The intuition behind the symbolism is that di represents the demand that is already
known for pi (~xi ) not to error whereas ei is di possibly strengthened with extra
demand so as to ensure that the sub-goal pi+1 (~xi+1 ), . . . , pn (~xn ) also does not error
when executed immediately after pi (~xi ). Put another way, anything larger than di
A Backward Analysis for Constraint Logic Programs
9
may possibly cause an error when executing pi (~xi ) and anything larger than ei may
possibly cause an error when executing pi (~xi ), . . . , pn (~xn ).
The basic inductive step in the analysis is to compute an ei which ensures that
pi (~xi ), . . . , pn (~xn ) does not error, given di and ei+1 which respectively ensure that
pi (~xi ) and pi+1 (~xi+1 ), . . . , pn (~xn ) do not error. This step translates a demand after
the call to pi (~xi ) into a demand before the call to pi (~xi ). The tactic is to set en+1 = 1
and then compute ei = di ∧ (fi ⇒ ei+1 ) for i ≤ n. This tactic is best explained
by unfolding the definitions of en , then en−1 , then en−2 , and so on. This reverse
ordering reflects the order in which the ei are computed; the ei are computed whilst
walking backward across the clause. Any calling mode is safe for the empty goal
and hence en+1 = 1. Note that en = dn ∧ (fn ⇒ en+1 ) = dn ∧ (¬fn ∨ 1) = dn . Hence
en represents a safe calling mode for the goal pn (~xn ).
Observe that ei should not be larger than di , otherwise an error may occur
while executing pi (~xi ). Observe too that if pi (~xi ), . . . , pn (~xn ) is called with a mode
described by di , then pi+1 (~xi+1 ), . . . , pn (~xn ) is called with a mode described by
(di ∧ fi ) since fi describes the success patterns of pi (~xi ). The mode (di ∧ fi ) may
satisfy the ei+1 demand. If it does not, then the minimal extra demand is added
to (di ∧ fi ) so as to satisfy ei+1 . This minimal extra demand is ((di ∧ fi ) ⇒ ei+1 ) –
the weakest mode that, in conjunction with (di ∧ fi ), ensures that ei+1 holds. Put
another way, ((di ∧ fi ) ⇒ ei+1 ) = ∨{f ∈ P os | (di ∧ fi ) ∧ f |= ei+1 }.
Combining the requirements to satisfy pi (~xi ) and then pi+1 (~xi+1 ), . . . , pn (~xn ),
gives ei = di ∧ ((di ∧ fi ) ⇒ ei+1 ) which reduces to ei = di ∧ (fi ⇒ ei+1 ) and
corresponds to the tactic used in the basic inductive step.
2.4.3 Pseudo-complement
This step of calculating the weakest mode that when conjoined with di ∧ fi implies ei+1 , is the very heart of the analysis. Setting ei = 0 would trivially achieve
safety, but ei should be as weak as possible to maximise the class of safe queries
inferred. For P os, computing the weakest ei reduces to applying the ⇒ operator,
but more generally, this step amounts to applying the pseudo-complement operator.
The pseudo-complement operator (if it exists for a given abstract domain) takes,
as input, two abstractions and returns, as output, the weakest abstraction whose
conjunction with the first input abstraction is at least as strong as the second input
abstraction. If the domain did not possess a pseudo-complement, then there is not
always a unique weakest abstraction (whose conjunction with one given abstraction
is at least as strong as another given abstraction).
To see this, consider the domain Def (Armstrong et al., 1998) which does not
possess a pseudo-complement. Def is the sub-class of P os that is definite (Armstrong et al., 1998). This means that Def has the special property that each of its
Boolean functions can be expressed as a (possibly empty) conjunction of propositional Horn clauses. As with P os, Def is assumed to be augmented with the
bottom element 0. Def can thus represent the grounding dependencies x ∧ y, x,
x ⇔ y, y, x ⇐ y, x ⇒ y, 0 and 1 but not x ∨ y. Suppose that di ∧ fi = (x ⇔ y)
and ei+1 = (x ∧ y). Then conjoining x with di ∧ fi would be at least as strong
10
Andy King and Lunjin Lu
as ei+1 and symmetrically conjoining y with di ∧ fi would be at least as strong
as ei+1 . However, Def does not contain a Boolean function strictly weaker than
both x and y, namely x ∨ y, whose conjunction with di ∧ fi is at least as strong
as ei+1 . Thus setting ei = x or ei = y would be safe but setting ei = (x ∨ y) is
prohibited because x ∨ y falls outside Def . Moreover, setting ei = 0 would loose
an unacceptable degree of precision. A choice would thus have to be made between
setting ei = x and ei = y in some arbitrary fashion, so there would be no clear
tactic for maximising precision.
Returning to the compound goal pi (~xi ), . . . , pn (~xn ), a call described by the mode
di ∧ ((di ∧ fi ) ⇒ ei+1 ) is thus sufficient to ensure that neither pi (~xi ) nor the subgoal pi+1 (~xi+1 ), . . . , pn (~xn ) error. Since di ∧ ((di ∧ fi ) ⇒ ei+1 ) = di ∧ (fi ⇒ ei+1 )
= ei it follows that pi (~xi ), . . . , pn (~xn ) will not error if its call is described by ei . In
particular, it follows that e1 describes a safe calling mode for the body atoms of
the clause p(~x) ← d ⋄ f, p1 (~x1 ), . . . , pn (~xn ).
The next step is to calculate g = d ∧ (f ⇒ e1 ). The abstraction f describes
the grounding behaviour of the Herbrand constraint added to the store prior to
executing the body atoms. Thus (f ⇒ e1 ) describes the weakest mode that, in
conjunction with f , ensures that e1 holds, and hence the body atoms are called
safely. Hence d ∧ (f ⇒ e1 ) represents the weakest demand that both satisfies the
body atoms and the assertion d. One subtlety which relates to the abstraction
process, is that d is required to be a lower-approximation of the assertion whereas
f is required to be an upper-approximation of the constraint. Put another way,
if the mode d describes the binding on the store, then the (concrete) assertion is
satisfied, whereas if the (concrete) constraint is added to the store, then the store
is described by the mode f . Table 1 details how to abstract various builtins for
groundness for a declarative subset of ISO Prolog.
2.4.4 Strengthening lower approximations
Variables not present in p(~x), Y say, are then eliminated by g ′ = ∀Y (g) (strengthening g) where ∀{y1 ...yn } (g) = ∀y1 (. . . ∀yn (g)). A safe calling mode for this particular clause is then given by g ′ . Eliminating variables from g by strengthening g is
unusual and initially appears strange. Recall, however, that call patterns can be
approximated from below without compromising correctness (but not from above).
In particular the standard projection tactic of computing ∃{y1 ...yn } (g) would result
in an upper approximation of g that possibly describes a larger set of concrete call
patterns which would be incorrect. The direction of approximation thus dictates
that eliminating the variables Y from g must strengthen g. Indeed, g holds whenever
∀yi (g) holds and therefore g holds whenever ∀{y1 ...yn } (g) holds as required.
Dk+1 will contain a call pattern hp(~x), g ′′ i and, assuming g ′ ∧ g ′′ 6= g ′′ , this is
updated with hp(~x), g ′ ∧ g ′′ i. Thus the call patterns become progressively stronger
on each iteration. Correctness is preserved because call patterns can be safely approximated from below. The space of call patterns forms a complete lattice which
ensures that a gfp exists. In fact, because call patterns are approximated from below, the gfp is the most precise solution, and therefore the desired solution. (This
A Backward Analysis for Constraint Logic Programs
11
contrasts to the norm in logic program analysis where approximation is from above
and the lfp is the most precise solution). Moreover, since the space of call patterns
is finite, termination is assured. In fact, the scheme will converge onto the gfp since
iteration commences with the top element D0 = {hp(~x), 1i | p ∈ Π}.
2.4.5 Greatest fixpoint calculation for Quicksort
Under this procedure Quicksort generates the following Dk sequence:
hqs(~v ), 1i
hqs(~v ), 1i
hpt(w),
~ 1i
hpt(w),
~ 1i
D0 =
D1 =
′
′
h=< (~u), 1i
h=< (~u), x1 ∧ x2 i
′
h> (~u), 1i
h>′ (~u), x1 ∧ x2 i
hqs(~v ), 1i
hqs(~v ), x1 i
hpt(w),
~ x2 ∧ (x1 ∨ (x3 ∧ x4 ))i
hpt(w),
~ x2 ∧ (x1 ∨ (x3 ∧ x4 ))i
D2 =
D3 =
′
′
h=< (~u), x1 ∧ x2 i
h=< (~u), x1 ∧ x2 i
′
′
h> (~u), x1 ∧ x2 i
h> (~u), x1 ∧ x2 i
These calculations are non-trivial so consider how D2 is obtained from D1 by applying the clause pt(t1 , m, t2 , h) : −1 ⋄ g4 , =<′ (m, x), pt(xs, m, l, h). The following
ei and g formulae are generated:
e3 =
1
e2 = 1 ∧ ((xs ∧ l ∧ h) ⇒ 1) =
1
e1 = (m ∧ x) ∧ ((m ∧ x) ⇒ 1) =
m∧x
g = 1 ∧ (((t1 ⇔ x ∧ xs) ∧ (t2 ⇔ x ∧ l)) ⇒ (m ∧ x))
To characterise those pt(t1 , m, t2 , h) calls which are safe, it is necessary to compute
a function g ′ on the variables t1 , m, t2 , h which, if satisfied by the mode of a call,
ensures that g is satisfied by the mode of the call. Put another way, it is necessary to
eliminate the variables x, xs and l from g (those variables which do not occur in the
head pt(t1 , m, t2 , h)) to strengthen g obtain a function g ′ such that g holds whenever
g ′ holds. This is accomplished by calculating g ′ = ∀l ∀xs ∀x (g). First consider the
computation of ∀x (g):
g[x 7→ 0] = (((t1 ⇔ x ∧ xs) ∧ (t2 ⇔ x ∧ l)) ⇒ (m ∧ x))[x 7→ 0]
= ((t1 ⇔ 0 ∧ xs) ∧ (t2 ⇔ 0 ∧ l)) ⇒ (m ∧ 0)
= (¬t1 ∧ ¬t2 ) ⇒ 0
= t1 ∨ t2
g[x 7→ 1] = (((t1 ⇔ x ∧ xs) ∧ (t2 ⇔ x ∧ l)) ⇒ (m ∧ x))[x 7→ 1]
= ((t1 ⇔ xs) ∧ (t2 ⇔ l)) ⇒ m
Since g[x 7→ 0] ∧ g[x 7→ 1] ∈ P os it follows that:
∀x (g) = (((t1 ⇔ xs) ∧ (t2 ⇔ l)) ⇒ m) ∧ (t1 ∨ t2 )
12
Andy King and Lunjin Lu
(otherwise ∀x (g) would be set to 0). Eliminating the other variables in a similar
way we obtain:
∀xs ∀x (g) = ((t2 ⇔ l) ⇒ m) ∧ (t1 ∨ t2 )
g = ∀l ∀xs ∀x (g) = m ∧ (t1 ∨ t2 )
′
Observe that if ∀l ∀xs ∀x (g) holds then g holds. Thus if the mode of a call satisfies g ′
then the mode also satisfies g as required. This clause thus yields the call pattern
hpt(w),
~ x2 ∧ (x1 ∨ x3 )i. Similarly the first and third clauses contribute the patterns
hpt(w),
~ 1i and hpt(w)
~ ← x2 ∧ (x1 ∨ x4 )i. Observe also that
1 ∧ (x2 ∧ (x1 ∨ x3 )) ∧ (x2 ∧ (x1 ∨ x4 )) = x2 ∧ (x1 ∨ (x3 ∧ x4 ))
which gives the final call pattern formula for pt(w)
~ in D2 . The gfp is reached at
D3 since D4 = D3 . The gfp often expresses elaborate calling modes, for example,
it states that pt(w)
~ cannot generate an instantiation error (nor any predicate that
it calls) if it is called with its second, third and fourth argument ground. This is a
surprising result which suggests that the analysis can infer information that might
be normally missed by a programmer.
2.4.6 Restrictions posed by the framework
The chief computational requirement of the analysis is that the input domain is
equipped with a pseudo-complement operation. As already mentioned, it is always
possible to systematically design a domain with this operator (Giacobazzi & Scozzari, 1998) and any domain that is known to be condensing (see section 1.2) comes
equipped with this operator. Currently, however, there are only a few domains with
a pseudo-complement. Indeed, the domain described in (Codish & Lagoon, 2000)
appears to be unique in that it is the only type domain that is condensing. This is
the main limitation of the backward analysis described in this paper.
P os is downward-closed in the sense that if a function f describes a substitutions,
then f also describes all substitutions less general than the substitution. The type
domain of (Codish & Lagoon, 2000) is also downward-closed. It does not follow,
however, that a domain equipped with a pseudo-complement operation is necessarily downward-closed. Heyting completion, the domain refinement technique used
to construct pseudo-complement, can be moved to linear implication (Giacobazzi
et al., 1998), though the machinery is more complicated. However, it is likely, that
in the short term tractable condensing domains will continue to be downwardclosed. In fact, constructing tractable downward-closed condensing domains is a
topic within itself.
3 Preliminaries
3.1 Basic Concepts
Sets and sequences Let N denote the set of non-negative integers. The powerset
of S is denoted ℘(S). The empty sequence is denoted ǫ and S ⋆ denotes the set of
A Backward Analysis for Constraint Logic Programs
13
(possibly empty) sequences whose elements are drawn from S. Sequence concatenation is denoted · and the length of a sequence s is |s|. Furthermore, let s0 = ǫ and
sn = s · sn−1 where n ∈ N. If n ∈ N and s ∈ N⋆ then max(n · s) = max(n, max(s))
where max(ǫ) = 0.
Orderings A pre-order on a set S is a binary relation ⊑ that is reflexive and transitive. A partial order on a set S is a pre-order that is anti-symmetric. A poset hS, ⊑i
is a partial order on a set S. If hS, ⊑i is a poset, then C ⊆ S is a chain iff a ⊑ b or
b ⊑ a for all a, b ∈ C. A meet semi-lattice hL, ⊑, ⊓i is a poset hL, ⊑i such that the
meet (greatest lower bound) ⊓{x, y} exists for all x, y ∈ L. A complete lattice is
a poset hL, ⊑i such that the meet ⊓X and the join ⊔X (least upper bound) exist
for all X ⊆ L. Top and bottom are respectively defined by ⊤ = ⊓∅ and ⊥ = ⊔∅. A
complete lattice is denoted hL, ⊑, ⊓, ⊔, ⊤, ⊥i. Let hS, ⊑i be a pre-order. If X ⊆ S
then ↓(X) = {y ∈ S | ∃x ∈ X.y ⊑ x}. If x ∈ S then ↓(x) = ↓({x}). The set of orderideals of S, denoted ℘↓(S), is defined by ℘↓(S) = {X ⊆ S | X = ↓(X)}. Observe
that h℘↓(S), ⊆, ∪, ∩, S, ∅i is a complete lattice.
An algebraic structure is a pair hS, Qi where S is a non-empty set and Q is
collection of n-ary operations f : S n → S where n ∈ N. Let hS, ⊑i and hS ′ , ⊑′ i be
posets and hS, Qi and hS ′ , Q′ i algebraic structures such that Q = {fi | i ∈ I} and
Q′ = {fi′ | i ∈ I} for an index set I. Then α : S → S ′ is a semi-morphism between
hS, Qi and hS ′ , Q′ i iff α(fi (s1 , . . . , sn )) ⊑ fi′ (α(s1 ), . . . , α(sn )) for all hs1 , . . . , sn i ∈
S n and i ∈ I.
Functions and fixpoints Let f : A → B. Then dom(f ) denotes the domain of f
and if C ⊆ A then f (C) = {f (c) | c ∈ C}. Furthermore, cod(f ) = f (dom(f )).
Let hL, ⊑, ⊔, ⊓i and hL′ , ⊑′ , ⊔′ , ⊓′ i be complete lattices. The map f : L → L′ is
additive iff f (⊔X) = ⊔′ f (X) for all X ⊆ L; f is continuous iff f (⊔C) = ⊔′ f (C)
for all chains C ⊆ L; f is co-continuous iff f (⊓C) = ⊓′ f (C) for all chains C ⊆ L
and f is monotonic iff f (x) ⊑′ f (y) for all x ⊑ y. Let x ⊑ y. If f is continuous
then f (y) = f (x ⊔ y) = ⊔′ {f (x), f (y)} and thus f (x) ⊑′ f (y). If f is co-continuous
then f (x) = f (x ⊓ y) = ⊓′ {f (x), f (y)} and thus f (x) ⊑′ f (y). Both continuity
and co-continuity thus imply monotonicity. If f : L → L, then f is idempotent
iff f (x) = f 2 (x) for all x ∈ L and f is extensive iff x ⊑ f (x) for all x ∈ L.
The Knaster-Tarski theorem states that any monotone operator f : L → L on a
complete lattice hL, ⊑, ⊔, ⊓, ⊤, ⊥i admit both greatest and least fixpoints that are
characterised by gfp(f ) = ⊔{x ∈ L | x ⊑ f (x)} and lfp(f ) = ⊓{x ∈ L | f (x) ⊑ x}.
If f is co-continuous then gfp(f ) = ⊓n∈N f n (⊤) and dually if f is continuous then
lfp(f ) = ⊔n∈N f n (⊥). {f n (⊤) | n ∈ N} and {f n (⊥) | n ∈ N} are, respectively, the
lower and upper Kleene iteration sequences of f .
Galois insertions and closure operators If hS, ⊑i and hS ′ , ⊑′ i are posets and
α : S → S ′ and γ : S ′ → S are monotonic maps such that ∀x ∈ S.x ⊑ γ(α(x))
and ∀x′ ∈ S ′ .α(γ(x′ )) ⊑′ x′ , then the quadruple hS, γ, S ′ , αi is a Galois connection
between S and S ′ . In other words, α is the lower (or left) adjoint of γ and γ is the upper (or right) adjoint of α. If, in addition, ∀x′ ∈ S ′ .x′ ⊑′ α(γ(x′ )), then hS, γ, S ′ , αi
14
Andy King and Lunjin Lu
is a Galois insertion between S and S ′ . The operator ρ : L → L on a complete lattice hL, ⊑i is a closure operator iff ρ is monotonic, idempotent and extensive. The
set of closure operators on L is denoted uco(L). The image set ρ(L) of a closure
operator ρ is a complete lattice with respect to ⊑. A Galois insertion hL, γ, L′ , αi
between the complete lattices L and L′ defines the closure operator ρ = γ ◦ α.
Conversely, a closure operator ρ : L → L on the complete lattice hL, ⊑, ⊔i defines
the Galois insertion hL, id, ρ(L), ρi where id denotes identity. Galois insertions and
closure operators are thus isomorphic, though closure operators are typically more
succinct and hence used in this paper.
Substitutions Let Sub denote the set of (idempotent) substitutions and let Ren
denote the set of (bijective) renaming substitutions.
3.2 Cylindric constraint systems
Let V denote a (denumerable) universe of variables and let C denote a constraint
system over V . An algebra hC, ✂, ⊗, 1, {∃x}x∈V , {dx,y }x,y∈V i is a semi-cylindric constraint system iff hC, ✂, ⊗i is a meet semi-lattice with a top 1; ∃x is a family of
(unary) cylindrification operations such that: c ✂ ∃x (c), ∃x (c) ✂ ∃x (c′ ) if c ✂ c′ ,
∃x (c ⊗ ∃x (c′ )) = ∃x (c) ⊗ ∃x (c′ ); and dx,y is a family of (constant) diagonalisation
operations such that: dx,x = 1, dx,y = ∃z (dx,z ⊗ dz,y ) and dx,y ⊗ ∃x (c ⊗ dx,y ) ✂ c
if x 6= y. Cylindrification captures the concept of projecting out a variable (and is
useful in modeling variables that go out of scope) whereas diagonalisation captures
the notion of an alias between two variables (and is useful in modeling parameter
passing). (The reader is referred to (Giacobazzi et al., 1995) for further details on
cylindric constraint systems and their application in abstract interpretation.)
Example 3.1
An equation e is a pair (s = t) where s and t are terms. A finite conjunction of
equations is denoted E and Eqn denotes the set of finite conjunctions of equations. Let eqn(θ) = {x = t | x 7→ t ∈ θ} and unif y(E) = {θ ∈ Sub | ∀(s =
t) ∈ E.θ(s) = θ(t)}. Eqn is pre-ordered by entailment E1 ✂ E2 iff unif y(E1 ) ⊆
unif y(E2 ) and quotiented by E1 ≈ E2 iff E1 ✂ E2 and E2 ✂ E1 . This gives
the meet semi-lattice hEqn/ ≈, ✂, ⊗i with a top 1 where conjunction is defined
[E1 ]≈ ⊗ [E2 ]≈ = [E1 ∪ E2 ]≈ and 1 = [∅]≈ . Let mgu(E) = {θ ∈ unif y(E) | ∀κ ∈
unif y(E) . eqn(κ)✂eqn(θ)}. Finally, let dx,y = [{x = y}]≈ and define project out by
∃x ([E]≈ ) = [eqn({y 7→ t ∈ θ | x 6= y})]≈ if θ ∈ mgu(E). Otherwise, if mgu(E) = ∅,
define ∃x ([E]≈ ) = [{a = b}]≈ where a and b are distinct constant symbols. Then
hEqn/≈, ✂, ⊗, 1, {∃x}x∈V , {dx,y }x,y∈V i is a semi-cylindric constraint system.
An algebra hC, ✂, ⊕, ⊗, 1, 0, {∃x}x∈V , {dx,y }x,y∈V i that extends a semi-cylindric
constraint system to a complete lattice hC, ✂, ⊕, ⊗, 1, 0i is a cylindric constraint system. A semi-cylindric constraint system can be lifted to a cylindric constraint system via a power-domain construction. In particular h℘↓(C), ⊆, ∪, ∩, C, ∅, {∃′x }x∈V ,
{d′x,y }x,y∈V i is a cylindric constraint system where ∃′x (C) = ↓({∃x (c) | c ∈ C}) and
d′x,y = ↓(dx,y ).
A Backward Analysis for Constraint Logic Programs
15
Example 3.2
The semi-cylindric system of example 3.1 can be lifted to the cylindric system
h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃′ , d′ i where ∃′x (C) = ↓({∃x (c)|c ∈ C}) and d′x,y = ↓(dx,y ).
In the sequel, unless otherwise stated, all constraint systems considered are
over the same V and thus a cylindric constraint system will be simply denoted
hC, ✂, ⊕, ⊗, 1, 0, ∃, di. Let var(o) denote the set of the variables in the syntactic
object o and let F V (c) denote the set of free variables in a constraint c ∈ C,
that is, F V (c) = {x ∈ var(c) | ∃y ∈ V . c 6= ∃x (c ⊗ dx,y )}. Abbreviate project
out by ∃{x1 ,...,xn } (c) = ∃x1 (. . . (∃xn (c))) and project onto by ∃X (c) = ∃F V (c)\X (c).
Let d~x,~y = ⊗ni=1 dxi ,yi where ~x = hx1 . . . xn i and ~y = hy1 . . . yn i. If c ∈ C then
let ∂~xy~ (c) denote the constraint obtained by replacing ~x with ~y , that is, ∂~xy~ (c) =
∃~z (∃~x (c ⊗ d~x,~z ) ⊗ d~z,~y ) where var(~z) ∩ (F V (c) ∪ var(~x) ∪ var(~y )) = ∅. Finally, if
C ⊆ C then ∂~xy~ (C) = {∂~xy~ (c) | c ∈ C}.
Example 3.3
Let X be a finite subset of V . The groundness domain hEP osX , |=, g, ∧, 1, 0i
(Heaton et al., 2000) is a finite lattice where EP osX = {0} ∪ {∧F | F ⊆ X ∪ EX },
EX = {x ⇔ y | x, y ∈ X} and f1 g f2 = ∧{f ∈ EP osX | f1 |= f ∧ f2 |= f }. EP osX
is a cylindric constraint system with dx,y = (x ⇔ y) and ∃x (f ) = f ′ ∧ f ′′ where
f ′ = ∧{y ∈ Y | f |= y}, f ′′ = ∧{e ∈ EY | f |= e} and Y = X \ {x}.
Example 3.4
Let BoolX denote the Boolean functions over X. The dependency domain P osX
(Armstrong et al., 1998) is defined by P osX = {0} ∪ {f ∈ BoolX | ∧X |= f }.
Henceforth Y abbreviates ∧Y . The lattice hP osX , |=, ∨, ∧, 1, 0i is finite and is a
cylindric constraint system with dx,y = (x ⇔ y) and Schröder elimination defining
∃x (f ) = f [x 7→ 1] ∨ f [x 7→ 0].
3.3 Complete Heyting algebras
Let hL, ⊑, ⊓i be a lattice with x, y ∈ L. The pseudo-complement of x relatively to
y, if it exists, is a unique element z ∈ L such that x ⊓ w ⊑ y iff w ⊑ z. L is relatively
pseudo-completed iff the pseudo-complement of x relative to y, denoted x → y,
exists for all x, y ∈ L. If L is also complete then it is a complete Heyting algebra
(cHa). If x, y ∈ L then x ⊓ (x → y) = x ⊓ y. Furthermore, if hL, ⊑, ⊔, ⊓i is a cHa
then x → y = ⊔{w ∈ L | x ⊓ w ⊑ y}. The intuition behind the pseudo-complement
of x relative to y is that it is the weakest element whose combination (meet) with
x implies y. Interestingly pseudo-complement can be interpreted as the adjoint
of conjunction. (The reader is referred to (van Dalen, 1997) for further details
on complete Heyting algebras.) The following result (Birkhoff, 1967)[Chapter IX,
Theorem 15] explains how a cHa depends on the additivity of meet.
Theorem 3.1
A complete lattice L is relatively pseudo-complemented iff x ⊓ (⊔Y ) = ⊔{x ⊓ y |
y ∈ Y } for all x ∈ L and Y ⊆ L.
16
Andy King and Lunjin Lu
Example 3.5
Let {x, y} ⊆ X and f = (x ⇔ y). Then returning to EP osX of example 3.3,
f ∧ (g{x, y}) = f ∧ (1) = f 6= (x ∧ y) = g{x ∧ y, x ∧ y} = g{f ∧ x, f ∧ y}. Hence,
by theorem 3.1, EP osX is not a cHa. Now consider P osX of example 3.4, and
specifically let f ∈ P osX and G ⊆ P osX . Since ∧ distributes over ∨, it follows that
f ⊓ (⊔G) = ⊔{f ⊓ g | g ∈ G}, thus by theorem 3.1, P osX is a cHa. Similarly, ∩
distributes over ∪, and thus it follows by theorem 3.1 that ℘↓ (C) is also a cHa.
3.4 Constraint logic programs
Let Π denote a (finite) set of predicate symbols, let Atom denote the set of (flat)
atoms over Π with distinct arguments drawn from V , and let hC, ✂, ⊕, ⊗, 1, 0, ∃, di
be a semi-cylindric constraint system. The set of constrained atoms is defined by
BaseC = {p(~x) :- c | p(~x) ∈ Atom ∧ c ∈ C}. Let F V (p(~x) :- c) = var(~x) ∪ F V (c).
Entailment ✂ lifts to BaseC by w1 ✂ w2 iff ∃~x (d~x,~x1 ⊗ c1 ) ✂ ∃~x (d~x,~x2 ⊗ c2 ) where
wi = p(~xi ) :- ci and var(~x) ∩ (F V (w1 ) ∪ F V (w2 )) = ∅. This pre-order defines the
equivalence relation w1 ≈ w2 iff w1 ✂ w2 and w2 ✂ w1 to give a set of interpretations
defined by IntC = ℘(BaseC /≈). IntC is ordered by I1 ⊑ I2 iff for all [w1 ]≈ ∈ I1
there exists [w2 ]≈ ∈ I2 such that w1 ✂ w2 . Let ≡ denote the induced equivalence
relation I1 ≡ I2 iff I1 ⊑ I2 and I2 ⊑ I1 . hIntC / ≡, ⊑, ⊔, ⊓, ⊤, ⊥i is a complete
lattice where [I1 ]≡ ⊔ [I2 ]≡ = [I1 ∪ I2 ]≡ , [I1 ]≡ ⊓ [I2 ]≡ = [∪{I | I ⊑ I1 ∧ I ⊑ I2 }]≈ ,
⊤ = [{[p(~x) :- 1]≈ | p(~x) ∈ Atom}]≡ and ⊥ = [∅]≡ .
A constraint logic program P over C is a finite set of clauses w of the form
w = h :- c, g where h ∈ Atom, c ∈ C, g ∈ Goal and Goal = Atom⋆ . The fixpoint
semantics of P is defined in terms of an immediate consequences operator FPC .
Definition 3.1
Given a constraint logic program P over a semi-cylindric constraint system C, the
operator FPC : IntC → IntC is defined by:
∃ p(~x) :- c, p1 (~x1 ), . . . , pn (~xn ) ∈ P .
FPC (I) = [p(~x) :- c′ ]≈ ∃
.
{[pi (~xi ) :- ci ]≈ }ni=1 ⊆ I
c′ = c ⊗ ⊗ni=1 ∃x~i (ci )
The operator FPC lifts to IntC /≡ by FPC ([I]≡ ) = [FPC (I)]≡ . The lifting is monotonic
and hence the fixpoint semantics for a program P over C exists and is denoted
F C (P ) = lfp(FPC ). (The reader is referred to (Bossi et al., 1994; Jaffar & Maher,
1994) for further details on semantics and constraint logic programming.)
The operational semantics of P is defined in terms of a transition system →P
between states of the form State = Goal × C. To define the transition system,
let F V (hg; ci) = var(g) ∪ F V (c) and F V (h :- c, g) = var(h) ∪ F V (c) ∪ var(g). To
rename clauses with ϕ ∈ Ren it is necessary to rename constraints with ϕ. Thus
ϕ(~
x)
define ϕ(h :- c, g) = ϕ(h) :- ∂~x (c), ϕ(g). To rename apart from a syntactic object o,
let w ≪o P indicate that there exists w′ ∈ P and ϕ ∈ Ren such that var(cod(ϕ)) ∩
F V (w′ ) = ∅, ϕ(w′ ) = w and F V (o) ∩ F V (w) = ∅.
Definition 3.2
A Backward Analysis for Constraint Logic Programs
17
Given a constraint logic program P over a semi-cylindric constraint system C,
→P ⊆ State2 is the least relation such that:
s = hp(~x), g; ci →P hg ′ , g; c ⊗ d~x,~x′ ⊗ c′ i
where p(~x′ ) :- c′ , g ′ ≪s P .
The operational semantics is specified by the transitive closure of the transition
relation on (atomic) goals, that is, OC (P ) = [{[p(~x) :- c]≈ | hp(~x); 1i →⋆P hǫ; ci}]≡ .
The relationship between the operational and fixpoint semantics is stated below.
Theorem 3.2
OC (P ) = F C (P ).
3.5 Abstract semantics for constraint logic programs
To apply abstraction techniques and finitely characterise F C (P ), and thereby OC (P ),
the semi-cylindric domain C is replaced by the cHa ℘↓(C) which is particularly
amenable to approximation and backward reasoning.
If P is a constraint logic program over C, then ↓(P ) = {h :- ↓(c), g | h :- c, g ∈ P }.
Furthermore, if I ∈ IntC , then let ↓([I]≡ ) = [{[p(~x) :- ↓(c)]≈ | [p(~x) :- c]≈ ∈ I}]≡ .
Note the overloading on ≈ and hence ≡. The ≈ of [p(~x) :- c]≈ is induced by hC, ✂i
whereas the ≈ of [p(~x) :- ↓(c)]≈ is induced by h℘↓(C), ⊆i. The following proposition
↓
details the relationship between F C and F ℘ (C) .
Proposition 3.1
↓
↓(F C (P )) ⊑ F ℘ (C) (↓(P )).
Let hC, ✂, ⊕, ⊗, 1, 0, ∃, di denote a cylindric constraint system. If ρ ∈ uco(C) then
hρ(C), ✂, ⊗i is a complete lattice. If ρ is additive, then hρ(C), ✂, ⊕, ⊗i is a sub-lattice
of hC, ✂, ⊕, ⊗i. More generally, the join is denoted ⊕′ . Observe that ρ(C) has 1 and
ρ(0) for top and bottom and c1 ⊕ c2 ✂ ρ(c1 ⊕ c2 ) = c1 ⊕′ c2 for all c1 , c2 ∈ ρ(C).
A cylindric constraint system is obtained by augmenting ρ(C) with cylindrification ∃′x and diagonalisation d′x,y operators. To abstract hC, ✂, ⊕, ⊗, 1, 0, ∃, di safely
with hρ(C), ✂, ⊕′ , ⊗, 1, ρ(0), ∃′ , d′ i, ρ is required to be a semi-morphism (Giacobazzi
et al., 1995) which additionally requires that ρ(∃x (c)) ✂ ∃′x (ρ(c)) for all c ∈ C and
ρ(dx,y ) ✂ d′x,y for all x, y ∈ V . In fact, these requirements turn out to be relatively
weak conditions: most abstract domains come equipped with (abstract) operators
to model projection and parameter passing.
Example 3.6
Consider the cylindric system h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di derived from the semicylindric system introduced in example 3.1. Let Bool = BoolV and P os = P osV .
Define αP os : ℘↓ (Eqn) → P os by αP os (C) = ∨{α(θ) | θ ∈ mgu(E) ∧ E ∈ C}
and α(θ) = ∧{x ⇔ var(t) | x 7→ t ∈ θ}. Also define γP os : P os → ℘↓ (Eqn) by
γP os (f ) = ∪{C ∈ ℘↓ (Eqn) | αP os (C) |= f } and observe ρP os ∈ uco(℘↓ (Eqn)) where
ρP os = γP os ◦ αP os . To construct a semi-morphism, put d′x,y = γP os (x ⇔ y) and
∃′x (C) = γP os (f [x 7→ 1]∨f [x 7→ 0]) where f = αP os (C). Then ρP os (dx,y ) ⊆ d′x,y and
18
Andy King and Lunjin Lu
ρP os (∃x (C)) ⊆ ∃′x (ρP os (C)) for all C ∈ ℘↓(Eqn). Note that C1 ∩ C2 = γP os (f1 ∧ f2 )
and C1 ⊕′ C2 = γP os (f1 ∨ f2 ) where Ci = γP os (fi ). Surprisingly C1 ⊕′ C2 6= C1 ∪ C2
(Filé & Ranzato, 1994), as witnessed by C1 = γP os (x) and C2 = γP os (x ⇔ y) since
{y = f (x, z)} 6∈ C1 ∪ C2 whereas αP os ({y = f (x, z)}) = y ⇔ (x ∧ z) |= x ∨ (x ⇔ y)
so that {y = f (x, z)} ∈ C1 ⊕′ C2 = γP os (x ∨ (x ⇔ y)). Nevertheless, ρP os is
a semi-morphism between h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di and hρP os (℘↓(Eqn)), ⊆
, ⊕′ , ∩, Eqn, ρP os (∅), ∃′ , d′ i.
The operator ρ lifts to the complete lattice IntC / ≡ by ρ([I]≡ ) = [ρ(I)]≡ where
ρ(I) = {[p(~x) :- ρ(c)]≈ | [p(~x) :- c]≈ ∈ I}. Thus ρ ∈ uco(IntC /≡). It is also useful to
lift ρ to programs by ρ(P ) = {h :- ρ(c), g | h :- c, g ∈ P }. The following result relates
the fixpoint semantics of P to that of its abstraction ρ(P ).
Theorem 3.3
Let C be a cylindric constraint system. If ρ ∈ uco(C) is a semi-morphism, then
ρ(F C (P )) ⊑ F cod(ρ) (ρ(P )).
Corollary 3.1
Let C be a semi-cylindric constraint system. If ρ ∈ uco(℘↓(C)) is a semi-morphism,
then ρ(↓(F C (P ))) ⊑ F cod(ρ) (ρ(↓(P ))).
4 Constraint logic programs with assertions
We consider programs annotated with assertions (Drabent & Maluszyński, 1988).
When considering the operational semantics of a constraint logic program, it is
natural to associate assertions with syntactic elements of the program such as predicates or the program points between body atoms. Without loss of generality, we
decorate the neck of each clause with a set of constraints C that is interpreted as
an assertion. When C is encountered, the store c is examined to determine whether
c ∈ C (modulo renaming). If c ∈ C execution proceeds normally, otherwise an error
state, denoted ♦, is entered and execution halts.
To formalise this idea, let C be a semi-cylindric constraint system and
ρ ∈ uco(℘↓(C)). The assertion language (in whatever syntactic form it takes) is
described by ρ. A clause of a constraint logic program over C with assertions over
cod(ρ) then takes the form h :- C ⋄c, g where h ∈ Atom, C ∈ cod(ρ), c ∈ C, g ∈ Goal
and ⋄ separates the assertion from the body of the clause. Notice that C is an orderideal and thus downward closed. (C can thus represent disjunctions of constraints,
but the semantics presented in this section should not be confused with a collecting
semantics.) Note also that program transformation (Puebla et al., 2000a) can be
used to express program point assertions in terms of our assertion language. To
specify the behaviour of programs with assertions, let State♦ = State ∪ {♦}, and
let CLP(P ) = {h :- c, g | h :- C ⋄ c, g ∈ P }. The following definition details how the
operational semantics for the assertion language is realised in terms of projection,
renaming and a test for inclusion.
Definition 4.1
A Backward Analysis for Constraint Logic Programs
19
Given a constraint logic program P over a semi-cylindric constraint system C with
assertions over ρ(℘↓(C)), ⇒P ⊆ State × State♦ is the least relation such that:
if p(~x′ ) :- C ′ ⋄ c′ , g ′ ∈ P
♦
′
s = hp(~x), g; ci ⇒P
∧ ∂~x~x (∃x~ (c)) 6∈ C ′
′
hg , g; c ⊗ d~x,~x′ ⊗ c′ i else if p(~x′ ) :- c′ , g ′ ≪s CLP(P )
Recall that p(~x′ ) :- c′ , g ′ ≪s CLP(P ) ensures that the clause p(~x′ ) :- c′ , g ′ does not
share any variables with s. The operational semantics of P is then defined in terms
of ⇒⋆P as Aρ,C (P ) = [{[p(~x) :- c]≈ | hp(~x); 1i ⇒⋆P hǫ; ci}]≡ . The relationship between
two operational semantics is stated in the following (trivial) result.
Proposition 4.1
Aρ,C (P ) ⊑ OC (CLP(P ))
Assertions are often used as interface between behaviour that is amenable to formalisation, for example as an operational semantics, and behaviour that is less
tractable, for example, the semantics of a builtin (Puebla et al., 2000b). More to
the point, it is not always possible to infer the behaviour of a builtin from its definition, partly because builtins are often complicated and partly because builtins
are often expressed in a language such as C. Our work requires assertions for each
builtin in order to specify: its calling convention (for example, which arguments are
required to be ground) and its success behaviour (for example, which arguments
are grounded).
5 Backward fixpoint semantics for constraint logic programs with
assertions
Let P be a constraint logic program over the semi-cylindric constraint system C
with assertions over ρ(℘↓(C)). One natural and interesting question is whether the
error state ♦ is reachable (or conversely not reachable) in P from an initial state
hp(~x); ci. For a given constraint logic program P with assertions, the backward
fixpoint semantics presented in this section infers a (possibly empty) set of c ∈ C
for which hp(~x); ci 6⇒⋆P ♦. The semantics formalises the informal backward analysis
sketched in section 2.
For generality, the semantics is parameterised by C and ρ. The correctness argument requires ρ to be a semi-morphism between h℘↓ (C), ⊆, ∪, ∩, C, ∅, ∃, di and
hρ(℘↓(C)), ⊆, ⊕′ , ∩, C, ρ(∅), ∃′ , d′ i. Additionally, ρ(℘↓(C)) must be a cHa, that is, it
must possess a pseudo-complement →′ . To explain, how pseudo-complement aids
backward analysis consider the problem of inferring c ∈ C for which hg; ci 6⇒⋆P ♦
where g = p1 (~x1 ), . . . , pn (~xn ). Suppose fi ∈ ρ(℘↓(C)) describes the success pattern for pi (~xi ), that is, if hpi (~xi ); 1i →⋆P hǫ; ci then c ∈ fi . Moreover, suppose
di ∈ ρ(℘↓(C)) approximates the initial call pattern for pi (~xi ), that is, if c ∈ di
then hpi (~xi ); ci 6⇒⋆P ♦. Observe that hpn−1 (~xn−1 ), pn (~xn ); ci 6⇒⋆P ♦ if c ∈ dn−1 ∩ e
and e ∩ (dn−1 ∩ fn−1 ) ⊆ dn . This follows since hpn−1 (~xn−1 ); ci 6⇒⋆P ♦ because
c ∈ dn−1 ∩ e ⊆ dn−1 . Moreover, if hpn−1 (~xn−1 ), pn (~xn ); ci ⇒⋆P hpn (~xn ); c′ i then
c′ ∈ (dn−1 ∩ e) ∩ fn−1 ⊆ dn and thus hpn (~xn ); c′ i 6⇒⋆P ♦. Putting e = ρ(∅) ensures
20
Andy King and Lunjin Lu
e ∩ (dn−1 ∩ fn−1 ) ⊆ dn and thereby achieves correctness. However, for precision,
dn−1 ∩ e should be maximised. Since ρ(℘↓(C)) is a cHa, this reduces to assigning
e = ⊕′ {e′ ∈ ρ(℘↓(C)) | e′ ∩ (dn−1 ∩ fn−1 ) ⊆ dn } = (dn−1 ∩ fn−1 ) →′ dn . In general,
without pseudo-complement, there is no unique best e that maximises precision (see
example 5.1). The construction is generalised for g = p1 (~x1 ), . . . , pn (~xn ), by putting
en = C and ei = di ∩ ((di ∩ fi ) →′ ei+1 ) = di ∩ (fi →′ ei+1 ) for 1 ≤ i < n. Then
hg; ci 6⇒⋆P ♦ if c ∈ e1 as required. This iterated application of →′ to propagate
requirements right-to-left is the very essence of the backward analysis.
Example 5.1
Returning to examples 3.2–3.5, let αEP os (C) = g{α(θ) | θ ∈ mgu(E) ∧ E ∈ C},
γEP os (f ) = ∪{C ∈ ℘↓ (Eqn) | αEP os (C) |= f } and ρEP os = γEP os ◦ αEP os .
Note that C1 ∩ C2 = γEP os (f1 ∧ f2 ) and C1 ⊕′ C2 = γEP os (f1 g f2 ) where
Ci = γEP os (fi ). By defining ∃′ and d′ in an analogous way to example 3.5, a
semi-morphism ρEP os is constructed between h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di and
hρEP os (℘↓(Eqn)), ⊆, ⊕′ , ∩, Eqn, ρEP os (∅), ∃′ , d′ i. Recall that ρEP os (℘↓(Eqn)) is not
a cHa. Now consider the problem of inferring an initial c for hpn−1 (~xn−1 ), pn (~xn ); ci
within ρEP os (℘↓(Eqn)). In particular let dn−1 = γEP os (1), fn−1 = γEP os (x ⇔ y)
and dn = γEP os (x ∧ y). Then ej ∩ (dn−1 ∩ fn−1 ) ⊆ dn for e1 = γEP os (x) and
e2 = γEP os (y) but (e1 ⊕′ e2 ) ∩ (dn−1 ∩ fn−1 ) = γEP os ((x g y) ∧ 1 ∧ (x ⇔ y)) =
γEP os (x ⇔ y) 6⊆ γEP os (x∧y) = dn . Thus there is no unique e maximising precision.
Example 5.2
Identity ρid = λx.x is the trivial semi-morphism between h℘↓ (C), ⊆, ∪, ∩, C, ∅, ∃, di
and h℘↓ (C), ⊆, ∪, ∩, C, ∅, ∃, di where the pseudo-complement is given by C1 →′ C2 =
{c ∈ C | ∀c′ ✂ c . c′ ∈ C1 ⇒ c′ ∈ C2 } (Birkhoff, 1967).
Example 5.3
Recall that ρP os is a semi-morphism between h℘↓ (Eqn), ⊆, ∪, ∩, Eqn, ∅, ∃, di and
hρP os (℘↓(Eqn)), ⊆, ⊕′ , ∩, Eqn, ρP os (∅), ∃′ , d′ i. Although ⊕′ 6= ∪, ρP os (℘↓(Eqn)) is
a sub-cHa of ℘↓ (Eqn) with respect to ∩ and →′ (Scozzari, to appear). Moreover,
pseudo-complement (intuitionistic implication) →′ coincides with classic implication ⇒ in the sense that C1 →′ C2 = γP os (f1 ⇒ f2 ) where Ci = γP os (fi ).
This follows since V |= f2 |= (¬f1 ) ∨ f2 and thus f1 ⇒ f2 ∈ P os. Moreover,
f1 ∧ f |= f2 iff |= (f1 ∧ f ) ⇒ f2 iff |= f ⇒ (¬f1 ) ∨ f2 iff f |= (¬f1 ) ∨ f2 . Hence
C1 →′ C2 = ⊕′ {C ∈ ρP os (℘↓(Eqn)) | C1 ∩ C ⊆ C2 } = γP os (f1 ⇒ f2 ). Thus →′ is
finitely computable for ρP os . Finally note that ¬ and ∨ are defined on Bool rather
than P os since ¬f 6∈ P os iff f ∈ P os.
Example 5.4
Now consider the problem of inferring an initial c for hpn−1 (~xn−1 ), pn (~xn ); ci within
ρP os (℘↓(Eqn)). Analogous to example 5.1, let dn−1 = γP os (1), fn−1 = γP os (x ⇔ y)
and dn = γP os (x ∧ y). Then ej ∩ (dn−1 ∩ fn−1 ) ⊆ dn for e1 = γP os (x) and e2 =
γP os (y) and (e1 ⊕′ e2 )∩(dn−1 ∩fn−1 ) = γP os ((x∨y)∧1∧(x ⇔ y)) = γP os (x∧y) = dn .
Thus there is a unique e maximising precision.
A Backward Analysis for Constraint Logic Programs
21
Since hρ(℘↓(C)), ⊆, ⊕′ , ∩, C, ρ(∅), ∃′ , d′ i is a cylindric constraint system, it follows
that e ⊆ ∃′x (e) for all e ∈ ρ(℘↓(C)). A consequence of e ⊆ ∃′x (e) is that projection
approximates from above. Approximation from above, however, is not entirely appropriate for backward analysis. In particular, observe that if hg; ci 6⇒⋆P ♦ for all
c ∈ e, then it does not necessarily follow that hg; ci 6⇒⋆P ♦ for all c ∈ ∃′x (e). What
is required is a dual notion of projection, say denoted ∀′ , that approximates from
below. Then hg; ci 6⇒⋆P ♦ for all c ∈ ∀′x (e). Although ∀′ is an abstract operator, the
concept is defined for an arbitrary cylindric constraint system for generality.
Definition 5.1
If hC, ✂, ⊕, ⊗, 1, 0, ∃, di is a cylindric constraint system and x ∈ V then ∀x : C → C
is a monotonic operator such that: ∃x (∀x (c)) ✂ c and c ✂ ∀x (∃x (c)) for all c ∈ C.
Recall that ∃x is monotonic and thus α is the lower adjoint of γ and γ is the upper
adjoint of α. More exactly, it follows that ∀x can be automatically constructed from
∃x by ∀x (c) = ⊕{c′ ∈ C | ∃x (c′ ) ✂ c}. Observe that this ensures that ∀x is the most
precise projection operator from below. For succinctness, define ∀{x1 ,...,xn } (c) =
∀x1 (. . . (∀xn (c))) and ∀X (c) = ∀F V (c)\X (c).
Example 5.5
For ρid , let ∀′x (C) = ↓({c ∈ C | ∃x (c) = c}).
Example 5.6
For ρP os , let ∀′x (C) = γP os (f ′ ) if f ′ ∈ P os otherwise ∀′x (C) = γP os (0) where C =
γP os (f ) and f ′ = f [x 7→ 0] ∧ f [x 7→ 1]. Observe that ∃x (f )[x 7→ 0] ∧ ∃x (f )[x 7→ 1] =
∃x (f ) and hence C ⊆ ∃′x (C) = ∀′x (∃′x (C)) as required. Moreover, if ∀′x (C) = γP os (0)
then ∃′x (∀′x (C)) = γP os (0) ⊆ C. Otherwise ∃x (f [x 7→ 0] ∧ f [x 7→ 1]) = f [x 7→
0] ∧ f [x 7→ 1] |= f . Thus ∃′x (∀′x (C)) ⊆ C as required. Finally, note that ∀′x is finitely
computable for ρP os . For example if Ci = γP os (fi ), f1 = (x ⇐ y), f2 = (x ∧ y) and
f3 = (x ∨ y), then ∀′x (Ci ) = γP os (fi′ ) where f1′ = 0, f2′ = 0 and f3′ = y.
Backward analysis can now be formalised as follows.
Definition 5.2
Given a constraint logic program P over a semi-cylindric constraint system C with
assertions over ρ(℘↓(C)), the operator DPρ,C : Intcod(ρ) → Intcod(ρ) is defined by:
∀
[p(~x) :- e]≈ ∈ E
.
∀
p(~x) :- C ⋄ c, p1 (~x1 ), . . . , pn (~xn ) ∈ P
.
n
[
∃
{[pi (~xi ) :- fi ]≈ }i=1 ⊆ F
.
ρ,C
E
DP (D) =
∃
{[pi (~xi ) :- di ]≈ }ni=1 ⊆ D
.
′
e
=
C
∧
e
=
d
∩
(f
→
e
)
∧
n+1
i
i
i
i+1
′
′
e ⊆ ∀~x (e0 ) ∧ e0 = C ∩ (ρ(↓(c)) → e1 )
where [F ]≡ = F cod(ρ) (ρ(↓(CLP(P )))).
Since D is parameterised by ρ and C it can interpreted as a backward analysis framework. D requires F , the success patterns of the program obtained by discarding the
assertions, to be pre-computed. D considers each clause in the program in turn and
22
Andy King and Lunjin Lu
calculates those states which ensure that the clause (and those it calls) will not violate an assertion. An abstraction which characterises these states is calculated by
propagating requirements, represented as abstractions, right-to-left by repeated application of pseudo-complement. Projection from below then computes those states
which, when restricted to the head variables, still ensure that no error arises in the
clause (and those it calls). Repeated application of D yields a decreasing sequence
of interpretations.
The operator DPρ,C lifts to Intcod(ρ) / ≡ by DPρ,C ([D]≡ ) = [DPρ,C (D)]≡ . Since
hcod(ρ), ⊑, ⊔, ⊓i is a complete lattice, DPρ,C will possess a gfp if DPρ,C is monotonic.
The existence of gfp(DPρ,C ) is guaranteed by the following result since co-continuity
implies monotonicity.
Proposition 5.1
DPρ,C : Intcod(ρ) /≡ → Intcod(ρ) /≡ is co-continuous.
Since gfp(DPρ,C ) exists, a backward fixpoint semantics can be defined
Dρ,C (P ) = gfp(DPρ,C ) and computed by lower Kleene iteration. To establish a connection between Dρ,C (P ) and the operational semantics of P , it is useful to annotate the goals of a state with their depth in the computation tree. To formalise this idea ⇒P is lifted to the annotated states Conf♦ = Conf ∪ {♦} where
Conf = Goal × C × N⋆ to obtain the transition system ⇛P .
Definition 5.3
Given a constraint logic program with assertions P over a semi-cylindric constraint
system C, ⇛P ⊆ Conf × Conf♦ is the least relation such that:
♦
if hp(~x), g; ci ⇒P ♦
hp(~x), g; c; n · hi ⇛P
′
hg ′ , g; c′ ; (n + 1)|g | · hi if hp(~x), g; ci ⇒P hg ′ , g; c′ i
′
The sequence (n + 1)|g | denotes |g ′ | concatenations of n + 1. The following result
relates the depth of the goals of the annotated states to the iterates obtained by
lower Kleene iteration. Informally, it says that if a constrained atom p(~x) :- e occurs
in the interpretation obtained by applying D k times, and e characterises an initial
state (in a certain sense), and the depth of the goals in a derivation starting at the
initial state does not exceed k, then the derivation will not violate an assertion.
The main safety theorem flows out of this result.
Lemma 5.1
Let hp(~y ); c′′ ; 1i = s1 ⇛⋆P sn ⇛P ♦, si = hgi ; ci ; hi i and (DPρ,C )k (⊤) = [Dk ]≡ .
If max({max(hi ) | 1 ≤ i ≤ n}) ≤ k and [p(~y ) :- e]≈ ∈ Dk then ∃y~ (c′′ ) 6∈ ∃y~ (e).
Theorem 5.1
If Dρ,C (P ) = [D]≡ , [p(~y ) :- e]≈ ∈ D and c ∈ ∃y~ (e) then hp(~y ); ci 6⇒⋆P ♦.
6 Experimental evaluation
In order to evaluate the usefulness of the analysis framework presented in section 5,
a backward P os analyser has been constructed for inferring calling modes. The
A Backward Analysis for Constraint Logic Programs
23
fixpoint component of the analyser is coded in SICStus Prolog 3.8.3. The domain
operations are coded in C and are essentially the binary decision diagram (BDD)
routines written by Armstrong and Schachte (Armstrong et al., 1998). The analyser
takes, as input, a program written in a declarative subset of ISO Prolog. It outputs
a mode for each program predicate. The safety result of theorem 5.1 ensures that
if a call to a predicate is at least as instantiated as the inferred mode, then the call
will not violate an instantiation requirement. Modes are expressed as grounding
dependencies (Armstrong et al., 1998).
The implementation follows the framework defined in section 5 very closely. The
analyser was straightforward to implement as it is essentially two bottom-up fixpoint computations: one for F and the other for D. The only subtlety is in handling
the builtins. For each builtin, it is necessary to select a grounding dependency that
is sufficient for avoiding an instantiation error. This is an lower approximation (the
required mode of table 1). It is also necessary to specify behaviour on success. This
is an upper-approximation (the success mode of table 1). The lower approximations
are the assertions that are added to Prolog program to obtain a constraint logic
program with assertions.
Interestingly, the success mode does not always entail the required mode. Univ
(=..) illustrates this. A sufficient but not necessary condition for univ not to error is
that either the first or second argument is ground. This cannot be weakened in P os
(but could be weakened in a type dependency domain (Codish & Lagoon, 2000)
that expressed rigid lists). The success mode is that the first argument is ground
iff the second argument is ground (which does not entail the required mode). Note
too that keysort and sort error if their first argument is free. A sufficient mode
for expressing this requirement is that the first argument is ground. Again, this
requirement cannot be weakened in P os.
The analyser has been applied to some standard Prolog benchmarks which can
be found at http://www.oakland.edu/∼l2lu/benchmarks-BG.zip. The results of the
analysis, that is, the calling modes for the predicates in the smaller benchmarks, are
given in table 2. The results, though surprising in some cases (see sort of permSort
and insert of treesort for example) have been verified by hand and appear to be
optimal for P os. The analysis, of course, can be applied to larger programs (though
it becomes very difficult to verify the results by hand) and table 3 demonstrates
that the analysis scales smoothly to medium-scale programs at least. The table lists
the larger benchmarks (which possibly include some unreachable code) in terms of
increasing size measured by the total number of atoms in the source. The abs
column records the time in milliseconds required to read, parse and normalise the
source into the ground program representation used by the analyser; lfp is the time
needed to compute the fixpoint characterising the success modes; gfp is the time
needed to compute the calling modes; and finally sum is the total analysis time.
This includes the (usually negligible) overhead of annotating the source with the
modes required by builtins. Timings were performed on a Dell GX200 1GHz PC
with 128 MB memory running Windows 2000. The timings suggest that the analysis
is practical at least for medium-scale programs (though the running time for BDDs
can be sensitive to the particular dependencies that arise). Moreover, with a state-
24
Andy King and Lunjin Lu
builtin
t1 == t2 , t1 \== t2 , t1 @< t2 , t1 @> t2 ,
t1 @=< t2 ,
t1 @>= t2 ,
t1 \= t2 ,
!,
compound(t1 ), display(t1 ), listing, listing(t1 ),
nl, nonvar(t1 ), print(t1 ), portray clause(t1 ),
read(t1 ), repeat, true, var(t1 ), write(t1 ),
writeq(t1 )
atom(t1 ), atomic(t1 ), compare(t1 , t2 , t3 ),
float(t1 ), ground(t1 ), integer(t1 ), number(t1 )
length(t1 , t2 )
statistics(t1 , t2 )
abort, fail, false
keysort(t1 , t2 ), sort(t1 , t2 )
tab(t1 ), put(t1 )
t1 is t2
t1 =:= t2 , t1 =\= t2 , t1 < t2 , t1 > t2 ,
t1 =< t2 , t1 >= t2
arg(t1 , t2 , t3 )
name(t1 , t2 )
t1 =.. t2
functor(t1 , t2 , t3 )
required mode
true
success mode
true
true
f1
true
true
true
f1
f1
f2
g1
f2
g1
f alse
g2
f1
g1
g1
g1
g4
g4
g5
g3
g1
g2
g6
Table 1. Abstracting builtins where fi = ∧var(ti ), g1 = f1 ∧ f2 , g2 = f1 ⇔ f2 ,
g3 = f1 ∧ (f2 ⇒ f3 ), g4 = f1 ∨ f2 , g5 = f1 ∨ (f2 ∧ f3 ) and g6 = f2 ∧ f3 .
of-the-art GER factorised BDD package (Bagnara & Schachte, 1999) the analysis
would be faster. Interestingly, the time to compute the lfp often dominates the
whole analysis. BDD widening will be required to analyse very large applications
but this is a study within itself (Heaton et al., 2000).
7 Related work
Our work was motivated by the recent revival of interest in logic programming
with assertions (Boye et al., 1997; Puebla et al., 2000a). For example, (Puebla
et al., 2000b) argues that it is useful to trap an unexpected call to a predicate with
an assertion otherwise a program may error at a point that is far from the source of
the problem. Moreover, (Puebla et al., 2000a) observe that predicates are normally
written with an expectation on the initial calling pattern, and hence provide an
entry assertion to make the, moding say, of the top-level queries explicit. Our
work shows how entry assertions can be automatically synthesised which ensure
that instantiation errors do not occur while executing the program.
The most closely related work concerns the demand analysis of ccp (Debray, 1993;
Falaschi et al., 2000). A demand analysis for the ccp language Janus (Saraswat et al.,
1990) is proposed in (Debray, 1993) which determines whether or not a predicate is
uni-modal. A predicate is uni-modal iff the argument tuple for each clause share the
same minimal pattern of instantiation necessary for reduction. The demand analysis
of a predicate simply traverses the head and guard of each clause to determine
the extent to which arguments have to be instantiated. Body atoms need not be
considered so the analysis does not involve a fixpoint computation. A related paper
A Backward Analysis for Constraint Logic Programs
benchmark
bubblesort
dnf
heapify
predicate
sort(x1 , x2 )
ordered(x1 )
append(x1 , x2 , x3 )
go
dnf(x1 , x2 )
norm(x1 , x2 )
literal(x1 )
greater(x1 , x2 )
adjust(x1 , x2 , x3 , x4 )
permSort
queens
quicksort
treeorder
treesort
heapify(x1 , x2 )
select(x1 , x2 , x3 )
ordered(x1 )
permutation(x1 , x2 )
sort(x1 , x2 )
noattack(x1 , x2 , x3 )
safe(x1 )
delete(x1 , x2 , x3 )
perm(x1 , x2 )
queens(x1 , x2 )
append(x1 , x2 , x3 )
qsort(x1 , x2 )
partition(x1 , x2 , x3 , x4 )
member(x1 , x2 )
select(x1 , x2 , x3 )
split(x1 , x2 , x3 , x4 )
split(x1 , . . . , x7 )
visits2tree(x1 , x2 , x3 )
v2t(x1 , x2 , x3 )
tree to list aux(x1 , x2 , x3 )
tree to list(x1 , x2 )
list to tree(x1 , x2 )
insert list(x1 , x2 , x3 )
insert(x1 , x2 , x3 )
treesort(x1 , x2 )
25
mode
x1
x1
true
true
true
true
true
x
1 ∧ x2
(x1 ∧ x4 )
∨
(x1 ∧ x2 ∧ x3 ) ∨
(¬x2 ∧ ¬x3 ∧ x4 )
x1
true
x1
true
x1 ∨ x2
x1 ∧ x2 ∧ x3
x1
true
true
x1 ∨ x2
true
x1
x2 ∧ (x1 ∨ (x3 ∧ x4 ))
true
true
true
true
true
true
true
true
x1
x1 ∧ x2
x1 ∧ (x2 ∨ x3 )
x1
Table 2. Precision of the Mode Analysis (small benchmarks)
(Debray et al., 1992) presents a goal-dependent (forward) analysis that detects those
ccp predicates which can be scheduled left-to-right without deadlock. If assertions
are used to approximate synchronisation, then the analysis described in this paper
can be re-interpreted as a backward suspension analysis of ccp under left-to-right
scheduling.
When reasoning about module interaction it can be advantageous to reverse
the traditional deductive approach to abstract interpretation that is based on the
abstract unfolding of abstract goals. In particular (Giacobazzi, 1998) shows how
abduction and abstraction can be combined to compute those properties that one
module must satisfy to ensure that its composition with another fulfils certain
requirements. Abductive analysis can, for example, determine how an optimisation
26
file
astar
fft
knight
browse wamcc
cal wamcc
life
crypt wamcc
cry mult
browse
bid
disj r
consultant
ncDP
tsp
elex scanner
robot
sorts
cs2
scc
bp0-6
bnet
jons
mathlib
intervals
barnes hut
Andy King and Lunjin Lu
size
100
104
105
106
108
110
113
118
125
128
148
151
156
162
165
165
172
175
175
201
205
222
226
230
240
abs lfp gfp sum
file
10 10 0 20
tictactoe
20
0 10 30
jons2
10
0 0 10
kalah
10
0 0 10
draw
10 10 0 20
cs r
10 10 10 30
reducer
10
0 0 10
sdda
10 10 10 30
bryant
10 10 0 20
ga
10 10 0 20
neural
30
0 10 40
press
20
0 10 30
peep
10 10 0 20
nbody
30 20 10 60
eliza
20 10 0 30
read
10 10 0 20 simple analyzer
0 10 10 20
ann
30 10 10 50
diffsimpsv
10 141 0 151
arch1
20 10 0 30
asm
20 20 0 40
poker
40
0 10 50
pentomino
10 10 0 20
chat
20 10 10 40
sim v5-2
40 30 40 110
semigroup
size
258
261
269
289
311
320
336
349
363
378
381
414
421
432
434
512
547
681
692
800
962
981
1037
1308
2328
abs
lfp gfp sum
20
10
10
40
20
10
0
30
30
10
20
60
70
91
40 201
40
20
10
70
40
30
0
70
20
21
0
41
30 120
21 171
50
30
20 100
30
10
0
40
30
20
0
50
50
20
10
80
40
20
20
80
50
20
0
70
40
20
10
70
90 701
20 811
50
30
10
90
61 100
0 161
50
40
10 100
60
40
30 130
81
70
10 161
50
40
80 170
411 1422 1082 2915
80
70
0 150
180
90
60 350
Table 3. Speed of the Mode Analysis (medium-scale benchmarks)
in one module depends on a predicate defined in another module. Abductive analysis
is related to the backward analysis presented in this paper since abduction is the
inverse image of a forward semantics whereas pseudo-complement is the inverse
image of conjunction – the basic computational step in forward (and backward)
semantics.
The termination inference engine of (Genaim & Codish, 2001) decomposes the
cTI analyser of (Mesnard, 1996) into two components: a termination checker (Codish
& Taboch, 1999) and the backward analysis described in this paper. First, the termination inference engine computes a set of binary clauses which describe possible
loops in the program with size relations. Second, a Boolean function is inferred
for each predicate that describes moding conditions sufficient for each loop to only
be executed a finite number of times. Third, the backward analysis described in
this paper is applied to infer initial modes by calculating a greatest fixpoint which
guarantee that the moding conditions hold and thereby assure termination. Interestingly, the cTI analyser involves a µ-calculus solver to compute the greatest
fixpoint of an equivalent (though more complex) system of equations. This seems
to suggest that greatest fixpoints are important in backward analysis.
Cousot and Cousot (Cousot & Cousot, 1992) explain how a backward collecting semantics can be deployed to precisely characterise states that arise in finite
SLD-derivations. First, they present a forward collecting semantics that records the
A Backward Analysis for Constraint Logic Programs
27
descendant states that arise from a set of initial states. Second, they present a dual
(backward) collecting semantics that records those states which occur as ascendant
states of the final states. By combining both semantics, they characterise the set
of descendant states of the initial states which are also ascendant states of the final states of the transition system. This use of backward analysis is primarily as
a device to improve the precision of a classic goal-dependent analysis. Our work is
more radical in the sense that it shows how a bottom-up analysis performed in a
backward fashion, can be used to characterise initial queries. Moreover it is used
for lower approximation rather than upper approximation.
Mazur, Janssens and Bruynooghe (Mazur et al., 2000) present a kind of ad hoc
backward analysis to derive reuse conditions from a goal-independent reuse analysis
for Mercury (Somogyi et al., 1996). The analysis propagates reuse information from
a point where a structure is decomposed in a clause to the point where the clause
is invoked in its parent clause. This is similar in spirit to how demand is passed
from a callee to a caller in the backward analysis described in this paper. However,
the reuse analysis does not propagate information right-to-left across a clause using
pseudo-complement, and so one interesting topic for future work will to be relate
these two analyses. Another matter for future work, will be to investigate the extent
to which our backward mode analysis can be reconstructed by inverting abstract
functions (Hughes & Launchbury, 1994).
8 Conclusion
We have shown how abstract interpretation, and specifically a backward analysis,
can infer moding properties which if satisfied by the initial query, come with the
guarantee that the program and query cannot generate instantiation errors. Backward analysis has other applications in termination inference and also in inferring
queries for which the builtins called from within the program behave predictably in
the presence of rational trees. The analysis is composed of two bottom-up fixpoint
calculations, a lfp and a gfp, both of which are straightforward to implement. The
lfp characterises success patterns. The gfp, uses these success patterns to infer safe
initial calling patterns. It propagates moding requirements right-to-left, against the
control-flow, using the pseudo-complement operator. This operator fits with backward analysis since it enables moding requirements to be minimised (maximally
weakened) in right-to-left propagation. This operator, however, requires that the
computational domain be closed under Heyting completion (or equivalently condense). This requirement seems reasonable because disjunctive dependencies occur
frequently in right-to-left propagation and therefore significant precision would be
lost if the requirement were relaxed. Experimental evaluation has demonstrated that
the analysis is practical in the sense that it can infer calling modes for mediumscaled programs. Finally, our work adds weight to the belief that condensing is an
important property in the analysis of logic programs.
28
Andy King and Lunjin Lu
Acknowledgements
We thank Maurice Bruynooghe, Mike Codish, Samir Genaim, Roberto Giacobazzi,
Jacob Howe, Fred Mesnard, Germán Puebla and Francesca Scozzari for helpful discussions. We would also like to thank the anonymous referees for their comments
and Peter Schachte for his BDD analyser. We also thank Roberto Bagnara for the
use of some of the China benchmarks. This work was supported, in part, by EPSRC
grant GR/MO8769.
References
Armstrong, T., Marriott, K., Schachte, P., & Søndergaard, H. (1998). Two Classes of
Boolean Functions for Dependency Analysis. Science of Computer Programming, 31(1),
3–45.
Bagnara, R., & Schachte, P. (1999). Factorizing Equivalent Variable Pairs in ROBDDBased Implementations of Pos. Pages 471–485 of: International Conference on Algebraic
Methodology and Software Technology. Lecture Notes in Computer Science, vol. 1548.
Springer-Verlag.
Bagnara, R., Zaffanella, E., Gori, R., & Hill, P. M. (2001). Boolean Functions for FiniteTree Dependencies. Pages 575–589 of: International Conference on Logic for Programming, Artificial Intelligence and Reasoning. Lecture Notes in Artificial Intelligence, vol.
2250. Springer-Verlag.
Birkhoff, G. (1967). Lattice Theory. AMS Press.
Bossi, A., Gabbrielli, M., Levi, G., & Martelli, M. (1994). The s-Semantics Approach:
Theory and Applications. The Journal of Logic Programming, 19/20, 149–197.
Boye, J., Drabent, W., & Maluszyński, J. (1997). Declarative Diagnosis of Constraint
Programs: an Assertion-based Approach. Pages 123–141 of: Proceedings of the Third
International Workshop on Automated Debugging. University of Linköping Press.
Codish, M., & Lagoon, V. (2000). Type Dependencies for Logic Programs using ACIunification. Theoretical Computer Science, 238, 131–159.
Codish, M., & Taboch, C. (1999). A Semantic Basis for the Termination Analysis of Logic
Programs. The Journal of Logic Programming, 41(1), 103–123.
Cousot, P., & Cousot, R. (1982). Inductive Principles for Proving Invariance Properties of
Programs. Pages 75–119 of: Tools and Notions for Program Construction. Cambridge
University Press.
Cousot, P., & Cousot, R. (1992). Abstract Interpretation and Application to Logic Programs. The Journal of Logic Programming, 13(2–3), 103–179.
Debray, S. (1993). QD-Janus: a Sequential Implementation of Janus in Prolog. Software
Practice and Experience, 23(12), 1337–1360.
Debray, S., Gudeman, D., & Bigot, P. (1992). Detection and Optimization of Suspensionfree Logic Programs. The Journal of Logic Programming, 29(1–3), 171–194.
Drabent, W., & Maluszyński, J. (1988). Inductive Assertion Method for Logic Programs.
Theoretical Computer Science, 59(1), 133–155.
Dyber, P. (1991). Inverse Image Analysis Generalises Strictness Analysis. Information
and Computation, 90(2), 194–216.
Falaschi, M., Hicks, P., & Winsborough, W. (2000). Demand Transformation Analysis for
Concurrent Constraint Programs. The Journal of Logic Programming, 41(3), 185–215.
Filé, G., & Ranzato, F. (1994). Improving Abstract Interpretations by Systematic Lifting
A Backward Analysis for Constraint Logic Programs
29
to the Powerset. Pages 655–669 of: International Logic Programming Symposium. MIT
Press.
Genaim, S., & Codish, M. (2001). Inferring Termination Conditions for Logic Programs
using Backwards Analysis. Pages 681–690 of: International Conference on Logic for
Programming, Artificial Intelligence and Reasoning. Lecture Notes in Artificial Intelligence, vol. 2250. Springer-Verlag.
Giacobazzi, R. (1998). Abductive Analysis of Modular Logic Programs. Journal of Logic
and Computation, 8(4), 457–484.
Giacobazzi, R., & Scozzari, F. (1998). A Logical Model for Relational Abstract Domains.
ACM Transactions on Programming Languages and Systems, 20(5), 1067–1109.
Giacobazzi, R., Debray, S., & Levi, G. (1995). Generalized Semantics and Abstract Interpretation for Constraint Logic Programs. The Journal of Logic Programming, 25(3),
191–248.
Giacobazzi, R., Ranzato, F., & Scozzari, F. (1998). Building Complete Abstract Interpretations in a Linear Logic-based Setting. Pages 215–229 of: Static Analysis Symposium.
Lecture Notes in Computer Science, vol. 1503. Springer-Verlag.
Hall, C., & Wise, D. (1989). Generating Function Versions with Rational Strictness
Patterns. Science of Computer Programming, 12, 39–74.
Heaton, A., Abo-Zaed, M., Codish, M., & King, A. (2000). A Simple Polynomial Groundness Analysis for Logic Programs. The Journal of Logic Programming, 45(1–3), 143–156.
Hughes, R. J. M., & Launchbury, J. (1994). Reversing Abstract Interpretations. Science
of Computer Programming, 22, 307–326.
Jaffar, J., & Maher, M. J. (1994). Constraint Logic Programming: A Survey. The Journal
of Logic Programming, 19/20, 503–581.
Langen, A. (1991). Advanced Techniques for Approximating Variable Aliasing in Logic
Programs. Ph.D. thesis, Computer Science Department, Los Angeles, California 900890782.
Marriott, K., & Søndergaard, H. (1993). Precise and Efficient Groundness Analysis for
Logic Programs. ACM Letters on Programming Languages and Systems, 2(4), 181–196.
Mazur, N., Janssens, G., & Bruynooghe, M. (2000). A Module Based Analysis for Memory
Reuse in Mercury. Pages 1255–1269 of: Computational Logic. Lecture Notes in Artificial
Intelligence, vol. 1861.
Mesnard, F. (1996). Inferring Left-terminating Classes of Queries for Constraint Logic
Programs. Pages 7–21 of: Joint International Conference and Symposium on Logic
Programming. MIT Press.
Mesnard, F., & Neumerkel, U. (2001). Applying Static Analysis Techniques for Inferring
Termination Conditions of Logic Programs. Pages 93–110 of: Static Analysis Symposium. Lecture Notes in Computer Science, vol. 2126. Springer-Verlag.
Mycroft, A. (1981). Abstract Interpretation and Optimising Transformations for Applicative Programs. Ph.D. thesis, University of Edinburgh.
Puebla, G., Bueno, F., & Hermenegildo, M. (2000a). An Assertion Language for Constraint
Logic Programs. Pages 23–61 of: Analysis and Visualization Tools for Constraint Programming. Lecture Notes in Computer Science, vol. 1870. Springer-Verlag.
Puebla, G., Bueno, F., & Hermenegildo, M. (2000b). A Generic Preprocessor for Program
Validation and Debugging. Pages 63–107 of: Analysis and Visualization Tools for Constraint Programming. Lecture Notes in Computer Science, vol. 1870. Springer-Verlag.
Saraswat, V., Kahn, K., & Levy, J. (1990). Janus: a Step Towards Distributed Constraint
Programming. Pages 431–446 of: North American Conference on Logic Programming.
MIT Press.
30
Andy King and Lunjin Lu
Scozzari, F. (to appear). Logical Optimality of Groundness Analysis. Theoretical Computer
Science.
Somogyi, Z., Henderson, F., & Conway, T. (1996). The execution algorithm of Mercury,
an efficient purely declarative logic programming language. The Journal of Logic Programming, 29(1–3), 17–64.
van Dalen, D. (1997). Logic and Structure. Springer.
Wadler, P., & Hughes, R. J. M. (1987). Projections for Strictness Analysis. Pages 385–407
of: Functional Programming and Computer Architecture. Lecture Notes in Computer
Science, vol. 274. Springer-Verlag.
A Backward Analysis for Constraint Logic Programs
31
A Proof appendix
Proof for proposition 3.1
℘↓(C)
′
Proof by induction. Let I0 = ∅, I0′ = ∅, Ik+1 = FPC (Ik ) and Ik+1
= F↓(P ) (Ik′ ). To
show ↓(Ik ) ⊑ Ik′ since then it follows that ↓(lfp(FPC )) = ↓(⊔k∈N Ik ) ⊑ ⊔k∈N ↓(Ik ) ⊑
℘↓(C)
⊔k∈N Ik′ = lfp(F↓(P ) ). The base case is trivial so suppose ↓(Ik ) ⊑ Ik′ .
Let [p(~x) :- c′ ]≈ ∈ Ik+1 . Then there exists p(~x) :- c, p1 (~x1 ), . . . , pn (~xn ) ∈ P and
{[pi (~xi ) :- ci ]≈ }ni=1 ⊆ Ik such that c′ = c ⊗ ⊗ni=1 ∃x~i (ci ). Observe that ↓(c′ ) ⊆
↓(c) ∩ ∩ni=1 ↓(∃x~i (ci )) ⊆ ↓(c) ∩ ∩ni=1 ∃x~i (↓(ci )). But by the inductive hypothesis, there
′
exist {[pi (~xi ) :- c′i ]≈ }ni=1 ⊆ Ik′ such that ↓(ci ) ⊆ c′i . Hence [p(~x) :- c′′ ]≈ ∈ Ik+1
such
′
′′
′
that ↓(c ) ⊆ c so that Ik+1 ⊑ Ik+1 and the result follows.
Proof for theorem 3.3
The proof tactic is analogous to that used for proposition 3.1.
Proof for corollary 3.1
Let C be a semi-cylindric constraint system and ρ ∈ uco(℘↓(C)) be a semi-morphism.
↓
By proposition 3.1 it follows that ↓(F C (P )) ⊑ F ℘ (C) (↓(P )) and hence ρ(↓(F C (P ))) ⊑
↓
↓
ρ(F ℘ (C) (↓(P ))) and by theorem 3.3 ρ(F ℘ (C) (↓(P ))) ⊑ F cod(ρ) (ρ(↓(P ))) and so the
result follows.
Proof for proposition 5.1
Let Dn+1 ⊑ Dn for all n ∈ N. Put En = ∪{Dl | l ≥ n} and E = ∩{En |
n ∈ N}. Since Dn+1 ⊑ Dn observe that En ≡ Dn for all n ∈ N and hence
DPρ,C (⊓{[Dn ]≡ | n ∈ N}) = DPρ,C (⊓{[En ]≡ | n ∈ N}) = DPρ,C ([E]≡ ) = [DPρ,C (E)]≡ =
[∩{DPρ,C (En ) | n ∈ N}]≡ = ⊓{[DPρ,C (En )]≡ | n ∈ N} = ⊓{DPρ,C ([En ]≡ ) | n ∈ N} =
⊓{DPρ,C ([Dn ]≡ ) | n ∈ N}.
Proof for lemma 5.1
Proof by (double) induction. Let hp(~y ); c′′ ; 1i = s1 ⇛⋆P sn ⇛P ♦, si = hgi ; ci ; hi i
and suppose (DPρ,C )k (⊤) = [Dk ]≡ . The outer induction is on k.
base case: Suppose max({max(hi ) | 1 ≤ i ≤ n}) ≤ 1 and [p(~y ) :- e]≈ ∈ D1 . Thus
s1 ⇛P ♦ so that s1 ⇒P ♦ and hence there exists p(~x′ ) :- C ′ ⋄ c′ , g ′ ∈ P such that
′
∂y~~x (∃y~ (c′′ )) 6∈ C ′ . Then [p(~x′ ) :- e′ ]≈ ∈ D1 where ∃~z (d~z,~y ⊗ e) = ∃~z (d~z,~x′ ⊗ e′ ) and
var(~z) ∩ (var(~y ) ∪ F V (e) ∪ var(~x′ ) ∪ F V (e′ )) = ∅. Observe that e′ ⊆ ∀~x′ (C ′ ) and
′
′
thus ∂y~~x (∃y~ (e)) = ∃~x′ (e′ ) ⊆ ∃~x′ (∀~x′ (C ′ )) = ∀x~ ′ (C ′ ) ⊆ C ′ . Hence ∂y~~x (∃y~ (c′′ )) 6∈
′
∂y~~x (∃y~ (e)) so that ∃y~ (c′′ ) 6∈ ∃y~ (e) as required.
inductive case: Suppose k = max({max(hi ) | 1 ≤ i ≤ n}) > 1 and [p(~y ) :- e]≈ ∈ Dk .
Suppose, for the sake of a contradiction, that ∃y~ (c′′ ) ∈ ∃y~ (e). Since k > 1 there
exists w = p(~x) :- C ⋄ c, p1 (~x1 ), . . . , pl (~xl ) ∈ P , ϕ ∈ Ren such that ϕ(CLP(w)) =
p(~x′ ) :- c′ , p1 (~x′1 ), . . . , pl (~x′l ) ≪s1 CLP(P ) and s2 = hp1 (~x′1 ), . . . , pl (~x′l ); c′1 ; 2l i and
c′1 = c′′ ⊗ dy~,~x′ ⊗ c′ . Suppose hp1 (~x′1 ); c′1 i ⇒⋆P hǫ; c′2 i, . . . , hpm (~x′m ); c′m i ⇒⋆P ♦.
Without loss of generality assume F V (CLP(w))∩F V (c′i ) = ∅ for all i ∈ [1, m]. Let
~v = ~x·~x1 · · · ~xl and ~v ′ = ~x′ ·~x′1 · · · ~x′l . Let gi′ ∈ C such that hpi (~x′i ); 1i →⋆P hǫ; gi′ i and
c′i+1 = c′i ⊗gi′ for all i ∈ [1, m). For all i ∈ [1, m), put gi = ∂~x~x′i (gi′ ). Put c1 = ∂~v~v′ (c′1 )
i
and for all i ∈ [2, m], put ci = ∂~x~x′i (c′i ). Then ci+1 = ci ⊗ gi for all i ∈ [1, m).
i
32
Andy King and Lunjin Lu
Let OC (P ) = [F ]≡ . By proposition 4.1, [pi (~xi ) :- gi ]≈ = [pi (~x′i ) :- gi′ ]≈ ∈ F for all
i ∈ [1, m). By theorem 3.2, OC (P ) = F C (P ) and by corollary 3.1, ρ(↓(F C (P ))) ⊑
F cod(ρ) (ρ(↓(P ))). Thus for i ∈ [1, m) there exists [pi (~xi ) :- fi ]≈ ∈ F such that
ρ(↓(gi )) ⊆ fi . Put fi = 0 for all i ∈ [m, l] to ensure [pi (~xi ) :- fi ]≈ ∈ F for
all i ∈ [m, l]. Let [pi (~xi ) :- di ]≈ ∈ Dk for all i ∈ [1, l]. Finally put en+1 = C,
ei = di ∩ (fi →′ ei+1 ) for all i ∈ [1, l] and e0 = C ∩ (ρ(↓(c)) →′ e1 ). The inner
induction is on i and is used to show ρ(↓(ci )) ⊆ ei for all i ∈ [1, m].
base case: Now c1 = ∂~v~v′ (c′1 ) ✂ ∂y~~x (∃y~ (c′′ )) ∈ C. Thus ρ(↓(c1 )) ⊆ C. Furthermore,
c1 = ∂~v~v′ (c′1 ) ✂ ∂~v~v′ (c′ ) = c. Thus ρ(↓(c1 )) ⊆ ρ(↓(c)). Moreover, c1 ✂ ∂y~~x (∃y~ (c′′ )) ∈
∂y~~x (∃y~ (e)) ⊆ ∀~x (e0 ) ⊆ e0 . Thus ρ(↓(c1 )) ⊆ e0 . However, e0 = C∩(ρ(↓(c)) →′ e1 ).
Thus ρ(↓(c1 )) ⊆ C ∩(ρ(↓(c)) →′ e1 ) and ρ(↓(c1 )) ⊆ ρ(↓(c1 ))∩C ∩(ρ(↓(c)) →′ e1 )
= ρ(↓(c1 )) ∩ (ρ(↓(c)) →′ e1 ) = ρ(↓(c1 )) ∩ ρ(↓(c)) ∩ (ρ(↓(c)) →′ e1 ) = ρ(↓(c1 )) ∩
ρ(↓(c)) ∩ e1 = ρ(↓(c1 )) ∩ e1 . Therefore ρ(↓(c1 )) ⊆ e1 as required.
inductive case: Suppose ρ(↓(ci )) ⊆ ϕ(ei ). Now ρ(↓(ci+1 )) = ρ(↓(ci ⊗ gi ))
⊆ ρ(↓(ci )) ∩ ρ(↓(gi )) ⊆ ei ∩ ρ(↓(gi )) ⊆ ei ∩ ρ(↓(gi )) ⊆ ei ∩ fi ⊆ (fi →′ ei+1 ) ∩ fi
= ei+1 . Therefore ρ(↓(ci+1 )) ⊆ ei+1 as required.
~
x′
m
(∃~xm (dm )) and
Thus ρ(↓(cm )) ⊆ em ⊆ dm so that cm ∈ dm . Let d′m = ∂~xm
~
x′
m
(∃~xm (cm ))
observe that [pm (~x′m ) :- d′m ]≈ = [pm (~xm ) :- dm ]≈ ∈ Dk . Put c′′m = ∂~xm
′
′′
′
′
′
⋆
so that cm ✂ cm ∈ dm . By the inductive hypothesis hpm (~xm ); cm i 6⇒P ♦ which is
a contradiction and hence ∃y~ (c′′ ) 6∈ ∃y~ (e) as required.
The result follows.
Proof for theorem 5.1
Let Dρ,C (P ) = [D]≡ , [p(~y ) :- e]≈ ∈ D and c′′ ∈ ∃y~ (e). Thus ∃y~ (c′′ ) ∈ ∃y~ (∃y~ (e)) =
∃y~ (e). Suppose, for the sake of a contradiction, that hp(~y ); c′′ ; 1i = s1 ⇛⋆P sn ⇛P ♦
where si = hgi ; ci ; hi i. Let k = max({max(hi ) | 1 ≤ i ≤ n}). Suppose (DPρ,C )k (⊤) =
[Dk ]≡ . Since D ⊑ Dk and by lemma 5.1 there exists [p(~y ) :- e′ ]≈ ∈ Dk such that
∃y~ (c′′ ) 6∈ ∃y~ (e′ ). Since ∃y~ (e) ⊆ ∃y~ (e′ ) it follows that ∃y~ (c′′ ) 6∈ ∃y~ (e) which is a
contradiction. The result follows.
| 6cs.PL
|
On Using Linear Diophantine Equations to Tune the extent of Look
Ahead while Hiding Decision Tree Rules
Georgios Feretzakis and Dimitris Kalles and Vassilios S. Verykios
School of Science and Technology, Hellenic Open University, Patras,
Greece
[email protected], [email protected], [email protected]
Abstract
This paper focuses on preserving the privacy of sensitive patterns when inducing decision trees. We adopt a record augmentation approach for hiding sensitive classification rules in
binary datasets. Such a hiding methodology is preferred over
other heuristic solutions like output perturbation or cryptographic techniques - which restrict the usability of the data since the raw data itself is readily available for public use. In
this paper, we propose a look ahead approach using linear
Diophantine equations in order to add the appropriate number
of instances while minimally disturbing the initial entropy of
the nodes.
1
Introduction
Privacy preserving data mining (Verykios et al., 2004) is a
quite recent research area trying to alleviate the problems
stemming from the use of data mining algorithms to the privacy of the data subjects recorded in the data and the information or knowledge hidden in these piles of data. Agrawal
and Srinkant (Agrawal and Srinkant, 2000) were the first to
consider the induction of decision trees from anonymized
data, which had been adequately corrupted with noise to survive from privacy attacks. The generic strand of knowledge
hiding research (Gkoulalas-Divanis and Verykios, 2009)
has led to specific algorithms for hiding classification rules,
like, for example, noise addition by a data swapping process
(Estivill-Castro and Brankovic, 1999).
A key target area concerns individual data privacy and aims
to protect the individual integrity of database records to prevent the re-identification of individuals or characteristic
groups of people from data inference attacks. Another key
area is sensitive rule hiding, the subject of this paper, which
deals with the protection of sensitive patterns that arise from
the application of data mining techniques. Of course, all privacy preservation techniques strive to maintain data information quality.
The main representative of statistical approaches (Chang
and Moskowitz, 1998) adopts a parsimonious downgrading
technique to determine whether the loss of functionality associated with not downgrading the data, is worth the extra
confidentiality. Reconstruction techniques involve the redesign of the public dataset (Natwichai et al., 2005; Natwichai
et al., 2006) from the non-sensitive rules produced by algorithms like C4.5 (Quinlan, 1993) and RIPPER (Cohen,
1995). Perturbation based techniques involve the modification of transactions to support only non-sensitive rules
(Katsarou et al., 2009), the removal of tuples associated with
sensitive rules (Natwichai et al., 2008), the suppression of
certain attribute values (Wang et al., 2005) and the redistribution of tuples supporting sensitive patterns so as to maintain the ordering of the rules (Delis et al., 2010).
In this paper, we propose a series of techniques to efficiently
protect the disclosure of sensitive knowledge patterns in
classification rule mining. We aim to hide sensitive rules
without compromising the information value of the entire
dataset. After an expert selects the sensitive rules, we modify class labels at the tree node corresponding to the tail of
the sensitive pattern, to eliminate the gain attained by the
information metric that caused the splitting. Then, we appropriately set the values of non-class attributes, adding new
instances along the path to the root where required, to allow
non-sensitive patterns to remain as unaffected as possible
(Kalles et al., 2016). This approach is of great importance as
the sanitized data set can be subsequently published and,
even, shared with competitors of the data set owner, as can
be the case with retail banking [Li et al., 2011]. In this paper,
we extend a previous work (Kalles et al., 2016) by formulating a generic look ahead solution which takes into account
the tree structure all the way from an affected leaf to the root.
The rest of this paper is structured in 3 sections. Section 2
describes the dataset operations we employ to hide a rule
while attempting to minimally affect the decision tree. Section 3 discusses further research issues and concludes the
paper.
2 The Baseline Problem and a Heuristic Solution
Figure 1 shows a baseline problem, which assumes a binary
decision tree representation, with binary-valued, symbolic
attributes (X, Y and Z) and binary classes (C1 and C2).
Hiding R3 implies that the splitting in node Z should be suppressed, hiding R2 as well.
X
Y
t
f
t
C1
C2
X
f
t
Then, we employ a top-down pass (Allocate-and-Set) to
complete the specification of the newly added instances.
These two passes help us hide all sensitive rules and keep
the sanitized tree close to the form of the original decision
tree.
These two techniques had been fully described in previous
published works (Kalles et al., 2016). The main contribution
of this paper is the improvement of the Swap-and-Add pass
by following a look ahead approach than a greedy which
was used before.
W
Z
t
f
C1
Y
f
f
t
W
t
Z
f
C2
C1
C2
t
C1
f
C2
C1
R1: 𝑋=𝑡⋀𝑌=𝑡⇒𝐶1
R2: 𝑋=𝑡⋀𝑌=𝑓⋀𝑍=𝑡⇒𝐶2
R3: 𝑋=𝑡⋀𝑌=𝑓⋀𝑍=𝑓⇒𝐶1
R4: 𝑋=𝑓⋀𝑍=𝑡⇒𝐶1
R5: 𝑋=𝑓⋀𝑍=𝑓⇒𝐶2
R1: 𝑋=𝑡⋀𝑌=𝑡⇒𝐶1
R23: 𝑿=𝒕⋀𝒀=𝒇⇒𝑪2
R4: 𝑋=𝑓⋀𝑍=𝑡⇒𝐶1
R5: 𝑋=𝑓⋀𝑍=𝑓⇒𝐶2
2.1 Adding instances to preserve the class balance
using Linear Diophantine Equations: a proof of
concept and an indicative example
The Swap-and-Add pass aims to ensure that node statistics
change without threatening class-value balances in the rest
of the tree. Using Figure 2 as an example, we show the original tree with class distributions of instances across edges.
Figure 1. A binary decision tree before (left) and after (right) hiding and the associated rule sets.
A first idea to hide R3 would be to remove from the training
data all the instances of the leaf corresponding to R3 and to
retrain the tree from the resulting (reduced) dataset. However this action may incur a substantial tree restructuring,
affecting other parts of the tree too.
Another approach would be to turn into a new leaf the direct
parent of the R3 leaf. However, this would not modify the
actual dataset, thus an adversary could recover the original
tree.
To achieve hiding by modifying the original data set in a
minimal way, we may interpret “minimal” in terms of
changes in the data set or in terms of whether the sanitized
decision tree produced via hiding is syntactically close to the
original one. Measuring minimality in how one modifies decision trees has been studied in terms of heuristics that guarantee or approximate the impact of changes (Kalles and
Morris, 1996; Kalles and Papagelis, 2000; Kalles and Papagelis, 2010).
However, hiding at Z modifies the statistics along the path
from Z to the root. Since splitting along this path depends on
these statistics, the relative ranking of the attributes may
change, if we run the same induction algorithm on the modified data set. To avoid ending up with a completely different tree, we first employ a bottom-up pass (Swap-and-Add)
to change the class label of instances at the leaves and then
to add some new instances on the path to the root, to preserve the key statistics at the intermediate nodes.
Figure 2. Original tree
We use the information gain as the splitting heuristic. To
hide the leaf which corresponds to the 9 positive instances
(to the right of N0) we change the nine positive instances to
negative ones and denote this operation by (-9p,+9n). As a
result the parent node, N0, becomes a one-class node with
minimum (zero) entropy. All nodes located upwards to node
N0 until the root N4 also absorb the (-9p, +9n) operation
(Figure 3).
This conversion would leave Ν1 with 49p+46n instances.
But, as its initial 58p+37n distribution contributed to N1’s
splitting attribute, AN1, which in turn created N0 (and then
9p), we should preserve the information gain of AN1, since
the entropy of a node only depends on the ratio p:n of its
instance classes (Lemma 1).
Lemma 1. The entropy of a node only depends on the ratio
of its instance classes.
(The proof is in (Kalles et al., 2016))
Equations as the formulation technique of the problem of
determining how many instances to add; as we shall show,
this technique deals with both issues in one go.
Let (𝑥1 , 𝑦1 ) be the number of positive and negative instances
respectively that have to be added to node N1 in order to
maintain its initial ratio. This can be expressed with the following equation:
49 + 𝑥1 58
=
46 + 𝑦1 37
The above equation is equivalent to the following linear Diophantine equation:
37𝑥1 − 58𝑦1 = 855
(1)
Similarly, let (𝑥2 , 𝑦2), (𝑥3 , 𝑦3 ), (𝑥4 , 𝑦4 ) be the corresponding number of positive and negative instances that have to
be added to nodes N2, N3 and N4.
The corresponding linear Diophantine equations for nodes
N2, N3 and N4 are:
137𝑥2 − 58𝑦2 = 1755
137𝑥3 − 352𝑦3 = 4401
459𝑥4 − 541𝑦4 = 9000
(2)
(3)
(4)
The general solutions of the above four (1-4) linear Diophantine equations are given below (k ∈ ℤ):
Figure 3. Bottom-up propagation of instances (-9p,+9n).
58𝑝
To maintain the initial ratio (37𝑛) of node N1, we should add
appropriate number of positive and negative instances to N1
and extend this addition process up until the tree root, by
accumulating at each node all instance requests from below
and by adding instances locally to maintain the node statistics, propagating these changes to the tree root.
In a previously published work (Kalles et al., 2016) the
above procedure was greedy, essentially solving the problem for only one (tree) level of nodes, which resulted many
times in a non-optimum (minimum) number of added instances, whereas a look ahead based solution would be able
to take into account all levels up to the root. In addition, the
new ratios (p:n) of the nodes were not exactly the same as
they were before the change, thus propagating ratio changes
whose impact could only be quantified in a compound fashion by inspecting the final tree and hampering our ability to
investigate the behavior of this heuristic in a detailed fashion. We, therefore, reverted to using Diophantine Linear
𝑥 = 9405 + 58k
37𝑥1 − 58𝑦1 = 855 ⇔ { 1
𝑦1 = 5985 + 37k
𝑥 = −19305 + 58k
137𝑥2 − 58𝑦2 = 1755 ⇔ { 2
𝑦2 = −45630 + 137k
𝑥 = −734967 + 352k
137𝑥3 − 352𝑦3 = 4401 ⇔ { 3
𝑦3 = −286065 + 137k
𝑥4 = −297000 + 541k
459𝑥4 − 541𝑦4 = 9000 ⇔ {
𝑦4 = −252000 + 459k
From the infinite pairs of solutions for every linear Diophantine equation we choose the pairs
(𝑥1∗ , 𝑦1∗ ), (𝑥2∗ , 𝑦2∗ ), (𝑥3∗ , 𝑦3∗ ) 𝑎𝑛𝑑 (𝑥4∗ , 𝑦4∗ ),where 𝑥1∗ , 𝑥2∗ , 𝑥3∗ , 𝑥4∗
, 𝑦1∗ , 𝑦2∗ , 𝑦3∗ , 𝑦4∗ are the minimum natural numbers that satisfy
the following condition.
(C1): 𝑥1∗ ≤ 𝑥2∗ ≤ 𝑥3∗ ≤ 𝑥4∗ and 𝑦1∗ ≤ 𝑦2∗ ≤ 𝑦3∗ ≤ 𝑦4∗
Condition (C1) ensures that we have selected the optimum
path to the root of the decision tree in terms that every addition of instances propagates upwards in a consistent manner
(i.e. if one adds some instances at a lower node, one cannot
have added fewer instances in an ancestor node).
With this technique we can determine exactly the minimum
number of instances that must be added to each node in order to maintain the initial ratios of every node.
There are a few cases that a linear Diophantine equations
has no solutions, this problem can be overcome by a little
change to the initial ratio until we construct a solvable linear
Diophantine equation. For this example the pairs of solutions that are both minimum and satisfy the condition (C1)
are:
(𝑥1∗ , 𝑦1∗ ) = (67,28)
(𝑥2∗ , 𝑦2∗ ) = (67,128)
(𝑥3∗ , 𝑦3∗ ) = (361,128)
(𝑥4∗ , 𝑦4∗ ) = (550,450)
Based on the above solutions we have to add to N1, 67 positive and 28 negative instances which leads to a ratio of
116𝑝
(
). These new instances propagate upwards, therefore
74𝑛
on N2, we don’t need to add any positive instances but we
need to add 100 (=128-28) negative instances which leads
116𝑝
to a ratio of (274𝑛). Similarly, for N3 we should add, 294
(=361-67) new positive and no negative instances. Finally,
for N4, we should add 189 (=550-361) new positive and 322
(=450-128) new negative instances. Therefore, with this
look ahead technique we know from the very beginning
which one is the optimum path in order to add appropriate
number of instances to maintain the exact values of initial
ratios which means that we will not have any disturbance in
our tree after the hiding.
We observe that the solutions of Diophantine equation (4)
which corresponds to node N4 (root) determine the total
number of instances that should be added to our dataset in
order to have the same ratios as initially. If we slightly
540𝑝
change the ratio of N4 (in our case let be changed to (460𝑛)
541𝑝
instead of (459𝑛) then we will have a different Diophantine
equation which leads to a smaller number of added instances. In our example the new Diophantine equation (4’)
and the set of solutions are given below:
460𝑥4 − 540𝑦4 = 4000
(4’)
𝑥4 = −1400 + 27k
460𝑥4 − 540𝑦4 = 4000 ⇔ {
,k ∈ ℤ
𝑦4 = −1200 + 23k
For this example the pairs of solutions that are both minimum and satisfy the condition C1 are:
(𝑥1∗ , 𝑦1∗ ) = (67,28)
(𝑥2∗ , 𝑦2∗ ) = (67,128)
(𝑥3∗ , 𝑦3∗ ) = (361,128)
(𝑥4∗ , 𝑦4∗ ) = (382,318)
Therefore, we have to add 700 new instances instead of 1000
that we had to add before. Of course now we don’t have exactly the same ratio p:n for node N4 but something very
close to it. In other words, the method of linear Diophantine
equations helping us to make a trade-off between the number of added instances and the accuracy of a node’s ratio.
2.2 Fully specifying instances
Having set the values of some attributes for the newly added
instances is only a partial instance specification, since we
have not set those instance values for any other attribute
other than the ones present in the path from the root to the
node where the instance addition took place. Unspecified
values must be so set to ensure that currently selected attributes at all nodes do not get displaced by competing attributes. This is what the Allocate-and-Set pass does.
With reference to Figure 2 and the 9n instances added due
to N1 via the N2-N1 branch, these instances have not had
their values set for 𝐴N1and 𝐴N2. Moreover, these must be so
set to minimize the possibility that 𝐴N2 is displaced from
N2, since (at N2) any of attributes 𝐴N0, 𝐴N1 or 𝐴N2 (or any
other) can be selected. Those 9n instances were added to
help guarantee the existence of N1.
As it happened in the bottom-up pass, we need the information gain of 𝐴N2 to be large enough to fend off competition from 𝐴N0 or 𝐴N1 at node N2, but not too large to
threaten 𝐴N3. We start with the best possible allocation of
values to attribute 𝐴N2 , and progressively explore directing
some of these along the N2 N1 branch, and stop when the
information gain for 𝐴N2 becomes lower than the information gain for 𝐴N3 . We use the term two-level hold-back
to refer to this technique, as it spans two tree levels. This
approach exploits the convexity property of the information
gain difference function (Lemma 2).
The Allocate-and-Set pass examines all four combinations
of distributing all positive and all negative instances to one
branch, select the one that maximizes the information gain
difference and then move along the slope that decreases the
information gain, until we do not exceed the information
gain of the parent; then perform the recursive specification
all the way to the tree fringe.
Lemma 2. Distributing new class instances along only one
branch maximizes information gain.
(The proof is in (Kalles et al., 2016))
2.3 Grouping of hiding requests
By serially processing hiding requests, each one incurs the
full cost of updating the instance population. By knowing all
of them in advance, we only consider once each node in the
bottom-up pass and once in the top-down pass. We express
that dealing with all hiding requests in parallel leads to the
minimum number of new instances by:
𝑆 𝑆
|𝑇𝑅𝑃 | = 𝑚𝑖𝑛 |(𝑇{𝑖}
)
|
𝑖
𝑅−{𝑖}
The formula states that for a tree T, the number of instances
(|T|), after a parallel (Tp) hiding process of all rules (leaves)
in R, is the optimal along all possible orderings of all serial
(Ts) hiding requests drawn from R. A serial hiding request is
implemented by selecting a leaf to be hidden and then, recursively, dealing with the remaining leaves (Lemma 3).
Lemma 3. When serially hiding two non-sibling leaves, the
number of new instances to be added to maintain the
max: min ratios is larger or equal to the number of instances that would have been added if the hiding requests
were handled in parallel.
(The proof is in (Kalles et al., 2016))
We now demonstrate an example, in which two hiding requests were handled in parallel, using the proposed look
ahead technique of linear Diophantine equations. In figure
4, we show the original tree with class distributions of instances across edges.
Figure 5. Bottom-up propagation of instances (-10p,+10n) from
the left side and (+5p,-5n) from the right side of the tree .
Figure 4. Original tree
We use the information gain as the splitting heuristic. To
hide the leaf which corresponds to the 10 positive instances
(to the left of N0) we change the ten positive instances to
negative ones and denote this operation by (-10p,+10n). As
a result, the parent node, N0, becomes a one-class node with
minimum (zero) entropy. All nodes located upwards to node
N0 until the root N4 also absorb the (-10p,+10n) operation
(Figure 5).
This conversion would leave Ν1 with 48p+47n instances.
But, as its initial 58p+37n distribution contributed to N1’s
splitting attribute, AN1, which in turn created N0 (and then
10p), we should preserve the information gain of AN1, since
the entropy of a node only depends on the ratio p:n of its
instance classes.
To hide the leaf which corresponds to the 5 negative instances (to the right of N0’) we change the five negative instances to positive ones and denote this operation by (+5p,5n). As a result, the parent node, N0’, becomes a one-class
node with minimum (zero) entropy. All nodes located upwards to node N0’ until the root N4 also absorb the (10p,+10n) operation (Figure 5). The intersection node N3
and the root N4 will be affected by (-5p,+5n) which is the
total outcome of the two operations from the two subtrees
below of N3.
This conversion would leave Ν1’ with 125p+45n instances.
But, as its initial 120p+50n distribution contributed to N1’s
splitting attribute, AN1’, which in turn created N0’ (and then
5n), we should preserve the information gain of AN1’, since
the entropy of a node only depends on the ratio p:n of its
instance classes.
In order to maintain the ratio of nodes N1 and N1’, we have
to add appropriate number of positive and negative instances
to N1, N1’ and extend this addition process up until the tree
root, by accumulating at each node all instance requests
from below and by adding instances locally to maintain the
node statistics, propagating these changes to the tree root.
Let (𝑥1 , 𝑦1 ) be the number of positive and negative instances
respectively that should be added to node N1 to maintain its
initial ratio. This can be expressed with the following equation:
48 + 𝑥1 58
=
47 + 𝑦1 37
The above equation is equivalent to the following linear Diophantine equation:
37𝑥1 − 58𝑦1 = 950
(5)
Similarly, let (𝑥2 , 𝑦2), (𝑥1′ , 𝑦1′ ), (𝑥2 ′, 𝑦2 ′), (𝑥3 , 𝑦3 ), (𝑥4 , 𝑦4 )
be the corresponding number of positive and negative instances that should be added to nodes N2, N1’, N2’, N3 and
N4.
The corresponding linear Diophantine equations for nodes
N2, N1’, N2’, N3 and N4 are:
137𝑥2 − 58𝑦2 = 1950
(6)
50𝑥1′ − 120𝑦1′ = −850
(7)
93𝑥2′ − 294𝑦2′ = −1935
(8)
230𝑥3 − 352𝑦3 = 2910
(9)
459𝑥4 − 541𝑦4 = 5000
(10)
The general solutions of the above six (5-10) linear Diophantine equations are given below( k ∈ ℤ):
𝑥 = 10450 + 58k
37𝑥1 − 58𝑦1 = 950 ⇔ { 1
𝑦1 = 6650 + 37k
𝑥 = −21450 + 58k
137𝑥2 − 58𝑦2 = 1950 ⇔ { 2
𝑦2 = −50700 + 137k
𝑥 ′ = −425 + 12k
50𝑥1′ − 120𝑦1′ = −850 ⇔ { 1
𝑦1′ = −170 + 5k
𝑥 ′ = −12255 + 98k
137𝑥2 ′ − 58𝑦2 ′ = 1755 ⇔ { 2
𝑦2 ′ = −3870 + 31k
𝑥3 = 109125 + 176k
137𝑥3 − 352𝑦3 = 4401 ⇔ {
𝑦3 = 71295 + 115k
𝑥4 = −165000 + 541k
459𝑥4 − 541𝑦4 = 9000 ⇔ {
𝑦4 = −140000 + 459k
From the infinite pairs of solutions for every linear Diophantine equation we choose the pairs
(𝑥
̅̅̅,
𝑦1 (𝑥
̅̅̅,
̅̅̅),
̅̅̅′,
𝑦1 (𝑥
̅̅̅′,
𝑦2 (𝑥
̅̅̅,
̅̅̅),
̅̅̅,
̅4 ),
1 ̅̅̅),
2 𝑦
2 (𝑥
1 ̅̅̅′),
2 ̅̅̅′),
3 𝑦
3 (𝑥
4 𝑦
where ̅̅̅,
𝑥1 ̅̅̅,
𝑥2 ̅̅̅
𝑥1 ′ , ̅̅̅
𝑥2 ′ , ̅̅̅,
𝑥3 ̅̅̅,
𝑥4 ̅̅̅,
𝑦1 ̅̅̅,
𝑦2 ̅̅̅
𝑦1 ′ , 𝑦
̅̅̅2 ′ , ̅̅̅,
𝑦3 𝑦̅4 are the
minimum natural numbers that satisfy the conditions (C1)
and (C2).
(C1): ̅̅̅
𝑥1 ≤ ̅̅̅
𝑥2 and ̅̅̅
𝑦1 ≤ ̅̅̅
𝑦2 and ̅̅̅
𝑥1 ′ ≤ ̅̅̅
𝑥2 ′ and ̅̅̅
𝑦1′ ≤ 𝑦
̅̅̅2 ′
′
′
(C2): ̅̅̅
𝑥2 + ̅̅̅
𝑥2 ≤ ̅̅̅
𝑥3 ≤ ̅̅̅
𝑥4 and 𝑦
̅̅̅2 + ̅̅̅
𝑦2 ≤ ̅̅̅
𝑦3 ≤ 𝑦̅4
Condition (C1) ensures that we have selected the optimum
path from the leaves up to intersection node N3 of the decision tree.
Condition (C2) ensures that we have selected the optimum
path from one level below the intersection node N3 (N2,
N2’) up to the root.
For this example, the pairs of solutions that are both minimum and satisfy the conditions (C1), (C2) are:
(𝑥
̅̅̅,
𝑦1 = (68,27)
1 ̅̅̅)
(𝑥
̅̅̅,
̅̅̅)
2 𝑦
2 = (68,127)
(𝑥
̅̅̅′,
𝑦
̅̅̅′)
1
1 = (7,10)
(𝑥
̅̅̅′,
𝑦
̅̅̅′)
2
2 = (93,36)
(𝑥
̅̅̅,
𝑦
̅̅̅)
3 3 = (357,225)
(𝑥
̅̅̅,
̅4 ) = (546,454)
4 𝑦
Based on the above solutions we should add to N1, 68 positive and 27 negative instances. These new instances propagate upwards, therefore on N2, we don’t need to add any
positive instances but we need to add 100 (=127-27) negative instances. In the same manner, we should add to N1’, 7
positive and 10 negative instances. These new instances
propagate upwards, therefore on N2’, we need to add 86
(=93-7) positive instances and 26 (=36-10) negative instances.
Similarly, for N3 we should add, 196 (=357-68-93) new
positive and 62 (=225-127-36) new negative instances. Finally, for N4, we should add 189 (=546-357) new positive
and 229 (=454-225) new negative instances.
Therefore, based on this example we observe that by using
this technique we can handle more than one hiding requests
without any increase in the number of instances that can be
added. This proof of concept shows that formulating the
problem of hiding requests in parallel is nearly a natural fit
for the linear Diophantine equations technique.
3 Conclusions and directions for further work
We have presented the outline of a heuristic that allows one
to specify which leaves of a decision tree should be hidden
and then proceed to judiciously add instances to the original
data set so that the next time one tries to build the tree, the
to-be-hidden nodes will have disappeared because the instances corresponding to those nodes will have been absorbed by neighboring ones.
We have presented a fully-fledged example of the proposed
approach and, along its presentation, discussed a variety of
issues that relate to how one might minimize the amount of
modifications that are required to perform the requested hiding as well as where some side-effects of this hiding might
emerge. To do so, we have turned our attention to using linear Diophantine equations to formulate the constraints
which must be satisfied for the heuristic to work.
Of course, several aspects of our technique can be substantially improved.
The max:min ratio concept can guarantee the preservation of
the information gain of a splitting attribute but it would be
interesting to see whether it can be applied to other splitting
criteria too. Since this ratio is based on frequencies, it should
also work with a similar popular metric, the Gini index
(Breiman et al., 1984). On the other hand, it is unclear
whether it can preserve trees that have been induced using
more holistic metrics, such as the minimum description
length principle (Quinlan and Rivest, 1989).
Extensive experimentation with several data sets would allow us to estimate the quality of the max:min ratio heuristic
and also experiment with a revised version of the heuristic,
one that strives to keep the p:n ratio of a node itself (and not
its parent), or one that attempts to remove instances instead
of swapping their class labels, or still another that further
relaxes the p:n ratio concept during the top-down phase by
distributing all unspecified instances evenly among the left
and right outgoing branch from a node and proceeding recursively to the leaves (which is the one we actually implemented). In general, experimenting with a variety of heuristics to trade off ease of implementation with performance is
an obvious priority for experimental research.
On performance aspects, besides speed, one also needs to
look at the issue of judging the similarity of the original tree
with the one produced after the above procedure has been
applied. One might be interested in syntactic similarity
(Zantema and Bodlaender, 2000) (comparing the data structures –or parts thereof- themselves) or semantic similarity
(comparing against reference data sets). This is an issue of
substantial importance, which will also help settle questions
of which heuristics work better and which not.
As the number of instances to be added is a main index of
the heuristic’s quality a reasonable direction for investigation is to determine the appropriate ratio values, which result
in smaller integer solutions of the corresponding Linear Diophantine Equations but, at the same time, do not deviate
too much from the structure of the original tree. This suggests the adoption of approximate ratios instead of exact
ones and, obviously, raises the potential to further investigate the trade-off between data-set increase and tree similarity.
Extensive experimentation with different decision trees
would allow us to observe if this look ahead technique can
be applied not only to two parallel hiding requests but for
any k simultaneously specified requests, without any impact
to the number of instances that should be added. It should
not be ruled out that this could even lead to a formally
proven result.
It is rather obvious that the variety of answers one could explore for each of the questions above constitutes a research
agenda of both a theoretical and an applied nature. At the
same time, it is via extending the base case, by allowing
multi-valued and numeric attributes and multi-class problems that we should address the problem of enhancing the
basic technique, alongside investigating the robustness of
this heuristic to a variety of splitting criteria and to datasets
of varying size and complexity. The longer-term goal is to
have it operate as a standard data engineering service to accommodate hiding requests, coupled with a suitable environment where one could specify the importance of each
hiding request.
We have developed a prototype web-based application
which implements the aforementioned technique and we
have used it to obtain initial confirmation of the validity of
our arguments.
References
Agrawal, R., and Srikant, R. 2000: Privacy-Preserving Data Mining. In ACM SIGMOD Conference of Management of Data, pp.
439-450.
Breiman, L.; Friedman, J. H. ; Olshen, R. A. and Stone, C. J. 1984.
Classification and regression trees. Belmont, CA, Wadsworth.
Chang, L.W., and Moskowitz, I.S. 1998. Parsimonious Downgrading and Decision Trees applied to the Inference Problem. In New
Security Paradigms Workshop, pp. 82-89.
Cohen, W.W. 1995. Fast effective rule induction. In Machine
Learning: the 12th International Conference
Delis, A.; Verykios, V.S.; and Tsitsonis, A. 2010. A Data Perturbation Approach to Sensitive Classification Rule Hiding. In 25th
Symposium On Applied Computing.
Estivill-Castro, V., and Brankovic, L. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. In First
International Conference on Data Warehousing and Knowledge
Discovery.
Gkoulalas-Divanis, A., and Verykios, V.S. 2009. Privacy Preserving Data Mining: How far can we go? In Handbook of Research on
Data Mining in Public and Private Sectors: Organizational and
Government Applications. Eds. A. Syvajarvi and J. Stenvall. IGI
Global.
Kalles, D., and Morris, D.T. 1996. Efficient Incremental Induction
of Decision Trees. Machine Learning 24(3), 231-242.
Kalles, D., and Papagelis, A. 2000. Stable decision trees: Using
local anarchy for efficient incremental learning. International
Journal on Artificial Intelligence Tools 9(1), 79-95.
Kalles, D., and Papagelis, A. 2010. Lossless fitness inheritance in
genetic algorithms for decision trees. Soft Computing 14(9), 973993.
Kalles, D.; Verykios, V.S.; Feretzakis, G.; and Papagelis, A. 2016.
Data set operations to hide decision tree rules. In Proceedings of
the Twenty-second European Conference on Artificial Intelligence.
Kalles, D.; Verykios, V.S.; Feretzakis, G.; and Papagelis, A. 2016.
Data set operations to hide decision tree rules. In Proceedings of
the 1st International Workshop on AI for Privacy and Security. Article No. 10.
Katsarou, A.; Gkouvalas-Divanis, A.; and Verykios, V. S. 2009.
Reconstruction-based Classification Rule Hiding through Controlled Data Modification. In IFIP International Federation for Information Processing 296, 449-458.
Li, R. ; de Vries D.; and Roddick J. 2011. Bands of Privacy Preserving Objectives: Classification of PPDM Strategies. In 9th Australasian Data Mining Conference, pp. 137-151.
Natwichai, J.; Li, X.; and Orlowska, M. 2005. Hiding Classification Rules for Data Sharing with Privacy Preservation. In 7th International Conference on Data Warehousing and Knowledge Discovery, pp. 468-467.
Natwichai, J.; Li, X.; and Orlowska, M. 2006. A Reconstructionbased Algorithm for Classification Rules Hiding. In 17th Australasian Database Conference, pp. 49-58.
Natwichai, J.; Sun, X.; and Li, X. 2008. Data Reduction Approach
for Sensitive Associative Classification Rule Hiding. In 19th Australian Database Conference.
Quinlan, J.R. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann.
Quinlan, J.R.; and Rivest, R.L. 1989. Infering Decision Trees using
the Minimum Description Length Principle. Information and Computation 80, 227-248.
Verykios, V.S.; Bertino, E.; Fovino, I.N.; Provenza, L.P.; Saygin,
Y.; and Theodoridis, Y. 2004. State of the Art Privacy Preserving
Data Mining. SIGMOD Record 33(1), 50-57.
Wang, K.; Fung, B.C.M.; and Yu, P.S. 2005. Template-Based Privacy Preservation in Classification Problems. In 5th IEEE International Conference on Data Mining, pp. 466-473.
Zantema, H.; and Bodlaender, H.L. 2000. Finding Small Equivalent Decision Trees is Hard. International Journal of Foundations
of Computer Science 11(2), 343-354.
| 2cs.AI
|
arXiv:1608.02674v1 [cs.DC] 9 Aug 2016
Further Algebraic Algorithms in the Congested Clique Model and
Applications to Graph-Theoretic Problems
François Le Gall
Graduate School of Informatics
Kyoto University
[email protected]
Abstract
Censor-Hillel et al. [PODC’15] recently showed how to efficiently implement centralized algebraic algorithms for matrix multiplication in the congested clique model, a model of distributed
computing that has received increasing attention in the past few years. This paper develops
further algebraic techniques for designing algorithms in this model. We present deterministic
and randomized algorithms, in the congested clique model, for efficiently computing multiple
independent instances of matrix products, computing the determinant, the rank and the inverse of a matrix, and solving systems of linear equations. As applications of these techniques,
we obtain more efficient algorithms for the computation, again in the congested clique model,
of the all-pairs shortest paths and the diameter in directed and undirected graphs with small
weights, improving over Censor-Hillel et al.’s work. We also obtain algorithms for several other
graph-theoretic problems such as computing the number of edges in a maximum matching and
the Gallai-Edmonds decomposition of a simple graph, and computing a minimum vertex cover
of a bipartite graph.
1
Introduction
Background. The congested clique model is a model in distributed computing that has recently
received increasing attention [5, 12, 13, 17, 18, 19, 20, 26, 27, 30, 34, 35]. In this model n nodes
communicate with each other over a fully-connected network (i.e., a clique) by exchanging messages
of size O(log n) in synchronous rounds. Compared with the more traditional congested model [36],
the congested clique model removes the effect of distances in the computation and thus focuses
solely on understanding the role of congestion in distributed computing.
Typical computational tasks studied in the congested clique model are graph-theoretic problems
[5, 12, 13, 17, 20, 34], where a graph G on n vertices is initially distributed among the n nodes of the
network (the ℓ-th node of the network knows the set of vertices adjacent to the ℓ-th vertex of the
graph, and the weights of the corresponding edges if the graph is weighted) and the nodes want to
compute properties of G. Besides their theoretical interest and potential applications, such problems
have the following natural interpretation in the congested clique model: the graph G represents the
actual topology of the network, each node knows only its neighbors but can communicate to all the
nodes of the network, and the nodes want to learn information about the topology of the network.
Censor-Hillel et al. [5] recently developed algorithms for several graph-theoretic problems in the
congested clique model by showing how to implement centralized algebraic algorithms for matrix
multiplication in this model. More precisely, they constructed a O(n1−2/ω )-round algorithm for
matrix multiplication, where ω denotes the exponent of matrix multiplication (the best known
upper bound on ω is ω < 2.3729, obtained in [25, 43], which gives exponent 1 − 2/ω < 0.1572
in the congested clique model), improving over the O(n2−ω ) algorithm mentioned in [13], in the
following setting: given two n × n matrices A and B over a field, the ℓ-th node of the network
initially owns the ℓ-th row of A and the ℓ-column of B, and needs to output the ℓ-th row and the ℓcolumn of the product AB. Censor-Hillel et al. consequently obtained O(n1−2/ω )-round algorithms
for several graph-theoretic tasks that reduce to computing the powers of (some variant of) the
adjacency matrix of the graph, such as counting the number of triangles in a graph (which lead to
an improvement over the prior best algorithms for this task [12, 13]), detecting the existence of a
constant-length cycle and approximating the all-pairs shortest paths in the input graph (improving
the round complexity obtained in [34]). One of the main advantages of such an algebraic approach
in the congested clique model is its versatility: it makes possible to construct fast algorithms for
graph-theoretic problems, and especially for problems for which the best non-algebraic centralized
algorithm is highly sequential and does not seem to be implementable efficiently in the congested
clique model, simply by showing a reduction to matrix multiplication (and naturally also showing
that this reduction can be implemented efficiently in the congested clique model).
Our results. In this paper we develop additional algebraic tools for the congested clique model.
We first consider the task of computing in the congested clique model not only one matrix
product, but multiple independent matrix products. More precisely, given k matrices A1 , . . . , Ak
each of size n × m and k matrices B1 , . . . , Bk each of size m × m, initially evenly distributed among
the n nodes of the network, the nodes want to compute the k matrix products A1 B1 , . . . , Ak Bk .
Prior works [5, 13] considered only the case k = 1 and m = n, i.e., one product of two square
matrices. Our contribution is thus twofold: we consider the rectangular case, and the case of
several matrix products as well. Let us first discuss our results for square matrices (m = n). By
using sequentially k times the matrix multiplication algorithm from [5], k matrix products can
naturally be computed in O(kn1−2/ω ) rounds. In this work we show that we can actually do better.
2
Theorem 1 (Simplified version). In the congested clique model k independent products of pairs of
n × n matrices can be computed with round complexity
O(k2/ω n1−2/ω ) if 1 ≤ k < n,
O(k)
if k ≥ n.
This generalization of the results from [5] follows from a simple strategy: divide the n nodes
of the network into k blocks (when k ≤ n), each containing roughly n/k nodes, compute one of
the k matrix products per block by using an approach similar to [5] (i.e., a distributed version of
the best centralized algorithm computing one instance of square matrix multiplication), and finally
distribute the relevant part of the k output matrices to all the nodes of the network. Analyzing
the resulting protocol shows that the dependence in k in the overall round complexity is reduced
to k2/ω . This sublinear dependence in k has a significant number of implications (see below).
The complete version of Theorem 1, given in Section 3, also considers the general case where the
matrices may not be square (i.e., the case m 6= n), which will be crucial for some of our applications
to the All-Pairs Shortest Path problem. The proof becomes more technical than for the square case,
but is conceptually very similar: the main modification is simply to now implement a distributed
version of the best centralized algorithm for rectangular matrix multiplication. The upper bounds
obtained on the round complexity depend on the complexity of the best centralized algorithms for
rectangular matrix multiplication (in particular the upper bounds given in [24]). Figure 1 depicts
the upper bounds we obtain for the case k = 1. While the major open problem is still whether
the product of two square matrices can be computed in a constant (or nearly constant) number of
rounds, our results show that for m = O(n0.651... ), the product of an n × m matrix by an m × n
matrix can indeed be computed in O(nǫ ) rounds for any ǫ > 0. We also show lower bounds on the
round complexity of the general case (Proposition 1 in Section 3), which are tight for most values
of k and m, based on simple arguments from communication complexity.
Round complexity
n1
n0.5
n0.1572
n0
n0
n0.5 n0.651...
n1
n2
Value of m
Figure 1: Our upper bounds on the round complexity of the computation of the product of an
n × m matrix by an m × n matrix in the congested clique model.
We then study the following basic problems in linear algebra: computing the determinant, the
rank or the inverse of an n × n matrix over a finite field F of order upper bounded by a polynomial
of n, and solving a system of n linear equations and n variables. We call these problems DET(n, F),
3
Rank(n, F), INV(n, F) and SYS(n, F), respectively (the formal definitions are given in Section 2).
While it is known that in the centralized setting these problems can be solved with essentially the
same time complexity as matrix multiplication [4], these reductions are typically sequential and do
not work in a parallel setting. In this paper we design fast deterministic and randomized algorithm
for these four basis tasks, and obtain the following results.
Theorem 2. Assume that F has characteristic greater than n. In the congested clique model, the
deterministic round complexity of DET(n, F) and INV(n, F) is O(n1−1/ω ).
Theorem 3. Assume that F has order |F| = Ω(n2 log n). In the congested clique model, the
randomized round complexity of DET(n, F), SYS(n, F) and Rank(n, F) is O(n1−2/ω log n).
The upper bounds of Theorems 2 and 3 are O(n0.5786 ) and O(n0.1572 ), respectively, by basing
our implementation on the asymptotically fastest (but impractical) centralized algorithm for matrix
multiplication corresponding to the upper bound ω < 2.3729. These bounds are O(n2/3 ) and
O(n1/3 log n), respectively, by basing our implementation on the trivial (but practical) centralized
algorithm for matrix multiplication (corresponding to the bound ω ≤ 3). These algorithms are
obtained by carefully adapting to the congested clique model the relevant known parallel algorithms
[9, 21, 22, 23, 37] for linear algebra, and using our efficient algorithm for computing multiple matrix
products (Theorem 1) as a subroutine. An interesting open question is whether INV(n, F) can be
solved with the same (randomized) round complexity as the other tasks. This problem may very
well be more difficult; in the parallel setting in particular, to the best of our knowledge, whether
matrix inversion can be done with the same complexity as these other tasks is also an open problem.
Applications of our results. The above results give new algorithms for many graph-theoretic
problems in the congested clique model, as described below and summarized in Table 1.
Our main key tool to derive these applications is Theorem 7 in Section 3, which gives an
algorithm computing efficiently the distance product (defined in Section 2) of two matrices with
small integer entries based on our algorithm for multiple matrix multiplication of Theorem 1.
Computing the distance product is a fundamental graph-theoretic task deeply related to the AllPairs Shortest Path (APSP) problem [40, 41, 47]. Combining this result with techniques from [41],
and observing that these techniques can be implemented efficiently in the congested clique model,
we then almost immediately obtain the following result.
Theorem 4. In the congested clique model, the deterministic round complexity of the all-pairs
shortest paths problem in an undirected graph of n vertices with integer weights in {0, . . . , M },
where M is an integer such that M ≤ n, is Õ(M 2/ω n1−2/ω ).
Since computing the diameter of a graph reduces to solving the all-pairs shortest paths, we
obtain the same round complexity for diameter computation in the same class of graphs. This
improves over the Õ(M n1−2/ω )-round algorithm for these tasks (implicitly) given in [5]. The main
application of our results nevertheless concerns the all-pair shortest paths problem over directed
graphs (for which the approach based on [41] does not work) with constant weights. We obtain
the following result by combining our algorithm for distance product computation with Zwick’s
approach [47].
Theorem 5. In the congested clique model, the randomized round complexity of the all-pairs shortest paths problem in a directed graph of n vertices with integer weights in {−M, . . . , 0, . . . , M },
where M = O(1), is O(n0.2096 ).
4
Table 1: Summary of the applications of our algebraic techniques to graph-theoretic problems in
the congested clique model. Here n both represents the number of vertices in the input graph and
the number of nodes in the network.
Problem
APSP (undirected graphs, weights in {0, 1, . . . , M })
Round
2 complexity
2
Õ M ω n1− ω Th. 4
O(n0.2096 )
2
2
Diameter (undirected graphs, weights in {0, 1, . . . , M }) Õ M ω n1− ω
2
Computing the size of a maximum matching
O n1− ω log n
Computing allowed edges in a perfect matching
O(n1−1/ω )
Gallai-Edmonds decomposition
O(n1−1/ω )
Minimum vertex cover in bipartite graphs
O(n1−1/ω )
APSP (directed graphs, constant weights)
Th. 5
Cor. 1
Th. 8
Sec. 6.3
Th. 9
Sec. 6.4
Previously
2
Õ M n1− ω
Õ(n1/3 )
2
Õ M n1− ω
—
—
—
—
Prior to this work, the upper bound for the round complexity of this problem was Õ(n1/3 ), obtained
by directly computing the distance product (as done in [5]) in the congested clique model. Again,
Theorem 5 follows easily from Theorem 7 and the observation that the reduction to distance
product computation given in [47] can be implemented efficiently in the congested clique model.
The exponent 0.2096 in the statement of Theorem 5 is derived from the current best upper bounds
on the complexity of rectangular matrix multiplication in the centralized setting [24].
Theorems 2 and 3 also enable us to solve a multitude of graph-theoretic problems in the congested clique model with a sublinear number of rounds. Examples described in this paper are
computing the number of edges in a maximum matching of a simple graph with O(n1−2/ω log n)
rounds, computing the set of allowed edges in a perfect matching, the Gallai-Edmonds decomposition of a simple graph, and a minimum vertex cover in a bipartite graph with O(n1−1/ω ) rounds.
These results are obtained almost immediately from the appropriate reductions to matrix inversion
and similar problems known the centralized setting [7, 31, 38] — indeed it is not hard to adapt all
these reductions so that they can be implemented efficiently in the congested clique model. Note
that while non-algebraic centralized algorithms solving these problems also exist (see, e.g., [32]),
they are typically sequential and do not appear to be efficiently implementable in the congested
clique model. The algebraic approach developed in this paper, made possible by our algorithms for
the computation of the determinant, the rank and the inverse of matrix, appears to be currently
the only way of obtaining fast algorithms for these problems in the congested clique model.
2
Preliminaries
Notations. Through this paper we will use n to denote the number of nodes in the network.
The n nodes will be denoted 1, 2, . . . , n. The symbol F will always denote a finite field of order
upper bounded by a polynomial in n (which means that each field element can be encoded with
O(log n) bits and thus sent using one message in the congested clique model). Given any positive
integer p, we use the notation [p] to represent the set {1, 2, . . . , p}. Given any p × p′ matrix A, we
will write its entries as A[i, j] for (i, j) ∈ [p] × [p′ ], and use the notation A[i, ∗] to represent its i-th
row and A[∗, j] to represent its j-th column.
5
Graph-theoretic problems in the congested clique model. As mentioned in the introduction, typically the main tasks that we want to solve in the congested clique model are graphtheoretical problems. In all the applications given in this paper the number of vertices of the graph
will be n, the same as the number of nodes of the network. The input will be given as follows:
initially each node ℓ ∈ [n] has the ℓ-th row and the ℓ-th column of the adjacency matrix of the
graph. Note that this distribution of the input, while being the most natural, is not essential; the
only important assumption is that the entries are evenly distributed among the n nodes since they
can then be redistributed in a constant number of rounds as shown in the following Lemma by
Dolev et al. [12], which we will use many times in this paper.
Lemma 1. [12] In the congested clique model a set of messages in which no node is the source
of more than n messages and no node is the destination of more than n messages can be delivered
within two rounds if the source and destination of each message is known in advance to all nodes.
Algebraic problems in the congested clique model.
we consider in this paper are defined as follows.
The five main algebraic problems that
MM(n, m, k, F) — Multiple Rectangular Matrix Multiplications
Input: matrices A1 , . . . , Ak ∈ Fn×m and B1 , . . . , Bk ∈ Fm×n distributed among the n nodes
(Node ℓ ∈ [n] has A1 [ℓ, ∗], . . . , Ak [ℓ, ∗] and B1 [∗, ℓ], . . . , Bk [∗, ℓ])
Output: the matrices A1 B1 , . . . , Ak Bk distributed among the n nodes
(Node ℓ ∈ [n] has A1 B1 [ℓ, ∗], . . . , Ak Bk [ℓ, ∗] and A1 B1 [∗, ℓ], . . . , Ak Bk [∗, ℓ])
DET(n, F) — Determinant
Input: matrix A ∈ Fn×n distributed among the n nodes (Node ℓ ∈ [n] has A[ℓ, ∗] and A[∗, ℓ])
Output: det(A) (Each node of the network has det(A))
Rank(n, F) — Rank
Input: matrix A ∈ Fn×n distributed among the n nodes (Node ℓ ∈ [n] has A[ℓ, ∗] and A[∗, ℓ])
Output: rank(A) (Each node of the network has rank(A))
INV(n, F) — Inversion
Input: invertible matrix A ∈ Fn×n distributed among the n nodes
(Node ℓ ∈ [n] has A[ℓ, ∗] and A[∗, ℓ])
Output: matrix A−1 distributed among the n nodes (Node ℓ ∈ [n] has A−1 [ℓ, ∗] and A−1 [∗, ℓ])
(Node ℓ ∈ [n] has A−1 [ℓ, ∗] and A−1 [∗, ℓ])
SYS(n, F) — Solution of a linear system
Input: invertible matrix A ∈ Fn×n and vector b ∈ Fn×1 , distributed among the n nodes
(Node ℓ ∈ [n] has A[ℓ, ∗], A[∗, ℓ] and b)
Output: the vector x ∈ Fn×1 such that Ax = b (Node ℓ ∈ [n] has x[ℓ])
Note that the distribution of the inputs and the outputs assumed in the above five problems
is mostly chosen for convenience. For instance, if needed the whole vector x in the output of
SYS(n, F) can be sent to all the nodes of the network in two rounds using Lemma 1. The only
important assumption is that when dealing with matrices, the entries of the matrices must be
evenly distributed among the n nodes.
We will also in this paper consider the distance product of two matrices, defined as follows.
6
Definition 1. Let m and n be two positive integers. Let A be an n × m matrix and B be an m × n
matrix, both with entries in R ∪ {∞}. The distance product of A and B, denoted A ∗ B, is the
n × n matrix C such that C[i, j] = mins∈[m] {A[i, s] + B[s, j]} for all (i, j) ∈ [n] × [n].
We will be mainly interested in the case when the matrices have integer entries. More precisely,
we will consider the following problem.
DIST(n, m, M ) — Computation of the distance product
Input: an n×m matrix A and an m×n matrix B, with entries in {−M, . . . , −1, 0, 1, . . . , M }∪{∞}
(Node ℓ ∈ [n] has A[ℓ, ∗] and B[∗, ℓ])
Output: the matrix C = A ∗ B distributed among the n nodes
(Node ℓ ∈ [n] has C[ℓ, ∗] and C[∗, ℓ])
Centralized algebraic algorithms for matrix multiplication. We now briefly describe algebraic algorithms for matrix multiplication and known results about the complexity of rectangular
matrix multiplication. We refer to [4] for a detailed exposition of these concepts.
Let F be a field and m, n be two positive integer. Consider the problem of computing the
product of an n × m matrix by an m × n matrix over F. An algebraic algorithm for this problem
is described by three sets {αijµ }, {βijµ } and {λijµ } of coefficients from F such that, for any n × m
matrix A and any m × n matrix B, the equality
C[i, j] =
t
X
λijµ S (µ) T (µ)
µ=1
holds for all (i, j) ∈ [n] × [n], where C = AB and
S (µ) =
m
n X
X
T (µ) =
αijµ A[i, j],
m
n X
X
βijµ B[j, i],
i=1 j=1
i=1 j=1
for each s ∈ [t]. Note that each S (µ) and each T (µ) is an element of F. The integer t is called the
rank of the algorithm, and corresponds to the complexity of the algorithm.
For instance, consider the trivial algorithm computing this matrix product using the formula
C[i, j] =
m
X
A[i, s]B[s, j].
s=1
This algorithm can be described in the above formalism by taking t = n2 m, writing each µ ∈ [n2 m]
as a triple µ = (i′ , j ′ , s′ ) ∈ [n] × [n] × [m], and choosing
1 if i = i′ and j = j ′ ,
λij(i′ ,j ′ ,s′ ) =
0 otherwise,
1 if i = i′ and j = s′ ,
1 if i = j ′ and j = s′ ,
αij(i′ ,j ′ ,s′ ) =
βij(i′ ,j ′ ,s′ ) =
0 otherwise,
0 otherwise.
Note that this trivial algorithm, and the description we just gave, also works over any semiring.
7
The exponent of matrix multiplication. For any non-negative real number γ, let ω(γ) denote
the minimal value τ such that the product of an n × ⌈nγ ⌉ matrix over F by an ⌈nγ ⌉ × n matrix
over F can be computed by an algebraic algorithm of rank nτ +o(1) (i.e., can be computed with
complexity O(nτ +ǫ ) for any ǫ > 0). As usual in the literature, we typically abuse notation and
simply write that such a product can be done with complexity O(nω(γ) ), i.e., ignoring the o(1) in
the exponent. The value ω(1) is denoted by ω, and often called the exponent of square matrix
multiplication. Another important quantity is the value α = sup{γ | ω(γ) = 2}.
The trivial algorithm for matrix multiplication gives the upper bound ω(γ) ≤ 2 + γ, and thus
ω ≤ 3 and α ≥ 0. The current best upper bound on ω is ω < 2.3729, see [25, 43]. The current best
bound on α is α > 0.3029, see [24]. The best bounds on ω(γ) for γ > α can also be found in [24].
3
Matrix Multiplication in the Congested Clique Model
In this section we present our results on the round complexity of MM(n, m, k, F) and DIST(n, m, M ).
We first give the complete statement of our main result concerning MM(n, m, k, F) that was
stated in a simplified form in the introduction.
Theorem 1 (Complete version). For any positive integer k ≤ n, the deterministic round complexity
of MM(n, m, k, F) is
√
if √
0 ≤ m ≤ kn,
O(k)
kn ≤ m < n2 /k,
O(k2/ω(γ) n1−2/ω(γ) ) if
O(km/n)
if m ≥ n2 /k,
where γ is the solution of the equation
log m
log k
log k
+
− 1 ω(γ).
γ =1−
1−
log n
log n
log n
(1)
For any k ≥ n, the deterministic round complexity of MM(n, m, k, F) is
O(k)
if 1 ≤ m ≤ n,
O(km/n) if m ≥ n.
The proof
√ of Theorem 1, which will also show that Equation (1) always has a solution when
k ≤ n and kn ≤ m < n2 /k, is given in Section 3.1 (a short discussion of the proof ideas was
presented in the introduction). The upper bounds we obtain for the case k = 1 are depicted
in Figure 1, where Equation (1) is solved using the best known upper bound on ω(γ) from [24].
√
As briefly mentioned in the introduction, the round complexity is constant for any k ≤ n, and
we further have round complexity O(nǫ ), for any ǫ > 0, for all values k ≤ n(1+α)/2 (the bound
α > 0.3029 implies (1 + α)/2 > 0.6514). For the case m = n the solution of Equation (1) is γ = 1,
which gives the bounds of the simplified version of Theorem 1 presented in the introduction.
We now give lower bounds on the round complexity of MM(n,
m, k, F) that show that the upper
√
bounds of Theorem 1 are tight, except possibly in the case kn ≤ m < n2 /k when k ≤ n.
Proposition 1. The randomized round complexity of MM(n, m, k, F) is
Ω(k)
if 1 ≤ m ≤ n,
Ω(km/n) if m ≥ n.
8
Proof. We first prove the lower bound Ω(km/n) for any m ≥ n. Let us consider instances of
MM(n, m, k, F) of the following form: for each s ∈ [k] all the rows of As are zero except the first row;
for each s ∈ [k] all the columns of Bs are zero except the second column. Let us write Cs = As Bs
for each s ∈ [k]. We prove the lower bound by partitioning the n nodes of the network into
the two sets {1} and {2, . . . , n}, and considering the following two-party communication problem.
Alice (corresponding to the set {1}) has for input As [1, j] for all j ∈ [m] and all s ∈ [k]. Bob
(corresponding to the set {2, . . . , n}) has for input Bs [i, 2] for all i ∈ [m] and all s ∈ [k]. The goal is
for Alice to output Cs [1, 2] for all s ∈ [k]. Note that
P Cs [1, 2] is the inner product (over F) of the first
row of As and the second column of Bs . Thus ks=1 Cs [1, 2] is the inner product of two vectors of
size km. Alice and Bob must exchange Ω(km log |F|) bits to compute this value [8], which requires
Ω(km/n) rounds in the original congested clique model.
We now prove the lower bound Ω(k) for any m ≥ 1. Let us consider instances of MM(n, m, k, F)
of the following form: for each s ∈ [k], all entries of As are zero except the entry As [1, 1] which is
one; for each s ∈ [k], Bs [i, j] = 0 for all (i, j) ∈
/ {(1, j) | j ∈ {2, . . . , n}} (the other n − 1 entries are
arbitrary). Again, let us write Cs = As Bs for each s ∈ [k]. We prove the lower bound by again
partitioning the n nodes of the network into the two sets {1} and {2, . . . , n}, and considering the
following two-party communication problem. Alice has no input. Bob has for input Bs [1, j] for all
j ∈ {2, . . . , n} and all s ∈ [k]. The goal is for Alice to output Cs [1, j] for all j ∈ {2, . . . , n} and all
s ∈ [k]. Since the output reveals Bob’s whole input to Alice, Alice must receive Ω(k(n − 1) log |F|)
bits, which gives round complexity Ω(k) in the original congested clique model.
3.1
Proof of Theorem 1
Let us first prove the following proposition that deals with the case where m is large. In this case
the algorithm is relatively simple.
Proposition 2. For any k ≤ n and any m ≥ n2 /k, the deterministic round complexity of
MM(n, m, k, F) is O(km/n).
Proof. We assume below for convenience that both n/k and km/n are integers. If this is not
the case the proof can be adjusted in a straightforward manner by replacing them by ⌈n/k⌉ and
⌈km/n⌉, respectively.
For each s ∈ [k], we will write Cs = As Bs . Let us decompose the matrix As into n/k matrices
of size n × km
n by partitioning the m columns of As into n/k consecutive blocks of size km/n. Let
(1)
(n/k)
us call these smaller matrices As , . . . , As
. Similarly, for each s ∈ [k] we decompose the matrix
km
Bs into n/k matrices of size n × n by partitioning the m rows of Bs into n/k consecutive blocks
(1)
(n/k)
of size km/n. Let us call these smaller matrices Bs , . . . , Bs
(t)
(t) (t)
Cs = As Bs .
For each s ∈ [k], and each i, j ∈ [n] the equation
Cs [i, j] =
n/k
X
Cs(t) [i, j]
. For each t ∈ [n/k] we write
(2)
t=1
obviously holds. Our distributed algorithm is based on this simple observation. Each node of the
network will be assigned, besides its original label ℓ ∈ [n], a second label (s, t) ∈ [k] × [n/k]. The
assignment of these labels is arbitrary, the only condition being that distinct nodes are assigned
distinct labels. The distributed algorithm is as follows.
9
(t)
(t)
1. Node (s, t) ∈ [k] × [n/k] receives the whole two matrices As and Bs from the nodes of the
(t)
networks owning the entries of these two matrices, and then locally computes Cs .
(t)
(t)
2. Node ℓ ∈ [n] receives Cs [ℓ, ∗] and Cs [∗, ℓ] for all s ∈ [k] and all t ∈ [n/k] from the nodes
of the network owning these entries, and then locally computes Cs [ℓ, ∗] and Cs [∗, ℓ] using
Equation (2) for all s ∈ [k].
The number of field elements received per node is 2km at Step 1 and 2n2 at Step 2. The total
number of field elements received per node is thus O(km + n2 ), which gives round complexity
O(km/n) when km ≥ n2 from Lemma 1.
The main technical contribution is the following proposition.
√
Proposition 3. For any k and m such that k ≤ n and kn ≤ m < n2 /k, the deterministic round
complexity of MM(n, m, k, F) is
O(k2/ω(γ) n1−2/ω(γ) ),
log k
log m
log k
where γ is the solution of the equation 1 − log
n γ = 1 − log n + log n − 1 ω(γ).
Proof. For convenience, let us assume that n/k is an integer (otherwise we replace this value by the
nearest integer). Let γ ≥ 0 be a value that will be set later. Let d be the largest integer such that
the product of a d × ⌈dγ ⌉ matrix by a ⌈dγ ⌉ × d matrix can be computed by an algebraic algorithm
(as in Section 2) of rank n/k. Note that
d = Θ (n/k)1/ω(γ)
from the definition
of√the exponent of matrix multiplication. For convenience, we assume below
p
that n/d, n/k and kn/d are also integers (otherwise we can again simply replace these values
by the nearest integer). Define the quantity
m
m
r= p
=Θ
.
(n/k)γ/ω(γ)+1/2
dγ n/k
Our choice of γ (discussed later) will guarantee that m ≥ (n/k)γ/ω(γ)+1/2 , which implies r = Ω(1).
We will thus assume below, for convenience but without affecting the analysis of the complexity of
the algorithm, that r and dγ are integers such that r ≥ 1 and dγ ≤ m, and that m/dγ is an integer
as well.
For each s ∈ [k], we write the entries of As and Bs as As [ix, jz] and Bs [jz, ix], respectively,
where i ∈ [d], j ∈ [dγ ], x ∈ [n/d] and z ∈ [m/dγ ]. More precisely, this notation corresponds to
decomposing each row of As and each column of Bs into d consecutive blocks of n/d entries, and
decomposing each column of As and each row of Bs into dγ consecutive blocks of m/dγ entries.
Note that this corresponds to decomposing As into an d×dγ matrix where each entry is a submatrix
of As of size (n/d) × (m/dγ ), and decomposing Bs into an dγ × d matrix where each entry is a
submatrix of Bs of size (m/dγ ) × (n/d). We will write As [i∗, j∗] and Bs [j∗, i∗] to represent these
submatrices. Similarly, we write the elements of the output matrix Cs = As Bs as Cs [ix, jy], where
i, j ∈ [d] and x, y ∈ [n/d]. By extending the formulation given in Section 2 to block matrices (and
using the same notations), for any s ∈ [k], any i, j ∈ [d] and any x, y ∈ [n/d] we can write
Cs [ix, jy] =
n/k
X
µ=1
10
λijµ Ss(µ) Ts(µ) ,
(3)
(µ)
where, for each µ ∈ [n], Ss is an (n/d)×(m/dγ ) matrix that can be written as a linear combination
(µ)
of the submatrices of As , and Ts is an (m/dγ ) × (n/d) matrix that can be written as a linear
combination of the submatrices of Bs :
γ
Ss(µ)
=
d X
d
X
αijµ As [i∗, j∗]
(4)
βijµ Bs [j∗, i∗].
(5)
i=1 j=1
γ
Ts(µ)
=
d X
d
X
i=1 j=1
Finally, we will also decompose each label x, y and z into two parts:
p
√
• we write x = wx′ where w ∈ [ n/k] and x′ ∈ [ kn/d],
√
p
• we write y = wy ′ where w ∈ [ n/k] and y ′ ∈ [ kn/d],
p
• we write z = wz ′ where w ∈ [ n/k] and z ′ ∈ [r].
p
p
This corresponds to further decomposing each submatrix
of As into an n/k × n/k matrix where
√
each entry
submatrix of As of size ( kn/d) × r, and decomposing each submatrix
p
√ of Bs
p is a smaller
into an n/k × n/k matrix where each entry is a smaller submatrix of Bs of size r × ( kn/d).
Each node of the network has a label (i, x) ∈ [d] × [n/d], and receives as input As [ix, ∗] and
Bp
[∗,
ix] forpall s ∈ [k]. We assign two additional labels to each node: one label (s, u, v) ∈ [k] ×
s
[ n/k] × [ n/k] and one label (s, µ) ∈ [k] × [n/k]. The assignment of these labels is arbitrary,
the only condition being that distinct nodes are assigned distinct labels. The algorithm is given in
Figure 2.
The number of field elements received per node at Step 1 is
√
m
kn
γ
× p
= 2km.
2×d×d ×
γ
d
d n/k
The number of field elements received per node at Step 2 is
m
n
(6)
2 × × γ = O k(1+γ)/ω(γ) mn1−(1+γ)/ω(γ) .
d d
The number of field elements received per node at Step 3 is
√
√
n
kn
kn
(7)
×
×
= O k2/ω(γ) n2−2/ω(γ) .
k
d
d
The number of field elements received per node at Step 4 is 2kn. Note that Expression (6) is larger
than 2km since ω(γ) ≥ 1+ γ and k ≤ n. Moreover, Expression (7) is larger than 2kn since ω(γ) ≥ 2
and k ≤ n. Thus the total number of field elements received per node is
O k(1+γ)/ω(γ) mn1−(1+γ)/ω(γ) + k2/ω(γ) n2−2/ω(γ) .
Let us write a = log k/ log n and b = log m/ log n and define the two functions
a(1 + γ)
1+γ
+b+1−
,
ω(γ)
ω(γ)
2a
2
g(γ) =
+2−
,
ω(γ)
ω(γ)
f (γ) =
11
p
p
1. Node (s, u, v) ∈ [k] × [ n/k] × [ n/k] receives As [iux′ , jvz ′ ] and Bs [juz ′ , ivy√′ ] from
the nodes of the network owning these entries, for all i ∈ [d], j ∈ [dγ ], x′ , y ′ ∈ [ kn/d]
(µ)
and z ′ ∈ [r]. Node (s, u, v) then locally computes Ss [ux′ , vz ′ ] using Equation (4)
√
(µ)
and Ts [uz ′ , vy ′ ] using Equation (5) for all µ ∈ [n/k], all x′ , y ′ ∈ [ kn/d] and all
z ′ ∈ [r].
(µ)
(µ)
2. Node (s, µ) ∈ [k] × [n/k] receives the whole matrices Ss and Ts from the nodes of
the network owning the entries of these matrices, and locally computes the product
(µ)
(µ) (µ)
Ps = Ss Ts .
p
p
(µ)
3. Node (s, u, v) ∈ [k] × [ n/k] × [ n/k] receives Ps [ux′ , vy ′ ] from√the nodes of
the network owning these entries, for all µ ∈ [n/k] and all x′ , y ′ ∈ [ kn/d]. Node
′
′
(s, u, v) then
√ locally computes Cs [iux , jvy ] using Equation (3) for all i, j ∈ [d] and
′
′
all x , y ∈ [ kn/d].
4. Node (i, x) ∈ [d] × [n/d] receives Cs [ix, ∗] and Cs [∗, ix] for all s ∈ [k] from the nodes
of the network owning these entries.
Figure 2: Distributed algorithm for MM(n, m, k, F) in the congested clique model. Initially each
node (i, x) ∈ [d] × [n/d] has as input As [ix, ∗] and Bs [∗, ix] for all s ∈ [k].
for any γ ≥ 0. The function f is a decreasing function of γ, with value a/2 + b + 1/2 when γ = 0
and with limit a + b when γ goes to infinity. The function g is an increasing function of γ, with
value a + 1 when
√ γ = 0 and with limit 2 when γ goes to infinity. Let us choose γ as follows. Since
we assumed kn ≤ m < n2 /k, the equation f (γ) = g(γ) necessarily has a solution. We choose γ
as this solution, i.e., such that
(1 − a) γ = 1 − a + (b − 1) ω(γ).
(8)
Observe that such a choice for γ implies that m ≥ (n/k)γ/ω(γ)+1/2 as we required: Equation (8)
can be rewritten as
(1 − a)γ
1−a
b =1+
−
,
ω(γ)
ω(γ)
which implies
b ≥ (1 − a)
1
γ
+
ω(γ) 2
since ω(γ) ≥ 2. For our choice of γ, the total number of field elements received per node is thus
O(k2/ω(γ) n2−2/ω(γ) ), which gives round complexity
O(k2/ω(γ) n1−2/ω(γ) ),
as claimed, from Lemma 1.
The proof of Theorem 1 now follows easily from Propositions 2 and 3.
√
Proof of Theorem 1. Consider first the case k ≤ n. When kn ≤ m ≤ n2 /k, we use the algorithm
√
of Proposition 3. When m ≥ n2 /k, we use the algorithm of Proposition 2. When 0 ≤ m ≤ kn the
12
claimed
√ upper bound O(k) on the round complexity can be derived from Proposition 2 by taking
m = kn (i.e., by appending rows and columns with zero entries to the input matrices) and γ = 0.
For the case k ≥ n we can simply repeat ⌈k/n⌉ times an algorithm for MM(n, m, n, F), which
gives round complexity
O(k)
if 1 ≤ m ≤ n,
O(km/n) if m ≥ n.
from the analysis of the previous paragraph.
3.2
Application to the distance product
One of the main applications of Theorem 1 is the following result, which will be the key ingredient
for all our results on the all-pairs shortest paths and diameter computation discussed in Section 6.
Theorem 7. For any M ≤ n and m ≤ n, the deterministic round complexity of DIST(n, m, M ) is
√
if 0 ≤ m ≤ M n log m,
O(M log m)
√
M n log m ≤ m ≤ n2 /(M log m),
O (M log m)2/ω(γ) n1−2/ω(γ)
if
O (mM log m/n)
if n2 /(M log m) ≤ m ≤ n,
M
log m
log M
where γ is the solution of the equation 1 − log
+
−
1
ω(γ).
γ
=
1
−
log n
log n
log n
Let us first give a brief overview of the proof of Theorem 7. The idea is to show that
DIST(n, m, M ) reduces to MM(n, m, k, F) for k ≈ M log m and a well-chosen finite field F, and
then use Theorem 1 to get a factor (M log m)2/ω(γ) , instead of the factor M obtained in a straightforward implementation of the distance product, in the complexity. This reduction is done by first
applying a standard encoding of the distance product into a usual matrix product of matrices with
integer entries of absolute value exp(M ), and then using Fourier transforms to split this latter
matrix product into roughly M log m independent matrix products over a small field.
Proof of Theorem 7. We show below that DIST(n, m, M ) reduces to MM(n, m, k, F) where k =
O(M log m) and |F| = poly(M, log m). The result then follows from Theorem 1.
Let N be any positive integer. We first show how to reduce the multiplication or the addition of
two nonnegative N -bit integers a and b to 2N independent operations (multiplications or additions,
respectively) in a large enough field, using the Fourier transform. Let F be a finite field with
characteristic at least N + 1. Let
ΦN : {0, 1, . . . , 2N −1 } → F[x]/(x2N − 1)
PN −1 i
be the map that maps each N -bit integer c = i=0
ci 2 , with each ci in {0, 1}, to the polynomial
PN −1
i
i=0 ci x . Computing the product ab ∈ Z (resp. the sum a + b ∈ Z) reduces to computing the
product ΦN (a)ΦNP
(b) (resp. the sum ΦN (a) + ΦN (b)) over F[x]/(x2N − 1). Indeed,
P2N −1if ΦiN (a)ΦN (b)
2N −1
is the polynomial i=0
ci xi , with each ci in F, then ab is equal to the sum i=0
ci 2 computed
over the integers (note that the assumption on the characteristic of F is crucial here), and similarly
for the addition. The computation of ΦN (a)ΦN (b) and ΦN (a) + ΦN (b) can be done using the
identities
ΦN (a)ΦN (b) = DF T −1 (DF T (ΦN (a)) · DF T (ΦN (b))),
ΦN (a) + ΦN (b) = DF T
−1
(DF T (ΦN (a)) + DF T (ΦN (b))),
13
(9)
(10)
where DF T : F[x]/(x2N − 1) → F2N is the Fourier transform and where · and the second + represent the coordinate-wise multiplication and addition in F2N , respectively (we refer to [4] for a
detailed presentation of this Fourier transform). In order for the Fourier transform to be defined
we nevertheless need to choose the field F such that it contains a 2N -th primitive root of unity. It
is known (see, e.g., [11]) that for any prime p such that 2N divides p − 1 the finite field F = Zp
contains such a prime root. It is also known ([28, 29], see also [11]) that the least prime p such that
′
2N divides p − 1 is smaller than d(2N )d for some absolute constants d and d′ . By choosing such
a prime p, we obtain a reduction from the computation of ab (resp. a + b) to one coordinate-wise
multiplication (resp. addition) in F2N where |F| = poly(N ). Note that we do not need to discuss
the costs of finding p and the cost of preprocessing/postprocessing operations (such as applying
the Fourier transform and its inverse), since they will have no impact on the round complexity of
the algorithm we design below.
Pm
Let us now consider the task of computing the integer
t=1 at bt given non-negative N -bit
integers a1 , .P
. . , am , b1 , . . . , bm . Similarly to what we just did, this sum can be recovered from the
polynomial m
t=1 ΦN (at )ΦN (bt ), which can be obtained by computing the 2N -dimentional vector
m
X
t=1
DF T (ΦN (at )) · DF T (ΦN (bt ))
(11)
over a finite field F of order polynomial in N and m, and then applying the inverse Fourier transform.
We can now describe our reduction. Let A, B be the matrices with entries in {−M, . . . , M }∪{∞}
of which we want to compute the distance product. We first reduce this distance product to one
usual product of matrices with large entries, using standard techniques [2, 42, 47]. Consider the
n × m matrix A′ by the m × n matrix B ′ defined as:
(m + 1)M −A[i,j] if A[i, j] 6= ∞,
(m + 1)M −B[j,i] if B[j, i] 6= ∞,
′
′
A [i, j] =
B [j, i] =
0
if A[i, j] = ∞,
0
if B[j, i] = ∞,
for all (i, j) ∈ [n] × [m]. It is easy to check (see [47] for a proof) that the entry
A ∗ B[i, j] can be
′
′
recovered easily from entry A B [i, j], for each (i, j) ∈ [n] × [m]. Let N = log2 ((m + 1)2M + 1)
be the number of bits needed to represent the entries of A′ and B ′ , and F be a finite field as in
the previous paragraph. Next, in order to compute A′ B ′ we use the following strategy. For each
(i, j) ∈ [n] × [m], consider the two vectors DF T (ΦN (A′ [i, j])) ∈ F2N and DF T (ΦN (B ′ [j, i])) ∈ F2N .
For convenience write them as ~
pij = (pij [1], . . . , pij [2N ]) and ~qji = (qji [1], . . . , qji [2N ]), respectively.
Now, for any s ∈ [2N ], define the matrix A′s ∈ Fn×m and the matrix Bs′ ∈ Fm×n such that
A′s [i, j] = pij [s] and Bs [j, i] = qji [s] for all (i, j) ∈ [n] × [m]. It follows from the discussion of
the previous paragraph (and in particular Equation (11)) that for each (i, j) ∈ [n] × [n] the entry
′ [i, j]. Since all preprocessing
A′ B ′ [i, j] can be recovered from the entries A′1 B1′ [i, j], . . . , A′2N B2N
and postprocessing steps of this strategy can be performed locally by the nodes of the network
in the congested clique model, this reduces the computation of A′ B ′ to solving one instance of
MM(n, m, 2N, F), with 2N = O(M log m) and |F| = poly(M, m), as claimed.
4
Deterministic Computation of Determinant and Inverse Matrix
In this section we present deterministic algorithms for computing the determinant of a matrix and
the inverse of a matrix in the congested clique model, and prove Theorem 2. Our algorithms can
14
be seen as efficient implementations of the parallel algorithm by Prerarata and Sarwate [37] based
on the Faddeev-Leverrier method.
Let A be an n × n matrix over a field F. Let det(λI − A) = λn + c1 λn−1 + · · · + cn−1 λ + cn be
its characteristic polynomial. The determinant of A is (−1)n cn and, if cn 6= 0, its inverse is
A−1 = −
An−1 + c1 An−2 + · · · + cn−2 A + cn−1 I
.
cn
Define the vector ~c = (c1 , . . . , cn )T ∈ Fn×1 . For any k ∈ [n] let sk denote the trace of the matrix Ak ,
and define the vector ~s = (s1 , . . . , sn )T ∈ Fn×1 . Define the n × n matrix
1
s1
2
s2
s
3
1
S=
.
..
..
..
..
.
.
.
.
sn−1 sn−2 sn−3 ... s1 n
It can be easily shown (see, e.g., [9, 37]) that S~c = −~s, which enables us to recover ~c from ~s if S is
invertible. The matrix S is invertible whenever n! 6= 0, which is true in any field of characteristic
zero or in any finite field of characteristic strictly larger than n. The following proposition shows
that the inverse of an invertible triangular matrix can be computed efficiently in the congested
clique model.
Proposition 4. Let F be any field. The deterministic round complexity of INV(n, F), when the
input A is an invertible lower triangular matrix, is O(n1−2/ω ).
Proof. We adapt the standard sequential algorithm for triangular matrix inversion [1, 3]. Let A be
an invertible lower triangular n × n matrix with entries in F. Assume without loss of generality
that n is a power of two. Let us decompose A in four blocks of size n/2 × n/2:
A11
0
A=
.
A21 A22
Observe that both A11 and A22 are invertible lower triangular matrices, and
A−1
0
−1
11
A =
.
−1
A−1
−A−1
22 A21 A11
22
Inverting A thus reduces to inverting two invertible lower triangular matrices of size n/2 × n/2 and
performing two matrix multiplications. We implement this algorithm recursively (and in parallel)
in the congested clique model as follows. The n nodes are partitioned into two groups of size
of n/2: the first group consisting of nodes 1, . . . , n/2 and the second group consisting of nodes
n/2+1, . . . , n. The first group recursively computes A−1
11 and the second group recursively computes
−1
A−1
.
The
important
point
here
is
that
the
computation
of A−1
22
11 and the computation of A22 can
be done independently (i.e., in parallel). The nodes of the second group then in two rounds (using
Lemma 1) distribute appropriately the rows of A−1
22 to the nodes of the first group (who own the
−1
−1
columns of A21 ), so that the nodes of the first group can compute A−1
22 A21 and then −A22 A21 A11 .
−1
The nodes of the first group finally distribute appropriately the rows of −A−1
22 A21 A11 to the nodes
of the second group, in two rounds from Lemma 1.
15
Let RI (n) denote the round complexity of our problem (computing the inverse of an invertible
lower triangular n×n matrix using n nodes), and RM (n) denote the round complexity of computing
the product of two n × n matrices using n nodes (i.e., the problem MM(n, n, 1, F)). The recurrence
relation we obtain is
RI (1) = 0,
RI (n) ≤ RI (n/2) + 2RM (n/2) + 4 for n ≥ 2,
which gives RI (n) = O(n1−2/ω ) since RM (n) = O(n1−2/ω ) from Theorem 1.
We are now ready to give the proof of Theorem 2.
√
Proof of Theorem 2. For convenience we assume that n is a square, and write p = n. If n
√
is not a square we can easily adapt the proof by taking p = ⌈ n⌉. Observe that any integer
a ∈ {0, 1, . . . , n − 1} can be written in a unique way as a = (a1 − 1)p + (a2 − 1) with a1 , a2 ∈ [p].
Below when we write a = (a1 , a2 ) ∈ [n], we mean that a1 and a2 are the two elements in [p] such
that a = (a1 − 1)p + (a2 − 1).
For any ℓ ∈ [n], let Rℓ be the p × n matrix such that the i-th row of Rℓ is the ℓ-th row of A(i−1)p ,
for each i ∈ [p]. Similarly, for any ℓ ∈ [n], let Cℓ be the n × p matrix such that the j-th column of
Cℓ is the ℓ-th column of Aj−1 , for each j ∈ [p]. For each ℓ ∈ [n] define Uℓ = Rℓ Cℓ , which is a p × p
matrix. Observe that, for any k = (k1 , k2 ) ∈ [n], the identity
sk =
n
X
Uℓ [k1 , k2 ]
(12)
ℓ=1
holds. We will use this expression, together with the equation ~c = −S −1~s to compute the determinant in the congested clique model.
In order to compute the inverse of A we then use the following approach. For any (a1 , a2 ) ∈
[p] × [p], define the coefficient ca1 ,a2 ∈ F as follows:
cn−1−(a1 −1)p−(a2 −1) if (a1 , a2 ) 6= (p, p),
ca1 ,a2 =
1
if (a1 , a2 ) = (p, p).
For any a2 ∈ [p], define the n × n matrix Ea2 as follows:
Ea2 =
p
X
ca1 ,a2 A(a1 −1)p .
a1 =1
Note that the following holds whenever cn 6= 0:
Pp
Pp
Pp
Pn−1
(a1 −1)p+(a2 −1)
a
Ea2 Aa2 −1
a2 =1 ca2 ,a1 A
a1 =1
−1
a=0 cn−1−a A
=−
= − a2 =1
.
A =−
cn
cn
cn
(13)
The algorithm for DET(n, F) and INV(n, F) is described in Figure 3. Steps 1 and 7.2 can be
implemented in O(p2/ω n1−2/ω ) rounds from Theorem 1 (or its simplified version in the introduction).
Step 5 can be implemented in O(n1−2/ω ) rounds, again from Theorem 1. At Steps 2, 3 and 6 each
node receives n elements from the field F, so each of these three steps can be implemented in two
rounds from Lemma 1. The other steps (Steps 4, 7.1 and 7.3) do not require any
communication.
The total round complexity of the algorithm is thus O p2/ω n1−2/ω = O n1−1/ω , as claimed.
16
1. The matrices A(a1 −1)p and Aa2 −1 are computed for all a1 , a2 ∈ [p] using the distributed
algorithm of Theorem 1. At the end of this step node ℓ ∈ [n] has the whole p × n matrix
Rℓ and the whole n × p matrix Cℓ .
2. Node ℓ ∈ [n] locally computes Uℓ , and sends Uℓ [k1 , k2 ] to each node k = (k1 , k2 ) ∈ [n].
3. Node k = (k1 , k2 ) ∈ [n], who received Uℓ [k1 , k2 ] for all ℓ ∈ [n] at the previous step,
locally computes sk using Equation (12). Node k then sends sk to all the nodes.
4. Node ℓ ∈ [n], who received ~s at Step 3, locally constructs S[ℓ, ∗] and S[∗, ℓ].
5. The matrix S −1 is computed using the algorithm of Proposition 4. At the end of this
step, node ℓ ∈ [n] has S −1 [ℓ, ∗] and S −1 [∗, ℓ].
6. Node ℓ ∈ [n] locally computes cℓ from S −1 [ℓ, ∗] and ~s, and sends cℓ to all nodes.
7. The determinant of A is (−1)n cn . If cn = 0 the matrix A is not invertible. Otherwise
the nodes compute A−1 as follows:
7.1 Node ℓ ∈ [n] computes Ea2 [ℓ, ∗] for each a2 ∈ [p] (this can be done locally since ~c
and each row A(a1 −1)p [ℓ, ∗] are known from Steps 6 and 1, respectively).
7.2 The matrices Ea2 Aa2 −1 are computed for all a2 ∈ [p] using the distributed algorithm of Theorem 1 (since, besides Ea2 [ℓ, ∗] obtained at the previous step, each
node ℓ ∈ [n] knows Aa2 −1 [∗, ℓ] from the result of the computation of Step 1). At
the end of this step, node ℓ ∈ [n] has the ℓ-th row and the ℓ-th column of the
matrix Ea2 Aa2 −1 for all a2 ∈ [p].
7.3 Node ℓ ∈ [n] computes locally A−1 [ℓ, ∗] and A−1 [∗, ℓ] using Equation (13).
Figure 3: Distributed algorithm for computing the determinant of an n × n matrix A and computing A−1 if det(A) 6= 0. Initially each node ℓ ∈ [n] has as input A[ℓ, ∗] and A[∗, ℓ].
5
Randomized Algorithms for Algebraic Problems
In this section we present O(n1−2/ω )-round randomized algorithms for computing the determinant,
the rank and for solving linear systems of equations in the congested clique model, and prove
Theorem 3. Our approach is based on Wiedemann’s method [44] and its parallel implementations
[21, 22, 23].
Let A be an n × n matrix over F. The minimal polynomial of A, which we denote minpol(A),
is the monic polynomial g over F of least degree such that g(A) = 0. Let v ∈ Fn×1 and w ∈ F1×n be
any vectors. Consider the sequence wA0 v, wAv, wA2 v, . . . , wAn−1 v consisting of n elements of F.
This sequence is linearly generated over F, and thus also admits a polynomial called the generating
polynomial of the sequence, which we denote minpol(A, v, w). We refer to [16] for the precise
definition of the generating polynomial of such a linearly generated sequence and a description of
efficient algorithms to compute it — in this paper we will just need to know that such a polynomial
exists. Wiedemann [44] showed that with high probability minpol(A, v, w) = minpol(A) when v
and w are chosen at random. We use the following characterization of this property proved by
Kaltofen and Pan [22].
17
Lemma 2. ([22]) Let A be any n × n matrix over F. Let v ∈ Fn×1 and w ∈ F1×n be two vectors
in which each coordinate is chosen uniformly at random from F. Then
2n
.
Pr minpol(A) = minpol(A, v, w) ≥ 1 −
|F|
In general the minimal polynomial of a matrix A is not equal to its characteristic polynomial
charpol(A). Wiedemann [44] nevertheless showed that the characteristic polynomial can be obtained from the minimal polynomial by preconditioning the matrix. Since it will be more convenient
for our purpose to apply a diagonal preconditioner, we will use the following version shown by Chen
et al. [6].
Lemma 3. ([6]) Let A be any n × n matrix over F. Let D be an n × n diagonal matrix where each
diagonal entry is chosen uniformly at random from F \ {0}. Then
n(n − 1)
.
Pr charpol(DA) = minpol(DA) ≥ 1 −
2(|F| − 1)
Kaltofen and Saunders [23] showed that the rank of a matrix can be obtained, with high
probability, from the degree of the minimal polynomial by using another preconditioning of the
matrix. The following lemma follows from the combination of Theorem 1 and Lemma 2 in [23].
Lemma 4. ([23]) Let A be any n × n
1 u2 u3 · · ·
1 u2 · · ·
..
.
U =
1
.
..
matrix over F such that rank(A) < n. Let
un
1
un−1
v2
1
..
v3
v2
1
.
, V =
..
.
.. ...
.
u2
vn vn−1 · · · v2 1
1
be two n × n unit (upper and lower, respectively) triangular random Toepliz matrices. Let D be an
n × n diagonal matrix where each diagonal entry is chosen uniformly at random from F. Then
n(3n + 1)
.
Pr rank(A) = deg(minpol(U AV D)) − 1 ≥ 1 −
2|F|
We are now ready to prove Theorem 3.
Proof of Theorem 3. We first show how to compute efficiently, in the congested clique model, the
sequence Ã0 u, Ãu, Ã2 u, . . .,Ãn−1 u given an arbitrary matrix à ∈ Fn×n and an arbitrary vector
u ∈ Fn×1 . For convenience assume that n is a power of two (otherwise we can simply add zero rows
and columns to à and zero entries to u), and write n = 2k for some positive integer k. For each
i ∈ {0, . . . , k}, define the n × n matrix
i
M (i) = [u|Ãu| · · · |Ã2 −1 u|0| · · · |0],
i −1
obtained by concatenating the vectors u, . . . , Ã2
each i ∈ {0, . . . , k − 1}, define the n × n matrix
u and then adding 2k − 2i zero columns. For
i
N (i) = [0| · · · |0|u|Ãu| · · · |Ã2 −1 u|0| · · · |0],
18
i
obtained by concatenating the vectors u, . . . , Ã2 −1 u, adding 2i zero columns on the left and 2k −2i+1
zero columns on the right. Observe that, for any i ∈ {0, . . . , k − 1}, the equality
i
M (i+1) = M (i) + Ã2 N (i)
i−1
i
holds. Moreover, for any i ∈ {1, . . . , k − 1}, the matrix Ã2 can be obtained by multiplying Ã2 by
itself. This enables us to compute the n vectors Ã0 u, Ãu, Ã2 u, . . . , Ãn−1 u using only 2k − 1 matrix
multiplications. We describe in Figure 4 the implementation of this approach in the congested
clique model, which uses O(kn1−2/ω ) = O(n1−2/ω log n) rounds.
input: node ℓ ∈ [n] has Ã[ℓ, ∗], Ã[∗, ℓ] and u
output: node ℓ ∈ [n] has M (k) [∗, ℓ] = Ãℓ−1 u
1. M (0) ← [u|0| · · · |0]
(Node ℓ ∈ [n] locally constructs M (0) [ℓ, ∗] and M (0) [∗, ℓ])
2. N (0) ← [0|u|0| · · · |0]
(Node ℓ ∈ [n] locally constructs N (0) [ℓ, ∗] and N (0) [∗, ℓ])
3. For i from 0 to k − 1 the nodes do:
i
3.1 The nodes compute Ã2 N (i) using the algorithm of Theorem 1: after the computai
i
tion node ℓ ∈ [n] has Ã2 N (i) [ℓ, ∗] and Ã2 N (i) [∗, ℓ].
3.2 The nodes locally compute M (i+1) : node ℓ ∈ [n] computes M (i+1) [ℓ, ∗] = M (i) [ℓ, ∗]+
i
i
Ã2 N (i) [ℓ, ∗] and M (i) [∗, ℓ] = M (i) [∗, ℓ] + Ã2 N (i) [∗, ℓ].
i+1
3.3 If i 6= k − 1 the nodes compute Ã2
i
i
= Ã2 Ã2 using the algorithm of Theorem 1.
Figure 4: Distributed randomized algorithm for computing the sequence Ã0 u, Ãu, Ã2 u, . . . , Ãn−1 u
given a matrix à ∈ Fn×n and a vector u ∈ Fn×1 . Here n is a power of two, written n = 2k .
We now describe a O(n1−2/ω log n)-round algorithm in the congested clique model that computes, with high probability, the minimal polynomial minpol(A) of an arbitrary matrix A ∈ Fn×n .
More precisely, the matrix A is initially distributed among the n nodes of the network (node ℓ ∈ [n]
receives as input A[ℓ, ∗] and A[∗, ℓ]) and at the end of the computation we would like a designated
node of the network (say, node 1) to have the polynomial minpol(A). The algorithm is as follows.
First, a designated node (say, node 1 again) takes two random vectors v, w as in Lemma 2. This
node then sends v, w to all the nodes of the network in four rounds of communication using the
scheme of Lemma 1. Then the nodes of the network apply the algorithm of Figure 4 with à = A
and u = v. After this, each node ℓ ∈ [n] owns Aℓ−1 v, and can then compute locally the field
element wAℓ−1 v. All nodes then sends their result to node 1 using one round of communication.
Node 1 finally computes locally the polynomial minpol(A, v, w). The complexity of this algorithm
is clearly O(n1−2/ω log n) rounds. The correctness follows from Lemma 2, which guarantees that
minpol(A) = minpol(A, v, w) with probability at least 1 − 2n/|F|.
Our O(n1−2/ω log n)-round algorithm for INV(n, F) (i.e., for solving the linear system Ax = b
where A is invertible) in the congested clique model is as follows. The nodes of the network first use
the algorithm of the previous paragraph, so that node 1 obtains with high probability minpol(A).
Let us write minpol(A) as m0 + m1 λ + · · · + mn λn , with mn = 1. From the definition of the
19
minimal polynomial, we have
x=
m1 b + m2 Ab + · · · + mn An−1 b
.
−m0
(14)
Node 1 then sends the two field elements m0 and mℓ to node ℓ, for each ℓ ∈ {1, . . . , n}, in two
rounds. The nodes of the network use the O(n1−2/ω log n)-round algorithm of Figure 4 with u = b
and à = A, so that each node ℓ ∈ [n] owns Aℓ−1 b at the end of the computation. Each node ℓ ∈ [n]
mℓ ℓ−1
then locally computes − m
A b, and sends the ℓ′ -th coordinate of this vector to node ℓ′ , for each
0
ℓ′ ∈ [n]. This can be done in two rounds. Node ℓ ∈ [n] then adds the n elements he receives, which
gives x[ℓ] from Equation (14).
We now describe our O(n1−2/ω log n)-algorithm for DET(n, F). First, a designated node (say,
node 1) takes a random diagonal matrix D as in Lemma 3. This node then sends D to all the
nodes of the network using two rounds of communication (using the scheme of Lemma 1). Each
node ℓ ∈ [n] of the network then constructs DA[ℓ, ∗] and DA[∗, ℓ]. The nodes of the network
then apply the above algorithm computing the minimal polynomial, so that Node 1 obtains with
high probability minpol(DA). Let m0 denote the constant term of minpol(DA). Note that the
determinant of DA is (−1)n m0 , from Lemma 3, and thus the determinant of A is
(−1)n m0
Qn
.
i=1 D[i, i]
Node 1 sends this value all the nodes of the network in one round of communication.
Finally, we present our algorithm for Rank(n, F). First, we can check with high probability
whether rank(A) = n by computing det(A) using the algorithm described in the previous paragraph.
Therefore we assume below that rank(A) < n, and compute the rank as follows. A designated node
(say, node 1) takes three random matrices U, V, D as in Lemma 4, and sends the three matrices to
all the nodes of the network in six rounds using the scheme of Lemma 1 (note that each matrix is
described by at most n coefficients). The nodes of the network then apply the O(n1−2/ω )-round
algorithm of Theorem 1 three times to compute U AV D. They then use the O(n1−2/ω log n)-round
algorithm computing the minimal polynomial, so that Node 1 obtains minpol(U AV D). Node 1
locally computes deg(minpol(U AV D)) − 1 and sends this value to all the nodes of the network in
one round. The correctness of this algorithm is guaranteed by Lemma 4.
6
Applications to Graph-Theoretic Problems
In this section we consider applications of our results to graph-theoretic problems in the congested
clique model.
6.1
The All Pair Shortest Paths problem
The All-Pairs Shortest Paths problem (APSP) asks, given a weighted graph G = (V, E), to compute
the shortest path between u and v for all pairs of vertices (u, v) ∈ V ×V . For simplicity, but without
significant loss of generality, we will assume that the weights are O(log n)-bit integers. When the
graph G is undirected, the definition of the APSP requires the weights to be nonnegative (otherwise
there would be negative cycles). When the graph G is directed negative weights are allowed but it is
implicitly required that the graph has no non-negative cycle. We say that the graph is unweighted
20
if the only allowed weight is one. In this subsection the term “adjacency matrix of G” refers to the
|V | × |V | matrix in which the entry in the i-th row and j-th column is the weight of the edge from
the i-th node to the j-th node of the graph if these two nodes are connected and ∞ otherwise.
Let us first describe very briefly the main results concerning the complexity of the APSP in the
centralized setting. For undirected unweighted graphs, Seidel [40] showed that the APSP reduces
to computing the powers of the adjacency matrix (seen as a matrix over the integers) of the graph,
and can thus be solved in Õ(nω ) time. For all other cases, including directed graphs and undirected
graphs with arbitrary weights, the standard algebraic way of solving the APSP is to compute the
powers of the distance product of the adjacency matrix of the graph. This distance product of
an n × m matrix A by an m × n matrix B can be trivially solved in time O(smn2 ), where s
denotes the number of bits needed to represent each entry of A and B, which gives a Õ(n3 )-time
algorithm for the APSP. Despite much research (including recent exciting developments [45]), no
significantly better algorithm is known for computing the distance product or solving the general
APSP. Faster algorithms for computing the distance product can be nevertheless designed when the
entries of A and B are small integers, i.e., the entries are in {−M, . . . , −1, 0, 1, . . . , M } ∪ {∞} for
some integer M . As already mentioned in the proof of Theorem 7, Alon et al. [2] and Takaoka [42]
(for the square case) and then Zwick [47] (for the rectangular case) showed that C can be recovered
easily from the standard matrix product of the n × m matrix A′ by the m × n matrix B ′ where
(m + 1)M −A[i,j] if A[i, j] 6= ∞,
(m + 1)M −B[j,i] if B[j, i] 6= ∞,
A′ [i, j] =
B ′ [j, i] =
0
if A[i, j] = ∞,
0
if B[j, i] = ∞,
for all (i, j) ∈ [n] × [m]. This implies in particular that the distance product can be computed in
Õ(M nω(log m/ log n) ) time, and in particular in Õ(M nω ) time when m = n. Shoshan and Zwick [41]
used this technique (for the square case) to obtain a Õ(M nω )-time algorithm for the APSP in
undirected graphs with weights in {0, . . . , M }. Zwick used this technique (for the rectangular case)
to construct an algorithm for the directed case. He obtained in particular time complexity O(n2.58 ),
which has been improved to O(n2.54 ) using the best known upper bound on the exponent of rectangular matrix multiplication [24], when M is constant (and in particular for directed unweighted
graphs).
Censor-Hillel et al. [5] showed how to adapt Seidel’s method [40] to solve the APSP over undirected unweighted graphs in Õ(n1−2/ω ) rounds. They also observed that the centralized matrix
algorithms for the distance product discussed above can be implemented in the congested clique
model, solving DIST(n, n, M ) in O(min{n1/3 log n, M n1−2/ω }) rounds. While not explicitly stated
in [5], this result gives a O(M n1−2/ω )-round algorithm for the APSP in undirected graphs with
weights in {0, 1, . . . , M }, by observing that the reduction given in [41] from such instances of APSP
to the computation of the distance product can be implemented efficiently in the congested clique
model. Our improved upper bound (Theorem 4 stated in the introduction) follows directly from
our improved algorithm for the computation of the distance product in the congested clique model
(Theorem 7).
We now consider the APSP in directed graphs with small integer weights and prove Theorem 5.
Besides the new bounds of Theorem 7, we will also use another upper bound on the round complexity
of DIST(n, m, M ), which is better for large values of M . This is the bound obtained from Theorem 1
for the choice ω(ℓ) = 2 + ℓ corresponding to the implementation of the trivial matrix multiplication
algorithm (which works over any semiring, see Section 2) in the congested clique model. We state
this bound in the following proposition.
21
Proposition 5. The round complexity of DIST(n, m, M ) is
√
O(log M )
if 0 ≤ m ≤ n,
√
O(m2/3 n−1/3 log M ) if m ≥ n.
We are now ready to prove Theorem 5.
Proof of Theorem 5. Let A be the adjacency matrix of the graph G = (V, E). The centralized
algorithm by Zwick [47] works as follows. The algorithm performs ⌈log3/2 n⌉ iteration, while maintaining an n × n matrix F initially set to F = A. In the k-th iteration, it sets s = (3/2)k , and
takes a set S ⊆ V of O((n log n)/s) vertices chosen uniformly at random from V . The algorithm
then construct the submatrix of size |S| × n of F , denoted F [S, ∗], consisting of the rows corresponding to the vertices in S, and the submatrix of size n × |S| of F , denoted F [∗, S], consisting
of the columns corresponding to vertices in S. It then puts a cap of sM on the absolute values
of the entries of F [S, ∗] and F [∗, S]. The last step of the iteration is to compute the distance
product F ′ = F [∗, S] ∗ F [S, ∗] and, for each (i, j) ∈ [n × n], replace the (i, j) entry of F by F ′ [i, j] if
F ′ [i, j] < F [i, j]. It can be shown that after the last iteration the entry F [i, j] is the length of the
shortest path between the i-th node and the j-th node of the graph, for all (i, j) ∈ [n × n], if the
graph has no negative cycle.
This centralized algorithm can be implemented easily in the congested clique model. The only
part that requires communication between the nodes is the computation of the distance product:
at step i the nodes need to compute the distance product of a n × m matrix by a m × n matrix
with entries of absolute values bounded by ⌈sM ⌉ with m = O((n log n)/s) and s = (3/2)i . We have
two strategies to compute the distance product, the algorithm of Proposition 5 and the algorithm
of Theorem 7. Since there are only O(log n) iterations, the total round complexity is
o
n
(15)
Õ min 1 + (n/s)2/3 n−1/3 , s + s2/ω(γ) n1−2/ω(γ) ,
for the value
of s the maximizes this expression, where γ denotes the solution of the equation
log(n/s)
log s
log s
γ
=
1 − log
1 − log
n
n +
log n − 1 ω(γ). As in the analysis for the centralized setting given
in [47], the left part of (15) is a decreasing function of s, while the right part is an increasing
function of s. Using the best known upper bound on ω(γ) from [24] (see also Figure 5), we can
upper bound the total round complexity by O(n0.2096 ).
Note that the above algorithm only computes the lengths of the shortest paths. As in Zwick’s
centralized algorithm, the shortest paths can be constructed by using exactly the same strategy,
but constructing a matrix of witnesses whenever a distance product is computed (as described in
Section 3 of [47]), which can be done with the same round complexity.
While a result similar to Theorem 5 can be obtained when M is not a constant, by using exactly
the same algorithm but keeping the value M in Equation (15), in this case it is complicated to
express the result of the numerical optimization in a closed form, so we omit this generalization. An
interesting open question is whether the algorithm of Theorem 5 can be derandomized. While Zwick
showed that this can be done in the centralized setting by introducing the concept of bridging sets, it
does not seem that the algorithm proposed in [47] for constructing bridging sets can be implemented
efficiently in the congested clique model.
22
n1
Value 1 + (n/s)2/3 n−1/3
Value s + s2/ω(γ) n1−2/ω(γ)
n1/3
n0.2095...
n0.1572
n0
n0
n0.1856...
n1/3
n1/2
Value of s
n1
Figure 5: Values of the two parts of Equation (15).
6.2
Diameter computation
Since computing the diameter of a graph trivially reduces to the APSP problem, we immediately
obtain the following result.
Corollary 1. In the congested clique model, the deterministic round complexity of diameter computation in an undirected graph of n vertices with integer weights in {0, . . . , M }, where M is an
integer such that M ≤ n, is Õ(M 2/ω n1−2/ω ).
The same reduction can be used to obtain a randomized algorithm for computing the diameter
of directed graphs with constant integer weights in O(n0.2096 ) rounds, via Theorem 5. This round
complexity can nevertheless be improved. In the centralized setting it is known that over directed
graphs with integer weights in {−M, . . . , M }, but without cycles of negative weights, the diameter
can be computed in O(M nω ) time, i.e., faster than the best known centralized algorithm for the
corresponding APSP problem. This is a folklore result based on the reductions to the distance
product developed in [41, 47] (see also [10]). A close inspection of this approach shows that it can
be implemented efficiently in the congested clique model, and Theorem 7 thus implies that the
diameter can be computed in Õ(M 2/ω n1−2/ω ) rounds in direct graphs (without cycles of negative
weights) with integer weights in {−M, . . . , M } as well.
6.3
Maximum matchings
Let G = (V, E) be a simple graph (i.e., an undirected and unweighted graph with no loops or
multiple edges), and write V = {v1 , . . . , vn }. The Tutte matrix of G is the n × n symbolic matrix
23
A such that
xij
A[i, j] =
−xij
0
if i > j and {vi , vj } ∈ E,
if i < j and {vi , vj } ∈ E,
otherwise,
for any (i, j) ∈ [n] × [n]. Let ν(G) denote the number of edges in a maximum matching of G.
Lovász [31] showed that rank(A) = 2ν(G). Rabin and Vazirani [38] observed that this equality
remains true over any field. As mentioned in [38], this gives a simple randomized algorithm for
computing rank(A), and thus ν(G), based on Schwartz-Zippel lemma [39, 46]: take a prime p =
Θ(n4 ), substitute the variables xij by random elements from the finite field Zp to obtain a matrix Â
over Zp , and compute the rank of  over Zp (which will be equal to rank(A) with high probability).
This approach can clearly be implemented efficiently in the congested clique mode using the rank
algorithm of Theorem 3, giving the following result.
Theorem 8. The randomized round complexity of computing the number of edges in a maximum
matching of a simple graph is O(n1−2/ω log n).
Suppose that the graph G has a perfect matching (i.e., n is even and ν(G) = n/2). We say that
an edge of G is allowed if it is contained in a least one perfect matching. Rabin and Vazirani [38]
further showed that with high probability the following property holds for all edges {i, j} of G: the
edge {i, j} is allowed if and only if Â−1 [i, j] 6= 0. The set of allowed edges can thus be obtained
from the inverse of the matrix Â, which can be done in O(n1−1/ω ) rounds in the congested clique
model using the algorithm of Theorem 2.
An interesting open question is whether finding a perfect matching can be done with the same
complexity in the congested clique model. While the best centralized algorithms can find a maximum matching with essentially the same complexity as matrix multiplication [33], they are based
on sequential variants of the Gaussian decomposition (e.g., computation of the LUP decomposition)
that do not appear to be implementable in parallel.
6.4
Computing the Gallai-Edmonds decomposition of a graph
Let G = (V, E) be a simple graph. We say that a vertex v ∈ V is critical if it appears in at least
one maximum matching, otherwise we say that v is non-critical. Let D(G) ⊆ V denote the set
of non-critical vertices, K(G) be the set of vertices in V \ D(G) that are adjacent to vertices in
D(G), and define C(G) = V \ (D(G) ∩ K(G)). Gallai [15] and Edmonds [14] showed that the triple
(D(G), K(G), C(G)), called the Gallai-Edmonds decomposition of the graph, gives fundamental
information about the structure of the graph, and in particular about its matchings (see, e.g., [32] for
a detailed presentation of this theorem). Cheriyan [7] presented efficient algorithms for computing
the Gallai-Edmonds decomposition. We adapt this algorithm to the congested clique model to
obtain the following result.
Theorem 9. The randomized round complexity of computing the Gallai-Edmonds decomposition
of a simple graph is O(n1−1/ω ).
Proof. We will show how all the nodes of the network can obtain the set of non-critical vertices
D(G) in Õ(n1−1/ω ) rounds. Note that K(G) and C(G) can then be computed (and distributed to
all the nodes) in a constant number of rounds using the scheme of Lemma 1.
The strategy used in [7] to compute the set of non-critical vertices D(G) in the centralized
setting is as follows. Take a prime p = Θ(n3 ) and substitute the variables xij in the Tutte matrix
24
of G by random elements from the finite field F = Zp . Let  denote the matrix obtained. For any
i ∈ [n], let ei ∈ F1×n be the row vector with coordinate 1 at position i and coordinate zero at all
other positions. Cheriyan [7] showed that with large probability the following property holds for
all i ∈ [n]: the vertex vi is non-critical if and only if
Â
rank
> rank(Â).
(16)
ei
Â
Here
denotes the (n + 1) × n matrix obtained by appending the row ei at the bottom of Â.
ei
The set D(G) can be computed by checking if Equation (16) holds for each i ∈ [n], but this is not
efficient enough. Observe that Equation (16) holds if and only if ei is not in the subspace S spanned
by the row vectors of Â. Let M ∈ Fn×(n−rank(Â)) be the matrix representation of a basis for the right
null space of  (i.e., each column of M is a basis vector of the vector space S ⊥ = {y ∈ Fn | Ây = 0}).
Observe that for any row vector u we have uM = 0 if and only if u ∈ (S ⊥ )⊥ = S. Equation (16)
then holds if and only if ei M 6= 0. In order to compute ei M for all i ∈ [n], we simply need to
compute the product of the n × n identity matrix In by the matrix Â, and check which rows of the
product contain at least one non-zero entry.
In the congested clique model this strategy can be implemented in O(n1−2/ω ) rounds assuming
that the matrix M is available (and distributed among the nodes). We now explain how to construct
this matrix using the ideas from [21, 23]. Let r denote the rank of A. Let U, V be two triangular
random Toeplitz matrices as in Lemma 4, and write N = U ÂV . Decompose N as follows:
N11 N12
,
N=
N21 N22
where N11 ∈ Fr×r , N12 ∈ Fr×(n−r) , N21 ∈ F(n−r)×r and N22 ∈ F(n−r)×(n−r) . Theorem 2 from [23]
and the analysis of Section 5 in [21] shows that, with probability at least 1 − r(r + 1)/|F| on the
choice of U and V , the submatrix N11 is non-singular and the columns of the n × (n − r) matrix
r×(n−r)
−1
Ir
−N11
N12
0
M =V
.
In−r
0(n−r)×r
In−r
form a basis of the right null space of Â. The matrix M can thus be computed with high probability
in O(n1−1/ω ) rounds by using the algorithm of Theorem 2 for computing the inverse and the
algorithm for matrix multiplication of Section 3.
As already mentioned, the Gallai-Edmonds decomposition has many applications. In particular, as pointed out by Cheriyan [7], an algorithm computing the Gallai-Edmonds decomposition
immediately yields an algorithm computing a minimum vertex cover in a bipartite graph. Cheriyan
also presented other graph-theoretic problems that can be solved using variants of his approach for
computing the Gallai-Edmonds decomposition: finding the canonical partition of an elementary
graph, computing the maximum number of vertex disjoint paths between two subsets of vertices of
a graph, and computing a minimal separator between two subsets of vertices of a graph. A close
inspection of these variants (Sections 3.3 and 4 in [7]) shows that they can also be implemented
efficiently in the congested clique model, giving again algorithms with round complexity O(n1−1/ω ).
25
Acknowkedgments
The author is grateful to Arne Storjohann for precious help concerning the computation of the
determinant and to anonymous reviewers for their comments. This work is supported by the
Grant-in-Aid for Young Scientists (A) No. 16H05853, the Grant-in-Aid for Scientific Research (A)
No. 16H01705, and the Grant-in-Aid for Scientific Research on Innovative Areas No. 24106009 of
the Japan Society for the Promotion of Science and the Ministry of Education, Culture, Sports,
Science and Technology in Japan.
References
[1] Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman. The design and analysis of computer
algorithms. Addison-Wesley Publishing Company, 1974.
[2] Noga Alon, Zvi Galil, and Oded Margalit. On the exponent of the all pairs shortest path
problem. Journal of Computer and System Sciences, 54(2):255–262, 1997.
[3] James R. Bunch and John E. Hopcroft. Factorization and inversion by fast matrix multiplication. Mathematics of Computation, 28(125):231–236, 1974.
[4] Peter Bürgisser, Michael Clausen, and Mohammad Amin Shokrollahi. Algebraic complexity
theory. Springer, 1997.
[5] Keren Censor-Hillel, Petteri Kaski, Janne H. Korhonen, Christoph Lenzen, Ami Paz, and Jukka
Suomela. Algebraic methods in the congested clique. In Proceedings of the 34th Symposium
on Principles of Distributed Computing, pages 143–152, 2015.
[6] Li Chen, Wayne Eberly, Erich Kaltofen, B. David Saunders, William J. Turner, and Gilles
Villard. Efficient matrix preconditioners for black box linear algebra. Linear Algebra and its
Applications, 343-344:119–146, 2002.
[7] Joseph Cheriyan. Randomized Õ(M (|V |)) algorithms for problems in matching theory. SIAM
Journal on Computing, 26(6):1635–1669, 1997.
[8] Jeff I. Chu and Georg Schnitger. Communication complexity of matrix computation over finite
fields. Mathematical Systems Theory, 28(3):215–228, 1995.
[9] Laszlo Csanky. Fast parallel matrix inversion algorithms. In Proceedings of the 16th Annual
Symposium on Foundations of Computer Science, pages 11–12, 1975.
[10] Marek Cygan, Harold N. Gabow, and Piotr Sankowski. Algorithmic applications of BaurStrassen’s theorem: Shortest cycles, diameter and matchings. In 53rd Annual IEEE Symposium
on Foundations of Computer Science, pages 531–540, 2012.
[11] Anindya De, Piyush P. Kurur, Chandan Saha, and Ramprasad Saptharishi. Fast integer
multiplication using modular arithmetic. SIAM Journal on Computing, 42(2):685–699, 2013.
[12] Danny Dolev, Christoph Lenzen, and Shir Peled. “Tri, Tri Again”: Finding triangles and
small subgraphs in a distributed setting - (extended abstract). In Proceedings of the 26th
International Symposium on Distributed Computing, pages 195–209, 2012.
26
[13] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique
model. In Proceedings of the ACM Symposium on Principles of Distributed Computing, pages
367–376, 2014.
[14] Jack Edmonds. Paths, tree and flowers. Canadian Journal of Mathematics, 17:449–467, 1965.
[15] Tibor Gallai. Maximale Systeme unabhängiger Kanten. Publications of the Mathematical
Institute of the Hungarian Academy of Sciences, 9:401–413, 1964.
[16] Joachim von zur Gathen and Jürgen Gerhard. Modern computer algebra. Cambridge University
Press, 2003.
[17] James W. Hegeman, Gopal Pandurangan, Sriram V. Pemmaraju, Vivek B. Sardeshmukh, and
Michele Scquizzato. Toward optimal bounds in the congested clique: Graph connectivity and
MST. In Proceedings of the ACM Symposium on Principles of Distributed Computing, pages
91–100, 2015.
[18] James W. Hegeman and Sriram V. Pemmaraju. Lessons from the congested clique applied
to MapReduce. In Proceedings of the 21st International Colloqium on Structural Information
and Communication Complexity, pages 149–164, 2014.
[19] James W. Hegeman, Sriram V. Pemmaraju, and Vivek Sardeshmukh. Near-constant-time distributed algorithms on a congested clique. In Proceedings of the 28th International Symposium
on Distributed Computing, pages 514–530, 2014.
[20] Monika Henzinger, Sebastian Krinninger, and Danupon Nanongkai. A deterministic almosttight distributed algorithm for approximating single-source shortest paths. In Proceedings of
the 48th Annual ACM Symposium on Theory of Computing, pages 489–498, 2016.
[21] Erich Kaltofen and Victor Y. Pan. Processor efficient parallel solution of linear systems over
an abstract field. In Proceedings of the 3rd Annual ACM Symposium on Parallel Algorithms
and Architectures, pages 180–191, 1991.
[22] Erich Kaltofen and Victor Y. Pan. Processor-efficient parallel solution of linear systems II:
the positive characteristic and singular cases (extended abstract). In Proceedings of the 33rd
Annual Symposium on Foundations of Computer Science, pages 714–723, 1992.
[23] Erich Kaltofen and B. David Saunders. On Wiedemann’s method of solving sparse linear
systems. In Proceedings of the 9th International Symposium on Applied Algebra, Algebraic
Algorithms and Error-Correcting Codes, pages 29–38, 1991.
[24] François Le Gall. Faster algorithms for rectangular matrix multiplication. In Proceedings of
the 53rd Annual IEEE Symposium on Foundations of Computer Science, pages 514–523, 2012.
[25] François Le Gall. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th
International Symposium on Symbolic and Algebraic Computation, pages 296–303, 2014.
[26] Christoph Lenzen. Optimal deterministic routing and sorting on the congested clique. In
Proceedings of the ACM Symposium on Principles of Distributed Computing, pages 42–50,
2013.
27
[27] Christoph Lenzen and Roger Wattenhofer. Tight bounds for parallel randomized load balancing: extended abstract. In Proceedings of the 43rd ACM Symposium on Theory of Computing,
pages 11–20, 2011.
[28] Yuri Vladimirovich Linnik. On the least prime in an arithmetic progression I. The basic
theorem. Rec. Math. [Mat. Sbornik] N.S., 15(57):139 – 178, 1944.
[29] Yuri Vladimirovich Linnik. On the least prime in an arithmetic progression II. The DeuringHeilbronn phenomenon. Rec. Math. [Mat. Sbornik] N.S., 15(57):347 – 368, 1944.
[30] Zvi Lotker, Elan Pavlov, Boaz Patt-Shamir, and David Peleg. MST construction in o(log log n)
communication rounds. In Proceedings of the Fifteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, pages 94–100, 2003.
[31] László Lovász. On determinants, matchings, and random algorithms. In Fundamentals of
Computation Theory, pages 565–574, 1979.
[32] László Lovász and Michael D. Plummer. Matching Theory. American Mathematical Society,
2009.
[33] Marcin Mucha and Piotr Sankowski. Maximum matchings via Gaussian elimination. In Proceedings of the 45th Symposium on Foundations of Computer Science, pages 248–255, 2004.
[34] Danupon Nanongkai. Distributed approximation algorithms for weighted shortest paths. In
Proceedings of the 46th Symposium on Theory of Computing, pages 565–573, 2014.
[35] Boaz Patt-Shamir and Marat Teplitsky. The round complexity of distributed sorting: extended
abstract. In Proceedings of the 30th Annual ACM Symposium on Principles of Distributed
Computing, pages 249–256, 2011.
[36] David Peleg. Distributed computing: a locality-sensitive approach. Society for Industrial and
Applied Mathematics, 2000.
[37] Franco P. Preparata and Dilip V. Sarwate. An improved parallel processor bound in fast
matrix inversion. Information Processing Letters, 7(3):148–150, 1978.
[38] Michael O. Rabin and Vijay V. Vazirani. Maximum matchings in general graphs through
randomization. Journal of Algorithms, 10(4):557–567, 1989.
[39] Jacob T. Schwartz. Fast probabilistic algorithms for verification of polynomial identities.
Journal of the ACM, 27(4):701–717, 1980.
[40] Raimund Seidel. On the all-pairs-shortest-path problem in unweighted undirected graphs.
Journal of Computer and System Sciences, 51(3):400–403, 1995.
[41] Avi Shoshan and Uri Zwick. All pairs shortest paths in undirected graphs with integer weights.
In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, pages
605–615, 1999.
[42] Tadao Takaoka. Subcubic cost algorithms for the all pairs shortest path problem. Algorithmica,
20(3):309–318, 1998.
28
[43] Virginia Vassilevska Williams. Multiplying matrices faster than Coppersmith-Winograd. In
Proceedings of the 44th Symposium on Theory of Computing, pages 887–898, 2012.
[44] Douglas H. Wiedemann. Solving sparse linear equations over finite fields. IEEE Transactions
on Information Theory, 32(1):54–62, 1986.
[45] Ryan Williams. Faster all-pairs shortest paths via circuit complexity. In Proceedings of the
46th Symposium on Theory of Computing, pages 664–673, 2014.
[46] Richard Zippel. Probabilistic algorithms for sparse polynomials. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, pages 216–226, 1979.
[47] Uri Zwick. All pairs shortest paths using bridging sets and rectangular matrix multiplication.
Journal of the ACM, 49(3):289–317, 2002.
29
| 8cs.DS
|
arXiv:1711.10328v1 [cs.RO] 28 Nov 2017
Meteorology-Aware Multi-Goal Path Planning for
Large-Scale Inspection Missions with Long-Endurance
Solar-Powered Aircraft
Philipp Oettershagen, Julian Förster, Lukas Wirth, Jacques Ambühl and
Roland Siegwart
Autonomous Systems Lab
Swiss Federal Institute of Technology Zurich (ETH Zurich)
Leonhardstrasse 21
8092 Zurich
+41 44 632 7395
[email protected]
Abstract
Solar-powered aircraft promise significantly increased flight endurance over conventional aircraft. While this makes them promising candidates for large-scale aerial inspection missions,
their structural fragility necessitates that adverse weather is avoided using appropriate path
planning methods. This paper therefore presents MetPASS, the Meteorology-aware Path
Planning and Analysis Software for Solar-powered UAVs. MetPASS is the first path planning framework in the literature that considers all aspects that influence the safety or
performance of solar-powered flight: It avoids environmental risks (thunderstorms, rain,
wind, wind gusts and humidity) and exploits advantageous regions (high sun radiation or
tailwind). It also avoids system risks such as low battery state of charge and returns safe
paths through cluttered terrain. MetPASS imports weather data from global meteorological
models, propagates the aircraft state through an energetic system model, and then combines both into a cost function. A combination of dynamic programming techniques and an
A*-search-algorithm with a custom heuristic is leveraged to plan globally optimal paths in
station-keeping, point-to-point or multi-goal aerial inspection missions with coverage guarantees. A full software implementation including a GUI is provided. The planning methods
are verified using three missions of ETH Zurich’s AtlantikSolar UAV: An 81-hour continuous solar-powered station-keeping flight, a 4000 km Atlantic crossing from Newfoundland to
Portugal, and two multi-glacier aerial inspection missions above the Arctic Ocean performed
near Greenland in summer 2017. It is shown that integrating meteorological data has significant advantages and is indispensable for the reliable execution of large-scale solar-powered
aircraft missions. For example, the correct selection of launch date and flight path across
the Atlantic Ocean decreases the required flight time from 106 hours to only 52 hours.
1
Introduction
Motivation
Solar-powered Unmanned Aerial Vehicles (UAVs) promise significantly increased flight endurance over conventional aircraft. This greatly benefits applications such as large-scale disaster relief, border patrol or aerial
inspection in remote areas [12]. Research and development of solar UAVs is ongoing in both academia [39, 26]
and industry [1, 8]. Since 2005, multiple solar aircraft have been able to demonstrate multi-day continuous
flight [11, 27, 7], with the current world record being a 14-day continuous flight [33]. In our own work [30],
we have previously shown an 81-hour continuous solar-powered flight with the AtlantikSolar UAV (Figure 1)
which set the current world record in flight endurance for aircraft below 50 kg total mass.
However, all solar-powered aircraft necessarily require suitable weather conditions for such long-endurance
operations. Thunderstorms, rain and wind gusts can quickly become elementary threats to the aircraft’s
integrity. Moreover, clouds and strong winds can significantly reduce the solar power income or increase the
required propulsion power such that a landing is required. Solar aircraft, or more generally speaking all aerial
vehicles that are sensitive to weather e.g. because they are flying slowly or are structurally fragile, therefore
require careful pre-operational planning. Safe and efficient flight requires the consideration of terrain, the
internal system state (e.g. battery state of charge), and major weather phenomena (thunderstorms, rain,
winds and wind gusts, radiation and clouds). A model-based path planning framework (Figure 1) allows to
integrate these effects in a structured manner and is thereby able to generate globally optimal paths for the
aerial vehicle.
Figure 1: Large-scale aerial sensing missions with fragile solar-powered aircraft such as AtlantikSolar (top
left) require careful route planning. MetPASS, the Meteorological Path Planning and Analysis Software
for Solar-powered UAVs presented herein, allows to plan optimal point-to-point routes as well as multi-goal
routes that allow inspecting multiple areas of interest — for example a set of Arctic glaciers — in one
flight. Routes optimized with MetPASS are safe and efficient given the consideration of terrain data and
meteorological risk factors such as wind, rain, thunderstorms and clouds.
State of the art
Literature on path planning for solar-powered aircraft is sparse. The necessary elements (e.g. winddependence, sun-dependence) are only considered separately in relatively unrelated fields of research. On
one hand, when focussing only on wind-aware planning a comprehensive body of research is available. For
example, Rubio [34] proposes evolutionary approaches and considers forecasted 3D wind fields in a large-scale
Pacific crossing mission. A planner for oceanic search missions, which employs meteorological data such as
temperature and humidity to predict icing conditions, is presented in subsequent work [35]. Chakrabarty
[10] presents a sampling-based planning method for paths through complex time-varying 3D wind fields. All
these contributions focus on either fuel-powered or non-solar gliding aircraft. On the other hand, research
which does incorporate solar models unfortunately often neglects wind and thus solves a very simplified
problem. Rather theoretical approaches are proposed: For example, Klesh [22, 23] uses optimal control techniques to generate paths maximizing the UAV’s final energy state in small-scale point-to-point and loitering
problems. The sun position is however assumed constant. Spangelo [37] investigates optimal climb and
descent maneuvers during loitering. Hosseini [20] adds sun-position time dependence, but assumes perfect
clear-sky conditions instead of considering meteorological data. Dai [14] avoids the clear-sky assumption by
deriving an expected solar radiation income based on local precipitation and humidity forecasts. The path
planning problem is then solved by a Bellman-Ford algorithm. Overall, there is no literature that covers all
the system-related or meteorological aspects that can, as described before, affect solar-powered aircraft. In
addition, there is a clear lack of flight test based verification of the developed planning approaches.
Contributions
This paper presents the Meteorology-aware Path Planning and Analysis Software for Solar-powered UAVs
(MetPASS), the first path planning framework in the literature that considers all safety and performance
relevant aspects (terrain, system state, meteorological environment) of solar-powered flight. It is able to
optimize large-scale station-keeping, point-to-point and multi-goal missions (Figure 1) and focuses on realworld applications. More specifically, this paper and the corresponding framework present and implement
the following contributions:
• an optimization approach that yields cost-optimal aircraft paths by combining an extended A*algorithm for multi-goal order optimization, a dynamic programming based point-to-point planner and local scan path planner that guarantees area coverage based on a simple camera model.
• a cost function for solar-powered aircraft. Both safety and performance are considered: The cost
function assesses terrain collision risk, the system state (time since launch, battery state of charge,
power consumption and generation) through a comprehensive energetic model, and up-to-date
meteorological data (thunderstorms, precipitation, humidity, 2D winds, gusts, sun radiation and
clouds) through global weather models.
• a full software implementation that features ease-of-use through a GUI and is optimized for
computational speed via a custom-designed heuristic and the use of parallelization and caching.
As a result, the framework can be used for detailed mission feasibility analysis, pre-flight planning,
and in-flight re-planning once updated weather data is available.
• an extensive flight-test based verification of the planning results for the 81-hour flight endurance
world record of AtlantikSolar [30], a crossing of the Atlantic Ocean from Newfoundland to Portugal, and two multi-goal glacier inspection missions above the Arctic Ocean near Greenland.
The point-to-point path planning approach was already presented in our previous work [41]. The novel
aspects extended in this paper are the terrain avoidance, the local scan path planning that guarantees
coverage using a camera model, the multi-goal path optimization approach and the flight test results.
The remainder of this paper is organized as follows: Section 2 presents the fundamentals of the optimization
approach, i.e. the cost function, heuristic, the dynamic programming based point-to-point path planning
and the A*-based multi-goal optimization. Section 3 describes the software implementation and verification.
Section 4 presents the planning results, compares them to the aforementioned flight data, and provides a
computation time analysis. Section 5 provides concluding remarks.
2
Design
MetPASS plans safe and efficient large-scale aerial inspection missions for fixed-wing aircraft and solarpowered UAVs in particular. Such missions can either be multi-goal missions which inspect multiple areas
of interest (Figure 1) or point-to-point missions. The MetPASS architecture is shown in Figure 2. The input
data is loaded first. Then, in the multi-goal mission case, the multi-goal path planner performs the scan
path optimization to determine the exact scan path within each area of interest. Using these scan paths, the
inter-goal path optimization then determines the order in which the areas of interest shall be visited. This
process internally calls the point-to-point planner to optimize the individual routes between areas of interest.
Input data
Multi-Goal Path Planner
Problem setup (Start,
goal, position and extent
of scan areas)
Scan path
optimization
Inter-goal path (order) optimization
Aircraft parameters
Heuristic
Decision tree
Optimization loop (modified A*)
Optimal multi-goal path
with optimal pointto-point paths
Terrain-DEM
Meteorological forecast data
Solar radiation, precipitation,
thunderstorms, etc.
Point-to-Point Path Planner
Optimization algorithm
(Dynamic Programming)
UAV system model
Cost Function
Flight kinematics
Flight Planner
Optimal point-topoint path
Power balance
Figure 2: MetPASS architecture. Using input data such as meteorological weather forecasts, MetPASS can
calculate optimal point-to-point as well as multi-goal paths that allow the inspection of multiple areas of
interest.
2.1
Environment-aware Point-to-Point Path Planning
The optimization problem solved by the MetPASS point-to-point path planner (Figure 2) can be stated as
follows: Given fixed departure and arrival coordinates, find a path which minimizes the total cost as defined
by a cost function. The departure time can be either a fixed or free parameter. The cost function includes
a term for the proximity to terrain, environmental conditions such as solar radiation or precipitation, and
aircraft states like power consumption or State of Charge (SoC). Environmental conditions are estimated
based on time-varying meteorological forecast data in a three-dimensional grid. The system model includes
flight kinematics with respect to horizontal wind, power generation through the solar modules and the power
consumption of the aircraft.
2.1.1
Optimization Algorithm
The optimization is based on the well-known dynamic programming [3, 5] technique and extends the implementation by Ambühl [2] with the altitude as an additional optimization variable. The working principle
can be shown on a basic example, where the goal is to find the shortest distance between Bell Island, Canada
and Lisbon, Portugal (Figure 3). In a first step, a three-dimensional grid, connecting the departure and
arrival points, is generated. The grid is horizontally divided into i slices of j vertices, and vertically into k
levels. Starting from the departure node, the cost (in this example the travel distance) to each subsequent
node is calculated and stored. Then, starting from the nodes in the third slice of the grid, the DP algorithm
h
i
di,j,k = min
di−1,n + ∆i,j,k
(1)
i−1,n
n∈slicei−1
is applied to find the shortest total distance di,j,k from the departure point to each node of the grid. This
is done by minimizing the sum of the a priori known distances di−1,n and the additional travel distance
∆i,j,k
i−1,n . A decision tree consisting of globally optimal sub routes is thus built up which finally reaches the
arrival point. The optimal path can then be extracted by going back up the tree from the arrival point. In
contrast to this simplified example with a Euclidean distance cost, the real aircraft cost function depends
on high-resolution time-varying forecast data and a comprehensive system model. Each path segment thus
needs to be simulated using numerical integration, which is a main expansion compared to Ambühl [2].
55
°N
i
50
50
45
45
j
40
40
𝑑𝑖,𝑗,𝑘 =
35
35
30
-60
60
n∈slicei−1
-50
50
min
i,j,k
di−1,n + ∆i−1,n
-40
40
-30
30
-20
20
-10 °E
10
Figure 3: Exemplary route optimization from start (Canada) to goal (Portugal) on a rectangular grid. The
dynamic programming algorithm of Eq. (1) is applied to the grid points i,j in horizontal and k in vertical
direction (not shown). The thick red line is the optimal path.
2.1.2
Cost Function
For solar-powered aircraft in particular, a globally optimal point-to-point path is not necessarily the shortest
path, but the path with the highest probability of mission success and thus the lowest risk exposure. The
cost function mathematically considers risk through cost terms which can be grouped as follows:
• Flight time: A low flight time decreases the risk of spontaneous component failure. This mainly
becomes of importance if all other costs are small.
• Environmental costs: The environmental (or meteorological) costs indicate an environmental
threat to the airplane. This includes strong wind, wind gusts, humidity, precipitation and thunderstorms.
• System costs: Includes SoC, power consumption and the radiation factor, which is the ratio
between current solar radiation and clear-sky solar radiation and thus indicates clouds. Flight
states with low SoC, high power consumption or low radiation factor are avoided by flying at the
power-optimal airspeed and evading clouded areas.
• Distance to terrain: Based on a Digital Elevation Model (DEM), this term helps to avoid terrain
collisions while flying in cluttered terrain. The cost term has been extended with respect to our
previous work [41].
The instantaneous flight time cost is simply the so called flight time cost factor, i.e. Ċtime = ctime . All other
costs Ċk need to be normalized to allow for a consistent summation and weighting via
−αk
k ) − 1
exp ( βxkk −α
k
Ċk = H(x) ·
exp (k ) − 1
.
(2)
As illustrated in Figure 4, this normalizes every cost and allows to adjust its influence on the total cost.
The parameters αk and βk define the lower threshold and the upper limit, where the generated cost is
bounded. Due to the Heaviside function H(x) values xk below the threshold generate no cost as they are
not in a critical range. Values above the limit are considered too dangerous for the aircraft and thus cause
Precipitationcost
a cancellation of the corresponding path. The exponent
k determines the curvature of the cost function.
Threshold
1.0
1.0
1 Limit
10
Normalized
cost 𝐶𝑘ሶ [-]
Limit: βk=10
0.80.8
Exponent ϵk
0.60.6
0.5
1
0.4
0.4
0.2
0.2
0.0
0.0
0
0
2
Threshold:
αk=1
3
4
5
Precipitation
[mm/6h]
2
4
2
6
4
6
8
8
10
precipitation
10
Figure 4: Visualization of a cost function and the parameters available to adjust its sensitivity. The precipitation cost is shown as an example.
The accumulated cost for a path segment is finally calculated by summing up all 10 costs to a total cost and
integrating it over the flight time, as defined by
Z
C=
10
t2 X
t1
2.1.3
Ċk dt .
(3)
k=1
Meteorological Forecast Data
Accurate meteorological data is essential to plan safe and efficient paths for weather-sensitive solar-powered
aircraft. The meteorological data used in MetPASS consists of the parameters in Table 1. Both historical data
for mission feasibility analysis and forecast data to pre-plan or re-plan actual missions on site is supported.
The data is either obtained from the European Centre for Medium-Range Weather Forecasts (ECMWF)
global deterministic IFS-HRES model (horizontal resolution of 0.125 ◦ ) or the European COSMO model
(resolution up to 2 km). Data time steps range between 1–6 hours and altitude levels between 0 m and
1600 m above sea-level. The characteristics of all weather data sets are given in Table 2. The data can be
linearly interpolated in time as well as in all three spatial dimensions. More details on weather data import
and integration are given by Wirth [40].
2.1.4
System Model
The system model (Figure 5) simulates the flight along a chosen route and thereby calculates the states
required for the cost function. Both the model and the employed weather data are fully deterministic. Given
the large mission time scales of hours or even days, aircraft flight dynamics are neglected. The decisive
components that are modeled dynamically are the power balance (including time and temperature dependent
Table 1: Forecast parameters received from ECMWF and COSMO models.
Parameter
Unit
Temperature
Relative humidity
Horizontal wind
Wind gusts
◦
C
%
m/s
m/s
Total precipitation
mm
Convective
available potential
energy
Total solar
radiation (direct +
diffuse)
Direct solar
radiation
J/kg
Description
Lateral and longitudinal winds
Max. wind gust over last time
step
Accumulated over last time
step
Causes updrafts and
thunderstorms
Type
3D
3D
3D
2D
2D
2D
J/m2
Accumulated over last time
step
2D
J/m2
Accumulated over last time
step
2D
solar power generation, system power consumption and SoC) and the flight kinematics with respect to wind
speed and airspeed.
The flight kinematics are handled by the Aircraft Kinematic Model, which updates the aircraft position
after calculating the wind angle and ground speed. It requires the airspeed, which is determined by the
Flight Planner module — a representation of the UAV’s decision logic — as a function of the system state.
The airspeed may be increased, first, in presence of strong headwind to maintain a certain ground speed
or, second, if there is excess solar power available, the battery is already fully charged and the aircraft is
not allowed to gain additional altitude. The flight planner can also increase the altitude once SoC = 100 %
either in order to store solar energy into potential energy or to use the wind situation at higher altitude.
The power balance is estimated by the Aircraft System Model. For the power generation, direct and
diffuse solar radiation are considered separately. The incidence angle ϕk of the direct radiation is calculated
for every solar module k using the solar radiation models presented in [13, 15, 40] under consideration of
the aircraft geometry. The radiation onto the surface is then calculated using the cosine of the incidence
angle. For the diffuse part of the radiation, the surface is assumed to be horizontal and thus the incidence
angle is neglected. With the solar module areas Ak and the efficiencies of the solar modules ηsm (which are
temperature dependent) and the Maximum Power Point Trackers ηMPPT , the total incoming power is
Psolar,k = Idiff + Idirect · cos(ϕk ) · Ak · ηsm · ηMPPT
P
Psolar = k Psolar,k
(4)
(5)
The overall level-flight power consumption of the UAV depends on airspeed vair and altitude and thus air
density ρ. It is generally given by
Plevel (ρ, vair ) =
Pprop (ρ, vair )
+ Pav + Ppld ,
ηprop (ρ, vair )
(6)
where Pprop/ηprop determines the required electrical propulsion power, and Pav and Ppld are avionics and
payload power respectively. In our case, the dependence of Plevel on the airspeed vair is modeled through
2
Plevel (ρ0 , vair ) = C2 · vair
+ C1 · vair + C0
(7)
which is identified directly from AtlantikSolar power measurement test flights performed at constant altitude
Figure 5: The MetPASS system model and the interactions with the Flight Planner that determines the
current optimal airspeed and altitude.
and thus air density ρ0 . The scaling to different altitudes or air densities is done according to [32] using
r
Plevel (ρ, vair ) =
r
ρ0
ρ
2 ρ
· C2 vair + C1 vair
+ C0 .
ρ
ρ0
ρ0
(8)
With regard to the climb rate ḣ, the total flight power Pflight is given by
Pflight (ρ, vair ) = Plevel (ρ, vair ) +
mtot g ḣ
,
ηclimb
(9)
with the airplane mass mtot and the climbing efficiency ηclimb . The SoC is updated based on the power
balance given by
˙ = Psolar − Pflight ηcharge ,
SoC
(10)
Ebat
with the total energy of the battery Ebat and the battery efficiency ηcharge . Note that 0 < SoC < 1 and a
charge rate limit for large SoC’s is enforced. More details are presented by Wirth [40].
2.2
Environment-aware Multi-Goal Path Planning
The multi-goal path planning problem can be stated as follows: Given fixed start and goal coordinates S
and G as well as a set of convex polygonal areas of interest (also called nodes N hereafter), find the order
to visit the nodes and thereof derive the optimal path that minimizes the cost function in Eq. (3) globally
over the whole mission. The two sub-functionalities mentioned in Figure 2, i.e. the scan path optimization
which calculates the scan path inside each area of interest and the inter goal path planner which determines
the order of and trajectories in between the areas of interest, are visualized in more detail in Figure 6 and
described in the following.
Multi-Goal Path Planner
Scan path
optimization
Inter-goal path (order) optimization
Preparation
Convert Traveling Salesman
Problem to decision tree
Heuristic
Decision tree
Optimization loop (adapted A* algorithm)
Update decision tree
Determine next parent node
Check path metrics
MetPASS point-topoint path planner
Optimal scan
paths & metrics
Optimal node order & optimal global path
Figure 6: Enlarged view of the MetPASS multi-goal path planning submodule. The complete MetPASS
architecture is shown in Figure 2.
2.2.1
Scan Path Optimization
The scan path optimization is carried out independently for each area of interest. The problem can be
stated as: Given a) the extent of the convex polygonal area of interest, b) fixed scan parameters such as
flight altitude, airspeed, camera field of view and desired image overlap, and c) weather data, find a scan
path that guarantees complete coverage of the area of interest at minimum cost. For simplicity lawn-mower
scan patterns (Figure 7), which are widely used in robotics, are employed.
Flight direction
(course angle)
sun
wind
Area of interest
Figure 7: Schematic lawn-mower scan path covering an area of interest. The black arrow is the flight direction
(course), the black rectangles are selected camera images and the red dots are turn points. Environmental
factors such as wind and sun are considered during the optimization.
The main parameter that needs to be optimized is the course angle. For constant wind, both simple geometric
calculations and the simulations in [16] show that for lawn-mower patterns with equal outward/backwarddistances a course perpendicular to the wind direction results in minimum flight time. However, first, in our
case the wind is not constant in space, and second, the polygon can be of arbitrary but convex shape such
that the outward/backward-distances can differ significantly. Third, we are interested in a minimum total
cost instead of a minimum flight time path: For example, the sun position and the resulting solar power
income over all course angles need to be considered.
The course angle therefore can not be calculated analytically, but it has to be optimized via simulating scan
paths over a range of course angles. Both the straight lines and the 180◦ -turns of the lawn-mower pattern
are simulated using the system model of Section 2.1.4. The optimal polygon corner to start from is found in
the same process. The combination of course angle and polygon start corner with minimum cost is selected
as the solution. The details of the optimization process are presented in [16]. The final results are the
optimized scan path (Figure 7) and the scan metrics path length, flight time, cost, and change in state of
charge ∆SoC. These metrics are required inputs for the inter-goal path planner.
2.2.2
Inter-Goal Path Optimization
The inter-goal path optimization finds the optimal order to visit all areas of interest and thereof derives the
overall path between them and the base. When aiming only for minimum flight distance, then the trivial
circular path shown in Figure 1 is likely a good solution to this well known Traveling Salesman Problem
(TSP, [19]). Instead of minimum distance our goal is minimum path cost. In addition, weather changes make
this problem time-dependent. The problem is also asymmetric because, for example because of wind, flying
from node A to node B can cause a different cost than flying from B to A. We are therefore trying to solve
a Time Dependent Asymmetric Traveling Salesman Problem (TDATSP). Both the TSP and TDATSP are
NP-hard problems and thus computationally expensive to solve. For example, the brute-force approach to
solving the standard TSP is of order O(N !), where N is the number of nodes excluding the start/goal node.
For our applications we mostly have N < 10, however, each calculation of a point-to-point path requires
MetPASS to solve a dynamic programming problem that takes between 3 seconds and 10 minutes for typical
grid resolutions and distances (Table 4). The algorithms used to solve the TDATSP should therefore aim to
decrease the required edge cost calculations.
Solving the time-dependent asymmetric traveling salesman problem
A number of algorithms to solve the time dependent asymmetric traveling salesman problem exist. Dynamic
programming approaches were introduced early-on by Bellman [4] for the TSP. More recently, Malandraki
introduced an optimal DP approach [24] and a faster restricted [25] DP method for solving the TDATSP.
However, these were not selected because the former requires the computation of all edge costs, while
the latter does not guarantee optimality. Similarly, the Simulated Annealing approaches introduced by
Schneider [36] do not provide optimality guarantees. The genetic algorithms introduced for solving the
TDATSP by Testa et al. [38] tend to provide lower computational performance than the DP methods. They
are asymptotically optimal, i.e. cannot guarantee to find the optimal solution in finite time.
Finally, efficient label correcting methods can be applied if the TDATSP is converted into a Time Dependent Shortest Path Problem (TDSPP) as described by Bertsekas [6]. This approach was chosen for
this paper. The resulting tree is visualized in Figure 8. While the original TSP graph contains the
N = 3 nodes N = {1, 2, 3} excluding the start/goal nodes, the SPP graph contains the V = 21 vertices V = {S1, S2, S3, S12, . . . , S312G, S321G} excluding the start vertex S but including those vertices1
that finish with the goal node G. The root of the SPP graph represents our start node S, and every branch
is a valid (though not necessarily feasible or even optimal) solution path that covers all areas of interest and
ends at the start node (called goal G for clarity) again. The cost for traversing an edge in the new graph,
i.e. for going from vertex v to a child vertex w, is equal to the cost of going from the node n represented by
the last digit in the parent label to the node m represented by the last digit in the child label. These costs
are time dependent. Finally, of the many well-known methods that can be applied to the TDSPP graph, a
modified version of the A*-algorithm introduced by Hart et al. [18] was selected. When used with a properly
designed heuristic, A* can guide the search and can thereby significantly reduce the amount of required edge
cost calculations while still providing globally optimal paths.
1 Note
that in the following discussions of the graphs, the indices n, m ∈ N always refer to nodes while the indices v, w ∈ V
always refer to vertices.
S
S1
3
S/G
S2
1
1
S 12
S 13
S 21
S 23
S 123
S 132
S 213
S 231
2
...G
Traveling Salesman Problem
0
S3
6
S 31
5
3
S 312
2
2
4
2
S 32
7
32
S 321
4
Shortest Path Problem
Figure 8: Traveling salesman problem and the equivalent shortest path problem that label correcting methods
can be applied to. With the notation of this paper, i.e. excluding the start/goal in the node count and only
the start vertex in the vertex count, the TSP has N = 3 nodes and the SPP graph has V = 21 vertices. The
SPP graph contains exemplary point-to-point heuristics (red) and cost-to-go heuristics (black).
Heuristic calculation
For every vertex v ∈ V in the SPP graph of Figure 8, the heuristic hv describes an estimate of the cost to fly
to the goal G via all yet unvisited nodes. The heuristic has to be a lower bound on the path cost to avoid
discarding optimal paths and to thus retain the optimality guarantees of the A*-algorithm [18]. However,
the closer it is to the actual optimal path cost the larger the reduction in edge cost evaluations will be. The
calculation of the heuristic is performed in two steps:
• First, a lower-bound cost estimate hnm for a path from TSP node n to node m is computed2 .
As for the standard edge cost calculation this estimate is calculated using Eq. (3), however, for
the heuristic we assume that a) the path is the straight line (or orthodrome) between nodes n
and m, b) we start with full batteries and c) have optimal weather conditions (e.g. tail wind,
low cloud cover and precipitation, etc.) during the whole flight. The optimal weather conditions
are searched over all grid points of the standard DP point-to-point mesh (Figure 3) and all times
within a user-specified time horizon.
• Second, the cost-to-go heuristic hv is calculated for each vertex v ∈ V by summing up the pointto-point cost estimates hnm from the SPP graph’s lowest level vertices (which represent complete
round-trips and are assigned a heuristic value of zero) inside each tree to vertex v.
Optimization loop with an extended A* algorithm
The A*-algorithm shown in algorithm 2.1 uses the following notation: The current lowest cost to go from
S to vertex v ∈ V is gv and the cost to go from vertex v to vertex w is cvw , where w is a successor of v
and pv is the parent vertex of v on the shortest path from S to v found so far. In contrast to the standard
algorithm by Hart [18], the implementation in MetPASS needs to be extended to consider
• The time dependence of the edge costs due to changing weather. Each vertex v is therefore
assigned a departure time tv .
• The SoC dependence of the edge costs. Each vertex v is assigned a departure state of charge SoCv .
The edge costs cvw between the vertices already include both the SoC and time dependency, i.e.
cvw = cij (tv , SoCv ).
• The scan path metrics, i.e. the time and state of charge changes T and ∆SoC when inspecting an
area of interest. Note that both are assumed time-independent for the optimization. The scan
2 Note
that hnm can be calculated between the nodes N of the TSP graph instead of the vertices V of the SPP graph
because the point-to-point heuristic is time-independent.
costs are thus the same for every branch in the SPP Graph and don’t need to be considered in
the optimization. This speeds up the optimization significantly. However, it also means that if
the ratio between the time spent on the scan paths and the time spent on the inter-goal paths
exceeds a certain value, then the global multi-goal path looses its optimality properties.
The extended A* algorithm starts with the initialization, in which all vertices are labeled as “unlabeled”
and all gk where k ∈ V are set to ∞. Only the start vertex is labeled “open” and gS is set to 0. Time and
SoC are initialized to user-specified defaults. Next, in each iteration, the algorithm picks a vertex to process
by finding amongst all vertices that are labeled “open” the one with the lowest total expected cost gv + hv .
When a vertex v (from now on called “parent” vertex) is selected, the following two equations are checked
for each child w of that vertex (note again that the time and SoC dependency of the edge costs are already
incorporated in cvw ):
gv + cvw < gw
(11)
gv + cvw + hw < gG
(12)
If the two checks are passed, gw and pw in the decision tree are updated and w is labeled as “open”. In
addition to this standard A*-behaviour, our algorithm also updates the time tw and state of charge SoCw
at the vertex using the scan path metrics Tw and ∆SoCw (which are both time-independent and can thus
be replaced by the Tm and ∆SoCm of the corresponding node). Otherwise, nothing happens and the next
successor vertex is considered. As soon as all successor vertices of the current parent vertex have been
processed, the parent vertex is labeled as “closed” and the next iteration is initiated. The algorithm is
terminated as soon as the terminal node G is part of the label of the selected parent vertex.
Algorithm 2.1: Extended A*-algorithm used in MetPASS()
comment: Finds shortest path between start S and goal G. Note
that the edge cost cvw and the travel time tvw always
incorporate the dependency on (tv ,SoCv )
gS ← 0
lS ← ”open”
tS ← 0
SoCS ← initial SoC specified by user
gk ← ∞ ∀k ∈ V
lk ← ”unlabeled” ∀k ∈ V
v←S
whileG ∈
/v
for
each
w ∈ children(v)
vw < gw and gv + cvw + hw < gG
if gv + c
gw ← gv + cvw
lw ← ”open”
do
tw ← tv + tvw + Tw
do
then
SoCw ← SoCv + ∆SoCvw + ∆SoCw
pw ← v
l
←
”closed”
v
v ← ”open” node with smallest value gk + hk
Note that even after the adapations, this implementation of the A* algorithm is still guaranteed to find
the optimal multi-goal path under the assumption that the areas of interest are small compared to the
total path length. First, for the A* algorithm to be valid, the principle of optimality in the direction of
execution (forward in our case) has to hold [17]. The forward principle of optimality holds for the optimal
path PSG (t) from S to G if and only if for an arbitrary intermediate vertex v, the optimal path PSv (t)
from S to v is contained in PSG (t). This does not hold for arbitrary paths [17]. However, as our TDSPP
graph is an arborescence (a special case of a polytree), there is only a single path from the root S to any
other vertex, and the forward principle of optimality thus holds. Second, many comparable extensions of the
A* algorithm for time-dependent shortest path problems [9] require satisfying the first-in-first-out (FIFO)
property t1 ≤ t2 =⇒ t1 + tvw (t1 ) ≤ t2 + tvw (t2 ). In our case this is not required because the graph
is a polytree and waiting at nodes is not allowed. In addition, while the scan paths are considered time
independent during the inter-goal optimization, they are afterwards recalculated based on current weather
data to have a physically correct state and cost prediction in the planned path.
3
Implementation, Verification and Preliminary Results
3.1
Implementation
3.1.1
Overview
MetPASS is not only an abstract trajectory planner, but provides a comprehensive yet easy-to-use software
environment for large-scale environment-aware mission planning and analysis. The Graphical User Interface
(GUI) shown in Figure 9 supports the in-detail analysis of the path planning decisions. This is important
because especially high-performance solar-powered UAVs are usually fragile and expensive, and the operator
therefore needs to have maximum confidence in the flight path. Using MetPASS usually involves the following
steps:
• Setup of the aircraft and inspection mission via standard text files
• Pre-inspection of the overall meteorological situation through the GUI
• Flight path planning via the algorithms of Section 2
• Post-processing and visualization of the flight path, the terrain, the environmental risks (rain,
wind, thunderstorm, etc.) and the system state (power income and consumption, state of charge,
speeds) via the GUI.
• Upload to UAV: The path’s waypoints can be exported and uploaded to the vehicle autopilot via
any compatible ground control station3 .
Note that due to its fully parametrized system model, MetPASS can not only be used with solar-powered
UAVs but with any battery-powered aircraft. For a typical mission, it will usually be leveraged for, first,
mission feasibility analysis using historical data, second, to then pre-plan the actual mission using forecasted
weather data (including finding the optimal launch time in a certain launch window) and, third, to re-plan
the waypoints (including waypoint upload) once updated weather forecasts have become available during
the flight.
3.1.2
Performance Optimization
MetPASS is implemented in Wolfram Mathematica. To reduce the computation time for complex missions
MetPASS integrates a number of performance optimizations: First, previous calculation results, e.g. the
heuristics or pre-planned scanned paths, are cached and automatically re-used. Second, compiled C-code
instead of much slower Mathematica-code is used for the computationally expensive DP-based point-to-point
path planner. Third, parallel computation with theoretically up to j · k cores (j vertices, k altitude levels,
see Figure 3) is supported. In addition, more fundamental approaches to save edge cost evaluations, such
as discretizing edge costs both with respect to time as well as state of charge, are integrated. However,
3 e.g.
QGroundControl, http://www.qgroundcontrol.org
while these are interesting concepts, Förster [16] found that they only yield negligible improvements in
computational performance. They are thus not further elaborated on here.
Figure 9: MetPASS Graphical User Interface. Top left: Visualization controls used to configure all plots.
Top right: Sun, wind and path angle indicator. Center: Main visualization with the areas of interest (black),
proposed path (red), current aircraft position (white dot), a terrain altitude map (color bar) and wind vector
overlay (grey). Bottom: Expected wind speeds/gusts and solar radiation at the aircraft position over the
full flight.
3.2
Validation and Preliminary Results
This section presents preliminary results to validate the most fundamental level of the multi-goal mission
planning capability, i.e. the MetPASS point-to-point planner. To independently verify the system model and
the optimization with respect to individual cost components, first, unit tests that only use a subset of cost
components and environmental parameters are performed. Second, several costs or environmental parameters
are combined and altitude decision making is added. Third, all cost components and environmental effects
are combined and the individual cost parameters are tuned using historical test cases. Departure and arrival
points are the same as in Figure 3. More details on the validation process are presented by Wirth [40].
Figure 10: First unit test: 2D, i.e. no altitude changes allowed, only time costs, default weather parameters.
The iso-cost points form a circle around the start point. SoC and power income fluctuate with the day/night
cycle. The airspeed is increased when SoC = 100 % and excess solar power is available.
Unit tests
In the first unit test, the required flight time is the only active cost. All forecast parameters are set to default
values (no wind and clear-sky solar radiation). Figure 10 shows that the dynamic programming algorithm
finds the fastest path (an orthodrome projected onto the grid) successfully and the system model produces
the expected results. The flight planner increases the airspeed as soon as the battery is fully charged and
excess solar power is available. The flight time under these zero-wind conditions is about 106 hours, the total
distance is 3650 km.
In the second unit test, the flight time is still the only active cost, but the ECMWF wind forecasts are
now considered. Figure 11 shows the optimal path with departure on May 30, 2013 10:00 UTC. The threedimensional path optimization under time-varying wind conditions can be observed. The planner optimizes
the altitude to leverage the stronger winds at higher altitude such that, overall, vgnd > vair . The flight time
reduces from 106 hours without wind to only 53 hours.
A unit test combining only power balance costs, namely solar radiation, power consumption and flight time,
is illustrated in Figure 12. The applied meteorological parameters are only direct and total solar radiation.
The optimal path follows highly radiated areas during the day and the shortest distance at night. The
altitude changes show that the power and flight time cost interaction works as desired: At night, the lowest
altitude is chosen to minimize the power consumption. During the day, once SoC = 100 % and excess solar
power is available, the top altitude level is chosen to store potential energy and to increase the airspeed at
a given power consumption.
Parameter refinement
After successful unit testing, the cost parameters were refined to balance the influence of individual costs on
the overall planning outcome. The process starts with estimated initial values that were either recommended
Figure 11: Second unit test: 3D, i.e. altitude changes allowed, only time costs, wind conditions taken into
account. The flight time is minimized by exploiting winds (including those at higher altitude) such that
vgnd > vair . The flight time reduces from 106 hours without wind to only 53 hours.
Figure 12: Third unit test: The costs are solar radiation, power consumption and flight time. Only the
radiation weather parameter is applied. Both altitude and airspeed are increased when SoC = 100 % and
excess solar power is available. The iso-cost points illustrate the influence of the radiation.
by meteorologists or by the aircraft operators. Then, multiple historical test cases were used to iteratively
fine tune the parameters. Details on the whole process are available in [40]. As shown in Section 4, the final
cost parameter sets (Table 2) allow the planner to exploit advantageous winds and regions with low cloud
cover.
4
Results
Within the context of ETH Zurich’s solar-powered UAV development efforts, MetPASS was used to plan
a demanding set of missions that could later often be executed successfully by ETH’s AtlantikSolar UAV.
Table 2 presents an overview over these missions and the main parameters. First, AtlantikSolar ’s 81-hour
continuous solar-powered loitering mission [30] that represents the current world record in flight endurance
for aircraft below 50 kg mass is described. This flight is mainly used to verify the MetPASS system model.
Second, results from planning the first-ever autonomous solar-powered flight over the Atlantic are presented.
A feasibility analysis is derived. Third, results from planning two large-scale multi-goal inspection missions
for glacier monitoring above the Arctic Ocean are discussed. AtlantikSolar performed such a flight over
Greenland in summer 2017.
4.1
Loitering Mission: An 81-hour solar-powered flight
As described in our previous work [30] and the corresponding video4 , AtlantikSolar performed its worldrecord 81-hour continuous solar powered flight in summer 2015 to demonstrate that today’s UAV technology
allows multi-day solar-powered flights with sufficient energetic safety margins. By demonstrating multi-day
station-keeping, the flight set an example for telecommunications relay or aerial observation missions as later
on shown in [31]. Clearly, such long-endurance missions require careful planning. While the trajectory is
fixed, the overall mission feasibility in terms of environmental and energetic safety margins still needs to be
assessed and the optimal launch date needs to be found.
MetPASS was used to perform both tasks. Using the weather forecast available before the flight, MetPASS
showed that a 4-day weather window could be leveraged. Launch was performed on June 14th 2015 at 9:32
local time (8.00 solar time) at Rafz, Switzerland. The flight was completed successfully 81.5 hours later on
July 17th at 18:58. While the weather forecasts were accurate for the first three days, they did not predict
the thunderstorms and severe winds on the last day. To analyze and verify the system models of Section 2
using correct weather data, Figure 13 thus shows flight data and the MetPASS output based on historical
weather data (i.e. an a-posteriori weather analysis of the COSMO-2 model with 2 km spatial and 1 h time
resolution).
model
Given the clear-sky conditions MetPASS predicts a solar power income Psolar
close to the theoretical
model
model
maximum represented by the full solar power model Psolar [FM] developed in [28]. The decrease of Psolar
due to clouds on the last day is captured correctly by MetPASS. The measured Psolar also closely follows the
MetPASS predictions. It only deviates when SoC ≈ 100 % because Psolar is throttled down as per design to
protect the batteries. Solar power is therefore only supplied to cover the fluctuating propulsion demands.
The required battery power to sustain flight during the night is Pbat = 41.6 W whereas MetPASS estimates
model
Pbat
= 42.4 W using the measured power-curve fitted to Eq. (8). The overall charge and discharge process
is thus represented very accurately. The predicted and measured minimum SoCs averaged over all three
nights are 39 % and 40 % respectively. Notable deviations are only caused by unexpected evening thermals,
which are visible through altitude fluctuations and a decrease in Pbat , during the first and third night.
Overall, the MetPASS predictions represent the measurements very well. Note however that given the
mostly excellent weather conditions, these energetic results would not even have required taking weather
forecasts into account.
4 https://www.youtube.com/watch?v=8m4_NpTQn0E
Table 2: Overview over the missions planned using MetPASS. The airplane parameters differ because three
UAV versions (AS-1, AS-2 and AS-3) are used: ηsm and ebat improve over time (but ebat was decreased
for the Arctic because of the low temperatures), and Pflight only increases because payload (e.g. cameras,
satellite communication) was added. The cost parameters also vary: For example, the Atlantic mission
(which was planned first, i.e. in 2014) had higher wind thresholds than the other two missions because
constant winds were not considered as dangerous over the open ocean, much lower SoC limits because the
AS-1 UAV performance was lower, and a lower time cost factor to put more emphasis on being safe rather
than fast. In the Arctic missions, (A) represents Bowdoin and (B) represents the six-glacier mission.
Mission
81h-flight
(Sec. 4.1)
Atlantic
(Sec. 4.2)
Arctic
(Sec. 4.3.1/4.3.2)
Path, grid and simulation parameters
Mission type
Loitering
Point-to-point
Multi-goal
Grid points (LxWxH) 1x1x1
40x113x5
A:30x25x1, B:12x9x1
Altitude range (MSL) 600 m
100–1600 m
800 m
Simulation time step
600 s
600 s
600 s
Data type
Model type
Long. resolution
Lat. resolution
Time resolution
Meteorological parameters
Forecasts
Historical
COSMO-2
ECMWF HRES
2 km
0.125◦
2 km
0.125◦
1h
6h
Forecasts
ECMWF HRES
0.2◦
0.1◦
3h
Aircraft (Year)
mtot
mbat
ebat
ηsm
opt
Pflight (vair
)
Airplane
AS-2 (2015)
6.9 kg
2.92 kg
240 Wh/kg
23.7 %
42 W
AS-3 (2017)
7.4 kg
2.92 kg
222 Wh/kg
23.7 %
57 W
State of charge
Radiation factor
Exc. power cons.
CAPE
Wind
Wind gusts
Precipitation
Humidity
Altitude AGL
α
0.4
0.8
0
100
6
9
0.1
80
-
Time cost factor
0.05
parameters
AS-1 (2014)
7.0 kg
2.92 kg
230 Wh/kg
20.0 %
47 W
Cost parameters
β
α
β
0.2 3 0.2 0.05
0.05 3 0.8 0.05
200 1 0
200
2000 3 100 1000
12
3 20 40
15
3 5
20
10
3 1
10
100 5 80 100
0.01
3
3
1
3
3
3
3
5
-
α
0.4
0.8
0
100
6
9
0.1
80
600
0.05
β
0.2
0.05
200
1000
12
15
10
100
170
3
3
1
3
3
3
3
5
5
P model
solar
P solar
250
P model
solar [FM]
P model
bat
P bat
Power [W]
200
150
100
50
0
-50
SoC [%]
80
Speed [m/s]
15
Altitude [m]
100
800
60
bat
model
bat
40
v air
v model
air
v wind
v model
wind
CAPE
Wind
10
5
0
h
h ref
600
2
CAPE
CAPE [J/g]
1
0
Costs [-]
10 0
Time
SoC
Rain
Humidity
Radiation
10 -1
10 -2
10
20
30
40
50
60
70
80
90
Local solar time [h]
Figure 13: Flight data from AtlantikSolar ’s 81-hour continuous solar-powered loitering mission compared to
the MetPASS planning results. The historical weather data used here correctly recovers the clear weather
for days one to three and strong winds and thunderstorm clouds for the last day. The top plot shows
model
model
solar power income Psolar (measured), Psolar
(MetPASS), the clear-sky full model Psolar
[FM] from [28], and
battery power. The remaining plots show the state of charge, airspeed, wind conditions, the thunderstorm
indicator CAPE and the individual MetPASS costs that especially the strong winds and high CAPE cause.
Overall, the MetPASS predictions closely fit the flight data. Used with accurate weather data, MetPASS
can thus predict and avoid unsafe situations such as the high winds close to thunderstorms on the last day.
In contrast, the wind and airspeed plots show more variety due to the current weather. Strong winds are
measured and modeled for the first day. In accordance with the ground operators on the field, at t = 15.4 h
solar time MetPASS suggests to increase the airspeed to assure vgnd > 0. The winds decrease for the
following nights, but then reach up to 11.4 m/s (model) and 16 m/s (measurement) during the last two flight
hours. With a nominal airspeed of only vair ≈ 9 m/s, both MetPASS and the ground operators increase
vair to keep vair ≥ vwind to avoid the vehicle’s drift-off. In contrast to MetPASS, the ground operators
increase the UAV’s altitude to later convert it into more speed if the wind picks up even more. The higher
altitude is one reason why the UAV measures higher wind speeds. In addition, as clearly indicated by the
convective available potential energy (CAPE), thunderstorm clouds develop. Overall, the costs for wind and
thunderstorms are close to their normalized limit (Ċk = 1). The costs correctly represent the significant
danger the UAV is in, both because of a possible drift-off and a structural overload due to the strong wind
shear and gusts. As mentioned before, these environmental conditions were unfortunately not predicted by
the initial weather forecast from four days earlier and the ground crew did not exploit updated weather data.
The main lesson learned from this flight is thus that — especially for multi-day missions during which the
weather can change significantly — MetPASS’s re-planning capability is key and needs to be used to avoid
all unsafe situations for solar aircraft. In this case, the UAV could have simply been landed before the high
winds and thunderstorm clouds arrived.
4.2
Point-to-Point Mission: Crossing the Atlantic Ocean
Crossing the Atlantic Ocean is a feat that not many small-scale UAVs can accomplish. It is therefore an
excellent demonstration case for long-endurance solar UAVs such as AtlantikSolar 5 . The 4000 km route from
Newfoundland, Canada to Lisbon, Portugal was selected as AtlantikSolar ’s prime — and design-driving —
mission. Clearly, such a flight involves significant challenges. In addition to careful regulatory planning,
extensive ground infrastructure and an efficient yet robust system design, a thorough pre-assessment of
the exact times and conditions under which the flight is feasible is required. The fragility and weathersusceptibility of solar UAVs also demands that the weather is carefully monitored along the whole route and
new trajectories that avoid upcoming severe weather are generated in flight. MetPASS was used for both
these tasks.
Historical weather data: Determining optimal and marginal flight conditions
To identify the full range of conditions under which an Atlantic crossing is feasible, MetPASS was applied
to historical ECMWF weather data from 2012 and 2013. Optimal and marginal border-cases together with
their performance metrics minimum SoC, total accumulated cost and required flight time were identified.
Figure 14 shows an exemplary optimal border case on July 13th, 2012: The chosen route closely follows
the orthodrome, with tailwind reducing the flight time by more than 50 % to 52 hours. Because the planner
clear-sky
chose the launch time correctly, significant cloud cover can be avoided and Psolar ≈ Psolar
. The state of
charge therefore always stays above 17.2 %. The accumulated cost is C = 2200 and mainly consists of the
time cost, which indicates that all other costs usually stay below their threshold. In contrast, the exemplary
June 4th, 2013 test case in Figure 15 exhibits marginal conditions. To avoid unsuitable areas (severe cross
and headwind, high humidity and low solar radiation), the planner chooses a path that deviates significantly
from the orthodrome. The resulting flight time is 86 h. The minimum state of charge is only 7.1 %. Although
none of the costs reaches the critical limit βk , the total accumulated cost are C = 17800. Launch is not
recommended under these conditions. As described below, a more optimal nearby launch date can easily be
determined using MetPASS.
5 The Atlantic crossing inspired the name AtlantikSolar UAV. While found to be technically feasible, the mission was not
executed because of regulatory reasons. More specifically, the 4000 km flight in BVLOS conditions would not have received
regulatory approval from the transport authorities because of the requirement for sense-and-avoid capabilities on par with
humans, which is technically not feasible on today’s UAVs.
Figure 14: A transatlantic flight under optimal weather conditions: MetPASS exploits the easterly winds
and thereby retrieves an orthodrome-like path with only 52 hours flight time. The SoC barely falls below
the threshold. Except for the time cost, all costs are small. This proves that the Atlantic crossing is feasible
even with the AtlantikSolar AS-1 UAV if the right launch time is chosen with the help of the planner.
Historical weather data: Determining the seasonal dependency of feasibility
Due to the variety of weather conditions above the Atlantic it has to be assessed systematically how many
and when launch windows for such a flight exist. The seasonal dependency of the performance metrics was
thus assessed via MetPASS trajectory optimizations that were run in 6 h steps for the whole range from May
31st to August 8th for which historical ECMWF data was available. Figure 16 shows the minimum SoC and
total accumulated cost for each date. It can be inferred that even the first version of the AtlantikSolar UAV
(AS-1, see [29]) provides sufficient feasible launch dates from mid-May to end-July when requiring a state
of charge margin of 10 %. Obviously, the later versions of AtlantikSolar (AS-2 and AS-3, see [30] and [31])
would improve the performance metrics. Additional analysis yields a minimum and average flight time of
52 h and 78 h respectively versus the 106 h for the no-wind unit test of Section 3.2. Figure 16 can obviously
also be used before a flight to decide how optimal a certain launch date is relative to all other launch dates
of the season.
Using forecasts: Launch-time optimization and real-time route re-planning
Figure 17 shows MetPASS’s ability to perform launch time optimizations as well as in-flight route-corrections
using periodically-updated forecast data. For the success of a mission, the optimal launch time is as important
as the path itself. In Figure 17, the total cost was therefore calculated for a 50 hour time window around
April 21st, 2014. The time with minimum total cost is chosen as the launch time and the corresponding
path can then be checked and executed by the aircraft. Given the significant weather fluctuations during
long-endurance missions, 9 hours after launch the path optimization is restarted with updated weather data
but the current aircraft state (retrieved via telemetry) as initial values. This path correction, also illustrated
in Figure 17, is repeated whenever new weather data arrives (every 24 hours in this specific case) until the
destination is reached.
Figure 15: A transatlantic flight under unsuitable weather conditions: The launch happens in heavy winds
and under high cloud coverage. In the first night, the SoC is critically low. The total costs for SoC, power
consumption, radiation and environmental dangers are an order of magnitude higher than for the optimal
weather case. A feasible path is found, but the result clearly encourages to choose a different launch date
using MetPASS.
Minimum state of charge [%]
20
25000
15
20000
10
15000
10000
5
0
Total accumulated cost [-]
30000
5000
2012
2013
Jun
Aug
Jul
0
Jun
2012
2013
Aug
Jul
Figure 16: Feasibility assessment for the Atlantic crossing over the summer seasons of 2012–2013. Minimum
SoC (left) and total accumulated cost (right). Solid lines indicate the average of 20 surrounding days. As
expected, feasibility is highest around June 21st.
Total cost
Total
Cost
[-]
14000
14000
Initial optimal path
Updated after 9 hours flight
Updated after 33 hours flight
Optimal
departure time
12000
12000
10000
10000
8000
8000
9 h flight time
6000
6000
33 h flight time
20.4 14 :00
20 Apr
14:00
21.4 00 :00
21 Apr
00:00
21.4 10 :00
21 Apr
10:00
21.4 20 :00
21 Apr
20:00
Figure 17: MetPASS end-to-end mission planning process: The optimal departure time is determined based
on current weather forecasts (left). Once the UAV is airborne, the route is replanned periodically using
updated weather forecasts (right) and the waypoints are re-sent to the vehicle.
4.3
Multi-Goal Missions: Inspecting Arctic Glaciers
Large-scale missions that involve scanning multiple areas of interest can optimally leverage the longendurance capabilities of solar aircraft. For example, the persistent aerial monitoring of Arctic glaciers
and the analysis of their flow and calving characteristics is key to understanding global climate change.
Previously, glaciologists needed to use expensive on-site transport (e.g. helicopters) and needed to operate
in remote places with limited infrastructure (tents without internet) next to the glaciers [21]. The central
goal for AtlantikSolar ’s deployment to the Arctic Ocean in summer 2017 was thus to demonstrate a new
paradigm for glacier research: The operation of a complete scanning mission, i.e. take-off, inspection of one
or even more remote glaciers, and landing, from an easily-accessible home base. The home base was chosen
as Qaanaaq, a village at a latitude of 77 ◦ N in Northwest-Greenland and surrounded by multiple fast-flowing
Arctic glaciers (Figure 1). A number of scanning missions with increasing complexity were performed, two of
which are described below. MetPASS performed both the initial feasibility assessment as well as the launch
date and route optimization over the Arctic Ocean.
4.3.1
Two-glacier mission: Bowdoin Glacier
The inspection mission from Qaanaaq to Bowdoin glacier was performed on July 3rd 2017. After days of
fog and excessively strong Arctic winds, clear weather with only little high altitude clouds followed. Using
weather forecasts from 15 hours before takeoff, a launch window was found, a path was generated and take-off
was performed at 16:26 local time (13.76h solar time). The mission objective was to perform two different
scans: One higher altitude lawn-mower scan to observe possible glacier calving events at Bowdoin glacier,
and one low-altitude station-keeping scan at base.
The corresponding MetPASS path planned with the parameters of Table 2 (i.e. 30 slices times 25 vertices
per grid) is shown in Figure 18. In contrast to our previous work [41], the planner was extended with the
ability to avoid the terrain represented by a 30 m resolution Digital Elevation Model. In addition, while
by default the departure and arrival points are initialized at the center of the first and last slice of the
grid (see Figure 3), this can lead to large amounts of grid points over inaccessible terrain. Automatic grid
shifting, which maximizes the amount of grid points over accessible areas such as the open ocean, was thus
implemented. The optimal path found is a shortest-time path that stays safe of terrain. In other words,
the cost function components time and terrain dominate the path optimization. This is due to, first, the
narrow fjord-like terrain which severely limits the path choices when assuming a fixed altitude. Second, due
to the relatively small scale of the planning problem (compared e.g. to Section 4.2) the weather is rather
homogeneous over the whole area and exploiting these small weather differences yields less cost advantages
than following a time-optimal path.
Figure 19 compares the flight data recorded by AtlantikSolar against the MetPASS predictions. On the one
model
hand, solar and battery power Psolar and Pbat are again represented accurately. We measure Psolar < Psolar
for t = [13.8 h, 15.6 h] because SoC ≈ 100 % and Psolar is thus again throttled down by design. The battery
model
discharge starts around 18.0 h solar time, where Pbat < Pbat
because of upcoming high altitude clouds
and the setting sun. On the other hand, the wind forecast is subject to significant errors: At t ≈ 16.8 h,
model
the measured and predicted winds are vwind = 13.3 m/s and vwind
= 8.0 m/s (at the northern scan path
section at Bowdoin, Figure 18). The time required to complete each flight phase thus differs between the
model and flight data. More importantly, wind speeds of this magnitude are a significant threat to the
model
= 8.0 m/s had already been accounted for by flying
aircraft. While the predicted maximum winds of vwind
opt
at vair ≈ 11 m/s > vair
, the flight would have been marked as infeasible by MetPASS had the real wind
speeds been known. Again, the higher wind speeds would have been predicted by the forecasts available 3 h
before launch. A lesson learned from this flight is therefore that, again, the most up-to-date weather data
always needs to be used. More generally speaking, only high quality weather data brings tangible benefits
when planning such missions.
Overall, using the MetPASS flight plan, this first-ever glacier inspection mission with a solar-powered UAV
in the Arctic could be executed successfully (Figure 20). As predicted, the main costs or threats for the
airplane were the high wind speeds at t = [15.5 h, 17.0 h] and the high terrain (t = [15.8 h, 16.8 h]), which
the MetPASS path avoided successfully were possible. Other environmental costs were not significant. The
overall flight duration was 4:52 h during which 230 km were covered. Even after that, the batteries were
still almost full (SoC = 97 %). The whole mission was performed fully autonomously, i.e. without any pilot
intervention. The scientific results provided to glaciologists were a full 3D reconstruction of Bowdoin glacier
(Figure 20b) which showed a developing crack that led to a significant glacier calving event only days after
the flight. Overall, the mission objective of demonstrating a fully-autonomous end-to-end aerial scanning
mission of remote glaciers from a local home base could thus be fulfilled successfully.
4.3.2
Six-glacier mission
MetPASS was also leveraged to plan a multi-goal mission involving the aerial scanning of the six Arctic
glaciers A--F in Figure 1. The settings in Table 2 were employed, i.e. the point-to-point grid was reduced to
12 slices and 9 vertices to guarantee low calculation times. The mission was started at 2:30 local time (4:30
Figure 18: The AtlantikSolar glacier inspection mission above the Arctic Ocean planned by MetPASS. The
small scale of the problem and the narrow fjords clearly reduce the path choices. The result is thus a
compromise that yields the shortest path and avoids terrain.
UTC) on July 6th 2017. Two glaciers (Heilprin North and Heilprin South) were scanned successfully, but
due to state estimation issues that occurred after 7 hours of flight the scanning of further glaciers had to be
canceled. Although the mission could not be completed successfully, the topology of such a solar-powered
multi-glacier scanning mission in the Arctic is of course still instructive and is thus described below.
Figure 21 shows the optimal path calculated by MetPASS. The total path covers 580 km distance in 16.3 h
flight time. The aircraft position is shown both at 6:36 UTC and 17:00 UTC, once overlaid with a total cloud
cover map and once with a terrain map. The cloud cover and thus sun radiation situation is very favorable,
however, significant winds are indicated next to the areas of interest. The operators therefore increase the
opt
flight speed from the optimal vair
= 8.6 m/s to vair = 9.8 m/s while traveling and vair = 11 m/s inside the
areas of interest. The optimal path found by MetPASS is near counter-clockwise and thus clearly exploits
the fact that the meso-scale winds exhibit a counter-clockwise rotation. In addition, when the straight-line
path between two areas of interest would result in headwind, the aircraft also deviates from the straight
line path (i.e. at around t=6:36 UTC, see Figure 21 top left, a path south of the straight line path allows
to avoid headwinds). The flight speed and wind plots therefore show that the aircraft is progressing fast.
More importantly, the path manages to completely avoid dangerous high-wind areas (except at t=11.2h after
launch). The power income is high but is, as before, heavily influenced by the aircraft heading due to the
low sun elevation in the Arctic. The state of charge never drops below 68 % despite launching around solar
midnight, thus confirming the potential of solar-powered flight in Arctic regions. The total accumulated cost
opt
is C = 5595. The largest costs are time, excess power consumption (caused when vair > vair
), and altitude
Mission phases:
Launch
Model
Attitude [°]
Flight
180
90
0
-90
-180
To Glacier
To Glacier
Scan #1 (glacier)
Scan #1 (glacier)
Return
Return
Scan #2 (base)
Scan #2 (base)
Yaw model
Yaw
150
Power [W]
100
50
0
-50
P model
solar
P solar
-100
P model
[FM]
solar
P bat
P model
bat
Costs [-]
Altitude [m]
Speed [m/s]
SoC [%]
100
15
model
bat
bat
90
v air
v model
air
v wind
v model
wind
10
5
0
1000
h
h ref
500
0
0.2
Time
Wind
Terrain
Power
0.1
0
14
14.5
15
15.5
16
16.5
17
17.5
18
18.5
Local solar time [h]
Figure 19: The 4:52 h and 230 km glacier inspection mission performed by AtlantikSolar on July 3rd 2017
above the Arctic Ocean. The flight phases are indicated in blue for the flight data and in red for the
MetPASS plan. They include start at the base in Qaanaaq (Greenland), traveling to and scanning Bowdoin
glacier and returning to base to perform a second aerial scan before landing. The MetPASS plan uses
weather forecasts from 15 hours before launch. The energetic states are represented well, but erroneous
wind forecasts cause significant differences in the time required to complete each individual flight phase. To
preserve comparability, the MetPASS plan was therefore adapted to the same duration as the actual flight
(only through shortening the second scanning phase a-posteriori).
(a)
(b)
Figure 20: Left: The AtlantikSolar UAV operating over the Arctic sea ice next to Bowdoin glacier. Right:
The full 3D construction (made with the commercially available Pix4D software) of Bowdoin glacier and the
scan path planned by MetPASS. The scan area of 7 km2 was covered with 75 % lateral overlap from 700 m
AGL, which took 53 minutes and covered 47.7 km.
AGL (due to flight above high terrain next to the glaciers). Overall, the combination of good weather and
the path optimized by MetPASS allows to avoid environmental risks and only results in acceptable costs that
either increase flight safety (increased airspeed and thus power consumption) or cannot be avoided (altitude
AGL next to the glaciers and time).
To assess the advantages of this optimal path versus more naive solutions, Table 3 compares the corresponding
path metrics cost, distance and time. As expected, the MetPASS path is cost-optimal. Although it is very
similar to the counter-clockwise path, the fact that it starts visiting the nodes in the order EF... instead of
FE... allows it to better avoid certain bad weather phenomena (in this case strong wind) and altitude AGL
costs. However, the total cost difference to the naive solutions is only one percent. The reason is that the
weather conditions are favorable and no critical environmental risks (e.g. thunderstorms or precipitation)
exist that would be avoided by MetPASS but that would incur high costs in a naive path. The overall
distance flown is also similar due to the similarity between the paths. In comparison to the clockwise path,
which always commands the aircraft to fly against the counter-clockwise-rotating global winds, the MetPASS
path however features a 5 % shorter overall flight time. Note that in such good weather conditions, other less
trivial paths (i.e. those not strictly clockwise or counter-clockwise) always result in additional flight time
and thus cost and therefore cannot be optimal.
Table 3: The optimal path found by MetPASS against the naive solutions.
Cost
Time
Distance
Order
4.4
MetPASS
Clockwise
Counter-clockwise
5595
16.3 h
580 km
EFDCBA
5634 (+0.7 %)
17.1 h (+4.9 %)
579 km (-0.2 %)
ABCDEF
5650 (+1.0 %)
16.2 h (-0.6 %)
572 km (-1.4 %)
FEDCBA
Computational Performance Analysis
The methods and framework developed in this paper shall be usable for pre-flight mission planning as well as
in-flight re-planning. The required computation time, which is shown in Table 4 for the missions presented
before, therefore plays a crucial role. First, station-keeping missions do not require actual route planning but
only straightforward system state propagation. Even multi-day station-keeping missions such as the 81hflight can therefore be calculated in a couple of seconds. Second, large-scale point-to-point missions such as
Total cloud cover
Terrain
Thu 6 Jul 2017 06:36:00UTC (Flight time: 2.0h)
Thu 6 Jul 2017 17:00:00UTC (Flight time: 12.5h)
78.0
78.0
77.8
77.8
[%]
100
77.4
Base
Terrain
altitude [m]
77.6
77.6
Base
77.4
80
60
77.2
77.2
40
20
0
77.0
77.0
5m/s
-71
-70
-69
-68
-67
-66
-65
-64
Flight speed
[m/s]
vair
15
5m/s
-71
-70
-69
-68
-67
wind speed
10
-64
-6
6
max. gusts last 3 h
gusts - wind
gusts threshold
8
10
-65
Wind
[m/s]
vgnd
-66
wind threshold
6
4
5
2
0
1.0
0
5
10
[-]
15
[h]
0
State of charge
10
15
[h]
Power
150
100
0.6
0.4
50
threshold
0
limit
0.2
0
5
10
15
[h]
cape
wind
gusts
precipitation
power consumption
excess power consumption
battery power
solar power income
50
0
Current environmental cost
0.05 [1/s]
5
[-]
humidity
4000
0.03
10
15
[h]
Accumulated general cost
power cons.
SoC
time
rad. factor
altitude AGL
environmental
5000
0.04
3000
0.02
2000
0.01
0
5
[W]
0.8
0.0
0
1000
5
10
Time since launch [h]
15
[h]
0
0
5
10
Time since launch [h]
15
[h]
Figure 21: The six-glacier scan mission in the Arctic optimized with MetPASS. The path is shown against
cloud cover (top left) and terrain (top right). The weather conditions are favorable: The environmental costs
are close to zero and the main costs are excess power consumption (due to winds), altitude above ground
and time. Despite strong winds the SoC never dips below 68 %, indicating the potential of solar-powered
flight in Arctic regions.
the 4000 km trajectory across the Atlantic Ocean naturally require point-to-point route optimization. Under
the parameters of Table 2, MetPASS completes the route optimization in less than 10 minutes. Third,
the multi-goal aerial inspection missions require the scan path optimization, heuristics calculation, and an
inter-goal optimization that includes either nheuristic or nnaive point-to-point route optimizations depending
on whether the heuristic is used or not. The two-glacier scan mission is optimized within 11 minutes. The
heuristic does not provide a computational advantage for this case because a) it takes much longer to calculate
the heuristic than all point-to-point optimizations and b) the heuristic does not even reduce the number of
edge cost evaluations. For the six-glacier mission, the situation changes drastically: The 9 minutes invested
to calculate the heuristic allow to reduce the required edge cost calculations by 94 %. The total calculation
time ttotal with heuristic is 17 minutes6 and is thus, based on a simple extrapolation, 8 times shorter than
if all edge cost evaluations had to be performed.
Table 4: Computation times with a 2.8 GHz quad-core Intel Xeon E3-1505M CPU with 16GB RAM and
the parameters from Table 2. The total computation time ttotal consists of the scan path and heuristic
computation times tscanpaths and theuristic and the route optimization time topt (which includes the inter-goal
and point-to-point optimization). The six-glacier mission benefits significantly from using the heuristic.
Mission
ttotal , of which
• tscanpaths
• theuristic
• topt
nheuristic
nnaive
nheuristic/nnaive
81h-Flight
Atlantic
Arctic
Two glaciers
Arctic
Six glaciers
16 s
16 s
-
462 s
462 s
-
690 s
1s
579 s
110 s
6
6
1.0
1010 s
3s
538 s
469 s
161
2676
0.06
Figure 22a analyzes the effect of the heuristic in more detail. To assess how accurate our heuristic is we
define the heuristic quality between vertices v and w as
qheuristic =
hvw
heuristic value
.
=
cvw
actual cost
(13)
Here, qheuristic < 1 must hold for hvw to be a valid heuristic, but the closer qheuristic gets to one the earlier
suboptimal paths can be sorted out. The quality of the heuristic implemented in this work was determined
through 600 randomized point-to-point route finding problems for which hvw and cvw were computed. In
all experiments, the departure time (and thus the weather) was chosen randomly within a 3-day window.
The departure and arrival coordinates were chosen randomly across Europe but within 10–50 km of each
other. Overall, the mean heuristic quality is only 20 %. Recall however that the heuristic is calculated as
the straight line path under the best weather conditions in the whole time interval and area in which the
flight happens. Often, there will be a tiny area with good weather in otherwise much worse weather such
that hvw is small but cvw is large.
Figure 22b evaluates the influence of the heuristic quality qheuristic on the number of edge cost evaluations.
The analysis consists of using the developed label correcting algorithm to solve 10 randomly generated
problems for each combination of qheuristic and the number of areas of interest N . The resulting averages
show that with increasing N the heuristic becomes significantly more effective at reducing the required
edge cost calculations. While the number of edge cost function evaluations is heavily dependent on the
problem statement and the weather data, it is clear that especially large problems can be sped up if future
research improves the heuristic. For example, for N = 7 improving qheuristic to 70 % allows an order-ofmagnitude reduction of edge cost computations. All in all, as shown in Table 4, MetPASS however already
calculates station-keeping, point-to-point and large-scale multi-goal missions at sufficient grid resolution in
6 Note
however that, compared to the two-glacier mission, the grid resolution was reduced in return for a fast computation.
4
Edge cost evaluations
Number of occurences
10
150
Mean~0.2
100
50
0
0
0.2
0.4
0.6
Heuristic quality
0.8
1.0
(a) The heuristic quality distribution computed through 600
experiments with random boundary conditions (departure
and arrival coordinates as well as start time). The mean
heuristic quality is 20 percent.
1000
x
N=7
x
N=6
x
x
x
x
x
x
x
N=5
100 x
N=4
x
x
x
x
N=3
x
x
x
N=2
x
x
10
0.0
x
x
0.2
x
x
x
x
x
x
x
x
xx
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
0.6
0.8
0.4
x
Heuristic quality
(b) The number of required edge cost evaluations as a function
of heuristic quality and areas of interest N . Each data point
was obtained by simulating 10 randomly generated problems.
Figure 22: Heuristic quality and resulting performance gains through a reduction in edge cost evaluations
in MetPASS.
below 20 minutes. The approach is thus sufficiently fast for mission analysis, pre-flight planning and in-flight
re-planning.
5
Conclusion
This paper presented MetPASS, the Meteorology-aware Path Planning and Analysis Framework for Solarpowered UAVs. Using a combination of dynamic programming techniques and an A*-search-algorithm with
a custom heuristic, optimal paths can be generated for large-scale station-keeping, point-to-point and multigoal aerial inspection missions. In contrast to previous literature, MetPASS is the first framework which
considers all aspects that influence the safety and efficiency of solar-powered flight: By incorporating historical or forecasted meteorological data, MetPASS avoids environmental risks (thunderstorms, rain, humidity
and icing, strong winds and wind gusts) and exploits advantageous regions (high sun radiation and tailwind). In addition, it avoids system risks such as low battery state of charge and returns safe paths through
cluttered terrain. The loop to actual flight operations is closed by allowing direct waypoint upload to the
aerial vehicle.
MetPASS has been applied for the feasibility analysis, pre-planning and re-planning of three different missions: AtlantikSolar ’s continuous 2338 km and 81-hour world endurance record flight, a hypothetical 4000 km
Atlantic crossing from Newfoundland to Portugal, and a 230 km two-glacier and 580 km six-glacier remote
sensing mission above the Arctic Ocean near Greenland. These missions have clearly shown that frameworks
such as MetPASS, which combine an aircraft system model with meteorological data in a mathematically
structured way, are indispensable for the reliable execution of large-scale solar-powered UAV missions. In
addition, the following characteristics and lessons learned can be derived:
• Quality of weather data: Only high quality weather data brings tangible benefits in mission
planning. High confidence in the weather forecasts is thus required and the most up-to-date
forecasts always have to be used. Wrong weather data can even lead to higher costs than the
naive paths.
• Cost advantages to naive solutions: The cost advantages (i.e. safety and performance) generated
by incorporating weather data decrease with
– Less weather variability, because less areas with above-average weather conditions
exist and can be exploited by MetPASS. This especially applies to good macro weather
situations.
– Smaller planning area, which also decreases weather variability.
– High or cluttered terrain, which limits the valid path choices.
References
[1] AeroVironment.
AeroVironment Solar-Powered Puma AE Small Unmanned Aircraft Achieves Continuous Flight for More Than Nine Hours.
Press release,
August
12th
2013.
http://www.avinc.com/resources/press_release/
aerovironment-solar-powered-puma-ae-small-unmanned-aircraft-achieves-contin.
[2] Jacques Ambühl. Sailing the virtual bol d’or. Scientific Report MeteoSwiss 98, MeteoSwiss, 1998. p.
44.
[3] Richard Bellman. On a routing problem. Quarterly of applied mathematics, 16(1):87–90, 1958.
[4] Richard Bellman. Dynamic Programming Treatment of the Travelling Salesman Problem. Journal of
the ACM (JACM), (1):61–63, 1962.
[5] Richard Bellman. Dynamic Programming. Courier Corporation, 2013. First published by Princeton
University Press, Princeton, New Jersey, 1957.
[6] Dimitri P. Bertsekas. Dynamic Programming and Optimal Control, Volume 1. Athena Scientific, Belmont, MA, 3 edition, 1995.
[7] British Broadcasting Corporation (BBC). Solar Impulse lands in California after Pacific Crossing, April
2016. http://www.bbc.com/news/science-environment-36122618. Retrieved 10/12/2017.
[8] ByeAerospace. Industry First: Solar-Electric Silent Falcon Prepares for Initial Customer Orders. Press
release, March 15th 2015.
[9] Ismail Chabini and Shan Lan. Adaptations of the A* Algorithm for the Computation of Fastest Paths
in Deterministic Discrete-Time Dynamic Networks. IEEE Transactions on Intelligent Transportation
Systems, 3(1):60–74, 2002.
[10] Anjan Chakrabarty and Jack Langelaan. UAV Flight Path Planning in Time Varying Complex WindFields. In American Control Conference (ACC), 2013.
[11] Alan Cocconi. AC Propulsion’s solar electric powered SoLong UAV. Technical report, AC Propulsion,
2005. Retrieved from https://archive.org/details/ACPropulsionSolongUAV2005.
[12] N.J. Colella and G.S. Wenneker. Pathfinder: Developing a solar rechargeable aircraft. IEEE Potentials,
15(1):18–23, 1996.
[13] C. Cornwall. Solar equations document. Technical report, Earth System Research Laboratory, 2014.
[14] Ran Dai. Path planning of solar-powered unmanned aerial vehicles at low altitude. In Circuits and
Systems (MWSCAS), 2013 IEEE 56th International Midwest Symposium on, pages 693–696. IEEE,
2013.
[15] Hagen S. Fischer and Hans Gilgen. DACHRad - Berechnung der direkten Sonneneinstrahlung in
Deutschland, sterreich und der Schweiz. Bulletin of the Geobotanical Institute, ETH Zurich, 2002.
[16] Julian Förster. Multi-Goal Meteorological Path Planning for a Solar-Powered Unmanned Aerial Vehicle.
Semester thesis, ETH Zurich, 2017.
[17] Horst W. Hamacher, Stefan Ruzika, and Stevanus A. Tjandra. Algorithms for time-dependent bicriteria
shortest path problems. Discrete Optimization, 3(3):238–254, 2006.
[18] Peter E. Hart, Nils J. Nilsson, and Bertram Raphael. A Formal Basis for the Heuristic Determination
of Minimum Cost Paths. IEEE Transactions on Systems Science and Cybernetics, 4(2):100–107, 1968.
[19] Karla L. Hoffman, Manfred Padberg, and Giovanni Rinaldi. Traveling Salesman Problem, pages 1573–
1578. Springer US, Boston, MA, 2013.
[20] Saghar Hosseini, Ran Dai, and Mehran Mesbahi. Optimal Path Planning and Power Allocation for a
Long Endurance Solar-Powered UAV. In American Control Conference (ACC), 2013, pages 2588–2593.
IEEE, 2013.
[21] G. Jouvet, Y. Weidmann, J. Seguinot, M. Funk, T. Abe, D. Sakakibara, H. Seddik, and S. Sugiyama.
Initiation of a major calving event on the Bowdoin Glacier captured by UAV photogrammetry. The
Cryosphere, 11(2):911–921, 2017.
[22] Andrew Klesh and Pierre Kabamba. Energy-optimal path planning for solar-powered aircraft in level
flight. 2007.
[23] Andrew T. Klesh and Pierre T. Kabamba. Solar-Powered Aircraft: Energy-Optimal Path Planning and
Perpetual Endurance. 32, 2009.
[24] Chryssi Malandraki and Mark S. Daskin. Time Dependent Vehicle Routing Problems: Formulations,
Properties and Heuristic Algorithms. Transportation Science, 26(3):185–200, 1992.
[25] Chryssi Malandraki and Robert B. Dial. A restricted dynamic programming heuristic algorithm for the
time dependent traveling salesman problem. European Journal of Operational Research, 90(94):45–55,
1996.
[26] Alexander Jairo Rojas Malaver, Luis Felipe Gonzalez, Nunzio Motta, and Tommaso Francesco Villa.
Design and Flight Testing of an Integrated Solar Powered UAV and WSN for Remote Gas Sensing. In
IEEE Aerospace Conference, March 7–14th 2015.
[27] André Noth. Design of Solar Powered Airplanes for Continuous Flight. PhD thesis, ETH Zurich, 2008.
[28] Philipp Oettershagen. High-Fidelity Solar Power Income Modeling for Solar-Electric UAVs: Development and Flight Test Based Verification. Technical report, ETH Zurich, 2017. Available at
http://arxiv.org/abs/1703.07385.
[29] Philipp Oettershagen, Amir Melzer, Thomas Mantel, Konrad Rudin, Rainer Lotz, Dieter Siebenmann,
Stefan Leutenegger, Kostas Alexis, and Roland Siegwart. A Solar-Powered Hand-Launchable UAV
for Low-Altitude Multi-Day Continuous Flight. In IEEE International Conference on Robotics and
Automation (ICRA), 2015.
[30] Philipp Oettershagen, Amir Melzer, Thomas Mantel, Konrad Rudin, Thomas Stastny, Bartosz
Wawrzacz, Timo Hinzmann, Stefan Leutenegger, Kostas Alexis, and Roland Siegwart. Design of small
hand-launched solar-powered UAVs: From concept study to a multi-day world endurance record flight.
Journal of Field Robotics (JFR), 34(7):1352–1377, October 2017.
[31] Philipp Oettershagen, Thomas Stastny, Timo Hinzmann, Konrad Rudin, Thomas Mantel, Amir Melzer,
Bartosz Wawrzacz, Gregory Hitz, and Roland Siegwart. Robotic Technologies for Solar-Powered UAVs:
Fully-Autonomous Updraft-Aware Aerial Sensing for Multi-Day Search-and-Rescue Missions. Journal
of Field Robotics (JFR), 2018.
[32] Bandu N. Pamadi. Performance, Stability, Dynamics, and Control of Airplanes. AIAA Education
Series, 2nd edition edition, 2004.
[33] QinetiQ. QinetiQ files for three world records for its Zephyr Solar powered UAV. Press release, August
24th 2010. http://www.qinetiq.com/media/news/releases/Pages/three-world-records.aspx.
[34] Juan Carlos Rubio and Sean Kragelund. The trans-pacific crossing: Long range adaptive path planning
for UAVs through variable wind fields. In Digital Avionics Systems Conference, 2003. DASC’03. The
22nd, volume 2, pages 8–B. IEEE, 2003.
[35] Juan Carlos Rubio, Juris Vagners, and Rolf Rysdyk. Adaptive path planning for autonomous UAV
oceanic search missions. In AIAA 1st Intelligent Systems Technical Conference, pages 20–22, 2004.
[36] Johannes Schneider. The time-dependent traveling salesman problem. Physica A: Statistical Mechanics
and its Applications, 314(1-4):151–155, 2002.
[37] Sara Spangelo, Elmer Gilbert, Andy Klesh, Pierre Kabamba, and Anouck Girard. Periodic energyoptimal path planning for solar-powered aircraft. 2009.
[38] Leonard J Testa, Albert C Esterline, Gerry V Dozier, and Abdollah Homaifar. A Comparison of
Operators for Solving Time Dependent Traveling Salesman Problems Using Genetic Algorithms. 2000.
[39] A Weider, H Levy, I Regev, L Ankri, T Goldenberg, Y Ehrlich, A Vladimirsky, Z Yosef, and M Cohen.
SunSailor: Solar powered UAV. Technical report, Aerospace Engineering Faculty, Technion, 2007.
[40] Lukas Wirth. Meteorological path planning using Dynamic Programming for a solar-powered Atlanticcrossing Unmanned Aerial Vehicle. Master’s thesis, ETH Zurich, 2014.
[41] Lukas Wirth, Philipp Oettershagen, Jacques Ambuehl, and Roland Siegwart. Meteorological Path
Planning Using Dynamic Programming for a Solar-Powered UAV. In IEEE Aerospace Conference,
2015.
| 2cs.AI
|
arXiv:1709.09723v1 [stat.ME] 27 Sep 2017
1
Estimating a Separably-Markov Random Field
(SMuRF) from Binary Observations
Yingzhuo Zhang1 , Noa Malem-Shinitski2 , Stephen A Allsop3 , Kay
Tye3 and Demba Ba1
1 Harvard University, John A. Paulson School of Engineering and Applied Sciences.
2 Technische Universität Berlin.
3 Massachusetts Institute of Technology, Department of Brain and Cognitive Sciences.
Keywords: Spike rasters, Dynamics, Random field, Bayesian Estimation, associative
learning.
Abstract
A fundamental problem in neuroscience is to characterize the dynamics of spiking from
the neurons in a circuit that is involved in learning about a stimulus or a contingency. A
key limitation of current methods to analyze neural spiking data is the need to collapse
neural activity over time or trials, which may cause the loss of information pertinent
to understanding the function of a neuron or circuit. We introduce a new method that
can determine not only the trial-to-trial dynamics that accompany the learning of a contingency by a neuron, but also the latency of this learning with respect to the onset of
a conditioned stimulus. The backbone of the method is a separable two-dimensional
(2D) random field (RF) model of neural spike rasters, in which the joint conditional intensity function of a neuron over time and trials depends on two latent Markovian state
sequences that evolve separately but in parallel. Classical tools to estimate state-space
models cannot be applied readily to our 2D separable RF model. We develop efficient
statistical and computational tools to estimate the parameters of the separable 2D RF
model. We apply these to data collected from neurons in the pre-frontal cortex (PFC)
in an experiment designed to characterize the neural underpinnings of the associative
learning of fear in mice. Overall, the separable 2D RF model provides a detailed, interpretable, characterization of the dynamics of neural spiking that accompany the learning
of a contingency.
1
Introduction
A fundamental problem in the analysis of electrophysiological data from neuroscience
experiments is to determine the trial, and time within said trial, when a neuron or circuit
first exhibits a conditioned response to a stimulus. This is a challenging problem because neural spike rasters resulting from such experiments can exhibit variability both
within a given trial and across trials (Czanner et al., 2008). Fear conditioning experi-
2
ments (Allsop et al., 2014) are a prime example of a scenario when this situation arises:
a neutral stimulus, present across all trials of an experiment, gives rises to stereotypical
within-trial spiking dynamics, while the associated aversive stimulus leads to changes
in spiking dynamics across a subset of the trials.
State-of-the-art methods for analyzing neural spike rasters fall primarily within two
classes. The most pervasive class of such methods neglect the inherent two-dimensional
nature of neural spike rasters by aggregating the raster data either across time or trials,
and subsequently applying techniques applicable to one-dimensional signals (Smith &
Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012; Scott & Pillow, 2012).
In contrast to these one-dimensional methods, two-dimensional methods model both the
within and cross-trial dynamics of neural spiking (Czanner et al., 2008; Rad & Paninski, 2010). Within the class of one-dimensional methods, the past decade has seen a
growing interest in approaches based on state-space models of neural spiking activity.
These approaches treat neural spiking data as realizations of a stochastic point process
whose conditional intensity function obeys a stochastic smoothness constraint in the
form of a Markov process followed by a nonlinearity. The main challenge is to estimate
the parameters of the model, and various solutions have been proposed towards this
end (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012; Scott &
Pillow, 2012). The main drawback of one-dimensional approaches applied to the analysis of neural spike rasters is the need, preceding analysis, for aggregation across one
of the dimensions. Among one-dimensional methods, non-parametric methods based
on rank tests (e.g. Wilcoxon rank sum test) have been the most popular, primarily due
to their ease of application. In addition to the need to collapse neural activity of time
3
or trials, two common pitfalls of non-parametric methods are their reliance on large
sample assumptions to justify comparing neural spiking rates, and the need to correct
for multiple comparisons. For instance, tests that rely on estimates of the neural spiking
rate based on empirical averages are hard to justify when it is of interest to characterize
the dynamics of neural spiking at the millisecond time scale. Consider a neural spike
raster for which it is of interest to assess differences in instantaneous spiking rates between distinct time/trial pair. At the millisecond time scale, there would only be one
observation per time/trial pair, violating the large sample assumptions that such nonparametric methods rely upon. To the best of our knowledge, the work of (Czanner et
al., 2008) remains the most successful attempt to characterize simultaneously the within
and cross-trial dynamics of neural spiking. This approach uses a state-space model of
the cross-trial dynamics, in conjunction with a parametric model of the within-trial dynamics. The use of a parametric model for the within-trial dynamics is convenient because it enables the estimation of the model parameters by Expectation-Maximization
(EM), using a combination of point-process filtering and smoothing in the E-step (to
fill-in the missing cross-trial effect), and an M-step for the within-trial parameters that
resembles a GLM (Truccolo et al., 2005). The main drawbacks of this approach are,
on the one hand, the high-dimensionality of the state-space model that captures the
cross-trial dynamics, and on the other hand the lack of a simple interpretation, as in
the one-dimensional models (Smith & Brown, 2003; Zammit-Mangion et al., 2012;
Yuan et al., 2012), for the state sequence. Lastly, a two-dimensional approach based
on Gaussian processes was proposed in (Rad & Paninski, 2010). One advantage of this
approach, which is based on a Gaussian process prior of the neural spiking rate surface,
4
is its ability to model the interaction between the two dimensions through the use of a
two dimensional kernel. As is common with kernel methods, it does not scale well to
multiple dimensions.
We propose a two-dimensional (2D) random field (RF) model of neural spike rasters–
termed Separably-Markov Random Field (SMuRF)–in which the joint conditional intensity function of a neuron over time and trials depends on two latent Markovian state
sequences that evolve separately but in parallel. Conventional methods for estimating
state-space models from binary observations (Smith & Brown, 2003; Zammit-Mangion
et al., 2012; Yuan et al., 2012) are not applicable to SMuRF. We derive a Monte Carlo
Expectation-Maximization algorithm to maximize the marginal likelihood of observed
data under the SMuRF model. In the E-step, we leverage the Polya-Gamma (Polson
et al., 2013) representation of Bernoulli random variables to generate samples from the
joint posterior distribution of the state sequences by Gibbs sampling. A similar strategy was adopted in (Scott & Pillow, 2012) for a one-dimensional state-space model.
The sampler uses a highly efficient forward-filtering backward-sampling algorithm for
which the forward step can be implemented exactly and elegantly as Kalman filter, while
the backward step uses Bayes’ rule to correct the filter samples. The SMuRF model obviates the need for aggregation across either time or trials, and yields a low-dimensional
2D characterization of neural spike rasters that is interpretable in the sense that the
posterior of the two state sequences capture the variability within and across trials respectively. Moreover, being model-based, the SMuRF model, unlike non-parametric
methods, yields a characterization of the joint posterior (over all trials and time within
a trial) distribution of the instantaneous rate of spiking, thus allowing us to precisely
5
determine the dynamics of neural spiking that accompany the learning of a contingency. To demonstrate this, we apply the model to data collected from neurons in the
pre-frontal cortex (PFC) in an experiment designed to characterize the neural underpinnings of the associative learning of fear in mice. We find that the trial at which
the cortical neurons begin to exhibit a conditioned response to the auditory conditioned
stimulus is robust across cells, occurring 3 to 4 trials into the conditioning period. We
also find that the time with respect to conditioned stimulus onset when we observe a significant change in neural spiking compared to baseline activity varies significantly from
cell to cell, occurring between 20 to 600 ms after conditioned stimulus onset. These
findings are likely reflective of the variability in synaptic strength and connectivity that
accompany learning, as well as the location of the neurons in the population.
The rest of our treatment begins in Section 2 where we motivate the SMuRF model,
define it and introduce our notation. In Section 3, we present the Monte-Carlo EM
algorithm for parameter estimation in the SMuRF model, as well as our process for
inferring the dynamics of neural spiking that accompany the learning of a contingency
by a neuron. The reader may find derivations relevant to this section in the Appendix.
We present an application to the cortical data in Section 4, and conclude in Section 5.
2
Notation and SMuRF model
We begin this section with a continuous-time point-process formalism of a neural spike
raster, characterized by a trial-dependent conditional intensity function (CIF). Then, we
introduce the SMuRF model, a model for the discrete-time version of the CIF.
6
2.1
Continuous-time point-process observation model
We consider an experiment that consists of R successive trials. During each trial, we
record the activity of a neuronal spiking unit. We assume, without loss of generality, that the duration of the observation interval during each trial is (0, T ]. For trial r,
r = 1, · · · , R, let the sequence 0 < tr,s < · · · < tr,Sr < T correspond to the times of
occurrence of events from the neuronal unit, that is to say the times when the membrane
r
is the realpotential of the neuron crosses a given threshold. We assume that {tr,s }Ss=1
ization in (0, T ] of a stochastic point-process with counting process Nr (t) =
Rt
0
dNr (u),
r
where dNr (t) is the indicator function in (0, T ] of {tr,s }Ss=1
. A point-process is fully
characterized by its CIF. Let λr (t|Ht ) denote the trial-dependent CIF of dNr (t) defined
as
P [Nr (t + ∆) − Nr (t) = 1|Ht ]
,
∆→0
∆
λr (t|Ht ) = lim
(1)
where Ht is the history of the point process up to time t.
We denote by {∆Nk,r }K,R
k=1,r=1 , the discrete-time process obtained by sampling dNr (t)
at a resolution of ∆, K =
T
. Let {λk,r }K,R
k=1,r=1 denote the discrete-time, trial∆
dependent, CIF of the neuron.
2.2
Separably-Markov Random Field (SMuRF) model of within
and cross-trial neural spiking dynamics
K×R
Definition 1 Let {yk,r }K,R
be a collection of random variables. We say
k=1,r=1 ∈ R
that this collection is a separable random field if ∃ x ∈ RK , z ∈ RR s.t. ∀k, r ∃ unique
(xk , zr ) ∈ x × z s.t. yk,r |(x, z) ∼ f (xk , zr ).
7
If in addition x and z are Markov processes, we say that {yk,r }K,R
k=1,r=1 is a separablyMarkov random field or “SMuRF”.
K×R
A 2D random field {yk,r }K,R
is a collection of random variables ink=1,r=1 ∈ R
dexed over a subset of N+ × N+ . We call this collection a separable field if there exists
latent random vectors x and z (each indexed over a subset of N+ ) such that {yk,r }K,R
k=1,r=1
are independent conditioned on x and z and only a function of the outer product between x and z. If, in addition, x and z are Markov, we say that the field is a SMuRF.
Intuitively, a separable random field is a random field that admits a stochastic rank-one
decomposition.
We propose the following SMuRF model of the discrete-time, trial-dependent, CIF
{λk,r }K,R
k=1,r=1 of a neuronal spiking unit
xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )
zr = ρz zr−1 + αz uz,k + δr , δr ∼ N (0, σδ2 )
(2)
λ ∆
log 1−λk,rk,r ∆ = xk + zr
∆Nk,r |xk , zr ∼ Bernoulli(λk,r ∆)
By construction, this is a SMuRF of the trial-dependent CIF of a neuron. ux,k and
uz,k are indicator functions of presence of cue. To provide some intuition, if we assume xk + zr is small, then the SMuRF model approximates the trial-dependent CIF as
λk,r ∆ ≈ ezr · exk , that is, as the product of a within-trial component exk in units of Hz
(spikes/s) and a unitless quantity ezr . For a given trial r, ezr represents the excess spiking rate above what can be expected from the within-trial component at that trial, which
we call the cross-trial component of the CIF. The within and cross-trial components
8
from the SMuRF model are functions of two independent state sequences, (xk )K
k=1 and
(zr )R
r=1 , that evolve smoothly according to a first-order stochastic difference equation.
The parameters ρx , αx , σ2 , ρz , αz and σδ2 , which govern the smoothness of (xk )K
k=1 and
(zr )R
r=1 , must be estimated from the raster data.
Remark 1: We note that, in its generality, our model does not assume that λk,r ∆ =
ezr · exk . In our model, λk,r ∆ =
exk +zr
.
1+exk +zr
The approximation λk,r ∆ ≈ ezr · exk holds
for a neuron with small neural spiking rate (Truccolo et al., 2005).
Figure 1 shows a graphical representation of the SMuRF model as a Bayesian network. It is not mathematically possible to rewrite the state equations from the SMuRF
model in standard state-space form without increasing significantly the dimension of the
state space. We give a sketch of an argument as to why in the Appendix. Therefore, in an
Expectation-Maximization (EM) algorithm for parameter estimation, one cannot simply apply classical (approximate) binary filtering and smoothing in the E-step (Smith
& Brown, 2003). We derive a Monte-Carlo Expectation-Maximization algorithm to
maximize the likelihood of observed data under the SMuRF model, with respect to the
parameter vector θ = (ρx , αx , σ2 , ρz , αz , σδ2 ).
9
∆NK,R
zR
∆N1,R
∆N2,R
···
∆Nk,R
···
···
···
···
···
···
···
zr
∆N1,r
∆N2,r
···
∆Nk,r
···
∆NK,r
···
···
···
···
···
···
···
z1
∆N1,1
∆N2,1
···
∆Nk,1
···
∆NK,1
x1
x2
···
xk
···
xK
···
Figure 1: Representation of the SMuRF model as a Bayesian network. The SMuRF
model approximates the trial-dependent CIF the product of a within-trial component
in units of Hz (spikes/s) and a unitless quantity. The within and cross-trial compoR
nents are functions of two independent state sequences, (xk )K
k=1 and (zr )r=1 , that evolve
smoothly, each according to a first-order stochastic difference equation. Observations
from the raster are Bernoulli random variables whose probability of of occurrence is a
nonlinear function of the sum of the two sequences.
10
3
Parameter Estimation in the SMuRF by Maximum
Likelihood
3.1
Maximum Likelihood Estimation by Expectation-Maximization
Let x = (x1 , · · · , xK )T , z = (z1 , · · · , zR )T , and ∆N = {∆Nk,r }K,R
k=1,r=1 . The goal is to
maximize, with respect to θ, the likelihood L(θ|∆N) of the SMuRF model
Z
L(θ|∆N) = log p(∆N; θ) = log
p(∆N, x, z; θ)dxdz.
(3)
x,z
This is a challenging problem because of the high-dimensional integral that must be
carried out in Equation 3. We propose to maximize the likelihood by EM.
Remark 2: For the moment, we treat x and z as missing data; in the sequel, we will
augment the model with additional missing data that will simplify the EM algorithm.
Given a candidate solution θ(`) , EM (Dempster et al., 1977) maximizes L(θ|∆N) by
building a sequence of successive approximations Q(θ|θ(`) ) of L(θ|∆N) (the so-called
E-step) such that maximizing these approximations, which in general is simpler than
directly maximizing L(θ|∆N), is guaranteed to not decrease L(θ|∆N). That is, each
iteration of EM generates a new candidate solution θ(`+1) such that L(θ(`+1) |∆N) ≥
L(θ(`) |∆N). By iterating this process, EM generates a sequence of iterates {θ(`) }∞
`=1
that, under regularity conditions, converge to a local optimum of L(θ|∆N) (Dempster
et al., 1977).
In the context of the SMuRF model, the key challenge of EM is to compute Q(θ|θ(`) )
defined as
Q(θ|θ(`) ) = Ex,z log p(∆N, x, z; θ)|∆N, θ(`) ,
11
(4)
the expected value of the complete-data likelihood with respect to the joint posterior
distribution of the missing data (x, z) conditioned on the observed data ∆N and the
candidate solution θ(`) . This expectation is not tractable, i.e. it cannot be computed in
closed-form. The intractability stems not only from the lack of conjugacy between the
Bernoulli observation model and our Gaussian priors–also an issue for one-dimensional
models (Smith & Brown, 2003)–but also because, as mentioned previously, the SMuRF
model cannot be reduced to a standard state-space model. We propose to approximate
the required expectations using Markov-Chain Monte-Carlo (MCMC) samples from
p(x, z|∆N; θ(`) ). In particular, we will use Gibbs sampling (Casella & George, 1992),
a Monte-Carlo technique, to generate samples from a distribution by sampling from its
so called full conditionals (conditional distribution of one variable given all others), thus
generating a Markov chain that, under regularity conditions, can be shown to converge
to a sample from the desired distribution. Gibbs sampling is attractive in cases where
sampling from the full-conditionals is simple. However, it is prone to the drawbacks
of MCMC methods, such as poor mixing and slow convergence, particularly if one
is not careful in selecting the full-conditionals from which to generate samples from.
Two observations are in order, that will lead to the derivation of an elegant block Gibbs
sampler with attractive properties
• Conditioned on z, the joint distribution, p(∆N, x|z; θ), of x and ∆N is equivalent to the joint distribution from a one-dimensional state-space model with binary observations (Smith & Brown, 2003). By symmetry, this is also true for
p(∆N, z|x; θ). This readily motivates a block Gibbs sampler that alternates
between sampling from x|∆N; θ and z|∆N; θ. This leaves us with one chal12
lenge: how to obtain samples from the posterior distribution of the state in a
one-dimensional state-space model with Bernoulli (more generally binomial) observations?
• We introduce a new collection of i.i.d., Polya-Gamma distributed (Polson et al.,
2013) random variables w = {wk,r }K,R
k=1,r=1 , such that sampling from x|∆N, w; θ
is equivalent to sampling from the posterior of the state in a linear Gaussian
state-space model (we will prove this in the Appendix) using a forward-filtering
backward-sampling algorithm (Frühwirth-Schnatter, 1994). Moreover, it has been
shown that the Gibbs sampler based on this Polya-Gamma augmentation scheme (Choi
& Hobert, 2013) is uniformly ergodic and possesses superior mixing properties to
alternate data-augmentation scheme for logit-based models (Polson et al., 2013;
Choi & Hobert, 2013). The intuition behind the introduction of the Polya-Gamma
random variables is the following: they are missing data that, if we could observe,
would make the Bernoulli observations Gaussian. Stated otherwise, the PolyaGamma random variables are scale variables in a Gaussian scale mixture (Andrews & Mallows, 1974) representation of Bernoulli random variables.
Remark 3: The random vector w in the preceding bullet point is the vector additional
missing data alluded to in Remark 2.
Together, these two observations form the basis of an efficient block-Gibbs sampler we
use for maximum-likelihood estimation of the parameters from the SMuRF model by
Monte-Carlo EM, also referred to as empirical Bayes (Casella, 2001). We introduce
the basic ideas behind PG augmentation and its utility in Bayesian estimation for logitbased models. In the Appendix, we provide detailed derivations for the PG sampler
13
adapted to the SMuRF model.
3.2
Polya-Gamma augmentation and sampling in one dimension
Let ∆N ∈ {0, 1} and X ∈ R and suppose that, conditioned on X = x, ∆N is Bernoulli
with mean
ex
,
1+ex
i.e.
p(∆N |x) =
(ex )∆N
1 + ex
(5)
We begin with a definition of Polya-Gamma (PG) random variables, followed by a
PG augmentation scheme for the Bernoulli/binomial likelihood. We will see that the
augmentation scheme leads to an attractive form for the posterior of x given the observation ∆N and the augmented variable. Finally, we will see that the posterior of the
augmented variable itself follows a PG distribution. Our treatment follows closely that
of (Choi & Hobert, 2013).
Definition of Polya-Gamma random variables: Let {Em }∞
m=1 be a sequence of i.i.d.
exponential random variable with parameter equal to 1. The random variable
d
W =
∞
Em
2 X
π 2 m=1 (2m − 1)2
(6)
d
follows a PG(1,0) distribution, where = denotes equality in distribution. The moment
generating function of W is
−tW
E[e
] = cosh
−1
√
t
.
2
(7)
An expression for its density pW (w), expressed as an infinite sum, can be found in (Choi
& Hobert, 2013) and (Polson et al., 2013). The PG(1,c) random variable is obtained by
exponential tiling of the density of a PG(1,0) random variable. Letting pW (w|c) denote
14
the density of a PG(1,c) random variable,
pW (w|c) = cosh
c
2
e−
c2 w
2
pW (w).
(8)
PG augmentation preserves the Bernoulli likelihood: Following the treatment of (Choi
& Hobert, 2013), conditioned on X = x, let W be a PG(1,|x|) random variable. Further
suppose that, conditioned on X = x, ∆N and W are independent. Then
p(∆N, w|x) = p(∆N |x)pW (w|x).
(9)
Integrating out W , we see that the augmentation scheme does not alter p(∆N |x). One
may then ask, what is the utility of the augmentation scheme? The answer lies in the
following identity, discussed in detail in (Choi & Hobert, 2013), and which is the key
ideal behind PG augmentation
(ỹ−x)2
(ex )∆N
− 21 1/w
·
PG(1,
|x|)
∝
e
∝N
p(∆N |x)pW (w|x) =
1 + ex
where ỹ =
y− 12
w
1
ỹ; x,
w
,
(10)
, and ∝ indicates that we are dropping terms independent of x. Equa-
tion 10 states that, given X = x and a logit model, a Bernoulli random variable is, up to
a constant independent of x, a scale mixture of Gaussian (Andrews & Mallows, 1974),
i.e. a Gaussian random variable with random variance 1/w, where W = w follows a
PG distribution (Polson et al., 2013; Choi & Hobert, 2013). If we assume X ∼ pX (x),
then (Choi & Hobert, 2013)
1
p(∆N, x, w) = p(∆N |x, w)pW (w|x)pX (x) ∝ N ỹ; x,
pX (x).
w
(11)
Implications of augmentation on p(x|∆N, w) and p(w|∆N, x):
p(∆N, x, w)
p(x|∆N, w) =
∝ p(∆N |x, w)pW (w|x)pX (x) ∝ N
p(∆N, w)
1
ỹ; x,
w
pX (x),
(12)
15
where we make use of Equation 11. If X is Gaussian, then p(x|∆N, w) is Gaussian and
available in closed-form! (Appendix).
pW (w|∆N, x) =
p(∆N, x, w)
p(∆N |x)pW (w|x)pX (x)
=R
= pW (w|x),
p(∆N, x)
p(∆N
|x)p
(w|x)p
(x)
W
X
w
(13)
i.e. p(w|∆N, x) = pW (w|x) = PG(1, |x|). Together, Equations 12 and 13 form the
basis of a uniformly ergodic (Choi & Hobert, 2013) Gibbs sampler to obtain sample
from p(x, w|∆N ).
3.3
Block Gibbs sampler for PG-augmented SMuRF model
Consider the following version of the SMuRF model with PG augmentation:
xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )
zr = ρz zr−1 + αz uz,k + δr , δr ∼ N (0, σδ2 )
x +zr
e k
λk,r ∆ = 1+e
xk +zr
∆Nk,r |xk , zr ∼ Bernoulli(λk,r ∆)
wk,r |xk , zr ∼ PG(1, |xr + zr |), k = 1, · · · , K; r = 1, · · · , R.
(14)
We can apply the basic results from the previous subsection to derive the following
result (proof in Appendix):
Theorem 2 Suppose w, x, z and ∆N come from the PG-augmented SMuRF model
(equation ), then p(∆N, x|w, z; θ) is equivalent in distribution to the following linearGaussian state-space model
xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )
∆Ñk,r = xk + zr + ṽk,r , ṽk,r ∼ N (0, wk,r −1 ), i.i.d. , r = 1, · · · , R
1
∆Ñk,r = ∆Nk,r − 2 .
wk,r
16
(15)
Following the discussion from the previous subsection, it is not hard to see that such a
result would hold. The proof of this result is in the appendix, as well as the derivation of
an elegant forward-filtering backward-sampling algorithm (Frühwirth-Schnatter, 1994)
for drawing samples from p(∆N, x|w, z; θ). By symmetry, it is not hard to see that a
similar result holds for p(∆N, z|w, x; θ).
Block Gibbs sampling from PG-augmented SMuRF model: The E-step of the MonteCarlo EM algorithm consists in sampling from p(x, z|∆N; θ(`) ) by drawing from p(x, z, w|∆N ; θ(`) )
using a block Gibbs sampler that uses the following full-conditionals
• p(x|∆N, w, z; θ(`) ), which according to the theorem above is equivalent to the
posterior distribution of the state sequence in a linear-Gaussian state-space model.
• p(z|∆N, w, x; θ(`) ), which obeys properties similar to the previous full-conditional
(by symmetry).
• p(wk,r |x, z) = p(wk,r |xk , zr ) = PG(1, |xk +zr |), k = 1, · · · , K, r = 1, · · · , R (Polson et al., 2013).
In the Appendix, we detail how we initialize the algorithm and monitor convergence.
In practice, we found that estimating ρx and ρz is difficult. We hypothesize that
including those parameters yields an unwieldy likelihood function. In the results we
report, we assume ρx = ρz = 1, αx = αz = 0 and focus on estimating a simple
model with two parameters σ2 and σδ2 . The assumption ρx = ρz = 1 gives the random
walk priors more freedom, thus allowing us to be capture the variability of the within
17
and cross-trial processes. We have run simulations, not reported here, that show that the
joint estimation of σδ2 , σ2 , αx and αz is stable and that our EM algorithm converges. This
demonstrates the ability of the SMuRF model (Equation (14)) to incorporate exogenous
input stimuli.
Assuming ρx = ρz = 1, in the M-step, the update equations for the parameters σ2 , σδ2 ,
αx and αz follow standard formulas (Smith & Brown, 2003)
PK
αx(`+1) =
k=1
PR
αz(`+1) =
r=1
Ex xk − xk−1 |∆N, θ(`) ux,k
,
PK 2
k=1 ux,k
Ez zr − zr−1 |∆N, θ(`) uz,r
,
PR 2
r=1 uz,r
#
K
1 X
= Ex
(xk − xk−1 − αx(`+1) uz,k )2 |∆N, θ(`) ,
K k=1
"
#
R
1X
= Ez
(zr − zr−1 − αz(`+1) uz,k )2 |∆N, θ(`) ,
R r=1
(16)
(17)
"
σ2(`+1)
2(`+1)
σδ
(18)
(19)
where we set x0 = z0 = 0, and we approximate the expectations with respect to
p(x|∆N, θ(`) ) and p(z|∆N, θ(`) ) using Gibbs samples from the E-step.
3.4
Assessment of within-trial and cross-trial spiking dynamics
Bayesian estimation of the SMuRF model (Equation (14)) enables us to infer detailed
changes in neural dynamics, in particular to extract the within-trial and cross-trial components of the neural spiking dynamics that accompany the learning of a contingency by
a neuron. This is because, following estimation, inference in the SMuRF model yields
the joint posterior distribution of the instantaneous spiking rate of a neuron as a function of trials, and time within a trial, conditioned on the observed data. We can use this
posterior distribution, in turn, to assess instantaneous changes in neural spiking dynam-
18
ics, and without the need to correct for multiple comparisons as with non-parametric
methods.
In what follows, we let p(x, z|∆N ; θ̂M L ) denote the posterior distribution of x and
z, given the raster data ∆N and the maximum likelihood estimate θ̂M L of θ. In what
follows, it is understood that we use Gibbs samples (xi , zi )ni=1 from p(x, z|∆N ; θ̂M L )
to obtain an empirical estimate of the distribution.
Posterior distribution of the joint CIF over time and trials: We can use these posterior samples to approximate the posterior distribution, at θ̂M L , of any quantities of
interest. Indeed, it is well known from basic probability that if (xi , zi ) is a sample from
p(x, z|∆N ; θ̂M L ), then f (xi , zi ) is a sample from p(f (x, z)|∆N ; θ̂M L ). In particular, if
the instantaneous spiking rate of a neuron a time k and trial r λk,r ∆ =
exk +zr
,
1+exk +zr
we can
use the Gibbs samples to approximate the joint posterior distribution of {λk,r ∆}K,R
k=1,r=1
given ∆N and θ̂M L .
Let {λpk,r ∆}K,R
k=1,r=1 be the random variable that represents the a posteriori instantaneous
spiking rate of the neuron at time trial r and time k within that trial. The superscript ‘p’
highlights the conditioning on the data ∆N and θ̂M L , and the fact that this quantity is a
function of (x, z) distributed according to p(x, z|∆N ; θ̂M L ).
Within-trial effect: We define the within-trial effect as the a posteriori instantaneous
spiking rate at time k, average over all trials
R
eWT
k =
1X p
λ (xk , zr ), k = 1, · · · , K.
R r=1 k,r
(20)
It is important to note that the averaging is performed after characterization of the joint
19
CIF as a function of time and trials, which is not the same as first aggregating the
data across trials and applying one of the one-dimensional methods for analyzing neural data (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan et al., 2012). In
practice, every Gibbs sample pair (xi , zi ), i = 1, · · · , n leads to a scalar quantity
R
1X
=
λk,r (xi,k , zi,r ), k = 1, · · · , K.
R r=1
êWT
i,k
(21)
Performing this computation over all Gibbs samples and times k = 1, · · · , K leads to a
T K
joint empirical distribution for the within-trial effect {eW
k }k=1 .
Cross-trial effect: We define the cross-trial effect as the a posteriori excess instantaT
neous spiking at trial r and time k (above the within-trial effect effect eW
k ) averaged
across all times k
eCT
r
p
K
1 X λk,r (xk , zr )
, r = 1, · · · , R.
=
T
K k=1
eW
k
(22)
In practice, every Gibbs sample pair (xi , zi ), i = 1, · · · , n leads to a scalar quantity
êCT
i,r
K
1 X λk,r (xi,k , zi,r )
=
, r = 1, · · · , R.
T
K k=1
êW
i,k
(23)
Performing this computation over all Gibbs samples and Rc trials of interest, r =
R − Rc + 1, · · · , R, leads to a joint empirical distribution for the cross-trial effect
R
{eCT
r }r=R−Rc .
Remark 4: The following paragraph explains the meaning of Rc in the context of an
associative learning experiment.
3.5
Assessment of neural spiking dynamics across time and trials
Consider an associative learning (conditioning) experiment characterized by the pairing
of a conditioned stimulus (e.g. auditory) to an aversive stimulus (e.g. a shock). Let
20
Rc be the number of conditioning trials and Kh the length of the habituation period.
Gibbs samples from the SMuRF model (Equation (14)) paramaterized by θ̂M L let us
approximate the a posteriori probability that the spiking rate at a given point (Point C
in Figure 2) during one of the conditioning trials (trials 16 through 45 in this example) is
bigger than the baseline spiking rate at that trial (Region A in Figure 2) and the average
spiking rate at the same time during the habituation period (Region B in Figure 2). This
yields a probabilistic description of the the intricate dynamics of neural spiking that
accompany the learning of the contingency by a neuron. Let
Average rate in Region A
z
}|
{
R
c
X
1
p
p
λ (xk , zm )
Event U = λk,r (xk , zr ) >
Rc m=1 k,m
Average rate in Region B
z
}|
{
K
h
X
1
p
p
Event V = λk,r (xk , zr ) >
λ (xs , zr )
Kh s=1 s,r
(24)
(25)
For a given pair (k, r) s.t. k ≥ Kh , r ≥ Rc , this probability is
P [Event U ∩ Event V]
(26)
n
1X
≈
I
n i=1 {λpk,r (xi,k ,zi,r )> R1c
R
Pc
m=1
p
p
λk,m (xi,k ,zi,m )∩λk,r (xi,k ,zi,r )> K1
K
Ph
h s=1
p
, (27)
λs,r (xi,s ,zi,r )}
where the second line approximates the probability of the event of interest using its
frequency of occurrence in the n posterior samples. As we demonstrate in the following
section, we thus obtain an detailed characterization of the dynamics of neural spiking
that accompany learning.
In the following section, we use simulated and real data examples to demonstrate the
utility of the SMuRF model (Equation (14)) for the characterization of detailed neural
spiking dynamics.
21
45
C: Trial r at time k
Cue
A: Baseline during
conditioning
B: Average response
at time k
during habituation
41
36
Trials
31
26
C
21
A
16
11
B
6
1
-500
0
500
1000
1500
Time (ms)
Figure 2: Regions defined to quantify changes in neural spiking dynamics in an associative learning experiment. The SMuRF model lets us approximate the a posteriori
probability that the spiking rate at a given point C during one of the conditioning trials
(trials 16 through 45 in this example) is bigger than the baseline spiking rate at that
trial (Region A) and the average spiking rate at the same time during the habituation
period (Region B). This yields a probabilistic description of the the intricate dynamics
of neural spiking that accompany the learning of the contingency in the experiment by
a neuron.
4
4.1
Applications
Simulation studies
We simulated neural spike raster data from a neuron that exhibits a conditioned response
to the conditioned stimulus (Figure 4) in an associative learning experiment. The exper-
22
iment consists of 45 trials, each of which lasts 2 s. The conditioned stimulus becomes
active 1 s into a trial, while the aversive stimulus becomes active after trial 15. We obtain the simulated data by dividing the raster into two pre-defined regions as shown in
Figure 3. Region A consists of all trials before trial 16, along with the period from all
trials before the conditioned stimulus is presented. We assume that the rate of spiking
of the neuron is λA = 60 Hz. Region B consists of the period from trials following trial
15 after the conditioned stimulus is presented. The rate of spiking of the neuron in this
region is λB = 20 Hz.
We applied the SMuRF model (Equation (14)) to the analysis of this simulated neural spike raster. Figure 4(a) shows that, during conditioning, learning is accompanied by
a doubling of the spiking rate above the within-trial spiking rate of the neuron. Indeed,
the left hand panel of the figure shows the cross-trial effect which, following conditioning, increases above its average initial value of ≈ 1 to ≈ 2. Figure 4(b) provides a more
detailed characterization of the neural spiking dynamics. With probability close to 1,
the spiking rate at a given time/trial pair–following the conditioned stimulus and during
conditioning (Figure 2 C)–is bigger than the average rate at the same trial (Figure 2
A) and the average rate at the same time (Figure 2 B). We conclude that, with high
probability, the simulated neuron exhibits a conditioned response to the conditioned
stimulus.
4.2
Neural dynamics during associative learning of fear
Basic experimental paradigm: The ability to learn through observation is a powerful means of learning about aversive stimuli without direct experience of said stimuli.
23
45
41
36
Region A:
Trials
31
λA = 60 Hz
26
21
16
Region B:
λB = 20 Hz
11
6
1
-1000
-500
0
500
1000
Time (ms)
Figure 3: Set up used to simulate neural spike raster data from a neuron that exhibits a
conditioned response to the conditioned stimulus in an associative learning experiment.
The experiment consists of 45 trials, each of which lasts 2 s. The conditioned stimulus
becomes active 1 s into a trial, while the aversive stimulus becomes active from the 16th
trial onwards. An idealized neuron that exhibits a conditioned response would exhibit
two distinct regions of activity. Region A consists of all trials preceding trial 16, along
with the period from all trials before the conditioned stimulus is presented. We assume
that the rate of spiking of the neuron is λA = 60 Hz. Region B consists of the period
from trials following trial 15 after the conditioned stimulus is presented. The rate of
spiking of the neuron in this region is λB = 20 Hz.
We use the SMuRF model (Equation (14)) to analyze data from a fear conditioning
paradigm designed to elucidate the nature of the circuits that facilitate the associative learning of fear. The experimental paradigm is described in detail in (Allsop et
24
Trials
45
41
36
31
26
21
16
11
6
1
45
41
36
31
26
21
16
1.0
0.8
0.6
0.4
0.2
0
-1000 -500
2
1
0
500 1000
Time (ms)
(b)
0
Rate
(Hz)
Trial Effect
60
40
20
0
-1000
-500
0
500
1000
Time (ms)
(a)
Figure 4: (a) Simulated neural spike raster, along with estimated within and cross trial
effects from the SMuRF model. The horizontal red line indicates the beginning of
conditioning. The vertical green line indicates the onset of the conditioned stimulus.
The left panel of the figure shows the cross-trial effect which, following conditioning,
increases above its average initial value of ≈ 1 to ≈ 2. (b) Empirical probability that
spiking rate at a given trial and time is bigger than the average rate at the same trial
and the average rate during habituation at the same time. With probability close to 1,
the spiking rate at a given time/trial pair–following the conditioned stimulus and during
conditioning (Figure 2 C)–is bigger than the average rate at the same trial (Figure 2 A)
and the average rate at the same time (Figure 2 B)
al., 2017). Briefly, an observer mouse observes a demonstrator receive conditioned
stimulus-shock pairings through a perforated transparent divider. The experiment consists of 45 to 50 trials, divided into two phases. During the first 15 trials of the exper25
iment, termed the habituation period, both the observer and the demonstrator simply
hear an auditory conditioned stimulus. From the 16th trial onwards, the auditory conditioned stimulus is followed by the delivery of a shock to the demonstrator. The data are
recorded from the pre-frontal cortex (PFC) of the observer mouse.
Results: Figure 5(a) shows the within and cross-trial effects estimated using the SMuRF
model applied to a cortical neuron from the experiment described above. The estimated
within-trial (bottom) and cross-trial (left) components indicate significant changes respectively in response to the conditioned stimulus and to conditioning. By definition
(Equation 22), the cross-trial effects takes into account the increase in spiking rate due
to the presentation of the conditioned stimulus. The bottom panel suggests that this
neuron exhibits a delayed response to the conditioned stimulus, beginning at ≈ 400 ms
following conditioned stimulus presentation. Accounting for this increase in withintrial spiking rate due to the conditioned stimulus, the left panel shows a multiplicative
increase in spiking rate due to conditioning from an average initial value of ≈< 1 (indicative of suppression, as can be seen through the sparseness of the raster during trials
1 through 5) to a peak average value of ≈ 4 at trial 23. This increase, however, does
not persist as in the case of the simulated data (Figure 4), suggesting that conditioning
is accompanied by intricate dynamics in neural modulation.
26
Trials
45
41
36
31
26
21
16
11
6
1
45
41
36
31
26
21
16
1.0
0.8
0.6
0.4
0.2
0
-500
0
500 1000 1500
Time (ms)
(b)
8 6 4 2 0
Rate
(Hz)
Trial Effect
15
10
5
0
-500
0
500
1000
1500
Time (ms)
(a)
Figure 5: (a) Raster, along with SMuRF within and cross-trial components, from a
cortical neuron that exhibits a conditioned response to the conditioned stimulus. The
horizontal red line indicates the beginning of conditioning. The vertical green line indicates conditioned stimulus onset. The bottom panel suggests that this neuron exhibits
a delayed response to the conditioned stimulus, beginning at ≈ 400 ms following conditioned stimulus presentation. Accounting for this increase in within-trial spiking rate
due to the conditioned stimulus, the left panel shows a multiplicative increase in spiking
rate due to conditioning from an average initial value of ≈< 1 (indicative of suppression, as can be seen through the sparseness of the raster during trials 1 through 5) to a
peak average value of ≈ 4 at trial 23. This increase, however, does not persist as in the
case of the simulated data (Figure 4).
Figure 5 (b) provides a more detailed characterization of the neural spiking dynamics of this neuron. The figure shows the evolution, as a function of time and trials, of
27
Figure 5: (b) Empirical probability that spiking rate at a given trial in and time is bigger
than the average rate at the same trial and the average rate during habituation at the
same time (refer to Figure 2). This panel indicates that this neuron exhibit a delayed
conditioning to the conditioned stimulus (beginning ≈ 400 ms following conditioned
stimulus presentation) and that the extent of the condition is highest first between trials
18 and 24 and then between trials 31 and 41. Panel (a), and panel (b) in particular,
suggest that conditioning is accompanied by intricate dynamics in neural modulation.
the probability that the spiking rate at a given time/trial pair (Figure 2 C) is bigger than
the average rate at the same trial (Figure 2 A) and the average rate at the same time
(Figure 2 B). The figure indicates that this neuron exhibit a delayed conditioning to the
conditioned stimulus (beginning ≈ 400 ms following conditioned stimulus presentation) and that the extent of the condition is highest first between trials 18 and 24 and
then between trials 31 and 41.
Figure 6 shows an application of the SMuRF model (Equation (14)) to a cortical
neuron that does not exhibit a conditioned response to the conditioned stimulus. The
bottom of panel (a) indicates no significant increase in the within-trial spiking rate in
response to the conditioned stimulus, while the left panel shows that the cross-trial effect
remains constant throughout the experiment an average value of ≈ 1. This indicates
that conditioning does not result in a significant increase in spiking rate. Panel (b)
corroborates these findings: for all points C following the conditioned stimulus and
during conditioning, there is a small probability that the instantaneous spiking rate is
significantly different from the average spiking rates in Regions A and B.
28
Trials
50
46
41
36
31
26
21
16
11
6
1
50
46
41
36
31
26
21
16
1.0
0.8
0.6
0.4
0.2
0
-500
6
4
2
0
500 1000 1500
Time (ms)
(b)
0
Rate
(Hz)
Trial Effect
5
0
-500
0
500
1000
1500
Time (ms)
(a)
Figure 6: (a) Raster, along with SMuRF within and cross-trial components, from a cortical neuron that does not exhibit a conditioned response to the conditioned stimulus.
The horizontal red line indicates the beginning of conditioning. The vertical green line
indicates the onset of the conditioned stimulus. This neuron does not exhibit a conditioned response to the conditioned stimulus. The bottom of the panel indicates no
significant increase in the within-trial spiking rate in response to the conditioned stimulus, while the left panel shows that the cross-trial effect remains constant throughout
the experiment an average value of ≈ 1. This indicates that conditioning does not result
in a significant increase in spiking rate.
Figures 10 and 11 show results for two additional cortical neurons that exhibit a transient conditioned response to the conditioned stimulus.
29
Figure 6: (b) Empirical probability that spiking rate at a given trial and time is bigger
than the average rate at the same trial and the average rate during habituation at the same
time This panel corroborates the observations from panel (a): for all points C following
the conditioned stimulus and during conditioning, there is a small probability that the
instantaneous spiking rate is significantly different from the average spiking rates in
Regions A and B.
Using SMuRF inference to determine a neuron’s learning time and trial The
power of the Bayesian approach, and the SMuRF model (Equation (14)) in particular, lies in the fact that it lets us approximate the a posteriori probability that the spiking
rate at a given point (point C in Figure 2) during one of the conditioning trials (trials 16
through 45 in this example) is bigger than the baseline spiking rate at that trial (Region
A in Figure 2) and the average spiking rate at the same time during the habituation period (Region B in Figure 2) (Equation 27). This yields an instantaneous probabilistic
quantification of the extent of learning for any given time and trial pair.
Panel (b) of Figures 5, 6, 10 and 11 provide a detailed characterizations of the dynamics of learning and its extent for all times following the onset of the conditioned
stimulus, all conditioning trials.
Here, we provide some guidance for practitioners to summarize the results of our
inference to a single learning time/trial pair. We would like to stress, however, that the
power of our methods lies in the detail provided by panel (b) of Figures 5, 6, 10 and 11.
Since the SMuRF model enables us to compute a empirical probability that the spiking
rate at a given time/trial pair (Figure 2, Point C) is bigger than the average rate at the
same trial (Figure 2, Region A) and the average rate at the same time (Figure 2, Region
30
B), we can identify learning time and learning trial for each neuron by finding the first
time after cue and after conditioning that this probability exceeds a certain threshold.
Table 1 reports the learning time and trial computed using a threshold of of 95%. Note
that the learning time is computed with respect to the onset of the conditioned stimulus
(time = 0 ms).
Learning
Neuron in
Neuron in
Neuron in
Neuron in
Figure 5
Figure 6
Figure 10
Figure 11
617
1316
202
20
16
34
18
18
time (ms)
Learning
trial
Table 1: Learning trial and time computed for the cortical neurons analyzed. The learning times and trials reported are consistent with the detailed inference provided by the
respective Figures for these neurons. The cortical unit from Figure 5, for instance,
shows a delayed response, significant 617 ms after conditioned stimulus onset and at
trial 16. The cortical unit from Figure 6 only exhibits a significant change in neural
spiking 1316 ms following the conditioned stimulus and at trial 34. This is consistent
with our previous observation from Figure 6 that this neuron does not exhibit a conditioned response to the stimulus.
The learning times and trials reported in Table 1 are consistent with the detailed
inference provided by the respective Figures for these neurons. Indeed, the cortical unit
from Figure 5 shows a delayed response, significant 617 ms after conditioned stimulus
onset and at trial 16. The cortical unit from Figure 6 only exhibits a significant change
31
in neural spiking 1316 ms following the conditioned stimulus and at trial 34. This is
consistent with our previous observation from Figure 6 that this neuron does not exhibit
a conditioned response to the stimulus.
In the Appendix, we perform a simulation that demonstrates the ability of SMuRF
inference to identify learning time and trial when learning of a contingency is accompanied by sustained changes in neural spiking following conditioned stimulus onset and
during conditioning. We also demonstrate through simulation that the SMuRF model is
robust to the presence of error trials.
4.3
Application of SMuRF model to a non-separable example
We demonstrate the limitations of the separability assumption in the SMuRF model
(Equation (14)) by applying it to the neural spike raster data from (Czanner et al., 2008).
We briefly describe the experiment here and refer the reader to (Wirth et al., 2003) for
a more detailed description. Panel (a) of Figure 7 shows neural spiking activity from
a hippocampal neuron recorded during an experiment designed for a location-scene
association learning task. The same scene was shown to a Macaque monkey across 55
trials, and each trial lasted 1700 ms. The first 300 ms of every trial is fixation period,
and the scene is presented to the monkey from 300 to 500 ms. A delay period takes
place from 800 to 1500 ms, followed by a response period from 1500 to 1700 ms.
The data from the experiment are shown in the center of panel (a) from Figure 7.
The raster suggests that the time and trial-dependent CIF of this neuron is not separable.
this Intuitively, this can be seen from the fact that the region in which there are significant changes in neural spiking does not follow the rectangular form from Figure 3.
32
Nevertheless, the CIF could be well approximated by a separable model. We apply the
SMuRF model to these data to uncover some of its limitations in non-separable settings.
The bottom panel of Figure 7(a) shows the estimate of the within-trial effect from the
SMuRF model, while the left panel shows the cross-trial effect. These two figures indicate that the SMuRF model is able to capture within and cross-trial dynamic changes
in the spiking activity of the neuron. Figure 7(b) shows the estimate of the a-posteriori
mean instantaneous spiking rate {λ̂pk,r ∆}K,R
k=1,r=1 (in Hz) of the neuron at time trial r
and time k within that trial. This figure shows that, while the SMuRF model is able
to characterize the detailed changes in spiking dynamics, it does not fully capture the
non-separable nature of the raster data.
Remark 5: Unlike for the cortical neurons, this experiment does not have a condition-
Trials
ing period. That’s why, it does not make sense to generate plots such as Figure 5(b).
55
51
46
41
36
31
26
21
16
11
6
1
160
140
120
100
80
60
40
20
3 2 1 0
-300 0
Rate
(Hz)
Trial Effect
12001500
Time (ms)
(b)
60
40
20
0
-300
500
0
500
1200 1500
Time (ms)
(a)
Figure 7: Application of the SMuRF model to neural spiking activity from a hippocampal neuron recorded during an experiment designed for a a location-scene association
learning task.
33
Figure 7: The green lines represent the end of the fixation, scene presentation and delay
periods respectively. (a) Neural spike raster from the hippocampal neuron. The bottom
panel shows the estimate of the within-trial effect from the SMuRF model, while the left
panel shows the cross-trial effect. (b) Estimate of the a-posteriori instantaneous spiking
rate {λ̂pk,r ∆}K,R
k=1,r=1 (in Hz) of the hippocampal neuron at time trial r and time k within
that trial. This figure shows that, while the SMuRF model is able to characterize the
detailed changes in spiking dynamics of this neuron during the task, it fails to capture
the non-separable nature of the raster data.
5
Conclusion
We proposed a 2D separably-Markov random field (SMuRF) for the analysis of neural
spike rasters that obviates the need to aggregate data across time or trials, as in classical
one-dimensional methods (Smith & Brown, 2003; Zammit-Mangion et al., 2012; Yuan
et al., 2012), while retaining their interpretability. The SMuRF model approximates
the trial-dependent conditional intensify function (CIF) of a neuron as the product of a
within-trial component, in units of Hz (spikes/s), and a unitless quantity, which we call
the cross-trial effect, that represents the excess spiking rate above what can be expected
from the within-trial component at that trial. One key advantage of our 2D model-based
approach over non-parametric methods stems from the fact that it yields a characterization of the joint posterior (over all trials and times within a trial) distribution of the
instantaneous rate of spiking of as a function of both time and trials given the data. This
not only obviates the need to correct for multiple comparisons, but also enables us to
compare the instantaneous rate of any two trial time pairs at the millisecond resolution,
34
where non-parametric methods break down because the sample size is 1.
We applied the SMuRF model to data collected from neurons in the pre-frontal cortex (PFC) in an experiment designed to characterize the neural underpinnings of the
associative learning of fear in mice. We found that, as a group, the recorded cortical
neurons exhibit a conditioned response to the auditory conditioned stimulus, occurring 3 to 4 trials into conditioning. We also found intricate and varied dynamics of
the extent to which the cortical neurons exhibit a conditioned response (e.g. delays,
short-term conditioning). This is likely reflective of the variability in synaptic strength,
connectivity and location of the neurons in the population.
In future work, we plan to investigate non-separable random field models of neural
spike rasters, such as Markov random fields (Besag, 1974) (MRFs). Compared to the
SMuRF model, MRFs are 2D models for which the dimensionality of the putative statespace is as large as the dimensionality of the raster, suggesting that MRFs may provide
a more detailed characterizations of neural spike rasters. Indeed, the SMuRF model
makes the strong assumption that the neural spiking dynamics are decomposable into
two time scales, with the additional simplifying assumption that there is only one component per time scale. This simplifying assumption is motivated by one-dimensional
state-space models of neural data (Smith & Brown, 2003) in which a neuron’s timedependent CIF is only a function of one hidden state sequence. We will investigate the
inclusion of additional components in future work. We also plan to investigate analogues of the SMuRF model for population level data. MRFs, multi-component and
population-level SMuRF models, naturally lead to model selection problems, and to the
investigation of tools, based on sequential Monte-Carlo methods (Chopin et al., 2013)
35
(aka particle filters), to compare state-space models of neural spike rasters (such as
one-dimensional models (Smith & Brown, 2003), the SMuRF model, and MRFs). The
development of such tools for model comparisons is, in our opinion, the ultimate measure of the ability of different models to capture the intricate dynamics present in neural
spike rasters. Lastly, as previously mentioned, the SMuRF model can be interpreted
as a two-dimensional Gaussian process prior on the neural spiking rate surface (Rad &
Paninski, 2010), with a separable kernel that is the Kronecker product of kernels from
Gauss-Markov processes (one process for each dimension). The choice of kernels in
the SMuRF model leads to the very efficient algorithms for estimation and inference
derived in this article. Moreover, these algorithms scale well to more than two dimensions unlike classical kernel methods. We plan to explore this connection to Gaussian
process inference in future work.
Acknowledgements
We would like to thank Dr. Anne C. Smith for her generous feedback on this manuscript
and extensive discussions regarding the SMuRF model. Demba thanks the Alfred P.
Sloan Foundation. K.M.T. is a New York Stem Cell Foundation–Robertson Investigator
and McKnight Scholar and this work was supported by funding from the JPB Foundation, the PIIF and PIIF Engineering Award, PNDRF, JFDP, Alfred P Sloan Foundation,
New York Stem Cell Foundation, McKnight Foundation, R01-MH102441-01 (NIMH),
RF1-AG047661-01 (NIA), R01-AA023305-01 (NIAAA) and NIH Directors New Innovator Award DP2-DK-102256-01 (NIDDK).
36
Appendix
The SMuRF model cannot be converted easily to a standard statespace model
We focus on the simple case when ρx = ρz = 1, and αx = αz = 0
x =x
+ , ∼ N (0, σ 2 ), k = 1, · · · , K
k
k−1
k
k
zr = zr−1 + δr , δr ∼ N (0, σδ2 ), r = 1, · · · , R
Let t = (r − 1) × K + k, r = 1, · · · , R, k = 1, · · · , K. The index t is obtained by
“unstacking” the raster trials and serializing them.
The question we ask is whether the state equations from the SMuRF model can be
turned into ones of the form
st = Ast−1 + vt ,
(28)
where st ∈ R2 . Let st,1 and st,2 denote the first and second components of st respectively. We ask that st ∈ R2 because of the two dimensions present in the SMuRF
model. Allowing the dimensionality of st to increase up to K would allow a representation of the form of Equation 28. However, this would become a very high-dimensional,
unwieldy state-space model.
Intuitively, this cannot be done for the following reason: the dimensionality of the
latent states in the SMuRF model is K + R, while the dimensionality of the state sequence in Equation 28 is 2 × (K × R). For there to be an equivalence, the sequence st
must necessarily be redundant, i.e. some of the states must be copies of previous states.
Storing these copies, would necessarily mean having to increase the dimensionality of
the state space!
37
xt−(d Kt e−1)×K
∈ R2 . The quantity t gives the trial index r correLet st =
K
zd t e
K
sponding time index t. The within-trial index corresponding to index t is then obtained
by substracting (r − 1) × K from
t.
x1
x1
and sK+1 = . In general, st,1 = st0 ,1 = xk0
Note, for instance, that s1 =
r1
r2
for some 1 ≤ k0 ≤ K if and only if t > t0 s.t. t − t0 = p × K for some integer p,
where we assume without loss of generality that t > t0 . That is, two different indices t
and t0 share the same within-trial component if and only if they are apart by an integer
multiple of K. Stated otherwise, the first component of st exhibit circular symmetry!
Therefore, for Equation 28 to hold, st−1,1 must equal st,1 , which is not possible because
t and t − 1 are not apart by an integer multiple of p!
The argument above shows that, in order to write the SMuRF state equations in the
form of Equation 28, one would need to augment the state st to dimension K +1, which
would lead to a very high dimensional standard state-space model, thus increasing the
complexity of performing inference.
Derivation of Gibbs sampler for PG-augmented SMuRF model
We first derive Theorem 2, which leads to the forward-filter backward-sampling algorithm from the full-conditionals for x and z in the Gibbs sampler.
Since wk,r |xk , zr is drawn from a PG distribution, we can write the log pdf of
wk,r |xk , zr as,
38
!
∞
x2
(2i+1)2
X
k wk,r
(2i
+
1)
xk + zr
−
−
2
+ log
(−1)i p
log p(wk,r |xk , zr ) = log cosh
e 8wk,r
2
2
2πw
k,r
i=1
(29)
The complete data likelihood of the SMuRF model is,
p(∆N, x, w; θ) = p(∆N|x, w)p(w|x)p(x)
=
K Y
R
Y
k=1 r=1
(30)
{p(∆Nkr |xk , zr )p(wk,r |xk , zr )}
K
Y
k=1
p(xk |xk−1 ; σ2 )
R
Y
r=1
p(zr |zr−1 ; σδ2 )
(31)
The log of the complete data likelihood is therefore,
log p(∆N, x, w; θ)
=
=
R
K X
X
{log p(∆Nk,r |xk , zr ) + log p(wk,r |xk , zr )} + π(x, z)
k=1 r=1
R
K X
X
∆Nk,r log
k=1 r=1
exk +zr
1 + exk +zr
+ (1 − ∆Nk,r ) log
1
1 + exk +zr
(32)
+ log cosh
∞
X
xk + zr
2
!#
(xk +zr )2 wk,r
(2i+1)2
(2i
+
1)
−
−
2
+ log
e 8wk,r
+ π(x, z)
(33)
(−1)i p
2
2πw
k,r
i=1
K X
R
X
1 + exk +zr
xk +zr
=
∆Nk,r (xk + zr ) − log(1 + e
) + log
xk +zr
2e 2
r=1
k=1
!#
∞
(2i+1)2
(xk +zr )2 wk,r X
(2i
+
1)
−
2
+ log e−
(−1)i p
e 8wk,r
+ π(x, z)
(34)
2
2πw
k,r
i=1
K X
R
X
xk + zr (xk + zr )2 wk,r
=
∆Nk,r (xk + zr ) − log(2) −
−
2
2
k=1 r=1
!#
∞
K
(2i+1)2
X
X
1
(xk − xk−1 )2
2
i (2i + 1) − 8wk,r
+ log
e
+
log(2πσ ) −
+ π(x, z)
(−1) p
2
2
2
2σ
2πw
k,r
i=1
k=1
(35)
= K log(2) + π(x, z) +
K X
R
X
k=1 r=1
∆Nkr (xk
xk + zr (xk + zr )2 wk,r
+ zr ) −
−
2
2
39
+
K X
R
X
(
log
k=1 r=1
∞
X
2
(2i + 1) − (2i+1)
(−1)i p
e 8wk,r
2
2πwk,r
i=1
!)
(36)
where
K
X
1
π(x, z) =
2
log(2πσ2 )
k=1
R
X
+
r=1
(xk − ρx xk−1 − αx ux,k )2
−
2σ2
1
(zr − ρz zr−1 − αz uz,k )2
log(2πσδ2 ) −
2
2σδ2
(37)
From the complete data log likelihood, we see that
K X
R
X
xk + zr (xk + zr )2 wk,r
r
log p(x|∆N, z, w; θ) ∝
∆Nk (xk + zr ) −
−
+ π(x, z)
2
2
k=1 r=1
(38)
∝−
where Ƅk,r =
∆Nk,r − 12
wk,r
R
K X
X
1 (∆Ñk,r − (xk + xr ))2
k=1 r=1
2
1/wk,r
+ π(x, z),
(39)
.
Therefore, we can rewrite the augmented model as a linear Gaussian state space model
as stated in Theorem 2.
xk = ρx xk−1 + αx ux,k + k , k ∼ N (0, σ2 )
R
−1 !
P
ỹk = xk + v˜k , v˜k ∼ N 0,
wk,r
r=1
R
ỹ = ∆Ñ = x − K − P x w
k
k
k
2
r
k,r
r=1
r
Let Hk,r = ∆Ñ1r , . . . , ∆Ñk−1
denote the history of the observed process up-to and
including k − 1. We can now write
p(x|∆N, z, w; θ) ∝
K
Y
k=1
p(∆N |xk )p(xk |Hk )
(40)
The forward filtering equations for this linear Gaussian state space model are as follows.
xk|k−1 = ρx xk−1|k−1 + αx ux,k
(41)
2
2
σk|k−1
= ρ2x σk−1|k−1
+ σ2
(42)
40
xk|k = ρx xk|k−1
R
P
+
1+
(43)
wk,r
r=1
R
P
r=1
2
σk|k−1
2
wk,r σk|k−1
R
P
αx ux,k
+
P
R
2
wk,r σk|k−1
r=1
R
2
∆Nkr
r=1
R
P
− −
zr wk,r
r=1
R
− ρx xk|k−1
P
wk,r
r=1
(44)
2
=
σk|k
1+
2
σk|k−1
R
P
2
wk,r σk|k−1
(45)
r=1
2
After running the forward filtering algorithm, we obtain xK|K and σK|K
from the final
2
). Now we can treat xK
iteration of the filter. We can then draw xK ∼ N (xK|K , σK|K
as the new observations and use the Kalman filter again to draw samples for xK−1 , and
repeat this process iteratively for xK−1 , ..., x1 . The new observation equation reads,
xk = ρx xk−1 + k , k ∼ N (0, σ2 )
xk+1 = xk + k
From Bayes Rule we have,
p(xk |xk+1 , Hk ) =
p(xk+1 |xk )p(xk |Hk )
p(xk+1 |Hk )
(46)
Denote the densities of xk |xk+1 , Hk as
∗
2
xk |xk+1 , Hk ∼ N (xk|k ∗ , σk|k
)
Then the update equations are,
log p(xk |Hk ) ∝ log p(xk+1 |xk ) + log p(xk |Hk−1 )
xk|k ∗ = ρx xk|k−1 +
41
2
σk|k
σ2
(xk+1 − ρx xk|k−1 )
(47)
(48)
2 ∗
σk|k
=
2
σ2 σk|k−1
(49)
2
σ2 + σk|k−1
∗
2
With this backward-sampling algorithm, we can draw xk ∼ N (xk|k ∗ , σk|k
), where
i = K −1, ..., 1. The forward-filtering and backward-sampling algorithm are symmetric
for xk and zr .
Initialization of the EM algorithm and the Gibbs sampler
We initialize the Monte-Carlo EM algorithm with values for σ2 and σδ2 obtained by applying the one-dimensional state space model from (Smith & Brown, 2003) to the raster
data aggregated across either trials or time. We initialize the Gibbs sampler using trajectories drawn from posterior distribution of the state in the one-dimensional state-space
models (Smith & Brown, 2003) used to initialize σ2 and σδ2 . The Gibbs sampler draws
5000 samples for x, z, and w at every iteration. The algorithm reaches convergence
when the absolute change in σ2 and σδ2 is less than a certain threshold (10−5 ).
Ability of SMuRF model to identify learning time and trial in simulated data
The results of our analysis of the cortical data in Section 4 demonstrate that learning
of a contingency by a neuron is a dynamic process that cannot be easily quantified in
terms of a static time and trial of learning. We also demonstrated (Table 1) how to use
inferences from the SMuRF model to identify a learning time and a trial.
Here, we use simulated data to determine the ability of the SMuRF model to identify
learning time and trial when learning is accompanied by sustained changes in neural
42
spiking following conditioned stimulus onset and during conditioning. In particular, we
assess the sensitivity of our method to the extent of the change in neural spiking rate
following conditioned stimulus onset and during conditioning.
We simulated neural spike raster data in the same manner as described in the Simulation Studies component of our Applications section (Section 4). As in said section,
the raster is divided into two regions (Figure 3). We assume that the rate of spiking of
the neuron in Region B is fixed and equal λB = 20 Hz. We vary the rate of spiking
λA of the neuron in Region A from 20 to 45 Hz in 5 Hz increments. For each value of
λA , we simulated 10 independent rasters and determine the learning time and trial as in
Table 1. We use the average over the 10 rasters as the learning time/trial pair. When our
method detects no change, we declare the learning time and trial as the last time and
trail pair in the simulated data, i.e. 1000 ms and trial. Figures 8(a) and 8(b) show the
averages of the identified learning times and trials as a function of the ratio
λA
.
λB
The true
learning time is at 0 ms with respect to conditioned stimulus onset, and true learning
trial is trial 16. The figures demonstrate that the inference performed from the SMuRF
model is able to detect the true learning time and trial when the rate in Region A is 1.8
and 2 times larger than that in Region B. Moreover, the lower the ratio
λA
,
λB
the larger
the delay. The intuitive reason why it is easier to determine the learning trial is that, for
a given trial, there are many more observations, compared to the number of trials for a
give time instant.
43
Average Learning Trial
Average Learning Time (ms)
1000
800
600
400
200
0
1.0
1.2
1.4
1.6
1.8
2.0
2.2
45
40
35
30
25
20
15
1.0
1.2
1.4
1.6
λA
λB
λA
λB
(a)
(b)
1.8
2.0
2.2
Figure 8: Plot of average (a) learning time and (b) learning trial identified by SMuRF
inference as a function of ratio of neural spiking rate following and preceding learning.
The learning time and trial are defined as the first time and trial pair when then empirical probability (Equation 27) that the spiking rate at a given time/trial pair (Figure 2,
Point C) is bigger than the average rate at the same trial (Figure 2, Region A) and the
average rate at the same time (Figure 2, Region B) is larger than 95%. The average is
taken over 10 independently simulated rasters for each of the values for the ration
λA
.
λB
The figure demonstrate the ability of inference performed using the SMuRF model to
reliably identify learning.
Robustness of SMuRF model to the presence of error trials
We simulated neural spike raster data in the same manner as described in the Simulation Studies component of our Applications section (Section 4). We picked three
consecutive trials, starting from trial 21, to be a error trials in which all of the observations were 0. Note that the data were simulated in the same manner as in Figure 4,
44
except for the presence of the error trials. Figure 9 shows the result of applying the
SMuRF model to these simulated raster data. The presence of the error trials does not
Trials
affect our remarks for Figure 4.
45
41
36
31
26
21
16
11
6
1
45
41
36
31
26
21
16
1.0
0.8
0.6
0.4
0.2
0
-1000 -500
3
2
1
0
500 1000
Time (ms)
(b)
0
Rate
(Hz)
Trial Effect
80
60
40
20
0
-1000
-500
0
500
1000
Time (ms)
(a)
Figure 9: (a) Simulated neural spike raster with three consecutive error trials, along
with estimated within and cross trial effects from the SMuRF model. The horizontal
red line indicates the beginning of conditioning. The vertical green line indicates the
onset of the conditioned stimulus. Despite the presence of the error trials, the left panel
of the figure shows the cross-trial effect which, following conditioning, increases above
its average initial value of ≈ 1 to ≈ 2.
45
Figure 9: (b) Empirical probability that spiking rate at a given trial and time is bigger
than the average rate at the same trial and the average rate during habituation at the
same time. Despite the presence of the error trials, we can see that with probability
close to 1, the spiking rate at a given time/trial pair–following the conditioned stimulus
and during conditioning (Figure 2 C)–is bigger than the average rate at the same trial
Trials
(Figure 2 A) and the average rate at the same time (Figure 2 B).
45
41
36
31
26
21
16
11
6
1
45
41
36
31
26
21
16
1.0
0.8
0.6
0.4
0.2
0
-500
0
500 1000 1500
Time (ms)
(b)
6 4 2 0
Rate
(Hz)
Trial Effect
8
6
4
2
0
-500
0
500
1000
1500
Time (ms)
(a)
Figure 10: (a) Raster, along with SMuRF within and cross-trial components, from a
cortical neuron that exhibits a transient conditioned response to the conditioned stimulus. The horizontal red line indicates the beginning of conditioning. The vertical green
line indicates the onset of the conditioned stimulus. The bottom panel suggests that this
neuron exhibits a delayed response to the conditioned stimulus, beginning at ≈< 100
ms following conditioned stimulus presentation. The response then decreases and is
followed by a slight increase at ≈ 700 ms.
46
Figure 10: Accounting for this increase in within-trial spiking rate due to the conditioned stimulus, the left panel shows a multiplicative increase in spiking rate due to
conditioning from an average initial value of ≈ 1 to a peak average value of ≈ 2 between trial ≈ 18 at trial 30. (b) Empirical probability that spiking rate at a given trial
in and time is bigger than the average rate at the same trial and the average rate during
habituation at the same time (refer to Figure 2). This panel provides a more detailed account of the the intricate dynamics in neural modulation that accompanies conditioning
Trials
to the stimulus for this neuron.
45
41
36
31
26
21
16
11
6
1
45
41
36
31
26
21
16
1.0
0.8
0.6
0.4
0.2
0
-500
4
2
0
500 1000 1500
Time (ms)
(b)
0
Rate
(Hz)
Trial Effect
30
20
10
0
-500
0
500
1000
1500
Time (ms)
(a)
Figure 11: (a) Raster, along with SMuRF within and cross-trial components, from a
cortical neuron that exhibits a transient conditioned response to the conditioned stimulus. The horizontal red line indicates the beginning of conditioning. The vertical green
line indicates the onset of the conditioned stimulus.
47
Figure 11: The bottom panel suggests that this neuron exhibits a delayed response to
the conditioned stimulus, beginning at ≈ 20 ms following conditioned stimulus presentation. The response is sustained until ≈ 800 ms, and then decreases. Accounting for
this increase in within-trial spiking rate due to the conditioned stimulus, the left panel
shows a multiplicative increase in spiking rate due to conditioning from an average initial value of ≈ 1 to a peak average value of ≈< 2 between trial ≈ 18 at trial 30. (b)
Empirical probability that spiking rate at a given trial in and time is bigger than the average rate at the same trial and the average rate during habituation at the same time (refer
to Figure 2). This panel provides a more detailed account of the the intricate dynamics
in neural modulation that accompanies conditioning to the stimulus for this neuron.
References
Allsop, S. A., Vander Weele, C. M., Wichmann, R., & Tye, K. M. (2014). Optogenetic
insights on the relationship between anxiety-related behaviors and social deficits.
Frontiers in behavioral neuroscience, 8, 241.
Allsop, S. A., Wichmann, R., Mills, F., Felix-Ortiz, A. C., Viennel, A., Beyeler, A.,
. . . Tye, K. M. (2017). Observational learning requires cortico-amygdala transfer of
socially-derived information. Submitted to Cell.
Andrews, D. F., & Mallows, C. L. (1974). Scale mixtures of normal distributions.
Journal of the Royal Statistical Society. Series B (Methodological), 99–102.
Besag, J. (1974). Spatial interaction and the statistical analysis of lattice systems.
Journal of the Royal Statistical Society. Series B (Methodological), 192–236.
48
Casella, G. (2001). Empirical bayes gibbs sampling. Biostatistics, 2(4), 485–500.
Casella, G., & George, E. I. (1992). Explaining the gibbs sampler. The American
Statistician, 46(3), 167–174.
Choi, H. M., & Hobert, J. P. (2013). The polya-gamma gibbs sampler for bayesian
logistic regression is uniformly ergodic. Electronic Journal of Statistics, 7, 2054–
2064.
Chopin, N., Jacob, P. E., & Papaspiliopoulos, O. (2013). Smc2: an efficient algorithm
for sequential analysis of state space models. Journal of the Royal Statistical Society:
Series B (Statistical Methodology), 75(3), 397–426.
Czanner, G., Eden, U. T., Wirth, S., Yanike, M., Suzuki, W. A., & Brown, E. N. (2008).
An analysis of between-trial and within-trial neural spiking dynamics. J. Neurophysiol., 99(5), 2672–2693.
Dempster, A. P., Laird, N. M., & Rubin, D. B. (1977). Maximum likelihood from
incomplete data via the em algorithm. Journal of the royal statistical society. Series
B (methodological), 1–38.
Frühwirth-Schnatter, S. (1994). Data augmentation and dynamic linear models. Journal
of time series analysis, 15(2), 183–202.
Polson, N. G., Scott, J. G., & Windle, J. (2013). Bayesian inference for logistic models
using pólya–gamma latent variables. Journal of the American statistical Association,
108(504), 1339–1349.
49
Rad, K. R., & Paninski, L. (2010). Efficient, adaptive estimation of two-dimensional
firing rate surfaces via gaussian process methods. Network: Computation in Neural
Systems, 21(3-4), 142–168.
Scott, J., & Pillow, J. W. (2012). Fully bayesian inference for neural models with
negative-binomial spiking. In Advances in neural information processing systems
(pp. 1898–1906).
Smith, A. C., & Brown, E. N. (2003). Estimating a state-space model from point
process observations. Neural Computation, 15(5), 965–991.
Truccolo, W., Eden, U. T., Fellows, M. R., Donoghue, J. P., & Brown, E. N. (2005). A
point-process framework for relating neural spiking activity to spiking history, neural
ensemble, and extrensic covariate effects. J. Neurophysiol., 93, 1074–1089.
Wirth, S., Yanike, M., Frank, L. M., Smith, A. C., Brown, E. N., & Suzuki, W. A.
(2003). Single neurons in the monkey hippocampus and learning of new associations.
Science, 300(5625), 1578–1581.
Yuan, K., Girolami, M., & Niranjan, M. (2012). Markov chain monte carlo methods
for state-space models with point process observations. Neural Computation, 24(6),
1462–1486.
Zammit-Mangion, A., Sanguinetti, G., & Kadirkamanathan, V. (2012). Variational estimation in spatiotemporal systems from continuous and point-process observations.
IEEE Transactions on Signal Processing, 7(60), 3449–3459.
50
| 5cs.CE
|
An algebraic framework for end-to-end
physical-layer network coding
arXiv:1611.04226v1 [cs.IT] 14 Nov 2016
Elisa Gorla and Alberto Ravagnani∗
Institut de Mathématiques
Université de Neuchâtel
Emile-Argand 11, CH-2000 Neuchâtel, Switzerland
Abstract
We propose an algebraic setup for end-to-end physical-layer network coding based on submodule transmission. We introduce a distance function between modules, describe how it relates
to information loss and errors, and show how to compute it. Then we propose a definition of
submodule error-correcting code, and investigate bounds and constructions for such codes.
Introduction and motivation
In the framework of physical-layer network coding (PNC) multiple terminals attempt to exchange
messages through intermediate relays. The relays collect data from the terminals, and try to decode
a function of the transmitted messages. Such function is then broadcasted to the terminals, which
combine it with their side information to recover the other messages.
In [11] the authors proposed a novel approach to PNC based on nested lattices, known as
“compute-and-forward”. Under this approach, the structure of a fixed underlying lattice is exploited
by the relays to decode the function of the messages, which is then forwarded to the terminals. As
observed in [5], this communication scheme induces an end-to-end network coding channel with
channel equation
Y = AX + Z.
(1)
Here X is the transmitted matrix, whose rows are elements from a given ambient space Ω, A is
a transfer matrix, and Z is an error matrix. In practice, A and Z are random matrices drawn
according to certain distributions, that depend on the application at hand.
A general algebraic framework to study and construct nested-lattice-based PNC schemes was
recently proposed in [5] and further developed in [4]. Following this algebraic description, which is
compatible with any underlying lattice, the message space Ω has the structure of a module over a
principal ideal ring
Ω = T /(d1 ) × T /(d2 ) × . . . × T /(dn ),
where T ⊆ C is a principal ideal domain (PID), d1 , d2 ..., dn ∈ T are nonzero, non-invertible elements,
and dn |dn−1 | . . . |d1 . Let R = T /(d1 ), then R is a principal ideal ring (PIR). The ambient space Ω
is isomorphic to an R-submodule of Rn :
Ω∼
= R × (d1 /d2 ) × . . . × (d1 /dn ) ⊆ Rn .
∗
(2)
E-mail addresses: [email protected], [email protected]. The authors were partially supported
by the Swiss National Science Foundation through grant no. 200021 150207.
1
In particular, the elements of Ω can be represented via vectors of length n with entries in R. Both
R and Ω are usually finite.
Examples 1. We include a list of rings R and ambient spaces Ω that have been proposed in the
context of physical-layer network coding, producing efficient communication schemes.
• R = Ω = Z2 [i], proposed and studied in [15], [12] and [4, Example 1] for BPSK modulation.
• R = Ω = Zm [i], with m a positive integer, proposed and studied in [15] and [4, Example 2],
and known as “m2 -QAM PNC scheme”.
• R = Zp [i], Ω = Rn , where p is a prime number, proposed in [11].
• R = Zps [i], Ω = R
. . × R} × (p) × . . . × (p) × . . . × (ps−1 ) × . . . × (ps−1 ), where p is a prime
| × .{z
{z
}
{z
}
|
|
n1
n2
ns
power and s ≥ 1 is an integer, proposed in [4, Section VII.A].
• R = Z[ω]/(β), where Z[ω] are the Eisenstein integers and β ∈ Z[ω] is a suitable element,
Ω = Rn , proposed and studied in [13].
As observed in [5], channel equation (1) suggests to define the message to be transmitted as the
module generated over R by the rows of the matrix X, which we denote by row(X). A receiver
attempts to recover the original transmitted module from the matrix Y .
Two important special cases of equation (1) correspond to the noise-free multiplicative matrix channel (MMC), with equation Y = AX, and the multiplication-free additive matrix
channel (AMC), with equation Y = X + Z. These two channel equations are studied in [5] in the
case where the base ring R is a finite chain ring.
The key tool in handling the MMC in [5] is the reduced row-echelon form of a matrix X, which
is a canonical invariant of the row-module of X denoted by RREF(X). In practice, a transmitter
emits a matrix X in reduced row-echelon form, and a receiver attempts to recover it by computing
RREF(Y ) = RREF(AX). Decoding is successful when A is left-invertible. In the same paper, the
authors propose a coding/decoding scheme based on error-trapping for the AMC and the general
case of a channel with equation (1).
In this paper, in analogy with the approach from [8] for random linear network coding, we
propose a new algebraic framework for module transmission based on the notion of length of a
module. We define a submodule code as a collection of submodules of the ambient space Ω, and
propose a notion of distance between submodules based on length, which we call submodule distance.
Then we show that the submodule distance captures both information loss and errors in module
transmissions. The row-echelon form for modules over a PIR proposed by Buchmann and Neis in [2]
allows us to represent messages in a canonical way. Using the same row-echelon form, we reduce
the computation of the distance between submodules to the computation of the length of ideals in
the base ring. We also prove that, in some cases, the error-trapping decoding scheme from [5] is a
minimum-distance decoding with respect to the submodule distance.
We derive two bounds on the cardinality of a submodule code of given minimum distance and
whose codewords have fixed length. For certain classes of rings, we are able to state our bounds
explicitly in terms of the ring and code’s invariants. We also construct submodule codes with
maximum error-correction capability. For R a finite chain ring or R = Zp [i], we show that the codes
that we construct have asymptotically optimal cardinality for their parameters. This also shows
that our bounds are sharp for certain choices of rings and code parameters. We also give some
general code constructions, based on the tensor and on the cartesian product. Our constructions
can be applied to various choices of rings and code parameters.
2
Finally, we study codes over products of rings. This is relevant, since a finite PIR R is isomorphic
to a product of finite fields and finite chain rings. We show that if R ∼
= R1 ×. . .×Rm , then a product
of codes on the Ri ’s yields a code on R, whose parameters are determined and whose decoding can
be reduced to decoding on each of the Ri ’s. However, not every code over a finite PIR is a product
of codes over fields and finite chain rings. We give a construction of a code over R which is not a
product and show that decoding cannot be reduced to decoding on each of the Ri ’s. This shows in
particular how the study of codes over a finite PIR cannot be reduced to the study of codes over
finite fields and finite chain rings.
The structure of the paper is as follows: In Section 1 we recall some definitions and results about
PIR’s, modules, length, row-echelon forms of matrices over PIR’s. In Section 2 we define submodule
codes and submodule distance, and relate it to information loss and errors in module transmissions.
We also show how to efficiently compute the submodule distance. In Section 3 we prove that, in
some cases, the error-trapping decoding from [5] can be viewed as a minimum-distance decoding in
our framework. Section 4 is devoted to bounds on the cardinality of submodule codes, and Section
5 to submodule codes constructions and to codes over products of rings.
1
Algebraic preliminaries
Throughout the paper R denotes a finite PIR and (r) denotes the ideal generated by r ∈ R. Recall
that elements a, b ∈ R generate the same ideal if and only if they are associate, i.e., there exists
an invertible element ε ∈ R with a = εb (see e.g. [1]). An element g ∈ R is a greatest common
divisor (gcd) of a1 , ..., as ∈ R if and only if (a1 )+(a2 )+. . .+(as ) = (g). We write g = gcd(a1 , ..., as ).
The gcd is unique up to associates.
Finite chain rings are a special case of PIR’s. A ring R is a finite chain ring if it is finite
and its ideals form a chain with respect to inclusion. It is well-known that finite chain rings are
principal and local (see e.g. [10], page 339). Moreover, if π is a generator of the maximal ideal of
R, then the ideals of R are
0 ( (π e−1 ) ( (π e−2 ) ( . . . ( (π) ( R,
(3)
where e is the smallest positive integer with π e = 0. The integer e does not depend on the choice
of the generator π of the maximal ideal. The finite field R/(π) is called the residue field of R.
Clearly, R/(π) ∼
= Fq for some prime power q.
For any PIR R, define the annihilator of a ∈ R as
ann(a) = {r ∈ R | ar = 0}.
The annihilator is an ideal of R, and we refer to a generator of ann(a) again as the annihilator of a.
If R is a finite chain ring with ideal chain as in (3), then every a ∈ R is of the form a = uπ α for some
invertible u and some 0 ≤ α ≤ e. Then ann(a) = (π e−α ). Since every finite PIR R is isomorphic
to a product of finite fields and finite chain rings, then annihilators are easy to compute. In the
sequel, we will take computation of annihilators for granted. Moreover, inclusion of annihilators
can be easily tested by checking divisibility.
Proposition 2. Let R be a finite PIR, a, b ∈ R. Then ann(a) ⊆ ann(b) if and only if a | b.
Proof. By the Zariski-Samuel Theorem, any finite PIR is isomorphic to a product of finite fields
and finite chain rings. Hence it suffices to prove the statement for R a finite chain ring. If b = ac
for some c ∈ R, then tb = tac = 0 for every t ∈ ann(a). Hence ann(a) ⊆ ann(b). Conversely, if
3
ann(a) ⊆ ann(b) and R is a finite chain ring with ideal chain as in (3), then a = uπ α and b = vπ β
for some u, v invertible, 0 ≤ α, β ≤ e. Since (π e−α ) = ann(a) ⊆ ann(b) = (π e−β ), then e − α ≥ e − β,
so α ≤ β and a | b.
1.1
Modules and length
We fix an R-module Ω ⊆ Rn as in (2) and let M(Ω) denote the set of R-submodules of Ω. Given
M, N ∈ M(Ω), denote by M + N the smallest submodule of Ω which contains both M and N . We
write M ⊕ N when N ∩ M = 0. Since R is finite, Ω and its submodules are finite. In particular all
modules that we consider are finitely generated.
Definition 3. Let M be an R-module. If
M = {r1 m1 + . . . + rt mt | r1 , . . . , rt ∈ R}
for some m1 , . . . , mt ∈ M , then we say that M is generated by m1 , . . . , mt and m1 , . . . , mt are a
system of generators for M . We write M = hm1 , . . . , mt iR or M = hm1 , . . . , mt i when there is
no ambiguity. A module is finitely generated if it has a finite system of generators.
Definition 4. Let M be an R-module. A chain of distinct submodules of M of the form
0 ( M1 ( M2 ( . . . ( Mλ = M
has length λ. The length of M is
λR (M ) = max{λ | M has a chain of R-submodules of length λ}.
A composition series for M is a maximal chain of distinct R-submodules of M .
When the ring is clear from context, we will omit the subscript R.
Remark 5. Any ring R is an R-module, and its R-submodules coincide with its ideals. Therefore,
the length of a ring R is
λ(R) = max{λ | R has a chain of ideals of length λ}.
For any a ∈ R we denote by λ(a) the length of the ideal generated by a.
Since all modules that we consider are finite, they have finite length. The following properties
are well-known (see e.g. [9, Section V§2]).
Lemma 6. Let R be a ring, let M, N, Ω be R-modules of finite length. Then:
1) λ(M ) = 0 if and only if M = 0.
2) If N ⊆ M , then λ(N ) ≤ λ(M ) and λ(M/N ) = λ(M ) − λ(N ). In particular, λ(M ) = λ(N ) if
and only if M = N .
3) If M, N ⊆ Ω, then λ(M + N ) = λ(M ) + λ(N ) − λ(M ∩ N ).
4) λ(M × N ) = λ(M ) + λ(N ).
The concept of length for an R-module generalizes the concept of dimension for a vector space.
4
Example 7 (fields). Every field F is a ring of length one, since it has no proper nonzero ideals. An
F-module M is an F-vector space with λ(M ) = dimF (M ).
Example 8 (finite chain rings). Let R be a finite chain ring. Let π be a generator of its maximal
ideal and let e be the smallest positive integer such that π e = 0. Then λ(R) = e and λ(a) = min{i :
a ∈ (π e−i )} = min{i : π e−i | a} for all a ∈ R.
It can be shown that every R-module M is isomorphic to a product of ideals:
∼ R × . . . × R × (π) × . . . × (π) × . . . × (π e−1 ) × . . . × (π e−1 ),
M=
{z
} |
|
|
{z
}
{z
}
µ1
µ2 −µ1
µe −µe−1
where 0 ≤ µ1 ≤ µ2 ≤ . . . ≤ µe are non-negative integers. Following [5], we say that M has shape
(µ1 , µ2 , ..., µe ) ∈ Ne . It is easy to show that two R-modules are isomorphic if and only if they have
the same shape. Moreover, by Lemma 6
λ(M ) =
e−1
X
(µi+1 − µi )(e − i),
i=0
where µ0 = 0.
1.2
A reduced row-echelon form for matrices over principal ideal rings
Every finitely generated module M ⊆ Ω may be represented as the rowspace of a matrix with entries
in R, whose row vectors are a system of generators of M . In order to make such a representation
unique, we need a row-canonical form for matrices with entries in a PIR.
In [7] Howell proposes a definition of row-canonical matrix over the ring Zn , showing that every
matrix can be put in row-canonical form by performing invertible row operations. The ideas of
Howell were later extended in [2], where canonical generating systems for submodules of Rn are
defined for any PIR R. In the rest of the section we recall the main results of [2], stating them in
a convenient matrix formulation.
Definition 9. For i ∈ {1, ..., n} we denote by vi the i-th entry of a vector v ∈ Rn . The leading
position of a vector v ∈ Rn is the position of its first nonzero entry:
min{1 ≤ j ≤ k | vj 6= 0} if v 6= 0,
ℓ(v) =
+∞
if v = 0.
Given a matrix A ∈ Rt×n , we denote by A1 , ..., At the rows of A, and by row(A) = hA1 , ..., At i
the R-module generated by the rows of A.
For a module M ⊆ Rn we set M (j) = {v ∈ M | vi = 0 for i < j} for j ∈ {1, ..., n + 1}. Every
M (j) is an R-submodule of M and
0 = M (n+1) ⊆ M (n) ⊆ . . . ⊆ M (1) = M.
Definition 10. Let A ∈ Rt×k be a matrix, and let M = row(A). We say that A is in row-echelon
form if the following hold:
1) for all i ∈ {1, ..., t − 1} we have ℓ(Ai+1 ) > ℓ(Ai ),
2) for all j ∈ {1, ..., n + 1} we have M (j) = hAi | ℓ(Ai ) ≥ ji.
5
The nonzero entries of A of the form Ai,ℓ(Ai ) are the pivots of A.
Fix canonical generators and representatives for the ideals and the residue classes of R. We say
that A is in reduced row-echelon form if it is in row-echelon form and the following hold:
3) every pivot Aij of A is the canonical generator of the ideal (Aij ),
4) if Aij is a pivot of A, then every entry Asj with s < i is the canonical representative of the
residue class Asj + (Aij ).
Definition 11. Two matrices A, B ∈ Rt×n are row-equivalent if there exists an invertible matrix
U ∈ Rt×t such that A = U B.
It is easy to show that A and B are row-equivalent if and only if row(A) = row(B). We now
prove that every matrix is row-equivalent to a matrix in row-echelon form, and to a unique matrix
in reduced row-echelon form. The next lemma is well-known and appears in several references. We
include a proof, since we could not find a complete one in the literature.
Lemma 12. For any a, b ∈ R \ {0} there exist x, y, z, t ∈ R such that
x y a
g
=
,
xt − yz = 1,
(g) = (a) + (b).
z t b
0
Proof. By [14, Theorem 33, pg. 245], every principal ideal ring is isomorphic to a direct product of
quotients of PID’s. Therefore it suffices to prove the result for R = D/(π), where D is a PID and
π ∈ D.
If π = 0 then R = D is a PID. Let g = gcd(a, b) and write g = ka + hb for some k, h ∈ R.
Dividing by g we obtain 1 = k(a/g) + h(b/g). Let x = k, y = h, z = −b/g, t = a/g.
Now assume π 6= 0. Recall that every PID D is a unique factorization domain. Consider
the projection map ¯· : D → R and choose elements α, β ∈ D with α = a and β = b. Let
η = gcd(α, β, π) and P = {p ∈ D | p is irreducible and divides both α/η and π/η}. For all p ∈ P
we set ep = max{i | pi divides π/η}. Define
Q
(π/η) / p∈P pep if P 6= ∅,
γ=
(π/η)
if P = ∅.
We claim that α/η + γ(β/η) and π/η are Q
coprime. By contradiction, let p ∈ D be irreducible,
β/η, π/η) = 1
p | gcd(π/η, α/η + γ(β/η)). If p ∤ γ, then p | p∈P pep , so p | (α/η). Since gcd(α/η,
Q
and p | (α/η), (π/η), then p ∤ α/η + γ(β/η), a contradiction. If p | γ, then p ∤ p∈P pep , so p ∤ (α/η).
However p | (α/η + γ(β/η)), a contradiction. We conclude that α/η + γ(β/η) and π/η are coprime,
hence there exist λ, µ ∈ D such that λ(α/η + γ(β/η)) + µ(π/η) = 1, i.e. λ(α + γβ) + µπ = η. Hence
(η) ⊆ (α + γβ, π) ⊆ (α, β, π) = (η).
Therefore (α + γβ) + (π) = (α) + (β) + (π), so a + cb = gcd(a, b) in R = D/(π), where c = γ. Write
b = h(a + cb), for some h ∈ R. Let x = 1, y = c, z = −h, t = −ch + 1.
Remark 13. The element γ ∈ D in the proof of Lemma 12 can be computed (up to associates)
via the following algorithm.
γ := π/η
g := gcd(γ, α/η)
while g 6= 1 do
6
γ ← γ/g
g ← gcd(γ, α/η)
end while
Theorem 14 ([2], Algorithm 3.2 and Theorem 3.3). Given a matrix A ∈ Rt×k , we can compute a
row-equivalent matrix in row-echelon form in O(tk2 ) operations in R.
We describe Algorithm 3.2 from [2], adapting it to our matrix notation.
1) If A is the zero matrix, then it is already in row-echelon form. Otherwise, up to permuting the
rows of A, we may assume without loss of generality that +∞ > ℓ(A1 ) ≥ ℓ(A2 ) ≥ . . . ≥ ℓ(At ).
2) If j = ℓ(A1 ) > ℓ(A2 ) then the first step is concluded. Otherwise, let g = gcd(A1j , A2j , ..., Atj ).
Applying Lemma 12 iteratively one finds a row-equivalent matrix A′ ∈ Rt×n with A′1j = g
and ℓ(A′i ) > j for i > 1.
3) Let x ∈ R be the annihilator of g. We append x · A1 to the matrix A′ , obtaining a matrix
A′′ . Notice that row(A′′ ) = row(A). Moreover, if v ∈ row(A′′ ) and vs = 0 for 1 ≤ s ≤ j, then
v ∈ hA′′2 , ..., A′′t+1 i.
One repeats the three steps above on the matrix obtained from A′′ by deleting the first row, until
there are no more rows left. The algorithm produces a matrix in row-echelon form, which is rowequivalent to A.
Example 15. Consider the matrix
2 1 3
A=
4 1 2
over R = Z6 . Applying the algorithm that we just described, one computes:
2 1 3
2 1 3
2 1 3
2 1 3
0 5 2 .
0 5 2
4 1 2
0 5 2
0 0 3
0 3 3
Notice that the number of rows increased from two to three.
Fix generators and representatives for the ideals and residue classes of R. Every matrix A with
entries in R is row-equivalent to a unique matrix in reduced row-echelon form, with respect to the
given choice of generators and representatives.
Theorem 16 ([2], Algorithm 3.4 and Theorem 3.5). Let A ∈ Rt×n be a matrix. Then A is rowequivalent to a unique matrix in reduced row-echelon form, which we denote by RREF(A). The
reduced row-echelon form of A can be computed from a row-echelon form of A in O(n3 ) operations
in R.
In fact, using the algorithm from Theorem 14, A can be put in row-echelon form. After multiplying it by a diagonal matrix with invertible elements on the diagonal, the matrix satisfies property
3) of Definition 10. Finally, by subtracting suitable multiples of each row from the rows above, one
ensures that property 4) of Definition 10 holds. The last operation corresponds to multiplying on
the left by an upper triangular matrix with ones on the diagonal.
The next result characterizes matrices in row-echelon form over a finite PIR. A proof can be
obtained using Proposition 2.
7
Proposition 17. Let A ∈ Rt×n be a matrix with no zero rows. A is in row-echelon form if and
only if the following hold:
1. ℓ(Ai+1 ) > ℓ(Ai ) for all i ∈ {1, ..., t − 1},
2. Atℓ(At ) | Atj for all ℓ(At ) ≤ j ≤ n,
3. ann(Aiℓ(Ai ) ) · Ai ∈ hAi+1 , ..., At i for all i ∈ {1, ..., t − 1}.
Proposition 17 and Algorithm 4.1 of [2] lead to the following algorithm to test whether a matrix
is in row-echelon form.
Input: a matrix A ∈ Rt×n with ℓ(Ai+1 ) > ℓ(Ai ) for all i ∈ {1, ..., t − 1}
Output: “YES” if A is in row-echelon form, and “NO” otherwise
for i = 1 to t do
ji := ℓ(Ai )
end for
for j = jt to n do
if Atjt ∤ Atj then
return NO
quit
end if
end for
for i = t − 1 downto 1 do
use Algorithm 4.1 of [2] to test if ann(Aiji ) · Ai ∈ hAi+1 , ..., At i
if ann(Aiji ) · Ai ∈
/ hAi+1 , ..., At i then
return NO
quit
end if
end for
return YES
quit
Proposition 18. The previous algorithm terminates correctly.
Proof. Algorithm 4.1 of [2] tests whether a given vector belongs to the module generated by the
rows of a matrix in row-echelon form. Therefore, we first need to show that the last for cycle of the
algorithm is well-defined, i.e., that if the algorithm enters the for cycle for some i, then the matrix
whose rows are Ai+1 , ..., At is in row-echelon form.
We proceed by backward induction on i ∈ {t − 1, ..., 1}. Assume that the algorithm enters the
cycle for i = t − 1. Then by the structure of the algorithm and Proposition 17, the matrix whose
row is At is in row-echelon form, as claimed. Now assume i < t − 1. Since the algorithm enters
the for cycle for i, it entered the for cycle also for i + 1. By induction hypothesis, the matrix
whose rows are Ai+2 , ..., At is in row-echelon form. Since the algorithm enters the for cycle for i,
we have ann(Ai+1 ) · Ai+1 ∈ hAi+2 , ..., At i. Therefore by Proposition 17 the matrix whose rows are
Ai+1 , ..., At is in row-echelon form.
The previous argument also shows that if the algorithm returns YES, then A is in row-echelon
form. Finally, using Proposition 17 one can check that if A is in row-echelon form, then the algorithm
returns YES.
8
2
Submodule codes and submodule distance
Using the length, one can define a distance function between submodules of Ω.
Proposition 19. The function d : M(Ω) × M(Ω) → N defined by
d(M, N ) = λ(M ) + λ(N ) − 2λ(M ∩ N )
for all M, N ∈ M(Ω) is a distance function.
Definition 20. We call d the submodule distance on M(Ω).
Proof of Proposition 19. Let M, N, P ⊆ Ω be R-submodules. By Lemma 6 we have d(M, N ) =
λ(M + N ) − λ(M ∩ N ). Since M ∩ N ⊆ M + N we have d(M, N ) ≥ 0, and equality holds if and
only if M + N = M ∩ N , i.e., if and only if M = N . Moreover, d(M, N ) = d(N, M ) by definition.
To prove the triangular inequality, observe that by definition
d(M, N ) = d(M, P ) + d(P, N ) − 2(λ(M ∩ N ) + λ(P ) − λ(M ∩ P ) − λ(N ∩ P )).
Therefore it suffices to prove that x = λ(M ∩ N ) + λ(P ) − λ(M ∩ P ) − λ(N ∩ P ) ≥ 0. By Lemma 6
we have x = λ(M + P ) + λ(N + P ) − λ(M + N ) − λ(P ). Since (M + P ) + (N + P ) ⊇ M + N and
(M + P ) ∩ (N + P ) ⊇ P , by Lemma 6
λ(M + P ) + λ(N + P ) − λ(P ) ≥ λ(M + P ) + λ(N + P ) − λ((M + P ) ∩ (N + P )) ≥ λ(M + N ),
hence x ≥ 0.
When R = F is a field, the submodule distance on Fn coincides with the subspace distance
proposed by Kötter and Kschischang in [8] for error correction in random linear network coding.
The concepts of information loss and error from [8] can be extended to our setting as follows.
Remark 21. Let M ⊆ Rn be the transmitted module, and let N ⊆ Rn be the received module.
The portion of information that was correctly transmitted is M ∩ N . The quotient M/(M ∩ N )
may be regarded as the information loss module, i.e. the original information modulo the
portion of information that was correctly transmitted. Similarly, the error module is the quotient
N/(M ∩ N ). Using Lemma 6, one can check that
d(M, N ) = λ(M/(M ∩ N )) + λ(N/(M ∩ N )).
In other words, the distance between M and N is the sum of the lengths of the information loss
module and of the error module, similarly to what was shown in [8] in the context of subspace codes.
Definition 22. A submodule code is a subset C ⊆ M(Ω) with |C| ≥ 2. The minimum
(submodule) distance of C is
d(C) = min{d(M, N ) : M, N ∈ C, M 6= N }.
Definition 23. Let C ⊆ M(Ω) be a submodule code. Let M ∈ C be the transmitted module, and
let N ∈ M(Rn ) be the received module. Define the number of erasures as ρ = λ(M/(M ∩ N ))
and the number of errors as e = λ(N/(M ∩ N )).
The next result follows from Remark 21 using a standard argument.
Proposition 24. Let C ⊆ M(Ω) be a submodule code of minimum distance d. Then a minimum
distance decoder successfully corrects N to M , provided that 2(ρ + e) < d(C).
9
2.1
Computing the distance function
In this subsection we show that the length of a module is the sum of the lengths of the ideals
generated by the pivots of a matrix in row-echelon form, whose rows generate the module. Therefore,
computing the length of an R-module can be reduced to computing lengths of ideals in R. This
allows us to efficiently compute distances between submodules of Rn .
Theorem 25. Let M ⊆ Rn be an R-module. Let A ∈ Rt×n be a matrix in row-echelon form with
no zero rows and such that M = row(A). For every j ∈ {1, ..., n + 1} let M (j) = {m ∈ M | vi =
0 for i < j} ⊆ Rn and I (j) = (vj | v ∈ M (j) ) ⊆ R. Let Aiℓ(Ai ) be the pivot of the i-th row of A.
Then:
1) I (ℓ(Ai )) = Aiℓ(Ai ) ∼
= M (j) /M (j+1) for all i ∈ {1, ..., t},
P
2) λ(M ) = ti=1 λ Aiℓ(Ai ) .
Proof.
1) The map M (j) /M (j+1) → I (j) given by v + M (j+1) 7→ vj is a well-defined R-module
isomorphism. Therefore I (j) ∼
= M (j) /M (j+1) . Fix any i ∈ {1, ..., t} and let j = ℓ(Ai ). Since
(j)
(j)
(j)
Ai ∈ M we have (Aij ) ⊆ I (j) . On the other hand,
Pt let 0 6= x ∈ I and let v ∈ M such
that x = vj . Since A is in row-echelon form, v = k=i rk Ak for some ri , ..., rt ∈ R. Therefore
x = vj = ri Aij , so x ∈ (Aij ).
2) Applying [9, Corollary V.2.4] to the chain of R-modules 0 = M (n+1) ⊆ . . . ⊆ M (1) = M we
obtain
n
X
λ M (j) /M (j+1) .
λ(M ) =
j=1
(j+1)
6= 0 if and only if I (j) 6= 0, if and only if j = ℓ(Ai ) for
By Lemma 6 one has λ M (j) /M
some i ∈ {1, . . . , t}. Then
λ M (j) /M (j+1) = λ(Aij ).
Example 26. The module M = h(2, 1, 3), (4, 1, 2)i ⊆ Z36 generated by the rows of the matrix of
Example 15 has length λ(M ) = λ(2) + λ(5) + λ(3) = 1 + 2 + 1 = 4.
Remark 27. Let M = row(A) be the transmitted module, and let N = row(B) be the received
module. By Lemma 6 we have
d(M, N ) = 2λ(M + N ) − λ(M ) − λ(N ).
Therefore the distance between M and N can be computed from the row-echelon forms of A, B,
and of the matrix C obtained by appending the rows of B to A. In fact
M + N = row(A) + row(B) = row(C).
This allows us to compute the distance function without computing intersections of modules.
Example 28. Let R = Z4 . Notice
1
A= 0
0
that the only nonzero, proper ideal of R is (2). Let
1 1 0
1 3 0 2
B=
2 1 2 ,
0 0 1 0
0 2 0
10
be matrices in row-echelon form, whose underlined entries are the pivots. Let M = row(A) and
N = row(B). Then
λ(M ) = λ(1) + λ(2) + λ(2) = 2 + 1 + 1 = 4
λ(N ) = λ(1) + λ(1) = 2 + 2 = 4
Then M + N = row(C), where
whose reduced row-echelon form is
1
0
C=
0
1
0
1
2
0
3
0
1
1
2
0
1
0
2
0
2
0
1 1 0 0
0 2 0 2 .
0 0 1 0
Hence λ(M + N ) = λ(1) + λ(2) + λ(1) = 2 + 1 + 2 = 5 and
d(M, N ) = 2λ(M + N ) − λ(M ) − λ(N ) = 10 − 8 = 2.
One can compute λ(M ∩ N ) = λ(M ) + λ(N ) − λ(M + N ) = 3. Hence the information loss
module has length λ(M/(M ∩ N )) = λ(M ) − λ(M ∩ N ) = 1 and the error module has length
λ(N/(M ∩ N )) = λ(N ) − λ(M ∩ N ) = 1.
3
Recovering known encoding and decoding schemes
In this section we compare our approach to the one proposed by Feng, Nóbrega, Kschischang, and
Silva for the multiplicative-additive matrix channel (MAMC) in [4, Section IX]. We show that their
encoding scheme remains valid in our setup. We also prove that, in some cases, their decoding
scheme corresponds to minimum distance decoding with respect to the distance function that we
propose.
In our notation, Feng, Nóbrega, Kschischang, and Silva consider the MAMC of equation Y =
AX + Z, where R is a finite chain ring, A ∈ RN ×t , X ∈ Rt×n , Z ∈ RN ×n . They assume that
n ≥ 2N , row(A) ∼
= Rt , and row(Z) ∼
= Rv for some integer v ≤ N . They represent matrices in row
canonical form (see [4, Definition 1] for the definition of row canonical form) and define their
codebook to be the set of principal matrices of given shape in row canonical form (see [4, Section
V.B and Sections VII, VIII, IX]). Observe that matrices in row canonical form are not in general
in reduced row-echelon form according to our Definition 10.
Example 29. Let R = Z8 , whose ideals 0 ( (4) ( (2) ( (1) have canonical generators 0, 4, 2, 1.
Choose 0, 1, 2, 3 as canonical representatives for residue classes modulo (4), 0, 1 as canonical representatives for residue classes modulo (2), and 0 as canonical representative for the residue class
modulo (1). The rows of the following matrices generate the same R-module. The first matrix is
in row canonical form (see [4, Example 6]), while the second is in reduced row-echelon form. The
pivots are underlined.
0 2 0 1
2 0 0 1
2 2 0 0
0 2 0 1
0 0 2 0
0 0 2 0 .
0 4 0 0
0 0 0 2
11
The authors of [4] propose asymptotically optimal encoding and decoding schemes using principal matrices over a finite chain ring R. A transmitted module M is encoded as a principal matrix
in row canonical form, whose rows generate M . In the next proposition we show that principal
matrices in row canonical form are in reduced row-echelon form. Therefore, the encoding schemes
of [4] remain valid in our setup.
Proposition 30. Let R be a finite chain ring, and let A ∈ Rt×n be a principal matrix in row
canonical form. Then A is in reduced row-echelon form with respect to the same choices of generators
and representatives.
Proof. Let π be a generator of the maximal ideal of R, let e be the smallest positive integer such
that π e = 0. By the definition of principal row canonical form, the pivot of row Ai is Aii = π ℓi for
i ∈ {1, . . . , t}, with 0 ≤ ℓ1 ≤ . . . ≤ ℓt ≤ e. Moreover, Aij = π aij with aij ≥ ℓi for i < j ≤ n, hence
ann(Aij ) ⊇ ann(Aii ).
Pt
Let v ∈ row(A) \ {0}, let j = ℓ(v). Write v =
i=1 ri Ai for some r1 , ..., rt ∈ R. Hence
v1 = r1 A1,1 = 0, v2 = r1 A1,2 + r2 A2,2 = 0, . . . , vj−1 = r1 Ai,j−1 + . . . + rj−1 Aj−1,j−1 . By induction
on iP
one can show that ri Aii = 0 for 1 ≤ i < j, hence ri Ai = 0 for 1 ≤ i < j. Therefore
v = ti=j ri Ai ∈ hAj , . . . , At i, so A is in reduced row-echelon form according to Definition 10.
We conclude this section with Proposition 32, that shows that the error-trapping decoding
scheme proposed in [4] for the MAMC can be interpreted as a minimum distance decoding with
respect to the distance function from Definition 20. Before stating our result, we recall the scheme
of [4, Section IX].
Example 31 (Error-trapping decoding). Let R be a finite chain ring. Fix N such that n ≥ 2N
and consider the channel equation Y = AX + Z, where A ∈ RN ×t is left-invertible, X ∈ Rt×n is
the matrix whose rows generate the transmitted module, and Z ∈ RN ×n is a noise matrix whose
row-module is isomorphic to Rv for some integer v ≤ N . One can write
0
A = P (N −t)×t ,
It
where P ∈ RN ×N is an invertible matrix. Fix u ≥ v. If t + v > N let X ∈ Rt×n be of the form
0 0
,
X=
0 X
where X is a matrix in principal form of size (N − u) × (n − u). If t + v ≤ N let X ∈ Rt×n be of
the form
X= 0 X ,
where X is a matrix in principal form of size t × (n − u). Under the assumption that error trapping
is successful, [4, Section IX.B] shows that the row canonical form of Y = AX + Z is
Z1 Z2
0 X,
0
0
for suitable matrices Z1 ∈ Rv×u and Z2 ∈ Rv×(n−u) . Hence X and X can be obtained by computing
the row canonical form of Y .
12
In some cases, the error-trapping decoding from [4] can be seen as an instance of minimum
distance decoding according to our definition. Notice that the choice u = v is particularly interesting, since it maximizes the number of codewords for the given channel, without affecting the
error-correction capability of the code.
Proposition 32. Following the notation of Example 31, and under the assumption that either
t + v = N or u = v and t + v > N , we have
0 0
0 0
d row(Y ), row
≥ d row(Y ), row
0 T
0 X
for any principal matrix in row canonical form T of the same size as X. Moreover, equality holds
if and only if T = X.
Proof. Since error-trapping is successful, by [4, Section IX.B] there exist matrices G, H, K such that
H K
Y =G·
,
0 X
where G ∈ RN ×N is invertible, H ∈ Rv×u and row(H) ∼
= Rv , K ∈ Rv×(n−u) . Since row(H) ∼
= Rv ,
H K
0 0
0 0
0 0
row
∩ row
= row
∩ row
.
0 X
0 T
0 X
0 T
Therefore
0 0
= λ(row(Y )) + λ(row(T )) − 2λ(row(X) ∩ row(T ))
d row(Y ), row
0 T
0 0
+ λ(row(T )) + λ(row(X)) − 2λ(row(X) ∩ row(T ))
= d row(Y ), row
0 X
0 0
0 0
0 0
+ d row
, row
.
= d row(Y ), row
0 X
0 T
0 X
The result now follows from the fact that both X and T are principal matrices in row canonical
form, hence they are in reduced row-echelon form by Proposition 30.
4
Bounds
In this section we derive two upper-bounds on the cardinality of a submodule code with given
minimum distance. We also discuss in detail some choices of rings or of the code parameters, for
which our bound can be made more precise.
As in the previous sections, we fix a finite PIR R, an R-module Ω ⊆ Rn of the form (2), and let
M(Ω) denote the set of R-submodules of Ω.
Notation 33. For M ∈ M(Ω) and 1 ≤ s ≤ λ(M ) let
M
= |{N ∈ M(M ) : λ(N ) = s}|.
s R
For 1 ≤ s ≤ λ let
M
λ
: M ∈ M(Ω), λ(M ) = λ .
= min
s R
s R
13
When there is no ambiguity, we omit the subscript R. Moreover, we denote by
λ
λ
=
s F
s q
q
the q-ary binomial coefficient.
We restrict our attention to submodules codes C ⊆ M(Ω) where all codewords have the same
length k, 1 ≤ k ≤ n · λ(R) − 1. Submodule codes of this kind have even minimum distance, and
they are the module-analogue of constant-dimension subspace codes. The next result is a natural
extension to submodule codes of the Singleton-like bound for subspace codes.
Theorem 34. Let C ⊆ M(Ω) be a submodule code with λ(M ) = k for all M ∈ C and minimum
distance d(C) = 2δ. Then
λ(Ω) − δ + 1
|C| ≤
.
k−δ+1
Proof. Let M ∈ M(Ω) be an R-module with λ(M ) = λ(Ω) − δ + 1. By Lemma 6, for all N ∈ C
λ(M ∩ N ) = λ(M ) + λ(N ) − λ(M + N ) ≥ λ(Ω) − δ + 1 + k − λ(Ω) = k − δ + 1.
For every N ∈ C choose an R-submodule N ′ ⊆ M ∩ N with λ(N ′ ) = k − δ + 1. For any N, P ∈ C
with N 6= P we have 2δ = d(C) ≤ d(N, P ) = 2k − 2λ(N ∩ P ), hence λ(N ∩ P ) ≤ k − δ. Hence
d(N ′ , P ′ ) = 2(k − δ + 1) − 2λ(N ′ ∩ P ′ ) ≥ 2(k − δ + 1) − 2(k − δ) = 2,
in particular N ′ 6= P ′ . It follows that C ′ = {N ′ : N ∈ C} is a set of submodules of M of length
k − δ + 1 with |C ′ | = |C|. Therefore
M
′
|C| = |C | ≤
,
k−δ+1
for any M ∈ M(Ω) of length λ(Ω) − δ + 1.
M
Remark 35. For a given R and fixed m, ℓ, the quantity
may depend on the choice of M of
ℓ
length m. E.g., let R = Z5 [i] ⊇ I = (2 + i) and Ω = R2 . Then R × 0 and I × I are two R-modules
of length 2. The ideals of length one of R are exactly I = (2 + i) and (2 − i), while I × I contains
at least three submodules of length one, namely I × 0, 0 × I, and (1, 1)I = h(2 + i, 2 + i)i.
Remark 36. Since every R-module of length greater than or equal to λ(Ω) − δ + 1 contains an
R-submodule of length λ(Ω) − δ + 1, the bound of Theorem 34 can also be stated as
M
|C| ≤ min
: M ∈ M(Ω), λ(M ) ≥ λ(Ω) − δ + 1 .
k−δ+1
The following is another simple bound for the cardinality of a submodule code.
Theorem 37. Let C ⊆ M(Ω) be a submodule code with λ(M ) = k for all M ∈ C, and minimum
distance d(C) = 2δ. Then
Ω
k−δ+1
.
|C| ≤
k
k−δ+1
14
k
submodules of Ω of length k − δ + 1. Moreover,
Proof. Each M ∈ C contains at least
k−δ+1
a submodule of Ω of length k − δ + 1 cannot be contained in two distinct M, N ∈ C, as otherwise
λ(M ∩ N ) ≥ k − δ + 1, hence d(M, N ) < 2δ. Therefore
Ω
k
≥ |C| ·
,
k−δ+1
k−δ+1
which proves the bound.
Remark 38. The upper bounds of Theorem 34 and 37 are not comparable. For example, let k = δ,
R = Fq , and Ω = Fnq . Assume that k | n. The bound of Theorem 34 is
n−k+1
|C| ≤
= q n−k + q n−k−1 + . . . + q + 1,
1
q
while the bound of Theorem 37 is
n
1 q
qn − 1
|C| ≤ = k
= q n−k + q n−2k + . . . + q k + 1.
q −1
k
1 q
However, one can also find examples in which Theorem 34 yields a better bound than Theorem 37.
E.g., let R = Z12 . The Hasse diagram of the ideals of R is
R
(2)
(3)
(4)
(6)
(0)
In particular, λ(R) = 3. Let Ω = R2 and let C ⊆ M(Ω) be a submodule code with k = δ = 2. By
Theorem 25, the module
1 0
M = row
⊆Ω
0 3
has λ(M ) = λ(1) + λ(3) = 5. Moreover, the submodules of M of length 1 are precisely those generated by one of the following vectors: (4, 0), (6, 0), (6, 6), (0, 6). Therefore, |C| ≤ 4 by Theorem 34.
Now let N = h(0, 3)i ⊆ Ω. Then λ(N ) = 2 and N has a unique submodule of length 1, namely
h(0, 6)i. Hence
2
N
= min
: N ∈ M(Ω), λ(N ) = 2 = 1.
1
1
One can check that the submodules of Ω of length 1 are exactly those generated by one of the
following vectors: (4, 0), (4, 4), (4, 8), (6, 0), (6, 6), (0, 4), (0, 6). Therefore the bound of Theorem 37
reads
2
Ω
= 7 > 4.
/
|C| ≤
1
1
15
The bounds of Theorem 34 and Theorem 37 can be made more explicit for PIR’s which are
2
isomorphic to Zm
p for some m ≥ 1. An example of such ring is Zp [i], which is isomorphic to Zp if
p ≡ 1 mod 4, as we show next. Notice that in the other cases Zp [i] is either a finite chain ring or
a finite field.
Remark 39. Let p be a prime. Then
Z2 [x]/(x + 1)2
2
Zp [i] ∼
F 2
= Zp [x]/(x + 1) ∼
=
p
Zp × Zp
if p = 2,
if p ≡ 3 mod 4,
if p ≡ 1 mod 4.
Indeed, if p = 2, then x2 + 1 = (x + 1)2 . If p is an odd prime, then x2 + 1 is reducible if and only
if −1 is a quadratic residue modulo p, if and only if p ≡ 1 mod 4. The thesis now follows from the
Chinese Remainder Theorem.
We start with a preliminary result on the structure of rings of the form R ∼
= Zm
p .
Lemma 40. Let R ∼
= Zm
p . Then there exist e1 , . . . , em ∈ R such that
R = (e1 ) ⊕ . . . ⊕ (em )
and e1 + . . . + em = 1, e2i = ei for all 1 ≤ i ≤ m, and ei ej = 0 if i 6= j. Moreover, λ(R) = m.
m
Proof. Fix an isomorphism π : R → Zm
p between R and Zp . Let ei ∈ R be the inverse image via π
m
of the i-th element of the standard basis of Zp . Then e1 + . . . + em = 1, e2i = ei for all 1 ≤ i ≤ m,
and ei ej = 0 if i 6= j. Notice that R is a Zp -vector space via αr = π −1 (απ(r)) for α ∈ Zp , r ∈ R.
This corresponds to identifying Zp with {π −1 (α, . . . , α) : α ∈ Zp } ⊆ R. Since R = (e1 ) ⊕ . . . ⊕ (em ),
then every r ∈ R can be written uniquely as r = r1 e1 + . . . + rm em with ri ∈ Zp , where we regard
Zp as a subset of R via the identification above. Therefore λ(R) = m and a composition series for
R is given by 0 ( (e1 ) ( (e1 , e2 ) ( . . . ( (e1 , . . . , em ) = R.
Using the notation of Lemma 40, we can count the number of submodules of fixed length of any
given R-module M . For the sake of concreteness we limit our attention to submodules of Rn , but
the same proof applies to any finitely generated R-module M .
n
Theorem 41. Let R ∼
= Zm
p , let M ∈ M(R ). The number of R-submodules of M of length ℓ is
m
X
Y
M
dim(ei M )
=
.
ℓ
ℓi
m
p
(ℓ1 , . . . , ℓm ) ∈ N ,
ℓ1 + . . . + ℓm = ℓ
In particular,
i=1
X
m
pdim(ei M ) − 1
M
=
.
1
p−1
i=1
Proof. By Lemma 40, for all M ∈ M(Rn ) one has
M = e1 M ⊕ . . . ⊕ em M.
Pm
Therefore λ(M ) = i=1 λ(ei M ). Moreover, for all r = r1 e1 + . . . + rm em ∈ R and v ∈ M we have
rei v = ri ei v for all i. Therefore the R-submodules of ei M coincide with its Zp -subspaces, hence
λ(ei M ) = dimZp (ei M ). Hence we have shown that for every R-module M ⊆ Rn
λ(M ) =
m
X
dimZp (ei M ) = dimZp (M ).
i=1
16
Since for every collection of submodules Ni ⊆ ei M the module N = N1 ⊕ . . . ⊕ Nm ∈ M(M ) and
the R-submodules of ei M coincide with its Zp -subspaces, then the number of R-submodules of M
of length ℓ is
m
Y
X
M
dim(ei M )
.
=
ℓ
ℓi
m
p
(ℓ1 , . . . , ℓm ) ∈ N ,
ℓ1 + . . . + ℓm = ℓ
i=1
Theorem 41 allows us to evaluate the bounds of Theorem 34 and Theorem 37 as follows.
∼ Zm . Let C ⊆ M(Ω) be a submodule code with λ(M ) = k for all M ∈ C
Corollary 42. Let R =
p
and d(C) = 2δ. Let
m
Y
X
ui
m
b(λ, k, δ) = min
: (u1 , . . . , um ) ∈ N , u1 + . . . + um = λ − δ + 1 .
ℓi p
i=1
(ℓ1 , . . . , ℓm ) ∈ Nm ,
ℓ1 + . . . + ℓm = k − δ + 1
Then
|C| ≤ b(λ(Ω), k, δ).
Moreover,
|C| ≤
X
(ℓ1 , . . . , ℓm ) ∈ Nm ,
ℓ1 + . . . + ℓm = k − δ + 1
(4)
m
Y
dim(ei Ω)
i=1
ℓi
b(k + δ − 1, k, δ)
If Ω = Rn and δ = k, then
|C| ≤
p
.
(pn − 1)/(p − 1)
.
⌈(pk/m − 1)/(p − 1)⌉
(5)
(6)
If in addition m = 2 and k is odd, then
|C| ≤ ⌊2(pn − 1)/(ph + ph−1 − 2)⌋,
(7)
where h = ⌈k/2⌉.
Proof. Let M ∈ M(Ω) be a submodule of length λ(M ) = λ(Ω) − δ + 1 and let ui = dim(ei M ) for
all i. By Theorem 41, the number of submodules of M of length k − δ + 1 equals
m
Y
X
M
ui
.
=
k−δ+1
ℓi p
m
(ℓ1 , . . . , ℓm ) ∈ N ,
ℓ1 + . . . + ℓm = k − δ + 1
i=1
Hence Theorem 34 implies bound (4). Similarly, bound (5) follows from Theorem 37.
Now assume δ = k and Ω = Rn . We have
)
!
(
m
m
X
X
1
ui = k .
pui − m : (u1 , ..., um ) ∈ Nm ,
b(2k − 1, k, k) = min
p−1
i=1
i=1
P
xi
m
Let f : Rm → R be the function defined by f (x1 , ..., xm ) = m
i=1 p for all (x1 , ..., xm ) ∈ R . Using
e.g. the method of Lagrange multipliers from Calculus, one can show that the minimum of f in the
region of Rm defined by the constraints
m
X
xi = k,
xi ≥ 0 for all i ∈ {1, ..., m}
i=1
17
is attained for x1 = x2 = . . . = xm = k/m, and that its value is mpk/m . This shows that
b(2k − 1, k, k) ≥ ⌈(mpk/m − m)/(p − 1)⌉.
Bound (6) now follows from bound (5) and the fact that dim(ei Ω) = n for all i ∈ {1, ..., m}. If in
addition m = 2 and k is odd, then without loss of generality we may assume u1 ≥ u2 + 1. Using
elementary methods from Calculus, one shows that
b(2k − 1, k, k) ≥
ph + ph−1 − 2
,
p−1
where h = ⌈k/2⌉. This concludes the proof.
We conclude this section by evaluating the bound of Theorem 34 for finite chain rings. We
concentrate on codes C ⊆ M(Ω) with λ(M ) = k for all M ∈ C and d(C) = 2k.
Theorem 43. Let R be a finite chain ring of length e, let π ∈ R be a generator of the maximal
ideal of R, let q be the cardinality of the residue field of R. Let
Ω = R × (π a2 ) × . . . × (π an )
for some 0 ≤ a2 ≤ . . . ≤ an ≤ e − 1. Let C ⊆ M(Ω) be a submodule code with d(C) = 2k and whose
codewords have length k. Then
qm − 1
|C| ≤
q−1
where m = min{1 ≤ i ≤ n | (n − i)e − ai+1 − . . . − an ≤ k − 1}. In particular, if Ω = Rn , then
|C| ≤
q n−h+1 − 1
q−1
where k = he − r with 0 ≤ r ≤ e − 1.
Proof. We claim that the submodules of length one of an R-module M ⊆ Rn are in bijection with
the vectors v ∈ M of the form
v = (0, . . . , 0, π e−1 , vi+1 , ..., vn )
| {z }
(8)
i−1
where 1 ≤ i ≤ n and vi+1 , ..., vn ∈ (π e−1 ). In fact, every module of length one is minimally generated
by one vector. If we represent a module generated by one vector by a matrix in reduced row-echelon
form, then such a matrix has a unique row by Theorem 25, and by Proposition 17 the row is of
the form v = (0, . . . , 0, π s , vi+1 , ..., vn ) with vi+1 , ..., vn ∈ (π s ). Finally, λ(hvi) = λ(π s ) = e − s by
Theorem 25. Hence the modules of length one are exactly those generated by vectors of the form
(8). By uniqueness of the reduced row-echelon form, two such modules are distinct if and only if
they are generated by distinct vectors in reduced row-echelon form. This proves the claim. Notice
that there are exactly q n−i vectors of the form (8), for a fixed i ∈ {1, . . . , n}.
Let M ⊆ Ω be a submodule of length λ(Ω) − k + 1. Let m be the least integer such that
M ⊆ Rm × |0 × .{z
. . × 0} .
n−m
Notice that m depends on M , and not just on its length. Then M contains exactly q m−1 + q m−2 +
m −1
vectors of the form (8), since each such vector has vi+1 , . . . , vm ∈ (π e−1 )
. . . + q + 1 = qq−1
18
and vm+1 = . . . = vn = 0, for some 1 ≤ i ≤ m. Since Ω = R × (π a2 ) × . . . × (π an ), then
λ(Ω) = ne − a2 − . . . − an . If
M ⊆ (Ri × 0 × . . . × 0) ∩ Ω = R × π a2 R × . . . × π ai R × 0 × . . . × 0
for some i, then λ(M ) = ne − a2 − . . . − an − k + 1 ≤ λ(R × π a2 R × . . . × π ai R) = ie − a2 − . . . − ai .
Hence
m ≥ min{1 ≤ i ≤ n : (n − i)e − ai+1 − . . . − an ≤ k − 1}
and equality holds for any M ⊆ R × (π a2 ) × . . . × (π am ) × 0 × . . . × 0. By Theorem 34
M
|C| ≤ min
: M ⊆ Ω, λ(M ) = λ(Ω) − δ + 1
k−δ+1
= min
qi − 1
qm − 1
i
: M ⊆ Ω ∩ R × 0 × . . . × 0, λ(M ) = λ(Ω) − δ + 1 =
q−1
q−1
where m = min{1 ≤ i ≤ n | (n − i)e − ai+1 − . . . − an ≤ k − 1}.
If Ω = Rn , then a2 = . . . = an = 0. Write k = he − r with 0 ≤ r ≤ e − 1. Then (h − 1)e ≤
k − 1 ≤ he − 1, hence m = min{1 ≤ i ≤ n | (n − i)e ≤ k − 1} = n − h + 1.
5
Constructions
In this section we propose some constructions for submodule codes for an ambient space of the form
Ω = Rn . Throughout the section we say that a code is asymptotically optimal if its cardinality
asymptotically meets one of the bounds of the previous section. We say that a code is optimal if
its cardinality exactly meets one of the bounds.
We first concentrate on finite chain rings, and show how to construct optimal codes of maximum
correction capability. Our codes can be regarded as the submodule code analogue of the partial
spread codes from [6]. We then look at finite PIR’s that contain a field F, and show how subspace
codes over F can be lifted to submodule codes over R by tensoring them with R. This allows us to
construct optimal submodule codes over Zp [i] of maximum correction capability. Finally we show
how to obtain submodule codes over a ring of the form R1 × . . . × Rm from submodule codes over
R1 , ..., Rm . We propose two constructions of the latter type, and discuss their decoding. For the
first construction we take a cartesian product of codes on the Ri ’s and show that this yields a code
on R, whose parameters are determined and whose decoding can be reduced to decoding on each
of the Ri ’s. However, not every code over a R is a product of codes over the Ri ’s: Our second
construction yields a code over R which is not a product. We show that, in that case, decoding
cannot be reduced to decoding on each of the Ri ’s. This shows in particular that, although every
finite PIR R is isomorphic to a product of finite fields and finite chain rings, the study of codes over
R cannot be reduced in general to the study of codes over finite fields and finite chain rings.
5.1
Partial spreads over finite chain rings
We start with a construction that can be applied to any PIR. Its optimality relies on the existence
of large sets of matrices, in which the length of the difference of any two of them is maximum. In
Proposition 46 we will show that such large sets can be constructed over any finite chain ring.
Theorem 44. Let R be a finite PIR. Let n, k be positive integers. Write k = h · λ(R) − r with
0 ≤ r ≤ λ(R) − 1, and assume n ≥ 2h. Write n = ν · h + ρ with 0 ≤ ρ ≤ h − 1. Let A ⊆ Rh×h and
19
A′ ⊆ Rh×(h+ρ) be subsets such that λ(row(A − B)) = h · λ(R) for all A, B ∈ A with A 6= B and
A, B ∈ A′ with A 6= B. For i ∈ {1, ..., ν − 1} let
Si = 0h×h . . . 0h×h Ih×h Ai+1 . . . Aν−1 Aν : Ai+1 , ..., Aν−1 ∈ A, Aν ∈ A′ ⊆ Rh×n ,
where Ih×h is the identity matrix of size h×h. Define Sν =
an ideal of length λ(R) − r. For all i ∈ {1, ..., ν} let
0h×(n−h) Ih×h
. Let ζ ∈ R generate
Si,ζ = {Mζ : M ∈ Si },
where Mζ is the matrix obtained from M by multiplying its last row by ζ. Then
C=
ν
[
{row(M ) : M ∈ Si,ζ }
i=1
is a submodule code of length λ(C) = k, minumum distance d(C) = 2k, and cardinality
|C| = |A′ | ·
|A|ν−1 − 1
+ 1.
|A| − 1
Proof. Let Mζ ∈ Si,ζ . Then Mζ is in row-echelon form and λ(row(Mζ )) = (h − 1) · λ(R) + λ(ζ) = k
by Theorem 25. Define the code
C′ =
ν
[
{row(M ) : M ∈ Si }.
i=1
Again M is in row-echelon form and λ(row(M )) = h · λ(R). Moreover, arguing as in [6, Theorem
13 and Proposition 17] and replacing the rank with the length, one sees that d(C ′ ) = 2h · λ(R), i.e.,
the submodules that constitute C ′ have trivial pairwise intersections. Moreover,
|C ′ | = |A′ | ·
|A|ν−1 − 1
+ 1.
|A| − 1
Now observe that C is obtained from C ′ by taking an appropriate submodule of each codeword.
Therefore the codewords of C have trivial pairwise intersection. Hence d(C) = 2k and |C| = |C ′ |.
We now show that over a finite chain ring R one can construct large sets A and A′ to be used
within the construction from Theorem 44.
Lemma 45. Let R be a ring, let s, t > 0. Then for any v1 , ..., vt ∈ Rs we have λ(hv1 , ..., vt i) ≤ t·λ(R).
Proof. Let A ∈ Rt×s be the matrix with rows v1 , ..., vt . Right multiplication by A induces an
R-homomorphism fA : Rt → Rs , whose image is hv1 , . . . , vt i. Since Im(fA ) ∼
= Rt / ker(fA ), then
t
t
λ(hv1 , . . . , vt i) = λ(R ) − λ(ker(fA )) ≤ λ(R ) = t · λ(R).
Proposition 46. Let R be a finite chain ring with residue field of order q. Then for all h > 0 and
for all 0 ≤ ρ ≤ h − 1 there exists a set A ⊆ Rh×(h+ρ) with |A| = q h+ρ and λ(row(A − B)) = h · λ(R)
for all A, B ∈ A with A 6= B.
20
Proof. We first prove the statement for ρ = 0. Let π be a generator of the maximal ideal of R, and
let f : R → R/(π) be the projection map. Let ι : R/(π) → R be such that f ◦ ι is the identity of
R/(π). Such a ι can be obtained by mapping each element of R/(π) to one of its representatives in
R. Notice that we do not require that ι is a ring homomorphism. We extend f and ι entrywise to
f : Rh×h → (R/(π))h×h and ι : (R/(π))h×h → Rh×h .
, by [3, Section 6] there exists A′ ⊆ (R/(π))h×h with |A′ | = q h and
Since (R/(π))h×h ∼
= Fh×h
q
′
′
′
A − B invertible for any A , B ′ ∈ A′ with A′ 6= B ′ . Then the set of matrices A = {ι(A′ ) : A′ ∈
A′ } ⊆ Rh×h has the expected properties. Indeed, let A′ , B ′ ∈ A′ with A′ 6= B ′ . Since f is a ring
homomorphism, we have
f (det(ι(A′ ) − ι(B ′ ))) = det(f (ι(A′ )) − f (ι(B ′ ))) = det(A′ − B ′ ) 6= 0.
Therefore det(ι(A′ ) − ι(B ′ )) ∈
/ (π). As (π) is the only maximal ideal of R, det(ι(A′ ) − ι(B ′ )) is
invertible, hence ι(A′ ) − ι(B ′ ) is invertible. This implies row(ι(A′ ) − ι(B ′ )) ∼
= Rh , which has length
′
h
h · λ(R). In addition |A| = |A | = q .
Now assume ρ > 0, and set h′ = h+ρ. By the first part of the proof there exists a set of matrices
′
′
B ⊆ Rh ×h with λ(row(A − B)) = h′ · λ(R) for all A, B ∈ B with A 6= B. For A ∈ B denote by A
the matrix obtained from A by deleting the first ρ rows. A simple application of Lemma 45 shows
′
that the set A = {A : A ∈ B} ⊆ Rh×h has the desired properties.
Example 47. Let R be a finite chain ring with residue field of order q. Following the notation
of Theorem 44, Proposition 46 allows us to construct a submodule code C ⊆ M(Rn ) of constant
length λ(C) = k, minimum distance d(C) = 2k, and cardinality
|C| = q h+ρ ·
q n − q h+ρ + q h − 1
q h(ν−1) − 1
+
1
=
∈ O(q n−h )
qh − 1
qh − 1
(as n > h+ρ). Let C be a submodule code with the same parameters as C and maximum cardinality.
By Theorem 43 we have |C| ≤ (q n−h+1 − 1)/(q − 1). Therefore
1≥
q−1
|C|
q n − q h+ρ + q h − 1
q→∞
−→ 1.
· n−h+1
≥
h
q −1
q
−1
|C|
This shows that C is an asymptotically optimal submodule code.
5.2
Tensor product construction and partial spreads over rings of the form Zm
p
Assume that R contains a finite field F ⊆ R as a subring and that R and F have the same one. Let
V ⊆ Fn be an F-linear space. Recall that the tensor product V ⊗F R ⊆ Rn is the submodule of Rn
generated by the elements of V . If V = hv1 , . . . , vm iF , then
V ⊗F R = hv : v ∈ V iR = hv1 , . . . , vm iR .
Lemma 48. Let V ⊆ Fn be an F-linear space. Then
λ(V ⊗F R) = λ(R) · dimF (V ).
Proof. Let t = dimF (V ), and let A ∈ Ft×n be a matrix in reduced row-echelon form, whose rows
generate V . Regard A as a matrix over R. Then A is still in row-echelon form and row(A) = V ⊗F R.
Since all the pivots of A are ones, by Theorem 25 we have λ(V ⊗F R) = λ(1) · t = λ(R) · dimF (V ),
as claimed.
21
Lemma 49. Let V, W ⊆ Fn be F-linear spaces. Then (V ⊗F R) ∩ (W ⊗F R) = (V ∩ W ) ⊗F R.
Proof. By definition (V ∩ W ) ⊗F R ⊆ (V ⊗F R) ∩ (W ⊗F R). Therefore by Lemma 6 it suffices to
show that they have the same length. By Lemma 48
λ((V ∩ W ) ⊗F R) = λ(R) · dimF (V ∩ W ) = λ(R) · (dimF (V ) + dimF (W ) − dimF (V + W )) =
λ(V ⊗F R) + λ(W ⊗F R) − λ((V + W ) ⊗F R) = λ((V ⊗F R) ∩ (W ⊗F R)),
where the last equality follows from Lemma 6 and from observing that (V + W ) ⊗F R = V ⊗F R +
W ⊗F R.
From Lemma 48 and 49 one obtains the following construction.
Theorem 50. Let C ⊆ M(Fn ) be a subspace code of minimum subspace distance 2δ and dimF (V ) =
k for all V ∈ C. Then
C ⊗F R = {V ⊗F R : V ∈ C} ⊆ M(Rn )
is a submodule code of cardinality |C ⊗F R| = |C|, whose codewords have length λ(R) · k, and whose
minimum distance is 2λ(R) · δ.
∼
Example 51. Let F = Zp and R = Zm
p . Then Zp = {(a, a, ..., a) : a ∈ Zp } ⊆ R can be viewed
as a subring of R. We have λ(R) = m. Let h be an integer, 1 ≤ h ≤ n/2. By [6, Theorem 13
and Proposition 17], there exists a subspace code C ⊆ M(Znp ) of constant dimension h, minimum
distance 2h and cardinality (pn − ph+ρ + ph − 1)/(ph − 1), where ρ is the remainder of the division
of n by h. By Theorem 50, C ⊗Zp R ⊆ M(Rn ) is a submodule code whose codewords have length
mh and minimum distance 2mh. Moreover,
|C ⊗Zp R| =
pn − pρ
− pρ + 1.
ph − 1
Let C be a submodule code with the same parameters as C ⊗Zp R and maximum cardinality. By
Theorem 42 (6), |C| ≤ (pn − 1)/(ph − 1). Therefore
1≥
|C ⊗Zp R|
|C|
≥
pn − ph+ρ + ph − 1 ph − 1 q→∞
−→ 1.
· n
ph − 1
p −1
Hence C ⊗Zp R is asymptotically optimal, and it is optimal when ρ = 0.
Fix 1 ≤ ℓ ≤ m − 1. For all M ∈ C ⊗Zp R choose a submodule M ′ ⊆ M with λ(M ′ ) = mh − ℓ.
Then D = {M ′ : M ∈ C ⊗Zp R} ⊆ M(Rn ) is a submodule code with minimum distance 2mh − 2ℓ
and whose codewords have length mh − ℓ. Moreover,
|D| = |C ⊗Zp R| =
pn − pρ
− pρ + 1.
ph − 1
Let D be a submodule code with the same parameters as D and maximum cardinality. By Theorem 42 (6) we have |D| ≤ (pn − 1)/(ph−ℓ/m − 1). Therefore
1≥
|D|
pn − ph+ρ + ph − 1 ph−ℓ/m − 1
−ℓ/m
.
·
∈
O
p
≥
ph − 1
pn − 1
|D|
If in addition m = 2, then by Proposition 42 (7)
1≥
pn − ph+ρ + ph − 1 ph + ph−1 − 2 q→∞
|D|
≥
−→ 1/2.
·
ph − 1
2(pn − 1)
|D|
Therefore D is asymptotically optimal, up to a factor 2.
22
Remark 52. Let C ⊆ M(Fn ) be a subspace code over the finite field F, and let W ⊆ Fn be a
decodable space for the code C, i.e., an F-linear space for which there exists V ∈ C with d(V, W ) ≤
⌊(dS (C)−1)/2⌋, where dS (C) denotes the minimum subspace distance of C. Then W ⊗F R is decodable
in the submodule code C ⊗F R, and it decodes to V ⊗F R.
However, there exist submodules of Rn which are decodable in C ⊗F R but are not of the form
W ⊗F R, with W an F-space which is decodable in C. Moreover, if N ⊆ Rn is decodable in C ⊗F R,
then N ∩ Fn is not necessarily decodable in C.
Let e.g. R = Z5 [i], F = Z5 , and let C = {V1 , V2 } ⊆ M(Z45 ) be the subspace code whose
codewords are the 2-dimensional spaces
V1 = h(1, 0, 1, 0), (0, 1, 0, 1)iZ5 ,
V2 = h(1, 0, 2, 1), (0, 1, 1, 0)iZ5 .
Then C has subspace distance dS (C) = 4. By Theorem 50 the submodule code C ⊗Z5 Z5 [i] has two
codewords of length 4 and submodule distance d(C ⊗Z5 Z5 [i]) = 8.
Let
N = h(i + 2, 0, i + 2, 0), (0, 1, 0, i − 1)iZ5 [i] ⊆ Z5 [i]4
be a received submodule. Then d(N, V1 ⊗Z5 Z5 [i]) = 3 ≤ ⌊(8 − 1)/2⌋ = 3, so N is decodable
in C ⊗Z5 Z5 [i]. However, N is not of the form W ⊗Z5 Z5 [i] for any vector space W . Moreover,
N ∩ Z45 = 0, so N ∩ Z45 is not decodable in C with respect to the subspace distance.
5.3
Two constructions over products of rings
Let R ∼
= R1 × . . . × Rm , where R1 , . . . , Rm are finite commutative rings with identity. Let πi be the
projection on the factor Ri . Then each πi extends componentwise to a map πi : Rn → Rin .
Lemma 53. Let R ∼
= R1 × . . . × Rm be a finite ring, let M ⊆ Rn be an R-module. Then
M∼
= π1 (M ) × . . . × πm (M ), each πi (M ) is an Ri -module and
λR (M ) =
m
X
λRi (πi (M )).
i=1
Proof. Let ri ∈ Ri and v ∈ M . Then πi (v) = (πi (v1 ), . . . , πi (vn )) ∈ πi (M ) ⊆ Rin , and ri πi (v) =
(ri πi (v1 ), . . . , ri πi (vn )) ∈ πi (M ). This makes πi (M ) into an Ri -module. Moreover, the isomorphism
n restricts to an isomorphism M ∼ π (M ) × . . . × π (M ). Hence
Rn ∼
= 1
= R1n × . . . × Rm
m
λR (M ) =
m
X
λR (πi (M )) =
m
X
λRi (πi (M )),
i=1
i=1
where the last equality follows from the fact that any R-submodule of πi (M ) is an Ri -submodule,
and viceversa.
We start with a simple construction, where we produce a code over R1 × . . . × Rm by taking the
n.
cartesian product of codes over each Ri . For simplicity of notation we identify Rn and R1n × . . . Rm
Theorem 54. Let R1 , ..., Rm be finite PIR’s and let R = R1 × . . . × Rm . For i ∈ {1, ..., m} let
Ci ⊆ M(Rin ) be a submodule code whose codewords have length ki . Then
C = C1 × . . . × Cm = {M1 × . . . × Mm : Mi ∈ Ci for all i } ⊆ M(Rn )
is a submodule code of cardinality |C| = |C1 | . . . |Cm |, whose codewords have length k1 + . . . + km ,
and with minimum distance d(C) = min{d(Ci ) : 1 ≤ i ≤ m}.
23
We now show that decoding of the product code C = C1 × . . . × Cm over R can be reduced to
decoding each of the codes Ci over Ri .
Proposition 55. Let R1 , ..., Rm be finite PIR’s and let R = R1 × . . . × Rm . For i ∈ {1, ..., m}
let Ci ⊆ M(Rin ) be a submodule code and let C = C1 × . . . × Cm ⊆ M(Rn ) be the product code.
Let N ⊆ Rn be a received decodable submodule, i.e., an R-module for which there exists an
M = M1 × . . . × Mm ∈ C such that d(N, M ) ≤ ⌊(d(C) − 1)/2⌋. Then for all i ∈ {1, ..., m} we have
d(πi (N ), Mi ) ≤ ⌊(d(Ci ) − 1)/2⌋, i.e., πi (N ) decodes to Mi in Ci .
Proof. By Lemma 53, N = π1 (N ) × . . . × πm (N ), and Mi = πi (M ) for 1 ≤ i ≤ m. Moreover
d(N, M ) = λ(N ) + λ(M ) − 2λ(N ∩ M )
m
m
m
X
X
X
λRi (πi (N ∩ M ))
λRi (πi (M )) − 2
λRi (πi (N )) +
=
≥
i=1
i=1
m
X
d(πi (N ), πi (M )),
i=1
i=1
where the inequality follows from the fact that πi (N ∩ M ) ⊆ πi (N ) ∩ πi (M ). Therefore for all i we
have
d(πi (N ), πi (M )) ≤ d(N, M ) ≤ ⌊(d(C) − 1)/2⌋ ≤ ⌊(d(Ci ) − 1)/2⌋,
hence πi (N ) decodes to Mi in Ci .
Finally, we provide another construction which combines submodule codes over the factors Ri
into a submodule code over R = R1 ×. . .×Rm . Compared to the product construction of Theorem 54,
this construction produces a code with smaller cardinality and larger minimum distance, whose
decoding cannot be reduced to decoding over the Ri ’s. Again, for simplicity we identify Rn and
n.
R1n × . . . × Rm
Theorem 56. Let R1 , ..., Rm be finite PIR’s, and let R = R1 × . . . × Rm . For i ∈ {1, ..., m}
let Ci ⊆ M(Rin ) be a submodule code whose codewords have length ki . Let c = min |Ci |, and
for all i ∈ {1, ..., m} fix a subcode Ci′ ⊆ Ci with |Ci′ | = c. Enumerate the elements of each Ci′ as
Ci′ = {M1,i , ..., Mc,i }. Then
C = {Mj,1 × . . . × Mj,m : 1 ≤ j ≤ c} ⊆ M(Rn )
is a submodule code of cardinality |C| = c, with d(C) ≥ d(C1 ) + . . . + d(Cm ), and whose codewords
have length k1 + . . . + km .
Proof. We only prove the part about the minimum distance. Let j, j ′ ∈ {1, ..., c} with j 6= j ′ .
Arguing as in the proof of Proposition 55, one finds
d(Mj,1 × . . . × Mj,m , M
j ′ ,1
× ... × M
j ′ ,m
)≥
m
X
i=1
d(Mj,i , M
j ′ ,i
)≥
m
X
d(Ci ),
i=1
where the last inequality follows from the fact that Mj,i 6= Mj ′ ,i whenever j 6= j ′ .
Remark 57. Notice that an R-module which is decodable with respect to the code C constructed
in Theorem 56 is not necessarily a product of Ri -modules that are decodable with respect to the
codes Ci . E.g., let m = 2, n = 4, R1 = R2 = Z2 , R = Z2 × Z2 . Let
M1,1 = M1,2 = h(1, 0, 1, 0), (0, 1, 0, 1)iZ2 ,
M2,1 = M2,2 = h(1, 0, 1, 1), (0, 1, 1, 0)iZ2
24
and C1 = C1′ = {M1,1 , M1,2 }, C2 = C2′ = {M2,1 , M2,2 }. Then
(1, 1) (0, 0) (1, 1) (0, 0)
(1, 1) (0, 0) (1, 1) (1, 1)
C = row
, row
.
(0, 0) (1, 1) (0, 0) (1, 1)
(0, 0) (1, 1) (1, 1) (0, 0)
The code C has minimum distance d(C) = 8. Let
(1, 0) (0, 0) (1, 0) (0, 0)
N = row
(0, 0) (1, 1) (0, 1) (1, 1)
be a received submodule. Then N decodes to M1,1 ×M1,2 ∈ C, as d(N, M1,1 ×M1,2 ) = 3 ≤ ⌊(8−1)/2⌋.
However, π2 (N ) = h(0, 1, 1, 1)iZ2 is not decodable in C2 . In fact, d(π2 (N ), M21 ) = d(π2 (N ), M22 ) = 3.
References
[1] D. D. Anderson, M. Axtell, S. J. Forman, J. Stickles, When are Associates Unit Multiples?,
Rocky Mountain Journal of Mathematics 34 (2004), no. 3, 811–828.
[2] J. Buchmann, S. Neis, Algorithms for linear algebra problems over principal ideal rings, technical report, Technische Hochschule Darmstadt (1996).
[3] P. Delsarte, Bilinear forms over a finite field, with applications to coding theory, Journal of
Combinatorial Theory, Series A, 25 (1978), no. 3, 226 – 241.
[4] C. Feng, R. W. Nóbrega, F. R. Kschischang, D. Silva, Communication over finite-chain-ring
matrix channels, IEEE Transactions on Information Theory 60 (2014), no. 10, 5899–5917.
[5] C. Feng, D. Silva, F. R. Kschischang, An algebraic approach to physical-layer network coding,
IEEE Transactions on Information Theory 59 (2013), no. 11, 7576–7596.
[6] E. Gorla, A. Ravagnani, Partial spreads in random network coding, Finite Fields and Their
Applications 26 (2014), 104–115.
[7] J. A. Howell, Spans in the module (Zm )s , Linear and Multilinear Algebra 19 (1986), 67–77.
[8] R. Kötter, F. R. Kschischang, Coding for errors and erasures in random network coding, IEEE
Transactions on Information Theory 54 (2008), no. 8, 3579–3591.
[9] E. Kunz, Introduction to commutative algebra and algebraic geometry, Birkhäuser Boston Inc.,
Boston (1985).
[10] B. R. McDonald, Finite rings with identity, Pure and Applied Mathematics 28, Marcel Dekker
Inc., New York (1974).
[11] B. Nazer, M. Gastpar, Compute-and-forward: harnessing interference through structured codes,
IEEE Transactions on Information Theory 57 (2011), no. 10, 6463–6486.
[12] P. Popovski, H. Yomo, The anti-packets can increase the achievable throughput of a wireless
multi-hop network, Proceedings of the IEEE International Conference on Communications 2006,
ICC ’06, 3885 – 3890.
[13] Q T. Sun, J. Yuan, T. Huang, K. W. Shum, Lattice network codes based on Eisenstein integers,
IEEE Transactions on Information Theory 61 (2013), no. 7, 2713–2725.
25
[14] 0. Zariski, P. Samuel, Commutative Algebra Vol. 1, Graduate Texts in Mathematics 28,
Springer-Verlag, New York-Heidelberg-Berlin, (1975).
[15] S. Zhang, S.-C. Liew, P. P. Lam, Hot topic: physical layer network coding, Proceedings of
the 12th annual international conference on Mobile computing and networking, MobiCom ’06,
358–365.
26
| 0math.AC
|
Ant-Inspired Density Estimation via Random Walks
Cameron Musco
[email protected]
Hsin-Hao Su
[email protected]
Nancy Lynch
[email protected]
arXiv:1603.02981v1 [cs.DC] 9 Mar 2016
Massachusetts Institute of Technology
March 10, 2016
Abstract
Many ant species employ distributed population density estimation in applications ranging from
quorum sensing [Pra05], to task allocation [Gor99], to appraisal of enemy colony strength [Ada90]. It has
been shown that ants estimate density by tracking encounter rates – the higher the population density,
the more often the ants bump into each other [Pra05, GPT93].
We study distributed density estimation from a theoretical perspective. We show that a group of
anonymous agents randomly walking on a grid are able to estimatetheir density d to within a multiplicasteps by measuring their encounter
tive factor 1 ± ǫ with probability 1 − δ in just Õ log(1/δ)dǫlog(1/dǫ)
2
rates with other agents. Despite dependencies inherent in the fact that nearby agents may collide repeatedly (and, worse, cannot recognize when this happens), this bound nearly matches what is required
to estimate d by independently sampling grid locations.
From a biological perspective, our work helps shed light on how ants and other social insects can
obtain relatively accurate density estimates via encounter rates. From a technical perspective, our
analysis provides new tools for understanding complex dependencies in the collision probabilities of
multiple random walks. We bound the strength of these dependencies using local mixing properties
of the underlying graph. Our results extend beyond the grid to more general graphs and we discuss
applications to social network size estimation, density estimation by robot swarms, and random walkedbased sampling of sensor networks.
1
Introduction
The ability to sense local population density is an important tool used by many ant species. When a colony
must relocate to a new nest, scouts search for potential nest sites, assess their quality, and recruit other scouts
to high quality locations. A high enough density of scouts at a potential new nest (a quorum threshold )
triggers those ants to decide on the site and transport the rest of the colony there [Pra05]. When neighboring
colonies compete for territory, a high relative density of a colony’s ants in a contested area will cause those
ants to attack enemies in the area, while a low relative density will cause the colony to retreat [Ada90].
Varying densities of ants successfully performing certain tasks such as foraging or brood care can trigger
other ants to switch tasks, maintaining proper worker allocation within in the colony [Gor99, SHG06].
It has been shown that ants estimate density in a distributed manner, by measuring encounter rates
[Pra05, GPT93]. As ants randomly walk around an area, if they bump into a larger number of other ants,
this indicates a higher population density. By tracking encounters with specific types of ants, e.g. successful
foragers or enemies, ants can estimate more specific densities. This strategy allows each ant to obtain an
accurate density estimate and requires very little communication – ants must simply detect when they collide
and do not need to perform any higher level data aggregation.
1.1
Density Estimation on the Grid
We study distributed density estimation from a theoretical perspective. We model a colony of ants as a set
of anonymous agents randomly distributed on a two-dimensional grid. Computation proceeds in rounds,
with each agent stepping in a random direction in each round. A collision occurs when two agents reach
the same position in the same round and encounter rate is measured as the number of collisions an agent is
involved in during a sequence of rounds divided by the number of rounds. Aside from collision detection,
the agents have no other means of communication.
The intuition that encounter rate tracks density is clear. It is easy to show that, for a set of randomly
walking agents, the expected encounter rate measured by each agent is exactly the density d – the number
of agents divided by the grid size (see Lemma 3). However, it is unclear if encounter rate actually gives a
good density estimate – i.e., if it concentrates around its expectation.
Consider agents positioned not on the grid, but on a complete graph. In each round, each agent steps to
a uniformly random position and in expectation, the number of other agents they collide with in this step
is d. Since each agent chooses its new location uniformly at random in each step, collisions are essentially
independent between rounds. The agents are effectively taking
Bernoulli samples with success
independent
rounds
obtain a (1 ± ǫ) multiplicative
probability d, and by a standard Chernoff bound, within O log(1/δ)
dǫ2
approximation to d with probability 1 − δ.
On the grid graph, the picture is significantly more complex. If two agents are initially located near each
other on the grid, they are more likely to collide via random walking. After a first collision, due to their
proximity, they are likely to collide repeatedly in future rounds. The agents cannot recognize repeat collisions
since they are anonymous and even if they could, it is unclear that it would help. On average, compared to
the complete graph, agents collide with fewer individuals and collide multiple times with those individuals
that they do encounter, causing an increase in encounter rate variance and making density estimation more
difficult.
Mathematically speaking, on a graph with a fast mixing time [Lov93], like the complete graph, each
agent’s location is only weakly correlated with its previous locations. This ensures that collisions are also
weakly correlated between rounds and encounter rate serves as a very accurate estimate of density. The grid
graph on the other hand is slow mixing – agent positions and hence collisions are highly correlated between
rounds. This correlation increases encounter rate variance.
1.2
Our Contributions
Surprisingly, despite this increased variance, encounter
rate-based density estimation
on the grid is nearly as
log(1/δ) log log(1/δ) log(1/dǫ)
rounds, each agent’s encounter
accurate as on the complete graph. After just O
dǫ2
rate is a (1 ± ǫ) approximation to d with probability 1 − δ (see Theorem 2).
1
Technically, to bound accuracy on the grid, we obtain moment bounds on the number of times that two
randomly walking agents repeatedly collide over a set of rounds. These bounds also apply to the number of
equalizations (returns to starting location) of a single walk. While expected random walk hitting times, return
times, and collision rates are well understood [Lov93, ES09], higher moment bounds and high probability
results are much less common. We hope our bounds are of general use in the theoretical study of random
walks and random-walk based algorithms.
Our moment bounds show that, while the grid graph is slow mixing, it has sufficiently strong local mixing
to make random walk-based density estimation accurate. Random walks tend to spread quickly over a local
area and not repeatedly cover the same nodes. Significant work has focused on showing that random walk
sampling is nearly as good as independent sampling for fast mixing expander graphs [Gil98, CLLM12]. We
are the first to extend this type of analysis to slowly mixing graphs, showing that strong local mixing is
sufficient in many applications.
Beyond the grid, we show how to generate moment bounds from a bound on the probability that two
random walks re-collide (or analogously, that a single random walk equalizes) after a certain number of steps,
and demonstrate application of this technique to d-dimensional grids, regular expanders, and hypercubes.
We discuss applications of our results to social network size estimation via random walk [KLS11], obtaining
significant improvements over known work for networks with relatively slow global mixing times, but strong
local mixing. We also discuss connections to density estimation by robot swarms and random walk-based
sensor network sampling [AB04, LB07].
1.3
Road Map
In Section 2 we overview our theoretical model for distributed density estimation on the grid.
In Section 3, as a warm up, we give a simple density estimation algorithm that does not employ random
walks, is easy to analyze, but is not biologically plausible.
In Section 4 we give our main technical results on random walk-based density estimation.
In Section 5 we show how to extend our bounds to a number of graphs other than the grid.
In Section 6 we discuss applications of our results to social network size estimation, robot swarm, and sensor
network algorithms.
2
Theoretical Model for Density Estimation
√
√
We consider a two-dimensional torus with A nodes (dimensions A × A) populated with identical anonymous agents. We assume that A is large – larger than the area agents traverse over the runtimes of our
algorithms. We feel that this torus model successfully captures the dynamics of density estimation on a
surface, while avoiding complicating factors of boundary behavior.
Initially each agent is placed independently at a uniform random node in the torus. Computation proceeds
in discrete, synchronous rounds. In each round an agent may either remain in its current location or step
to any of its four neighboring grid squares. Formally, each agent has an ordered pair position which it may
update in each round by adding step s ∈ {(0, 1), (0, −1), (1, 0), (−1, 0), (0, 0)}.
A randomly walking agent chooses s uniformly at random from {(0, 1), (0, −1), (1, 0), (−1, 0)} in each
round. Of course, in reality ants do not move via pure random walk – observed encounter rates seem to
actually be lower than predicted by a pure random walk model [GPT93, NTD05]. However, we feel that our
model sufficiently captures the highly random movement of ants while remaining tractable to analysis and
applicable to ant-inspired random walk-based algorithms (Section 6).
Aside from the ability to move in each round, agents can sense the number of agents other than themselves
at their position at the end of each round, formally through calling count(position). We say that two agents
collide in round r if they have the same position at the end of the round. Outside of collision counting,
agents have no means of communication. They are anonymous (cannot uniquely identify each other) and all
execute identical density estimation routines.
2
Density Estimation Problem Let (n + 1) be the number of agents and define population density as
def
d = n/A. Each agent’s goal is to hestimate d to (1 ± ǫ) accuracy
with probability 1 − δ for ǫ, δ ∈ (0, 1) –
i
i.e., to return an estimate d˜ with P d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] ≥ 1 − δ. As a technicality, with n + 1 agents we
define d = n/A instead of d = (n + 1)/A for convenience of calculation. In the natural case, when n is large,
the distinction is minor.
3
Density Estimation via Simulation of Independent Sampling
As discussed, the challenge in analyzing random walk-based density estimation arises from increased variance
due to repeated collisions of nearby agents. Here we show that, if not restricted to random walking, agents
can avoid collision correlations by splitting into ‘stationary’ and ‘mobile’ groups and only counting collisions
between members of different groups. This allows them to essentially simulate independent sampling of gird
locations to estimate density. This algorithm is not ‘natural’ in a biological sense, however it is easy to
analyze, and demonstrates the feasibility of density estimation by anonymous agents on the grid. We give
pseudocode in Algorithm 1.
Algorithm 1 Independent Sampling-Based Density Estimation
input: runtime t
Set c := 0 and with probability 1/2, state := walking, else state := stationary.
for r = 1, ..., t do
if state := walking then
position := position + (0, 1)
⊲ Deterministic walk step.
end if
c := c + count(position)
⊲ Update collision count.
end for
return d˜ = 2c
t
3.1
Independent Sampling Accuracy Bound
We now present our main accuracy bound for the independent sampling algorithm.
√
Theorem 1 (Independent Sampling Accuracy Bound). After running for t rounds, assuming t < A and
d ≤ 1,
Algorithm
1 returns d˜ such that, for any δ > 0, with probability ≥ 1 − δ, d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for
q
log(1/δ)
log(1/δ)
, d˜ is a (1 ± ǫ) multiplicative
.
In
other
words,
for
any
ǫ,
δ
∈
(0,
1)
if
t
=
Θ
ǫ =O
2
td
dǫ
estimate of d with probability ≥ 1 − δ.
Proof. Our analysis is from the perspective of an agent with state = walking. By symmetry, the distribution
of d˜ is identical for walking and stationary agents, so considering this case is sufficient.
Initially, assume that no two walking agents start in the same location. Given this assumption, we know
that a walking agent never collides with another walking agent – by assumption they all start in different
positions and update these positions identically in each round. In the written implementation agents always
step up, however any fixed pattern (e.g. a spiral) suffices.
In t steps, a walking agent visits t unique squares. Each of the n other agents is located in this set of
t
squares and stationary with probability 2A
. Further, each of these events is entirely independent from the
rest, as the agents are positioned and choose their state independently. So, for a walking agent, c is just a
t
t
. Clearly, E c = n · 2A
= td
sample of n independent random coin flips, each with success probability 2A
2 so
2
E d˜ = E c t = d. Further, by a Chernoff bound, for any ǫ ∈ (0, 1), the probability that d˜ is not a (1 ± ǫ)
multiplicative estimate of d is:
h
i
2
2
δ = P |d˜ − d| ≥ ǫd = P [|c − E c| ≥ ǫ E c] ≤ 2e−ǫ E c/3 ≤ 2e−ǫ td/6 .
3
This gives: log(1/δ) ≥ ǫ2 td/6 so ǫ = O
q
log(1/δ)
td
, yielding the result.
We now remove the assumption that no two walking agents start in the same location. We slightly
modify the algorithm – each agent sets c := c (mod t) before returning d˜ = 2c
t . If an agent starts alone and
is involved in < t collisions, this operation has no effect – the above bound holds.
If a walking agent is involved in < t ‘true collisions’ but starts in the same position as w ≥ 1 other
walking agents, the agents move in lockstep throughout the algorithm and are involved in w · t ‘spurious
collisions’ (w in each round). Setting c := c (mod t) exactly corrects for these spurious collisions and since
c now only includes collisions with stationary agents, the bound above holds.
Finally, if an agent is involved in ≥ t true collisions, this modification cannot worsen their estimate. If
c ≥ t and the agent does not set c := c (mod t), they compute d˜ ≥ 2tt ≥ 2. For ǫ < 1, the agent fails since
d ≤ 1. So setting c := c (mod t) can only increase probability of success.
4
Density Estimation via Random Walk Collision Rates
In Algorithm 1, each pair of agents can only collide once, at a specific location – the starting position of the
stationary agent in the pair. Collisions are independent and it is easy to show that the number of collisions
(and hence the density estimate) concentrates around its expectation. However, as discussed, independence
of collisions is unnecessary! Algorithm 2 describes a simple random walk-based approach that gives a nearly
matching bound.
Algorithm 2 Random Walk Encounter Rate-Based Density Estimation
input: runtime t
c := 0
for r = 1, ..., t do
position := position + rand{(0, 1), (0, −1), (1, 0), (−1, 0)}
c := c + count(position)
end for
return d˜ = ct
4.1
⊲ Random walk step.
⊲ Update collision count.
Random Walk-Based Density Estimation Analysis
Our main result follows; its proof appears at the end of Section 4 after some preliminary lemmas.
Theorem 2 (Random Walk Sampling Accuracy Bound). After running for t rounds, assuming t ≤ A,
Algorithm
2 returns d˜ such that, for any δ > 0, with probability ≥ 1 − δ, d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for
q
log(1/dǫ)
log(1/δ) log(t)
, d˜ is a (1 ± ǫ)
. In other words, for any ǫ, δ ∈ (0, 1) if t = Θ log(1/δ) log log(1/δ)
ǫ=
td
dǫ2
multiplicative estimate of d with probability ≥ 1 − δ.
Throughout our analysis, we take the viewpoint of a single agent executing Algorithm 2, referred to as
‘agent a’. To start, we show that the encounter rate d˜ is an unbiased estimator of d:
Lemma 3 (Unbiased Estimator). E d˜ = d.
Proof. We can decompose c as the sum of collisions with different agents over different rounds. Specifically,
give the n other agents arbitrary ids 1, 2, ..., n and let cj (r) equal 1 if agent a collides with agent j in round
Pn Pt
r, and 0 otherwise. By linearity of expectation: E c = j=1 r=1 E cj (r).
Since each agent is initially at a uniform random location and after any number of steps, is still at uniform
random location, for all j, r, E cj (r) = 1/A. Thus, E c = nt/A = dt and E d˜ = E c/t = d.
With Lemma 3 in place, we now must show that the encounter rate is close to its expectation with high
probability and hence provides a good estimate of density.
4
4.2
Bounding the Effects of Repeat Collisions
P
Let cj = tr=1 cj (r) be the total number of collisions with agent j. Due to the initial uniform distribution
of the agents, the cj ’s are all independent and identically distributed.
Each cj is the sum of highly correlated random variables – due to the slow mixing of the grid, if two
agents collide at round r, they are much more likely to collide in successive rounds. However, by bounding
the strength of this correlation, we are able to give strong bounds
P on the moments of the distribution of
each cj , showing that it is sub-exponential. It follows that d˜ = 1t nj=1 cj , is also sub-exponential and hence
concentrates strongly around its expectation, the true density d.
We first bound the probability of a re-collision in round r + m, assuming a collision in round r:
Lemma 4 (Re-collision Probability
Consider two agents a1 and a2 randomly walking on a two√ Bound).
√
dimensional torus of dimensions A × A. If a1 and
in round r, for any m ≥ 0, the
a2 collide again
1
1
probability that a1 and a2 collide in round r + m is Θ m+1 + O A .
Proof. From round r to round r + m, a1 and a2 take 2m random steps in total. Let Mx be the total number
of steps they take in the x direction and My be the total number in the y direction. Mx + My = 2m.
We start by computing the probability that the agents collide in round r + m conditioned on the values
of Mx and My . All steps are chosen independently, so we can consider movement in the x and y directions
separately. Specifically, let C be the event that the a1 and a2 collide in round r + m, Cx be the event that
they have the same x position, and Cy be the event that they have the same y position. We have:
P [C|Mx = mx , My = my ] = P [Cx |Mx = mx ] · P [Cy |My = my ] .
(1)
We first consider P [Cx |Mx = mx ]. All bounds will hold symmetrically for the y dimension. We split our
analysis into two cases. Let Cx1 be the event that the two agents have the same x position after round r + m
and have identical displacements from their starting locations. Let Cx2 be the event that the two agents have
the same x position after round r + m but do not have identical displacements. This requires that the agents
‘wrap’ around the torus, ending at the same position despite moving different amounts in the x direction.
We have P[Cx |Mx = mx ] = P[Cx1 |Mx = mx ] + P[Cx2 |Mx = mx ].
P[Cx1 |Mx = mx ] is identical to the probability that a single random walk takes mx steps and has 0 overall
displacement – i.e. takes an equal number of clockwise and counterclockwise steps. It is given by:
mx
mx
1
mx !
1
mx
= mx 2 ·
.
(2)
P[Cx1 |Mx = mx ] =
2
( 2 !)
2
mx /2
1
Above
mx is even
√ we assume
– otherwise Cx cannot occur. By Stirling’s approximation for any n > 0,
1
n n
n! = 2πn e
1 + O n . Plugging this into 2:
mx
√
mx
mx
1 + O m1x
2πmx mex
1
1
m
!
1
x
1
.
=
=Θ √
P[Cx |Mx = mx ] = mx 2 ·
mx
2 ·
( 2 !)
2
2
mx + 1
1 + O mx1/2
πmx mxe/2
(We use
of mx in the denominator so that the bound holds in the case when mx = 0.)
mx + 1 instead
P Cx2 |Mx = mx is the probability that two agents have the same x position after round r + m but have
different total displacements.
It is identical to the probability that a single mx step random walk has overall
√
displacement ±c A for some integer c ≥ 1 (and so ‘wraps around’ the torus, ending at its starting location).
Roughly, we bound the probability of this event by the probability that the random walk ends
at any other
√
location on the torus. There are A such locations, so the probability is bounded by O √1A . We have:
j
m
k
√x
mx X
A
2
mx
1
√
·
P Cx |Mx = mx = 2 ·
mx −c A .
2
2
c=1
(3)
where the extra factor of 2 comes
from the fact that the displacement may be either clockwise or counter√
A
clockwise. (Note that if mx −c
is not an integer we just define the binomial coefficient to equal 0.)
2
5
√
For i ∈ [1, ..., A − 1], let Dxi be the event that a single random walk is i steps clockwise from its starting
location after taking Mx steps. We have:
mx
1
i
·
P[Dx |Mx = mx ] =
2
j
mx −i
√
A
X
c=−
j
√
For any i ∈ [1, ..., A − 1], and any c ≥ 1,
k
mx +i
√
A
k
mx √
mx +i+c A
2
mx
1
·
≥
2
−1
X
c=−
j
j
k
m
mx +i
√
A
k
mx √
mx +i+c A
2
√x
mx X
A
mx √
1
·
≥
mx +i−c A .
2
2
c=1
√
mx +i−c A
2
is closer to m2x than
mx√
mx √
>
mx −c A
mx +i−c A
2
√
mx −c A
2
(4)
is, so
(5)
2
√
mx +i−c A
is an integer. This allows us to lower bound P[Dxi |Mx = mx ] using P Cx2 |Mx = mx .
2
√
A
Ei,c equal 1 if mx +i−c
is an integer and 0 otherwise. Since Cx2 and each Dxi are disjoint events:
2
√
A−1
X
2
P Dxi |Mx = mx ≤ 1
P Cx |Mx = mx +
i=1
j mx k
√
√
mx X
A
A−1
mx √
1
X
(applying (4))
P Cx2 |Mx = mx +
·
A ≤1
m
+i−c
x
2
2
c=1
i=1
as long as
Let
j
k
m
√x
mx X
√X
A
A−1
2
mx√
1
·
P Cx |Mx = mx +
·
Ei,c ≤ 1
mx −c A
2
2
c=1
i=1
√
2
P Cx |Mx = mx · Θ( A) ≤ 1.
(by (5) and switching summations)
√
√
P√A−1
A
A for all c since mx +i−c
The last step follows from combining (3) with the fact that i=1 Ei,c = Θ
2
√
is integral for half the possible i ∈ [1, ..., A − 1]. Rearranging, we have P Cx2 |Mx = mx = O √1A .
Combining our bounds for Cx1 and Cx2 , P [Cx |Mx = mx ] = Θ √m1 +1 + O √1A . Identical bounds hold
x
for the y direction and by (1) we have:
P [C|Mx = mx , My = my ] = Θ
1
p
(mx + 1)(my + 1)
!
+O
1
1
p
+p
A(my + 1)
A(mx + 1)
!
+O
1
.
A
(6)
Our final step is to remove the conditioning on Mx and My . Since direction is chosen independently and
uniformly at random for each step, E Mx = E My = m. By a standard Chernoff bound:
2
1
.
P[Mx ≤ m/2] ≤ 2e−(1/2) ·m/2 = O
m+1
(Again using m + 1instead
of m to cover the m = 0 case). An identical bound holds for My , and so, except
with probability O
1
m+1
P [C] = Θ
both are ≥ m/2. Plugging into (6) this gives us:
1
m+1
+O
1
p
A(m + 1)
!
6
1
1
1
+O
=Θ
+O
.
A
m+1
A
We note that the techniques of Lemma 4 also apply to bounding the probability that a single random
walk returns to its origin (equalizes) after m steps.
Corollary 5 (Equalization
√
√ Probability Bound). Consider agent a1 randomly walking on a two-dimensional
torus of dimensions A× A. If a1 is located at position
after round r, for any even m ≥ 0, the probability
p
1
1
+O A
.
that a1 is again at position p after round r + m is Θ m+1
Proof. The analysis of Lemma 4 treats the two walks of a1 and a2 as a single walk with 2m total steps. An
identical analysis where 2m is replaced by m yields the corollary.
Roughly, assuming as in Theorem
2 that t ≤ A, by Lemma 4, in t rounds, a expects to re-collide with any
Pt−1
1
agent it encounters m=0 Θ m+1 = Θ(log t) times. By Lemma 3, a expects to be involved in dt = nt/A
total collisions. So accounting for re-collisions, it expects to collide with Θ A nt
log t unique individuals. This
is formalized in Lemma 6.
t
Lemma 6 (First Collision Probability). Assuming t ≤ A, for all j ∈ [1, ..., n], P [cj ≥ 1] = Θ A log
t .
Proof. Using the fact that cj is identically distributed for all j,
n
X
n
n
1
ci = · E cj = · P [cj ≥ 1] · E[cj |cj ≥ 1]
E d˜ = d = · E
t
t
t
i=1
n
n
= · P [cj ≥ 1] · E[cj |cj ≥ 1].
A
t
Rearranging gives:
P [cj ≥ 1] =
t
.
A · E[cj |cj ≥ 1]
(7)
4 and linearity of expectation. Since t ≤ A, the O A1 term in
To compute E[cj |cj ≥ 1], we use
Lemma
1
Lemma 4 is absorbed into the Θ m+1
. Let r ≤ t be the first round that the two agents collide. We have:
E[cj |cj ≥ 1] =
t−r
X
m=0
Θ
1
m+1
= Θ (log(t − r)) .
(8)
After any round the agents are located at uniformly and independently chosen positions, so collide with
probability exactly 1/A. So, the probability of the first collision between the agents being in a given round
can only decrease as the round number increases. So, at least 1/2 of the time that cj ≥ 1, there is a
collision in thefirst t/2
rounds. So, overall, by (8), E[cj |cj ≥ 1] = Θ (log(t − t/2)) = Θ (log t). Using (7),
P [cj ≥ 1] = Θ
t
A·log t
, completing the proof.
We now give our main technical lemma – a strong moment bound on the distribution of cj . Intuitively,
not only does an agent expect to collide at most O(log t) times with any other agent it encounters, but this
bound extends to the higher moments of the collision distribution, and so holds with high probability. In
this sense, the grid has strong local mixing – random walks spread quickly over a local area and do not cover
the same nodes too many times.
def
Lemma 7. (Collision
Moment Bound)
For all j ∈ [1, ..., n], let c̄j = cj − E cj . For all k ≥ 2, assuming
k
k−1
t
t ≤ A, E c̄j = O A · k! log
t .
Proof. We expand E[c̄kj ] = P[cj ≥ 1] · E[c̄kj |cj ≥ 1] + P[cj = 0] · E[c̄kj |cj = 0], and so by Lemma 6:
t
E c̄kj = O
· E c̄kj |cj ≥ 1 + E c̄kj |cj = 0 .
A log t
7
k
E c̄kj |cj = 0 = (E cj ) = (t/A)k ≤
k−1
t
A k! log
t for all k ≥ 2. Further, E c̄kj |cj ≥ 1 ≤ E ckj |cj ≥ 1 , since
E cj = At ≤ 1. So to prove the lemma, it just remains to show that E ckj |cj ≥ 1 = O k! logk t .
Conditioning on cj ≥ 1, we know the agents have an initial collision in some round t′ ≤ t. We split cj
P
P ′ +t−1
over rounds: cj = tr=t′ cj (r) ≤ tr=t
cj (r). To simplify notation we relabel round t′ round 1 and so
′
round t′ + t − 1 becomes round t. Expanding ckj out fully using the summation:
" t
#
t
t
t
t
t
X X
X
X
X
X
k
E cj = E
...
cj (r1 )cj (r2 )...cj (rk ) =
...
E [cj (r1 )cj (r2 )...cj (rk )] .
r1 =1 r2 =1
rk =1
r1 =1 r2 =1
rk =1
E [cr1 (j)cr2 (j)...crk (j)] is just the probability that the two agents
collide in each of rounds r1 , r2 ,...rk . Assume
w.l.o.g. that r1 ≤ r2 ≤ ... ≤ rk . By Lemma 4 this is: O r1 (r2 −r1 +1)(r3 −r21+1)...(rk −rk−1 +1) . So we can
rewrite, by linearity of expectation:
t
t
t
X
X
X
k
1
.
O
...
E cj = k!
r1 (r2 − r1 + 1)(r3 − r2 + 1)...(rk − rk−1 + 1)
r =r
r =1 r =r
1
2
k
1
k−1
The k! comes from the fact that in this sum we only have ordered k-tuples and so need to multiple by k! to
account for the fact that the original sum is over unordered k-tuples. We can bound:
t
X
rk =rk−1
1
1
1
= 1 + + ... + = O(log t)
rk − rk−1 + 1
2
t
so rearranging the sum and simplifying gives:
t
X
k
1
E cj = k!
r
r =1 1
1
t
X
r2 =r1
t
X
1
...
r − r1 r =r
+1 2
k
k−1
1
r
−
rk−1
+1 k
t
t
t
X
X
1 X
1
= k!
...
r
r2 − r1 + 1 r =r
r =1 1 r =r
1
2
k−1
1
k−2
1
· O(log t).
rk−2 − rk−1 + 1
P
We repeat this simplification for each level of summation replacing tri =ri−1
k
ating through the k levels gives E cj = O(k! logk t) giving the lemma.
1
ri −ri−1 +1
with O(log t). Iter-
As with Lemma 4, the techniques used in Lemmas 6 and 7 can be applied to a single walk. We give two
bounds that may be of independent interest.
Corollary 8√(Random
Walk Visits Moment Bound). Consider an agent a1 randomly walking on a two√
dimensional A × A torus that is initially located at a uniformly random location and takes t ≤ A steps.
Let cj be the number of times that a1 visits node j. For all j ∈ [1, ...A] and all k ≥ 2,
t
E c̄kj = O
· k! logk−1 t .
A
Proof. This follows from noting that the expected number of visits to a given
node
is t/A and so Lemma 6
t
can be used in conjunction with Corollary 5 to show that P[cj ≥ 1] = Θ A log t . We can then just follow
the proof of Lemma 7, using Corollary 5 where needed to obtain the result.
Corollary
√ 9 (Equalization Moment Bound). Consider an agent a1 randomly walking on a two-dimensional
√
A × A torus. If a1 takes t ≤ A steps and c is the number of times it returns to its starting position (the
number of equalizations), for all k ≥ 2,
E c̄k = O k! logk t .
Proof. This follows directly from the proof of the moment bound given in Lemma 7 for the number of
collisions between two agents that are assumed to collide at least once: E[ckj |cj ≥ 1] = O(k! logk t). By
replacing the application of Lemma 4 with Corollary 5 we obtain the result.
8
4.3
Concentration of Encounter Rate-Based Density Estimate
P
Armed with the moment bound of Lemma 7 we can finally show that nj=1 c̄j concentrates strongly about
Pn
Pn
its expectation. Since j=1 c̄j is just a mean-centered and scaled version of d˜ = 1t j=1 cj , this is enough
P
to prove the accuracy of encounter rate-based density estimation. We start by showing that nj=1 c̄j is a
sub-exponential random variable.
Pn
Pn
Corollary 10 ( j=1 c̄j is sub-exponential). Assuming t ≤ A, j=1 c̄j is sub-exponential with parameters
i
h Pn
σ 2 λ2
b = Θ(log t) and σ 2 = Θ(td log t). Specifically, for any λ with |λ| < 1b E eλ j=1 c̄j ≤ e 2 .
t
Proof. By Lemma 7, for σ 2 = Θ( t log
A ) and b = Θ(log t), c̄j satisfies the Bernstein condition:
1
E c̄kj ≤ k!σ 2 bk−2 .
2
t
This implies that c̄j is sub-exponential with parameters σ 2 = Θ( t log
A ) and b = Θ(log t) (see [Wai15], Chapter
2). Since each c̄j is independent, this gives us, for all λ with |λ| ≤ 1b :
n
i Y
h Pn
t log t
2
λ2
E eλc̄j ≤ en· 2 ·Θ( A ) = eΘ(λ td log t) .
E eλ j=1 c̄j =
j=1
This completes the proof by the definition of a sub-exponential random variable.
We finally apply a standard sub-exponential tail bound [Wai15] to prove our main result.
Lemma 11 (Sub-exponential tail bound). Suppose that X is sub-exponential with parameters (σ 2 , b). Then,
for any ∆ ≤
σ2
b ,
∆2
P[|X − E X| ≥ ∆] ≤ 2e− 2σ2 .
Pn
Proof of Theorem 2. Since c̄j is just a mean-centered version of cj , j=1 c̄j deviates from its mean exactly
Pn
Pn
the same amount as j=1 cj . Further, d˜ is just equal to 1t j=1 cj , so the probability that it falls within an
Pn
ǫ multiplicative factor of its mean is the same as the probability that j=1 cj falls within an ǫ multiplicative
factor of its mean. By Corollary 10 and Lemma 11:
2
n
n
n
n
X
X
X
X
Θ − ǫlogtdt
cj − td ≥ ǫtd ≤ 2e
cj = P
cj − E
cj ≥ ǫ E
δ = P
.
j=1
ǫ2 td
log t
5
j=1
= Θ (log(1/δ)) and so ǫ = Θ
q
j=1
j=1
log(1/δ) log t
td
, yielding the theorem.
Extensions to Other Topologies
We now extend our results to a broader set of graph topologies, demonstrating the generality of the local
mixing analysis discussed above. We illustrate divergence between local and global mixing properties, which
can have significant effects on random walk-based algorithms.
5.1
From Repeat Collision Bounds to Estimation Accuracy
Our proofs are largely independent of graph structure, using just a re-collision probability bound (Lemma 4)
and the regularity (uniform node degrees) of the grid, so agents remain uniformly distributed on the nodes
in each round. Hence, extending our results to other regular graphs primarily involves obtaining re-collision
probability bounds for these graphs.
We consider agents on a graph with A nodes that execute analogously to Algorithm 2, stepping to a
random neighbor in each round. Again, we focus on the multi-agent case but similar bounds (resembling
Corollaries 8 and 9) hold for single random walk. We start with a general lemma, giving density estimation
accuracy in terms of re-collision probability.
9
Lemma 12 (Re-collision Probability to Density Estimation Accuracy). Consider a regular graph with A
nodes such that, if two randomly walking agents a1 and a2 collide in round r, for any 0 ≤ m ≤ t, the
probability that they collide again in round r + m is Θ (β(m)) for some non-increasing function β(m). Let
def Pt
B(t) = m=0 β(m). After running for t ≤ A steps,Algorithm 2 returns
d˜ such that, for any δ > 0, with
q
log(1/δ)B(t)
.
probability ≥ 1 − δ, d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for ǫ = O
td
Note that in the special case of the grid, by Lemma 4, we can set β(m) = 1/(m + 1) and hence B(t) =
Θ(log t), yielding Theorem 2.
Proof. E d˜ = d (Lemma 3) still holds as the regularity of the graph ensures that agents remain uniformly distributed on the nodes in every round (the stable distribution of any regular graph is the uniform distribution).
Lemma 6 is also analogous except that (8) becomes:
!
t−r
X
E[cj |cj ≥ 1] = Θ
β(m)
m=0
and using the fact that at least 1/2 the time
P that cj ≥1, there is a collision in the first t/2 rounds and that
t/2
β(m) is non-increasing, E[cj |cj ≥ 1] = Θ
m=0 β(m) = Θ (B(t)) . This gives:
P[cj ≥ 1] = Θ
t
A · B(t)
.
Following the moment calculations in Lemma 7, E[ckj |cj ≥ 1] = O k!B(t)k and hence:
E[c̄kj ]
=O
t
k−1
.
· k!B(t)
A
As in Corollary 10, this gives that c̄j is sub-exponential with parameters b = Θ(B(t)) and σ 2 = Θ tB(t)
A
P
so nj=1 c̄k is sub-exponential with parameters b = Θ(B(t)) and σ 2 = Θ n · tB(t)
= Θ (tdB(t)). Plugging
A
into Lemma 11 gives:
ǫ2 td
B(t)
= Θ(log(1/δ)). Rearranging yields the result.
Applying the above bound requires a constant factor approximation to the re-collision probability – the
probability is Θ(β(m)). Sometimes however, it is much easier to give just an upper bound – so the probability
is O(β(m)). In this case a slightly weaker bound holds:
Lemma 13 (Re-collision Probability Upper Bound to Density Estimation Accuracy). Consider a regular
graph with A nodes such that, if two randomly walking agents a1 and a2 collide in round r, for any 0 ≤ m ≤ t,
the probability that they collide again in round r + m is O (β(m)) for some non-increasing function β(m).
def Pt
˜
Let B(t) = m=0 β(m). After running for t ≤ A steps,
q Algorithm 2 returns d such that, for any δ > 0, with
log(1/δ)·B(t)2
probability ≥ 1 − δ d˜ ∈ [(1 − ǫ)d, (1 + ǫ)d] for ǫ = O
.
td
Proof. The proof is identical to that of Lemma 12 except that, we can only show P[cj ≥ 1] = Θ
Therefore, our moment bound becomes:
t
k
k
E[c̄j ] = O
· k!B(t) .
A
2
t
A
.
This gives that c̄kj is sub-exponential with parameters b = Θ(B(t)) and σ 2 = Θ( tB(t)
A ). Following Lemma
12 we therefore have
ǫ2 td
B(t)2
= Θ(log(1/δ)). Rearranging yields the proof.
10
5.2
k-Dimensional Tori
We first consider k-dimensional tori for general k. As k increases, local mixing becomes stronger, fewer
re-collisions occur, and density estimation becomes easier. In fact, for k ≥ 3, although the torus still mixes
slowly, density estimation is as accurate as on the complete graph! We first give the 1-dimensional case:
5.2.1
Density Estimation on the Ring
Lemma 14 (Re-collision Probability Bound – Ring). If two randomly walking agents a1 and a2 are located
on a 1-dimensional torus (a ring) with A nodes, and collide
in round r, for any m ≥ 0, the probability that
1
a1 and a2 collide again in round r + m for k ≥ 1 is Θ √m+1 + O A1 .
Proof. We have already shown this re-collision
of Lemma 4. It is identical to P[Cx |Mx = m]
in the proof
bound
1
1
on an A × A grid, which is bounded by Θ √m+1 + O A .
1
1
For m ≤ A, the O A
term. We can estimate the sum of repeat collision
is absorbed into the Θ √m+1
probabilities by using the fact that
√
√
√
√
1
2
2( x − x − 1)
√ ≤√
√
√
√
= √
= 2( x − x − 1).
√
x
x+ x−1
( x + x − 1)( x − x − 1)
So:
t
X
√
√
√
√
√
√
√
1
√
≤ 1+2
2 − 1) + ( 3 − 2) + ... + ( t + 1 − t) = 2 t + 1 − 1.
m+1
m=0
Similarly,
√
√
2
1
√
√
≥ √
= 2( x − x − 1)
x−1
x+ x−1
and so:
t
X
√
√
√
√
√
√
√
1
√
2 − 1) + ( 3 − 2) + ... + ( t + 2 − t + 1) = 2 t + 2 − 2.
≥2
m+1
m=0
√
Pt
1
= Θ( t). Plugging into Lemma 12, on a ring, random walk-based density
So, overall m=0 √m+1
q
q
2
√
log(1/δ) t
log(1/δ)
log(1/δ)
√
estimation gives: ǫ = O
= O
rounds are
. Rearranging, t = Θ
td
ǫ2 d
td
necessary to obtain a 1 ± ǫ approximation
√ with probability ≥ 1 − δ. Local mixing on the ring is much worse
than on the torus– we expect to see Θ( t) rather than Θ(log t) repeat collisions with every agent interacted
with. Hence, density estimation is much more difficult, requiring t to be quadratic rather than linear in 1/d.
5.2.2
Density Estimation on Higher Dimensional Tori
We now cover k ≥ 3. While global mixing time is on the order of A2/k and so is slow if k << A, local
mixing is so strong that our accuracy bounds actually match those of independent sampling! Throughout
this section, we assume that k is a small constant and hide it in our asymptotic notation.
Lemma 15 (Re-collision Probability Bound – High-Dimensional Torus). If two randomly walking agents a1
and a2 are located on a k-dimensional torus with A nodes, and collide
in round
r, for any constant k ≥ 3,
1
m ≥ 0, the probability that a1 and a2 collide in round r + m is Θ (m+1)k/2 + O A1 .
Proof. We closely follow the proof of Lemma 4. In total, a1 and a2 take 2m steps: Mi in each dimension for
i ∈ [1, ..., k]. Let Ci be the event that the agents have the same position in the ith dimension in round r + m.
By the analysis of Lemma 4,
1
1
+O
.
P[Ci |Mi = mi ] = Θ √
A1/k
mi + 1
11
So,
1
1
1
1
P[C|M1 = m1 , ..., Mk = mk ] = Θ √
· .... · Θ √
.
+O
+O
A1/k
A1/k
m1 + 1
mk + 1
(9)
In expectation, Mi = 2m/k. So by a Chernoff bound,
P[Mi ≤ m/k] ≤ 2e
−(1/2)2 ·2m/3k
=O
1
(m + 1)k/2
again assuming k is a small
constant.
Union bounding over all k dimensions, we have Mi ≥ m/k for all i
1
except with probability O (m+1)
and hence by (9):
k/2
P[C] = O
1
(m + 1)k/2
"
+ Θ
1
p
m/k + 1
!
+O
1
A1/k
#k
=Θ
1
(m + 1)k/2
1
+O
A
giving the lemma (again, asymptotic notation hides multiplicative factors in k since it is constant).
Pt
1
1
< 1+
We can plug the above bound into Lemma 13. For t ≤ A and k ≥ 3,
m=0 (m+1)k/2 + A
√
P∞
log(1/δ)
1
. Rearranging, we require
m=0 (m+1)k/2 = O(1). So we can set B(t) = 1 and have ǫ = O
td
. This matches the performance of independent sampling up to constants.
t = Θ log(1/δ)
ǫ2 d
5.3
Regular Expanders
When a graph does mix well globally, it also mixes well locally. The number of repeat collisions is low
and accurate density estimation is possible. The most obvious example is the complete graph, on which
random-walk based density estimation is equivalent to density estimation via independent sampling. We
generalize this intuition to any regular expander .
Lemma 16 (Re-collision Probability Bound – Regular Expander). Let G be a k-regular expander with A
nodes and adjacency matrix M. Let W = k1 · M be its random walk matrix, with eigenvalues λ1 ≥ λ2 ≥ ... ≥
λA . Let λ = max{|λ2 |, |λA |}. If two randomly walking agents a1 and a2 collide in round r, for any m ≥ 0,
the probability that they collide again in round r + m is at most λm + 2/A.
Proof. Suppose that a1 and a2 collide at node i in round r. The probability they re-collide at round r + m
m
is ||Wm ei ||22 , since for each j, Wi,j
= (Wm ei )j is the probability an agent is at node j after round r + m
given that it is at node i after round r. We bound this norm using the following lemma on how rapidly an
expander random walk converges to its stable distribution:
Lemma 17 ([Lov93]). Let G be a k-regular expander with A nodes, adjacency matrix M, and random walk
matrix W = k1 · M. Let λ1 ≥ λ2 ≥ . . . ≥ λA be the eigenvalues of W and λ = max{|λ2 |, |λA |}. For each
1 ≤ j ≤ n,
1
(Wm · ei )j −
≤ λm .
A
Now we can bound ||Wm ei ||22 by:
||W
m
ei ||22
=
A
X
(W
m
ei )2j
=
A
X
1
j=1
j=1
12
A
+ χj
2
def
where χj = (Wm · ei )j −
A · (1/A) = 0. Therefore,
1
A
so that χj ∈ [−1/A, λm ] due to Lemma 17. We have
||Wm ei ||22 =
A
X
1
j=1
A
+ χj
P
j
χj =
P
j (W
m
ei )j −
2
!
2
A
A
X
1
2χj
1 X 2
2
≤
+
+ χj = +
χ .
A
A
A j=1 j
j=1
m
χ2j is maximized when
χP
the indices
j = λ is maximized. Let S ⊂ [1, A] beP
P j with
Pthe number of possible
m
m
m
χ
=
0.
Therefore,
|S|
·
λ
≤
−
j with χj = λ . Since j χj = 0, we have j∈S λ + j ∈S
j
j ∈A
/ χj ≤
/
1
1 − |S|/A and so |S| ≤ λm +1/A
. Therefore,
P
j
A
X
j=1
χ2j ≤
≤
X
λ2m +
j∈S
X
χ2j
j ∈S
/
2m
A − |S|
λ
≤ λm + 1/A.
+
λm + 1/A
A2
Thus, ||Wm ei ||22 ≤ λm + 2/A, giving the lemma.
Pt
1
+ 2t/A. Assuming t = O(A),
We now apply Lemma 13, with B(t) = m=0 β(m) ≤ 1−λ
s
!
!
r
log(1/δ)(1/(1 − λ) + 2t/A)2
log(1/δ)
=O
.
ǫ=O
td
td(1 − λ)2
2
Rearranging, t = Θ ǫ2log(1/δ)
d(1−λ)2 , matching independent sampling up to a factor of O(1/(1 − λ) ).
5.4
k-Dimensional Hypercube
Finally, we give bounds for a k-dimensional hypercube. Such a graph has A = 2k vertices mapped to the
elements of {±1}k , with an edge between any two vertices that differ by hamming distance 1. The hypercube
is relatively fast mixing. Its adjacency matrix eigenvalues are [−k, −k + 2, −k + 4, ..., k − 4, k − 2, k]. Since it
is bipartite, we can effectively ignore
eigenvalues and apply Lemma 16 with λ = Θ(1 − 2/k) =
the negative
log(1/δ) log2 (A)
. However, it is possible to remove the dependence on A
Θ(1 − 1/ log A). This yields t = Θ
ǫ2 d
via a more refined analysis – while the global mixing time of the graph increases as A grows, local mixing
becomes stronger!
Lemma 18 (Re-collision Probability Bound – k-Dimensional Hypercube). If two randomly walking agents
a1 and a2 are located on a k-dimensional hypercube with A = 2k vertices and collide
inround r, for any
m ≥ 0, the probability that a1 and a2 collide in round r + m is at most (7/10)m + O √1A .
Proof. A node of the hypercube can be represented as a k-bit string and each random walk step seen as
choosing one of the bits uniformly at random and flipping it. If a1 and a2 collide, for each of the bit, the total
number of times a1 and a2 chose that bit must be even. The total number of possible ways for re-collision
to occur at round r + m is exactly the number of ways 2m flips can be placed into k buckets, where each
bucket has even number of elements. This quantity is:
X
(2m)!
.
a
!
· . . . · ak !
1
a +...+a =2m
1
(ai
k
mod 2)≡0
This value is equal to the coefficient of x2m in the exponential generating function
k
k
x
k
(2m)! X k x(2i−k)
x4
e + e−x
x2
=
e
.
+
+ ...
= (2m)!
(2m)! 1 +
2!
4!
2
2k i=0 i
13
By differentiating 2m times, we find that the coefficient of x2m is:
k
k
X
1 X k
k
k
2m
/2 · (2i − k)2m .
(2i − k) =
i
2k i=0 i
i=0
This summation is exactly E[X 2m ], where X is a sum of k i.i.d. random variables each equal to 1 with
probability 1/2 and −1 otherwise. For any c ∈ (0, 1], we can split the expectation:
E[X 2m ] = E[X 2m ||X| ≥ ck] · P[|X| ≥ ck] + E[X 2m ||X| ≤ ck] · P[|X| ≤ ck]
≤ k 2m · P[|X| ≥ ck] + (ck)2m .
To bound the return probability bound, we this count by the the total number of possible paths taken
by a1 and a2 in m steps, k 2m , giving an upper bound of:
P[|X| ≥ ck] + c2m .
By a Hoeffding bound, P[|X| ≥ ck] ≤ 2e−c
So our final probability bound is:
2
k/2
. If we set c =
p
√
√
ln A/k = ln 2 then P[|X| ≥ ck] ≤ 1/ A.
√
1
1
P[|X| ≥ ck] + c2m ≤ √ + ( ln 2)2m < √ + (7/10)m
A
A
yielding the lemma. Note that, by adjusting c, it is possible trade off the terms in the above bound, giving
stronger inverse dependence on A at the expense of slower exponential decay in m.
√
√
Pt
10
+
t/
Plugging
into
Lemma
13,
we
have
B(t)
=
β(m)
≤
A.
If
we
assume
t
=
O(
A), this gives
m=0
3
q
log(1/δ)
log(1/δ)
and so t = Θ
, matching independent sampling.
ǫ=O
td
ǫ2 d
6
Applications
We conclude by discussing algorithmic applications of our ant-inspired density estimation algorithm (Algorithm 2), variations on this algorithm, and the analysis techniques we develop.
6.1
Social Network Size Estimation
Random walk-based density estimation is closely related to work on estimating the size of social networks
and other massive graphs using random walks [KLS11, KBM12, LL12, LW14]. In these applications, one
does not have access to the full graph (so cannot exactly count the nodes), but can simulate random walks
by following links between nodes [MMG+ 07, GKBM09]. One approach is to run a single random walk and
count repeat node visits [LL12, KBM12]. Alternatively, [KLS11] proposes running multiple random walks
and counting their collisions. This can be significantly more efficient since the dominant cost is typically in
link queries to the network. With multiple random walks, this cost can be trivially distributed to multiple
servers simulating walks independently.
Walks are first run for a ‘burn-in period’ so that their locations are distributed approximately by the
stable distribution of the network. The walks are then halted, and the number of collisions in this final
round are counted. The collision count gives an estimate of the walks’ density. Since the number of walks is
known, this yields an estimate for network size.
We show that ant-inspired algorithms can give runtime improvements over this method. After burn-in,
instead of halting the walks, it is possible to run the random walks for multiple rounds, recording encounter
rates as in Algorithm 2. This allows the use of fewer random walks, decreasing total burn-in cost, and leading
to faster runtimes when mixing time is relatively slow, as is common in social network graphs [MYK10].
14
6.1.1
Random Walk-Based Algorithm for Network Size Estimation
Consider an undirected, connected, non-bipartite graph G = (V, E). Let S be the set of vertices of G that
are ‘known’. Initially, S = {v} where v is a seed vertex. We can access G by looking up the neighborhood
Γ(vi ) of any vertex vi ∈ S and adding Γ(vi ) to S.
To compute the number of nodes |V | in the network, we could scan S, looking up the neighbors of each
vertex and adding them to the set. After querying all nodes in S we will have S = V and will know the
network size. However, the number of queries required equals |V |. The goal is to estimate network size using
a significantly more efficient random-walk based approach.
A number of challenges are introduced by this application. While we can simulate many random walks
on G, we can no longer assume these random walks start at randomly chosen nodes, as we do not have the
ability to uniformly sample nodes from the network. Instead, we must allow the random walks to run for
a burn-in phase of length proportional to the mixing time of G. After this phase, the walks are distributed
approximately according to the stable distribution of G.
In general, G is not regular. In the stable distribution, a random walk is located at a vertex with
probability proportional to its degree. Hence, collisions tend to occur more at higher degree vertices. To
correct for this bias, we count a collision at vertex vi with weight 1/ deg(vi ). As we will see, with this
modification, we must adjust our final estimate by the average degree of the graph, which we must estimate.
Our results depend on a natural generalization of re-collision probability. For any i, j ∈ |V |, let p(vi , vj , m)
be the probability of an m step random walk starting at vi ending at vj . Define:
def
β(m) =
maxi,j p(vi , vj , m)
deg(vj )
Intuitively, this is the maximum m step collision probability, weightedP
by degree since higher degree vertices
t
are more likely to be visited in the stable distribution. Let B(t) = m=1 β(m). Note that this weighted
B(t) is upper bounded by the unweighted B(t) used in Lemmas 12 and 13.
For simplicity, we initially ignore burn-in and assume that our walks start distributed exactly by the
def
deg(vi )
i)
and initial
stable distribution of G. A walk starts at vertex vi with probability pi = Pdeg(v
deg(vi ) = 2|E|
i
locations are independent. We also assume knowledge of the average degree deg = 2|E|/|V |. We later
rigorously analyze burn-in and show to estimate deg, completing our analysis.
Algorithm 3 Random Walk-Based Network Size Estimation
input: step count t, average degree deg, n random starting locations [w1 , ..., wn ] distributed according to
the network’s stable distribution
[c1 , ..., cn ] := [0, 0, ..., 0]
for r = 1, ..., t do
∀j, set wj := randomElement(Γ(wj ))
⊲ Γ(wj ) denotes the neighborhood of wj .
count(wj )
⊲ count(wj ) returns number of other walkers currently at wj .
∀j, set cj := cj + deg(wj )
end for P
deg
c
C := ·n(n−1)tj
return à = 1/C
Theorem 19. If n2 t = Θ
à ∈ [(1 − ǫ)|V |, (1 + ǫ)|V |].
B(t)deg
ǫ2 δ
· |V | , then with probability at least 1 − δ, Algorithm 3 returns
Throughout this section, we work directly with the weighted total collision count C, showing that it is
close to its expectation with high probability and hence giving the accuracy bound for Ã. As in the density
estimation case, we start by showing that C is correct in expectation.
Lemma 20. E C = 1/|V |.
15
Proof. Let cj (r) be the number of collisions, weighted by inverse vertex degree, walk j expects to be involved
i)
in at round r. In each round all walks are at vertex vi with probability pi = deg(v
2|E| , so:
E cj (r) =
|V |
|V |
X
n−1
deg(vi ) (n − 1) deg(vi )
n−1X
1
deg(vi ) =
=
·
·
.
2
2|E|
2|E|
deg(v
)
4|E|
2|E|
i
i=1
i=1
By linearity of expectation: E cj =
t(n−1)
2|E| ,
E
P
cj =
tn(n−1)
2|E|
and hence, E C =
deg
2|E|
= 1/|V |.
We now need to show concentration of C about its expectation. Let ci,j be the weighted collision count
between walks wi and wj where i 6= j. It is possible to closely follow the moment bound proof of Lemma 7
and show that ci,j is sub-exponential. However, unlike in the case of regular graphs, we will not be able to
claim that the different ci,j ’s are independent. Hence, we will not be able to use the same sub-exponential
tail bounds employed in Section 4.3.
Instead, we bound the second moment (the variance) of each ci,j and obtain our concentration results via
Chebyshev’s inequality. This leads to a linear rather than logarithmic dependence on the failure probability
1/δ. However, we note that we can simply perform log(1/δ) estimates each with failure probability 1/3 and
return the median, which will be correct with probability 1 − δ.
def
Lemma 21. (Degree
Collision Variance Bound) For all i, j ∈ [1, ..., n] with i 6= j, let c̄i,j = ci,j −
Weighted
2
tB(t)
E ci,j . E c̄i,j = O |E| .
Proof. We can split E c̄2i,j over rounds as:
E
t
X
r=1
!2
t
t−1 X
t
X
X
ci,j (r) =
E c̄i,j (r)2 + 2
E [c̄i,j (r)c̄i,j (r′ )]
r=1
r=1 r ′ =r+1
|V |
|V |
2
′ 2
X
X
p(vi , vj , r − r )
1
1
deg(vi ) ·
+2
=t
·
·
2
2
2
(2|E|)
deg(v
)
(2|E|)
deg(v
)
deg(vj )
i
i
r=1 r ′ =r+1
i=1
i=1
j=1
|V |
|V |
t−1
X
X
X
t|V |
deg(vi ) · β(m)
p(vi , vj , m)
+
2t
≤
4|E|2
(2|E|)2
m=1
i=1
j=1
|V |
X
deg(vi )2
t−1 X
t
X
t−1
X
β(m)
t
tB(t)
≤
.
+ 2t
=O
4|E|
2|E|
|E|
m=1
Lemma 22 (Total Collision Variance Bound). Let C =
Proof.
Pn
j=1 c̄j
=
P
E
i,j∈[1,...,n],i6=j c̄i,j .
X
i,j∈[1,...,n],i6=j
P
deg j c̄j
n(n−1)t .
E C̄ 2 = O n12 t ·
B(t)|E|
|V |2
.
We closely follow the variance calculation in [KLS11]:
2
c̄i,j =
X
i,j∈[1,...,n],i6=j
X
i′ ,j ′ ∈[1,...,n],i6=j
c̄i,j · c̄i′ ,j ′
2
n
n
n
2
=2
(E c̄i,j ) + 2 · 3!
E c̄i,j + 4!
E c̄i,j c̄i,k .
4
2
3
The first term corresponds to the cases when i = i′ and j = j ′ . The second corresponds
to i 6= i′ and j 6= j ′ ,
in which case c̄i,j and c̄i′ ,j ′ are independent and identically distributed. The 4! n4 multiplier is the number
of ways to choose an ordered set
of four distinct indices. The last term corresponds to all cases when either
i = i′ or j = j ′ . There are 3! n3 ways to choose an ordered set of three distinct indices, multiplied by two to
16
account for the repeated index being in either the first or second position. Using E c̄i,j = 0 and the bound
on E[c̄2i,j ] from Lemma 21:
2
2
X
n tB(t)
n
c̄i,j = O
E
+ 0 + 2 · 3!
E c̄i,j c̄i,k .
(10)
|E|
3
i,j∈[1,...,n],i6=j
When j 6= k, c̄i,j and c̄i,k are independent and identically distributed conditioned on the path that walk wi
traverses. Let Ψi be the t step path chosen by wi .
X
P [Ψi = ψi ] · E [c̄i,j |Ψi = ψi ] · E [c̄i,k |Ψi = ψi ]
E [c̄i,j c̄i,k ] =
ψi
=
X
ψi
=
X
ψi
P [Ψi = ψi ] · E [c̄i,j |Ψi = ψi ]
2
P [Ψi = ψi ] · (E [ci,j |Ψi = ψi ] − E [ci,j ])2 .
(11)
Pt
t
i (r))
E [ci,j |Ψi = ψi ] = r=1 deg(ψ
· deg(ψ1i (r)) = 2|E|
= E [ci,j ]. That is, the expected number of collisions is
2|E|
identical for every path of wi . Plugging into (11), E [c̄i,j c̄i,k ] = 0.
2
2
P
tB(t)
and thus:
= O n |E|
So finally, plugging back into equation (10), E
i,j∈[1,...,n],i6=j c̄i,j
h 2i
E C =O
n2 tB(t)
·
|E|
deg
n(n − 1)t
2 !
=O
1 B(t)|E|
·
n2 t
|V |2
.
With this variance bound in place, we can now finally prove Theorem 19.
Proof of Theorem 19. Note that C̄ = C − E C. By Chebyshev’s inequality Lemma 22 gives:
P [|C − E C| ≥ ǫ E C] ≤
Rearranging gives us that, in order to have C̄ ∈
2
h
n t=Θ
1
ǫ 2 n2 t
(1−ǫ) 1+ǫ
|V | , |V |
i
· B(t)|E|.
with probability δ, we must have:
1
B(t)|E| .
ǫ2 δ
As long as we have ǫ < 1/4 then this immediately gives à ∈ [(1 − 2ǫ)|V |, (1 + 2ǫ)|V |], giving the lemma after
adjusting constants on ǫ.
6.1.2
Estimating The Average Degree
we need a (1 ± ǫ) apWe now show how to estimate the value of deg used in Algorithm 3. Specifically,
P
cj
j
1
proximation to deg
. If we then substitute this into the formula à = deg·n(n−1)t
, we still have a (1 ± O(ǫ))
approximation to the true network size. We use the algorithm and analysis of [KLS11], which gives a simple
approximation via inverse degree sampling.
Algorithm 4 Average Degree Estimation
input: n random starting locations [w1 , ..., wn ] distributed according to the network’s stable distribution.
1
∀j, set dj := deg(w
⊲ Sampling
j)
return D :=
P
dj
·n
17
Theorem 23 (Average Degree Estimation). If n = Θ
h
i
1+ǫ
probability at least 1 − δ, D ∈ 1−ǫ
.
,
deg deg
1
ǫ2 δ
·
deg
degmin
, Algorithm 4 returns D such that, with
Proof.
|V |
n
X
1
|V |
deg(vi )
1
1
1X
.
E dj = · n ·
=
·
=
ED =
n j=1
n
2|E|
deg(vi )
2|E|
deg
i=1
Since each dj is independent, letting D̄ = D − E D,
|V |
1
1
1
1
1 X deg(vi )
|V |
1
1
E D̄2 = E[d¯2j ] ≤ E[d2j ] =
.
≤ ·
=
·
n
n
n i=1 (2|E|) deg(vi )2
n 2|E| degmin
n degmin deg
h
i
deg
1
ǫ
Applying Chebyshev’s inequality: P D − deg
≤ deg
and rearranging, to succeed with proba≤ ǫ2 n deg
min
bility at least 1 − δ it suffices to set:
1
deg
.
n=Θ 2 ·
ǫ δ degmin
6.1.3
Handling Burn-In Error
Finally, we remove our assumption that walks start distributed exactly according to the network’s stable
distribution, rigorously bounding the length of burn-in required before running Algorithm 3.
n
Let D∗ ∈ R|V | be a vector representing the true stable distribution of n random walks on G and
n
Dt ∈ R|V | be a vector representing the distribution of the walks after running for t burn-in steps. Specifically,
each walk w1 , ..., wn is initialized at a single seed vertex v. For t rounds we then update the location of each
walk independently by moving to a randomly chosen neighbor. Both vectors are probability distributions:
they have all entries in [0, 1] and kD∗ k1 = kDk1 = 1.
Let ∆ = D∗ − Dt and assume that k∆k1 ≤ δ. We can consider two equivalent algorithms: draw an
initial set of locations W = w1 , ..., wn from D∗ , run Algorithm 3, and then artificially fail with probability
max{0, ∆(W )}. Alternatively, draw W = w1 , ..., wn from Dt , run Algorithm 3, and then artificially fail with
probability max{0, −∆(W )}. These algorithms are clearly equivalent. The first obtains a good estimator
with probability 1 − 2δ - probability δ that Algorithm 3 fails when initialized via the stable distribution D∗
by Theorem 19 plus an artificial failure probability of ≤ k∆k1 ≤ δ. The second then clearly also fails with
probability 2δ. This can only be higher than if the we did not perform the artificial failure after running
Algorithm 3. Therefore, running Algorithm 3 with a set of random walks initially distributed according to
Dt yields success probability ≥ 1 − 2δ.
How long must the burn-in period be to ensure kD∗ − Dt k1 ≤ δ? Let W be the random walk matrix of
G. Let λ1 ≥ λ2 ≥ . . . ≥ λA be the eigenvalues of W and λ = max{|λ2 |, |λ|V | |}. Let Ct ∈ R|V | denote the
location distribution for a single random walk after burn-in and C ∗ ∈ R|V | denote the stable distribution of
a single random walk. If we have, for all i, |Ct (vi ) − C ∗ (vi )| ≤ δ/n · C ∗ (vi ) then we have for any W :
|Dt (W ) − D∗ (W )| =
≤
n
Y
i=1
n
Y
i=1
Ct (wi ) −
n
Y
i=1
C ∗ (wi )
(C ∗ (wi ) + δ/n · C ∗ (wi )) −
n
Y
i=1
C ∗ (wi )
n
n
X
X
n
δ i ≤ 2δ · D∗ (W )
(δ/n)i ≤ D∗ (W )
< D∗ (W )
i
i=1
i=1
as long as δ < 1/2. This multiplicative bound gives kD∗ − Dt k1 ≤ 2δ.
mixing
time
bounds
By standard
log(|E|/δ)
log(n|E|/δ)
δ
∗
∗
([Lov93], Theorem 5.1), |Ct (vi ) − C (vi )| ≤ n|E| · C (vi ) for all i after O
=O
burn-in
1−λ
1−λ
steps (since n < |E| or else we could have scanned the full graph.)
18
6.1.4
Overall Runtime and Comparision to Previous Work
Let M = O log(|E|/δ)
denote the burn-in time required before running Algorithm 3. In order to obtain a
1−λ
(1 ± ǫ) estimate of network size with probability 1 − δ we must run n random walks for M + t steps, making
n(M + t) link queries, where by Theorems 19 and 23:
s
deg
|V | · B(t)deg
n = Θ max
,
.
(12)
2
degmin ǫ δ
t · ǫ2 δ
Typically, the second term dominates since deg << |V |. Hence, by increasing t, we are able to use fewer
random walks, significantly decreasing the number of link queries required if M is large.
In the special case with t = 1 we obtain a somewhat simpler bound. Instead of using the more general
analysis of Lemma 21 we can directly calculate:
|V |
X deg(vi )2
1
1
.
=
E c̄2i,j =
2 deg(v )2
(2|E|)
deg
·
2|E|
i
i=1
2
Plugging this into Lemma 22 gives E[C ] =
n2
deg·2|E|
·
deg
n(n−1)
2
= O
|E|
. So, to have, C ∈ [(1 −
deg
ǫ) E C, (1 + ǫ) E C] with probability 1 − δ by Chebyshev’s inequality, we need: n = Θ |E|
ǫ2 δ = Θ ǫ2 δ · |V | .
So overall require:
s
deg
|V | · deg
n = Θ max
,
.
(13)
2
degmin ǫ δ
ǫ2 δ
n2 |V |2
2
[KLS11] also halts random walks after burn-in (uses t = 1), but uses a different estimator, tracking
average degree, average inverse degree, and unweighted collisions. They require:
)!
(s
P 3
P
pi
1/pi
1
P ,
.
(14)
n = Θ max
,
P
ǫ2 δ p2i ǫ2 δ ( p2i )2 ǫ2 δ|V |2
i)
Where pi = deg(v
2|E| . Their third term comes from deg estimation and can be upper bounded by our first,
although, by giving a tighter analysis in Theorem 23 we match this term. Their first term can be rewritten:
s
s
s
s
1
2|E|
2|E|
|V | · deg
= P|V |
.
·
P|V | 2 =
P|V |
2
2
2
2
ǫ2 δ
ǫ δ
p
ǫ δ
deg(vi ) /(2|E|)
deg(vi )
i=1
i
i=1
i=1
P|V |
This will always be somewhat smaller than our second term as 2|E| ≤ i=1 deg(vi )2 . Their second term is
a bit harder to compare, however, can be easily upper bounded by:
P 3
deg3max 2|E|
pi
1
deg3max
≤
· 2 =
P
2
4
3 · ǫ2 δ|V | .
2
2
ǫ
δ
2
ǫ δ ( pi )
deg |V |
deg
Assuming degmax /deg is not too large, this term will be small. However, a few very high degree nodes
in an otherwise sparse graph can make it very large.
In sum, while our bounds are not directly comparable to those of [KLS11], in the t = 1 case, assuming
reasonably bounded degrees, they are of the same order of magnitude. Further, 12 gives an important
tradeoff for graphs with relatively slow mixing time – we can increase the number of steps in our random
walks, decreasing the total number of walks.
As an illustrative example, consider a k-dimensional torus graph for k ≥ 3 (for k = 2 mixing time is Θ(|V |)
so we might as well census the full graph). For any δ > 0, the mixing time required for kD∗ − DM k1 = O(δ)
19
(see Section 6.1.3) is M = Θ(log(|V |/δ)|V |2/k ). All nodes have degree 2k, and using the bounds above, to
obtain a (1 ± ǫ) estimate of |V |, the algorithm of [KLS11] requires:
(
)!
r
1
|V |
n = Θ max 2 ,
,
ǫ δ
ǫ2 δ
|/δ)
(k+4)/(2k)
√
Assuming |V | is large so the second term dominates, they require M · n = Θ log(|V
·
|V
|
ǫ d
link queries to obtain a size estimate. In contrast, we require:
s
)!
(
r
deg
|V
|
·
B(t)deg
|V |
1
.
n = Θ max
,
= Θ max 2 ,
degmin ǫ2 δ
t · ǫ2 δ
ǫ δ
t · ǫ2 δ
since by Lemma 15, B(t) = O(1/k) and deg = degmin = k. If we set t = Θ(M ), and again assume that the
second term dominates since |V | is large, the total number of link queries we need is:
!
p
log(|V |/δ)
(k+1)/2k
√
· |V |
.
n(M + t) = O
ǫ d
This beats [KLS11] by decreasing the polynomial in |V | and the logarithmic burn-in term. Ignoring error
dependences, if k = 3, [KLS11] requires Θ(n7/6 ) queries which is more expensive than fully censusing the
graph, whereas we require O(n2/3 ) queries, which is sublinear in the graph size.
We leave it as an open question to compare our bounds with those of [KLS11] on more natural classes of
graphs, and to determine either experimentally or theoretically, typical values of B(t) on these graphs. As
used above, any of the bounds obtained in Section 5 apply since the degree weighted B(t) is upper bounded
by the unweighted B(t) used in our regular graph analysis. However, bounds for real networks or popular
random graph models used to study these networks would be very interesting.
6.2
Distributed Density Estimation by Robot Swarms
Algorithm 2 can be directly applied as a simple and robust density estimation algorithm for robot swarms.
Additionally, the algorithm can be used to estimate the frequency of certain properties within the swarm. Let
d be the overall population density and dP be the density of agents with some property P . Let fP = dP /d
be the relative frequency of P .
Assuming that agents with property P are distributed uniformly in population and that agents can
detect this property (through direct communication or some other signal), then they can separately track
encounters with these
agents. They can compute
an estimate d˜ of d and d˜P of dPh. ByTheorem
i
2, after
log(1/δ) log log(1/δ) log(1/dǫ)
1−ǫ
1+ǫ
˜
˜
steps,
with
probability
1
−
2δ,
d
/
d
∈
f
,
running for t = Θ
P
P
d P ǫ2
1+ǫ
1−ǫ fP =
[(1 − O(ǫ))fP , (1 + O(ǫ))fP ] for small ǫ.
In a biological setting, properties may include if an ant has recently completed a successful food foraging
trip [Gor99], or if an ant is a nestmate or enemy [Ada90]. In a robotics setting, properties may include
whether a robot is part of a certain task group, whether a robot has completed a certain task, or whether a
robot has detected a certain event or environmental property.
6.3
Random Walk-Based Sensor Network Sampling
Finally, we believe our moment bounds for a single random walk (Corollaries 8 and 9) can be applied to
random walk-based distributed algorithms for sensor network sampling. We leave obtaining rigorous bounds
in this domain to future work.
Random walk-based sensor network sampling [LB07, AB04] is a technique in which a query message (a
‘token’) is initially sent by a base station to some sensor. The token is relayed randomly between sensors,
which are connected via a grid network, and its value is updated appropriately at each step to give an answer
to the query. This scheme is robust and efficient - it easily adapts to node failures and does not require
setting up or storing spanning tree communication structures.
20
However, if attempting to estimate some quantity, such as the percentage of sensors that have recorded
a specific condition, as in density estimation, unless an effort is made to record which sensors have been previously visited, additional variance is added due to repeat sensor visits. Recording previous visits introduces
computational burden – either the token message size must increase or nodes themselves must remember
which tokens they have seen. We are hopeful that our moment bounds can be used to show that this is
unnecessary – due to strong local mixing, the number of repeat sensor visits will be low, and increased
variance due to random walking will be limited.
6.4
Generalization to Data Aggregation
We note that, estimating the percentage of sensors in a network or the density of robots in a swarm with
a property that is uniformly distributed is a special case of a more general data aggregation problem: each
agent or sensor holds a value vi drawn independently from some distribution D. The goal is to estimate
some statistic of D - e.g. its expectation. In the case of density estimation vi is simply an indicator random
variable which is 1 with probability d and 0 otherwise.
Ideally, to estimate the expectation of D, one would independently sample the agents and compute
the sample mean. As in the case of density estimation, if instead, one simply takes an average of values
encountered via a random walk, additional variance is added due to repeated encounters with many agents.
However, it is likely that the effect of this variance can be bounded, as we have done in the special case of
density estimation. We believe extending our results to more general data aggregation problems via random
walk is an interesting future direction.
7
Acknowledgements
We thank Amartya Shankha Biswas, Christopher Musco, and Mira Radeva for helpful discussions. This
work was partially supported by NSF Grants BIO-1455983 and CCF-1461559, the NSF Center for Science
of Information grant CCF-0939370, and AFOSR grant FA9550-13-1-0042.
References
[AB04]
Chen Avin and Carlos Brito. Efficient and robust query processing in dynamic environments using random walk techniques. In Proceedings of the 3rd International Symposium on Information
Processing in Sensor Networks, pages 277–286. ACM, 2004.
[Ada90]
Eldridge S Adams. Boundary disputes in the territorial ant Azteca trigona: effects of asymmetries
in colony size. Animal Behaviour, 39(2):321–328, 1990.
[CLLM12] Kai-Min Chung, Henry Lam, Zhenming Liu, and Michael Mitzenmacher. Chernoff-hoeffding
bounds for markov chains: Generalized and simplified. arXiv preprint arXiv:1201.0559, 2012.
[ES09]
Robert Elsässer and Thomas Sauerwald. Tight bounds for the cover time of multiple random
walks. In Automata, Languages and Programming, pages 415–426. Springer, 2009.
[Gil98]
David Gillman. A chernoff bound for random walks on expander graphs. SIAM Journal on
Computing, 27(4):1203–1220, 1998.
[GKBM09] Minas Gjoka, Maciej Kurant, Carter T Butts, and Athina Markopoulou. A walk in facebook:
Uniform sampling of users in online social networks. arXiv preprint arXiv:0906.0060, 2009.
[Gor99]
Deborah M Gordon. Interaction patterns and task allocation in ant colonies. In Information
Processing in Social Insects, pages 51–67. Springer, 1999.
[GPT93]
Deborah M Gordon, Richard E Paul, and Karen Thorpe. What is the function of encounter
patterns in ant colonies? Animal Behaviour, 45(6):1083–1100, 1993.
21
[KBM12]
Maciej Kurant, Carter T Butts, and Athina Markopoulou. Graph size estimation. arXiv preprint
arXiv:1210.0460, 2012.
[KLS11]
Liran Katzir, Edo Liberty, and Oren Somekh. Estimating sizes of social networks via biased
sampling. In Proceedings of the 20th International Conference on World Wide Web, pages 597–
606. ACM, 2011.
[LB07]
Luisa Lima and Joao Barros. Random walks on sensor networks. In 5th International Symposium
on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007,
pages 1–5. IEEE, 2007.
[LL12]
Jianguo Lu and Dingding Li. Sampling online social networks by random walk. In Proceedings
of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks
Research, pages 33–40. ACM, 2012.
[Lov93]
László Lovász. Random walks on graphs: A survey. Combinatorics, Paul Erdos is Eighty,
2(1):1–46, 1993.
[LW14]
Jianguo Lu and Hao Wang. Variance reduction in large graph sampling. Information Processing
& Management, 50(3):476–491, 2014.
[MMG+ 07] Alan Mislove, Massimiliano Marcon, Krishna P Gummadi, Peter Druschel, and Bobby Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM
SIGCOMM Conference on Internet Measurement, pages 29–42. ACM, 2007.
[MYK10]
Abedelaziz Mohaisen, Aaram Yun, and Yongdae Kim. Measuring the mixing time of social
graphs. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement,
pages 383–389. ACM, 2010.
[NTD05]
Stamatios C Nicolis, Guy Theraulaz, and Jean-Louis Deneubourg. The effect of aggregates on
interaction rate in ant colonies. Animal Behaviour, 69(3):535–540, 2005.
[Pra05]
Stephen C Pratt. Quorum sensing by encounter rates in the ant Temnothorax albipennis. Behavioral Ecology, 16(2):488–496, 2005.
[SHG06]
Robert J Schafer, Susan Holmes, and Deborah M Gordon. Forager activation and food availability in harvester ants. Animal Behaviour, 71(4):815–822, 2006.
[Wai15]
Martin J Wainwright. High-dimensional statistics: A non-asymptotic viewpoint, draft.
http://www.stat.berkeley.edu/~mjwain/stat210b/Chap2_TailBounds_Jan22_2015.pdf,
2015.
22
| 8cs.DS
|
Safe & Robust Reachability Analysis of Hybrid Systems
Eugenio Moggi1a , Amin Farjudianb , Adam Duracz2c , Walid Taha3b
arXiv:1709.05658v1 [cs.LO] 17 Sep 2017
a DIBRIS,
Genova Univ., v. Dodecaneso 35, 16146 Genova, Italy, Email: [email protected]
University, Halmstad, Sweden, Email: [email protected]
c Rice University, Houston, TX, USA, Email: [email protected]
b Halmstad
Abstract
Hybrid systems—more precisely, their mathematical models—can exhibit behaviors, like Zeno behaviors, that are absent in purely discrete or purely continuous systems. First, we observe that, in this context, the usual definition of reachability—namely, the reflexive and transitive closure of a transition relation—can
be unsafe, ie, it may compute a proper subset of the set of states reachable in
finite time from a set of initial states. Therefore, we propose safe reachability,
which always computes a superset of the set of reachable states.
Second, in safety analysis of hybrid and continuous systems, it is important
to ensure that a reachability analysis is also robust wrt small perturbations to
the set of initial states and to the system itself, since discrepancies between
a system and its mathematical models are unavoidable. We show that, under
certain conditions, the best Scott continuous approximation of an analysis A is
also its best robust approximation. Finally, we exemplify the gap between the
set of reachable states and the supersets computed by safe reachability and its
best robust approximation.
Keywords: Domain theory; Models of hybrid systems; Reachability.
Introduction
In a transition system—ie, a binary relation → on a set of states—reachability
is a clearly defined notion, namely, the reflexive and transitive closure →∗ of
→. Reachability analysis plays an important role in computer-assisted verification and analysis [ACH+ 95], since safety (a key system requirement) is usually
formalized in terms of reachability, namely:
state s is safe ⇐⇒ it is not possible to reach a bad state from s.
1 Research
partially supported by the Swedish Knowledge Foundation.
done while the author was a PhD student at Halmstad University.
3 Research partially supported by US NSF award #1736754 “A CPS Approach to Robot
Design” and the Swedish Knowledge Foundation project “AstaMoCA: Model-based Communications Architecture for the AstaZero Automotive Safety Facility”.
2 Work
Preprint submitted to Journal of TCS
August 7, 2017
For a hybrid system one can define a transition relation → on a continuous and
uncountable state space, but →∗ captures only the states reachable in finitely
many transitions, and they can be a proper subset of those reachable in finite
time! Hybrid systems with Zeno behaviors—where infinitely many events occur
in finite time—are among the systems in which the two notions of reachability
differ. Zeno behaviors arise naturally when modeling rigid body dynamics with
impacts, as illustrated by the system consisting of a bouncing ball (Example 2.8),
whose Zeno behavior is due to the modeling of impacts as discrete events.
Contributions
The first contribution of this paper is the notion of safe reachability
(Def 3.6), which gives an over-approximation—ie, a superset—of the states
reachable in finite time, including the case where the hybrid system has Zeno behaviors. Mathematical models are always simplifications, through abstractions
and approximations, of real systems. Simplifications are essential to making
analyses manageable. In safety analysis, over-approximations are acceptable,
since they can only lead to false negatives, ie, the analysis may wrongly conclude that (a state s of) the system in unsafe, because the over-approximation
includes some unreachable bad states.
The second contribution is to show, under certain assumptions, that the best
Scott continuous approximation of safe reachability coincides with its best robust
approximation. In safety analysis robust over-approximations are important,
because inaccuracies in the modeling of a cyber-physical system (as well as in
its building and testing) are unavoidable, as convincingly argued in [Frä99].
Related Work
Reachability maps are arrows in the category of complete lattices and monotonic maps, which is the standard setting for defining and comparing abstract
interpretations [CC92]. We build directly on the following papers.
• [GST09] is an excellent tutorial on hybrid systems, from which we borrow
the definition of hybrid system (Def 2.1), but avoid the use of hybrid arcs,
since they cannot reach nor go beyond Zeno points.
• [CR04, Cui07] introduce topological transition systems (TTS), which we
use for defining safe reachability (Def 3.6). In TTSs on discrete spaces,
standard reachability (Def 3.1) and safe reachability (Def 3.6) coincide.
• [Eda95] is one among several papers, where Edalat recasts mainstream
mathematics in Domain Theory, and shows what is gained by doing so.
In this context Domain Theory becomes particularly relevant when the
Scott and Upper Vietoris topologies on certain hyperspaces coincide.
• [Frä99, GKC13] show that proving δ-safety, ie, safety of a hybrid system
subject to some noise bounded by δ, can make the verification task easier,
besides excluding systems that are safe only under unrealistic assumptions.
2
Summary
The rest of the paper is organized as follows:
• Sec 2 recalls the definition of a hybrid system from [GST09], defines the
corresponding transition relation (Def 2.3), and gives some examples.
• Sec 3 introduces two reachability maps Rf and Rs (Def 3.1 and 3.6, respectively), establishes their properties and how they relate to each other.
• Sec 4 uses the poset-enriched category of complete lattices and monotonic
maps (see Def 4.4) as a framework to discuss approximations and relate
reachability maps defined on different complete lattices. We also give a
systematic way to turn a monotonic map f between complete lattices into
a Scott continuous map f ✷ (see Prop 4.14).
• Sec 5 introduces the notion of robustness (see Def 5.1) and says when
robustness and Scott continuity coincide (see Thm 5.7).
• Sec 6 analyses (with the aid of pictures) the differences between the underapproximation Rf and several over-approximations (from Rs to Rs✷ ) of sets
of reachable states, for the hybrid systems introduced in Sec 2.
Appendix A contains some proofs that were too long to inline into the text.
1. Mathematical preliminaries
We assume familiarity with the notions of Banach, metric, and topological
spaces, and the definitions of open, closed, and compact subsets of a topological
space (see, eg, [Con90, Kel75]). The three notions of space are related as follows:
• Every Banach space is a Cauchy complete metric space whose distance is
△
d(x, y) = |y − x|, where |x| is the norm of x;
• Every metric space is a topological space whose open subsets are given by
△
unions of open balls B(x, δ) = {y|d(x, y) < δ}.
Throughout the paper, for the sake of simplicity, one may replace Banach spaces
with Euclidean spaces Rn . For membership we may write x:X instead of x ∈ X,
and we use the following notations:
• R is the Euclidean space of the real numbers;
• N and ω denote the natural numbers with the usual linear order;
• P(S) is the set of subsets of a set S (we use the same notation also when
S is a set with additional structure, eg, a Banach or topological space);
• O(S) is the set of open subsets of a topological space S, and C(S) is the set
of closed subsets (we use the same notation also when S is a set with additional structure that induces a topology, eg, a Banach or metric space);
3
• Set is the category of sets and (total) maps;
• Setp is the category of sets and partial maps;
• Top is the category of topological spaces and continuous maps.
Finally, we recall some definitions and their basic properties:
△
• x is a limit of a sequence (xn |n:ω) in the topological space S ⇐⇒
∀O:O(S).x:O =⇒ ∃m.∀n > m.xn :O.
The limits of a sequence form a closed subset of S. In a metric space a
sequence has at most one limit.
• x is an accumulation point of a sequence (xn |n:ω) in the topological
△
space S ⇐⇒ ∀O:O(S).x:O =⇒ ∀m.∃n > m.xn :O.
The accumulation points of a sequence form a closed subset of S, every
limit is also an accumulation point, and every accumulation point is a limit
of a sub-sequence (xf (n) |n:ω) for some strictly increasing f :Set(ω, ω), ie,
∀n.f (n) < f (n + 1). In a metric space, if a sequence has a limit, then the
limit is the only accumulation point.
• The derivative f˙:Setp (R, S) of a partial map f :Setp (R, S) from R to a
△
Banach space S is given by f˙(x) = v ⇐⇒ ∃δ > 0 st B(x, δ) is included
in the domain of f , and for any sequence (xn |n:ω) in B(x, δ) − {x}, if x
(x)
is the limit of (xn |n:ω) in R, then v is the limit of ( f (xxnn)−f
|n:ω) in S.
−x
If f˙(x) is defined, then f must be continuous at x. A stronger requirement
is that f˙ is defined and continuous in B(x, δ), in this case f is called
continuously differentiable in B(x, δ).
2. Hybrid Systems and Topological Transition Systems
In this section, we define what is a hybrid system (cf. [GST09]), namely,
a mathematical model suitable for describing cyber-physical systems; what is
a topological timed transition system (cf. [CR04]), namely, an abstraction of
hybrid systems useful for defining various reachability maps; and, finally, we
introduce some example hybrid systems that will be used throughout the paper.
Definition 2.1. A Hybrid System (HS for short) H on a Banach space S is a
pair (F, G) of binary relations on S, ie, F, G:P(S×S), respectively called flow and
jump relation. We say that H is open/closed/compact, when the relations
F and G—as subsets of the topological space S × S—are open/closed/compact.
Remark 2.2. In [GST09], the authors restrict S to a Euclidean space Rn , and
show that HS subsume Hybrid Automata [ACH+ 95] and Switching Systems.
4
The flow and jump relations are constraints for the trajectories describing how
the HS evolves over time (see the definition of hybrid arc in [GST09, page 39]).
Trajectories are not needed to define reachability (Sec 3), since a simpler notion
of timed transition suffices (see also [ACH+ 95, Sec 2] and [Pla08, Def 5]).
Definition 2.3. A Topological Timed Transition System (TTTS) is a pair
✲ ) consisting of a topological space S and a timed transition relation
(S,
△
✲ :P(S × T × S), where T =
{d:R|d ≥ 0} is the continuous time line. Its
d
△
corresponding transition relation on S is given by s ✲ s′ ⇐⇒ ∃d.s ✲ s′ .
d
△
A HS H = (F, G) on S induces a TTTS (S, ✲ ) such that s ✲ s′ ⇐⇒
H
H
′
1. d = 0 and s G s , or,
2. d > 0 and there exists a continuous map f :Top([0, d], S) such that:
• the derivative f˙ of f is defined and continuous in (0, d);
• s = f (0), s′ = f (d) and ∀t:(0, d).f (t) F f˙(t).
In this case we say that f realizes the transition.
Remark 2.4. The Banach space structure is just what is needed to define
derivatives. Hybrid arcs (cf. [GST09]) could be defined in term of a transition
relation where the labels d > 0 are replaced by their realizer maps f .
In [GST09] the requirements on f are more relaxed than ours, namely: f
must be absolutely continuous (which, in our case, is implied by the continuity
of f˙), and the flow relation must hold almost everywhere in (0, d). However, the
safe evolution and safe reachability maps (see Def 3.6) are insensitive to these
changes. Thus, we have adopted the requirements on f that are mathematically
simpler to express.
In [Dur16] the requirements on f are stricter than ours, namely: f˙ must
extend continuously to [0, d], and the flow
√ relation must hold also at the endpoints. For instance, the map f (t) = t is continuous in [0, d], its derivative
f˙(t) = 2∗1√t is continuous in (0, d), but it cannot be extended continuously to 0.
d
The main rationale for the stricter requirements is that a transition s ✲ s′
with d > 0 can only start from a state in the domain of the flow relation F .
Notation 2.5. Given a first-order language with an interpretation in a Banach
space S, a HS on S can be described by two formulas, a flow formula F (x, ẋ) and
a jump formula G(x, x+ ), with two free variables each: x denotes the current
state, ẋ denotes the derivative of a trajectory flowing through x, and x+ denotes
a state reachable from x with one jump.
Similarly, given a two sorted language, with one sort interpreted in R and
the other in a topological space S, a timed transition relation can be described
by a formula T (x, d, x′ ) with three free variables: x denotes the starting state,
d:R the duration of the transition, and x′ the final state.
We introduce some hybrid systems, and give explicit descriptions of their timed
transition relations (see also the Figures in Sec 6).
5
Example 2.6 (Expand). HE is a HS on R describing the expansion of a quantity m until it reaches a threshold M > 0. The flow and jump relations are:
F = {(m, ṁ)|0 ≤ m = ṁ ≤ M },
G = ∅.
It has two kinds of trajectories depending on the start state m0 (see Fig 1).
1. When m0 = 0, the quantity remains 0 forever, ie, f (t) = 0 when t ≥ 0.
2. When m0 :(0, M ), there is an exponential growth f (t) = m0 ∗ et until f (t)
becomes M , then the trajectory cannot progress further.
The timed transition relation
• m
✲ consists of the transitions
HE
✲ m′ with 0 < d and 0 ≤ m ≤ m′ = m ∗ ed ≤ M .
d
Removing (M, M ) from F does not change the timed transitions, while adding
d
(M, 0) to F entails the addition of the transitions M ✲ M with d > 0.
Example 2.7 (Decay). The hybrid system HD on R describes the decay of a
quantity when m > 0, and a ‘refill’ to M > 0 when m = 0. The flow and jump
relations are:
F = {(m, ṁ)|m > 0 ∧ ṁ = −m},
G = {(0, M )}.
It has two kinds of trajectories, depending on the start state m0 (see Fig 2):
1. When m0 = 0, there is a refill followed by a decay f (t) = M ∗ e−t .
2. When m0 > 0, there is a decay f (t) = m0 ∗ e−t . Thus, f (t) > 0 when
t ≥ 0, and f (t) → 0 as t → +∞.
✲ consists of the transitions
The timed transition relation
HD
• 0
• m
✲ M , and
0
✲ m′ with 0 < d and m > m′ = m ∗ e−d > 0.
d
Adding (0, 0) to F entails the addition of the transitions 0
✲ 0 with d > 0.
d
Example 2.8 (Bouncing ball). The hybrid system HB on R2 describes a
bouncing ball with height h ≥ 0 and velocity v, which is kicked when it stops,
ie, when h = v = 0. We assume the force of gravity to be −1 (for the sake
of simplicity), a coefficient of restitution b (we do not restrict its value, but
b:[−1, 0] would be the obvious restriction), and a velocity V > 0 given to the
ball when it is kicked. Formally:
• F = {((h, v), (ḣ, v̇))|h > 0 ∧ ḣ = v ∧ v̇ = −1}.
• G = {((0, v), (0, v + ))|v < 0 ∧ v + = b ∗ v} ⊎ {((0, 0), (0, V ))}.
It has seven kinds of trajectories starting from (h = 0, v > 0), depending on the
value of b (see Fig 3).
6
1. When b < −1, the ball never stops (its energy increases at each bounce).
2. When b = −1, the ball never stops (its energy remains constant).
3. When b:(−1, 0), the ball stops in finite time, but after infinitely many
bounces (this is a Zeno behavior), then it is kicked, ie, (h = 0, v = V ).
4. When b = 0, the ball stops as it hits the ground, then it is kicked.
5. When b:(0, 1), as the ball hits the ground, it stops after infinitely many
instantaneous slowdowns 0 > bn ∗ v → 0 (this is a chattering Zeno
behavior), then it is kicked.
6. When b = 1, as the ball hits the ground, the trajectory cannot progress
further in time.
7. When b > 1, as the ball hits the ground, its velocity drifts to −∞ after
an infinite sequence of instantaneous accelerations 0 > bn ∗ v → −∞, and
the trajectory cannot progress further in time.
✲ consists of the following transitions:
The timed transition relation
HB
• (0, v)
• (0, 0)
✲ (0, v ′ ) with v < 0 and v ′ = b ∗ v, this is a bounce;
0
✲ (0, V ), this is when the ball is kicked;
0
• (h, v) ✲ (h′ , v ′ ), with 0 < d and 0 ≤ h, h′ = h+v∗d− d2 ∧v ′ = v−d, this
2
is when the ball moves while the energy E(h, v) = h + v2 stays constant.
d
2
2∗v
In particular, (0, v) ✲ (0, −v) is the transition between two bounces. Adding
{((0, v), (ḣ, v̇))|ḣ = v ∧ v̇ = −1} to F does not change the timed transitions,
0
while adding ((0, 0), (0, 0)) to G entails the addition of (0, 0) ✲ (0, 0).
The following construction adds a clock to a HS to record the passing of time.
Definition 2.9. Given a HS H = (F, G) on S, the derived HS t(H) = (F ′ , G′ )
on R × S adds a clock to H, namely:
△
• F ′ = {((t, s), (1, ṡ))|s F ṡ}, because dt/dt = 1;
△
• G′ = {((t, s), (t, s+ ))|s G s+ }, because jumps are instantaneous.
Proposition 2.10. (t, s)
✲ (t′ , s′ ) ⇐⇒ t′ = t + d ∧ s
✲ s′ .
d
d
t(H)
H
Proof. Only the case d > 0 is non-trivial.
• If f ′ :Top([0, d], R × S) realizes the transition (t, s)
d
✲ (t′ , s′ ), then
t(H)
f ′ (x) = (t + x, f (x)) for a unique f :Top([0, d], S), and moreover this f
d
realizes the transition s ✲ s′ .
H
• Conversely, if f :Top([0, d], S) realizes s
realizes (t, s)
✲ (t′ , s′ ).
d
✲ s′ , then f ′ (x) = (t + x, f (x))
d
H
✷
t(H)
7
3. Evolution and Reachability
Transition systems (TS for short) provide the main formalism for modeling
discrete systems. The formalism does not mention time explicitly, but it assumes
that time is discrete, and each transition takes one time unit (or alternatively,
it abstracts from time and describes only the order of discrete state changes).
Given a TS (S, →), ie, a binary relation → on a set S (aka a directed graph),
we identify the discrete time line with the set N of natural numbers and define
the following notions related to the TS.
• A trajectory is a map f :Set([0, n], S) such that ∀i < n.f (i) → f (i + 1) for
some n:N, or equivalently, a path f :S+ in the graph. The length of f is n
and f (0) is its starting state.
△
• The evolution map Ef :P(S) → P(N × S) is Ef (I) = {(n, s′ )|∃s:I.s →n s′ },
or equivalently the union of (the graphs of) all trajectories starting from
the set I of initial states. Therefore, Ef (I) says at what time a state is
reached, but forgets the trajectories used to reach it. However, when →
is deterministic, there is at most one trajectory of length n from s to s′ ,
which can be recovered from Ef ({s}).
△
• The reachability map Rf :P(S) → P(S) is Rf (I) = {s′ |∃s:I.s →∗ s′ }, or
equivalently {s′ |∃n.(n, s′ ):Ef (I)}. Therefore, Rf (I) says whether a state is
reachable from I, but forgets at which time instances it is reached.
For TTTS (and HS) one would like to reuse as much as possible the theory
available for TS. The main point of this section is that naive reuse can result
under-approximating what is reachable in finite time. To address this problem,
we present a solution that computes an over-approximation (see Sec 3.1). This
solution exploits the topological structure of the state space S and the continuous
time line T.
We choose to cast analyses (eg reachability) as monotonic maps (like Rf )
rather than as relations (like →∗ ). This becomes essential in Def 3.6 and for
defining approximability (Sec 4) and robustness (Sec 5) of an analysis.
Definition 3.1. The evolution map Ef :P(S) → P(T×S) and the reachability
✲ ) are:
map Rf :P(S) → P(S) for a TTTS (S,
△
• Ef (I) = the smallest S:P(T × S) such that {0} × I ⊆ S and S is closed
d
wrt timed transitions, ie, (t, s) ∈ S ∧ s ✲ s′ =⇒ (t + d, s′ ) ∈ S.
△
• Rf (I) = the smallest S:P(S) such that I ⊆ S and
S is closed wrt transitions, ie, s ∈ S ∧ s ✲ s′ =⇒ s′ ∈ S.
We denote with Ef H and Rf H the evolution and reachability maps for the TTTS
induced by the HS H.
8
Remark 3.2. The ”f” in Ef and Rf stands for ”finite”, because these maps
consider only states that are reachable in finitely many transitions. There is an
important difference between discrete systems and continuous/hybrid systems.
In a discrete (time) system the transition relation suffices to define trajectories,
the evolution, and the reachability maps. In a continuous (time) system: to
define trajectories, the structure of a HS is needed; to define the evolution map,
the timed transition relation suffices; and to define the reachability map, the
transition relation suffices.
Theorem 3.3. The following properties hold:
1. Ef is monotonic, ie, I0 ⊆ I1 =⇒ Ef (I0 ) ⊆ Ef (I1 ), and preserves unions,
ie, ∀K ⊆ P(S).Ef (∪K) = ∪{Ef (I)|I:K}.
2. Rf is monotonic, preserves unions, is a closure, ie, I ⊆ Rf (I) = Rf 2 (I),
and π(Ef (I)) = Rf (I).
3. If H is a HS on S, then ∀I:P(S).Ef H (I) = Rf t(H) ({0} × I) and
∀J:P(R × S).π(Rf t(H) (J)) = Rf H (π(J)).
Here, π:R × S
△
✲ S is π(t, s) =
s, and π(J) is the image of J ⊆ R × S.
Proof. See Appendix A.
A pair (t, s′ ) is in Ef H (I) exactly when s′ is reached at time t in finitely many
transitions starting from some s:I. In Zeno systems there are states that are
reached at a finite time t, but not in a finite number of transitions. Therefore,
Ef H and Rf H may under-approximate what we would like to compute.
Definition 3.4. A Zeno behavior of H is a sequence ((dn , sn )|n:ω) in T × S
such that:
dn
1. ∀n.sn ✲ sn+1 ,
XH
△
2. d =
dn is defined and finite, and,
n:ω
3. the sequence has infinitely many jumps, ie, {n|dn = 0} is infinite.
d
The last requirement excludes fragmentations of a flow transition s ✲ s′ , ie,
d
sequences ((f (tn ), tn+1 − tn )|n:ω), where f :Top([0, d], S) realizes s ✲ s′ , and
(tn |n:ω) is a strictly increasing sequence with t0 = 0 and supn:ω tn = d.
The accumulation points of (sn |n:ω) in the topological space S are called
the Zeno points, and d is called the Zeno time, since it is the time needed to
reach a Zeno point from s0 .
HB of Example 2.8 is the classical case of a HS with Zeno behavior. When b
is in the interval (−1, 0), the stop state s = (0, 0) is reached in finite time from
s0 = (0, v) with v < 0, but after infinitely many bounces (see Fig 3 in Sec 6).
When b is in the interval (0, 1), HB has a chattering Zeno behaviour, ie, the stop
state is reached after infinitely many instantaneous slowdowns. On the other
hand, Prop 3.5 shows that the stop state is not in Rf HB ({s0 }) when b 6= 0.
9
2
△
Proposition 3.5. Let S = {(h, v)|h ≥ 0 ∧ E(h, v) > 0}, where E(h, v) = h + v2
is the energy in state (h, v). Then, Rf HB (S) = S, provided that b 6= 0.
Proof. We prove that S is closed wrt the transition relation
analysis. There are three cases:
✲ by case
HB
• bounce, ie, (0, v) ✲ (0, b ∗ v) with v < 0: (0, v) ∈ S, because E(0, v) =
v2
2 > 0, and (0, b ∗ v) ∈ S, because E(0, b ∗ v) > 0 when b 6= 0;
• ball kicked, ie, (0, 0)
✲ (0, V ): there is nothing to prove, as (0, 0) 6∈ S;
• move, ie, (h, v) ✲ (h′ , v ′ ) with h, h′ ≥ 0 ∧ v > v ′ ∧ E(h, v) = E(h′ , v ′ ):
(h, v) ∈ S =⇒ (h′ , v ′ ) ∈ S holds, because the energy stays constant. ✷
We propose a key change to Def 3.1 that exploits the topology on S and T by
considering reachable also a state that is arbitrarily close to reachable states.
Definition 3.6 (Safe maps). Let C(S) be the set of closed subsets of a topological space S. The safe evolution map Es:C(S) → C(T × S) and the safe
✲ ) are:
reachability map Rs:C(S) → C(S) for a TTTS (S,
△
• Es(I) = the smallest S:C(T × S) such that {0} × I ⊆ S and closed wrt
timed transitions.
△
• Rs(I) = the smallest S:C(S) such that I ⊆ S, and closed wrt transitions.
We denote with EsH and RsH the safe evolution and safe reachability maps for
the TTTS induced by the HS H, respectively.
Remark 3.7. If s0 :I and ((dn , sn )|n:ω) is a Zeno behavior of H, then the set
S = RsH (I) includes every Zeno point s (similarly EsH (I) includes (d, s), where
d is the Zeno time and s is a Zeno point). In fact, the sequence (sn |n:ω) is
included in S, and all its accumulation points must be in S, because S is closed.
The set S also includes asymptotically reachable points—ie, accumulation points
dn
✲ sn+1 and P dn = +∞—that
of a sequence (sn |n:ω) such that ∀n.sn
n:ω
H
may not be reachable in finite time.
The safe maps include other points that should be considered reachable in
finite time, but are not reachable in a finite number of transitions. For instance,
consider a HS H = (F, ∅) on Rn that can only flow—thus, it cannot have Zeno
behaviors—and a continuous map f :Top([0, d), Rn ) such that:
• the derivative f˙ of f is defined and continuous in (0, d),
• ∀t:(0, d).f (t) F f˙(t), but,
• there is no way to extend f to a continuous map on [0, d].
If f (0):I, then EsH (I) includes {(t, f (t))|t < d} and also the pairs (d, s) with s
1
) satisfies
accumulation point of f (t) as t → d. For instance, f (x) = x ∗ sin( x−1
the above properties for d = 1.
10
There is an analogue of Thm 3.3 for the safe maps, but with weaker properties,
mainly because the set of closed subsets is closed only wrt finite unions.
Theorem 3.8. The following properties hold:
1. Es is monotonic and preserves finite unions.
2. Rs is monotonic, preserves finite unions, is a closure, and
π(Es(I)) ⊆ Rs(I).
3. ∀I:P(S).Ef (I) ⊆ Es(I), and ∀I:P(S).Rf (I) ⊆ Rs(I).
4. If H is a HS on S, then ∀I:C(S).EsH (I) = Rst(H) ({0} × I), and
∀J:C(R × S).π(Rst(H) (J)) ⊆ RsH (π(J)).
Here, S:C(S) is the closure of S:P(S), ie, the smallest S ′ :C(S) such that S ⊆ S ′ .
Proof. See Appendix A.
3.1. Summary of inclusion relations
We provide a summary of the inclusion relations among the sets computed
by the four maps defined in this section. Given a hybrid system H on S and
a subset I:P(S) of initial states, there are two subsets E:P(T × S) and R:P(S)
informally defined as:
• E: the set of (t, s) such that s is reached at time t, ie, there is a trajectory
of H starting from a state in I and reaching s at time t.
• R: the set of states reachable (from I) in finite time, ie, R = π(E).
The monotonic maps in Def 3.1 and 3.6 allow to define four subsets:
• Ef H (I): the set of (t, s) such that s is reached at time t in finitely many
transitions.
• Rf H (I): the set of states reachable in finitely many transitions, ie, π(Ef H (I)).
• EsH (I):C(T × S) a closed over-approximation of E.
• RsH (I):C(S) a closed over-approximation of R.
When I:C(S), the inclusion relations among these six subsets are:
Ef H (I)
⊂
❄
Ef H (I)
✲ E
∩
∩
⊂
Rf H (I)
⊂
❄
❄
✲ EsH (I) Rf H (I)
✲ R
⊂
✲ π(EsH (I))
∩
∩
⊂
❄
✲ RsH (I)
By suitable choices of closed HS H on R and singletons I we show that no
other inclusion holds. In particular, Ef H and Rf H may compute proper underapproximations, while EsH and RsH may compute proper over-approximations.
11
1. Ef H (I) ⊂ Ef H (I) ⊂ E = EsH (I) and Rf H (I) ⊂ Rf H (I) ⊂ R = RsH (I).
△
Take H = (∅, G) with G = {(x, x/2)|0 ≤ x} ⊎ {(0, 2)} and I = {1}, then
• Rf H (I) = {2−n |n:N} and Ef H (I) = {0} × Rf H (I)
• Rf H (I) = {2−n |n:N} ⊎ {0} and Ef H (I) = {0} × Rf H (I)
• RsH (I) = {2−n |n:N} ⊎ {0, 2} and EsH (I) = {0} × RsH (I)
2. Ef H (I) = E ⊂ Ef H (I) ⊂ EsH (I) and Rf H (I) = R ⊂ Rf H (I) ⊂ π(EsH (I)).
△
Take H = (∅, G) with G = {(2, x)|x ≥ 2} ⊎ {(x, 1/x)|x ≥ 2} ⊎ {(0, 1)} and
I = {2}, then
• Rf H (I) = [2, +∞) ⊎ (0, 1/2] and Ef H (I) = {0} × Rf H (I)
• Rf H (I) = [2, +∞) ⊎ [0, 1/2] and Ef H (I) = {0} × Rf H (I)
• RsH (I) = [2, +∞) ⊎ [0, 1/2] ⊎ {1} and EsH (I) = {0} × RsH (I)
3. Rf H (I) = R = π(EsH (I)) ⊂ Rf H (I) ⊂ RsH (I).
△
Take H = (F, {(0, 2)}) with F = {(x, −x)|0 ≤ x} and I = {1}, then
• Ef H (I) = E = EsH (I) = {(t, e−t )|0 ≤ t}
• Rf H (I) = (0, 1]
• Rf H (I) = [0, 1]
• RsH (I) = [0, 2]
4. A Framework for Approximability
All maps introduced in Sec 3 (see Def 3.1 and 3.6) are monotonic maps
between complete lattices. Thus, they live in the poset-enriched category Po of
complete lattices (more generally of posets) and monotonic maps. In fact, one
can stay within Po, by defining a complete lattice of hybrid systems on S (this
can be done also for timed transition relations), by exploiting its cartesian closed
structure, and by using the order relation to express when something is an overor under-approximation of something else. Po is also the natural setting for
defining and comparing abstract interpretations [CC92], with adjunctions giving
a systematic way to relate more concrete to more abstract interpretations.
Therefore, Po will be used as a framework in which to place and compare the
reachability (and evolution) maps introduced so far, as well as their variants.
Definition 4.1. A poset-enriched category A (see [Kel82]) consists of:
• a class of objects, notation X:A;
• a poset A(X, Y ) of arrows from X to Y , notation X
✲ Y and f1 ≤ f2 ;
f
idX
✲ X and composition X g◦f✲ Z of composable arrows
• identities X
f
g
✲ Z satisfying the usual equations and monotonicity, ie,
X ✲ Y
f1 ≤ f2 :X → Y ∧ g1 ≤ g2 :Y → Z =⇒ (g1 ◦ f1 ) ≤ (g2 ◦ f2 ):X → Z.
12
✲
f
An adjunction f ⊣ g is a pair X ✛
g
Y of maps st f ◦ g ≤ idY ∧ idX ≤ g ◦ f .
If A has a terminal object 1 and h:A(X, X), then:
△
• µ:A(1, X) is an initial algebra (aka least prefix-point) for h ⇐⇒
h ◦ µ ≤ µ and ∀x:A(1, X).h ◦ x ≤ x =⇒ µ ≤ x.
△
• ν:A(1, X) is a final co-algebra (aka greatest postfix-point) for h ⇐⇒
ν ≤ h ◦ ν and ∀x:A(1, X).x ≤ h ◦ x =⇒ x ≤ ν.
Remark 4.2. The terminology in Def 4.1 comes from Category Theory, in
particular from 2-categories, since posets are a degenerate form of categories.
Ordinary categories amount to a poset-enriched categories where the order on
A(X, Y ) is equality. If A is poset-enriched, then Aop denotes A with the direction
of arrows reversed, ie, Aop (X, Y ) = A(Y, X), and Aco denotes A with the order
on A(X, Y ) reversed, ie, Aco (X, Y ) = A(X, Y )op . Any notion in A has a dual
notion in Aop and a co-notion in Aco , in particular:
• f ⊣ g in A ⇐⇒ g ⊣ f in Aco .
• x initial algebra for h in A ⇐⇒ x final co-algebra for h in Aco .
The following facts are instances of more general results valid in 2-categories.
Proposition 4.3. In any poset-enriched category A:
1. If f ⊣ g, then g is uniquely determined by f , and when g exists it is
denoted by f R , and called the right adjoint to f .
2. If f :X → Y is an isomorphism, then f ⊣ f −1 .
Definition 4.4. The poset-enriched category Po is defined as follows:
• Objects X:Po are complete lattices, ie,
such that every
F posets (|X|, ≤X ) F
subset S of |X| has a sup, denoted as S. In paricular, ∅ is the least
element ⊥X of X.
• Arrows f :Po(X, Y ) are monotonic maps f :|X| → |Y |, ie,
∀x0 , x1 :|X|.x0 ≤X x1 =⇒ f (x0 ) ≤Y f (x1 ) (sups are irrelevant).
• The poset-enrichment f ≤ g:Po(X, Y ) is given by the point-wise order.
Remark 4.5. Po is cartesian closed in the enriched sense, ie, it has a terminal
object and the following poset isomorphisms natural in Z:
• Po(Z, X × Y ) ∼
= Po(Z, X) × Po(Z, Y ), where X × Y is the cartesian
product of the complete lattices X and Y .
• Po(Z, Y X ) ∼
= Po(Z × X, Y ), where Y X is the complete lattice Po(X, Y ).
13
Moreover, f ⊣ g in Po exactly when f and g form a Galois connection, ie:
∀x:|X|.∀y:|Y |.x ≤X g(y) ⇐⇒ f (x) ≤Y y.
Restricting the objects of Po to complete lattices allows to characterize the
arrows f :Po(X, Y ) that have right adjoints, and implies that every h:Po(X, X)
has an initial algebra and a final co-algebra (the proofs of Thm 3.3 and 3.8 make
systematic use of the universal property of initial algebras).
Proposition 4.6. Given a map f :Po(X, Y ) the following are equivalent:
F
F
• f preserves all sups, ie, f ( S) = (f S) when S ⊆ |X|.
F
• f has a right adjoint f R , namely, f R (y) = {x|f (x) ≤Y y}.
For a HS on S, the complete lattices X of interest should have as underlying
set a subset of P(S), but there are two choices for ≤X : inclusion ⊆; and reverse
inclusion ⊇. When ≤X is an information order, the correct choice is reverse
inclusion, since a smaller over-approximation is more informative.
Definition 4.7. Given a topological space S, define:
△
• P(S) = (P(S), ≤), complete lattice of subsets of S ordered by reverse inF
T
△
clusion, ie, U ≤ V ⇐⇒ U ⊇ V . Thus, S = S.
△
• C(S) = (C(S), ≤), complete lattice of closed subsets of S ordered by ≤.
△
• H(S) = P(S2 ) × P(S2 ), complete lattice of all HS on S.
△
• Hc (S) = C(S2 ) × C(S2 ), complete lattice of all closed HS on S.
Given a complete lattice X and x:|X|, the complete lattice X ↑ x is the set
{x′ |x ≤X x′ } ordered by ≤X . When X is one of the complete lattices from
Def 4.7, instead of X ↑ x, we write x in place of S, eg, P(S) stands for P(S) ↑ S
when S:P(S), and H(H) stands for H(S) ↑ H when H:H(S).
Proposition 4.8. In Po one has the following isomorphisms:
Y
X
Y
X
i:I.P(Si ) ∼
i:I.Si ),
i:I.C(Si ) ∼
i:I.Si ),
= P(
= C(
∼ P(S′ ) and
with isomorphism maps (Ai |i:I) 7→ {(i, a)|i:I ∧ a:Ai }. Thus, H(S) =
′
′
2
2
Hc (S) ∼
= 2 × S × S.
= C(S ), where S is the topological space S + S ∼
Given C:C(S), equivalently, a closed subspace of S, (1) below is a commuting
diagram in Po of sup-preserving maps, and (2) is the commuting diagram of
right adjoints to the maps in (1), where g(U ) = U ∩ C, and f R (U ) = U .
C(C)
✻
⊂
g
C(S)
f ✲ P(C)
✻
(1)
⊂
C(C) ✛f R
∩
gR
g
∩
(2)
❄
C(S) ✛ f R
f ✲ P(S)
14
P(C)
gR
❄
P(S)
P
Proof. By definition of sum S =
i:I.Si of topological spaces, a subset A of
S is closed exactly when each Ai = {a|(i, a):A} is a closed subset of Si .
The set C(S) of closed subsets of a topological space S is closed wrt intersections computed in P(S), thus the inclusion f preserves sups. Since C is closed,
g(U ) = U ∩ C is closed when U is closed.
✷
Definition 4.9. Given a Banach space S, we define the following maps in Po:
1. t:Po(H(S), H(R × S)) is the construction on HS in Def 2.9.
2. T:Po(H(S) × P(S), P(S)) is given by T(H, S) = {s′ |s ✲ s′ }.
H
3. Rf :Po(H(S) × P(S), P(S)) is the reachability map in Def 3.1.
4. Rs:Po(H(S) × C(S), C(S)) is the safe reachability map in Def 3.6.
5. S:Po(H(S), P(S)) is given by S(F, G) = {s|∃s′ .s F s′ ∨ s G s′ ∨ s′ G s}.
We call T(H):Po(P(S), P(S)) transition map of H and S(H):P(S) its support.
The transition map of H corresponds to the transition relation and suffices for
defining the maps Rf (H) and Rs(H). The support of H does not include the
values in the image of F , because they represent velocities, instead of states.
Proposition 4.10. Given a Banach space S, the following hold:
1. t(H) = t(H), for every H:H(S).
2. If H:Hc (S) and T(H, C) ⊆ C:C(S), then T:Po(H(H) × P(C), P(C)),
Rf :Po(H(H) × P(C), P(C)), and Rs:Po(H(H) × C(C), C(C)).
3. S(H) = Rf (H, S(H)), for every H:H(S).
4. S(H) = S(H) ≤ S(H) ≤ S(H):P(S), for every H:H(S).
5. If H is compact (therefore, closed), then S(H) is compact (therefore, closed).
Proof. See Appendix A.
f ✲
X in Po such that g ◦ f = idY , one can
⊥
✛ g
identify Y with its image in X. Then, the right adjoint g maps every x:X to
its best approximation in Y , ie, ∀y:Y.y ≤ x ⇐⇒ y ≤ g(x). Clearly a smaller Y
means that the g(x) are less accurate. In static analysis it is customary to take
as Y a finite lattice, in order to get decidablility. In the case of safe reachability
we take Y = C(S) in place of X = P(S). Also in this case there is a reduction
in cardinality: when S is a Banach space with the cardinality of the continuum,
C(S) has the cardinality of the continuuum, while P(S) has a bigger cardinality.
Given an adjunction Y
Definition 4.11. Given X = (|X|, ≤X ):Po and a subset F ⊆ |X|, define:
• |X|(F ) the smallest subset of |X| containing F and closed wrt sups in X;
• X(F ) the poset |X|(F ) ordered by ≤X ;
△ F
• ✷F (x) = {y:F |y ≤X x}:X(F ) the best approximation of x:X.
15
It is quite easy to establish the following basic properties.
Proposition 4.12. X(F ) is a complete lattice. Moreover:
F ⊆ |X|(F ) = |X|(|X|(F )).
F is finite =⇒ |X|(F ) is finite.
F1 ⊆ F2 =⇒ |X|(F1 ) ⊆ |X|(F2 ) and |X|(F1 ) = |X(F2 )|(F1 ).
The inclusion f :X(F ) ⊂ ✲ X is sup-preserving and f R (x) = ✷F (x).
f ✲
5. Y
X and F image of f =⇒ F = |X|(F ) and ✷F (x) = f (g(x)).
⊥
✛ g
1.
2.
3.
4.
Example 4.13. When Z is the complete lattice Po(X, Y ), there are several
subsets F of |Z| satisfying F = |Z|(F ) which consist of monotonic maps that
preserve certain types of sups. For instance:
1. strict maps, which preserve the sup of the empty set, ie, f (⊥) = ⊥.
F
F
2. additive maps, which preserve all sups, ie, f ( S) = f (S) for S ⊆ |X|.
3. Scott D-continuous maps, which preserve sups of directed subsets,
ie, non-empty D ⊆ |X| satisfying ∀x, y:D.∃z:D.x, y ≤X z.
4. Scott ω-continuous maps, which preserve sups of ω-chains, ie, sequences (xn |n:ω) such that ∀n.xn ≤ xn+1 .
The following implications always hold:
strict ⇐=== additive ===⇒ D-continuous ===⇒ ω-continuous.
Requirements can be combined, eg, by defining the strict D-continuous maps.
Proposition 4.14. The best D-continuous approximation f ✷ of f satisfies
✷
✷ ✷
✷
✷
✷
the properties: idX = id✷
X and (g ◦ f ) = g ◦ f ≤ (g ◦ f ) .
Proof. Like any best approximation ✷F (−) on Po(X, Y ), −✷ is monotonic
and satisfies (f ✷ )✷ = f ✷ ≤ f . The D-continuous maps form a sub-category of
Po, ie, they include identities and are closed wrt composition, thus id✷
X = idX
and (g ✷ ◦ f ✷ )✷ = g ✷ ◦ f ✷. Finally g ✷ ◦ f ✷ ≤ (g ◦ f )✷ follows from monotonicity
of composition and −✷ .
✷
4.1. Best Approximations on Continuous Lattices
Thm 4.20 gives a simple way to compute f ✷ of f :Po(X, Y ) when X is
a continuous lattice. Moreover, all continuous lattices for which we want to
compute f ✷ have a countable base, which implies that D- and ω-continuous
maps over these lattices coincide.
Remark 4.15. [Eda95] advocates the use of Domain Theory for the study of
dynamical systems. In this context, the complete lattice C(S) becomes relevant
when S is a compact metric space. In fact, under this assumption, C(S) is a
16
continuous lattice with a countable base (see [Eda95, Prop 3.4]).4 Thus, one can
address computability issues, and the Scott topology coincides with the Upper
topology (see [Eda95, Prop 3.2 and 3.3]).
We recall some basic notions and facts on continuous lattices. For more
details, the reader is referred to [GHK+ 03, AJ94].
Definition 4.16. Given two complete lattices X and Y , define:
△
• the way-below
relation: x ≪X x′ ⇐⇒ for any directed D ⊆ |X|, if
F
′
x ≤X D, then ∃d:D.x ≤X d.
△
′
′
′
• the subset ↓
↓x = {x|x ≪X x } of elements way-below x .
△
The step map [x, y]:Po(X, Y ) is [x, y](x′ ) = if (x ≪X x′ ) then y else ⊥Y .
Proposition 4.17. For any complete lattices X and Y , the following hold:
1.
2.
3.
4.
x′0 ≤X x0 ≪X x1 ≤X x′1 =⇒ x′0 ≪X x′1 .
x0 ≪X x1 =⇒ x0 ≤X x1 .
x0 , x1 ≪X x =⇒ x0 ⊔ x1 ≪X x and ⊥ ≪X x.
↓
↓x is directed.
F
△
Definition 4.18. A complete lattice X is continuous ⇐⇒ ∀x:X.x = ↓↓x. A
F
△
subset B ⊆ |X| is a base for X ⇐⇒ ∀x:X. B∩↓
↓x is directed and x = (B∩↓↓x).
Proposition 4.19. Given a continuous lattice X and a complete lattice Y :
F
1. D ⊆ |X| is directed and x ≪X D =⇒ ∃d:D.x ≪X d.
2. The step map [x, y]:Po(X, Y ) is D-continuous.
3. if X has a countable base, then f :Po(X, Y ) is ω-continuous =⇒ f is Dcontinuous.
Proof.
1. [GHK+ 03, Thm I-1.9].
2. [AJ94, Prop 4.0.1] and {x′ |x ≪X x′ } Scott open when X is continuous,
by the previous point.
3. [AJ94, Prop 2.2.14].
✷
The following theorem says that f ✷ :Po(X, Y ) is the sup of step maps when X
is a continuous lattice, and more specifically, f ✷ (x) is the sup of {f (b)|b ≪X x}.
F
Theorem 4.20. If f :Po(X, Y ) and B is a base for X, then f ✷ = b:B [b, f (b)].
4 There are some minor differences between our work and that of [Eda95], namely,
in [Eda95], U X is a hyperspace on the set of non-empty compact subsets of X, while our
C(S) is a complete lattice on the closed subsets of S. However, for compact Hausdorff spaces,
the only difference is given by the empty subset.
17
△ F
Proof. As X is a continuous lattice, the maps [b, f (b)] and f ′ = b:B [b, f (b)]
are D-continuous. We prove that for any given D-continuous map g ≤ f , we
F
△
have g ≤ f ′ ≤ f . For x:X, the subset B(x) = B∩↓↓x is directed and x = B(x).
Therefore:
• ∀b:B(x).g(b) ≤Y f (b) ≤Y f (x), since g ≤ f and ∀b:B(x).b ≤X x.
F
• g(x) = b:B(x) g(b) by continuity of g.
F
• f ′ (x) = b:B(x) f (b) by definition of f ′ .
Thus, one concludes that g(x) ≤Y f ′ (x) ≤Y f (x).
✷
5. Robustness
The safe reachability maps introduced in Def 3.6 and 4.9 are of the form
A:Po(C(S1 ), C(S2 )), with S1 and S2 metric spaces. We say that such an A is
robust at C when small extensions to C cause small extensions to A(C).
Definition 5.1 (Robustness). Given two metric spaces (Si , di ), i ∈ {1, 2}, we
△
say that a map A:Po(C(S1 ), C(S2 )) is robust ⇐⇒
∀C:C(S1 ).∀ǫ > 0.∃δ > 0.A(Cδ ) ⊆ A(C)ǫ ,
△
where Sδ :C(Si ) is the closure of the open subset B(S, δ) = {y|∃x:S.di (x, y) < δ}.
For discrete systems, robustness is not an issue (when the metric space S1 is
discrete every monotonic map is robust), while robustness of safe reachability
RsH :Po(C(S), C(S)) for a HS H on S is very sensitive to the HS, and restricting
to purely continuous systems does not help either (see Example 5.9).
The main result of this section is that robustness and D-continuity coincide
when the Si are compact metric spaces. In this case, an analysis A becomes
robust when replaced by its best D-continuous approximation. Remarkable
instances of A, for which the main result applies, are safe reachability maps
Rs:Po(Hc (H0 ) × C(S0 ), C(S0 )), where H0 is a compact HS on S with support
S0 and Hc (H0 ) is the complete lattice of closed hybrid systems that refine H0 ,
ie, H ≥ H0 :Hc (S).
In order to relate different properties of monotonic maps in Po(X, Y ), it is
conceptually useful to move to the category Top of topological spaces, by considering suitable topologies on the underlying sets |X| and |Y |. For a complete
lattice X, one can define two topologies on |X|: Alexandrov topology OA (X),
and Scott topology OS (X) ⊆ OA (X). The partial order ≤X can be recovered
as the specialization order of the two topologies. Thus, topologies are more
informative than partial orders: the Alexandrov continuous maps, ie, the maps
in Top(OA (X), OA (Y )), are the monotonic maps from X to Y , while the Scott
continuous maps Top(OS (X), OS (Y )) are the D-continuous maps from X to Y .
Furthermore, for robustness one can identify a suitable topology on C(S).
18
Definition 5.2 (Topologies). When S is a topological space and S:P(S), let
△
↑ S = {C:C(S)|S ≤ C}. We define three topologies on C(S):
△
• U Alexandrov open ⇐⇒ U is upward closed, ie, C:U =⇒ ↑ C ⊆ U .
F
△
• U Scott open ⇐⇒ U is upward closed and ( D):U =⇒ ∃C:D.C:U ,
for any directed subset D of closed subsets.
△
• U open in the Upper topology ⇐⇒ C:U =⇒ ∃O:O(S).C: ↑ O ⊆ U .
Moreover, when (S, d) is a metric space, we define a fourth topology on C(S):
△
• U open in the Robust topology ⇐⇒ C:U =⇒ ∃δ > 0. ↑ B(C, δ) ⊆ U .
Lemma 5.3. In a metric space (S, d), the following implications hold:
1.
2.
3.
4.
U
U
U
U
Scott open =⇒
open for the Robust topology =⇒
open for the Upper topology =⇒
Alexandrov open.
Proof. We exploit the following facts, which are valid in any metric space:
(F1) B(B(S, δ), δ ′ ) ⊆ B(S, δ + δ ′ ).
(F2) S ⊆ S = ∩δ>0 B(S, δ).
△
(F3) B(S, δ) ⊆ Sδ = B(S, δ) ⊆ B(S, δ ′ ) whenever δ < δ ′ .
Now we prove the implications:
△
• (1) =⇒ (2). If U is Scott open and C:U , let On = B(C, 2−n ), we prove
that ↑ On ⊆ U for some n.
△
Let Cn = On . Then, Cn ⊇ On ⊇ Cn+1 , and C = C = (∩n Cn ):U . Thus,
Cn :U , for some n.
Since On ⊆ Cn :U and U is upward closed, then ↑ On ⊆ U .
• (2) =⇒ (3). If U is open in the Robust topology and C:U , by definition,
there exists a δ > 0 for which ↑ B(C, δ) ⊆ U . Then, B(C, δ) is the open
subset that witnesses that U is open in the Upper topology.
• (3) =⇒ (4). If U is open in the Upper topology, then U is the union of
upward closed subsets of the form ↑ O, therefore it is Alexandrov open. ✷
As anticipated, the Robust topology captures the robustness property:
Theorem 5.4. Given two metric spaces (Si , di ), and a map A:Set(C(S1 ), C(S2 )),
the following properties are equivalent:
1. A is monotonic and robust in the sense of Def 5.1.
19
2. A is continuous wrt the Robust topologies.
Proof. See Appendix A.
Lemma 5.5. We have the following inclusions among topologies on C(S):
1. The Upper topology is included in the Scott topology, when S is compact.
2. The Alexandrov topology is included in the Robust topology, when S is a
discrete metric space (eg, d(x, y) = 1 when x 6= y).
Proof. When S is a compact topological space, any closed subset of S is compact. To prove that the Upper topology is included in the Scott topology, it suffices to show that for any open subset O of S, the subset ↑ O of C(S) is Scott open.
Clearly ↑ O is upward closed. Now, let C be the complement of O. If {Ki |i:I}
is an I-indexed directed set of closed subsets such that K = (∩i:I Ki ) ⊆ O,
then Ki′ = Ki ∩ C is another I-indexed directed subset D′ of closed subsets
whose intersection is ∅. Since compact subsets (therefore, also the closed subsets) have the finite intersection property and D′ is directed, some Ki′ must be
∅, or equivalently, Ki : ↑ O.
If (S, d) is discrete, then S = S = B(S, 1), as all subsets are both open and
closed. Therefore, when U is Alexandrov open, ie, U is the union of all ↑ C with
C:U , it is also open in the Robust topology, because ↑ C =↑ B(C, 1).
✷
Remark 5.6. The Robust topology depends on the metric d, while the other
topologies on C(S) are definable for any topological space S. There are metric
spaces (S, d) where the four topologies on C(S) differ. For instance, in the
space S = {x|x > 0} of positive reals with the usual metric d(x, y) = |y − x|,
△
△
let xn = 2−n and δn = xn+1 . Then, C = {xn |n:ω} is a closed subset of S,
O = ∪n B(xn , δn ) is an open subset of S, and the following counter-examples
show that the four topologies differ:
• ↑ C is Alexandrov open, but it is not open in the other topologies.
• ↑ O is open in the Upper topology, but it is not open in the Robust
topology, because C: ↑ O but there is no δ > 0 such that B(C, δ) ⊆ O,
because (0, δ) ⊆ B(C, δ) but (0, δ) 6⊆ O.
• ↑ ∅ = {∅} is open in the Robust topology, because B(∅, δ) = ∅, but it is not
Scott open, because Cn = {x|x ≥ 2n } is an ω-chain of closed non-empty
subsets of S whose intersection is ∅.
In finite dimensional Banach spaces like Rn , the compact subsets are exactly
the closed subsets C that are bounded, ie, C ⊂ B(0, δ) for some δ > 0. On
the contrary, in infinite dimensional Banach spaces (under the strong topology)
they form a proper subset of the closed bounded ones. For instance, neither the
closure nor the boundary of a ball B(0, δ) is compact.
Theorem 5.7. Given a map A:Po(C(S1 ), C(S2 )), with S1 and S2 metric spaces:
20
1. If S1 and S2 are compact, then, A is robust ⇐⇒ A is Scott continuous.
2. If S1 and S2 are discrete, then, A is robust.
Proof. We use Lemma 5.3 and 5.5:
1. If Si is a compact metric space, the Upper and Scott topologies on C(Si )
coincide. The result follows as the Robust topology is between the two.
2. If Si is a discrete metric space, the Alexandrov and Robust topologies on
C(Si ) coincide. The result follows as every the monotonic map is Alexandrov continuous.
✷
Remark 5.8. Theorem 5.7 says that for discrete metric spaces robustness is
not an interesting notion, because every monotonic map A:Po(C(S1 ), C(S2 )) is
robust, and moreover C(Si ) = P(Si ). When the metric spaces are compact, there
is a best robust approximation of A given by A✷ . In all other cases robustness
is an interesting property, but there is no best way to approximate A with a
robust map, because the subset of robust maps is not closed wrt arbitrary sups
computed in Po(C(S1 ), C(S2 )).
Example 5.9. We give an example of a compact HS H with support C, whose
safe reachability map RsH :Po(C(C), C(C)) is not robust.
Let H be HE of Example 2.6—which can only flow—and let C = [0, M ].
Since C is compact, robustness is equivalent to Scott continuity. Consider the
ω-chain (In |n) with In = [0, M/2n ], whose sup is the singleton {0}. Then:
RsH ({0}) = {0}.
RsH (In ) = [0, M ],
Thus, RsH does not preserve the sup of the ω-chain (In |n). Consider its best
Scott continuous approximation Rs✷
H (see Thm 4.14), which is given by:
• Rs✷
H (∅) = ∅.
• Rs✷
H (U ) = [m, M ] with m = min(U ), when U 6= ∅ is compact.
Then, RsH ({0}) = {0} ⊂ [0, M ] = Rs✷
H ({0}).
6. Figures and Examples
We go through the hybrid systems introduced in Sec 2 and for each of them
we compare the sets computed by different analyses. More precisely, given a
HS H on S and a state s0 in the support S(H) of H, take as set of initial states
I = {s0 }, then define four subsets Sf ⊆ Ss ⊆ Sr ⊆ SR of S:
△
• Sf = Rf H (I) set of states reachable in finitely many transition.
△
• Ss = RsH (I) safe approximation of the set of states reachable in finite
time. One should use I in place of I, but a singleton is already closed.
21
M
M
m0
t
t
m0
0
0
(a) m0 > 0
(b) m0 = 0
Figure 1: Trajectories and reachable states of HE (Expand). In each case the set of states
reachable from I = {m0 } is on the left of the trajectory starting from m0 .
To define Sr one must restrict RsH to a map in Po(C(S0 ), C(S0 )), where
S0 is a sufficiently large compact subset of S. When H is compact, the
canonical choice for S0 is S(H).
△
• Sr = Rs✷
H (I) approximation of Ss robust wrt perturbations to I.
To define SR one must restrict Rs to a map in Po(Hc (H0 )×C(S0 ), C(S0 )),
where H0 is a sufficiently large compact HS on S and S0 = S(H0 ). There
is no canonical choice. H0 must capture the allowed perturbations to H,
thus H0 ≤ H in Hc (S), where H is the closure of H.
△
△
✷
(I) robust wrt perturbations
• SR = Rs✷ (H, I) approximation of Sr′ = RsH
to H & I allowed by H0 .
In Figures we adopt the following color coding for states and trajectories:
• a bullet
indicates the initial state s0
• blue - Sf and the part of a trajectory reachable in finitely many transitions
• green - Ss − Sf and the rest of a trajectory not reachable in finitely many
transitions, like Zeno points and beyond
• red - Sr − Ss , there is no analogue for a trajectory starting from s0 .
6.1. Expand
HE of Example 2.6 is a compact deterministic HS on R, whose behavior is
depicted in Fig 1. The canonical choice for S0 is the interval [0, M ]. For H0 we
take F0 = S0 × [−M, M ] and G0 = ∅, whose support is still S0 .
• Sf = Ss = Sr = SR = [m0 , M ] when 0 < m0 ≤ M
• Sf = Ss = [0] ⊂ [0, M ] = Sr = SR when 0 = m0 .
We now explain why making the set of reachable states robust wrt perturbations
to H does not make a difference in the case 0 < m0 ≤ M . To approximate SR
we take a small δ > 0 and define Iδ ≪ I in C(S0 ) and Hδ ≪ H in Hc (H0 ).
Let Iδ = [m0 − δ, M ] and Fδ = {(m, ṁ)|0 ≤ m ≤ M ∧ m − δ ≤ ṁ ≤ M }. By
taking 2 ∗ δ < m0 we can ensure that Fδ (m) ⊂ (0, M ] for any m:Iδ , therefore
SR = Rs✷ (H, I) ⊆ Rs(Hδ , Iδ ) = [m0 − δ, M ] → Sr when δ → 0.
22
6.2. Decay
HD of Example 2.7 is a deterministic HS on R, whose behavior is depicted
in Fig 2. Its closure is compact but it is no longer deterministic. The canonical
choice for S0 is the interval [0, M ]. For H0 we take F0 = S0 × [−M, M ] and
G0 = S0 × S0 , whose support is still S0 .
M
M
m0
t
t
m0
0
0
(a) m0 > 0
(b) m0 = 0
Figure 2: Trajectories and reachable states of HD (Decay). In each case the set of states
reachable from I = {m0 } is on the left of the trajectory starting from m0 .
• Sf = (0, m0 ] ⊂ [0, M ] = Ss = Sr = SR when 0 < m0 ≤ M
• Sf = Ss = Sr = SR = [0, M ] when 0 = m0 .
Ss = Sr = SR = S0 , because Ss = S0 and these subsets cannot be bigger than
the support of H0 . This result does not change, when H0 is replaced with a HS
with a bigger support, but the proof is not as simple (see Sec 6.1).
6.3. Bouncing Ball
HB of Example 2.8 is a deterministic HS on R2 , its behavior depends on
the coefficient of restitution b (see Fig 3). The closure of HB is not compact
and its support is the closed subset {(h, v)|0 ≥ h}. However, compactness is
irrelevant to define and compare Sf and Ss . Let s0 = (0, v0 ) with 0 < v0 < V
△
and S(u) = {(h, v)|0 ≥ h ∧ E(h, v) = E(0, u)} be the set of states whose energy
2
E(h, v) = h + v2 is exactly E(0, u), then the sets Sf and Ss are (see Fig 4):
S
1. Sf = Ss = n S(bn v0 ) when b < −1
2. Sf = S
Ss = S(v0 ) when b = −1 (elastic
bounce)
S
3. Sf = n S(bn v0 ) ⊂ Sf ∪ S(0) ∪ ( n S(bn V )) = Ss when −1 < b < 0
4. Sf = Ss = S(v0 ) ∪ S(0) ∪ S(V ) when b = 0 (inelastic bounce)
5. Sf = S(v0 ) ∪ S ′ (b, v0 ) ⊂ Sf ∪ S(0) ∪ S(V ) ∪ S ′ (b, V ) = Ss when 0 < b < 1,
△
with S ′ (b, u) = {(0, −bnu)|0 ≤ n} sequence of instantaneous slowdowns
6. Sf = Ss = S(v0 ) when b = 1
7. Sf = Ss = S(v0 ) ∪ S ′ (b, v0 ) when 1 < b, now S ′ (b, u) is a sequence of
instantaneous accelerations.
To make HB compact, the simplest is to put an upper bound to the energy of
the system, say E0 = E(0, V0 ) with V0 > V , and allow only b st |b| ≤ 1, so that
the energy cannot increase when the ball bounces. So we replace HB with the
following compact HS H, whose support is S0 = {(h, v)|0 ≤ h ∧ E(h, v) ≤ E0 }
23
h
0
h
t
0
0 2 4 6 8
v
h
t
0
0 2 4 6 8
t
0 2 4 6 8
v
−bv0
v0
V
v0
t
(a) b < −1
h
0
v
(b) b = −1
t
t
0
0 2 4 6 8
0
v
V
v0
t
h
V
t v0
(c) −1 < b < 0
2
4
v
V
v0
t
(d) b = 0
t
(e) 0 < b < 1
Figure 3: Trajectories of HB (Bouncing ball). All trajectories start from (h = 0, v = v0 ).
bV
h
h
−bV
−bv0
−bV
v
v0 V
v
−v0
v0
(a) b < −1
−V−v0
(b) −1 < b < 0
−bv0
h
−bV
−V−v0
v
v0 V
(c) 0 < b < 1
Figure 4: Set of reachable states of HB (Bouncing ball). The set I is always {(h = 0, v = v0 )}.
In case (a) there is an expanding sequence of parabolas (−b)n v0 → +∞. In case (b) there are
two shrinking sequences of parabolas (−b)n v0 → 0 and (−b)n V → 0.
• F = {((h, v), (ḣ, v̇))|(h, v):S0 ∧ ḣ = v ∧ v̇ = −1}
• G = {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ v + = b ∗ v} ⊎ {((0, 0), (0, V ))}.
To define SR we fix a compact HS H0 with support S0 . The simplest choice is
to take F0 = F and replace G with a G0 independent from b, namely
• G0 = {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ |v + | ≤ −v} ⊎ {((0, 0), (0, V ))}.
The relations among Ss , Sr and SR , when |b| ≤ 1 and 0 < v0 < V < V0 , are
S
1. Ss = Sr = S(v0 ) ⊂ {S(v)|v:[0, V ]} = SR when b = −1 (elastic bounce)
S
S
2. Sf = Sr = SR = n S(bn v0 ) ∪ S(0) ∪ ( n S(bn V )) when −1 < b < 0
3. Ss = Sr = SR = S(v0 ) ∪ S(0) ∪ S(V ) when b = 0 (inelastic bounce)
4. Ss = Sr = SR = S(v0 ) ∪ S ′ (b, v0 ) ∪ S(0) ∪ S(V ) ∪ S ′ (b, V ) when 0 < b < 1
5. Ss = Sr = S(v0 ) ⊂ S(v0 ) ∪ S(V ) ∪ {(0, v)| − v:[0, V ]} = SR when b = 1.
There is an informal explanation for SR in the case b = −1 (elastic bounce).
After each bounce the ball may lose a bit of energy, thus after sufficiently many
bounces it may stop (minimum energy). After a kick the energy will reach the
maximum value allowed, and then it may decrease again after each bounce.
Thus any level of energy in [0, E(0, V )] is reachable, assuming 0 < v0 < V .
24
More formally we define Hδ ≪ H in Hc (H0 ) st Hδ → H when δ → 0. Since H0
allows only perturbations in G, we define Gδ (for δ > 0) as
{((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ |v + | ≤ −v ∧ −v − δ ≤ v + } ⊎ {((0, 0), (0, V ))}
When −v is small, ie 0 ≤ −v ≤ δ ≤ V , |v + | ≤ −v and the energy is ≤
2
Otherwise, 0 < δ < −v, v + :[−v − δ, −v] and the energy loss is ≤ V δ − δ2 .
δ2
2 .
Remark 6.1. It is important what H0 is chosen to capture the hard constrains
on the HS H of interest, because it can affect how SR is computed. For instance,
for the bouncing ball one may replace H0 with a more relaxed H0′
• G′0 = {((0, v), (0, v + ))|0 ≤ −v ≤ V0 ∧ |v + | ≤ V0 } ⊎ {((0, 0), (0, V ))}
H0′ has the same support of H0 , but H0′ < H0 , because after a bounce the ball
can increase its energy as far as it stays below the upper bound E(0, V0 ). This
change results in a bigger subset SR when |b| = 1, namely
• S0 = SR when b = −1, ie any state in the support of H is reachable
because of the more permissive perturbations
• S(v0 ) ∪ S(V ) ∪ {(0, v)| − v:[0, V0 ]} = SR when b = 1.
Conclusions and Future Work
The main contributions of this paper concern reachability analysis in the
context of hybrid (and continuous) systems.
Firstly, we have proposed safe reachability RsH (I), which computes an overapproximation of the set of states reachable in finite time from the set I of
initial states by the hybrid system H, and compared it with the more naive
reachability Rf H (I), which computes only an under-approximation.
Secondly, and more importantly, we have addressed the issue of robustness
of an analysis A cast as a monotonic map A:Po(X, Y ) between complete lattices
X and Y of a particular form (ie, hyperspaces of metric spaces). Robustness of
A means that A(xδ ) → A(x) as δ → 0, where xδ is a small perturbation of x
depending on a δ > 0, which measures the level of inaccuracy. In some cases (ie,
when the metric spaces are compact) robustness amounts to Scott continuity,
and one can exploit the following facts:
• Every monotonic map A:Po(X, Y ) between complete lattices has a best
Scott continuous approximation A✷ ≤ A:Po(X, Y ).
• When X is a continuous lattice, A✷ (x) is the sup of {A(b)|b ≪X x}, ie, it
is computed by applying A to way-below approximations of x.
While the importance of safe/sound analyses is widely recognized, the issue of
robustness is mostly overlooked (one reason being that for discrete systems it is
not an issue). In our view, robustness has at least two immediate implications:
25
Modeling languages. There should be syntactic support to distinguish between hard and soft constraints on a hybrid system H. Hard constraints
must be satisfied also by small perturbations Hδ . Thus, they identify the
complete lattice (hyperspace) X where H is placed, while soft constraints
provide the additional information to identify H uniquely within X. The
distinction would be needed by tools that implement a robust analysis and
can be ignored by other tools. In [GKC13] there is no explicit annotation
for soft constraints, instead there is a re-interpretation of logical formula,
which injects δ-noise in specific sub-formulas.
Finite model checking. Counterexample-guided Abstraction & Refinement
(CEGAR) is a general way of analyzing a system H with an infinite state
space by leveraging finite model checking tools (see [CGJ+ 00, CFH+ 03]).
In the setting of abstract interpretation, CEGAR amounts to approximating an analysis A:Po(X, X) with finite analyses A′ :Po(Xf , Xf ), ie:
X
✻
A
γ
≤
∪
Xf
✲ X
✻
γ
γ sub-lattice inclusion
∪
A′
✲ Xf
Xf finite (complete) lattice
Whenever Xf is fixed, there is a best approximation Af :Po(Xf , Xf ) of A
△
given by Af = γ R ◦ A ◦ γ.
If H is a HS on S = Rn and its support is included in a compact subset K,
then there are three reachability analyses Rs✷
H ≤ RsH ≤ Rf H :Po(X, X),
where X = C(K) is a continuous lattice with a countable base, but uncountably many elements (unless K is finite). One may wonder whether
replacing X with a finite sub-lattice Xf would make the three analyses
indistinguishable: the answer is no (counterexamples can be given using
HE and HD in Examples 2.6 and 2.7).
However, there is a way to turn a finite approximation A′ :Po(Xf , Xf ) of
A:Po(X, X) into a finite approximation A′′ of A✷ , provided that X is a
△
continuous lattice, namely, A′′ (x) = A′ (xb ) where xb is the biggest element
in Xf such that γ(b) ≪X γ(x).
As future work we plan to address computability issues. More specifically,
given a compact HS H0 on S with support S0 , is Rs✷ :Po(Hc (H0 )×C(S0 ), C(S0 ))
computable? When S has a countable dense subset, all continuous lattices
involved have a countable base, and the question can be formulated in a wellestablished setting. In [EP07] the authors study computability of the evolution
map for a compact and continuous flow automaton (ccFA for short). In our
setting, a ccFA is a tuple (C, f, G, I), with C a compact subset of Rn called
invariant, f :Top(C, Rn ) the flow function, G:C(C × C) the jump relation, and
I:C(C) the set of initial states. The graph of f is flow relation f :C(C × V ), with
26
V = f (C). Therefore, (f, G) is a compact HS on Rn with support included in
the compact subset K = C ∪ V .
The main contributions in [EP07] are: the definition of the denotational
semantics [[(C, f, G, I)]]:Top(T, C(C)) ∼
= C(T × C) of a ccFA (C, f, G, I), which
is computable for effectively given ccFA (cf. [EP07, Thm 38]); and computational
adequacy, ie [[C, f, G, I]] = Ef (f,G) (I), for separated ccFA (cf. [EP07, Thm 25]).
Most of the steps in defining the denotational semantics of a ccFA use Scott
continuous maps, but for the lack of a continuous lattice/domain of ccFA. It
would be interesting to see if their denotational semantics extends to compact
HS, giving a Scott continuous computable map [[−]]:Po(Hc (H0 ) × C(S0 ), C(S0 )),
and then compare it with the map Rs✷ between the same lattices.
References
[ACH+ 95] Rajeev Alur, Costas Courcoubetis, Nicolas Halbwachs, Thomas A
Henzinger, P-H Ho, Xavier Nicollin, Alfredo Olivero, Joseph Sifakis,
and Sergio Yovine. The algorithmic analysis of hybrid systems. Theoretical computer science, 138(1):3–34, 1995.
[AJ94] S. Abramsky and A. Jung. Domain theory. In S. Abramsky, D. M.
Gabbay, and T. S. E. Maibaum, editors, Handbook of Logic in Computer Science, volume 3, pages 1–168. Clarendon Press, Oxford,
1994.
[CC92] Patrick Cousot and Radhia Cousot. Abstract interpretation frameworks. Journal of logic and computation, 2(4):511–547, 1992.
[CFH+ 03] Edmund Clarke, Ansgar Fehnker, Zhi Han, Bruce Krogh, Olaf Stursberg, and Michael Theobald. Verification of hybrid systems based
on counterexample-guided abstraction refinement. In TACAS, volume 3, pages 192–207. Springer, 2003.
[CGJ+ 00] Edmund Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, and Helmut Veith. Counterexample-guided abstraction refinement. In Computer aided verification, pages 154–169. Springer, 2000.
[Con90] John B. Conway. A Course in Functional Analysis. Springer, 2nd
edition edition, 1990.
[CR04] Pieter Jan Laurens Cuijpers and Michel Adriaan Reniers. Topological (bi-) simulation. Electronic Notes in Theoretical Computer
Science, 100:49–64, 2004.
[Cui07] Pieter J. L. Cuijpers. On bicontinuous bisimulation and the preservation of stability. In Alberto Bemporad, Antonio Bicchi, and Giorgio Buttazzo, editors, Hybrid Systems: Computation and Control,
volume 4416 of Lecture Notes in Computer Science, pages 676–679.
Springer, 2007.
27
[Dur16] Adam Duracz. Rigorous Simulation: Its Theory and Applications.
PhD thesis, Halmstad University Press, 2016.
[Eda95] Abbas Edalat. Dynamical systems, measures and fractals via domain
theory. Information and Computation, 120(1):32–48, July 1995.
[EP07] Abbas Edalat and Dirk Pattinson. Denotational semantics of hybrid automata. The Journal of Logic and Algebraic Programming,
73(1):3–21, 2007.
[Frä99] Martin Fränzle. Analysis of hybrid systems: An ounce of realism can
save an infinity of states. In Computer Science Logic, pages 126–139.
Springer, 1999.
[GHK+ 03] G. Gierz, K. H. Hofmann, K. Keimel, J. D. Lawson, M. W. Mislove,
and D. S. Scott. Continuous Lattices and Domains, volume 93 of
Encycloedia of Mathematics and its Applications. Cambridge University Press, 2003.
[GKC13] Sicun Gao, Soonho Kong, and Edmund M Clarke. Delta-complete
reachability analysis (part 1). Technical report, Carnegie-Mellon
Univ. School of Computer Science, 2013.
[GST09] Rafal Goebel, Ricardo G Sanfelice, and A Teel. Hybrid dynamical
systems. Control Systems, IEEE, 29(2):28–93, 2009.
[Kel75] John L Kelley. General topology. Springer, 1975.
[Kel82] Gregory Maxwell Kelly. Basic concepts of enriched category theory.
Number 64 in Lecture Notes in Mathematics. CUP Archive, 1982.
[Pla08] André Platzer. Differential dynamic logic for hybrid systems. Journal of Automated Reasoning, 41(2):143–189, 2008.
28
Appendix A. Proofs
Proof (of Thm 3.3). Ef (I) and Rf (I) are the least prefix-points of some
monotonic maps on complete lattices of the form (P(S), ⊆). Thus, we can exploit the universal property of the least prefix-point X for a monotonic map F ,
ie, F (Y ) ≤ Y =⇒ X ≤ Y .
1. Consider the monotonic maps F and FI on P(T × S):
△
F (S) = {(t + d, s′ )|∃s.(t, s):S ∧ s
✲ s′ },
d
△
FI (S) = ({0} × I) ∪ F (S).
Ef (I) is the least prefix-point of FI . Since FI0 (S) ⊆ FI1 (S) when I0 ⊆ I1 ,
a prefix-point for FI1 is also a prefix-point for FI0 . Hence, we conclude
that Ef (I0 ) ⊆ Ef (I1 ).
Since I ⊆ ∪K when I:K, then Ef (I) ⊆ Ef (∪K). Now, let U = {Ef (I)|I:K}.
To prove Ef (∪K) ⊆ ∪U , observe that:
• F preserves unions, thus F (∪U ) = ∪{F (S)|S:U };
• ∀S:U.F (S) ⊆ S, thus F (∪U ) = ∪U ;
• ∀I:K.∃S:U.{0} × I ⊆ S, thus {0} × (∪K) ⊆ ∪U .
Therefore, ∪U is a prefix-point for F∪K .
2. Consider the monotonic maps G and GI on P(S):
△
G(S) = {s′ |∃s:S.s
✲ s′ },
△
GI (S) = I ∪ G(S).
Rf (I) is the least prefix-point of GI . By analogy with the previous point,
one can prove that Rf is monotonic and preserves unions.
Let S be a prefix-point of GI , ie, GI (S) ⊆ S. Then:
• I ⊆ S, because I ⊆ GI (S).
• GS (S) ⊆ S, because G(S) ⊆ GI (S) and GS (S) = S ∪ G(S).
By taking S = Rf (I), we conclude I ⊆ Rf (I) ⊆ Rf (Rf (I)) ⊆ Rf (I).
To prove π(Ef (I)) = Rf (I), observe that:
• ∀E:P(T × S).π(FI (E)) = GI (π(E)). Hence, π(Ef (I)) ⊇ Rf (I).
• ∀S:P(S).GI (S) ⊆ S =⇒ FI (T × S) ⊆ T × S.
Therefore, Ef (I) ⊆ T × Rf (I), and consequently, π(Ef (I)) ⊆ Rf (I).
3. Consider the monotonic maps FI on P(T×S), GI on P(S), GtJ on P(R×S),
whose least prefix-points are Ef H (I), Rf H (I), and Rf t(H) (J), respectively.
✲ (t + d, s′ ) ⇐⇒ 0 ≤ d ∧ s d✲ s′ , by Prop 2.10, these
Since (t, s)
H
t(H)
maps are related as follows:
• ∀E:P(T × S).FI (E) = Gt{0}×I (E), so Ef H (I) = (Rf t(H) ({0} × I).
• ∀S:P(R × S).π(GtJ (S)) = Gπ(J) (π(S)), so π(Rf t(H) (J)) ⊇ Rf H (π(J)).
• ∀S:P(S).Gπ(J) (S) ⊆ S =⇒ GtJ (R × S) ⊆ R × S.
29
As a result, Rf t(H) (J) ⊆ R × Rf H (π(J)), and π(Rf t(H) (J)) ⊆ Rf H (π(J)).
✷
Proof (of Thm 3.8). Es(I) and Rs(I) are defined as least prefix-points of
monotonic maps on complete lattices of the form (C(S), ⊆), C(S) is closed wrt
arbitrary intersections and finite unions computed in P(S), and the monotonic
map S 7→ S from P(S) to C(S) preserves finite unions.
1. Es(I) is the least prefix-point of a monotonic map FI′ on C(T × S) given
by:
d
△
F ′ (S) = ({0} × I) ∪ {(t + d, s′ )|∃s.(t, s):S ∧ s ✲ s′ },
I
and the properties of Es are proved similar to those of Ef , except for the
need to restrict to finite unions.
2. Rs(I) is the least prefix-point of a monotonic map G′I on C(S) given by:
△
G′I (S) = I ∪ {s′ |∃s:S.s
✲ s′ },
and the properties of Rs are proved by analogy with those of Rf . In
particular, π(Es(I)) ⊆ Rs(I) follows from:
∀S:C(S).G′I (S) ⊆ S =⇒ FI′ (T × S) ⊆ T × S.
As a result, Es(I) ⊆ T × Rs(I), and consequently π(Es(I)) ⊆ Rs(I).
3. If I:P(S) and S:P(T × S), then I ⊆ I:C(S) and FI (S) ⊆ FI′ (S):C(T × S).
Hence, Ef (I) ⊆ Es(I):C(T × S), and consequently Ef (I) ⊆ Es(I).
The inclusion Rf (I) ⊆ Rs(I) follows from Ef (I) ⊆ Es(I), since:
• Rf (I) = π(Ef (I)), by Thm 3.3.
• π(Es(I)) ⊆ Rs(I), by the previous point.
4. Consider the monotonic maps FI′ on C(T × S), G′I on C(S), and GtJ on
C(R × S), whose least prefix-points are EsH (I), RsH (I) and Rst(H) (J),
✲ (t + d, s′ ) ⇐⇒ 0 ≤ d ∧ s d✲ s′ , by
respectively. Since (t, s)
t(H)
Prop 2.10, these maps are related as follows:
H
• ∀E:C(T × S).FI′ (E) = Gt{0}×I (E), so EsH (I) = (Rst(H) ({0} × I).
′
• ∀S:C(S).Gπ(J)
(S) ⊆ S =⇒ GtJ (R × S) ⊆ R × S.
Hence, Rst(H) (J) ⊆ R × RsH (π(J)), and π(Rst(H) (J)) ⊆ RsH (π(J)).
✷
Proof (of Thm 4.10). A Banach space is a metric space, and one can rely
on characterizations of topological notions or exploit properties that are specific
to metric spaces, eg, x:U ⇐⇒ x is the limit of a sequence (xn |n:ω) in U .
1. t(F, G) = (F ′ , G′ ), where F ′ = C1 ×F and G′ = C2 ×G with C1 = R×{1}
and C2 = {(t, t)|t:R}, modulo the isomorphism (R × S)2 ✛ R2 × S2 . C1
and C2 are closed subsets of R2 . Thus, F ′ = C1 × F and G′ = C2 × G, ie,
t(H) = t(H).
30
2. T(H, C) ⊆ C means that C ≤ T(H, C). Hence, C ≤ T(H, C) ≤ T(H′ , S ′ )
when H ≤ H′ and C ≤ S ′ , because T is monotonic.
For Rf and Rs one can proceed as above, by observing that T(H, C) ⊆ C
✲ ”, and therefore
means “C is closed wrt the transition relation
H
C ⊆ Rf (H, C) ⊆ Rs(H, C) ⊆ C, by the assumptions on C and by definition
of Rf (H, C) and Rs(H, C).
✲ :
3. We prove that S(H) is closed under the transition relation
✲ s′ , then s G s′ . Therefore, s′ :S(H) ⊆ S(H).
H
0
• If s
H
• If s
H
✲ s′ with d > 0, then there exists f :Top([0, d], S) such that
d
f (0, d) ⊆ S(H) and s′ = f (d). Hence, s′ :S(H), because f is continuous.
4. It should be clear that S(H) ≤ S(H), S(H) ≤ S(H):P(S), as the maps S
and f R (U ) = U are monotonic. To prove S(H) = S(H), it suffices to show
that S(H) ≤ S(H), since U = U .
• H = F + G = F + G. Therefore, s:S(H) ⇐⇒
∃x.(x:F ∧ s = π1 (x)) ∨ (x:G ∧ s = π1 (x)) ∨ (x:G ∧ s = π2 (x)).
• Assume wlog that x:F ∧ s = π1 (x), we have to show that s:S(H).
• x:F implies that there exists a sequence (xn |n:ω) in F with limit x.
• Let sn = π1 (xn ). Then (sn |n:ω) is a sequence in S(H) with limit s,
because π1 is continuous. Thus, s:S(H).
5. S(H) is the union π1 (F ) ∪ π1 (G) ∪ π2 (G), and projections πi :S × S ✲ S
are continuous maps. The image of a compact set along a continuous
map is always compact. Therefore, if H is compact—ie, F and G are
compact—then S(H) is compact, because it is the union of three compact
subsets. Moreover, in metric spaces compact subsets are always closed. ✷
Proof (of Thm 5.4). We exploit the facts (F1-F3) in the proof of Lemma 5.3.
(1) =⇒ (2). Given U2 ⊆ C(S2 ) open (for the Robust topology), we have to
△
prove that U1 = A−1 (U2 ) ⊆ C(S1 ) is open. U1 is upward closed, because U2 is
upward closed and A is monotonic. If C:U1 , ie, A(C):U2 , we have to find δ > 0
such that↑ B(C, δ) ⊆ U1 , ie, C ′ ⊆ B(C, δ) =⇒ A(C ′ ):U2 :
• A(C):U2 and U2 open imply that ↑ B(A(C), δ ′ ) ⊆ U2 for some δ ′ > 0.
• Now, let ǫ be in (0, δ ′ ). By (F3), we get A(C)ǫ ⊆ B(A(C), δ ′ ).
• By robustness of A, there exists δ > 0 such that A(Cδ ) ⊆ A(C)ǫ .
• By monotonicity of A, we have A(C ′ ) ⊆ B(A(C), δ ′ ), ie, A(C ′ ):U2 , when
C ′ ⊆ B(C, δ) ⊆ Cδ .
31
(2) =⇒ (1). The Robust topology on C(Si ) is between Scott and Alexandrov
topologies, which have the same specialization order, ie, reverse inclusion. Thus,
A is monotonic wrt the specialization orders, because it is continuous wrt the
Robust topologies.
△
For C:C(S1 ) and ǫ > 0, let U2 = {C ′ :C(S2 )|∃ǫ′ > 0.B(C ′ , ǫ′ ) ⊆ B(A(C), ǫ)}.
Clearly A(C):U2 ⊆↑ B(A(C), ǫ) ⊆↑ A(C)ǫ . We prove that U2 is open for the
Robust topology, ie, ∀C ′ :U2 .∃δ > 0. ↑ B(C ′ , δ) ⊆ U2 :
• C ′ :U2 implies B(C ′ , ǫ′ ) ⊆ B(A(C), ǫ) for some ǫ′ > 0.
• By (F1), B(B(C ′ , δ), δ) ⊆ B(C ′ , ǫ′ ), where δ = ǫ′ /2.
• Therefore, ↑ B(C ′ , δ) ⊆ U2 .
△
U1 = A−1 (U2 ) is open in the Robust topology, because U2 is open and A is
continuous. But C:U1 . Therefore, there exists δ ′ > 0 such that ↑ B(C, δ ′ ) ⊆ U1 .
If δ is in (0, δ ′ ), then (F3) implies that Cδ ⊆ B(C, δ ′ ). Hence, Cδ :U1 and
A(Cδ ):U2 ⊆↑ A(C)ǫ , which means that A(Cδ ) ⊆ A(C)ǫ .
✷
32
| 3cs.SY
|
Visual Interpretability for Deep Learning: a Survey
arXiv:1802.00614v2 [cs.CV] 7 Feb 2018
Quanshi Zhang and Song-Chun Zhu
University of California, Los Angeles
Abstract
This paper reviews recent studies in understanding
neural-network representations and learning neural
networks with interpretable/disentangled middlelayer representations. Although deep neural networks have exhibited superior performance in
various tasks, the interpretability is always the
Achilles’ heel of deep neural networks. At present,
deep neural networks obtain high discrimination
power at the cost of low interpretability of their
black-box representations. We believe that high
model interpretability may help people to break
several bottlenecks of deep learning, e.g. learning from very few annotations, learning via humancomputer communications at the semantic level,
and semantically debugging network representations. We focus on convolutional neural networks
(CNNs), and we revisit the visualization of CNN
representations, methods of diagnosing representations of pre-trained CNNs, approaches for disentangling pre-trained CNN representations, learning of CNNs with disentangled representations,
and middle-to-end learning based on model interpretability. Finally, we discuss prospective trends
in explainable artificial intelligence.
1
Introduction
Convolutional neural networks (CNNs) [LeCun et al., 1998a;
Krizhevsky et al., 2012; He et al., 2016; Huang et al., 2017]
have achieved superior performance in many visual tasks,
such as object classification and detection. However, the endto-end learning strategy makes CNN representations a black
box. Except for the final network output, it is difficult for people to understand the logic of CNN predictions hidden inside
the network. In recent years, a growing number of researchers
have realized that high model interpretability is of significant
value in both theory and practice and have developed models
with interpretable knowledge representations.
In this paper, we conduct a survey of current studies in understanding neural-network representations and learning neural networks with interpretable/disentangled representations.
We can roughly define the scope of the review into the following six research directions.
• Visualization of CNN representations in intermediate
network layers. These methods mainly synthesize the
image that maximizes the score of a given unit in a pretrained CNN or invert feature maps of a conv-layer back
to the input image. Please see Section 2 for detailed discussion.
• Diagnosis of CNN representations. Related studies may
either diagnose a CNN’s feature space for different object categories or discover potential representation flaws
in conv-layers. Please see Section 3 for details.
• Disentanglement of “the mixture of patterns” encoded
in each filter of CNNs. These studies mainly disentangle complex representations in conv-layers and transform network representations into interpretable graphs.
Please see Section 4 for details.
• Building explainable models. We discuss interpretable
CNNs [Zhang et al., 2017c], capsule networks [Sabour
et al., 2017], interpretable R-CNNs [Wu et al., 2017],
and the InfoGAN [Chen et al., 2016] in Section 5.
• Semantic-level middle-to-end learning via humancomputer interaction. A clear semantic disentanglement
of CNN representations may further enable “middle-toend” learning of neural networks with weak supervision.
Section 7 introduces methods to learn new models via
human-computer interactions [Zhang et al., 2017b] and
active question-answering with very limited human supervision [Zhang et al., 2017a].
Among all the above, the visualization of CNN representations is the most direct way to explore network representations. The network visualization also provides a technical
foundation for many approaches to diagnosing CNN representations. The disentanglement of feature representations of
a pre-trained CNN and the learning of explainable network
representations present bigger challenges to state-of-the-art
algorithms. Finally, explainable or disentangled network representations are also the starting point for weakly-supervised
middle-to-end learning.
Values of model interpretability: The clear semantics in
high conv-layers can help people trust a network’s prediction.
As discussed in [Zhang et al., 2018b], considering dataset
and representation bias, a high accuracy on testing images
still cannot ensure that a CNN will encode correct represen-
tations. For example, a CNN may use an unreliable context—
eye features—to identify the “lipstick” attribute of a face image. Therefore, people usually cannot fully trust a network
unless a CNN can semantically or visually explain its logic,
e.g. what patterns are used for prediction.
In addition, the middle-to-end learning or debugging of
neural networks based on the explainable or disentangled network representations may also significantly reduce the requirement for human annotation. Furthermore, based on semantic representations of networks, it is possible to merge
multiple CNNs into a universal network (i.e. a network encoding generic knowledge representations for different tasks)
at the semantic level in the future.
In the following sections, we review the above research directions and discuss the potential future of technical developments.
2
Visualization of CNN representations
Visualization of filters in a CNN is the most direct way of
exploring visual patterns hidden inside a neural unit. Different types of visualization methods have been developed for
network visualization.
First, gradient-based methods [Zeiler and Fergus, 2014;
Mahendran and Vedaldi, 2015; Simonyan et al., 2013; Springenberg et al., 2015] are the mainstream of network visualization. These methods mainly compute gradients of the score
of a given CNN unit w.r.t. the input image. They use the
gradients to estimate the image appearance that maximizes
the unit score. [Olah et al., 2017] has provided a toolbox of
existing techniques to visualize patterns encoded in different
conv-layers of a pre-trained CNN.
Second, the up-convolutional net [Dosovitskiy and Brox,
2016] is another typical technique to visualize CNN representations. The up-convolutional net inverts CNN feature maps
to images. We can regard up-convolutional nets as a tool that
indirectly illustrates the image appearance corresponding to a
feature map, although compared to gradient-based methods,
up-convolutional nets cannot mathematically ensure that the
visualization result exactly reflects actual representations in
the CNN. Similarly, [Nguyen et al., 2017] has further introduced an additional prior, which controls the semantic meaning of the synthesized image, to the adversarial generative
network. We can use CNN feature maps as the prior for visualization.
In addition, [Zhou et al., 2015] has proposed a method
to accurately compute the image-resolution receptive field of
neural activations in a feature map. The actual receptive field
of neural activation is smaller than the theoretical receptive
field computed using the filter size. The accurate estimation
of the receptive field helps people to understand the representation of a filter.
3
Diagnosis of CNN representations
Some methods go beyond the visualization of CNNs and diagnose CNN representations to obtain insight understanding
of features encoded in a CNN. We roughly divide all relevant
research into the following five directions.
Studies in the first direction analyze CNN features from a
global view. [Szegedy et al., 2014] has explored semantic
meanings of each filter. [Yosinski et al., 2014] has analyzed
the transferability of filter representations in intermediate
conv-layers. [Lu, 2015; Aubry and Russell, 2015] have computed feature distributions of different categories/attributes in
the feature space of a pre-trained CNN.
The second research direction extracts image regions that
directly contribute the network output for a label/attribute to
explain CNN representations of the label/attribute. This is
similar to the visualization of CNNs. Methods of [Fong and
Vedaldi, 2017; Selvaraju et al., 2017] have been proposed
to propagate gradients of feature maps w.r.t. the final loss
back to the image plane to estimate the image regions. The
LIME model proposed in [Ribeiro et al., 2016] extracts image regions that are highly sensitive to the network output.
Studies of [Zintgraf et al., 2017; Kindermans et al., 2017;
Kumar et al., 2017] have invented methods to visualize
areas in the input image that contribute the most to the
decision-making process of the CNN. [Wang et al., 2017;
Goyal et al., 2016] have tried to interpret the logic for visual question-answering encoded in neural networks. These
studies list important objects (or regions of interests) detected
from the images and crucial words in questions as the explanation of output answers.
The estimation of vulnerable points in the feature space of
a CNN is also a popular direction for diagnosing network representations. Approaches of [Su et al., 2017; Koh and Liang,
2017; Szegedy et al., 2014] have been developed to compute
adversarial samples for a CNN. I.e. these studies aim to estimate the minimum noisy perturbation of the input image
that can change the final prediction. In particular, influence
functions proposed in [Koh and Liang, 2017] can be used to
compute adversarial samples. The influence function can also
provide plausible ways to create training samples to attack the
learning of CNNs, fix the training set, and further debug representations of a CNN.
The fourth research direction is to refine network representations based on the analysis of network feature spaces. Given
a CNN pre-trained for object classification, [Lakkaraju et al.,
2017] has proposed a method to discover knowledge blind
spots (unknown patterns) of the CNN in a weakly-supervised
manner. This method grouped all sample points in the entire
feature space of a CNN into thousands of pseudo-categories.
It assumed that a well learned CNN would use the sub-space
of each pseudo-category to exclusively represent a subset of a
specific object class. In this way, this study randomly showed
object samples within each sub-space, and used the sample
purity in the sub-space to discover potential representation
flaws hidden in a pre-trained CNN. To distill representations
of a teacher network to a student network for sentiment analysis, [Hu et al., 2016] has proposed using logic rules of natural
languages (e.g. I-ORG cannot follow B-PER) to construct
a distillation loss to supervise the knowledge distillation of
neural networks, in order to obtain more meaningful network
representations.
Finally, [Zhang et al., 2018b] has presented a method to
discover potential, biased representations of a CNN. Fig. 1
shows biased representations of a CNN trained for the estima-
Ours
95.4 %
80.6 %
76.2 %
Purity of part semantics
Pattern of
Node 3
Pattern of
Node 4
Score of “wearing lipstick”
a filter
...
Peak of
a filter
Peak of
wearing
a filter
Feature maps
Original
+16.93
of a filter
Pasted
+19.77
Feature maps
Masked
+12.17
Feature maps
lipstick
Peak of
Figure 1:
Biased representations in a CNN [Zhang et al., 2018b].
a filter
Considering potential dataset bias, a high accuracy on testing images
cannot always ensure that a CNN learns correct representations. The
CNN may use unreliable co-appearing contexts to make predictions.
For example, people may manually modify mouth appearances of
two faces by masking mouth regions or pasting another mouth, but
such modifications do not significantly change prediction scores for
the lipstick attribute. This figure shows heat maps of inference patterns of the lipstick attribute, where patterns with red/blue colors are
positive/negative with the attribute score. The CNN mistakenly considers unrelated patterns as contexts to infer the lipstick.
tion of face attributes. When an attribute usually co-appears
with specific visual features in training images, then the CNN
may use such co-appearing features to represent the attribute.
When the used co-appearing features are not semantically related to the target attribute, these features can be considered
as biased representations.
Given a pre-trained CNN (e.g. a CNN that was trained to
estimate face attributes), [Zhang et al., 2018b] required people to annotate some ground-truth relationships between attributes, e.g. the lipstick attribute is positively related to the
heavy-makeup attribute, and is not related to the black hair
attribute. Then, the method mined inference patterns of each
attribute output from conv-layers, and used inference patterns
to compute actual attribute relationships encoded in the CNN.
Conflicts between the ground-truth and the mined attribute relationships indicated biased representations.
4
Disentangling CNN representations into
explanatory graphs & decision trees
4.1
Disentangling CNN representations into
explanatory graphs
Compared to the visualization and diagnosis of network representations in previous sections, disentangling CNN features
into human-interpretable graphical representations (namely
explanatory graphs) provides a more thorough explanation of
network representations. [Zhang et al., 2018a; Zhang et al.,
2016] have proposed disentangling features in conv-layers of
a pre-trained CNN and have used a graphical model to represent the semantic hierarchy hidden inside a CNN.
As shown in Fig. 2, each filter in a high conv-layer of a
CNN usually represents a mixture of patterns. For example, the filter may be activated by both the head and the tail
parts of an object. Thus, to provide a global view of how visual knowledge is organized in a pre-trained CNN, studies of
[Zhang et al., 2018a; Zhang et al., 2016] aim to answer the
following three questions.
• How many types of visual patterns are memorized by
each convolutional filter of the CNN (here, a visual pat-
of a filter
of a filter
Feature maps
of a filter
Figure 2: Feature maps of a filter obtained using different input images [Zhang et al., 2018a]. To visualize the feature map, the method
propagates receptive fields of activated units in the feature map back
to the image plane. In each sub-feature, the filter is activated by various part patterns in an image. This makes it difficult to understand
the semantic meaning of a filter.
Head
pattern
Neck
pattern
…
Peak of
Input
image
Feature maps Explanatory Parts corresponding to
of different
graph
each graph node
conv-layers
Figure 3: Explanatory graph [Zhang et al., 2018a]. An explanatory
graph represents the knowledge hierarchy hidden in conv-layers of
a CNN. Each filter in a pre-trained CNN may be activated by different object parts. [Zhang et al., 2018a] disentangles part patterns
from each filter in an unsupervised manner, thereby clarifying the
knowledge representation.
tern may describe a specific object part or a certain texture)?
• Which patterns are co-activated to describe an object
part?
• What is the spatial relationship between two co-activated
patterns?
As shown in Fig. 3, the explanatory graph explains the
knowledge semantic hidden inside the CNN. The explanatory graph disentangles the mixture of part patterns in each
filter’s feature map of a conv-layer, and uses each graph node
to represent a part.
• The explanatory graph has multiple layers. Each graph
layer corresponds to a specific conv-layer of a CNN.
• Each filter in a conv-layer may represent the appearance
of different object parts. The algorithm automatically
disentangles the mixture of part patterns encoded in a
single filter, and uses a node in the explanatory graph to
represent each part pattern.
• Each node in the explanatory graph consistently represents the same object part through different images. We
can use the node to localize the corresponding part on
Figure 4: Image patches corresponding to different nodes in the explanatory graph [Zhang et al., 2018a].
L=1
L=2
L=3
L=4
L=1
L=2
L=3
L=4
Figure 5: Heat maps of patterns [Zhang et al., 2018a]. A heat map visualizes the spatial distribution of the top 50% patterns in the L-th layer
of the explanatory graph with the highest inference scores.
the input image. To some extent, the node is robust to
shape deformation and pose variations.
• Each edge encodes the co-activation relationship and the
spatial relationship between two nodes in adjacent layers.
• We can regard an explanatory graph as a compression of
feature maps of conv-layers. A CNN has multiple convlayers. Each conv-layer may have hundreds of filters,
and each filter may produce a feature map with hundreds
of neural units. We can use tens of thousands of nodes
in the explanatory graph to represent information contained in all tens of millions of neural units in these feature maps, i.e. by which part patterns the feature maps
are activated, and where the part patterns are localized
in input images.
• Just like a dictionary, each input image can only trigger
a small subset of part patterns (nodes) in the explanatory graph. Each node describes a common part pattern
with high transferability, which is shared by hundreds or
thousands of training images.
Fig. 4 lists top-ranked image patches corresponding to different nodes in the explanatory graph. Fig. 5 visualizes the
spatial distribution of object parts inferred by the top 50%
nodes in the L-th layer of the explanatory graph with the highest inference scores. Fig. 6 shows object parts inferred by a
single node.
Application: multi-shot part localization
There are many potential applications based on the explanatory graph. For example, we can regard the explanatory graph
as a visual dictionary of a category and transfer graph nodes
to other applications, such as multi-shot part localization.
Given very few bounding boxes of an object part, [Zhang
et al., 2018a] has proposed retrieving hundreds of nodes that
are related to the part annotations from the explanatory graph,
and then use the retrieved nodes to localize object parts in previously unseen images. Because each node in the explanatory
graph encodes a part pattern shared by numerous training images, the retrieved nodes describe a general appearance of the
target part without being over-fitted to the limited annotations
of part bounding boxes. Given three annotations for each object part, the explanatory-graph-based method has exhibited
superior performance of part localization and has decreased
by about 1/3 localization errors w.r.t. the second-best baseline.
4.2
Disentangling CNN representations into
decision trees
[Zhang et al., 2018c] has further proposed a decision tree to
encode decision modes in fully-connected layers. The decision tree is not designed for classification. Instead, the decision tree is used to quantitatively explain the logic for each
CNN prediction. I.e. given an input image, we use the CNN
to make a prediction. The decision tree tells people which fil-
ResNet50
ResNet152
%
22.1 %
19.6 %
%
36.7 %
39.2 %
%
80.6 %
76.2 %
part semantics
Pattern of
Node 1
Pattern of
Node 2
Pattern of
Node 3
Pattern of
Node 4
maps graph [Zhang et al., 2018a]. The method of [Zhang et al., 2018a] successfully
Figure 6: Image regions inferred by each node in anFeature
explanatory
masked
disentangles object-part patterns from representations
every single filter.
of aof
filter
x
Masks
Feature maps
Input
image
of a filter
y=0.9
…
ReLU
Feature maps
Conv
A head filter
contribute 23.2%
A feet filter
contribute 7.2%
A torso filter
contribute 12.1%
...
Mode for
standing birds
Mode for longneck birds
x
ReLU
Feature maps
of a filter
Mode for
flying birds
...
Disentangled
representations
of a filter
Loss for filter 1
Loss for filter 2
Loss for filter 3
Traditional
Conv-layer
Most generic
rationales
(the target)
Interpretable
Conv-layer
Conv
Figure 8: Structures of an ordinary conv-layer and an interpretable
conv-layer [Zhang et al., 2017c]. Green and red lines indicate the
forward and backward propagations, respectively.
Most specific
rationales
Figure 7: Decision tree that explains a CNN prediction at the semantic level [Zhang et al., 2018c]. A CNN is learned for object classification with disentangled representations in the top conv-layer, where
each filter represents a specific object part. The decision tree encodes various decision modes hidden inside fully-connected layers
of the CNN in a coarse-to-fine manner. Given an input image, the
decision tree infers a parse tree (red lines) to quantitatively analyze
rationales for the CNN prediction, i.e. which object parts (or filters) are used for prediction and how much an object part (or filter)
contributes to the prediction.
ters in a conv-layer are used for the prediction and how much
they contribute to the prediction.
As shown in Fig. 7, the method mines potential decision
modes memorized in fully-connected layers. The decision
tree organizes these potential decision modes in a coarseto-fine manner. Furthermore, this study uses the method of
[Zhang et al., 2017c] to disentangle representations of filters
in the top conv-layers, i.e. making each filter represent a specific object part. In this way, people can use the decision tree
to explain rationales for each CNN prediction at the semantic
level, i.e. which object parts are used by the CNN to make
the prediction.
Figure 9: Templates [Zhang et al., 2017c]. Each template Tµi
matches to a feature map when the target part mainly triggers the
i-th unit in the feature map.
5
Learning neural networks with
interpretable/disentangled representations
Almost all methods mentioned in previous sections focus on
the understanding of a pre-trained network. In this section,
we review studies of learning disentangled representations
of neural networks, where representations in middle layers
are no longer a black box but have clear semantic meanings. Compared to the understanding of pre-trained networks,
learning networks with disentangled representations present
more challenges. Up to now, only a few studies have been
published in this direction.
Interpretable CNNs
Interpretable R-CNN
Ordinary CNNs
arXiv:1711.05226v1 [cs.CV] 14 Nov 2017
Tianfu Wu1,3 , Xilai Li1 , Xi Song, Wei Sun1 , Liang Dong2 and Bo Li4
Department of ECE1 and CS2 , and the Visual Narrative Cluster3 , North Carolina State University
YunOS BU, Alibaba Group4
Figure 10: Visualization of interpretable filters in the top conv-layer [Zhang et al., 2017c]. We used [Zhou et al., 2015] to estimate the
{tianfu
wu, field
xli47,
wsun12,
ldong6}@ncsu.edu,
{xsong.lhi,
boli.lhi}@gmail.com
image-resolution
receptive
of activations
in a feature
map to visualize a filter’s
semantics. An
interpretable CNN usually encodes head
patterns of animals in its top conv-layer for classification.
5.1
Abstract
Interpretable convolutional
neural networks
Parse tree
Parse tree
This
paperinpresents
a method
of learning
qualitatively
As
shown
Fig. 8, [Zhang
et al.,
2017c] has
developed a
method to modify
to obtain
interpretable
modelsaninordinary
object CNN
detection
usingdisentangled
popular
representations
in high ConvNet
conv-layers
by adding
a loss to
each
two-stage
region-based
detection
systems
(i.e.,
filter in[22,
the conv-layers.
loss isconsists
used to ofregularize
R-CNN)
61, 9, 26]. The
R-CNN
a regionthe
feature map towards the representation of a specific object
proposal network and a RoI (Region-of-Interest) predicpart.
tion network.By interpretable models, we focus on weaklyNote that
people do
not need
to annotate
anyisobject
parts
supervised
extractive
rationale
generation,
that
learning
or textures to supervise the learning of interpretable CNNs.
to Instead,
unfold latent
discriminative part configurations of obthe loss automatically assigns an object part to each
ject
instances
automatically
simultaneously
in shown
detec- in
filter during the end-to-end and
learning
process. As
tion
without
anydesigns
supervision
part configurations.
Fig.
9, thisusing
method
some for
templates.
Each template
WeTutilize
top-down
andofcompositional
withhierarchical
the same size
feature map. gramTµi deµi is aamatrix
scribes
theembedded
ideal distribution
of activations
for the feature
map
mar
model
in a directed
acyclic AND-OR
Graph
whento
theexplore
target part
the i-th
unit inpart
the feature
(AOG)
andmainly
unfoldtriggers
the space
of latent
conmap.
figurations
of RoIs. We propose an AOGParsing operathe joint
fitting a feature
temtor toGiven
substitute
theprobability
RoIPoolingofoperator
widelymap
usedtoina Rplate,sothe
of a filter
is formulated
as thetomutual
CNN,
theloss
proposed
method
is applicable
manyinformastatetion between
the based
featuredetection
map andsystems.
the templates.
This loss
of-the-art
ConvNet
The AOGParsencourages a low entropy of inter-category activations. I.e.
ing operator aims to harness both the explainable rigor of
each filter in the conv-layer is assigned to a certain category.
top-down
hierarchical
and compositional
grammar
models
If the input
image belongs
to the target category,
then
the loss
and
the discriminative
power
of bottom-up
neural
netexpects
the filter’s feature
map
to match a deep
template
well;
othworks
through
end-to-end
In detection,
a bound-the
erwise,
the filter
needs to training.
remain inactivated.
In addition,
ingloss
boxalso
is interpreted
theentropy
best parse
tree derived
from of
encourages abylow
of spatial
distributions
I.e. when
the input
image
belongsratiothe tartheneural
AOG activations.
on-the-fly, which
is treated
as the
extractive
getgenerated
category, the
map isdetection.
supposed to
fit a
nale
for feature
interpreting
In exclusively
learning, we
single
template.
In
other
words,
the
filter
needs
to
activate
propose a folding-unfolding method to train the AOG and a
single location on the feature map.
ConvNet
end-to-end. In experiments, we build on top of the
This[9]
study
if a filter
repetitively
varR-FCN
andassumes
test thethat
proposed
method
on theactivates
PASCAL
ious
feature-map
regions,
then
this
filter
is
more
likely
to
VOC 2007 and 2012 datasets with performance compara-describe low-level textures (e.g. colors and edges), instead of
ble to state-of-the-art methods.
high-level parts. For example, the left eye and the right eye
may be represented by different filters, because contexts of
the two eyes are symmetric, but not the same.
1. Introduction
Fig.10 shows feature maps produced by different filters of
an interpretable CNN. Each filter consistently represents the
1.1.
Motivation
Objective
same
object part and
through
various images.
Recently, dramatic success has been made through big
data driven deep neural networks [45, 40] which advance
prediction accuracy significantly, and even outperform humans in image classification tasks [27, 69]. In the lit1
Configuration
Configuration
An end user:
Why do youexamples
predict thatof
thethe
twoproposed
bounding boxes
contain
[Wuperson
Figure
11: Detection
method
et al.,
and bicycle
]. In respectively?
2017
addition to predicted bounding boxes, the method also
outputs
the latent parse tree and part configurations as the qualitaMachine.: Not only are the detection scores highest among all categories I have
tively
rationale
in detection.
The parse
are inferred
seen in extractive
training across
all candidate
bounding boxes
I havetrees
compared
in
on-the-fly
in
the
space
of
latent
structures,
which
follow
a top-down
inference, but also the parse trees are consistent with the unified model
learned.
compositional grammar of an AOG.
Figure 1. Top: Detection examples by the proposed method tested
in the PASCAL VOC 2007 test dataset. In addition to predicted
5.2 Interpretable
R-CNN
bounding
boxes and detection
scores, our method also outputs the
latent
parse
trees
andthe
partlearning
configurations
as qual[Wu discriminative
]
et al., 2017 has proposed
of qualitatively
itatively
extractive
rationale
detection,
whichbased
are computed
interpretable
models
for in
object
detection
on the in
RaCNN.
weakly-supervised
way,isthat
only object
boxes areof
The objective
to isunfold
latentbounding
configurations
available
in training.
The parseduring
trees arethe
inferred
on-the-fly in prothe
object parts
automatically
object-detection
space
of
latent
full
structures
represented
by
a
top-down
hierarcess. This method is learned without using any part anchical
and compositional
grammar
model.
imagined
[Wu
notations
for supervision.
et al.,Bottom:
2017]An
uses
a topconversation
between and
the algorithm
and an grammar,
end user who
was trydown hierarchical
compositional
namely
an
ing
to understand
the prediction
results.
Seeconfigurations
text for details. of
(Best
And-Or
graph (AOG),
to model
latent
obviewed
in color
andmethod
magnification)
ject parts.
This
uses an AOG-based parsing opera-
tor to substitute for the RoI-Pooling operator used in the RCNN. The AOG-based parsing harnesses explainable compositional structures of objects and maintains the discrimination
erature
of aobject
detection,
there
has been
a critical
shift
power of
R-CNN.
This idea
is related
to the
disentanglefrom
representation
and models
such ascomthe
mentmore
of theexplicit
local, bottom-up,
and top-down
information
mixture
part-based
models
(DPMs)
[18]
ponents of
for deformable
prediction [Wu
et al., 2007;
Yang
et al., 2009;
Wu its
andmany
Zhu, variants,
2011]. and hierarchical and compositional
and
During graphs
the detection
process,
a bounding
interpreted
AND-OR
(AOGs)
models
[66, 82, box
73, is
74],
to less
as the best parse
tree derived
from the AOG
on-the-fly.
transparent
but much
more accurate
ConvNet
based Duraping the learning
a folding-unfolding
method
used
proaches
[61, 9, process,
60, 50, 26,
10]. Meanwhile,
it hasisbeen
shown that deep neural networks can be easily fooled by
so-called adversarial attacks which utilize visually imperceptible, carefully-crafted perturbations to cause networks
to misclassify inputs in arbitrarily chosen ways [57, 2], even
to train the AOG and R-CNN in an end-to-end manner.
Fig. 11 illustrates an example of object detection. The proposed method detects object bounding boxes. The method
also determines the latent parse tree and part configurations
of objects as the qualitatively extractive rationale in detection.
5.3
Capsule networks
[Sabour et al., 2017] has designed novel neural units, namely
capsules, in order to substitute for traditional neural units to
construct a capsule network. Each capsule outputs an activity vector instead of a scalar. The length of the activity vector represents the activation strength of the capsule, and the
orientation of the activity vector encodes instantiation parameters. Active capsules in the lower layer send messages to
capsules in the adjacent higher layer. This method uses an
iterative routing-by-agreement mechanism to assign higher
weights with the low-layer capsules whose outputs better fit
the instantiation parameters of the high-layer capsule.
Experiments showed that when people trained capsule networks using the MNIST dataset [LeCun et al., 1998b], a capsule encoded a specific semantic concept. Different dimensions of the activity vector of a capsule controlled different
features, including 1) scale and thickness, 2) localized part,
3) stroke thickness, 3) localized skew, and 4) width and translation.
5.4
Information maximizing generative
adversarial nets
The information maximizing generative adversarial net [Chen
et al., 2016], namely InfoGAN, is an extension of the generative adversarial network. The InfoGAN maximizes the
mutual information between certain dimensions of the latent
representation and the image observation. The InfoGAN separates input variables of the generator into two types, i.e. the
incompressible noise z and the latent code c. This study aims
to learn the latent code c to encode certain semantic concepts
in an unsupervised manner.
The InfoGAN has been trained using the MNIST
dataset [LeCun et al., 1998b], the CelebA dataset [Liu et al.,
2015], the SVHN dataset [Netzer et al., 2011], the 3D face
dataset [Paysan et al., 2009], and the 3D chair dataset [Aubry
et al., 2014]. Experiments have shown that the latent code
has successfully encoded the digit type, the rotation, and the
width of digits in the MNIST dataset, the lighting condition
and the plate context in the SVHN dataset, the azimuth, the
existence of glasses, the hairstyle, and the emotion in the
CelebA dataset, and the width and 3D rotation in the 3D face
and chair datasets.
6
Evaluation metrics for network
interpretability
Evaluation metrics for model interpretability are crucial for
the development of explainable models. This is because unlike traditional well-defined visual applications (e.g. object
detection and segmentation), network interpretability is more
difficult to define and evaluate. The evaluation metric of network interpretability can help people define the concept of
network interpretability and guide the development of learning interpretable network representations. Up to now, only
very few studies have discussed the evaluation of network
interpretability. Proposing a promising evaluation metric is
still a big challenge to state-of-the-art algorithms. In this section, we simply introduce two latest evaluation metrics for
the interpretability of CNN filters, i.e. the filter interpretability proposed by [Bau et al., 2017] and the location instability
proposed by [Zhang et al., 2018a].
6.1
Filter interpretability
[Bau et al., 2017] has defined six types of semantics for CNN
filters, i.e. objects, parts, scenes, textures, materials, and colors. The evaluation of filter interpretability requires people
to annotate these six types of semantics on testing images at
the pixel level. The evaluation metric measures the fitness
between the image-resolution receptive field of a filter’s neural activations1 and the pixel-level semantic annotations on
the image. For example, if the receptive field of a filter’s
neural activations usually highly overlaps with ground-truth
image regions of a specific semantic concept through different images, then we can consider that the filter represents this
semantic concept.
For each filter f , this method computes its feature maps
X = {x = f (I)|I ∈ I} on different testing images. Then, the
distribution of activation scores in all positions of all feature
maps is computed. [Bau et al., 2017] set an activation threshold Tf such that p(xij > Tf ) = 0.005, to select top activations
from all spatial locations [i, j] of all feature maps x ∈ X as
valid map regions corresponding to f ’s semantics. Then, the
method scales up low-resolution valid map regions to the image resolution, thereby obtaining the receptive field of valid
activations on each image. We use SfI to denote the receptive
field of f ’s valid activations w.r.t. the image I.
The compatibility between a filter f and a specific semantic concept is reported as an intersection-over-union score
I
IoUf,k
=
I
I
kSf
∩Sk
k
I ∪S I k
kSf
k
, where SkI denotes the ground-truth mask
of the k-th semantic concept on the image I. Given an image
I
I, filter f is associated with the k-th concept if IoUf,k
> 0.04.
The probability of the k-th concept being associated with the
I
filter f is given as Pf,k = meanI:with k-th concept 1(IoUf,k
> 0.04).
Thus, we can use Pf,k to evaluate the filter interpretability of
f.
6.2
Location instability
Another evaluation metric is location instability. This metric is proposed by [Zhang et al., 2018a] to evaluate the fitness between a CNN filter and the representation of an object
part. Given an input image I, the CNN computes a feature
map x ∈ RN ×N of filter f . We can regard the unit xi,j
(1 ≤ i, j ≤ N ) with the highest activation as the location
inference of f , where N × N is referred to as the size of the
feature map. We use p̂ to denote the image position that corresponds to the inferred feature map location (i, j), i.e. the
1
The method propagates the receptive field of each activated
unit in a filter’s feature map back to the image plane as the imageresolution receptive field of a filter.
ࢊࢎࢋࢇࢊ
ࡵ
ࢊ࢚ࢇ
ࡵ
ࢊࢎࢋࢇࢊ
ࡵ
Inferred
position
ࢊ࢚ࢇ
ࡵ
Annotated
landmark
Figure 12: Notation for the computation of a filter’s location instability [Zhang et al., 2018a].
7.1
Active question-answering for learning
And-Or graphs
Based on the semantic And-Or representation proposed in
[Zhang et al., 2016], [Zhang et al., 2017a] has developed a
method to use active question-answering to semanticize neural patterns in conv-layers of a pre-trained CNN and build a
model for hierarchical object understanding.
Deformation
range
Vunt
Input
image
Conv-layer
Heatmap of the
selected CNN
units in all
conv-layers
Conv-layer
sub-part
Conv-layer
Image
reconstructed
context
using CNN
responses
Figure 13: And-Or graph grown on a pre-trained CNN as a semantic
branch [Zhang et al., 2017a]. The AOG associates specific CNN
units with certain image regions. The red lines indicate the parse
graph.
Layer 4 (terminals)
Layer 3 (OR)
Deformation range
for a latent pattern
CNN units
latent patterns
As shown in Fig. 13, the CNN is pre-trained for object
classification. The method aims to extract a four-layer interpretable And-Or graph (AOG) to explain the semantic hierarchy hidden in a CNN. The AOG encodes four-layer semantics, ranging across the semantic part (OR node), part
templates
(AND nodes), latentConv-layer
patterns (OR nodes),
and neuConv-layer
Conv-layer
ral units (terminal nodes) on feature maps. In the AOG,
AND nodes represent compositional regions of a part, and
OR nodes encode a list of alternative template/deformation
candidates for a local part. The top part node (OR node) uses
its children to represent some template candidates for the part.
Each part template (AND node) in the second layer uses children latent patterns to represent its constituent regions. Each
latent pattern in the third layer (OR node) naturally corresponds to a certain range of units within the feature map of
a filter. The latent pattern selects a unit within this range to
account for its geometric deformation.
To learn an AOG, [Zhang et al., 2017a] allows the computer to actively identify and ask about objects, whose neural
patterns cannot be explained by the current AOG. As shown
in Fig. 14, in each step of the active question-answering, the
current AOG is used to localize object parts among all the
unannotated images. The method actively selects objects that
cannot well fit the AOG, namely unexplained objects. The
method predicts the potential gain of asking about each unexplained object, and thus determines the best sequence of
questions (e.g. asking about template types and bounding
boxes of unexplained object parts). In this way, the method
uses the answers to either refine an existing part template or
mine latent patterns for new object-part templates, to grow
AOG branches. Fig. 15 compares the part-localization performance of different methods. The QA-based learning exhibits
significantly higher efficiency than other baselines. The proposed method uses about 1/6–1/3 of the part annotations for
training, but achieves similar or better part-localization per-
Layer 2 (
appearance c
FC
Based on studies discussed in Sections 4 and 5, people may
either disentangle representations of a pre-trained CNN or
learn a new network with interpretable, disentangled representations. Such interpretable/disentangled network representations can further enable middle-to-end model learning at the semantic level without strong supervision. We
briefly review two typical studies [Zhang et al., 2017a;
Zhang et al., 2017b] of middle-to-end learning as follows.
Terminals
FC
Network interpretability for middle-to-end
learning
Vlat
FC
7
(OR) latent
patterns
output
√
part and the k-th landmark pk on image I. w2 + h2 denotes
the diagonal length of the input image. Thus, Df,k =
p
varI [dI (pk , p̂)] is reported as the relative location deviation
image
of filter f w.r.t. the k-th landmark, where varI [dInput
I (p
k , p̂)] is
referred to as the variation of the distance dI (pk , p̂). Because
each landmark cannot appear in all testing images, for each
filter f , the metric only uses inference results with the topM highest activation scores on images containing the k-th
landmark to compute Df,k . In this way, the average of relative location deviations of all the filters in a conv-layer w.r.t.
all landmarks, i.e. meanf meanK
k=1 Df,k , measures the location
instability of a CNN, where K denotes the number of landmarks.
Vtmp
(AND) part
template
FC
center of the unit xi,j ’s receptive field when we backward
propagated the receptive field to the image plane. The evaluation assumes that if f consistently represented the same
object part (the object part may not have an explicit name
according to people’s cognition) through different objects,
then distances between the image position p̂ and some object
landmarks should not change much among different objects.
For example, if filter f represents the shoulder, then the distance between the shoulder and the head should remain stable
through different objects.
Therefore, people can compute the deviation of the distance between the inferred position p̂ and a specific groundtruth landmark among different images. The average deviation w.r.t. various landmarks can be used to evaluate the location instability of f . As shown in Fig. 12, let dI (pk , p̂) =
kpk −p̂k
√
denote the normalized distance between the inferred
2
2
w +h
Vsem
(OR) semantic part
ࢊࢎࢋࢇࢊ
ࡵ
ࢊ࢈ࢇࢉ
ࡵ
Visualization
ࢊ࢈ࢇࢉ
ࡵ
0.12
0.1
Patterns in the
original AOG
0.04
0.02
0
Different object samples
0
50
100
150
Part localization
Appearance type
A1
Correct
Correct
A2
Incorrect
Correct
A3
Incorrect
Incorrect
A4
Incorrect
New appearance
A5
Do not contain
‐‐‐
Q: Is it a correct localization of the head ? Is it a
flipped head belonging to part template 1?
Annotations of
existing part
templates
0.06
KL (I )
0.08
Part
template 1
Part
template 2
200
Patterns in convlayers 8-10 after
interactions
Part
annotation
1) Part template 4
2) Flipped pose
Part
template 3
Part
template 4
Figure 14: Illustration of the QA process [Zhang et al., 2017a]. (top)
The method sorts and selects unexplained objects. (bottom) Questions for each target object.
Normalized distance
Interactive‐DPM
PL‐DPM‐Part
SS‐DPM‐Part
fc7+linearSVM
fc7+RBF‐SVM
CNN‐PDD
CNN‐PDD‐ft
Fast‐RCNN (2 fts)
Fast‐RCNN (1 ft)
AoG w/o QA
Ours+fastRCNN
Part annotation number
Figure 15: Part localization performance on the Pascal VOC Part
dataset [Zhang et al., 2017a].
formance than fast-RCNN methods.
7.2
Patterns in convlayers 5-7 after
interactions
Interactive manipulations of CNN patterns
Let a CNN be pre-trained using annotations of object bounding boxes for object classification. [Zhang et al., 2017b] has
explored an interactive method to diagnose knowledge representations of a CNN, in order to transfer CNN patterns to
model object parts. Unlike traditional end-to-end learning of
CNNs that requires numerous training samples, this method
mines object part patterns from the CNN in the scenario of
one/multi-shot learning.
More specifically, the method uses part annotations on very
few (e.g. three) object images for supervision. Given a
bounding-box annotation of a part, the proposed method first
uses [Zhang et al., 2016] to mine latent patterns, which are related to the annotated part, from conv-layers of the CNN. An
AOG is used to organize all mined patterns as the representation of the target part. The method visualizes the mined latent
patterns and asks people to remove latent patterns unrelated
to the target part interactively. In this way, people can simply
prune incorrect latent patterns from AOG branches to refine
the AOG. Fig. 16 visualizes initially mined patterns and the
remaining patterns after human interaction. With the guidance of human interactions, [Zhang et al., 2017b] has exhibited superior performance of part localization.
Figure 16: Visualization of patterns for the head part before and after
human interactions [Zhang et al., 2017b].
8
Prospective trends and conclusions
In this paper, we have reviewed several research directions
within the scope of network interpretability. Visualization of
a neural unit’s patterns was the starting point of understanding network representations in the early years. Then, people gradually developed methods to analyze feature spaces of
neural networks and diagnose potential representation flaws
hidden inside neural networks. At present, disentangling
chaotic representations of conv-layers into graphical models
and/or symbolic logic has become an emerging research direction to open the black-box of neural networks. The approach for transforming a pre-trained CNN into an explanatory graph has been proposed and has exhibited significant efficiency in knowledge transfer and weakly-supervised learning.
End-to-end learning interpretable neural networks, whose
intermediate layers encode comprehensible patterns, is also a
prospective trend. Interpretable CNNs have been developed,
where each filter in high conv-layers represents a specific object part.
Furthermore, based on interpretable representations of
CNN patterns, semantic-level middle-to-end learning has
been proposed to speed up the learning process. Compared
to traditional end-to-end learning, middle-to-end learning allows human interactions to guide the learning process and can
be applied with very few annotations for supervision.
In the future, we believe the middle-to-end learning will
continuously be a fundamental research direction. In addition, based on the semantic hierarchy of an interpretable network, debugging CNN representations at the semantic level
will create new visual applications.
Acknowledgement
This work is supported by ONR MURI project N00014-16-12007 and DARPA XAI Award N66001-17-2-4029, and NSF
IIS 1423305.
References
[Aubry and Russell, 2015] Mathieu Aubry and Bryan C.
Russell. Understanding deep features with computergenerated imagery. In ICCV, 2015.
[Aubry et al., 2014] M. Aubry, D. Maturana, A. Efros,
B. Russell, and J. Sivic. Seeing 3d chairs: Exemplar part-
based 2d-3d alignment using a large dataset of cad models.
In CVPR, 2014.
[Bau et al., 2017] David Bau, Bolei Zhou, Aditya Khosla,
Aude Oliva, and Antonio Torralba. Network dissection:
Quantifying interpretability of deep visual representations.
In CVPR, 2017.
[Chen et al., 2016] Xi Chen, Yan Duan, Rein Houthooft,
John Schulman, Ilya Sutskever, and Pieter Abbeel. Infogan: Interpretable representation learning by information
maximizing generative adversarial nets. In NIPS, 2016.
[Dosovitskiy and Brox, 2016] Alexey Dosovitskiy and
Thomas Brox. Inverting visual representations with
convolutional networks. In CVPR, 2016.
[Fong and Vedaldi, 2017] Ruth C. Fong and Andrea Vedaldi.
Interpretable explanations of black boxes by meaningful
perturbation. In ICCV, 2017.
[Goyal et al., 2016] Yash Goyal, Akrit Mohapatra, Devi
Parikh, and Dhruv Batra. Towards transparent ai systems: Interpreting visual question answering models. In
arXiv:1608.08974, 2016.
[He et al., 2016] Kaiming He, Xiangyu Zhang, Shaoqing
Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, 2016.
[Hu et al., 2016] Zhiting Hu, Xuezhe Ma, Zhengzhong Liu,
Eduard Hovy, and Eric P. Xing. Harnessing deep neural
networks with logic rules. In ACL, 2016.
[Huang et al., 2017] Gao Huang, Zhuang Liu, Kilian Q.
Weinberger, and Laurens van der Maaten. Densely connected convolutional networks. In CVPR, 2017.
[Kindermans et al., 2017] Pieter-Jan Kindermans, Kristof T.
Schütt, Maximilian Alber, Klaus-Robert Müller, Dumitru
Erhan, Been Kim, and Sven Dähne. Learning how to explain neural networks: Patternnet and patternattribution.
arXiv: 1705.05598, 2017.
[Koh and Liang, 2017] PangWei Koh and Percy Liang. Understanding black-box predictions via influence functions.
In ICML, 2017.
[Krizhevsky et al., 2012] A. Krizhevsky, I. Sutskever, and
G. E. Hinton. Imagenet classification with deep convolutional neural networks. In NIPS, 2012.
[Kumar et al., 2017] Devinder Kumar, Alexander Wong, and
Graham W. Taylor. Explaining the unexplained: A classenhanced attentive response (clear) approach to understanding deep neural networks. In CVPR Workshop on Explainable Computer Vision and Job Candidate Screening
Competition, 2017.
[Lakkaraju et al., 2017] Himabindu Lakkaraju, Ece Kamar,
Rich Caruana, and Eric Horvitz. Identifying unknown unknowns in the open world: Representations and policies
for guided exploration. In AAAI, 2017.
[LeCun et al., 1998a] Yann LeCun, Lèon Bottou, Yoshua
Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. In Proceedings of the
IEEE, 1998.
[LeCun et al., 1998b] Yann LeCun, Corinna Cortes, and
Christopher JC Burges. The mnist database of handwritten
digits. Technical report, 1998.
[Liu et al., 2015] Ziwei Liu, Ping Luo, Xiaogang Wang, and
Xiaoou Tang. Deep learning face attributes in the wild. In
ICCV, 2015.
[Lu, 2015] Yao Lu. Unsupervised learning on neural network outputs. In arXiv:1506.00990v9, 2015.
[Mahendran and Vedaldi, 2015] Aravindh Mahendran and
Andrea Vedaldi. Understanding deep image representations by inverting them. In CVPR, 2015.
[Netzer et al., 2011] Yuval Netzer, Tao Wang, Adam Coates,
Alessandro Bissacco, Bo Wu, and Andrew Y. Ng. Reading
digits in natural images with unsupervised feature learning. In NIPS Workshop on Deep Learning and Unsupervised Feature Learning, 2011.
[Nguyen et al., 2017] Anh Nguyen, Jeff Clune, Yoshua Bengio, Alexey Dosovitskiy, and Jason Yosinski. Plug & play
generative networks: Conditional iterative generation of
images in latent space. CVPR, 2017.
[Olah et al., 2017] Chris Olah, Alexander Mordvintsev, and
Ludwig Schubert. Feature visualization. Distill, 2017.
https://distill.pub/2017/feature-visualization.
[Paysan et al., 2009] P. Paysan, R. Knothe, B. Amberg,
S. Romdhani, and T. Vetter. A 3d face model for pose and
illumination invariant face recognition. In AVSS, 2009.
[Ribeiro et al., 2016] Marco Tulio Ribeiro, Sameer Singh,
and Carlos Guestrin. “why should i trust you?” explaining
the predictions of any classifier. In KDD, 2016.
[Sabour et al., 2017] Sara Sabour, Nicholas Frosst, and Geoffrey E. Hinton. Dynamic routing between capsules. In
NIPS, 2017.
[Selvaraju et al., 2017] Ramprasaath R. Selvaraju, Michael
Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi
Parikh, and Dhruv Batra. Grad-cam: Visual explanations
from deep networks via gradient-based localization. In
ICCV, 2017.
[Simonyan et al., 2013] Karen Simonyan, Andrea Vedaldi,
and Andrew Zisserman.
Deep inside convolutional
networks: visualising image classification models and
saliency maps. In arXiv:1312.6034, 2013.
[Springenberg et al., 2015] Jost
Tobias
Springenberg,
Alexey Dosovitskiy, Thomas Brox, and Martin Riedmiller. Striving for simplicity: the all convolutional net.
ICLR workshop, 2015.
[Su et al., 2017] Jiawei Su, Danilo Vasconcellos Vargas, and
Sakurai Kouichi. One pixel attack for fooling deep neural
networks. In arXiv:1710.08864, 2017.
[Szegedy et al., 2014] Christian
Szegedy,
Wojciech
Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian
Goodfellow, and Rob Fergus. Intriguing properties of
neural networks. In arXiv:1312.6199, 2014.
[Wang et al., 2017] Peng Wang, Qi Wu, Chunhua Shen, and
Anton van den Hengel. The vqa-machine: Learning how
to use existing vision algorithms to answer new questions.
In CVPR, 2017.
[Wu and Zhu, 2011] Tianfu Wu and Song-Chun Zhu. A numerical study of the bottom-up and top-down inference
processes in and-or graphs. International journal of computer vision, 93(2):226–252, 2011.
[Wu et al., 2007] Tian-Fu Wu, Gui-Song Xia, and SongChun Zhu. Compositional boosting for computing hierarchical image structures. In CVPR, 2007.
[Wu et al., 2017] Tianfu Wu, Xilai Li, Xi Song, Wei Sun,
Liang Dong, and Bo Li.
Interpretable r-cnn.
In
arXiv:1711.05226, 2017.
[Yang et al., 2009] Xiong Yang, Tianfu Wu, and Song-Chun
Zhu. Evaluating information contributions of bottom-up
and top-down processes. ICCV, 2009.
[Yosinski et al., 2014] Jason Yosinski, Jeff Clune, Yoshua
Bengio, and Hod Lipson. How transferable are features
in deep neural networks? In NIPS, 2014.
[Zeiler and Fergus, 2014] Matthew D. Zeiler and Rob Fergus. Visualizing and understanding convolutional networks. In ECCV, 2014.
[Zhang et al., 2016] Q. Zhang, R. Cao, Y. N. Wu, and S.-C.
Zhu. Growing interpretable part graphs on convnets via
multi-shot learning. In AAAI, 2016.
[Zhang et al., 2017a] Quanshi Zhang, Ruiming Cao,
Ying Nian Wu, and Song-Chun Zhu. Mining object parts
from cnns via active question-answering. In CVPR, 2017.
[Zhang et al., 2017b] Quanshi Zhang, Ruiming Cao, Shengming Zhang, Mark Edmonds, Ying Nian Wu, and SongChun Zhu. Interactively transferring cnn patterns for part
localization. In arXiv:1708.01783, 2017.
[Zhang et al., 2017c] Quanshi Zhang, Ying Nian Wu, and
Song-Chun Zhu. Interpretable convolutional neural network. In arXiv:1710.00935, 2017.
[Zhang et al., 2018a] Q. Zhang, R. Cao, F. Shi, Y.N. Wu, and
S.-C. Zhu. Interpreting cnn knowledge via an explanatory
graph. In AAAI, 2018.
[Zhang et al., 2018b] Q. Zhang, W. Wang, and S.-C. Zhu.
Examining cnn representations with respect to dataset
bias. In AAAI, 2018.
[Zhang et al., 2018c] Quanshi Zhang, Yu Yang, Ying Nian
Wu, and Song-Chun Zhu. Interpreting cnns via decision
trees. arXiv:1802.00121, 2018.
[Zhou et al., 2015] Bolei Zhou, Aditya Khosla, Agata
Lapedriza, Aude Oliva, and Antonio Torralba. Object detectors emerge in deep scene cnns. In ICRL, 2015.
[Zintgraf et al., 2017] Luisa M Zintgraf, Taco S Cohen Tameem Adel, and Max Welling. Visualizing deep
neural network decisions: prediction difference analysis.
ICLR, 2017.
| 1cs.CV
|
Generative Adversarial Text to Image Synthesis
arXiv:1605.05396v2 [cs.NE] 5 Jun 2016
Scott Reed, Zeynep Akata, Xinchen Yan, Lajanugen Logeswaran
REEDSCOT 1 , AKATA 2 , XCYAN 1 , LLAJAN 1
Bernt Schiele, Honglak Lee
SCHIELE 2 , HONGLAK 1
1
University of Michigan, Ann Arbor, MI, USA (UMICH . EDU)
2
Max Planck Institute for Informatics, Saarbrücken, Germany (MPI - INF. MPG . DE)
Abstract
Automatic synthesis of realistic images from text
would be interesting and useful, but current AI
systems are still far from this goal. However, in
recent years generic and powerful recurrent neural network architectures have been developed
to learn discriminative text feature representations. Meanwhile, deep convolutional generative
adversarial networks (GANs) have begun to generate highly compelling images of specific categories, such as faces, album covers, and room
interiors. In this work, we develop a novel deep
architecture and GAN formulation to effectively
bridge these advances in text and image modeling, translating visual concepts from characters
to pixels. We demonstrate the capability of our
model to generate plausible images of birds and
flowers from detailed text descriptions.
this small bird has a pink
this magnificent fellow is
breast and crown, and black almost all black with a red
primaries and secondaries. crest, and white cheek patch.
the flower has petals that
are bright pinkish purple
with white stigma
this white and yellow flower
have thin white petals and a
round yellow stamen
Figure 1. Examples of generated images from text descriptions.
Left: captions are from zero-shot (held out) categories, unseen
text. Right: captions are from the training set.
1. Introduction
In this work we are interested in translating text in the form
of single-sentence human-written descriptions directly into
image pixels. For example, “this small bird has a short,
pointy orange beak and white belly” or ”the petals of this
flower are pink and the anther are yellow”. The problem of
generating images from visual descriptions gained interest
in the research community, but it is far from being solved.
properties of attribute representations are attractive, attributes are also cumbersome to obtain as they may require
domain-specific knowledge. In comparison, natural language offers a general and flexible interface for describing
objects in any space of visual categories. Ideally, we could
have the generality of text descriptions with the discriminative power of attributes.
Traditionally this type of detailed visual information about
an object has been captured in attribute representations distinguishing characteristics the object category encoded
into a vector (Farhadi et al., 2009; Kumar et al., 2009;
Parikh & Grauman, 2011; Lampert et al., 2014), in particular to enable zero-shot visual recognition (Fu et al., 2014;
Akata et al., 2015), and recently for conditional image generation (Yan et al., 2015).
Recently, deep convolutional and recurrent networks for
text have yielded highly discriminative and generalizable (in the zero-shot learning sense) text representations
learned automatically from words and characters (Reed
et al., 2016). These approaches exceed the previous stateof-the-art using attributes for zero-shot visual recognition
on the Caltech-UCSD birds database (Wah et al., 2011),
and also are capable of zero-shot caption-based retrieval.
Motivated by these works, we aim to learn a mapping directly from words and characters to image pixels.
While the discriminative power and strong generalization
Proceedings of the 33 rd International Conference on Machine
Learning, New York, NY, USA, 2016. JMLR: W&CP volume
48. Copyright 2016 by the author(s).
To solve this challenging problem requires solving two subproblems: first, learn a text feature representation that captures the important visual details; and second, use these fea-
Generative Adversarial Text to Image Synthesis
tures to synthesize a compelling image that a human might
mistake for real. Fortunately, deep learning has enabled
enormous progress in both subproblems - natural language
representation and image synthesis - in the previous several
years, and we build on this for our current task.
However, one difficult remaining issue not solved by deep
learning alone is that the distribution of images conditioned
on a text description is highly multimodal, in the sense that
there are very many plausible configurations of pixels that
correctly illustrate the description. The reverse direction
(image to text) also suffers from this problem but learning
is made practical by the fact that the word or character sequence can be decomposed sequentially according to the
chain rule; i.e. one trains the model to predict the next
token conditioned on the image and all previous tokens,
which is a more well-defined prediction problem.
This conditional multi-modality is thus a very natural application for generative adversarial networks (Goodfellow
et al., 2014), in which the generator network is optimized to
fool the adversarially-trained discriminator into predicting
that synthetic images are real. By conditioning both generator and discriminator on side information (also studied
by Mirza & Osindero (2014) and Denton et al. (2015)), we
can naturally model this phenomenon since the discriminator network acts as a “smart” adaptive loss function.
Our main contribution in this work is to develop a simple and effective GAN architecture and training strategy that enables compelling text to image synthesis of
bird and flower images from human-written descriptions.
We mainly use the Caltech-UCSD Birds dataset and the
Oxford-102 Flowers dataset along with five text descriptions per image we collected as our evaluation setting. Our
model is trained on a subset of training categories, and we
demonstrate its performance both on the training set categories and on the testing set, i.e. “zero-shot” text to image
synthesis. In addition to birds and flowers, we apply our
model to more general images and text descriptions in the
MS COCO dataset (Lin et al., 2014).
2. Related work
Key challenges in multimodal learning include learning
a shared representation across modalities, and to predict
missing data (e.g. by retrieval or synthesis) in one modality conditioned on another. Ngiam et al. (2011) trained a
stacked multimodal autoencoder on audio and video signals and were able to learn a shared modality-invariant representation. Srivastava & Salakhutdinov (2012) developed
a deep Boltzmann machine and jointly modeled images and
text tags. Sohn et al. (2014) proposed a multimodal conditional prediction framework (hallucinating one modality
given the other) and provided theoretical justification.
Many researchers have recently exploited the capability of
deep convolutional decoder networks to generate realistic
images. Dosovitskiy et al. (2015) trained a deconvolutional
network (several layers of convolution and upsampling) to
generate 3D chair renderings conditioned on a set of graphics codes indicating shape, position and lighting. Yang et al.
(2015) added an encoder network as well as actions to this
approach. They trained a recurrent convolutional encoderdecoder that rotated 3D chair models and human faces conditioned on action sequences of rotations. Reed et al. (2015)
encode transformations from analogy pairs, and use a convolutional decoder to predict visual analogies on shapes,
video game characters and 3D cars.
Generative adversarial networks (Goodfellow et al., 2014)
have also benefited from convolutional decoder networks,
for the generator network module. Denton et al. (2015)
used a Laplacian pyramid of adversarial generator and discriminators to synthesize images at multiple resolutions.
This work generated compelling high-resolution images
and could also condition on class labels for controllable
generation. Radford et al. (2016) used a standard convolutional decoder, but developed a highly effective and stable
architecture incorporating batch normalization to achieve
striking image synthesis results.
The main distinction of our work from the conditional
GANs described above is that our model conditions on text
descriptions instead of class labels. To our knowledge it
is the first end-to-end differentiable architecture from the
character level to pixel level. Furthermore, we introduce a
manifold interpolation regularizer for the GAN generator
that significantly improves the quality of generated samples, including on held out zero shot categories on CUB.
The bulk of previous work on multimodal learning from
images and text uses retrieval as the target task, i.e. fetch
relevant images given a text query or vice versa. However, in the past year, there has been a breakthrough in
using recurrent neural network decoders to generate text
descriptions conditioned on images (Vinyals et al., 2015;
Mao et al., 2015; Karpathy & Li, 2015; Donahue et al.,
2015). These typically condition a Long Short-Term Memory (Hochreiter & Schmidhuber, 1997) on the top-layer
features of a deep convolutional network to generate captions using the MS COCO (Lin et al., 2014) and other captioned image datasets. Xu et al. (2015) incorporated a recurrent visual attention mechanism for improved results.
Other tasks besides conditional generation have been considered in recent work. Ren et al. (2015) generate answers
to questions about the visual content of images. This approach was extended to incorporate an explicit knowledge
base (Wang et al., 2015). Zhu et al. (2015) applied sequence models to both text (in the form of books) and
movies to perform a joint alignment.
Generative Adversarial Text to Image Synthesis
In contemporary work Mansimov et al. (2016) generated
images from text captions, using a variational recurrent
autoencoder with attention to paint the image in multiple
steps, similar to DRAW (Gregor et al., 2015). Impressively,
the model can perform reasonable synthesis of completely
novel (unlikely for a human to write) text such as “a stop
sign is flying in blue skies”, suggesting that it does not simply memorize. While the results are encouraging, the problem is highly challenging and the generated images are not
yet realistic, i.e., mistakeable for real. Our model can in
many cases generate visually-plausible 64×64 images conditioned on text, and is also distinct in that our entire model
is a GAN, rather only using GAN for post-processing.
Building on ideas from these many previous works, we
develop a simple and effective approach for text-based
image synthesis using a character-level text encoder and
class-conditional GAN. We propose a novel architecture
and learning strategy that leads to compelling visual results. We focus on the case of fine-grained image datasets,
for which we use the recently collected descriptions for
Caltech-UCSD Birds and Oxford Flowers with 5 humangenerated captions per image (Reed et al., 2016). We train
and test on class-disjoint sets, so that test performance can
give a strong indication of generalization ability which we
also demonstrate on MS COCO images with multiple objects and various backgrounds.
3. Background
In this section we briefly describe several previous works
that our method is built upon.
3.1. Generative adversarial networks
Generative adversarial networks (GANs) consist of a generator G and a discriminator D that compete in a twoplayer minimax game: The discriminator tries to distinguish real training data from synthetic images, and the generator tries to fool the discriminator. Concretely, D and G
play the following game on V(D,G):
min max V (D, G) = Ex∼pdata (x) [log D(x)]+
G
D
(1)
Ex∼pz (z) [log(1 − D(G(z)))]
Goodfellow et al. (2014) prove that this minimax game has
a global optimium precisely when pg = pdata , and that under mild conditions (e.g. G and D have enough capacity)
pg converges to pdata . In practice, in the start of training
samples from D are extremely poor and rejected by D with
high confidence. It has been found to work better in practice for the generator to maximize log(D(G(z))) instead of
minimizing log(1 − D(G(z))).
3.2. Deep symmetric structured joint embedding
To obtain a visually-discriminative vector representation of
text descriptions, we follow the approach of Reed et al.
(2016) by using deep convolutional and recurrent text encoders that learn a correspondence function with images.
The text classifier induced by the learned correspondence
function ft is trained by optimizing the following structured loss:
N
1 X
∆(yn , fv (vn )) + ∆(yn , ft (tn ))
N n=1
(2)
where {(vn , tn , yn ) : n = 1, ..., N } is the training data set,
∆ is the 0-1 loss, vn are the images, tn are the corresponding text descriptions, and yn are the class labels. Classifiers
fv and ft are parametrized as follows:
fv (v) = arg max Et∼T (y) [φ(v)T ϕ(t))]
(3)
y∈Y
ft (t) = arg max Ev∼V(y) [φ(v)T ϕ(t))]
(4)
y∈Y
where φ is the image encoder (e.g. a deep convolutional
neural network), ϕ is the text encoder (e.g. a characterlevel CNN or LSTM), T (y) is the set of text descriptions
of class y and likewise V(y) for images. The intuition here
is that a text encoding should have a higher compatibility
score with images of the correspondong class compared to
any other class and vice-versa.
To train the model a surrogate objective related to Equation 2 is minimized (see Akata et al. (2015) for details). The
resulting gradients are backpropagated through ϕ to learn
a discriminative text encoder. Reed et al. (2016) found that
different text encoders worked better for CUB versus Flowers, but for full generality and robustness to typos and large
vocabulary, in this work we always used a hybrid characterlevel convolutional-recurrent network.
4. Method
Our approach is to train a deep convolutional generative
adversarial network (DC-GAN) conditioned on text features encoded by a hybrid character-level convolutionalrecurrent neural network. Both the generator network G
and the discriminator network D perform feed-forward inference conditioned on the text feature.
4.1. Network architecture
We use the following notation. The generator network is
denoted G : RZ × RT → RD , the discriminator as D :
RD × RT → {0, 1}, where T is the dimension of the text
description embedding, D is the dimension of the image,
and Z is the dimension of the noise input to G. We illustrate
our network architecture in Figure 2.
In the generator G, first we sample from the noise prior
z ∈ RZ ∼ N (0, 1) and we encode the text query t using text encoder ϕ. The description embedding ϕ(t) is first
compressed using a fully-connected layer to a small dimension (in practice we used 128) followed by leaky-ReLU and
φ
φ(t)
x := G(z,φ(t)) z ~ N(0,1) D(x’,φ(t))
Generative Adversarial Text to Image Synthesis
This flower has small, round violet
petals with a dark purple center
Generator Network
φ
This flower has small, round violet
petals with a dark purple center
Discriminator Network
Figure 2. Our text-conditional convolutional GAN architecture. Text encoding ϕ(t) is used by both generator and discriminator. It is
projected to a lower-dimensions and depth concatenated with image feature maps for further stages of convolutional processing.
then concatenated to the noise vector z. Following this, inference proceeds as in a normal deconvolutional network:
we feed-forward it through the generator G; a synthetic image x̂ is generated via x̂ ← G(z, ϕ(t)). Image generation
corresponds to feed-forward inference in the generator G
conditioned on query text and a noise sample.
In the discriminator D, we perform several layers of stride2 convolution with spatial batch normalization (Ioffe &
Szegedy, 2015) followed by leaky ReLU. We again reduce
the dimensionality of the description embedding ϕ(t) in a
(separate) fully-connected layer followed by rectification.
When the spatial dimension of the discriminator is 4 × 4,
we replicate the description embedding spatially and perform a depth concatenation. We then perform a 1 × 1 convolution followed by rectification and a 4 × 4 convolution
to compute the final score from D. Batch normalization is
performed on all convolutional layers.
4.2. Matching-aware discriminator (GAN-CLS)
The most straightforward way to train a conditional GAN
is to view (text, image) pairs as joint observations and train
the discriminator to judge pairs as real or fake. This type of
conditioning is naive in the sense that the discriminator has
no explicit notion of whether real training images match
the text embedding context.
However, as discussed also by (Gauthier, 2015), the
dynamics of learning may be different from the nonconditional case. In the beginning of training, the discriminator ignores the conditioning information and easily rejects samples from G because they do not look plausible.
Once G has learned to generate plausible images, it must
also learn to align them with the conditioning information,
and likewise D must learn to evaluate whether samples
from G meet this conditioning constraint.
In naive GAN, the discriminator observes two kinds of inputs: real images with matching text, and synthetic images
with arbitrary text. Therefore, it must implicitly separate
two sources of error: unrealistic images (for any text), and
Algorithm 1 GAN-CLS training algorithm with step size
α, using minibatch SGD for simplicity.
1: Input: minibatch images x, matching text t, mismatching t̂, number of training batch steps S
2: for n = 1 to S do
3:
h ← ϕ(t) {Encode matching text description}
4:
ĥ ← ϕ(t̂) {Encode mis-matching text description}
5:
z ∼ N (0, 1)Z {Draw sample of random noise}
6:
x̂ ← G(z, h) {Forward through generator}
7:
sr ← D(x, h) {real image, right text}
8:
sw ← D(x, ĥ) {real image, wrong text}
9:
sf ← D(x̂, h) {fake image, right text}
10:
LD ← log(sr ) + (log(1 − sw ) + log(1 − sf ))/2
11:
D ← D − α∂LD /∂D {Update discriminator}
12:
LG ← log(sf )
13:
G ← G − α∂LG /∂G {Update generator}
14: end for
realistic images of the wrong class that mismatch the conditioning information. Based on the intuition that this may
complicate learning dynamics, we modified the GAN training algorithm to separate these error sources. In addition
to the real / fake inputs to the discriminator during training, we add a third type of input consisting of real images with mismatched text, which the discriminator must
learn to score as fake. By learning to optimize image / text
matching in addition to the image realism, the discriminator can provide an additional signal to the generator.
Algorithm 1 summarizes the training procedure. After encoding the text, image and noise (lines 3-5) we generate the
fake image (x̂, line 6). sr indicates the score of associating a real image and its corresponding sentence (line 7), sw
measures the score of associating a real image with an arbitrary sentence (line 8), and sf is the score of associating
a fake image with its corresponding text (line 9). Note that
we use ∂LD /∂D to indicate the gradient of D’s objective
with respect to its parameters, and likewise for G. Lines
11 and 13 are meant to indicate taking a gradient step to
update network parameters.
Generative Adversarial Text to Image Synthesis
4.3. Learning with manifold interpolation (GAN-INT)
Deep networks have been shown to learn representations
in which interpolations between embedding pairs tend to
be near the data manifold (Bengio et al., 2013; Reed et al.,
2014). Motivated by this property, we can generate a large
amount of additional text embeddings by simply interpolating between embeddings of training set captions. Critically,
these interpolated text embeddings need not correspond to
any actual human-written text, so there is no additional labeling cost. This can be viewed as adding an additional
term to the generator objective to minimize:
Et1 ,t2 ∼pdata [log(1 − D(G(z, βt1 + (1 − β)t2 )))]
(5)
where z is drawn from the noise distribution and β interpolates between text embeddings t1 and t2 . In practice we
found that fixing β = 0.5 works well.
Because the interpolated embeddings are synthetic, the discriminator D does not have “real” corresponding image
and text pairs to train on. However, D learns to predict
whether image and text pairs match or not. Thus, if D does
a good job at this, then by satisfying D on interpolated text
embeddings G can learn to fill in gaps on the data manifold
in between training points. Note that t1 and t2 may come
from different images and even different categories.1
4.4. Inverting the generator for style transfer
If the text encoding ϕ(t) captures the image content (e.g.
flower shape and colors), then in order to generate a realistic image the noise sample z should capture style factors
such as background color and pose. With a trained GAN,
one may wish to transfer the style of a query image onto
the content of a particular text description. To achieve this,
one can train a convolutional network to invert G to regress
from samples x̂ ← G(z, ϕ(t)) back onto z. We used a
simple squared loss to train the style encoder:
Lstyle = Et,z∼N (0,1) ||z − S(G(z, ϕ(t)))||22
(6)
where S is the style encoder network. With a trained generator and style encoder, style transfer from a query image
x onto text t proceeds as follows:
s ← S(x), x̂ ← G(s, ϕ(t))
where x̂ is the result image and s is the predicted style.
5. Experiments
In this section we first present results on the CUB dataset
of bird images and the Oxford-102 dataset of flower images. CUB has 11,788 images of birds belonging to one of
1
In our experiments, we used fine-grained categories (e.g.
birds are similar enough to other birds, flowers to other flowers,
etc.), and interpolating across categories did not pose a problem.
200 different categories. The Oxford-102 contains 8,189
images of flowers from 102 different categories.
As in Akata et al. (2015) and Reed et al. (2016), we split
these into class-disjoint training and test sets. CUB has
150 train+val classes and 50 test classes, while Oxford-102
has 82 train+val and 20 test classes. For both datasets, we
used 5 captions per image. During mini-batch selection for
training we randomly pick an image view (e.g. crop, flip)
of the image and one of the captions.
For text features, we first pre-train a deep convolutionalrecurrent text encoder on structured joint embedding of
text captions with 1,024-dimensional GoogLeNet image
embedings (Szegedy et al., 2015) as described in subsection 3.2. For both Oxford-102 and CUB we used a hybrid
of character-level ConvNet with a recurrent neural network
(char-CNN-RNN) as described in (Reed et al., 2016). Note,
however that pre-training the text encoder is not a requirement of our method and we include some end-to-end results
in the supplement. The reason for pre-training the text encoder was to increase the speed of training the other components for faster experimentation. We also provide some
qualitative results obtained with MS COCO images of the
validation set to show the generalizability of our approach.
We used the same GAN architecture for all datasets. The
training image size was set to 64 × 64 × 3. The text encoder produced 1, 024-dimensional embeddings that were
projected to 128 dimensions in both the generator and discriminator before depth concatenation into convolutional
feature maps.
As indicated in Algorithm 1, we take alternating steps of
updating the generator and the discriminator network. We
used the same base learning rate of 0.0002, and used the
ADAM solver (Ba & Kingma, 2015) with momentum 0.5.
The generator noise was sampled from a 100-dimensional
unit normal distribution. We used a minibatch size of 64
and trained for 600 epochs. Our implementation was built
on top of dcgan.torch2 .
5.1. Qualitative results
We compare the GAN baseline, our GAN-CLS with imagetext matching discriminator (subsection 4.2), GAN-INT
learned with text manifold interpolation (subsection 4.3)
and GAN-INT-CLS which combines both.
Results on CUB can be seen in Figure 3. GAN and GANCLS get some color information right, but the images do
not look real. However, GAN-INT and GAN-INT-CLS
show plausible images that usually match all or at least part
of the caption. We include additional analysis on the robustness of each GAN variant on the CUB dataset in the
supplement.
2
https://github.com/soumith/dcgan.torch
Generative Adversarial Text to Image Synthesis
an all black bird
GT with a distinct
thick, rounded bill.
this small bird has
a yellow breast,
brown crown, and
black superciliary
a tiny bird, with a
tiny beak, tarsus and
feet, a blue crown,
blue coverts, and
black cheek patch
this bird is different
shades of brown all
over with white and
black spots on its
head and back
the gray bird has a
light grey head and
grey webbed feet
GAN
GAN - CLS
GAN - INT
GAN - INT
- CLS
Figure 3. Zero-shot (i.e. conditioned on text from unseen test set categories) generated bird images using GAN, GAN-CLS, GAN-INT
and GAN-INT-CLS. We found that interpolation regularizer was needed to reliably achieve visually-plausible results.
GT
this flower is
white and pink in
color, with petals
that have veins.
these flowers have
petals that start off
white in color and
end in a dark purple
towards the tips.
bright droopy
yellow petals with
burgundy streaks,
and a yellow
stigma.
a flower with
long pink petals
and raised orange
stamen.
the flower shown
has a blue petals
with a white pistil
in the center
GAN
GAN - CLS
GAN - INT
GAN - INT
- CLS
Figure 4. Zero-shot generated flower images using GAN, GAN-CLS, GAN-INT and GAN-INT-CLS. All variants generated plausible
images. Although some shapes of test categories were not seen during training (e.g. columns 3 and 4), the color information is preserved.
Results on the Oxford-102 Flowers dataset can be seen in
Figure 4. In this case, all four methods can generate plausible flower images that match the description. The basic
GAN tends to have the most variety in flower morphology
(i.e. one can see very different petal types if this part is left
unspecified by the caption), while other methods tend to
generate more class-consistent images. We speculate that
it is easier to generate flowers, perhaps because birds have
stronger structural regularities across species that make it
easier for D to spot a fake bird than to spot a fake flower.
Many additional results with GAN-INT and GAN-INTCLS as well as GAN-E2E (our end-to-end GAN-INT-CLS
without pre-training the text encoder ϕ(t)) for both CUB
and Oxford-102 can be found in the supplement.
5.2. Disentangling style and content
In this section we investigate the extent to which our model
can separate style and content. By content, we mean the
visual attributes of the bird itself, such as shape, size and
color of each body part. By style, we mean all of the other
factors of variation in the image such as background color
and the pose orientation of the bird.
The text embedding mainly covers content information and
typically nothing about style, e.g. captions do not mention
the background or the bird pose. Therefore, in order to
generate realistic images then GAN must learn to use noise
sample z to account for style variations.
To quantify the degree of disentangling on CUB we set up
two prediction tasks with noise z as the input: pose verifi-
Generative Adversarial Text to Image Synthesis
Text descriptions Images
(style)
(content)
The bird has a yellow breast with grey
features and a small beak.
This is a large white bird with black
wings and a red head.
A small bird with a black head and
wings and features grey wings.
This bird has a white breast, brown
and white coloring on its head and
wings, and a thin pointy beak.
Figure 5. ROC curves using cosine distance between predicted
style vector on same vs. different style image pairs. Left: image pairs reflect same or different pose. Right: image pairs reflect
same or different average background color.
cation and background color verification. For each task, we
first constructed similar and dissimilar pairs of images and
then computed the predicted style vectors by feeding the
image into a style encoder (trained to invert the input and
output of generator). If GAN has disentangled style using
z from image content, the similarity between images of the
same style (e.g. similar pose) should be higher than that of
different styles (e.g. different pose).
A small bird with white base and black
stripes throughout its belly, head, and
feathers.
A small sized bird that has a cream belly
and a short pointed bill.
This bird is completely red.
This bird is completely white.
This is a yellow bird. The wings are
bright blue.
Figure 6. Transfering style from the top row (real) images to the
content from the query text, with G acting as a deterministic decoder. The bottom three rows are captions made up by us.
To recover z, we inverted the each generator network as
described in subsection 4.4. To construct pairs for verification, we grouped images into 100 clusters using K-means
where images from the same cluster share the same style.
For background color, we clustered images by the average
color (RGB channels) of the background; for bird pose, we
clustered images by 6 keypoint coordinates (beak, belly,
breast, crown, forehead, and tail).
we can combine previously seen content (e.g. text) and previously seen styles, but in novel pairings so as to generate
plausible images very different from any seen image during
training. Another way to generalize is to use attributes that
were previously seen (e.g. blue wings, yellow belly) as in
the generated parakeet-like bird in the bottom row of Figure 6. This way of generalization takes advantage of text
representations capturing multiple visual aspects.
For evaluation, we compute the actual predicted style variables by feeding pairs of images style encoders for GAN,
GAN-CLS, GAN-INT and GAN-INT-CLS. We verify the
score using cosine similarity and report the AU-ROC (averaging over 5 folds). As a baseline, we also compute cosine
similarity between text features from our text encoder.
5.4. Sentence interpolation
We present results on Figure 5. As expected, captions alone
are not informative for style prediction. Moreover, consistent with the qualitative results, we found that models
incorporating interpolation regularizer (GAN-INT, GANINT-CLS) perform the best for this task.
5.3. Pose and background style transfer
We demonstrate that GAN-INT-CLS with trained style encoder (subsection 4.4) can perform style transfer from an
unseen query image onto a text description. Figure 6 shows
that images generated using the inferred styles can accurately capture the pose information. In several cases the
style transfer preserves detailed background information
such as a tree branch upon which the bird is perched.
Disentangling the style by GAN-INT-CLS is interesting because it suggests a simple way of generalization. This way
Figure 8 demonstrates the learned text manifold by interpolation (Left). Although there is no ground-truth text for
the intervening points, the generated images appear plausible. Since we keep the noise distribution the same, the
only changing factor within each row is the text embedding
that we use. Note that interpolations can accurately reflect
color information, such as a bird changing from blue to red
while the pose and background are invariant.
As well as interpolating between two text encodings, we
show results on Figure 8 (Right) with noise interpolation.
Here, we sample two random noise vectors. By keeping the
text encoding fixed, we interpolate between these two noise
vectors and generate bird images with a smooth transition
between two styles by keeping the content fixed.
5.5. Beyond birds and flowers
We trained a GAN-CLS on MS-COCO to show the generalization capability of our approach on a general set of
images that contain multiple objects and variable backgrounds. We use the same text encoder architecture,
same GAN architecture and same hyperparameters (learning rate, minibatch size and number of epochs) as in CUB
Generative Adversarial Text to Image Synthesis
GT
a group of
people on skis
stand on the
snow.
a table with
many plates of
food and
drinks
two giraffe
standing next
to each other
in a forest.
a large blue
octopus kite
flies above
the people
having fun at
the beach.
Ours
GT
Ours
GT
a man in a wet
suit riding a
surfboard on a
wave.
a pitcher is
about to throw
the ball to the
batter.
two plates of
food that include
beans,
guacamole and
rice.
a picture of a
very clean
living room.
a green plant
that is growing
out of the
ground.
a sheep
standing in a
open grass
field.
there is only one
horse in the
grassy field.
a toilet in a small
room with a
window and
unfinished walls.
Ours
Figure 7. Generating images of general concepts using our GAN-CLS on the MS-COCO validation set. Unlike the case of CUB and
Oxford-102, the network must (try to) handle multiple objects and diverse backgrounds.
‘Blue bird with black beak’ →
‘Red bird with black beak’
‘This bird is completely red with black wings’
‘Small blue bird with black wings’ →
‘Small yellow bird with black wings’
‘this bird is all blue, the top part of the bill is
blue, but the bottom half is white’
‘This bird is bright.’ → ‘This bird is dark.’
‘This is a yellow bird. The wings are bright blue’
Figure 8. Left: Generated bird images by interpolating between
two sentences (within a row the noise is fixed). Right: Interpolating between two randomly-sampled noise vectors.
and Oxford-102. The only difference in training the text
encoder is that COCO does not have a single object category per class. However, we can still learn an instance
level (rather than category level) image and text matching
function, as in (Kiros et al., 2014).
Samples and ground truth captions and their corresponding
images are shown on Figure 7. A common property of all
the results is the sharpness of the samples, similar to other
GAN-based image synthesis models. We also observe diversity in the samples by simply drawing multiple noise
vectors and using the same fixed text encoding.
From a distance the results are encouraging, but upon
close inspection it is clear that the generated scenes are
not usually coherent; for example the human-like blobs in
the baseball scenes lack clearly articulated parts. In future work, it may be interesting to incorporate hierarchical
structure into the image synthesis model in order to better
handle complex multi-object scenes.
A qualitative comparison with AlignDRAW (Mansimov
et al., 2016) can be found in the supplement. GANCLS generates sharper and higher-resolution samples that
roughly correspond to the query, but AlignDRAW samples
more noticably reflect single-word changes in the selected
queries from that work. Incorporating temporal structure
into the GAN-CLS generator network could potentially improve its ability to capture these text variations.
6. Conclusions
In this work we developed a simple and effective model
for generating images based on detailed visual descriptions.
We demonstrated that the model can synthesize many plausible visual interpretations of a given text caption. Our
manifold interpolation regularizer substantially improved
the text to image synthesis on CUB. We showed disentangling of style and content, and bird pose and background
transfer from query images onto text descriptions. Finally
we demonstrated the generalizability of our approach to
generating images with multiple objects and variable backgrounds with our results on MS-COCO dataset. In future
work, we aim to further scale up the model to higher resolution images and add more types of text.
Acknowledgments
This work was supported in part by NSF CAREER
IIS-1453651, ONR N00014-13-1-0762 and NSF CMMI1266184.
References
Akata, Z., Reed, S., Walter, D., Lee, H., and Schiele, B.
Evaluation of Output Embeddings for Fine-Grained Image Classification. In CVPR, 2015.
Ba, J. and Kingma, D. Adam: A method for stochastic
optimization. In ICLR, 2015.
Bengio, Y., Mesnil, G., Dauphin, Y., and Rifai, S. Better
Generative Adversarial Text to Image Synthesis
mixing via deep representations. In ICML, 2013.
Denton, E. L., Chintala, S., Fergus, R., et al. Deep generative image models using a laplacian pyramid of adversarial networks. In NIPS, 2015.
Donahue, J., Hendricks, L. A., Guadarrama, S., Rohrbach,
M., Venugopalan, S., Saenko, K., and Darrell, T. Longterm recurrent convolutional networks for visual recognition and description. In CVPR, 2015.
Dosovitskiy, A., Tobias Springenberg, J., and Brox, T.
Learning to generate chairs with convolutional neural
networks. In CVPR, 2015.
Farhadi, A., Endres, I., Hoiem, D., and Forsyth, D. Describing objects by their attributes. In CVPR, 2009.
Fu, Y., Hospedales, T. M., Xiang, T., Fu, Z., and Gong, S.
Transductive multi-view embedding for zero-shot recognition and annotation. In ECCV, 2014.
Gauthier, J. Conditional generative adversarial nets for
convolutional face generation. Technical report, 2015.
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B.,
Warde-Farley, D., Ozair, S., Courville, A., and Bengio,
Y. Generative adversarial nets. In NIPS, 2014.
Gregor, K., Danihelka, I., Graves, A., Rezende, D., and
Wierstra, D. Draw: A recurrent neural network for image
generation. In ICML, 2015.
Hochreiter, S. and Schmidhuber, J. Long short-term memory. Neural computation, 9(8):1735–1780, 1997.
Ioffe, S. and Szegedy, C. Batch normalization: Accelerating deep network training by reducing internal covariate
shift. In ICML, 2015.
Karpathy, A. and Li, F. Deep visual-semantic alignments
for generating image descriptions. In CVPR, 2015.
Mansimov, E., Parisotto, E., Ba, J. L., and Salakhutdinov, R. Generating images from captions with attention.
ICLR, 2016.
Mao, J., Xu, W., Yang, Y., Wang, J., and Yuille, A. Deep
captioning with multimodal recurrent neural networks
(m-rnn). ICLR, 2015.
Mirza, M. and Osindero, S. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784, 2014.
Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., and Ng,
A. Y. Multimodal deep learning. In ICML, 2011.
Parikh, D. and Grauman, K. Relative attributes. In ICCV,
2011.
Radford, A., Metz, L., and Chintala, S. Unsupervised representation learning with deep convolutional generative
adversarial networks. 2016.
Reed, S., Sohn, K., Zhang, Y., and Lee, H. Learning to disentangle factors of variation with manifold interaction.
In ICML, 2014.
Reed, S., Zhang, Y., Zhang, Y., and Lee, H. Deep visual
analogy-making. In NIPS, 2015.
Reed, S., Akata, Z., Lee, H., and Schiele, B. Learning deep
representations for fine-grained visual descriptions. In
CVPR, 2016.
Ren, M., Kiros, R., and Zemel, R. Exploring models and
data for image question answering. In NIPS, 2015.
Sohn, K., Shang, W., and Lee, H. Improved multimodal
deep learning with variation of information. In NIPS,
2014.
Srivastava, N. and Salakhutdinov, R. R. Multimodal learning with deep boltzmann machines. In NIPS, 2012.
Kiros, R., Salakhutdinov, R., and Zemel, R. S. Unifying visual-semantic embeddings with multimodal neural
language models. In ACL, 2014.
Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S.,
Anguelov, D., Erhan, D., Vanhoucke, V., and Rabinovich, A. Going deeper with convolutions. In CVPR,
2015.
Kumar, N., Berg, A. C., Belhumeur, P. N., and Nayar, S. K.
Attribute and simile classifiers for face verification. In
ICCV, 2009.
Vinyals, O., Toshev, A., Bengio, S., and Erhan, D. Show
and tell: A neural image caption generator. In CVPR,
2015.
Lampert, C. H., Nickisch, H., and Harmeling, S. Attributebased classification for zero-shot visual object categorization. TPAMI, 36(3):453–465, 2014.
Wah, C., Branson, S., Welinder, P., Perona, P., and Belongie, S. The caltech-ucsd birds-200-2011 dataset.
2011.
Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P.,
Ramanan, D., Dollár, P., and Zitnick, C. L. Microsoft
coco: Common objects in context. In ECCV. 2014.
Wang, P., Wu, Q., Shen, C., Hengel, A. v. d., and Dick, A.
Explicit knowledge-based reasoning for visual question
answering. arXiv preprint arXiv:1511.02570, 2015.
Generative Adversarial Text to Image Synthesis
Xu, K., Ba, J., Kiros, R., Courville, A., Salakhutdinov, R.,
Zemel, R., and Bengio, Y. Show, attend and tell: Neural
image caption generation with visual attention. In ICML,
2015.
Yan, X., Yang, J., Sohn, K., and Lee, H. Attribute2image:
Conditional image generation from visual attributes.
arXiv preprint arXiv:1512.00570, 2015.
Yang, J., Reed, S., Yang, M.-H., and Lee, H. Weaklysupervised disentangling with recurrent transformations
for 3d view synthesis. In NIPS, 2015.
Zhu, Y., Kiros, R., Zemel, R., Salakhutdinov, R., Urtasun, R., Torralba, A., and Fidler, S. Aligning books
and movies: Towards story-like visual explanations by
watching movies and reading books. In ICCV, 2015.
| 9cs.NE
|
arXiv:1612.06499v2 [math.GR] 21 Dec 2016
Invariable generation of certain groups of piecewise linear
homeomorphisms of the interval
Yoshifumi Matsuda and Shigenori Matsumoto
Abstract. Let P be the group of all the orientation preserving piecewise
linear homeomorphisms of the interval [0, 1]. Given any a > 1, let P a be the
subgroup of P consisting of all the elements with slopes in aZ , and let P Q
be the subgroup of P consisting of all the elements with slopes and breaks in
Q. We show that the groups P , P a , P Q , as well as Thompson group F , are
invariably generated.
1. Introduction
The concept of invariable generation for a group G was introduced by J.
Wiegold in [9].
Notation 1.1.
we denote:
1
For elements g and h of a group G, and a subgroup H of G,
hg = ghg −1 , hG = {hg | g ∈ G}, H g = {hg | h ∈ H}.
Definition 1.2. (1) A subgroup H of G is called classful if H ∩ g G 6= ∅ for
any g ∈ G, or equivalently,
[
(1.1)
H g = G.
g∈G
(2) A group G is said to be invariably generated if there are no classful subgroups
other than G itself.
Any finite group is invariably generated, as is shown by a counting argument
on (1.1). Much easier is the fact that any abelian group is invariably generated.
In [9], it is shown that the invariable generation is extension closed. Therefore any
virtually solvable group is invariably generated. It is also projection closed. Given
a prime number p > 1075 , an infinite group whose arbitrary proper nontrivial
subgroup is of order p is constructed in [8]. Such groups are necessarily generated
by arbitrary two elements not from the same proper subgroup, and is invariably
2010 Mathematics Subject Classification. Primary 20F65. secondary 20F05.
Key words and phrases. Invariable generation, piecewise linear homeomorphism, Thompson
group.
The first author is partially supported by Grant-in-Aid for Young Scientists (B) No. 25800036,
and the second by Grant-in-Aid for Scientific Research (C) No. 25400096.
1The convention g h is not the same as the customary one.
1
2
YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO
generated, provided there are more than one nontrivial conjugacy classes. The
Grigorchuk group [5] is also invariably generated [7].
However the invariable generation is not subgroup closed: an example is given
in [10]. It is also not direct union closed: the group of the permutations of N
with finite support is not invariably generated, since the stabilizer of 1 ∈ N is
classful. Infinite groups with one nontrivial conjugacy class, constructed in [6], are
not invariably generated. Free groups of generators ≥ 2 are not invariably generated
[9]. More generally, nonelementary convergence groups are not invariably generated
[3]. Acylindrically hyperbolic groups are not invariably generated [2]. Invariable
generation of linear groups are discussed in [7].
The current paper is concerned with groups of piecewise linear (PL) homeomorphisms of the interval.
Theorem 1. Thompson group F is invariably generated.
Our method cannot give the finite invariance generation of F obtained in [4].
Denote by P the group formed by all the orientation preserving PL homeomorphisms of the unit interval [0, 1], and by P Q the subgroup of P formed by elements
with slopes and breaks in Q. Fix an arbitrary real number a > 1. Let P a be the
subgroup of P consisting of all the elements with slopes in aZ .
Theorem 2. The group P a is invariably generated.
Theorem 3. The group P is invariably generated.
Theorem 4. The group P Q is invariably generated.
The proofs of the above theorems are quite similar. In Section 2, we summarize
conditions for a subgroup G of P to be invariably generated. In later sections we
show that F , P a , P and P Q satisfy these conditions independently.
2. Conditions for invariable generation
Let G be any subgroup of the group P of all the orientation preserving PL
homeomorphisms of the interval [0, 1]. We shall raise three conditions for G to be
invariably generated. Let X be a dense subset of (0, 1) which is left invariant by G,
and let X ∗ = X ∪ {0, 1}. A closed interval I ⊂ [0, 1] is called an X-interval (resp.
X ∗ -interval) if the endpoints of I are contained in X (resp. X ∗ ).
Definition 2.1. For an X ∗ -interval I, let us denote
G(I) = {g|I | g ∈ G, Supp(g) ⊂ I} and G|I = {g|I | g ∈ G, g(I) = I}.
The first condition is to fix the relation between G and X.
Condition A: (1) The breaks of any g ∈ G are contained in X.
(2) The group G acts on X transitively.
(3) For any X-interval I, G|I = G(I).
(4) For any X ∗ -interval I, there is a PL homeomorphism ψI : [0, 1] → I such
that ψI (X ∗ ) = X ∗ ∩ I and GψI = G(I).
The other two conditions are concerned with an arbitrary classful subgroup H
of G.
Condition B: Any classful subgroup H acts on X transitively.
INVARIABLE GENERATION
3
Definition 2.2. For an X ∗ -interval I, let us denote
H(I) = {h|I | h ∈ H, Supp(h) ⊂ I} and H|I = {h|I | h ∈ H, h(I) = I}.
Condition C: For any classful subgroup H, there is an X-interval I0 such that
H|I0 = G(I0 ).
In this section, we show that if a subgroup G of P satisfies conditions A, B
and C, then G is invariably generated. Henceforth in this section, we assume G
satisfies conditions A, B and C. For f ∈ G, define s(f ) ∈ [0, 1] by
s(f ) = sup{s | f |[0,s] = id}.
By condition A(1), s(f ) is contained in X ∗ . Let H be an arbitrary classful subgroup
of G
Lemma 2.3. For any X ∗ -interval I = [t, 1] ⊂ [0, 1], H(I) is a classful subgroup
of G(I).
Proof: Given any f |I ∈ G(I) where f ∈ G with Supp(f ) ⊂ I, let us show
that there is g ∈ G such that Supp(g) ⊂ I and f g ∈ H. Since H is classful, there
is g1 ∈ G such that f g1 ∈ H. Now s(f g1 ) = g1 (s(f )) ∈ X. Notice that s(f ) ≥ t
since Supp(f ) ⊂ I. By condition B, there is g2 ∈ H such that g2 (g1 (s(f ))) = s(f ).
Then f g2 g1 = (f g1 )g2 is an element in H since f g1 ∈ H and g2 ∈ H. Moreover
f g2 g1 |I belongs to H(I) since it satisfies s(f g2 g1 ) = s(f ) ≥ t. Notice that s(f ) is a
fixed point of g2 g1 . Now by condition A(3), there is an element g ∈ G which is the
identity on [0, s(f )] and is equal to g2 g1 on [s(f ), 1]. Then we have f g = f g2 g1 ∈ H,
as is required.
For any X ∗ -interval I = [t, 1], choose a PL homeomorphism ψI : [0, 1] → I
such that ψI (X) = X ∩ (t, 1) and GψI = G(I) (condition A(4)). Since H(I) is
−1
−1
−1
classful in G(I), H(I)ψ is classful in G(I)ψ = G. By condition B, H(I)ψ acts
transitively on X. Therefore H(I) acts transitively on X ∩ (t, 1). This way we get
the following lemma.
Lemma 2.4. The classful subgroup H acts doubly transitively on X.
By the same argument as Lemma 2.3, applied to the inclusion of an X-interval
I = [t, t′ ] into an X ∗ -interval = [t, 1], we get the following.
Lemma 2.5. For any X-interval I of (0, 1), the group H(I) is a classful subgroup of G(I).
We shall discuss consequences of condition C. Let I0 be an X-interval such that
H|I0 = G(I0 ).
Lemma 2.6. We have H(I0 ) = G(I0 ).
Proof: Choose an arbitrary f |I0 ∈ G(I0 ), where f ∈ G with Supp(f ) ⊂
I0 . Then since H(I0 ) is classful in G(I0 ) (Lemma 2.5), there is g ∈ G such that
Supp(g) ⊂ I0 and f g ∈ H. Since g|I0 ∈ G(I0 ) = H|I0 , there is h ∈ H such that
h(I0 ) = I0 and h|I0 = g|I0 . Then since Supp(f ) ⊂ I0 , we have f g = f h , and hence
−1
f = (f g )h ∈ H. This, together with the assumption Supp(f ) ⊂ I0 , implies that
f |I0 ∈ H(I0 ).
Corollary 2.7. For any X-interval I in (0, 1), we have H(I) = G(I).
4
YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO
Proof. By double transitivity of the action of H on X (Lemma 2.4), there is
h ∈ H such that h(I0 ) = I. Now
H(I) = H(I0 )h = G(I0 )h = G(I),
as is required.
Finally we shall prove that H = G. Let
G0 = {g ∈ G | g ′ (0) = g ′ (1) = 1}, H0 = {h ∈ H | h′ (0) = h′ (1) = 1}.
Let {Jn }n∈N be an increasing sequence of X-intervals such that ∪n Jn = (0, 1).
We have
[
[
H0 =
H(Jn ) and G0 =
G(Jn ).
n∈N
n∈N
Since by the previous lemma, H(Jn ) = G(Jn ) for any n ∈ N, we get G0 = H0 .
Now for any f ∈ G, there is g ∈ G such that f g ∈ H. But then f g f −1 =
[g, f ] ∈ G0 ⊂ H, and therefore f ∈ H. This finishes the proof that if G satisfies
conditions A, B and C, then G is invariably generated.
In the rest of the paper, we use the following terminology.
Definition 2.8. For f ∈ P , an interval [0, ǫ] or [1 − ǫ, 1] on which f is linear
is called an end linear zone of f .
.
3. The group F
Let us denote by Z[2 ] ⊂ R the set of dyadic rationals. Thompson group F
is the subgroup of P consisting of all the elements with slopes in 2Z and breaks in
Z[2−1 ]. For F , we define X in the previous section as X = Z[2−1 ] ∩ (0, 1). It is
well known that F satisfies condition A. For A(4), we can take ψI to be any PL
homeomorphism from [0, 1] to I with slopes in 2Z and breaks in Z[2−1 ]. See [1] for
the existence.
−1
Definition 3.1. Define a homomorphisms α : F → Z2 by
α(f ) = (log2 f ′ (0), log2 f ′ (1)).
Notice that f ∈ Ker(α) if and only if Supp(f ) ⊂ (0, 1). It is well known [1]
that Ker(α) = [F, F ]. Of course α is a class function: α(f ) = α(f g ). Let
F1,−1 = {f ∈ F | f (x) > x, ∀x ∈ (0, 1), α(f ) = (1, −1)}.
Given f ∈ F1,−1 , points 2−i from an end linear zone of f at 0 are contained in a
single orbit of the hf i-action. Their images by high iterates of f which lie in an
end linear zone at 1 are of the form 1 − k2−j for some positive odd integer k.
Definition 3.2. Define a map β : F1,−1 → 2N − 1, by setting β(f ) to be the
above odd integer k.
Lemma 3.3. The map β is surjective.
INVARIABLE GENERATION
5
Proof. Let k ∈ 2N − 1 be given. Choose a large integer j, and define g ∈ F
by setting
g(x) = 2x on [0, 2−j ],
g(x) = 2−1 (x − 1) + 1 on [1 − k2−j .1],
and g is a PL homeomorphism with slopes in 2Z and breaks in Z[2−1 ] from the
interval [2−j , 2−j+1 ] to [2−j+1 , 1 − k2−j ]. Then we have β(g) = k.
Lemma 3.4. The map β is class invariant, that is, β(g f ) = β(g) for any
g ∈ F1,−1 and any f ∈ F .
Proof. Assume β(g) = k ∈ 2N − 1 for g ∈ F1,−1 . Then there is an orbit O
of g which contains 2−j and 1 − k2−j for any large j. Choose an arbitrary element
f ∈ F and assume that the slopes of f are 2j0 near 0 and 2j1 near 1. Then f maps
O to an orbit of g f which contains 2−j+j0 and 1 − k2−j+j1 for any large j, showing
that β(g f ) = k.
Let H be an arbitrary classful subgroup of F .
1.
Corollary 3.5. The map β restricted to H ∩ F1,−1 is surjective onto 2N −
The next lemma shows that condition B of Section 2 is satisfied by F .
Lemma 3.6. The classful subgroup H acts transitively on X = Z[2−1 ] ∩ (0, 1).
Proof. By Corollary 3.5, there is an element h0 ∈ H such that β(h0 ) = 1.
Thus for any large j, the points 2−j , as well as 1−2−j , are on one orbit of h0 . Again
by Corollary 3.5, the H orbit of these points contains 1 − ka−j for any k ∈ 2N − 1
and any large j. Applying negative iterates of h0 , we get that the H orbit contains
all the points in X.
We need more in order to establish condition C for F . For n large, let In =
[2−n−1 , 2−n ], Jn = [1 − 2−n , 1 − 2−n−1 ] and let φn : [0, 1] → In , ψn : [0, 1] → Jn be
the orientation preserving surjective linear map of slope 2−n−1 . Let
F1,−1,1 = {g ∈ F1,−1 | β(g) = 1}.
Given any g ∈ F1,−1,1 , if we choose n large enough, some iterate g N maps In onto
Jn . The map ψn−1 ◦ g N ◦ φn is independent of the choice of n. In fact, if k > 0,
g k φn+k = φn and g k ψn = ψn+k . Therefore we have
−1
−1
ψn+k
g N +2k φn+k = (ψn+k
g k )g N (g k φn+k ) = ψn−1 g N φn .
Notice also that ψn−1 g N φn is an element of F .
Definition 3.7. Define a map γ : F1,−1,1 → F by γ(f ) = ψn−1 ◦ g N ◦ φn .
Lemma 3.8. The map γ is surjective.
We shall adopt a bit longer proof, which is applicable also to the group P a in
the next section.
Proof. Choose an arbitrary element g ∈ F1,−1,1 which is linear on [0, 2−n ] and
[1−2−n, 1]. There is N > 0 such that g N maps In onto Jn . Let f0 = ψn−1 g N φn ∈ F .
Any element of F can be written as f f0 for some f ∈ F . The map fˆ = ψn f ψn−1
is a PL homeomorphism of the interval Jn with slopes in 2Z and breaks in Z[2−1 ].
6
YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO
Define an element g1 ∈ F1,−1,1 to be equal to fˆg on Jn−1 and equal to g elsewhere.
Notice that fˆg is still linear on [0, 2−n ] and [1 − 2−n , 1]. We also have
ψn−1 g1N φn = ψn−1 fˆg N φn = (ψn−1 fˆψn )(ψn−1 g N φn ) = f f0 .
Since f f0 is an arbitrary element of F , we are done.
Lemma 3.9. The map γ is class invariant. Precisely, if g ∈ F1,−1,1 and f ∈ F ,
then γ(g f ) = γ(g).
Proof. Choose n large enough so that g and f are linear on the intervals
[0, 2−n ] and [1 − 2−n , 1]. Since g ∈ F1,−1,1 , some iterate g N of g maps In to Jn .
Put k = γ(g) = ψn−1 g N φn , and let us show that γ(g f ) = k. We assume f is of slope
2j0 on [0, 2−n ] and of slope 2j1 on [1 − 2−n , 1]. Then g f is linear (of slope 2) on
[0, 2−n+j0 ], and is linear (of slope 2−1 ) on [1 − 2−n+j1 , 1]. The map g f maps In−j0
onto Jn−j1 . Since φn−j0 = f φn and ψn−j1 = f ψn , we have
−1
ψn−j
(g f )N φn−j0 = ψn−1 f −1 (f gf −1 )N f φn = ψn−1 g N φn = k.
1
If n is big enough compared with j0 and j1 , we have φn−j0 = (g f )j0 −j1 φn−j1 .
Therefore
−1
−1
k = ψn−j
(g f )N φn−j0 = ψn−j
(g f )N +j0 −j1 φn−j1 .
1
1
This shows γ(g f ) = k, as is required.
Corollary 3.10. The map γ restricted to H1,−1,1 = H ∩ F1.−1,1 is surjective
onto F .
Fix once and for all an element h0 ∈ H1,−1,1 such that γ(h0 ) = id. Thus there
is n > 0 such that h0 is linear on [0, 2−n ] and [1 − 2−n , 1], that some iterate hN
0
maps In onto Jn and that ψn−1 hN
0 φn = id. The next lemma shows that the group
F satisfies condition C of Section 2.
Lemma 3.11. We have H|In = F (In ).
ˆ
Proof: Choose an arbitrary element fˆ ∈ F (In ) and let f = φ−1
n f φn ∈ F . By
Corollary 3.10, there is h1 ∈ H1,−1,1 such that γ(h1 ) = f . More precisely, for some
−1 N
big m > 0, there is N > 0 such that hN
1 (Im ) = Jm and that ψm h1 φm = f . One
0
can choose m to be greater than n in the lemma. Then some iterate hN
of h0
0
N
−1
0
maps Im onto Jm and ψm h0 φm is still the identity. Thus
−N0 N
−1 N0
−1 N
φ−1
h1 φm = (ψm
h0 φm )−1 (ψm
h1 φm ) = id−1 f = f,
m h0
and since h0n−m φn = φm ,
m−n −N0 N
φ−1
(h0 h1 )h0n−m φn = f.
n h0
But this means
0 N
hm−n
(h−N
h1 )h0n−m |In = fˆ.
0
0
Since fˆ ∈ F (In ) is arbitrary and the LHS is in H|In , we are done.
INVARIABLE GENERATION
7
4. The group P a
Let a > 1 be an arbitrary real number.
Definition 4.1. Given two compact intervals I and J, we denote by P La (I, J)
the space of the PL homeomorphisms from I to J with slopes in aZ . Such a map
is called a P La homeomorphism.
Lemma 4.2. For any compact interval I and J, the space P La (I, J) is nonempty.
Proof. Let I = [p, q] and J = [r, s]. Consider a line L ⊂ R2 of slope an ,
n > 1, passing through the point (p, r), and another line L′ of slope a−m , m > 1,
passing through (q, s). If n and m are sufficiently large, L and L′ intersect at a
point in the open rectangle (p, q) × (r, s), yielding the graph of a desired map in
P La (I, J).
Definition 4.3. Define a group P a by P a = P La ([0, 1], [0, 1]).
We choose X = (0, 1) in condition A. Then the group P a satisfies A(1), A(2)
and A(3) by virtue of Lemma 4.2. For A(4), we just take ψI : [0, 1] → I to be
the orientation preserving linear homeomorphism. Therefore in this section, X ∗ intervals are just closed intervals. In the rest we shall establish conditions B and C
for P a by almost the same method as in Section 3.
Define a homomorphism α : P a → Z2 by
α(f ) = (loga f ′ (0), loga f ′ (1)).
Clearly α is a surjective class function. Let
a
P1,−1
= {g ∈ P a | g(x) > x, ∀x ∈ (0, 1), α(g) = (1, −1)}.
a
Given g ∈ P1,−1
, points a−i for i large are contained in a single orbit of g. Consider
their images by high iterates of g which are near 1. They are of the form 1 − ξa−j
for some number ξ ∈ (a−1 , 1].
a
→ (a−1 , 1], by setting β(g) to be the
Definition 4.4. Define a map β : P1,−1
above number ξ.
Then one can show that the map β is a surjective class function just as Lemmas
a
is surjective
3.3 and 3.4 in Section 3. In particular, the map β restricted to H ∩P1,−1
−1
a
onto (a , 1], where H is an arbitrary classful subgroup of P . Then by the same
method as Lemma 3.6, we get the following lemma, which establishes condition B.
Lemma 4.5. Any classful subgroup H acts transitively on (0, 1).
For a positive integer n, let In = [a−n−1 , a−n ], Jn = [1 − a−n , 1 − a−n−1 ]
and let φn : [0, 1] → In , ψn : [0, 1] → Jn be the orientation preserving linear
homeomorphism of the same slope a−n (1 − a−1 ). Let
a
a
P1,−1,1
= {g ∈ P1,−1
| β(g) = 1}.
a
Given any g ∈ P1,−1,1
, if we choose n large enough, then g is linear on the intervals
−n
a
[0, a ] and [1 − a−n , 1]. By the definition of P1,−1,1
, some iterate g N sends In to
Jn , and the map ψn−1 ◦ g N ◦ φn is independent of the choice of n. Notice also that
ψn−1 g N φn is an element of P a , since φn and ψn are linear homeomorphisms of the
same slope.
a
Definition 4.6. Define a map γ : P1,−1,1
→ P a by γ(f ) = ψn−1 ◦ g N ◦ φn .
8
YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO
One can show that the map γ is a surjective class function just as in Lemmas
a
3.8 and 3.9. Fix once and for all an element h0 ∈ H ∩ P1,−1,1
such that γ(h0 ) = id.
−n
Thus there is n > 0 such that h0 is linear on [0, a ] and [1 − a−n , 1], that some
−1 N
iterate hN
0 maps In onto Jn and that ψn h0 φn = id. Just as in Lemma 3.11, we
get the following lemma which establishes condition C.
Lemma 4.7. We have H|In = P a (In ).
5. The groups P and P Q
In this section, we mainly deal with the group P of all the orientation preserving
PL homeomorphisms of [0, 1]. In the last part, we remark one word for necessary
modifications with the group P Q . For P , put X = (0, 1) as in Section 4. Then
condition A is trivially fulfilled. Let H be an arbitrary classful subgroup of P . First
we shall establish conditions B.
Lemma 5.1. The group H acts transitively on (0, 1).
Proof. There is an element h0 ∈ H such that h′0 (0) = 2 and that h(x) > x
for any x ∈ (0, 1). Assume h0 (x) = 2x on the interval [0, 2−n ] for some n > 0.
The interval [2−n−1 , 2−n ] is a fundamental domain of the action of the group hh0 i.
Thus it suffices to show that for any ξ ∈ (2−1 , 1], there is an element of H which
maps 2−n to ξ2−n . Choose an element h1 ∈ H such that h′1 (0) = ξ. Assume h1 is
linear on an interval [0, 2−m ] for some m > n. Then h1 (2−m ) = ξ2−m , and hence
hm−n
h1 h0n−m (2−n ) = ξ2−n , as is required.
0
In the rest of this section, we shall establish condition C by the following lemma.
Lemma 5.2. For some closed interval I0 ⊂ (0, 1), we have H|I0 = P (I0 ).
For any closed interval I ⊂ [0, 1], denote by φI : [0, 1] → I the orientation
preserving bijective linear map. Define
P1,−1 = {g ∈ P | g(x) > x, ∀x ∈ (0, 1), g ′ (0) = 2, g ′ (1) = 2−1 }.
Let I (resp. J) be a fundamental domain of g ∈ P1,−1 contained in an end linear
zone of g (Definition 2.8) at 0 (resp. at 1). Thus I = [a, 2a] for some a > 0 and
J = [1 − 2b, 1 − b] for some b > 0. If there is N > 0 such that g N (I) = J, we say
N
that the pair I and J are monitoring intervals for g. The map f = φ−1
J g φI ∈ P
is called the information of g monitored by I and J. We also say that I and J
monitor the information f .
Definition 5.3. For any g ∈ P1,−1 , denote by I(g) ⊂ P the set of all the
monitored informations of g.
Lemma 5.4. For any f ∈ P , there is g ∈ P1,−1 such that f ∈ I(g).
Proof. The proof is almost the same as Lemma 3.8.
Lemma 5.5. Given g ∈ P1,−1 and f ∈ I(g), the intervals which monitor the
information f can be chosen arbitrarily near 0 and 1.
Proof. If the intervals I and J monitor the information f , and if n > 0, then
clearly the intervals g −n (I) and g n (J) monitor the same information f .
Lemma 5.6. If g ∈ P1,−1 and g1 ∈ P , then I(g g1 ) = I(g).
INVARIABLE GENERATION
9
Proof. Let g and g1 be as in the lemma, and let f ∈ I(g). It suffices to show
that f ∈ I(g g1 ). By Lemma 5.5, one can choose the monitoring intervals I, J of
g which monitor the information f in the end linear zones of g1 . Then g1 (I) and
g1 (J) are monitoring intervals of g g1 , with information f since φg1 (I) = g1 φI and
φg1 (J) = g1 φJ .
Corollary 5.7. For any f ∈ P , there is h ∈ H ∩P1,−1 such that f ∈ I(h).
Choose an element h0 ∈ H ∩ P1,−1 so that id ∈ I(h0 ), and let I0 and J0 be
monitoring intervals of h0 with information id. That is, there is N0 > 0 such that
−1 N0
0
ˆ
hN
0 (I0 ) = J0 and φJ0 h0 φI0 = id. Let f be an arbitrary element of P (I0 ), and let
−1 ˆ
f = φI0 f φI0 ∈ P . By Corollary 5.7, there is h1 ∈ H ∩ P1,−1 such that f ∈ I(h1 ).
1
Let I1 , J1 be the corresponding monitoring intervals: we assume hN
1 (I1 ) = J1 for
−1 N1
some N1 > 0 and φJ1 h1 φI1 = f . Put
I0 = [a, 2a], J0 = [1 − 2b, 1 − b], I1 = [c, 2c] and J1 = [1 − 2d, 1 − d]
for some a, b, c, d > 0. Choose an element h2 ∈ H such that h′2 (0) = c/a and
n
h′2 (1) = d/b. Choose a big n > 0 so that both intervals h−n
0 (I0 ) and h0 (J0 ) are in
−n
the end linear zones of h2 . Direct computation shows that h2 (h0 (I0 )) = h−n
1 (I1 )
and h2 (hn0 (J0 )) = hn1 (J1 ). See the figure.
I0
h0−n (I0 )
hn0
h2
h−n
1 (I1 )
hn0 (J0 )
J0
hn0
0
hN
0
I1
J1
1
hN
1
hn1
h2
hn1 (J1 )
hn1
N0
The equality φ−1
J0 h0 φI0 = id implies (cf. the proof of Lemma 5.5)
N0 +2n
φ−1
φh−n (I0 ) = id.
hn (J0 ) h0
0
0
Likewise we have
N1 +2n
φ−1
φh−n (I1 ) = f.
hn (J1 ) h0
1
1
These equalities show
N1 +2n
φ−1
h−N0 −2n φhn0 (J0 ) φh−1
φh−n (I1 ) = f.
n (J ) h0
1
h−n (I ) 0
0
1
1
0
h−n
0 (I0 )
Since h2 is linear on the intervals
and h2 φhn0 (J0 ) = φhn1 (J1 ) . Therefore
and
hn0 (J0 ),
we have h2 φh−n (I0 ) = φh−n (I1 )
0
1 +2n
φ−1
h−N0 −2n h2−1 hN
h2 φh−n (I0 ) = f.
1
h−n (I ) 0
0
Finally since
hn0 φh−n (I0 )
0
0
0
= φI0 , we get
−N0 −n −1 N1 +2n
h2 h1
h2 h−n
φ−1
0 φI0 = f.
I0 h0
This implies
N1 +2n
ˆ
h0−N0 −n h−1
h2 h−n
2 h1
0 |I0 = f .
1
10
YOSHIFUMI MATSUDA AND SHIGENORI MATSUMOTO
Since fˆ ∈ P (I0 ) is arbitrary, and the map on the LHS is from H|I0 , the proof of
Lemma 5.2 is now complete.
For the subgroup P Q of P consisting of all the elements with slopes and breaks
in Q, we define X = Q ∩ (0, 1). The argument for P Q is the same for P under
necessary modifications.
References
[1] J. M. Belk, Thompson’s group F , Thesis, Cornell University.
[2] M. Bestvina and K. Fujiwara, Handlebody subgroups in a mapping class group, preprint,
arXiv:1412.7847v2.
[3] T. Gelander, Convergence groups are not invariably generated, Int. Math. Res. Notices
19(2014), 9806-9814.
[4] T. Gelander, G. Golan and K. Juschenko, Invariable generation of Thompson groups,
preprint, arXiv:1611.08264v2.
[5] R. I. Grigorchuk, On Burnside’s problem on periodic groups, Funktional Anal. i Prilozhen
14(1980), 53-54.
[6] G. Higman, B. H. Neumann and H. Neumenn, Embedding theorems for groups, J. London
Math. Soc. 24(1949), 247-254.
[7] W. M. Kantor, A. Lubotzky and A. Shalev, Invariance generations on infinite groups, J.
Algebara 421(2015), 296-310.
[8] A. Yu. Ol’shanskii, Groups of bounded period with subgroups of prime order, Algebra i Logika
21(1982), 553-618.
[9] J. Wiegold, Transformation groups with fixed-point-free permutations, Arch. Math. (Basel)
27(1976), 473-475.
[10] J. Wiegold, Transformation groups with fixed-point-free permutations, II, Arch. Math. (Basel)
29(1977), 571-573.
Department of Physics and Mathematics, College of Science and Engineering,
Aoyama Gakuin University, 5-10-1 Fuchinobe, Chuo-ku, Sagamihara-shi, Kanagawa, 2525258
E-mail address: [email protected]
Department of Mathematics, College of Science and Technology, Nihon University, 1-8-14 Kanda-Surugadai, Chiyoda-ku, Tokyo, 101-8308 Japan
E-mail address: [email protected]
| 4math.GR
|
1
Linear Programming Bounds for Distributed
Storage Codes
Ali Tebbi† , Terence H. Chan‡ , Chi Wan Sung†
arXiv:1710.04361v1 [cs.IT] 12 Oct 2017
†
Department of Electronic Engineering, City University of Hong Kong
Email: {ali.tebbi,[email protected]}
‡
Institute for Telecommunications Research, University of South Australia
Email: [email protected]
Abstract
A major issue of locally repairable codes is their robustness. If a local repair group is not able to
perform the repair process, this will result in increasing the repair cost. Therefore, it is critical for a
locally repairable code to have multiple repair groups. In this paper we consider robust locally repairable
coding schemes which guarantee that there exist multiple alternative local repair groups for any single
failure such that the failed node can still be repaired locally even if some of the repair groups are not
available. We use linear programming techniques to establish upper bounds on the code size of these
codes. Furthermore, we address the update efficiency problem of the distributed data storage networks.
Any modification on the stored data will result in updating the content of the storage nodes. Therefore,
it is essential to minimise the number of nodes which need to be updated by any change in the stored
data. We characterise the update-efficient storage code properties and establish the necessary conditions
that the weight enumerator of these codes need to satisfy.
Index Terms
Robust locally repairable codes, update-efficient codes, linear programming
I. I NTRODUCTION
Significant increase in the internet applications such as social networks, file, and video sharing
applications, results in an enormous user data production which needs to be stored reliably. In a
An earlier conference versions of the paper appeared at ICICS 2013 [1] and ITW 2014 [2]. In this journal version, we present
more details on deriving linear programming bounds and update cost of storage codes.
2
data storage network, data is usually stored in several data centres, which can be geographically
separated. Each data centre can store a massive amount of data, by using hundreds of storage
disks (or nodes). The most common issue with all storage networks is failure. The failure in
storage networks is the result of the failed components which are varied from corrupted disk
sectors to one or a group of failed disks or even the entire data centre due to the physical
damages or natural disasters. The immediate consequence of failure in a storage network is
data loss. Therefore, a recovery mechanism must be in place to handle these failures. Protection
against failures is usually achieved by adding redundancies [3]. The simplest way to introduce
redundancy is replication. In this method multiple copies of each data block are stored in the
network. In the case of any failure in the network, the content of the failed node can be recovered
by its replica. Because of its simplicity in storage and data retrieval, this method is used widely
in conventional storage systems (e.g., RAID-1 where each data block is duplicated and stored
in two storage nodes) [4], [5]. However, replication is not an efficient method in term of the
storage requirement [6], [7].
Another method for data storage is erasure coding which has gained a wide attention in
distributed storage [8]–[12]. In this method as a generalisation of replication, a data block is
divided into K fragments and then encoded to N (N > K) fragments via a group of mapping
functions to store in the network [13]. Erasure coding is capable of providing more reliable
storage networks compared to replication with the same storage overhead [14]. It is noteworthy
to mention that replication can also be considered as an erasure code (i.e., repetition code [3]).
One of the challenges in storage networks using erasure codes is the repair bandwidth. When
a storage node fails, the replaced node (i.e., newcomer) has to download the information content
of the survived nodes to repair the lost data. In other word, the repair bandwidth of a distributed
storage network is the total amount of the information which is needed to be retrieved to recover
the lost data. Compared to the replication, It has been shown in [14] that for the same system
parameters such as mean time to failure (MTTF), erasure coding reduces the storage overhead
and the repair bandwidth significantly.
From coding theory, it is well known that in a storage network employing an erasure code
for data storage the minimum amount of information which has to be downloaded to repair a
single failure is at least the same size of the original data [13]. In other words, the amount of
data transmitted in the network to repair a failed node is much more than the storage capacity
of the node. Regenerating codes which have been introduced in [15] provide coding techniques
3
to reduce the repair bandwidth by increasing the number of nodes which the failed node has to
be connected during the repair procedure. It has been shown that there exists a tradeoff between
the storage and repair bandwidth in distributed storage networks [15]. Many storage codes in
literature assume that lost data in a failed data centre can be regenerated from any subset (of
size greater than a certain threshold) of surviving data centres. This requirement can be too
restrictive and sometimes not necessary. Although these methods reduce the repair bandwidth,
it seems that high I/O traffic is the bottleneck of these networks. The number of nodes which
involve in repairing a failed node is defined as the code locality [16]. The concept of code
locality relaxes the repairing requirement so that any failed node can be repaired by at least one
set (of size smaller than the threshold) of surviving nodes. We refer to these sets as the ”local
repair groups”. Moreover, any erasure code which satisfies this property is referred as ”locally
repairable code”.
One significant issue of locally repairable codes is their robustness. Consider a distributed
storage network with N storage nodes such that there exists only one local repair group for
each node in the network. Therefore, if any node fails, the survived nodes in its repair group can
locally repair the failure. However, if any other node in the repair group is also not available (for
example, due to the heavy loading), then the repair group cannot be able to repair the failed node
anymore which will result in increase of repair cost. To avoid this problem, it is essential to have
multiple local repair groups which can be used for repairing the failure if additional nodes fail or
become unavailable in the repair groups. The concept of locally repairable codes with multiple
repair groups (or alternatives) was studied in [17] where codes with multiple alternatives were
also constructed. Locally repairable code construction with multiple disjoint repairing groups
was investigated in [18]. In [19], locally repairable codes with multiple erasure tolerance have
been constructed using combinatorial methods. A lower bound on the code size was derived
and some code examples provided which are optimal with respect to this bound. A class of
locally repairable codes with capability of repairing a set of failed nodes by connecting to a set
of survived nodes are studied in [20]. Bounds on code dimension and also families of explicit
codes were provided.
The main contributions of this paper are as follows:
•
We investigate the linear (r, Γ, ζ, β) robust locally repairable codes where any failed node
can be repaired by ζ different repair groups at the presence of any Γ extra failures in the
network. Moreover, these codes can tolerate any β simultaneous failures.
4
•
By employing the criteria from the definition of our robust locally repairable codes, we
establish a linear programming bound to upper bound the code size.
•
We investigate the update efficiency of storage codes. In an erasure code, each encoded
symbol is a function of the data symbols. Therefore, the update complexity of an erasure
code is proportional to the number of encoded symbols that have to be changed in regard
of any change in the original data symbols. In other words, in a storage network the content
of the storage nodes must be updated by any change in the stored data. We characterise the
properties of update-efficient storage codes and establish the necessary conditions that the
code need to satisfy.
This work is partially presented in 2013 9th International Conference on Information, Communications & Signal Processing (ICICS) [1] and 2014 IEEE Information Theory Workshop (ITW)
[2]. This work presents more detailed discussions on characterising robust locally repairable and
update-efficient storage codes.
The remaining of the paper is organised as follows. In Section II, we review the related works
on the locally repairable codes. In Section III, we introduce our robust locally repairable codes
and propose their criteria. In Section IV, we establish a linear programming problem to upper
bound the code size. We also exploit symmetry on the linear programming bound to reduce its
complexity. Section V studies the update efficiency of the locally repairable codes. We establish
the necessary conditions for distributed storage codes in order to satisfy the locality and update
efficiency at the same time. Examples and numerical results are provided in Section VI. The
paper then concludes in Section VII.
II. BACKGROUND
AND
R ELATED WORKS
The high I/O overhead in regenerating codes due to use N − 1 storage nodes to minimise the
repair bandwidth, seems to be the bottleneck of the storage networks. Therefore, the number
of nodes which help to repair a failed node is a major metric to measure the repair cost in
storage networks. Locally repairable codes aim to optimise this metric (i.e., the number of
helper nodes needed to repair a failed node). The locality of a code is defined as the number of
code coordinates r such that any code coordinate is a function of them [16]. Consequently, in a
storage network employing a locally repairable code, any failed node can be repaired using only
r survived nodes. In the case of the linear locally repairable storage codes which are the topic
of this paper, the content of any storage node is a linear combination of the contents of a group
5
of r other nodes. Usually two types of code locality are defined in the literature as information
symbol locality and all symbol locality which means that just the information symbols in a
systematic code have locality r and all symbols have locality r, respectively. In this paper, the
code locality is referred to all symbol locality since we do not impose any systematic code
constraint on the locally repairable storage codes.
The problem of storage codes with small locality has been initially proposed in [21]–[23],
independently. The pyramid codes introduced in [21] are an example of initial works on practical
locally repairable storage codes. A basic pyramid code is constructed using an existing erasure
code. An MDS erasure code will be an excellent choice in this case, since they are more tolerable
against simultaneous failures. To construct a pyramid code using an MDS code, it is sufficient
to split K data blocks into
K
r
disjoint groups. Then, a parity symbol is calculated for each group
as a local parity. In other words, one of the parity symbols from the original code is split into
K
r
blocks and the other parity symbols are kept as global parities. Therefore, any single failure
in data nodes can be repaired by r survived nodes in the same group instead of retrieving data
from K nodes. Generally, for a pyramid code with data locality r constructed from an (N, K, d)
MDS code, the code length (i.e., number of storage nodes) is
1
+ d − 2.
N =K 1+
r
(1)
Obviously, low locality is gained in the cost of ( Kr − 1) extra storage. To obtain all symbol
locality for the code, it is sufficient to add a local parity to each group of the global parities of
size r where will result in a code length of
1
N = (K + d − 2) 1 +
.
r
Both of the code lengths in (1) and (2) show a linear increase in storage overhead.
(2)
The pioneer work of Gopalan et al. in [16] is an in-depth study of codes locality which results
in presenting a trade-off between the code length N, data block size K, minimum distance of
code d, and code locality r. It has been shown that for any [N, K, d]q linear code with information
locality r,
K
N −K ≥
+ d − 2.
(3)
r
In other words, to have a linear storage code with locality r, we need a linear overhead of at
least Kr + d − 2. As a special case of locality r = K, the bound in (3) is reduced to
N −K ≥d−1
(4)
6
which is the singleton bound and is achievable by MDS codes such as Reed-Solomon codes.
According to (1) and (2), pyramid codes can achieve the bound in (3) which shows their
optimality.
Due to their importance in minimising the number of helper nodes to repair a single failure,
locally repairable codes have received a fair amount of attention in literature. Different coding
schemes to design explicit optimum locally repairable codes has been proposed in [24]–[26].
For the bound in (3), the assumption is that any storage node has entropy equal to α =
is also mentioned that low locality r << K affects the distance d indicated by term
K
.
r
M
.
K
It
It has
been shown in [27] that there exist erasure codes which have high distance and low locality if
storage nodes store an additional information of factor 1r , such that
K
K
−
+ 2,
d≤N−
1+ǫ
r (1 + ǫ)
(5)
where ǫ > 0.
The main issue with locally repairable codes is that they mostly tend to repair a single node
failure. This means that if any of the helper nodes in the repairing group of a failed node is
not available, the locally repair process will be failed. Therefore, it is critical to have multiple
repairing groups for each node in the storage network. The concept of locally repairable codes
with multiple repair alternatives has been studied initially in [17]. The main idea in [17] is to
obtain the parity check matrix of the code from a partial geometries. However, there are only a
few such explicit codes due to the limited number of known constructions of partial geometries
with desirable parameters. A lower and upper bound is also obtained for the rate of these
codes with different locality and repair alternativity. Rawat et al. investigated the availability in
storage networks employing locally repairable codes [18]. The notion of availability is useful
for applications involving hot data since it gives the ability of accessing to a certain information
by different users simultaneously. Therefore, each information node must have t disjoint repair
groups of size at most r (i.e., (r, t)-Information local code). An upper bound for the code
minimum distance has been obtained in [18] as
dmin ≤ N − K + 1 −
Kt
−t ,
r
(6)
which is a generalised version of the bound in (3). However, this bound only stands for information symbols availability with the assumption of only one parity symbol for each repair
7
group. Different bounds on the rate and minimum distance of storage codes with locality r and
availability t have been obtained independently in [28] as
1
j=1 1 +
K
≤Q
t
N
and
1
jr
t
X
K −1
.
d≤N−
i
r
i=0
(7)
(8)
The minimum distance upper bound in (8) reduces to (3) for t = 1. However, the bounds in (6)
and (8) seem to be incomparable since the bound in (8) is tighter than (6) in some cases and
vice versa.
An upper bound on the codebook size of locally repairable codes which is dependent on the
alphabet size has been obtained in [29] as
i
h
(q)
K ≤ min tr + Kopt (n − t(r + 1), d)
t∈Z+
(9)
(q)
where, Kopt is the maximum dimension of a linear or non-linear code of length N and minimum
distance d with alphabet size of q. This bound is tighter than the bound in (3).
Locally repairable codes with small availability t = 2, 3 are investigated in [30]. The smallest
the availability the highest the code rate would be since the dependency among the code symbols
is less while the code is still comparable to the practical replication codes. The rate optimal
binary (r, t)-availability codes are designed and it has been shown that for (r, 2)-availability
codes which their rate is upper bounded by
K
N
≤
r
r+2
for N ≥ r + 1 and r + 1 | 2N in [31],
such a construction is unique. The equality on the boubd holds if and only if the code is a direct
, r + 1] codes, each generated by the complete graph on r + 2 points.
sum of [ (r+1)(r+2)
2
The locally repairable codes with multiple (ri , δi )-localities are presented in [32]. The locally
repairable codes with (r, δ)-locality are first introduced in [33] where any systematic code symbol
can be recovered by at most r other code symbols even if there exists δ − 2 other failures. The
minimum distance of these codes is upper bounded as
K
d ≤N −K +1−
− 1 (δ − 1).
r
(10)
Note that (10) is reduced to (3) for δ = 2. Locally repairable codes with multiple localities are
introduced in [34] and [35] such that coded symbols have different localities. An upper bound
8
on the minimum distance of these codes with multiple locality of the information symbols is
derived as
d≤N −K−
r
X
Kj
j=1
j
+ 2,
where, Kj is the number of the information symbols with locality j. The work in [32] is a
generalisation of [33] and [34]. Locally repairable codes with multiple (ri , δi )-localities ensures
different locality for coded symbols at the presence of extra failures. A Singleton-like bound on
the minimum distance has been derived and explicit codes have been proposed.
Notation: Let N = {1, 2, 3, . . . , N} and 2N be the set of all possible subsets of N . In this
paper we represent a subset ν of N as a binary vector w = [w1 , . . . , wn ] such that wi = 1 if
and only if i ∈ N . In our convention, ν and w can be used interchangeably. Similarly, we use
zero vector 0 to present an empty set ∅. Also, we will make no distinction between an index i
and {i} for a single element set.
III. L INEAR L OCALLY R EPAIRABLE C ODES
A. Linear Storage Codes
Let FN
q = {[z1 , . . . , zN ] : zi ∈ Fq for all i ∈ N } be the vector space of all N-tuples over the
field Fq . A linear storage code C generated by a K × N full rank (i.e. rank K) generator matrix
G is a subspace of FN
q over the field Fq . Here, K is the dimension of the subspace. The linear
is defined as the set of all linear combinations (i.e. spans) of the row
code C = uG : u ∈ FK
q
vectors of the generator matrix G.
To store a data block of size M in a storage network using a linear code C, the original data
is first divided into k data blocks of size M/K. We may assume without loss of generality that
the original data is a matrix with M/K rows and k columns. Then each block (or row) will
be encoded using the same code. In this paper, we may assume without loss of generality that
there is only one row (and thus M = K). Let u = M be the information to be stored. Then the
storage node i will store the symbol ugi where gi is the ith column of the generator matrix G.
Notice that if Xi is the content that the storage node i stores, then (X1 , . . . , XN ) is a codeword
in C. To retrieve the stored information, it is sufficient to retrieve the information content of
K nodes (which are indexed by I) such that the columns gi for i ∈ I are all independent.
Specifically,
u = cI G−1
I
(11)
9
where cI is the row vector whose ith entry equals to ugi and GI is a submatrix of the generator
matrix G formed by the columns gi for i ∈ I.
Definition 1 (Support). For any vector c = [c1 , . . . , cN ] ∈ FN
q , its support λ(c) is defined as a
subset of N = {1, . . . , N} such that i ∈ λ(c) if and only if ci 6= 0.
For a linear storage code C over Fq , any codeword c is a vector of n symbols [c1 , . . . , cN ]
where ci ∈ Fq for all i = 1, . . . , N. Since we assume that code C is linear, for any codeword
c ∈ C the vector ac for all a ∈ Fq and a 6= 0 is also a codeword in C. Therefore, there exists at
least q − 1 codewords in C with the same support (excluding the zero codeword).
Definition 2 (Support Enumerator). The support enumerator ΛC (w) of the code C is the number
of codewords in C with the same support w, i.e.,
ΛC (w) , |{c ∈ C : λ(c) = w}| ,
∀w ⊆ N .
The support enumerator of a code is very useful to characterise the relation between a code
C and its dual code C ⊥ via MacWilliam theorem, hence we aim to bound the size of the
locally repairable codes using the dual code properties. Any linear code C can be specified
by a (N − K) × N parity check matrix H which is orthogonal to the generator matrix G such
that
GH ⊤ = 0,
where 0 is a K × (N − K) zero matrix. Then, this parity check matrix H can generate another
linear code C ⊥ called dual code. It is well known that
⊤
C ⊥ = h ∈ FN
q : hc = 0 for all c ∈ C .
In other words, a linear code C can be uniquely determined by its dual code C ⊥ . The number of the
codewords in C ⊥ for any support w (i.e., support enumerator ΛC ⊥ (w)) can also be determined
uniquely by the support enumerator ΛC (w) of the code C via the well-known MacWilliams
identities.
There are various variation or extensions of MacWilliams identity, all based on association
scheme. In the following, we will restate the MacWilliam identity.
10
Proposition 1 (MacWilliams identity [3]). Let C be an (N, K) linear code and C ⊥ be its dual.
Then for any codeword support w = [w1 , . . . , wN ] ⊆ N ,
1
ΛC ⊥ (w) =
|C|
X
s=[s1 ,...,sN
ΛC (s)
]∈2N
N
Y
κq (sj , wj ) ≥ 0
(12)
j=1
where
1
κq (s, w) = q − 1
−1
if w = 0
if s = 0 and w = 1
(13)
otherwise.
Remark 1. Here, subsets w and s of N are considered as binary vectors with nonzero coordinates corresponding to the indices indexed in them.
In the next subsection we will show the significance of dual code support enumerator in our
definition of robust locally repairable codes.
B. Locality of Linear Storage Codes
A linear storage code has locality r, if for any failed node i, there exists a group of survived
nodes of size at most r (i.e., repair group) such that the failed node can be repaired by this group
of nodes [16]. To be precise, consider a linear code C and its dual code C ⊥ . Let h = [h1 , . . . , hN ]
and c = [c1 , . . . , cN ] be the codewords in C ⊥ and C, respectively. Then, from the definition of
the dual code
hc⊤ = 0,
∀h ∈ C ⊥ , c ∈ C.
(14)
hj Xj = 0,
(15)
Consequently,
X
j∈λ(h)
where λ(h) is the support of the dual codeword h. Now, if the node i fails and i ∈ λ(h), the
content of the failed node can be recovered from the set of surviving nodes indexed by λ(h) \ i.
P
In particular, Xi = −h−1
i
j∈λ(h)\i Xj hj . As such, the set λ(h) \ i can be seen as a repair group
for node i.
Definition 3 (Locally repairable code [27]). An (r, β) locally repairable code C is a linear code
which satisfies
11
1) Local Recovery (LR). for any i ∈ N , there exists h ∈ C ⊥ such that i ∈ λ(h) and
|λ(h)| − 1 ≤ r.
2) Global Recovery (GR). ΛC (w) = 0, for all w ⊆ N such that 1 ≤ |w| ≤ β.
For a (r, β) locally repairable code, the local recovery criterion implies that any failed node i,
can always be repaired by retrieving the contents stored in at most r nodes. On the other hand,
the global recovery criterion guarantees that the storage network can be regenerated as long as
there are at most β simultaneous node failures.
Remark 2. The LR criterion requires the existence of a set of r surviving nodes which can be
used to repair a failed node. However, under the criteria, there is no guarantee that a failed
node can still be efficiently repaired1 if a few additional nodes also fail (or become unavailable).
Therefore, it is essential to have alternative repair groups in case of multiple node failures.
Definition 4 (Robust locally repairable code). An (r, β, Γ, ζ) robust locally repairable code is a
linear code satisfying the following criteria:
1) Robust Local Recovery (RLR). for any i ∈ N and γ ⊂ N \ i such that |γ| = Γ, there
exists h1 , . . . , hζ ∈ C ⊥ such that for all j = 1, . . . , ζ,
a) i ∈ λ(hj ), γ ∩ λ(hj ) = ∅, and |λ(hj )| − 1 ≤ r.
b) λ(hj ) 6= λ(hℓ ) for ℓ 6= j.
2) Global Recovery (GR). ΛC (w) = 0, for all w ⊆ N such that 1 ≤ |w| ≤ β.
The RLR criterion guarantees that a failed node can be repaired locally from any one of the
ζ groups of surviving nodes of size r even if Γ extra nodes fail. In the special case when Γ = 0,
then the robust locally repairable codes are reduced to locally repairable codes with multiple
repair alternatives as in [17]. When ζ = 1, then it further reduces to the traditional locally
repairable codes. The GR criterion is the same as that for locally repairable codes.
IV. L INEAR P ROGRAMMING B OUNDS
One of the most fundamental problems in storage network design is to optimise the tradeoff
between the costs for storage and repair. For a storage network using an (N, K) linear code
1
Strictly speaking, by the GR criterion, the failed node can still be repaired if there are no more than β node failures.
However, the global recovery cannot guarantee that each failed node can be repaired efficiently. In other words, one may need
a much larger set of surviving nodes to repair one failed node.
12
the capacity of each node is
M
K
where M is the information size. In other words, the storage
cost (per information per node) is given by
M
.
logq |C|
Since our coding scheme is linear locally
repairable, a group of r nodes participate in repairing a failed node. Thus, the repair cost of a
single failure is given by
rM
.
logq |C|
Consequently, by maximising the codebook size |C| the cost
will be minimised.
In this section, we will obtain an upper bound for the maximal codebook size, subject to
robust local recovery and global recovery criteria in Definition 4.
Theorem 1. Consider any (r, β, Γ, ζ) robust locally repairable code C. Then, |C| is upper
bounded by the optimal value of the following optimisation problem.
P
maximize
w⊆N Aw
subject to
Aw ≥ 0
Bw =
P
s⊆N
Q
κq (sj ,wj )
As n
P j=1
s⊆N As
∀w ⊆ N
∀w ⊆ N
Bw ≥ 0
∀w ⊆ N
Aw = 0
1 ≤ |w| ≤ β
A∅ = 1
X
Bs ≥ ζ(q − 1)
(16)
∀i ∈ N , γ ∈ ∆i
s∈Ωi :γ∩s=∅
where Ωi is the collection of all subsets of N that contains i and of size at most r + 1 and ∆i
is the collection of all subsets of N \ i of size at most Γ.
Proof. Let C be a (r, β, Γ, ζ) robust locally repairable code. Then, we define
Aw , ΛC (w),
Bw , ΛC ⊥ (w),
w⊆N
w ⊆ N.
The objective function of the optimisation problem in (16) is the sum of the number of all
codewords with support w, which is clearly equal to the size of the code C. Since Aw and Bw
are enumerator functions of the code C and C ⊥ respectively, Aw , Bw ≥ 0 for all w ⊆ N . The
constraint A∅ = 1 follows from the fact that the zero codeword is contained in any linear code.
P
The second constraint follows from (12) by substituting |C| and ΛC (s) with s⊆N As and As ,
respectively. The fourth constraint follows directly from GR criterion which says that there are
no codewords with support of size ≤ β (i.e., the minimum distance of code is d = β + 1).
13
Finally, the last constraint follows from the RLR criterion. Since the repair groups are specified
by dual code C ⊥ , this constraint bounds the number of codewords in the dual code with support
of size at most r + 1. The support of the corresponding codewords must contain the index of
the failed node i chosen from set Ωi . However, none of the extra failed nodes indexed in γ can
be included in these supports. As mentioned earlier, due to the fact that C is a linear code, for
any nonzero h ∈ C ⊥ , then ah ∈ C ⊥ for all nonzero a ∈ Fq . Let w = λ(h). Then, Bw ≥ (q − 1)
(i.e., there exist at least q − 1 codewords in dual code with support w). Consequently,
X
Bw ≥ ζ(q − 1).
s∈Ωi :γ∩s=∅
In other words, this constraint guarantees that there exist at least ζ repair groups to locally repair
a failed node at the presence of |γ| = Γ extra failures. Therefore, (Aw , Bw : w ⊆ N ) satisfies
the constraints in the maximisation problem in (16) and the theorem follows.
The optimisation problem in Theorem 1 derives an upper bound on the codebook size |C|
(i.e., Code dimension k) of a robust linear locally repairable code with minimum distance of
d = β + 1 over Fq such that any failed node can be repaired with a repair group of size r at
the presence of any Γ extra failure. Although the maximisation problem in (16) is not a linear
programming problem, it can be converted to one easily with a slight manipulation as follows:
P
maximize
w⊆N Aw
subject to
Aw ≥ 0
P
Qn
j=1 κq (sj , wj ) ≥ 0
s⊆N As
∀w ⊆ N
∀w ⊆ N
1 ≤ |w| ≤ β
Aw = 0
A∅ = 1
X
w∈Ωi :γ∩w=∅
X
As
s⊆N
≥ ζ(q − 1)
n
Y
κq (sj , wj )
j=1
P
w⊆N
(17)
!
Aw
∀i ∈ N , γ ∈ ∆i .
The complexity of the linear programming problem in (17) will increase exponentially with
the number of storage nodes N. In the following, we will reduce the complexity of the Linear
Programming problem in (17) by exploiting the symmetries.
To this end, suppose a (r, β, Γ, ζ) linear storage code C is generated by the matrix G with
columns gi , i = 1, 2, . . . , N. Let SN be the symmetric group on N whose elements are all
14
the permutations of the elements in N which are treated as bijective functions from the set of
symbols to itself. Clearly, |SN | = N!. Let σ be a permutation on N (i.e., σ ∈ SN ). Together
with the code C, each permutation σ defines a new code C σ specified with the generator matrix
columns fi , i = 1, 2, . . . , N, such that for all i ∈ N , fi = gσ(i) . Since all the codewords are
the linear combinations of the generator matrix rows and the permutation σ just changes the
generator matrix columns position, the permutation cannot affect the minimum distance of the
code (i.e., every codeword cσ ∈ C σ is just a permuted version of the corresponding codeword
c ∈ C). Therefore, the code C σ is still a (r, β, Γ, ζ) linear storage code and we have the following
proposition.
Proposition 2. Suppose (aw : w ⊆ N ) satisfies the constraint in the optimisation problem (17).
For any σ ∈ SN , let
(aσw : w ⊆ N ) = aσw = aσ(w) ,
where σ(w) , {σ(i) : i ∈ w}. Then (aσw : w ⊆ N ) also satisfies the constraint in (17).
Corollary 1. Let
a∗w =
1 X σ
a .
|SN | σ∈S w
N
Then (a∗w : w ⊆ N ) satisfies the constraint in (17) and
X
X
a∗w =
aw .
w⊆N
w⊆N
Proof. From Proposition 2, for any feasible solution (aw : w ⊆ N ) in (17), there exists |SN |
σ(i)
feasible solutions (aw : w ⊆ N , and σ (i) ∈ SN ). Since (17) is a linear programming problem,
a∗w (the average of all feasible solutions) is also a feasible solution. The result then follows.
Proposition 2 can be used to reduce the complexity in solving the optimisation problem (17).
Proposition 3. If |w| = |s|, then a∗w = a∗s .
Proof. Direct verification due to symmetry.
By Proposition 2, it is sufficient to consider only “symmetric” feasible solution (a∗w : w ⊆ N ).
Therefore, we can impose additional constraint
Aw = As ,
∀|w| = |s|.
(18)
15
to (17) without affecting the bound. These equality constraint will significantly reduce the number
of variables in the optimisation problem. Specifically, we have the following theorem.
Theorem 2. Consider a (r, β, Γ, ζ) robust locally repairable code C. Then, |C| is upper bounded
by the optimal value in the following maximisation problem
Maximize
N
X
N
t
t=0
at
Subject to
at ≥ 0,
P PN −t t N −t
ai+j (−1)i (q − 1)t−i
bt = ti=0 j=0
i
j
bt ≥ 0,
Pβ
a =0
t=1 t
a0 = 1
N
r
X
X
N
N −1−Γ
at .
bt+1 ≥ ζ(q − 1)
t
t
t=0
t=1
∀t = 0, . . . , N
∀t = 0, . . . , N
∀t = 0, . . . , N
(19)
Proof. Due to Proposition 3, we can simplify the LP in (17) by rewriting the variables as follows:
at = Aw
bt = Bw
for t = |w|
!
X
As
for t = |w|.
s⊆N
Using the new variables, the objective function (i.e., the number of codewords in code C) is
reduced to sum of the number of codewords with a support of size t (i.e., at ) multiplied by the
number of subsets with size t (i.e., Nt ) on all t = 0, . . . , N.
The first constraint follows by the fact that the number of codewords with support of size t
is not negative. For any w ⊆ N with the size of t, the second constraint corresponds to that the
number of codewords in dual code C ⊥ is nonnegative.
To rewrite the second constraint, notice that
N
Y
j=1
κ(sj , wj ) = (−1)|s∩w| (q − 1)|w−s|
(20)
16
for any pair (s, w) such that |s ∩ w| = i and |w − s| = t − i. In addition, the number of s such
that |s ∩ w| = i and |w − s| = t − i is equal to
t N −t
.
j
i
The third constraint follows by the fact that the number of codewords in dual code C ⊥ with
support of size t is not negative. The forth constraint follows from the GR criterion and is
equivalent to the third constraint in (17). According to the GR criterion, there exist no codewords
with the support size ≤ β (i.e., at = 0, 1 ≤ t ≤ β). Since (at ≥ 0, ∀t = 0, . . . , N), then
Pβ
t=1 at = 0. The constraint a0 = 1 is equivalent to the fourth constraint in (17) which states
that there exists only one codeword in code C with a support of size t = 0 (i.e., zero codeword).
The last constraint is equivalent to the last constraint in (17) which follows from the RLR
criterion where there are N −1−Γ
subsets (i.e., supports) of size t chosen from (N − 1 − Γ)
t
survived nodes.
Remark 3. The number of variables and constraint now scales only linearly with N (the number
of nodes in the network).
V. C OST
FOR
U PDATE
In previous sections, criteria evaluating performance of storage codes include 1) storage
efficiency, 2) local recovery capability and 3) global recovery capability. However, data are
rarely static but will be updated from time to time. The fundamental question is how efficient
an scheme can be?
A. Update Model and Code Definition
To answer this question, we assume that the data M consists of multiple files of identical
size. In our previous model, we assume that each file will be encoded using the same storage
code. Therefore, to update each file, one needs make request to each individual storage node to
update the content (regarding that updated file) stored there, leading to excessive overheads.
In this section, we consider a variation of our scheme in the sense that we treat each systematic
codeword symbol as a single file (which can be updated individually). The whole collection of
files will still be robust and efficient as in the original model. However, one can now consider the
problem of update as a single systematic codeword symbol and evaluate how many parity-check
codeword symbols are required to be updated.
17
Definition 5 (Update-efficient storage code). A K-symbol update-efficient storage code is specified by a K × (N + K) generator matrix G with columns (g1 , . . . , gN +K ) which satisfy the
following criteria:
1) Pseudo-Systematic – The submatrix formed by the columns (gN +1 , . . . , gN +K ) is an identity
matrix.
2) Full Rank: The matrix formed by (g1 , . . . , gN ) is full rank (i.e., of rank equal to K).
The first N columns correspond to the ”coded symbols” stored in the N storage nodes, while
the last K columns correspond to the K source symbols. Let [u1 , . . . , uK ] be the K source
symbols. In our context, each source symbol may correspond on a file which can be separately
updated. Then, any codeword c = [c1 , . . . , cN , cN +1 , . . . , cN +K ] in the update efficient storage
code C is generated by
ci =
K
X
uj gj,i ,
∀i = 1, . . . , N + K,
j=1
where gi = [g1,i , . . . , gK,i]⊤ . However, only the first N coordinates of the codeword c will be
stored in the network. Therefore, for any i ∈ N the content of the storage node Xi , is the coded
symbol ci . In particular,
Xi =
K
X
uj gj,i ,
∀i = 1, . . . , N.
(21)
j=1
For any vector v = [v1 , . . . , vN +K ], we will often rewrite it as v = [v1 , v2 ] where
v1 = [v1 , . . . , vN ] and v2 = [vN +1 , . . . , vN +K ].
Definition 6 (support). For any vector v = [v1 , v2 ] where
v1 = [v1 , . . . , vN ] and v2 = [vN +1 , . . . , vN +K ],
its support λ(v) is defined as two subsets (w1 ⊆ N , w2 ⊆ K) where
i ∈ w1 if vi 6= 0
i ∈ w2 if vi+N 6= 0,
and K = {1, . . . , K}. As before, it is also instrumental to view w1 and w2 as binary vectors
w1 = [w1,1 , . . . , w1,N ] and w2 = [w2,1 , . . . , w2,K ] such that w1,i = 1 if vi 6= 0 and w2,i = 1 if
vi+N 6= 0.
18
K
N
...
...
..
.
g1,N
g2,N
..
.
gK,1 . . .
gK,N
g1,1
g2,1
G= .
..
0 ... 0
1 . . . 0
.. . . .. K
. .
.
0 0 ... 1
1
0
..
.
Fig. 1. Generator matrix of an update efficient storage code.
K
N
p1,1
..
.
pN −K,1
H=
pN −K+1,1
..
.
pN,1
...
..
.
...
...
..
.
p1,K
..
.
pN −K+1,K
..
.
1 ...
.. . .
.
.
0 ...
0 ...
.. . .
.
.
...
pN,K
0 ...
pN −K,K
0 0 ...
.. .. . .
.
. .
1 0 ...
0 1 ...
.. .. . .
.
. .
0 0 ...
0
..
N −K
.
0
0
..
. K
1
Fig. 2. Parity check matrix of an update efficient storage code.
Lemma 1. Let G be the generator matrix of an update efficient storage code, as depicted in
Figure 1. Then
1) For any i = 1, . . . , K, there exists a dual codeword h = (h1 , h2 ) such that all entries of
h2,j is non-zero if and only if j 6= i.
2) The rank of the last K column of the parity check matrix must be K.
3) If h = (h1 , h2 ) is a dual codeword, and h2 is non-zero, then h1 must be non-zero as well.
4) If c = (c1 , c2 ) is a codeword, and c2 is non-zero, then c1 must be non-zero as well.
Proof. Rank of G is clearly K and hence rank of H must be N. By construction, the first N
columns of G has rank K. This implies 1), which in turns also implies 2). Next, 3) follows from
that the last K columns of G has rank K. Finally, 4) follows from that the matrix formed by
(g1 , . . . , gN ) is of rank K.
Remark 4. Assume without loss of generality that the last N columns of the generator matrix
G has rank N. We can assume that the parity check matrix H of the update-efficient storage
code can be taken the form in Figure 2 such that for any 1 ≤ ℓ ≤ K, the N − K + ℓth row of
19
H has at least two non-zero entries. In other words, entries pN −K+ℓ,1, . . . , pN −K+ℓ,K cannot be
all zero.
Proposition 4 (Code Properties). Let C be a K-symbol update efficient locally repairable code.
Then
(22.a)
(22.b)
P
w2 ⊆K:|w2 |≥1 ΛC (0, w2 )
P
=0
w2 ⊆K:|w2 |≥1 ΛC ⊥ (0, w2 )
=0
P
|w2 | N −K
(22.c)
q
,
∀w2 ⊆ K, |w2 | ≥ 0
w1 ⊆N ΛC ⊥ (w1 , w2 ) = (q − 1)
P
|w2 |
(22.d)
,
∀w2 ⊆ K, |w2 | ≥ 0
w1 ⊆N ΛC (w1 , w2 ) = (q − 1)
(22.e) Λ (0, 0) = Λ ⊥ (0, 0) = 1
C
C
(22)
Proof. Direct verification from the generator matrix and the parity check matrix in Figures 1
and 2, respectively.
Definition 7 (Update efficient locally repairable storage code). A K − symbol update efficient
locally repairable code C is a (r, β, δ) storage code if satisfies the following criteria:
1) Local Recovery (LR): for any i ∈ {1, . . . , N}, there exists h = [h1 , h2 ] ∈ C ⊥ where
h1 = [h1 , . . . , hN ] and h2 = [hN +1 , . . . , hN +K ] such that i ∈ λ(h1 ), λ(h2 ) = ∅, and
|λ(h1 )| − 1 ≤ r.
2) Global Recovery (GR): ΛC (w1 , w2 ) = 0, for all w1 ⊆ N such that 1 ≤ |w1 | ≤ β and
w2 ⊆ K.
3) Efficient Update (EU): For any w2 ⊆ K and |w2 | = 1,
∀w1 ⊆ N and |w1 | > δ.
ΛC (w1 , w2 ) = 0,
The LR criterion guarantees that for any failed node Xi there exists a local repair group
specified by the support of the first N symbols of the corresponding dual codeword. In other
words, while
hc⊤ =
N
+K
X
hi ci = 0,
i=1
only (h1 , . . . , hN ) and (c1 , . . . , cN ) are participating in the repair process such that
N
X
i=1
hi Xi = 0.
20
Therefore, the support of h1 = [h1 , . . . , hN ] specifies the repair groups while h2 must be a zero
vector. The GR criterion guarantees that the stored data is recoverable at the presence of severe
failure pattern. More specifically, in the worst case of β simultaneous node failures, data stored
in the network can still be repaired from the survived nodes. Finally, the EU criterion ensures
that if any of the source symbols is modified, then no more than δ storage nodes need to be
updated. In particular, for any singleton w2 , there exists a unique w1 such that
X
ΛC (w1′ , w2 ) = q − 1.
ΛC (w1 , w2 ) =
w1′
The w1 corresponds to codewords where only the single data file (indexed by the support of
w2 ) is non-zero. In that case, if the data file has been changed, only the codeword symbols
corresponding to the support of w1 need to be updated. In order to maintain the update cost
efficiency (i.e., equal or less than δ nodes per any source symbol change), the code C must not
include any codeword with support |w1 | > δ for any |w2 | = 1.
Proposition 5. For a (r, β, δ) update efficient locally repairable code C, we have
P
(23.a)
w1 ⊆N :ℓ∈w1 and |w1 |≤r+1 ΛC ⊥ (w1 , ∅) ≥ (q − 1), ∀ℓ ∈ N
(23.b) ΛC (w1 , w2 ) = 0,
∀w1 ⊆ N , w2 ⊆ K, 1 ≤ |w1 | ≤ β
(23.c) ΛC (w1 , w2 ) = 0,
∀w1 ⊆ N and |w1 | > δ and |w2 | = 1
(23)
Remark 5. It is worth to notice that these parameters may depend on each other. For example,
it can be directly verified that there is no (r, β, δ) storage code where β ≥ δ.
Remark 6. For notation convenience, we will first consider only the case of local recovery.
However, the extension to include robust local recovery is straightforward. We will present the
results afterwards.
The following theorem characterises an update efficient locally repairable code based on its
generator matrix specifications in Definition 7.
Theorem 3 (Necessary condition). Let C be a (N, K, r, β, δ) update-efficient locally repairable
21
storage code.
(C1)
(C2)
(C3)
(C4)
(C5)
(C6)
Then there exists (Aw1 ,w2 , Cw1 ,w2 : w1 ⊆ N , w2 ⊆ K) such that
P
QN +K
κq (sj , wj ),
∀w1 ⊆ N , w2 ⊆ K
Cw1 ,w2 = s1 ⊆N ,s2⊆K As1 ,s2 j=1
Aw1 ,w2 ≥ 0,
∀w1 ⊆ N , w2 ⊆ K
Cw1 ,w2 ≥ 0,
∀w1 ⊆ N , w2 ⊆ K
A∅,w2 = 0
∀w2 ⊆ K, |w2 | ≥ 1
C∅,w2 = 0
P
|w2 | N
q ,
w1 ⊆N Cw1 ,w2 = (q − 1)
P
|w2 |
(C7)
,
w1 ⊆N Aw1 ,w2 = (q − 1)
(C8) A∅,∅ = 1,
(C9) C∅,∅ = q K ,
P
K
(C10)
w1 ⊆N :ℓ∈w1 and |w1 |≤r+1 Cw1 ,∅ ≥ (q − 1)q ,
(C11) Aw1 ,w2 = 0,
(C12) Aw1 ,w2 = 0,
∀w2 ⊆ K, |w2 | ≥ 1
∀w2 ⊆ K, |w2 | ≥ 0
(24)
∀w2 ⊆ K, |w2 | ≥ 0
∀ℓ ∈ N
∀1 ≤ |w1 | ≤ β
∀|w1 | > δ, |w2 | = 1
Proof. Let C be a (r, β, δ) update efficient linear storage code. We define
Aw1 ,w2 , ΛC (w1 , w2 )
(25)
Cw1 ,w2 , q K ΛC ⊥ (w1 , w2 ).
(26)
Constraint (C1) follows directly from the MacWilliams identity in Proposition 1. Constraint (C2)
and (C3) follow from (25) and (26) and that enumerating functions are non-negative. Constraints
(C4) - (C9) are consequences of Proposition 4 and Constraints (C10)-(C12) are due to Proposition
5.
As before, the constraints in (24) are overly complex. Invoking symmetry, we will to simplify
the above set of constraints.
Proposition 6. Suppose the generator matrix specified with the column vectors (g1 , . . . , gN +K )
defines a (r, β, δ) code C. For any σ1 ∈ SN (i.e., symmetric group of N ) and σ2 ∈ SK (i.e.,
symmetric group of K), let C σ1 ,σ2 be another code specified by (fi , i = 1, . . . , N + K) such that
fi = gσ1 (i)
fN +j = gN +σ2 (j)
for i ∈ N
for j ∈ K.
22
Then C σ1 ,σ2 is still a (r, β, δ) code.
Proof. Let c = [c1 , c2 ] be a codeword in C where c1 = [c1 , . . . , cN ] and c2 = [cN +1 , . . . , cN +K ].
Then, the vector cσ1 ,σ2 = [cσ1 1 , cσ2 2 ] is a codeword in C σ1 ,σ2 where cσ1 1 = [σ1 (c1 ), . . . , σ1 (cN )] and
cσ2 2 = [cN +σ2 (1) , . . . , cN +σ2 (K) ]. In other words, any codeword cσ1 ,σ2 ∈ C σ1 ,σ2 is a permutation of
a codeword c ∈ C for all σ1 ∈ SN and σ2 ∈ SK . Equivalently, the new code C σ1 ,σ2 is obtained
from C by relabelling or reordering the codeword indices. The proposition thus follows.
Corollary 2. Suppose (aw1 ,w2 , cw1 ,w2 : w1 ⊆ N , w2 ⊆ K) satisfies (24). Let
X X
1
a∗w1 ,w2 =
aσ1 (w1 ),σ2 (w2 )
|SN ||SK | σ ∈S σ ∈S
1
c∗w1 ,w2 =
1
|SN ||SK | σ
N
2
K
X X
1 ∈SN
(27)
cσ1 (w1 ),σ2 (w2 ) .
(28)
σ2 ∈SK
Then (a∗w1 ,w2 , c∗w1 ,w2 : w1 ⊆ N , w2 ⊆ K) also satisfies (24). Furthermore, for any w1 , s1 ⊆ N
and w2 , s2 ⊆ K such that |w1 | = |s1 | and |w2 | = |s2 |. Then
a∗w1 ,w2 = a∗s1 ,s2
(29)
c∗w1 ,w2 = c∗s1 ,s2 .
(30)
Proof. From Proposition 6, if (aw1 ,w2 , cw1 ,w2 : w1 ⊆ N , w2 ⊆ K) satisfy constraints (24),
then (aσ1 (w1 ),σ2 (w2 ) , cσ1 (w1 ),σ2 (w2 ) : w1 ⊆ N , w2 ⊆ K) will satisfy them for all σ1 ∈ SN and
σ2 ∈ K. Since all the constraints in (24) are convex, any convex combination of all these feasible
solutions is still feasible. Hence, (a∗w1 ,w2 , c∗w1 ,w2 : w1 ⊆ N , w2 ⊆ K) is still feasible. Also,
{(σ1 (w1 ), σ2 (w2 )) : ∀σ1 ∈ SN , σ2 ∈ SK } = {(σ1 (s1 ), σ2 (s2 )) : ∀σ1 ∈ SN , σ2 ∈ SK }
if |w1 | = |s1 | and |w2 | = |s2 | for any w1 , s1 ⊆ N and w2 , s2 ⊆ K.
Theorem 4 (Necessary condition). Let C be a (N, K, r, β, δ) update-efficient storage code. Then
there exists real numbers (at1 ,t2 , ct1 ,t2 : t1 = 0, . . . , N, t2 = 0, . . . , K) satisfying (31).
23
(D1)
(D2)
(D3)
(D4)
(D5)
(D6)
ct1 ,t2 =
Pt1
u1 =0
at1 ,t2 ≥ 0,
u2 =0
v1 =0
PK−t2
v2 =0
Ξ(u1 , v1 , u2 , v2 )au1 +v1 ,u2 +v2
∀0 ≤ t1 ≤ N, 0 ≤ t2 ≤ K
ct1 ,t2 ≥ 0,
∀0 ≤ t1 ≤ N, 0 ≤ t2 ≤ K
a0,t2 = 0,
∀t2 ≥ 1
c0,t2 = 0
PN
N
∀t2 ≥ 1
t1 =0
(D7)
(D8)
(D9)
(D10)
(D11)
(D12)
PN −t1 Pt2
PN
t1 =0
t1
N
t1
a0,0 = 1,
ct1 ,t2 = (q − 1)t2 q N ,
∀t2
at1 ,t2 = (q − 1)t2 ,
∀t2
c0,0 = q K
Pr+1 N −1
t1 =2
t1 −1
ct1 ,0 ≥ (q − 1)q K
at1 ,t2 = 0,
∀1 ≤ t1 ≤ β
at1 ,1 = 0,
∀t1 > δ
(31)
where
Ξ(u1 , v1 , u2 , v2 ) = (−1)
u1 +u2
(q − 1)
t1 +t2 −u1 −u2
k − t2
t2
N − t1
t1
.
v2
u2
v1
u1
Proof. The theorem is essentially a direct consequence of Theorem 3 and Corollary 2, which
guarantees that there exists a “symmetric” feasible solution (a∗w1 ,w2 , c∗w1 ,w2 : w1 ⊆ N , w2 ⊆ K)
satisfying (24). Due to symmetry, we can rewrite a∗w1 ,w2 as at1 ,t2 and c∗w1 ,w2 as ct1 ,t2 where
t1 = |w1 | and t2 = |w2 |. The set of constraints in (31) is basically obtained by rewriting (24)
and grouping like terms. Most rephrasing is straightforward. The more complicated one is (D1),
where we will show how to rewrite it.
Recall the constraint (C1) in (24)
Cw1 ,w2 =
X
s1 ⊆N ,s2 ⊆K
Let |w1 | = t1 , |w2 | = t2 . For any
As1 ,s2
NY
+K
κq (sj , wj ),
∀w1 ⊆ N , w2 ⊆ K.
(32)
j=1
0 ≤ u1 ≤ t1 , and 0 ≤ v1 ≤ N − t1
(33)
0 ≤ u2 ≤ t2 , and 0 ≤ v2 ≤ K − t2 ,
(34)
24
the number of pairs of (s1 , s2 ) such that
u1 = |w1 ∩ s1 | and v1 = |s1 \ w1 |
u2 = |w2 ∩ s2 | and v2 = |s2 \ w2 |
is equal to
K − t2
t2
N − t1
t1
.
v2
u2
v1
u1
Also, for each such pair, by (20),
NY
+K
κq (sj , wj ) = (−1)u1 +u2 (q − 1)t1 +t2 −u1 −u2 .
j=1
Grouping all like terms together, (32) can be written as in (D1) in (31).
Notice that the complexity of the constraints in Theorem 3 is increased exponentially by the
number of the storage nodes N and the number of the information symbols K. However, the
symmetrisation technique which is applied to the constraints significantly reduces the number
of the variables to 2(N + 1)(K + 1).
Remark 7. Theorem 4 can be used to prove the existence of an updated efficient code, which
in turn can be used to search and determine performance bounds for the codes.
Remark 8. In the previous linear programming bound, we consider only the local recovery
criteria. Extension to robust local recovery criteria is similar.
For the robust local recovery criteria, recall from Definition 4, it requires that for any failed
node i ∈ N and additional Γ failed nodes γ, there exists at least ζ dual codewords (with different
supports).
In other words, for any i ∈ N and γ ⊂ N \ i such that |γ| = Γ,
X
ΛC ⊥ (w1 , ∅) ≥ ζ(q − 1).
(35)
w1 ⊆N ,i∈w1 ,γ∩w1 =∅
As before, the constraint can be rewritten as follows, after symmetrisation
r+1
X
N −Γ−1
ct1 ,0 ≥ ζ(q − 1)q K .
t
−
1
1
t =2
1
(36)
25
VI. N UMERICAL R ESULTS A ND D ISCUSSION
In this section, we present two examples of robust locally repairable codes. We will show that
these codes can repair a failed node locally when some of the survived nodes are not available.
Using our bound, we prove that these codes are optimal.
Example 1: Consider a binary linear storage code of length n = 16 with k = 9 as defined by
the following parity check equations
0 = P1 + C 1 + C 2 + C 3
(37)
0 = P2 + C 4 + C 5 + C 6
(38)
0 = P3 + C 7 + C 8 + C 9
(39)
0 = P4 + C 1 + C 4 + C 7
(40)
0 = P5 + C 2 + C 5 + C 8
(41)
0 = P6 + C 3 + C 6 + C 9
(42)
0 = P7 + C 1 + C 2 + C 3
+ C4 + C5 + C6
+ C7 + C8 + C9 .
(43)
Here, (C1 , . . . , C9 , P1 , . . . , P7 ) correspond to the content stored at the 16 nodes. In particular,
we might interpret that C1 , . . . , C9 are the systematic bits while P1 , . . . , P7 are the parity check
bits. The code can also be represented by Figure 3. In this case, the parity check equations are
equivalent to that the sum of rows and the sum of columns are all zero.
According to (37)-(43), every failed node (either systematic or parity) can be recovered by
two different repair groups of size r = 3. For instance, if C1 is failed, it can be repaired by
repair group RC1 1 = {C2 , C3 , P1 } or repair group RC2 1 = {C4 , C7 , P4 }. Notice that the two repair
groups are disjoint. Therefore, even if one of the repair groups is not available, there exists an
alternative repair group to locally repair the failed node.
It can be verified easily that our code has a minimum distance of 4 and it is a (3, 3, 1, 1)
robust locally repairable code. Therefore, any failed node can be repaired by at least ζ = 1
repairing group of size r = 3 in the presence of any Γ = 1 extra failure. Also, the original data
can be recovered even if there are β = 3 simultaneous failure. In fact, it is also a (3, 3, 0, 2)
robust locally repairable code.
26
Group 1
C1
C2
C3
P1
C4
C5
C6
P2
C7
C8
C9
P3
P4
P5
P6
P7
Group 2
Fig. 3. A (3,3,1,1) robust locally repairable code of length N = 16 and dimension K = 9.
Now, we will use the bound obtained earlier to show that our code is optimal. We have plotted
our bound in Figure 4 when n = 16 and β = 3. The horizontal axis is the code locality (i.e.,
r) and the vertical axis is the dimension of the code (or log |C|). From the figure, when r = 3,
the dimension of a (3, 3, 1, 1) robust locally repairable code is at most 9. And our constructed
code has exactly 9 dimensions. Therefore, our code meets the bound and is optimal. In fact,
our bound also indicates that the dimension of a (3, 3, 0, 2) robust locally repairable code is
also at most 9. Therefore, our code is in fact an optimal (3, 3, 1, 1) and (3, 3, 0, 2) robust locally
repairable code.
Maximum numb er of data blocks
11
Γ =0 and ζ=2
Γ =1 and ζ=1
10
r =3
k=9
9
8
7
0
1
2
3
4
5
6
7
8
9
10
11
12
Repairing group size r
Fig. 4. Upper bounds for (3, 3, Γ, ζ) binary robust locally repairable code of length n = 16.
27
Example 2: Consider a binary linear code of length n = 8 and dimension k = 4 defined by the
following parity check equations:
P1 = C 1 + C 2 + C 3
(44)
P2 = C 1 + C 2 + C 4
(45)
P3 = C 2 + C 3 + C 4
(46)
P4 = C 1 + C 3 + C 4
(47)
Again, C1 , . . . , C4 are the information bits while P1 , . . . , P4 are the parity check bits. The code
can be represented by Figure 5. The above parity check equations imply that the sum of any
node and its three adjacent nodes in Figure 5 is always equal to zero.
This code has a minimum distance of 4. According to the Equations (44)-(47), for every single
node failure, there exists 7 repair groups with size r = 3. For example, suppose C1 fails. Then,
the repair groups are
R1C1 = {3, 4, 8}, R2C1 = {2, 4, 6}, R3C1 = {2, 3, 5}
R4C1 = {2, 7, 8}, R5C1 = {3, 6, 7}, R6C1 = {4, 5, 7}
R7C1 = {5, 6, 8}
Hence, our code is a (3, 3, 0, 7) robust locally repairable code. Furthermore, it can be directly
verified that for any distinct i, j 6= 1,
ℓ : i 6∈ RℓC1
and
=4
ℓ : {i, j} ∩ RℓC1 = ∅
(48)
= 2.
(49)
Therefore, if any one of the surviving nodes is not available, (48) implies that there are still 4
alternative repair groups. This means that our code is also a (3, 3, 1, 4) robust locally repairable
code. Similarly, by (49), our code is also a (3, 3, 2, 2) robust locally repairable code.
As shown in our bound (see Figure 6), our code has the highest codebook size for the given
parameters among all binary (3, 3, 0, 7), (3, 3, 1, 4) and (3, 3, 2, 2) robust locally repairable codes.
28
1
6
C1
5
2
P1
C2
8
3
C3
P2
4
P4
C4
7
P3
Fig. 5. A robust locally repairable code of length n = 8 and dimension k = 4 with ζ = 7 repair group for any failure.
Maximum numb er of data blocks k
4
r =3
k =4
Γ=0 and ζ=7
Γ=1 and ζ=4
Γ=2 and ζ=2
3
2
1
1
2
3
4
Repairing Group Size r
Fig. 6. Upper bounds for (3, 3, Γ, ζ) binary robust locally repairable code of length n = 8.
VII. C ONCLUSION
In this paper, we characterised the coding scheme for robust locally repairable storage codes.
This coding scheme overcomes a significant issue of the locally repairable codes which is their
repair inefficiency under the circumstances when there exist extra failures or unavailability in the
network. This coding scheme guarantees the local repairability of any failure at the presence of
extra failures by constructing multiple local repair groups for each node in the network. In this
29
case, if any of the repair groups is not available during the repair process, there exist alternative
groups to locally repair the failed node. We also established a linear programming problem to
upper bound the size of these codes. This practical bound can optimise the trade-off between
different parameters of the code such as minimum distance, code length, locality, the number of
alternative repair groups, and the number of the extra failures.
The update efficiency of the storage networks was addressed. We characterised an update
efficient storage code such that any changes in the stored data will result in a small number of
node updates. The necessary conditions was established which can be used to prove the existence
of an updated efficient code.
We also showed how the symmetries in the codes can be exploit to significantly reduce the
complexity of the constraints in the linear programming problem and in the necessary conditions.
R EFERENCES
[1] T. H. Chan, M. A. Tebbi, and C. W. Sung, “Linear programming bounds for storage codes,” in 9th International Conference
on Information, Communication, and Signal Processing (ICICS 2013), Dec. 2013.
[2] M. A. Tebbi, T. H. Chan, and C. Sung, “Linear programming bounds for robust locally repairable storage codes,” in proc.
Information Theory Workshop (ITW), 2014 IEEE, Nov. 2014, pp. 50–54.
[3] F. J. Macwilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, North Holland, Amsterdam, 1977.
[4] W. J. Bolosky, J. R. Douceur, D. ELY, and M. Theimer, “Feasibility of a serverless distributed file system deployed on an
existing set of desktop pcs,” in Proc. of Sigmetrics, June 2000.
[5] P. Druschel and A. Rowstron, “Storage management and caching in past, a large-scale, persistent peer-to-peer storage
utility,” in Proc. of ACM SOSP, 2001.
[6] Y. Chen, J. Edler, A. Goldberg, S. S. A. Gottlieb, and P. Yianilos, “Prototype implementation of archival intermemory,”
in Proc. of IEEE ICDE, Feb. 1996, pp. 485–495.
[7] S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz, “Maintenance free global storage
in oceanstore,” in Poc. of IEEE Internet Computing, 2001, pp. 40–49.
[8] D. A. Patterson, G. Gibson, and R. Katz, “A case for redundant arrays of inexpensive disks (raid),” Computer Science
Division, Department of Electrical Engineering and Computer Science, University of California, Berkeley, CA 94720,
Tech. Rep. CSD-87-391, Dec. 1987.
[9] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer,
C. Wells, and B. Zhao, “Oceanstore: An architecture for global-scale persistent storage,” in Proc. 9th Int. Conf. Architectural
Support Programm. Lang. Oper. Syst., Boston, MA, Nov. 2000, pp. 190–201.
[10] R. Bhagwan, K. Tati, S. S. Y. Cheng, and G. Voelker, “Total recall: System support for automated availability management,”
in Proc. NSDI ’04.
[11] M. Blaum, J. Brady, J. Bruck, and J. Menon, “Evenodd: An efficient scheme for tolerating double disk failures in raid
architectures,” IEEE Trans. Inf. Theory, vol. 44, pp. 192–202, 1995.
[12] M. Blaum, J. Bruck, and A. Vardy, “Mds array codes with independent parity symbols,” IEEE Trans. Inf. Theory, vol. 42,
pp. 529–542, 1996.
30
[13] S. B. Wicker, Error Control Systems for Digital Communication and Storage. Englewood Cliffs, NJ: Prentice Hall, 1995.
[14] H. Weatherspoon and J. D. Kubiatowicz, “Erasure coding vs. replication: A quantitative comparison,” in Proc. Int. Workshop
Peer-to-Peer Syst., 2002.
[15] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage
systems,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539–4551, Sep 2010.
[16] P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin, “On the locality of codeword symbols,” IEEE Trans. Inf. Theory,
vol. 58, no. 11, pp. 6925–6934, Nov. 2012.
[17] L. Pamies-Juarez, H. D. Hollmann, and F. Oggier, “Locally repairable codes with multiple repair alternatives,” in proc.
IEEE Int. Symp. Information Theory, 2013, pp. 892–896.
[18] A. S. Rawat, D. S. Papailiopoulos, A. G. Dimakis, and S. Vishwanath, “Locality and availability in distributed storage,”
in proc. IEEE Int. Symp. Information Theory, 2014, pp. 681–685.
[19] A. Wang and Z. Zhang, “Repair locality from a combinatorial perspective,” in proc. IEEE Int. Symp. Information Theory,
July 2014, pp. 1972–1976.
[20] A. S. Rawat, A. Mazumdar, and S. Vishwanath, “On cooperative local repair in distributed storage,” in 48th Annual
Conference on Information Sciences and Systems (CISS), March 2014, pp. 1–5.
[21] C. Huang, M. Chen, and J. Li, “Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data
storage systems,” Microsoft Research, Tech. Rep. MSR-TR-2007-25, March 2007.
[22] F. Oggier and A. Datta, “Self-repairing homomorphic codes for distributed storage systems,” in proc. IEEE INFOCOM,
2011, pp. 1251–1223.
[23] D. Papailiopoulos, J. Luo, A. Dimakis, C. Huang, and J. Li, “Simple regenerating codes: Network coding for cloud storage,”
in proc. IEEE INFOCOM, March 2012, pp. 2801–2805.
[24] I. Tamo, D. Papailiopoulos, and A. Dimakis, “Optimal locally repairable codes and connections to matroid theory,” in
proc. IEEE Int. Symp. Information Theory, Istanbul, July 2013, pp. 1814–1818.
[25] N. Silberstein, A. Rawat, O. Koyluoglu, and S. Vishwanath, “Optimal locally repairable codes via rank-metric codes,” in
proc. IEEE Int. Symp. Information Theory, Istanbul, July 2013, pp. 1819–1823.
[26] I. Tamo and A. Barg, “A family of optimal locally recoverable codes,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp.
4661–4676, July 2014.
[27] D. S. Papailiopoulos and A. G. Dimakis, “Locally repairable codes,” in proc. IEEE Int. Symp. Information Theory,
Cambridge, MA, July 2012, pp. 2771–2775.
[28] I. Tamo and A. Barg, “Bounds on locally recoverable codes with multiple recovering sets,” in proc. IEEE Int. Symp.
Information Theory, Honolulu, HI, July 2014, pp. 691–695.
[29] V. Cadambe and A. Mazumdar, “An upper bound on the size of locally recoverable codes,” in proc. Int. Symp. Network
Coding (NetCod), Calgary, AB, June 2013, pp. 1–5.
[30] S. Kadhe and R. Calderbank, “Rate optimal binary linear locally repairable codes with small availability,” in Proc. IEEE
Int. Symp. Information Theory, Aachen, Germany, June 2017, pp. 166–170.
[31] N. Prakash, V. Lalitha, and P. Kumar, “Codes with locality for two erasures,” in Proc. IEEE Int. Symp. Information Theory
(ISIT), June 2014, pp. 1962–1966.
[32] B. Chen, S.-T. Xia, and J. Hao, “Locally repairable codes with multiple (ri , δi )-localities,” in Proc. IEEE Int. Symp.
Information Theory (ISIT), Aachen, Germany, June 2017, pp. 2038–2042.
[33] N. Prakash, G. M. Kamath, V. Lalitha, and P. V. Kumar, “Optimal linear codes with a local-error-correction property,” in
Proc. IEEE Int. Symp. Information Theory (ISIT), Cambridge, MA, U.S.A., Jul. 2012, pp. 2776–2780.
31
[34] A. Zeh and E. Yaakobi, “Bounds and constructions of codes with multiple localities,” in Proc. IEEE Int. Symp. Information
Theory (ISIT), Barcelona, Spain, Jul. 2016, pp. 640–644.
[35] S. Kadhe and A. Sprintson, “Codes with unequal locality,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Barcelona,
Spain, Jul. 2016, pp. 435–439.
| 7cs.IT
|
An accurate finite element method for the
numerical solution of isothermal and
incompressible flow of viscous fluid, part I:
computational analysis
arXiv:1709.00913v2 [cs.CE] 21 Mar 2018
B. Emek Abali
∗†
Abstract
Despite its numerical challenges, finite element method is used to compute viscous fluid flow. A consensus
on the cause of numerical problems has been reached; however, general algorithms—allowing a robust and
accurate simulation for any process—are still missing. Either a very high computational cost is necessary
for a direct numerical solution (DNS) or some limiting procedure is used by adding artificial dissipation
to the system. These stabilization methods are often applied relative to the element size such that a local
monotonous convergence cannot be observed. We need a computational strategy for solving viscous fluid
flow using only the balance equations. In this work, we present a general procedure solving fluid mechanics
problems without use of any stabilization or splitting schemes. Hence its generalization to multiphysics
applications is straight-forward. We discuss several numerical problems and present the methodology rigorously. Implementation is achieved by using open-source packages and the accuracy as well as the robustness
is demonstrated by comparing results to the closed-form solutions and by solving benchmarking problems.
1 Introduction
Isothermal flow of viscous fluid is governed by balance equations of mass and linear momentum:
∂ρ ∂vi ρ
+
=0,
∂t
∂xi
∂ρvj
∂
+
vi ρvj − σij = ρgj ,
∂t
∂xi
(1)
in Cartesian coordinates, where ρ denotes the mass density, vi the velocity, σij the non-convective flux term
(Cauchy’s stress), gi the specific supply (gravitational forces); here and henceforth we apply Einstein’s summation convention to repeated indices. In the case of Newtonian fluids such as water, oil, or alcohol, a linear
relation for stress furnishes the governing equations with accurate detail. This linear relation is the well-known
Navier–Stokes equation:
σij = (−p + λdkk )δij + 2µdij ,
dij =
∂vj
1 ∂vi
+
,
2 ∂xj
∂xi
(2)
with the material constants λ, µ; and a new parameter p called hydrostatic pressure. Consider a control volume
initially filled with homogeneous water, i.e., initial mass density is constant in space. Under conventional
pressure differences, we assume an incompressible flow, thus, the mass density remains constant in time. For
the constant (in space and time) mass density, we obtain from the mass balance,
∂vi
=0,
∂xi
(3)
which is used for computing the pressure p. For an incompressible flow, the mechanical pressure − 13 σii becomes
identical to the hydrostatic pressure p such that we handle p as the pressure generated in a pump. Velocity and
∗ Corresponding
† Technische
author, email: [email protected]
Universität Berlin, Institute of Mechanics
1
pressure fields have to satisfy Eqs. (1)2 and (3).
In analytical mechanics, the aforementioned equations are fulfilled locally (in every infinitesimal point in
space). For a computation we discretize the space, for example with elements in finite size called the finite element method (FEM). Within each element, the analytical functions for the unknowns vi and p are represented
by form (shape) functions with a local support, i.e., by means of a discrete element. The shape functions are
not smooth, they belong to C n with a finite n. In other words, the unknowns are finitely differentiable and
depending on the governing equations and constitutive relations—from the mathematical analysis in [7]—we
know that the correct choice of the form functions for velocity and pressure is of paramount importance for a robust computation. This so-called Ladyzhenskaya–Babuska–Brezzi (inf-sup compatibility) condition (LBB
condition) tells us how to adjust the shape functions of velocity and pressure in the case of an isothermal and
incompressible flow. The prominent Taylor–Hood element is often used for the isothermal and incompressible
fluid flow problems. If one wants to include temperature deviation and electromagnetism into the computation,
we fail to know the corresponding LBB condition for all shape functions (velocity, pressure, temperature, and
electromagnetic fields). For practical purposes, a robust computation without exploiting the LBB condition is
useful for a straight-forward extension to multiphysics applications.
Within a finite element, the governing equations are satisfied globally (over the domain of the element).
There exists a general assumption that we can use the same local governing equations holding globally in finite
elements; however, this strategy leads to several numerical problems and to various proposals in [11, 29, 30, 48,
45, 21, 10, 13, 25], for a review of such suggestions see [37]. These so-called stabilization methods introduce
a numerical parameter depending on the underlying mesh. This parameter induces an artificial viscosity in
the direction of the velocity change for suppressing and eliminating the numerical oscillations. Otherwise, a
computation is not possible since the numerical oscillations cause divergence of any numerical solution scheme.
There are several successful implementations as in [32, 42, 31, 19, 28, 36, 20, 6]. From a practical point of view,
such a stabilization method is very useful; however, introducing numerical parameters is problematic. These
parameters are mesh dependent or they need to be tuned depending on the application. Tunable parameters
cannot be measured such that an error estimation is not possible and most of the methods are conditionally
stable, see [8]. A computation depending on the mesh size fails to show a local convergence, see references in
[12] about accuracy problems of different techniques. We need to design a computation strategy for viscous
fluid flows by using only physical (measurable) parameters such that a local monotonous convergence can be
achieved by using FEM.
Indeed, numerical strategies exist for performing accurate simulations without numerical parameters. By
using small elements—smaller than the characteristic length scale, for example Kolmogorov scale—we can
overcome the numerical problems. This direct numerical simulation (DNS) is accurate and robust; however, it is
often not feasible without access to super-computers. There is another class of so-called splitting or projection
methods such as Chorin’s method or its derivatives as in [17, 46, 47, 24, 9, 49, 14]. These methods are reliable
but it is challenging to adopt a splitting method in multiphysics.
The briefly mentioned problems are well known in the literature such that various new computation methods
are suggested for viscous flow problems. The (numerical) parameter free approach in [18] shows 2D and 3D
results for stationary viscous flows without the nonlinear convection term (often called Stokes’s problem).
Based on this idea an under-integrated mass matrix is used in [26, 34] to perform simulations without stabilization terms in 2D. Several mesh-dependent stabilization terms and their connections to mesh-independent
stabilization methods are investigated in [15]. In [40] vorticity is used instead of velocity such that a new kind
of splitting scheme is proposed for solving 3D problems. In [2] balance equations of mass, momentum, angular
momentum, and energy are used for performing 3D computations without numerical parameters; however, the
method already uses the energy equation making a generalization for the non-isothermal case quite difficult.
In [41] vorticity is introduced as an independent term ensuring that the balance of moment of momentum
is satisfied, only in 2D numerical solutions are performed without necessitating any (numerical) parameters.
In [16] different strategies are performed for establishing 3D simulations. They are all based on writing the
nonlinear convection term in a different (mathematically equivalent) form. In [22] a gradient-velocity-pressure
formulation is suggested to solve 2D numerical experiments.
In this work, we discuss a special yet general case, namely an isothermal and incompressible flow. For
understanding the numerical problems, often, the pressure related numerical problems and velocity related
numerical problems are studied separately. We use one balance equation for calculating the pressure and
2
another balance equation for calculating the velocity. These balance equations are coupled such that we fail
to uniquely identify which balance equation is to be used for pressure and velocity. Therefore, more robust
numerical strategies use both balance equations for both of the unknowns, this approach has already been
undertaken in Chorin’s method and then extensively used by the pressure stabilized Petrov–Galerkin
method (PSPG). We use essentially the same strategy herein by motivating this approach from a different
perspective. Numerical problems are surpassed by incorporating the balance of angular momentum delivering
the necessary smoothness for the pressure. Conventionally, the balance of angular momentum is neglected since
it is already fulfilled locally by the balance of linear momentum (for the case of non-polar fluids). Furthermore,
we discuss the integration by parts and suggest another approach than usually see in the literature. We explain
in detail how to generate the weak form. Additionally, we emphasize that the weak form can be extended to
fluid structure interaction or multiphysics problems very easily. We use open-source packages developed under
the FEniCS project1 and solve some academic examples in order to present the accuracy, local monotonous
convergence, and robustness of the proposed methodology. All codes are made public on the web site in [3] to
be used under the GNU Public license as in [23] for promoting an efficient scientific exchange as well as further
studies.
2 Variational formulation
Consider the following general balance equation:
!• Z
Z
Z
z dv +
ψ dv =
(f + φ) da ,
(4)
∂Ω
Ω
Ω
where the rate of the variable ψ is balanced with the supply term z acting volumetrically and with the flux
terms—convective f and non-convective φ—applying on the surface ∂Ω of a domain (control volume) Ω. By
using Table 1 we can obtain the balance equations of mass, linear momentum, and angular momentum. The
Table 1: Volume densities, their supply and flux terms in the balance equations.
ψ
z
f
φ
ρ
0
ni (wi − vi )ρ
0
ρvj
ρgj
ni (wi − vi )ρvj
σij
ρ(sj + jkl xk vl )
ρ(`j + jkl xk gl )
ni (wi − vi )ρ(sj + jkl xk vl )
mij + jkl xk σil
domain may have its own velocity x•i = wi independent on the velocity of the fluid particle, vi . For a discussion
of the balance equations in a control volume with the domain velocity, we refer to [38, 39]. This domain
velocity can be chosen arbitrarily without affecting the underlying physics. For the sake of clarity, consider an
experiment where we record the motion of fluid by means of a high-speed camera. We may move the camera
arbitrarily, the motion of the fluid fails to alter. Normally we fix the camera to the laboratory frame such that
the domain has no velocity, wi = 0. We will use this assumption of a fixed domain having two consequences.
First, the time rate reads
∂(·)
∂(·)
∂(·)
∂(·)
∂(·)
(5)
+ x•i
=
+ wi
=
.
(·)• =
∂t
∂xi
∂t
∂xi
∂t
Second, the rate of the infinitesimal volume element vanishes
dv• =
∂wi
dv = 0 .
∂xi
(6)
The domain velocity becomes important in computer methods for fluid structure interaction.
We start with the balance of mass for a fixed domain and apply the Gauss–Ostrogradskiy theorem
Z
Z
∂ρ
dv = −
ni vi ρ da ,
Ω ∂t
∂Ω
Z
Z
(7)
∂ρ
∂vi ρ
dv = −
dv .
Ω ∂t
Ω ∂xi
1 The
FEniCS computing platform, https://fenicsproject.org/
3
We assume that initially the fluid rests, vi (x, t = 0) = 0, and it is a homogeneous material, ρ(x, t = 0) = const.
Moreover, we assume that the flow is incompressible, i.e., the mass density remains constant in time, ∂ρ/∂t = 0.
Then the mass density is constant in space and time throughout the simulation leading to
Z
∂vi
dv = 0 .
ρ
(8)
Ω ∂xi
We multiply the latter with an arbitrary test function with the same rank of the integrand, i.e., a scalar. Having
an arbitrary test function ensures that the global condition holds locally as well. According to the Galerkin
approach, we will choose the test functions from the same space as the unknowns vi and p. Therefore, it is
natural to use δp and δvi as possible test functions. We emphasize that the choice of the scalar test function is
critical and we suggest to use
Z
∂vi
δp dv = 0 ,
ρ
(9)
Ω ∂xi
which is also the common procedure in the literature. Actually, by multiplying with the test function, we started
to utilize the discrete representation of the continuous velocity field. We omit a clear distinction in the notation
since we never use continuous and discrete functions together in one equation.
For the balance of linear momentum, the procedure is the same, we acquire for a fixed domain and incompressible flow
Z
Z
∂vi vj
∂σij
∂vj
dv =
ρgj − ρ
+
dv .
(10)
ρ
∂t
∂xi
∂xi
Ω
Ω
The integrand is a vector, hence, we use the test function δvi as being the usual case in the literature,
Z
∂vi vj
∂vj
∂σij
− ρgj + ρ
ρ
−
δvj dv = 0 .
∂t
∂xi
∂xi
Ω
(11)
We refrain ourselves from inserting the mass balance, ∂vi /∂xi = 0, into the latter formulation. Since this
condition is tested by δp, we cannot expect that it is fulfilled for the velocity distribution such that we choose
to enforce it by leaving the formulation as it is.
The same formalism is applied for the balance of angular momentum—for an incompressible flow ρ = const|x,t
within a fixed domain x•i = wi = 0—leading to
Z
Z
Z
∂sj
∂vl
ρ
+ ρjkl xk
dv = (ρ`j + ρjki xk gi ) dv +
ni − vi ρ(sj + jkl xk vl ) + mij + jkl xk σil da ,
∂t
∂t
Ω
Ω
∂Ω
Z
∂sj
∂
∂vl
ρ
+ ρjkl xk
− ρ`j − ρjki xk gi −
− vi ρ(sj + jkl xk vl ) + mij + jkl xk σil dv = 0 ,
∂t
∂t
∂xi
Ω
Z
∂sj
∂vl
∂vi sj
∂vi vl
∂mij
∂σil
ρ
+ ρjkl xk
− ρ`j − ρjki xk gi + ρ
+ ρjkl xk
−
− jil σil − jkl xk
dv = 0 ,
∂t
∂t
∂xi
∂xi
∂xi
∂xi
Ω
(12)
where ∂xi /∂xj = δij and the spin density si , its flux term (couple stress) mij , and its supply `i vanish for a
non-polar medium like water (furnishing a symmetric stress). Then the angular momentum is identical to the
moment of (linear) momentum,
Z
∂vi vl
∂σil
∂vl
− ρgl + ρ
−
dv = 0 ,
jkl xk ρ
∂t
∂xi
∂xi
Ω
(13)
Z
∂vl
∂vi vl
∂σil
ρ
− ρgl + ρ
−
dv = 0 ,
∂t
∂xi
∂xi
Ω
hence, in analytical mechanics, we can neglect it. However, we observe this term as an important term for
resolving numerical challenges. Thus, we want to enforce it by multiplying the balance of angular momentum
by a vector test function. If we multiply the balance of angular momentum for non-polar medium by δvl , then
the outcome is identical to the variational form in Eq. (11). However, if we multiply by ∂δp/∂xl we obtain a
restriction about the gradient of pressure, which is indeed the missing condition for the necessary numerical
smoothness for pressure. We may see this condition related to the LBB condition; however, we enforce it by
using an additional integral form instead of changing the order of shape functions. The same term multiplied
by the mesh size is added in PSPG for the sake of a pressure stabilization. Herein we use it in equal manner for
4
every finite element independent of their size. The variational formulation for the balance of angular momentum
reads
Z
∂vl
∂vi vl
∂σil ∂δp
ρ
− ρgl + ρ
−
dv = 0 ,
(14)
∂t
∂xi
∂xi ∂xl
Ω
which is one of the key contribution of this work providing stability and robustness.
We solve the transient integral forms in discrete time slices with a time step ∆t, this discretization in time
can be established by using Euler backwards method
vi − vi0
∂vi
=
,
∂t
∆t
(15)
where vi0 indicates the value from the last time step. This implicit method is stable (for real valued problems)
and easy to implement.
3 Generating the weak form
We have to bring integral forms in Eqs. (9), (11), (14) into the same unit such that they can be summed up.
We divide Eq. (9) by the mass density ρ and bring it to the unit of power. Equation (11) is already in the unit
of power. We divide Eq. (14) by the mass density and multiply it by the time step ∆t and bring it also to the
unit of power.
We rewrite the constitutive equation, σij = −pδij + τij , by combining all terms with dij into τij . The
symmetric part of the velocity gradient, dij , thus, the term τij , include already velocity’s first derivative in
space. Therefore, we need to have a representation of the velocity function, which is at least C 1 continuous.
In the integral forms we observe another space derivative to τij leading to class C 2 for velocity approximation.
This condition can be weakened by integrating by parts. We emphasize that the integration by parts is applied
only on the terms already including a differentiation in order to switch one differentiation to the test function.
This strategy is not conventional. Often, integration by parts is used to all flux terms. We observe numerical
problems by using an integration by parts to all flux terms such that we suggest the method presented herein,
which is another key contribution of this work. After bringing to the same unit and integrating by parts where
necessary, we obtain
Z
F1 =
vi,i δp dv ,
Ω
Z
vj − vj0
δvj − ρgj δvj + ρ(vi vj ),i δvj + p,i δvi + τij δvj,i dv −
ρ
ni τij δvj da ,
∆t
∂Ω
Z
∆t
F3 =
(vj − vj0 ) − ∆tgj + ∆t(vi vj ),i −
(−pδij + τij ),i δp,j dv ,
ρ
Ω
Z
F2 =
Ω
(16)
by using the usual comma notation for space derivative (),i = ∂()/∂xi . The weak form
Form
Ω
= F1 + F2 + F3
(17)
for one finite element reads zero by inserting the correct pressure and velocity distribution.
A control volume is
P
decomposed into several elements such that the assembly over all elements, Form = e F Ω , is the weak form
for the whole control volume. The sum over elements generate on the element boundaries the following term
Jni τij K = Jni (σij + pδij )K
(18)
with jump brackets J(·)K indicating the difference between the values of the quantity computed in adjacent
elements. We use continuous form elements for pressure and velocity such that Jni pK = 0, moreover, we enforce
Jni σij K = 0 relying on the balance of linear momentum on singular surfaces. Therefore, the integral term along
the element boundaries vanish within the control volume. On the boundaries of the control volume either
velocity or pressure is given. For the parts, where velocity is given, we choose δvi = 0 such that the boundary
term vanishes. For the parts, where the water enters the domain with a prescribed pressure p against the plane
outward, ti = −pni , we obtain ni τij = ni (σij + pδij ) = tj + nj p = 0. Therefore, all boundary terms vanish in
the weak form for an incompressible flow.
5
4 Algorithm and computation
Continuous finite elements are used for all simulations in three-dimensional (3D) space. We use tetragonal
elements with form functions of degree n = 1, hence, every element in 3D consists of four nodes. The primitive
variables are pressure and velocity and they are represented with their nodal values interpolated using the form
functions. Concretely, 4 primitive variables P = {p, v1 , v2 , v3 } in three-dimensional space belong to
(19)
V = P ∈ [Hn (Ω)]4 : P |∂Ω = given ,
where [Hn ]4 is a 4-dimensional Hilbert space of class C n as defined in [27] with additional differentiability
properties such that it is called a Sobolev space. The test functions, δP = {δp, δv1 , δv2 , δv3 }, stem from the
same space
(20)
V̂ = δP ∈ [Hn (Ω)]4 : δP |∂Ω = given ,
which is the Galerkin approach. We use n = 1 for all simulations, in other words, we use the same linear form
functions for pressure and for velocity. The spurious oscillations do not occur owing to the additional governing
equation restricting the pressure gradient as well as the careful choice of terms to integrate by parts.
The weak form is nonlinear and coupled such that we need to linearize and solve it monolithically. For the
linearization we follow the ideas in [35, Part I, Sect. 2.2.3] and perform an abstract linearization using Newton’s
method at the partial differential level. The functional Form= F (P , δP ) is an integral of the function depending
on the primitive variables P and their variations (test functions) δP . We know the correct values of P at t0 .
The weak form is initially zero—we obtained it by subtracting left-hand sides from right-hand sides in the
balance equations. We search for the next time step, t = ∆t + t0 , by using the known P . This algorithm holds
for every time steps, since we compute subsequently in time. We may describe the algorithm:
given: P (t) for x ,
find: P (t + ∆t) at x ,
(21)
satisfying: F (P (t + ∆t), δP ) = 0 .
Now, by rewriting the unknowns P (t + ∆t) in terms of the known values
P (t + ∆t) = P (t) + ∆P (t) ,
(22)
we redefine the objective to searching for ∆P (t) instead of P (t + ∆t). If ∆t is chosen sufficiently small, then the
solution is near to the known solution such that ∆P (t) is small. This condition leads to a Taylor expansion
around the known values, P (t), up to the (polynomial) order one
F (P + ∆P , δP ) = F (P , δP ) + ∇P F (P , δP ) · ∆P ,
(23)
where we omit the time argument for the sake of clarity in notation. The expansion is linear in ∆P , hence we
need to construct a linear in ∆P differentiation operator, ∇P , which is established by the so-called Gateaux
derivative:
d
(24)
F (P + ∆P , δP ) ,
∇P F (P , δP ) · ∆P = lim
→0 d
where is an arbitrary parameter. Since we first differentiate in and then set the parameter equal to zero,
only terms of order one in ∆P remain in the solution. By introducing the so-called Jacobian:
J (P , δP ) = ∇P F (P , δP ) ,
(25)
we rewrite the algorithm,
given: P for x ,
find: ∆P at x ,
(26)
satisfying: F (P , δP ) + J (P , δP ) · ∆P = 0 .
The last line is a linear function in ∆P such that we can solve the equation by obtaining ∆P and update the
solution in an iterative manner,
P := P + ∆P ,
(27)
where “:=” is an assign operator in computational algebra. Here is the ultimate algorithm:
while |∆P | > TOL.
solve ∆P , where F (P , δP ) + J (P , δP ) · ∆P = 0
P := P + ∆P
6
(28)
The term J · ∆P is computed automatically by means of symbolic differentiation implemented under the name
SyFi within the FEniCS project, see [4], [5]. This automatic linearization procedure allows us to use any
nonlinear constitutive equation in the code. Herein we use a linear constitutive equation in order to achieve a
comparison with closed-form solutions. The geometry is constructed in Salome2 by using NetGen algorithms3
for the triangulation. Then the mesh is transformed as explained in [1, Appendix A.3] and implemented in a
Python code using packages developed by the FEniCS project, which is wrapped in C++ and solved in a Linux
machine running Ubuntu.4
5 Comparative analysis
The suggested weak form is implemented and solved for various problems. First, we examine the accuracy and
convergence behavior by comparing to semi-analytical closed-form solutions for simple geometries, we call them
analytical solutions. They are well-known and can be found in different textbooks, for example see [43]. This
analysis is of importance to present the local monotonous convergence that is the important feature of the FEM.
For a flow problem, we increase the accuracy at every point by decreasing the mesh size. Second, we present
benchmarking problems in 2D and 3D in order to verify the robustness of the method.
5.1 Steady state Hagen–Poiseuille flow
Consider a laminar flow in an infinite pipe as a result of the given pressure difference. This configuration is
called the Hagen–Poiseuille flow and it has a steady-state solution obtained in cylindrical coordinates, r, θ,
z, under the assumption that the flow is only along the pipe. The pipe is oriented along z, which is set as the
axis of the pipe. No-slip condition, vi = 0, is applied on the outer walls, r = a. The steady-state solution reads
0
0
(29)
vi =
2 ,
dp a2
r
1− 2
−
dz 4µ
a
for an incompressible flow of a linear viscous fluid like water of viscosity µ. We use this solution for an analysis
of the convergence and accuracy. A pipe of length ` is constructed and on the inlet and outlet the pressure
is given as Dirichlet boundary conditions, p(z = 0) = pin and p(z = `) = pout . The flow is driven by the
pressure difference such that the gravity is neglected. Moreover, we are interested in the steady-state where
the inertial term vanishes. In order to mimic the infinite pipe, we set the radial and circumferential velocities
zero on the inlet and outlet. FEM computation is realized in Cartesian coordinates, so we basically allow vz on
inflow plane x = 0 and outflow plane x = ` by setting vx = vy = 0 as Dirichlet conditions.
The pressure distribution is expected to be linear along z, hence, for the analytic solution dp/ dz = (pout −
pin )/`. For a better comparison we use the diameter D as the characteristic length and half of the maximum
velocity, vzM = vz (r = 0), as the characteristic velocity for calculating the Reynolds number:
Re =
vzM Dρ
.
2µ
(30)
For a small pipe of an inch long and a quarter inch wide, we construct the mesh by using a global element
length h. We use SI units such that ` = 25.4 mm and D = 6.35 mm and water as the fluid with
ρ = 998.2 · 10−6 g/mm3 ,
µ = 1001.6 · 10−6 Pa s ,
λ = 0.6 Pa s .
(31)
Especially the choice of λ is of importance since this parameter is not measured directly. Although λ is a
physical and measurable quantity, for the conventional pressure the incompressibility makes the measurement
of λ very challenging. In the constitutive equation in Eq. (2), the term λdkk vanishes for the correct velocity
solution. Therefore, for the numerical sense, λ has to be great enough that dkk is enforced to vanish. Hence, we
choose λ multiple times greater than µ, in reality (for compressible flows) λ and µ are independent parameters.
Interestingly, we have observed that choosing λ greater than suggested value slows down the convergence. In
other words, by doubling λ the same accuracy of the solution is obtained with more degrees of freedom (DOF).
2 Salome,
the open-source integration platform for numerical simulation, http://www.salome-platform.org
Mesh Generator, https://sourceforge.net/projects/netgen-mesher/
4 Ubuntu, open source software operating system, https://www.ubuntu.com/
3 Netgen
7
Its value does not change the convergence behavior, as long as it is great enough. In order to determine the value
of λ, we simply decreased until the maximum Re was achieved. Less than the used value leads to numerical
problems in the Newton–Raphson iterations.
By using a standard convergence analysis, we compare three different meshes starting with a global edge
length of tetrahedrons, h = 0.6 mm, then reducing it by half. Every time a new mesh is generated such that
the number of nodes fail to increase exactly by 23 times in 3D. We use an unstructured mesh and the mesh
quality is nearly identical because of using the same algorithm on the relatively simple geometry. The expected
monotonic convergence has been attained and can be seen in Fig. 1 for 2 different Reynold numbers. Two
(a) Re = 313
(b) Re = 940
Figure 1: Computation of steady state solution and its comparison to the analytic solution in a pipe for two
different Reynolds numbers.
important facts need to be underlined. First, the parabolic distribution of the velocity along the diameter is
achieved even with a coarse mesh. Second, the relative error is 1.1% at r = 0 for a low Reynolds number and
4.1% at r = 0 for a high Reynolds number by using mumps direct solver.
5.2 Starting Hagen–Poiseuille flow
In order to test the accuracy in the transient simulation, we use the same configuration and solve it transiently
in time. Since we have obtained the expected convergence in space discretization for the steady-state solution,
we expect to have a monotonic convergence in time discretization, too. Therefore, we solve the same example
with different time steps from t = 0 to t = 10 s with the initially applied pressure difference. For this case there
is a closed-form solution under the same assumptions as before,
0
0
N
vi =
(32)
,
r
2
2
X
J0 (Λn a )
r
dp a
−
1− 2 −
8 3
exp(−Λ2n τ )
dz 4µ
a
Λn J1 (Λn )
n=1
with τ = tµ/(ρa2 ) and Bessel functions (of the first kind) J0 and J1 with Λn being the roots of J0 . We
compute the (semi-)analytical solution by using SciPy packages for Bessel functions as well as its roots and
choose N = 50. By choosing the best mesh obtained from the convergence analysis in the steady-state case,
namely the mesh with h = 0.15 mm, we compute the solution transiently in time by using different time
steps. We present in Fig. 2 the maximum value vz (r = 0, t) over time for different time steps showing the
expected convergence with decreasing time steps as well as the distribution at different time instants for the
smallest time step. In addition to the convergence in time, the relative error remains unchanged over time.
We conclude that the suggested formalism is capable of simulating a simple, laminar, three-dimensional flow of
a linear viscous fluid accurately under a monotonic loading. The velocity and pressure distributions show no
artifacts or mesh dependency as presented in Fig. 3. We have used mumps direct solver for achieving the highest
accuracy in the numerical solution. We emphasize that the pressure difference is applied instantaneously, which
is numerically challenging. For transient loading scenarios, there are various assumptions used for obtaining a
closed-form solution such that we omit to examine further. Based on the presented examples, we conclude that
the approach delivers an accurate solution.
8
(a) ∆t = {1, 0.5, 0.25} s
(b) ∆t = 0.25 s
Figure 2: Computation of transient solution and its comparison to the analytic solution in a pipe for Re = 313.
Figure 3: Velocity solution (direction as scaled arrows and magnitude as colors) and pressure solution (as colors)
of the transient pipe flow at t = 5 s, shown on the half of the pipe (upper part: velocity and lower
part: pressure) for Re = 313.
9
5.3 Flow over an obstacle
As suggested in [44] we implement a benchmarking problem in 2D and 3D. These benchmarking problems are
designed to test a new method or code. They are well analyzed and the expected results are known. Both
problems compute the viscous flow around an obstacle. The first problem is in 2D and we use the scaling as in
[44] (for the 2D-2 case) such that the geometry is in meter length scale. A rectangle of ` = 2.2 m × H = 0.41 m
has a circular obstacle of radius 0.05 m located at (0.2, 0.2). On the upper and lower walls as well as on the
obstacle fluid adheres to the resting walls. Fluid is pumped in from left and because of the unsymmetrical
placement of the obstacle, fluid around the hole gets perturbed. After a short amount of time, repeating
pattern of vortices appear behind the obstacle. This so-called von Karman vortex street is well-known in the
literature and a new numerical method has to be capable of reconstructing this phenomenon. On the right the
Dirichlet boundary condition for the pressure p = pref. is set. On the left the velocity profile:
!
4y(H − y)
v
m
,
(33)
vi =
H2
0
is applied with vm = 1.5 m/s leading to the Reynolds number Re = 100 (inlet) for a linear viscous fluid of
ρ = 1 kg/m3 and µ = 0.001 Pa s. Of course, such a fluid performing an incompressible flow is difficult to find in
reality; however, the benchmark problem needs to be seen as a computationally challenging problem showing
the strength and robustness of the proposed code since a computation in such a low kinematic viscosity ν = µ/ρ
is known to generate numerical problems. By using ∆t = 0.001 s and bicgstab iterative solver with hypre-amg
preconditioner, we have computed up to 5 s as presented in Fig. 4.
For a comparison, the same problem is solved in [33, Section 3.4] by using the so-called incremental pressure
correction scheme (IPCS) providing the same solution as herein. This splitting method is powerful for isothermal case, but difficult to apply for non-isothermal cases.
The vortex shedding behind the obstacle occurs due to the boundary layer separation. This separation is due
to the changing pressure gradients as seen in Fig. 4(f). There are two stagnation points visible in front of and
behind the obstacle. Along the boundary of the obstacle, pressure gradient changes its sign at the top point.
This change in pressure gradient resolves a so-called wake behind the obstacle, where the pressure is low such
that the flow separates. We have modeled this phenomenon with the same element type and size around the
boundary, in other words, without any special boundary layer modeling or whatsoever. Choosing Re = 100
gives us an oscillating flow, between t = 2 s and t = 5 s one full cycle is surpassed. The pressure distribution
also shows the emerging vortices far away from the obstacle as moving wakes.
The second benchmark problem is in 3D. In analogy with the latter geometry, this time we simulate a pulsating
flow over a circular cylinder. The geometry is taken from the case 3D-3Z in [44] and rescaled to millimeter
length scale. The geometry is a box of 2500 mm x-length and H × H cross section on yz-plane. A through hole
of 100 mm diameter is placed asymmetrically, its center is at y = 200 mm and the y-length is H = 410 mm.
This configuration leads to the same type of boundary layer separation. We apply a pulsating flow as follows
t
16yz(H − y)(H − z)
vm
sin
π
H4
8
vi =
(34)
,
0
0
with the mean velocity of vm = 2250 mm/s. This parabolic function reads vm at the middle of the inflow plane
y = z = H/2 at t = 4 s. On the outflow plane x = 2500 mm we set the pressure as the reference pressure. On
the walls and around the cylinder, no-slip condition, vi = 0, is implemented as Dirichlet boundaries. We
visualize in Fig. 5 the velocity field and in Fig. 6 the pressure field at t = 4 s, when the maximum velocity on
the inflow plane has reached 2250 mm/s leading to a Reynolds number of Re = 100 with the diameter of the
cylinder used as the characteristic length.
As expected, in the velocity solution we see the same distribution on the xy-plane as in 2D solution. In
yz-plane the distribution is manipulated because of the no-slip condition on the walls along z-axis. Behind
the cylinder the distribution is separated. In the middle there is a relatively slow back-flow. There is a small
difference in the upper and lower distribution because of the non-symmetric placement of the obstacle. This
fact can be seen in the pressure distribution as a difference between the highest and lowest position along the
10
(a) Velocity, t = 1 s
(b) Velocity, t = 2 s
(c) Velocity, t = 3 s
(d) Velocity, t = 4 s
(e) Velocity, t = 5 s
(f) Pressure, t = 5 s
Figure 4: 2D computation of a viscous flow with the typical vortex shedding behind the obstacle, colors denote
the magnitude of the velocity or pressure as indicated.
Figure 5: Velocity solution (direction as scaled arrows and magnitude as colors) of the transient flow at the
quarter period, t = 4 s.
11
Figure 6: Pressure solution as colors of the transient flow at the quarter period, t = 4 s.
cylinder. The pressure distribution along z-axis varies again effected by the no-slip condition on the walls along
z-axis. The total number of degrees of freedom (DOFs) for the 3D problem is 483 548 that is relatively small
for such a computation in this detail. By using again bicgstab iterative solver with hypre-amg preconditioning,
with the fixed time step, ∆t = 0.001 s, we could simulate on 13 CPUs via openmpi without facing any numerical
problems.
6 Conclusion
A new method is proposed to compute fluid dynamics of isothermal and incompressible flows by means of FEM.
We have rigorously investigated the convergence and the accuracy of the proposed approach by using closedform solutions. Convergence in space and time is difficult to achieve in FEM for flow problems. The accuracy
is only possible by using extremely high degrees of freedom. With the proposed method, we have attained a
good accuracy with relatively coarse meshes. Local monotonic convergence in space and time is a remarkable
quality of FEM and our method exploits this feature such that the proposed method is reliable. Moreover, we
have demonstrated the robustness of the implementation in open-source packages called FEniCS by solving flow
around the cylinder benchmark problems in 2D and 3D. Further research is being conducted as a second part
including solution of real-life problems and verification of the proposed method with the aid of experimental
results.
Acknowledgement
B. E. Abali had the pleasure to have discussed and worked together with Prof. Ömer Savaş at the University
of California, Berkeley.
References
[1] B. E. Abali.
Computational Reality, Solving Nonlinear and Coupled Problems in Continuum Mechanics.
Advanced Structured Materials. Springer, 2017.
[2] B. E. Abali, W. H. Müller, and D. V. Georgievskii.
A discrete-mechanical approach for computation of three-dimensional flows.
ZAMM-Journal of Applied Mathematics and Mechanics/Zeitschrift für Angewandte Mathematik und
Mechanik, 93(12):868–881, 2013.
[3] B. Emek Abali.
Technical University of Berlin, Institute of Mechanics, Chair of Continuum Mechanics and Material Theory,
Computational Reality.
http://www.lkm.tu-berlin.de/ComputationalReality/, 2017.
[4] Martin S. Alnaes and Kent-Andre Mardal.
On the efficiency of symbolic computations combined with code generation for finite element methods.
ACM Transactions on Mathematical Software, 37(1), 2010.
12
[5] Martin S. Alnaes and Kent-Andre Mardal.
SyFi and SFC: Symbolic Finite Elements and Form Compilation, chapter 15.
Springer, 2012.
[6] Amirhossein Arzani and Shawn C Shadden.
Characterizations and correlations of wall shear stress in aneurysmal flow.
Journal of Biomechanical Engineering, 138(1):014503, 2016.
[7] I. Babuska and W.C. Rheinboldt.
Error estimates for adaptive finite element computations.
SIAM Journal on Numerical Analysis, 15(4):736–754, 1978.
[8] Teri Barth, Pavel Bochev, Max Gunzburger, and John Shadid.
A taxonomy of consistently stabilized finite element methods for the stokes problem.
SIAM Journal on Scientific Computing, 25(5):1585–1607, 2004.
[9] John B Bell, Phillip Colella, and Harland M Glaz.
A second-order projection method for the incompressible navier-stokes equations.
Journal of Computational Physics, 85(2):257–283, 1989.
[10] Henrik Blank, Michael Rudgyard, and Andrew Wathen.
Stabilised finite element methods for steady incompressible flow.
Computer methods in applied mechanics and engineering, 174(1-2):91–105, 1999.
[11] David L Book, Jay P Boris, and K Hain.
Flux-corrected transport ii: Generalizations of the method.
Journal of Computational Physics, 18(3):248–283, 1975.
[12] Abigail L Bowers, Benjamin R Cousins, Alexander Linke, and Leo G Rebholz.
New connections between finite element formulations of the navier–stokes equations.
Journal of Computational Physics, 229(24):9020–9025, 2010.
[13] Franco Brezzi and Michel Fortin.
A minimal stabilisation procedure for mixed finite element methods.
Numerische Mathematik, 89(3):457–491, 2001.
[14] David L Brown, Ricardo Cortez, and Michael L Minion.
Accurate projection methods for the incompressible navier–stokes equations.
Journal of computational physics, 168(2):464–499, 2001.
[15] Erik Burman.
Pressure projection stabilizations for galerkin approximations of stokes’ and darcy’s problem.
Numerical Methods for Partial Differential Equations, 24(1):127–143, 2008.
[16] Sergey Charnyi, Timo Heister, Maxim A Olshanskii, and Leo G Rebholz.
On conservation laws of navier–stokes galerkin discretizations.
Journal of Computational Physics, 337:289–308, 2017.
[17] Alexandre Joel Chorin.
On the convergence of discrete approximations to the navier-stokes equations.
Mathematics of computation, 23(106):341–353, 1969.
[18] Clark R Dohrmann and Pavel B Bochev.
A stabilized finite element method for the stokes problem based on polynomial pressure projections.
International Journal for Numerical Methods in Fluids, 46(2):183–201, 2004.
[19] J. Donea and A. Huerta.
Finite element methods for flow problems.
John Wiley & Sons, Ltd, Chichester, UK., 2005.
[20] Ch Förster, WA Wall, and E Ramm.
Stabilized finite element formulation for incompressible flow on distorted meshes.
International Journal for Numerical Methods in Fluids, 60(10):1103–1126, 2009.
[21] Leopoldo P Franca and Charbel Farhat.
Bubble functions prompt unusual stabilized finite element methods.
Computer Methods in Applied Mechanics and Engineering, 123(1-4):299–308, 1995.
13
[22] Guosheng Fu, Yanyi Jin, and Weifeng Qiu.
Parameter-free superconvergent h(div)-conforming hdg methods for the brinkman equations.
IMA Journal of Numerical Analysis, 2018.
[23] GNU Public.
Gnu general public license.
http://www.gnu.org/copyleft/gpl.html, June 2007.
[24] Katuhiko Goda.
A multistep technique with implicit difference schemes for calculating two-or three-dimensional cavity flows.
Journal of Computational Physics, 30(1):76–95, 1979.
[25] Volker Gravemeier.
The variational multiscale method for laminar and turbulent flow.
Archives of Computational Methods in Engineering, 13(2):249, 2006.
[26] Yinnian He and Jian Li.
A stabilized finite element method based on local polynomial pressure projection for the stationary navier–
stokes equations.
Applied Numerical Mathematics, 58(10):1503–1514, 2008.
[27] David Hilbert.
The Foundations of Geometry.
The Open Court Publishing Co., 1902.
(transl. by Townsend, E.J.).
[28] Johan Hoffman and Claes Johnson.
Computational turbulent incompressible flow, applied mathematics: body and soul 4.
Springer, 2007.
[29] T. J. R. Hughes and A. Brooks.
A theoretical framework for petrov-galerkin methods with discontinuous weighting functions: Application
to the streamline-upwind procedure.
Finite elements in fluids, 4:47–65, 1982.
[30] T. J. R. Hughes, L. P. Franca, and M. Balestra.
A new finite element formulation for computational fluid dynamics: circumventing the Babuska- Brezzi
condition: a stable Petrov- Galerkin formulation of the Stokes problem accommodating equal-order
Interpolation.
Computer Methods in Applied-Mechanics and Engineering, 59:85–99, 1986.
[31] Thomas J. R. Hughes, Guglielmo Scovazzi, and Leopoldo P. Franca.
Encyclopedia of computational mechanics, volume 3, chapter 2 Multiscale and stabilized methods, pages
5–59.
John Wiley & Sons, Ltd., 2004.
[32] Dmitri Kuzmin and Stefan Turek.
Flux correction tools for finite elements.
Journal of Computational Physics, 175(2):525–558, 2002.
[33] Hans Petter Langtangen and Anders Logg.
Solving PDEs in Python: The FEniCS Tutorial I.
Springer, 2016.
[34] Jian Li and Yinnian He.
A stabilized finite element method based on two local gauss integrations for the stokes equations.
Journal of Computational and Applied Mathematics, 214(1):58–65, 2008.
[35] Anders Logg, Kent-Andre Mardal, and Garth Wells.
Automated solution of differential equations by the finite element method: The FEniCS book, volume 84.
Springer Science & Business Media, 2012.
[36] Rainald Löhner.
Applied computational fluid dynamics techniques: an introduction based on finite element methods.
John Wiley & Sons, 2008.
[37] K. W. Morton.
Finite element methods for non-self-adjoint problems.
14
In Peter Turner, editor, Topics in Numerical Analysis, volume 965, pages 113–148. Springer Berlin /
Heidelberg, 1982.
[38] Wolfgang H. Müller and W. Muschik.
Bilanzgleichungen offener mehrkomponentiger Systeme I. Massen- und Impulsbilanzen.
Journal of Non-Equilibrium Thermodynamics, 8:29–46, 1983.
[39] W. Muschik and Wolfgang H. Müller.
Bilanzgleichungen offener mehrkomponentiger Systeme II. Energie- und Entropiebilanz.
Journal of Non-Equilibrium Thermodynamics, 8:47–66, 1983.
[40] Maxim A Olshanskii and Leo G Rebholz.
Velocity–vorticity–helicity formulation and a solver for the navier–stokes equations.
Journal of Computational Physics, 229(11):4291–4303, 2010.
[41] Artur Palha and Marc Gerritsma.
A mass, energy, enstrophy and vorticity conserving (meevc) mimetic spectral element discretization for the
2d incompressible navier–stokes equations.
Journal of Computational Physics, 328:200–220, 2017.
[42] R. Rannacher.
Encyclopedia of computational mechanics, volume 3, chapter 6 Incompressible viscous flows, pages 155–181.
John Wiley & Sons, Ltd., 2004.
[43] Ömer Savaş.
Lecture notes, ME-260 A/B, Advanced Fluid Mechanics, Fall 2017.
University of California, Berkeley, 2017.
[44] Michael Schäfer, Stefan Turek, Franz Durst, Egon Krause, and Rolf Rannacher.
Benchmark computations of laminar flow around a cylinder.
In Flow simulation with high-performance computers II, pages 547–566. Springer, 1996.
[45] David J Silvester and N Kechkar.
Stabilised bilinear-constant velocity-pressure finite elements for the conjugate gradient solution of the stokes
problem.
Computer Methods in Applied Mechanics and Engineering, 79(1):71–86, 1990.
[46] Roger Temam.
Sur l’approximation de la solution des équations de navier-stokes par la méthode des pas fractionnaires (i).
Archive for Rational Mechanics and Analysis, 32(2):135–153, 1969.
[47] Roger Temam.
Sur l’approximation de la solution des équations de navier-stokes par la méthode des pas fractionnaires (ii).
Archive for Rational Mechanics and Analysis, 33(5):377–385, 1969.
[48] T. E. Tezduyar, S. Mittal, S.E. Ray, and R. Shih.
Incompressible flow computations with stabilized bilinear and linear equal order interpolation velocity
pressure elements.
Computer Methods in Applied Mechanics and Engineering, 95:221–242, 1992.
[49] Olgierd C Zienkiewicz and Ramon Codina.
A general algorithm for compressible and incompressible flow—part i. the split, characteristic-based scheme.
International Journal for Numerical Methods in Fluids, 20(8-9):869–885, 1995.
15
| 5cs.CE
|
Relaxed Locally Correctable Codes in Computationally Bounded
Channels
arXiv:1803.05652v1 [cs.DS] 15 Mar 2018
Jeremiah Blocki∗
Venkata Gandikota†
Elena Grigorescu‡
Samson Zhou§
March 16, 2018
Abstract
Error-correcting codes that admit local decoding and correcting algorithms have been the
focus of much recent research due to their numerous theoretical and practical applications. The
goal is to obtain the best possible tradeoffs between the number of queries the algorithm makes
to its oracle (the locality of the task), and the amount of redundancy in the encoding (the
information rate).
In Hamming’s classical adversarial channel model, the current tradeoffs are dramatic, allowing either small locality, but superpolynomial blocklength, or small blocklength, but high
locality. However, in the computationally bounded, adversarial channel model, proposed by
Lipton (STACS 1994), constructions of locally decodable codes suddenly exhibit small locality
and small blocklength. The first such constructions are due to Ostrovsky, Pandey and Sahai
(ICALP 2007) who build private locally decodable codes under the assumption that one-way
functions exist, and in the setting where the sender and receiver share a private key.
We study variants of locally decodable and locally correctable codes in computationally
bounded, adversarial channels, under the much weaker assumption that collision-resistant hash
functions exist, and with no public-key or private-key cryptographic setup. Specifically, we provide constructions of relaxed locally correctable and relaxed locally decodable codes over the binary
alphabet, with constant information rate, and poly-logarithmic locality. Our constructions compare favorably with existing schemes built under much stronger cryptographic assumptions, and
with their classical analogues in the computationally unbounded, Hamming channel.
Our constructions crucially employ collision-resistant hash functions and local expander
graphs, extending ideas from recent cryptographic constructions of memory-hard functions.
1
Introduction
Classically, an error-correcting code is a tuple (Enc, Dec) of encoding and decoding algorithms employed by a sender to encode messages, and by a receiver to decode them, after potential corruption
by a noisy channel during transmission. Specifically, the sender encodes a message m of k symbols
∗
Department of Computer Science, Purdue University, West Lafayette, IN. Email: [email protected].
Department of Computer Science, Johns Hopkins University, Baltimore, MD. Email: [email protected].
‡
Department of Computer Science, Purdue University, West Lafayette, IN. Research supported by NSF CCF1649515. Email: [email protected].
§
Department of Computer Science, Purdue University, West Lafayette, IN. Research supported in part by NSF
CCF-1649515. Email: [email protected].
†
1
from an alphabet Σ into a codeword c of block-length n consisting of symbols over the same alphabet, via Enc : Σk → Σn . The receiver uses Dec : Σn → Σk to recover the message from a received
word w ∈ Σn , a corrupted version of some Enc(m). Codes over the binary alphabet Σ = {0, 1}
are preferred in practice. The quantities of interest in designing classical codes are the information
rate, defined as k/n, and the error rate, which is the tolerable fraction of errors in the received
word. Codes with both large information rate and large error rate are most desirable.
In modern uses of error-correcting codes, one may only need to recover small portions of the
message, such as a single bit. In such settings, the decoder may not need to read the entire received
word w ∈ Σn , but only read a few bits of it. Given an index i ∈ [n] and oracle access to w, a
local decoder must make only q = o(n) queries into w, and output the bit mi . Codes that admit
such fast decoders are called locally decodable codes (LDCs) [KT00, STV99]. The parameter q is
called the locality of the decoder. A related notion is that of locally correctable codes (LCCs). LCCs
are codes for which the local decoder with oracle access to w must output bits of the codeword
c, instead of bits of the message m. LDCs and LCCs have widespread applications in many areas
of theoretical computer science, including private information retrieval, probabilistically checkable
proofs, self-correction, fault-tolerant circuits, hardness amplification, and data structures (e.g.,
[BFLS91, LFKN92, BLR93, BK95, CKGS98, CGdW13, ALRW17]). See surveys [Tre04, Gas04].
However, constructions of such codes suffer from apparently irreconcilable tension between locality
and rate: existing codes with constant locality have slightly subexponential blocklength [Yek08,
Efr12, DGY11], and codes of linear blocklength have slightly subpolynomial query complexity
[KMRS17]. See surveys by Yekhanin [Yek12] and by Kopparty and Saraf [KS16].
Ben-Sasson et al. [BGH+ 06] propose the notion of relaxed locally decodable codes (RLDCs) that
remedies the dramatic tradeoffs of classical LDCs. In this notion the decoding algorithm is allowed
to output ⊥ sometimes, to signal that it does not know the correct value; however, it should not
output an incorrect value too often. More formally, given i ∈ [k] and oracle access to the received
word w assumed to be relative close to some codeword c = Enc(m) ∈ Σn , the local decoder (1)
outputs mi if w = c; (2) outputs either mi or ⊥ with probability 2/3, otherwise; (3) the set of
indices i such that the decoder outputs mi (the correct value) with probability 2/3 is of size > ρ · k
for some constant ρ > 0. The relaxed definition allows them to achieve RLDCs with constant query
complexity and blocklength n = k1+ǫ .
Recently, Gur et al. [GRR18] introduce the analogous notion of relaxed locally correctable codes
(RLCCs). In particular, upon receiving a word w ∈ Σn assumed to be close to some codeword c,
the decoder: (1) outputs ci if w = c; (2) outputs either ci or ⊥ with probability 2/3, otherwise; and
(3) the set of indices i such that the decoder outputs ci with probability 2/3 is of size ρ · k, for some
ρ > 0. In fact, [GRR18] omits condition (3) in their definition, since the first two conditions imply
the 3rd, for codes with constant locality that can withstand a constant fraction of error [BGH+ 06].
The reduction from [BGH+ 06], however, does not maintain the asymptotic error rate, and in
particular, in the non-constant query complexity regime, the error rate becomes subconstant. Since
our results work in the ω(1)-query regime, we will build codes that achieve the 3rd condition as well
(for constant error rate). The results in [GRR18] obtain significantly better parameters for RLCCs
than for classical LCCs; namely, they construct RLCCs with constant query complexity, polynomial
block length, and constant error rate, and RLCCs with quasipolynomial query complexity, linear
blocklength (constant rate), with the caveat that the error rate is subconstant. These results
immediately extend to RLDCs, since their codes are systematic, meaning that the initial part of
the encoding consists of the message itself.
2
Computationally bounded, adversarial channels In this work we study RLDCs and RLCCs
in the more restricted, yet natural, computationally bounded adversarial channel, introduced by
Lipton [Lip94]. All the above constructions of local codes assume a channel that may introduce a
bounded number of adversarial errors, and the channel has as much time as it needs to decide what
positions to corrupt. This setting corresponds to Hamming’s error model, in which codes should
be resilient to any possible error pattern, as long as the number of corruptions is bounded. Hence,
codes built for the Hamming channel are safe for data transmission, but the drastic requirements
lead to coding limitations. By contrast, in his foundational work, Shannon proposes a weaker,
probabilistic channel in which each symbol is corrupted independently, with some fixed probability.
In [Lip94], Lipton argues that many reasonable channels stand somewhere in between these two
extremes, and one may assume that in reality adversaries are computationally bounded, and can
be modeled as polynomial time probabilistic (PPT) algorithms. Variants of this model have been
initially studied for classical error-correcting codes [Lip94, DGL04, MPSW05, GS16] to show better
error rate capabilities than in the Hamming model.
Ostrovsky et al. [OPS07] introduce the study of “private” locally decodable codes against computationally bounded channels, and build codes with constant information and error rates over the
binary alphabet, which can correct every message bit using only a small (superconstant) number
of queries to the corrupted word. Their results assume the existence of one-way functions, and
require that the encoding and decoding algorithms share a secret key that is not known to the
channel. Hemenway and Ostrovky [HO08] and Hemenway et al. [HOSW11] construct public-key
LDCs assuming the existence of Φ-hiding schemes [CMS99] and of IND-CPA secure cryptosystems,
respectively.
By contrast, our constructions of RLDCs and RLCCs do not require the sender and receiver to exchange cryptographic keys. Instead our constructions are based on the existence of collision-resilient
hash functions, a standard cryptographic assumption. Because the parameters of a collisionresistant hash function are public, any party (sender/receiver/attacker) is able to compute it.
2
Our Contributions
We start by defining the version of relaxed locally correctable codes that is relevant for our model.
We remark that our codes are systematic as well, and therefore the results also apply to the RLDCs
analogue.
Since these codes interact with an adversarial channel, the strength of the codes is not only
measured in its error correction and locality capabilities (as is the case for RLCCs/RLDCs in the
Hamming channel), but also in the security they provide against the channel. We present these
codes while describing how they interact with the channel, in order to make the analogy with the
classical setting. We use the notation Enc and Dec to denote encoding and decoding algorithms.
Definition 2.1 A local code is a tuple (Gen, Enc, Dec) of probabilistic algorithms such that
• Gen(1λ ) takes as input security parameter λ and generates a public seed s ∈ {0, 1}∗ . This
public seed s is fixed once and for all.
• Enc takes as input the public seed s and a message x ∈ Σk and outputs a codeword c = Enc(s, x)
with c ∈ Σn .
3
• Dec takes as input the public seed s, an index i ∈ [n], and is given oracle access to a word
w ∈ Σn . Decw (s, i) outputs a symbol b ∈ Σ (which is supposed to be the value of the closest
codeword to w at position i)
We say that the (information) rate of the code (Gen, Enc, Dec) is k/n. We say that the code is
efficient if Gen, Enc, Dec are all probabilistic polynomial time (PPT) algorithms.
Definition 2.2 A computational adversarial channel A with error rate τ is an algorithm that
interacts with a local code (Gen, Enc, Dec) of rate k/n in rounds, as follows. In each round of the
execution, given a security parameter λ,
(1) Generate s ← Gen(1λ ); s is public, so Enc, Dec, and A have access to s
(2) The channel A on input s hands a message x to the sender.
(3) The sender computes c = Enc(s, x) and hands it back to the channel (in fact the channel can
compute c without this interaction).
(4) The channel A corrupts at most τ n entries of c to obtain a word w ∈ Σn ; w is given to the
receiver’s Dec with query access, together with a challenge index i ∈ [n]
(5) The receiver outputs b ← Decw (s, i).
(6) We define A(s)’s probability of fooling Dec on this round to be pA,s = Pr[b 6∈ {⊥, ci }], where
the probability is taken only over the randomness of the Decw (s, i). We say that A(s) is
γ-successful at fooling Dec if pA,s > γ. We say that A(s) is ρ-successful at limiting Dec if
|GoodA,s | < ρ·n, where GoodA,s ⊆ [n] is the set of indices j such that Pr[Decw (s, j) = cj ] > 32 .
We use FoolA,s (γ, τ, λ) (resp. LimitA,s (ρ, τ, λ)) to denote the event that the attacker was γsuccessful at fooling Dec (resp. ρ-successful at limiting Dec) on this round.
We now define our secure RLCC codes against computational adversarial channels.
Definition 2.3 ((Computational) Relaxed Locally Correctable Codes (CRLCC)) A local
code (Gen, Enc, Dec) is a (q, τ, ρ, γ, µ(·))-CRLCC against a class A of adversaries if Decw makes at
most q queries to w and satisfies the following:
(1) For all public seeds s if w ← Enc(s, x) then Decw (s, i) outputs b = (Enc(s, x))i .
(2) For all A ∈ A we have Pr[FoolA,s (γ, τ, λ)] ≤ µ(λ), where the randomness is taken over the
selection of s ← Gen(1λ ) as well as A’s random coins.
(3) For all A ∈ A we have Pr[LimitA,s (ρ, τ, λ)] ≤ µ(λ), where the randomness is taken over the
selection of s ← Gen(1λ ) as well as A’s random coins.
When µ(λ) = 0 and A is the set of all (computationally unbounded) channels we say that
the code is a (q, τ, ρ, γ)-RLCC. When µ(·) is a negligible function and A is restricted to the set
of all probabilistic polynomial time (PPT) attackers we say that the code is a (q, τ, ρ, γ)-CRLCC
(computational relaxed locally correctable code).
We say that a code that satisfies conditions 1 and 2 is a Weak CRLCC, while a code satisfying
conditions 1, 2 and 3 is a Strong CRLCC code.
4
We construct Weak and Strong CRLCCs against PPT adversaries, under the assumption that
Collision-Resistant Hash Functions (CRHF) exist. Briefly, a CRHF function is a pair (GenH, H) of
probabilistic polynomial time (PPT) algorithms, where GenH takes as input a security parameter
1λ and outputs a public seed s ∈ {0, 1}∗ ; the function H : {0, 1}∗ × Σ∗ → Σℓ(λ) , takes as input
the seed s and a long enough input that is hashed into a string of length ℓ(λ). We note that H is
deterministic upon fixing s. The value ℓ(λ) is the length of the hash function. (GenH, H) is said to
be collision-resistant if for all PPT adversaries that take as input the seed s generated by Gen(1λ ),
the probability that they produce a collision pair (x, x′ ), i.e. such that H(s, x) = H(s, x′ ) and
x 6= x′ , is negligible in 1λ .
Theorem 2.4 Assuming the existence of a collision-resistant hash function (GenH, H) with length
ℓ(λ), there exist constants 0 < τ, ρ, γ < 1 and a negligible function µ, such that there exists a
constant rate (ℓ(λ) · polylog n, τ, ρ, γ, µ(·))-Weak CRLCC of blocklength n over the binary alphabet.
In particular, if ℓ(λ) = polylog λ and λ ∈ Θ(n) then the code is a (polylog n, τ, ρ, γ, µ(·))-Weak
CRLCC.
We note that in the above constructions the codes withstand a constant error rate. The classical RLCCs of [GRR18] achieve (log n)O(log log n) query complexity, constant information rate, but
subconstant error rate, in the Hamming channel.
In order to obtain Strong CRLCC we need further technical insights, that builds upon the
Weak CRLCCs. Our Strong CRLCCs have the same parameters, with only a polylog n loss in query
complexity.
Theorem 2.5 Assuming the existence of a collision-resistant hash function (GenH, H) with length
ℓ(λ), there exist constants 0 < τ, ρ, γ < 1 and a negligible function µ, such that there exists a
constant rate (polylog n, τ, ρ, γ, µ(·))-Strong CRLCC of blocklength n over the binary alphabet. In
particular, if ℓ(λ) = polylog λ and λ ∈ Θ(n) then the code is a (polylog n, τ, ρ, γ, µ(·))-Strong CRLCC.
Our constructions are systematic, so they immediately imply the existence of CRLDCs with the
same parameters.
2.1
Technical Ingredients
At a technical level our construction uses two main building blocks: local expander graphs and
collision resistant hash functions.
Local Expander Graphs Intuitively, given a graph G = (V, E) and distinguished subsets A, B ⊆
V of nodes such that A and B are disjoint and |A| = |B| we say that the pair (A, B) contains a
δ-expander if for all X ⊆ A and Y ⊆ B with |X| > δ|A| and |Y | > δ|B| there is an edge
connecting X and Y i.e., (X × Y ) ∩ E 6= ∅. A δ-local expander is a directed acyclic graph (DAG)
G with n nodes V (G) = {1, . . . , n} with the property that for any radius r > 0 and any node
v ≥ 2r the sets A = {v − 2r + 1, . . . , v − r} and B = {v − r + 1, . . . , v} contain a δ-expander.
For any constant δ > 0 it is possible to construct a δ-local expander with the property that
indeg(G) ∈ O (log n) and outdeg(G) ∈ O (log n) i.e. no node is has more that O (log n) incoming or
outgoing edges [EGS75, ABP18].
Local expanders have several nice properties that have been recently exploited in the design
and analysis of secure memory hard functions [ABH17, ABP17, BZ17, ABP18]. For example, these
5
graphs are maximally depth-robust [ABP18]. Even if we delete a large number of nodes S ⊆ V the
graph still contains a directed path of length n − (1 + ǫ) |S| for some small constant ǫ dependent
on δ — the constant ǫ can approach 0 as δ approaches 0 [ABP18]. More specifically, if we delete a
large number of nodes S
⊆ V at least n − (1 + ǫ) |S| of the nodes have the property that they are
2−α
α-good (with ǫ = α ) with respect to the deleted set S and any pair of α-good nodes u and v
are connected by a directed path (provided that δ is sufficiently small) — a node v is α-good with
respect to S if for any radius r < v we have at most αr nodes in S ∩ [v − r + 1, v] and for any radius
r ≤ n − v + 1 we have at most αr nodes in S ∩ [v, v + r − 1].
Suppose that each node is colored red or green and that we are only allowed to query each node to
obtain its color. If we let S denote the set of red nodes then we can develop an efficient randomized
testing algorithm to check if a node v is α-good or not. The tester will make O (polylog n) queries
and, with high probability, will accept any node v that is α1 -good and will reject any node w that
is not α2 -good for any constants α2 > 4 · α1 . Intuitively, for each r ∈ {21 , 22 , . . . , 2log n } the tester
will sample O (polylog n) nodes in the intervals [v, r − 1] and [v − r + 1, v] to make sure that the
fraction of red nodes is at most 2α1 . If the tester determines that a node v is at least α2 -good for an
appropriately small constant α2 then there is a long directed path of length at least n − (1 + ǫ)|S|
containing all α2 -good nodes and in particular containing v. Furthermore, if v < 3n/4 then v has
at least n/4 − (1 + ǫ)|S| descendants in this path.
Collision Resistant Hash Functions Our constructions employ collision resistant hash functions as a building block. While most of the recent progress on memory hard functions in cryptography combines local expanders (depth-robust graphs) with random oracles (e.g., see [AS15,
AT17, ABP18]), we stress that we do not need to work in the random oracle model1 . Indeed, our
constructions only assume the existence of collision resistant hash functions.
Weak CRLCCs We first explain our construction of Weak CRLCCs, which involves labeling a
δ-local expander with k nodes. In particular, given an input word x = (x1 , . . . , xk ) (broken up into
bit strings of length ℓ(λ)) and a k node local expander graph G, the label of node v is computed
as ℓv,s = H (s, xv ◦ ℓv1 ,s ◦ · · · ◦ ℓvd ,s ) ∈ {0, 1}ℓ(λ) , where ℓv1 ,s , . . . , ℓvd ,s are the labels of the parents
v1 , . . . , vd of node v, and ◦ denotes string concatenation. When ℓ(λ) ∈ O (polylog λ) we will select
λ ∈ O (n) to ensure that ℓ(λ) ∈ O (polylog n). We use the notation Enc and Dec for the encoding
and decoding of our construction, while we use ECC and ECCD to denote the efficient encoding
and decoding algorithms for a good binary code with constant rate and relative distance (e.g.,
[Jus72, SS96]) which can decode efficiently from some constant fractions of errors.
We first apply ECC to x1 , . . . , xk to obtain codewords c1 , . . . , ck ∈ {0, 1}O(ℓ(λ)) where ci =
ECC(xi ). Also, for v ∈ [k] we let cv+k = ECC(ℓv,s ) which is the encoding of the label corresponding
to the node v in G. The final output is c = (c1 , . . . , c2k−1 , c2k , c2k+1 , . . . , c3k ) where c2k+1 = . . . =
c3k = c2k consists of k copies of the last codeword c2k . The final word is an n bit message with
n = O (3kℓ (λ)). By repeating this last codeword k times we ensure that it is not possible for the
attacker to irreparably corrupt the final label ℓk,s .
Given a (possibly corrupted) codeword c′ produced by a PPT attacker A we let x′ = (x′1 , . . . , x′k )
with x′i = ECCD(c′i ) (possibly ⊥) and we let ℓ′v,s = ECCD(c′v+k ) for v ∈ [k] and ℓ′k,s,j = ECCD(c′2k+j )
1
The random oracle model is a source of some controversy among cryptographers [KM07, Men12, Gol06, KM15]
with some arguing that the framework can be used to develop cryptographic protocols that are efficient and secure [BR93], while others argue that the methodology is flawed e.g. [BL13, KM15].
6
for each j ∈ [k]. We say that a node v is green if it is locally consistent i.e.,
ℓ′v,s = H s, x′v ◦ ℓ′v1 ,s ◦ . . . ◦ ℓ′vd ,s ,
otherwise we say that the node is red. We first show that if a green node has the correct label
ℓ′v,s = ℓv,s then it must be the case that x′v = xv and ℓ′vi ,s = ℓvi ,s for each i ≤ d — otherwise
A would have found a hash collision! If a graph contains too many red nodes then this is easily
detectable by random sampling and our weak local decoder is allowed to output ⊥ if it detects any
red nodes. Our local decoder will first obtain the final label ℓk,s by random sampling some labels
from ℓ′k,s,1, . . . , ℓ′k,s,k and checking to make sure each of these labels is equal to ℓ′k,s . If this check
passes then with high probability we must have ℓ′k,s = ℓk,s since the attacker cannot corrupt too
many of these labels. Second, our local decoder will test to make sure that the last node k is at least
α2 -good. If this node is not α2 -good then we must have found a red node and our weak decoder
may output ⊥; otherwise the last node serves as an anchor point. In particular, since since label
ℓk,s = ℓ′k,s in this case collision resistance now implies that for any α2 -good node v then we must
have x′v = xv and ℓv,s = ℓ′v,s since v must be connected to the node k by a green path.
Strong CRLCCs The reason that the previous construction fails to yield a strong CRLCCs is
that it is possible for an attacker to change every node to a red-node by tampering with at most
O (k · ℓ(λ)/ log k) bits. In particular, since the δ-local expander G has outdegree O (log k) an
attacker who tampers with just O (ℓ(λ)) bits could tamper with one of the labels so that x′v 6= xv .
Now for every w ∈ [k] s.t. G contains the directed edge (v, w) the node w will be red and there are
up to O (log k) = O (log n) such nodes w.
We address this issue by first applying
a degree reduction gadget to our family {Gt }∞
t=1 of δ-local
k
expanders, where t = O ℓ(λ)·log
k , to obtain a new family of DAGs as follows: First, we replace
every node u ∈ [t] from Gt with a chain u1 , . . . , um of m = O (log t) nodes — we will refer to node
u ∈ [t] as the meta-node for this group. The result is a new graph with k = m · t nodes. Each of
the nodes u1 , . . . , um−1 will have constant indegree and constant outdegree. However, for i < m
we include the directed edges (ui , ui+1 ) and (ui , um ) — the node um will have indeg(um ) ∈ Θ(m).
Furthermore, if we have an edge (u, v) in Gt then we will add an edge of the (um , vj ) for some
j < m — this will be done in such a way that maintains indeg(vj ) ≤ 2 for each j < m. Therefore,
the node um will have outdeg(um ) ∈ Θ(log t). We now note that if the label ℓ′um ,s = ℓum ,s and the
node um is green then, by collision resistance, it must be the case that ℓ′ui ,s = ℓui ,s and x′ui = xui
for every ui with i ≤ m.
With this observation in mind we tweak our last construction by grouping the values ℓvi ,s and
xvi into groups of size m ∈ O (log t) before applying the error correcting code. In particular, given
our input word x divided into k = m · t distinct ℓ(λ)-bit strings xvi for i ≤ m and v ≤ t, our
final output will consist of c = (c1 , . . . , c3t ) where ci = ECC(x(i−1)m+1 , . . . , xim ) for i ≤ t and
cv+t = ECC (ℓv1 ,s ◦ . . . ◦ ℓvm ,s ) and c2t+1 = . . . = c3t = c2t consists of t copies of c2t . The final
codeword c will have length n ∈ O (tm · ℓ(λ)) = O (k · ℓ(λ)) bits. By grouping blocks together we
get the property that an attacker that wants to alter an individual label ℓvi ,s must pay to flip at
least Ω (ℓ(λ) · m) bits of cv+t . Thus, the attacker is significantly restricted in the way he can tamper
with the labels e.g., the attacker cannot tamper with one label in every group.
We now define a meta-node u ∈ [t] containing u1 , . . . , um , to be green if (1) node um is green, and
(2) at least 2m/3 of the nodes u1 , . . . , um are green. Even if we flip a (sufficiently small) constant
fraction of the bits in c we can show that most of the meta-nodes must be green — in fact, most of
7
these meta-nodes must also be α2 -good. In particular, there are only two ways to turn a meta-node
u red: (1) by paying to flip O (ℓ(λ) · m) bits in cu or cu+t , and (2) by corrupting at least m/3 other
meta-nodes w such that the directed edge (w, u) is in Gt . Finally, we are able to argue that, by
collision resistance, if a meta-node u ∈ [t] is green and the meta-node u is correct (i.e., x′uj = xuj
and ℓ′uj ,s = ℓuj ,s for each j ≤ m) and if we have the directed edge (w, u) in Gt then the label ℓ′wm ,s
must also be correct (thus, if the meta-node w is green then the meta-node must be correct). As
long as the number of red nodes S is sufficiently small. It follows that any α2 -good meta-node
u < 3t/4 is connected to at least t/4 − (1 + ǫ)|S| green meta-nodes. Since the attacker does not
have the budget to corrupt all t/4 − (1 + ǫ)|S| of these meta-nodes it follows that the meta-node u
must be correct. Once we determine that a meta-node u is correct (x′uj = xuj and ℓ′uj ,s = ℓuj ,s for
each j ≤ m) we can easily recover cu = ECC(x′u1 ◦ . . . ◦ x′um ) and/or cu+t = ECC(ℓ′u1 ,s ◦ . . . ◦ ℓ′um ,s ) 2 .
3
Related work
Classical LDCs/LCCs and relaxed variants in the Hamming channel The current best
constructions for LDCs/LCCs can achieve any constant rate R < 1, any constant relative distance
Hamming distance between codewords) δ < 1 − R, and query complexity
√ (i.e., minimum
log
n
log
log
n
O 2
[KMRS17]. In the constant query complexity regime, for q ≥ 3, the best codes
achieve blocklength subexponential in the message length [Yek08, Efr12, DGY11]. For q = 2,
Kerenidis and deWolf [KdW04] show an exponential in k lower bound for the blocklength of any
LDC.
A notion similar to RLDCs, called Locally Decode/Reject code, was studied by Moshkovitz
and Raz [MR10] in the context of building better PCPs. The notion concerns decoding batches of
coordinates jointly, and it allows as output a list of possible messages. In the context of simplifying
the proofs in [MR10], a related notion of decodable PCPs was studied in [DH09].
Non-local codes in computationally bounded channels In their initial works in the computationally bounded channel, Lipton [Lip94] and Ding, Gopalan and Lipton [DGL04] obtain errorcorrecting codes uniquely decodable (in the classical, global setting) with error rates beyond what
is possible in the adversarial Hamming channel. Their model requires that the sender and receiver share a secret random string, unknown to the channel. This is a strong cryptographic
assumption, as the model is unsuitable to common settings such as message broadcast. Micali
et al. [MPSW05] address this drawback by proposing public-key error-correcting codes against computationally bounded channels. Their model is based on the observation that if one starts with a
code that is list-decodable, encoding messages using a secret key and digitally signing them, one
can prevent a PPT channel from producing valid signatures, while allowing the receiver to pick
the unique message from the list with a valid signature. In follow-up work, Guruswami and Smith
[GS16] removes the public-key setup, and obtains optimal rate error-correcting codes for channels
that can be described by simple circuits. Their channels are either “oblivious”, namely the error is
independent of the actual message being sent, or they are describable by polynomial size circuits.
Their results are based on the idea that the sender can choose a permutation and a “blinding
2
If we want to recover c2t+j we can simply draw r ∈ O (polylog k) samples s1 , . . . , sr from the set c2t , . . . , c3t ,
decode to obtain y1 , . . . , yr with yj = ECCD(sj ), take a majority vote to obtain ymaj and output ECC(ymaj ).
8
factor” that are then embedded into the codeword together with the message. The channel cannot
distinguish the hidden information since it operates with low complexity, while the receiver can.
LDCs in computationally bounded channels The notion of LDCs over computationally
bounded channels was introduced in [OPS07], where the authors define private LDCs. In these
constructions the sender and the receiver share a private key. They obtain codes of constant rate
and O (polylog λ) query complexity, where λ is the security parameter. Hemenway and Ostrovsky
[HO08] build LDCs in the public-key model, and obtain codes of constant rate, and O λ2 locality.
Hemenway et al. [HOSW11] improve on these results and obtain public-key LDCs with constant
rate, constant error rate and O (λ) locality, which work under a weaker cryptographic assumption
than that of [HO08].
4
Preliminaries
We use the notation [n] to represent the set {1, 2, . . . , n}. For any x, y ∈ Σn , let dist(x) denote the
Hamming weight of x, i.e. the number of non-zero coordinates of x. Let dist(x, y) = dist(x − y)
denote the Hamming distance between the vectors x and y. For any vector x ∈ Σn , let x[i] be the
ith coordinate of x. We also let x ◦ y denote the concatenation of x with y.
We denote a directed acyclic graph G with n vertices labelled in topological order by G =
([n], E). A node v ∈ V has indegree δ = indeg(v) if there exist δ incoming edges δ = |(V × {v})∩ E|.
Thus, we say that graph G has indegree δ = indeg(G) if the maximum indegree of any node of G
is δ. A node with indegree 0 is called a source node and a node with no outgoing edges is called a
sink. A node v ∈ V has outdegree δ = outdeg(v) if there exist δ outgoing edges δ = |(V × {v}) ∩ E|.
Thus, we say that graph G has outdegree δ = outdeg(G) if the maximum outdegree of any node of
G is δ. Finally, we say that graph G has degree δ = deg(G) if the maximum degree of any node of
G is δ, or equivalently maxv∈V outdeg(v)+ indeg(v) = δ. We use parentsG (v) = {u ∈ V : (u, v) ∈ E}
to denote the parents of a node v ∈ V . We will often consider graphs obtained from other graphs
by removing subsets of nodes. Therefore if S ⊂ V , then we denote by G − S the DAG obtained
from G by removing nodes S and incident edges.
Let C be a (n, k) code that maps any k-length message over alphabet Σ to a unique n-length
codeword over alphabet Σ. We say n is the block length of the code, and k/n is the information
rate. Let Enc : Σk → Σn denote the encoding map of C. We define the minimum distance of C to
be the quantity minc1 ,c2∈C dist(c1 , c2 ) and the relative minimum distance of C to be the quantity
minc1 ,c2∈C dist(cn1 ,c2 ) .
We shall use Enc and Dec to refer to the encoding and decoding algorithms of our construction,
and ECC and ECCD to refer to the encoding and decoding algorithms for a binary code CJ with
constant rate and relative distance. We will use Justesen codes [Jus72] in what follows.
Theorem 4.1 [Jus72] For any 0 < R < 1, there exist binary linear codes of rate R, that are
efficiently decodable from ∆J (R) fraction of errors, where ∆J (R) is a function that only dependents
on R.
In particular, we use ECC and ECCD to denote the efficient encoding and decoding algorithms
of a Justesen binary linear code of rate R = 14 , and we let ∆J = ∆J (1/4) in the construction that
follows.
9
Collision Resistant Hash Functions (CRHF)
Our code constructions involve the use of collision-resistant hash functions. We use the following
definitions from Katz and Lindell [KL14].
Definition 4.2 [KL14, Definition 4.11] A hash function with alphabet Σ and blocklength ℓ(.) is a
pair Π = (GenH, H) of probabilistic polynomial time algorithms satisfying:
• GenH is a probabilistic algorithm which takes as input a security parameter 1λ and outputs a
public seed s ∈ {0, 1}∗ , where the security parameter 1λ is implicit in the string s.
• H is a deterministic algorithm that takes as input a seed s and a string Σ∗ and outputs a
string H(s, x) ∈ Σℓ(λ) .
A collision resistant hash function can be defined using the following experiment for a hash function
Π = (GenH, H), an adversary A, and a security parameter λ:
The collision-finding experiment Hash − collA,Π (λ):
(1) s ← GenH(1λ )
(2) (x, x′ ) ← A(s)
(3) The output of the experiment is 1 if and only if A successfully finds a collision, i.e.
x 6= x′ and H(s, x) = H(s, x′ ).
Then this experiment implicitly defines a collision resistant hash function.
Definition 4.3 [KL14, Definition 4.12] A hash function Π = (GenH, H) is collision resistant if
for all probabilistic polynomial time adversaries A there exists a negligible function negl such that
Pr [Hash − collA,Π (λ) = 1] ≤ negl(λ).
Background on δ-Local Expander Graphs
We now begin to describe the underlying DAGs in our code construction. We first define the class
of graphs δ-expanders and δ-local expanders.
Definition 4.4 Let δ > 0. A bipartite graph G = (U, V, E) is called a δ-expander if for all M1 ⊆ U ,
M2 ⊆ V such that |M1 | ≥ δ|U | and |M2 | ≥ δ|V |, there exists an edge e ∈ M1 × M2 .
Definition 4.5 Let δ > 0 and G = ([n], E) be a directed acyclic graph. G is called a δ-local
expander if for every vertex x ∈ [n] and every r ≤ min{x, n − x}, the bipartite graph induced by
U = [x, . . . , x + r − 1] and V = [x + r, . . . , x + 2r − 1] is a δ-expander.
Theorem 4.6, due to Alwen et al. [ABP18], states that δ-local expanders exist with degree O (log n).
Theorem 4.6 [ABP18] For any n > 0, δ > 0, there exists a δ-local expander G = ([n], E) with
indegree O (log n) and outdegree O (log n).
10
The construction of Alwen et al. [ABP18] is probabilistic. In particular, they show that there is a
random distribution over DAGs such that any sample from this distribution is a δ-local expander
with high probability. The randomized construction of Alwen et al. [ABP18] closely follows an
earlier construction of Erdos et al. [EGS75] 3 .
We now list some properties of the δ-local expander graphs shown in [ABP18]. We will use
these properties to construct the Dec algorithm for the CRLCC scheme.
Definition 4.7 (α-good node) Let G = ([n], E) be a DAG and let S ⊆ [n] be a subset of vertices.
Let 0 < c < 1. We say v ∈ [n] − S is α-good under S if for all r > 0:
|[v − r + 1, v] ∩ S| ≤ αr,
|[v, v + r − 1] ∩ S| ≤ αr.
Intuitively, we can view the subset S to be a set of “deleted” vertices. A vertex in the remaining
graph is called α-good if at most α fraction of vertices in any of its neighborhood are contained
in the deleted set. In our case, we will ultimately define S to be the nodes with the inconsistent
labels.
The following result of [ABP18] shows that in any DAG G, even if we deleted a constant fraction
of vertices, there still remain a constant fraction of vertices that are α-good.
Lemma 4.8 (Lemma 4.4 in [ABP18]) Let G = ([n], E) be a directed acyclic graph. For any
S ⊂ [n] and any 0 < α < 1, at least n − |S| 2−α
nodes in G − S are α-good under S.
α
Alwen et al. [ABP18] also show that in a δ-local expander graph G any two α-good vertices in
G − S are connected.
Lemma 4.9 (Lemma 4.3 in [ABP18]) Let G = ([n], E) be a δ-local expander, S ⊆ [n] and
0 ≤ α ≤ 1. If δ < min((1 − α)/2, 1/4), then any two α-good vertices u, v ∈ G − S are connected in
G − S.
5
Construction of Weak-CRLCC
In this section we overview the construction of a constant rate weak-CRLCC scheme. In order to
show the existence of a CRLCC scheme, we need to construct the PPT algorithms
Gen, Enc and Dec.
λ
Our construction will use a CRHF Π = (GenH, H). In particular, Gen 1 simply runs GenH 1λ
to output the public seed s.
The Enc algorithm uses the CRHF to create labels for the vertices of a δ-local expander. We
now define the recursive labeling process for the vertices of any given DAG G using H.
Definition 5.1 (Labeling)
Let Σ = {0, 1}ℓ(λ) . Given a directed acyclic graph G = ([k], E), a
λ
seed s ← GenH 1 for a collision resistant hash function H : {0, 1}∗ → {0, 1}ℓ(λ) , and a message
x = (x1 , x2 , · · · , xk ) ∈ Σk we define the labeling of graph G with x, labG,s : Σk → Σk as labG,s (x) =
(ℓ1,s , ℓ2,s , · · · , ℓk,s ), where
(
H(s, xv ),
indeg(v) = 0
ℓv,s =
H(s, xv ◦ ℓv1 ,s ◦ · · · ◦ ℓvd ,s ), 0 < indeg(v) = d,
3
While Alwen et al. [ABP18] only analyze the indegree of this construction it is trivial to see that the outdegree is
also O (log n) since the construction of Erdos et al. [EGS75] overlays multiple bipartite expander graphs on top of the
nodes V = [n]. Each bipartite expander graph has indeg, outdeg ∈ O (1) and each node is associated with O (log n)
expanders.
11
where v1 , . . . , vd are the parents of vertex v in G, according to some predetermined topological order.
We omit the subscripts G, s when the dependency on the graph G and public hash seed H is clear
from context.
5.1
Enc Algorithm
In this section we describe the Enc algorithm which takes as input a seed s ← Gen 1λ and
a message x ∈ {0, 1}k , and returns a codeword c ∈ {0, 1}n . For a security parameter λ, let
H : {0, 1}∗ → {0, 1}ℓ(λ) be a CRHF (see Definition 4.3). We will assume that Enc has access to H. In
this section we also let ECC : {0, 1}ℓ(λ) → {0, 1}4·ℓ(λ) be a standard binary code with message length
ℓ(λ) and block length 4 · ℓ(λ) (such as Justesen code [Jus72]) and let ECCD : {0, 1}4·ℓ(λ) → {0, 1}ℓ(λ)
be the decoder that efficiently decodes from ∆J fraction of errors.
Let s ← Gen(1λ ). Let k′ = k/ℓ(λ) and for δ = 1/100, let G = ([k′ ], E) be a δ-local expander
graph with indegree O (log k′ ).
Enc(s, x):
Input: x = (x1 , · · · , xk′ ) ∈ {0, 1}k where each xi ∈ {0, 1}ℓ(λ) and k = k′ · ℓ(λ).
Output: c = (c1 , · · · , c3k′ −1 ) ∈ {0, 1}n where each ci ∈ {0, 1}4·ℓ(λ) and n = 4(3k′ − 1) · ℓ(λ)
• Let labG,s (x) = ℓ1,s , · · · , ℓk′ ,s be the labeling of the graph G with input x and seed s.
• The codeword c consists of the group-wise encoding of message x, followed by the encoded
labeling of the graph using ECC, followed by k′ − 1 copies of encoded ℓk′ .
c = (ECC(x1 ), · · · , ECC(xk′ ), ECC(ℓ1,s ), · · · , ECC(ℓk′ ,s ), ECC ℓk′ ,s , · · · , ECC ℓk′ ,s ) .
|
{z
}
k ′ −1 times
...
ECC(ℓ1,s )
ECC(ℓ2,s )
ECC(ℓ3,s )
ECC(ℓ4,s )
ECC(ℓk′ ,s )
ECC(ℓ5,s )
ECC(ℓk′ ,s )
ECC(ℓk′ ,s )
ECC(ℓk′ ,s )
k′ − 1
Fig. 1: An example of an encoding with an underlying graph with k′ = k/ℓ(λ) nodes
The parameter δ = 1/100 is arbitrary, and simply chosen to satisfy Lemma 4.9. Also, note that
the codeword length is n = 4 · (3k′ − 1) · ℓ(λ) over the binary alphabet {0, 1}, where ℓ(λ) is the
length of the output of the CRHF H and the original message had length k = k′ · ℓ(λ). Therefore,
the rate nk of CRLCC scheme obtained from Enc is Θ(1).
5.2
Dec Algorithm
In this section, we detail a randomized algorithm Dec : {0, 1}n × [n] → {⊥} ∪ {0, 1} for Enc :
{0, 1}k → {0, 1}n described in Section 5.1. We assume Dec has access to the same public seed s
12
used by Enc as well as the δ-local expander used by Enc. We focus on the key ideas first and then
provide the formal description of Dec. The notion of a green node is central to Dec.
′
Given a word (corrupted codeword) w = (w1 , . . . , w3k′ −1 ) ∈ ({0, 1}4·ℓ(λ) )3k −1 we define x′i =
ECCD(wi ) ∈ {0, 1}ℓ(λ) for i ≤ k′ and ℓ′v,s = ECCD(wk′ +v ) for v ≤ k′ and ℓ′k′ ,s,i = ECCD(w2k′ +i ) for
i < k′ .
Definition 5.2 (Green/red node) We say that a node v ∈ [k′ ] with parents v1 , . . . , vd is green if
the label ℓ′v,s is consistent with the hash of its parent labels i.e., ℓ′v,s = H(s, xv ◦ℓ′v1 ,s ◦ℓ′v2 ,s ◦· · ·◦ℓ′vd ,s ).
A node that is not green is a red node.
We say that a node v is correct if ℓ′v,s = ℓv,s and x′v = xv . Lemma 5.3 highlights one of the key
reasons why green nodes are significant in our construction.
Lemma 5.3 Suppose that node v is green and correct (i.e., ℓ′v,s = ℓv,s ) and suppose that there is
a directed path from node u to node v consisting entirely of green nodes. Then either the node u is
also correct (i.e., ℓ′u,s = ℓu,s ) or the PPT adversary has produced a hash collision.
Proof : If node v is green, then by definition ℓ′v,s = H(s, x′v ◦ ℓ′v1 ,s ◦ · · · ◦ ℓ′vd ,s ) where v1 , . . . , vd are
the parents of node v. Moreover, if ℓ′v,s is unaltered, then ℓ′v,s = ℓv,s = H(s, xv ◦ℓv1 ,s ◦ℓv2 ,s ◦· · ·◦ℓvd ,s ).
Thus,
H(s, xv ◦ ℓv1 ,s ◦ ℓv2 ,s ◦ · · · ◦ ℓvd ,s ) = H(s, x′v ◦ ℓ′v1 ,s ◦ · · · ◦ ℓ′vd ,s ).
Either xv = x′v and ℓvj ,s = ℓ′vj ,s for each j ∈ [d] or we have found a hash collision. In particular,
let vj be the node that lies on the green path from u to v. Assuming we have no hash collision the
node vj is correct and green. We can extend the same argument inductively to argue that node u
must be correct.
Our local decoder will output ⊥ if it ever detects any red nodes (Note that when the codeword
is not corrupted we will have 0 red nodes).
We now consider two cases. Case 1: The input index i ≥ 8k − 4ℓ(λ). This corresponds to a bit
query within the last k′ blocks. From the construction of the code, we know that the last k′ blocks
of the encoding are the same, i.e. c2k′ +j = c2k′ for all 1 ≤ j ≤ k′ . In this case, Decw simply queries
O (log k′ ) blocks in [2k′ , 3k′ − 1], finds the decodes them to the nearest codeword and returns the
majority codeword. Since the adversary cannot corrupt many blocks beyond decoding radius, the
majority will return the correct block with high probability. See Section 5.2.1 for the formal proof.
Case 2: If the input index i < 8k − 4ℓ(λ), Decw uses the properties of the δ-local expander
′
graph to detect whether the corresponding label has been tampered
m or not. Let i denote the index
l
i
mod k′ . We check to make sure
of the node in G associated with the queried bit i i.e., i′ = 4·ℓ(λ)
that (1) the node k′ is at least α-good, and (2) the node i′ is also α-good. If either check fails then
we will output ⊥. Otherwise, by Lemma 5.3 the node i′ must be correct (with high probability)
since (1) there is a green path connecting any two α-good nodes in a δ-local expander, and (2) the
node k′ must be correct (with high probability).
The core part of the Decw then is the probabilistic procedure to verify that a node v is α-good.
First, it is clear that there is a deterministic procedure IsGreenw (v) that checks whether a given
node v ∈ [k′ ] is green or not in O (log n) coordinate queries to w (see Lemma 5.5 for the formal
statement). Now in order to verify if a node v is α-good, we need to estimate the fraction of
green nodes in any neighborhood of it. This is achieved by designing a tester that accepts v if it is
13
α/4-good with respect to the set S of red nodes and rejects with high probability if v is not α-good
(formalized in Lemma 5.6).
The key observation behind Lemma 5.6 is that it suffices to check that [v, v + 2j − 1] ∩ S ≤
α · 2j /4 for each j ≤ log k′ and that [v − 2j + 1, v] ∩ S ≤ α · 2j /4 for each j ≤ log k′ . For each j we
can sample r = O (polylog k′ ) random nodes in each of the intervals [v − 2j + 1, v] and [v, v + 2j − 1]
and use the subroutine IsGreen to count the number of red (resp. green) nodes in each interval. If
for every j ≤ log k′ the number of red nodes is both intervals at most α · 2j /2 we accept. Otherwise,
we reject.
We now proceed to formalize the decoder Dec for the Weak-CRLCC described above.
5.2.1
Query Procedure for i ≥ 8k − 4ℓ(λ)
In this section, we describe the procedure for recovering a coordinate for input i ≥ 8k − 4ℓ(λ).
We show that regardless of the underlying graph, any adversary that can change at most ∆4J k
coordinates of a codeword obtained from Enc, cannot prevent relaxed local correction for a query
on the last k′ blocks.
Consider the following algorithm Decw
1 (s, i) for any i ≥ 8k − 4ℓ(λ):
Decw
1 : Input : Index i ∈ [n] such that i ≥ 8k − 4ℓ(λ).
3
k
(1) Sample Θ log
blocks {wt } of w for t between 2k′ and 3k′ uniformly at random.
ℓ(λ)
(2) Decode each of the queried blocks wt to the corrected codeword, ct := ECC(ECCD(wt )).
(could possibly be a ⊥ if ECCD fails to decode).
(3) Let cmaj = majority{ct } be the codeword of ECC which occurs majority of the times in
Step (2) above.
(4) Output symbol (i mod 4ℓ(λ)) of cmaj .
3
We show in Lemma 5.4 that Pr [Decw
1 (s, i) = c[i]] ≥ 1 − negl(n) and uses at most O log n
queries.
Lemma 5.4 Let Enc be as described in Section 5.1. For any 8k − 4ℓ(λ) ≤ i ≤ n, Decw
1 does the
following:
(1) For any x ∈ {0, 1}k and c = Enc(s, x), it holds that Decc1 (s, i) = c[i].
(2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that
dist(c, w) ≤ ∆4J k , it holds that
Pr [Decw
1 (s, i) = c[i]] ≥ 1 −
3
Moreover, Decw
1 makes at most O log n queries to w.
Proof :
symbol.
1
2
nlog n
.
First, note that for any codeword obtained from Enc, Dec1 will always output the correct
14
Let w be the received word which is obtained by altering at most ∆4J k coordinates of some
codeword c obtained from Enc, i.e., 0 < dist(c, w) ≤ ∆4J k . From Enc, we know that the last k′
blocks of any codeword are exactly the same. Since dist(c, w) ≤ ∆4J k , at most 14 fraction of these
blocks are modified in more than ∆J fraction of their coordinates. Therefore, at least 43 fraction
of the last k′ blocks can be corrected to a unique codeword closest to them. Thus, each query
3
finds an correct codeword block with probability
at least 4 . Then by standard Chernoff bounds,
3
k
queries are correct is at least 1 − e−Ω(s) , where
the probability that the majority of the Θ log
ℓ(λ)
3
k
is the number of sampled blocks.
s = Θ log
ℓ(λ)
3
k
Since Dec1 queries O log
blocks each of length 4ℓ(λ) bits, the complexity of Dec1 is at most
ℓ(λ)
3
3
O log k = O log n .
5.2.2
Query Procedure for i < 8k − 4ℓ(λ)
In this section, we describe the algorithm for recovering a coordinate for input i < 8k−4ℓ(λ). Before
we describe the algorithm, we need a few definitions and properties of the code we constructed in
Section 5.1.
Recall that for a codeword obtained from Enc, the first k′ blocks of length 4ℓ(λ) each, corresponds to the encoding of the message symbols, and the next k′ blocks correspond to the encoding
of labels of the nodes of a fixed δ-local expander graph G = ([k′ ], E) generated using the k′ message
blocks.
In the next lemma, we describe an algorithm which verifies whether a given node of G is green
with respect to the labels obtained from the received vector w ∈ {0, 1}n . Recall from the definition
of a green node that we need to query only the labels of the parents of a given vertex v to verify
if it is green. Since the indegree of G is O (log k′ ), we can check if a particular node is green by
making at most O (log k′ ) block queries to w. We now formalize the verification procedure.
Lemma 5.5 Let G = ([k′ ], E) be δ-local expander with indegree O (log k′ ) used by Enc and let
w = (w1 , . . . , w3k′ −1 ) ∈ {0, 1}n be the corrupted word obtained from the PPT adversary. There
exists an algorithm IsGreen that uses O (ℓ(λ) log (n/ℓ(λ))) coordinate queries to w and outputs
whether a given node v ∈ [k′ ] of G is green or not.
Proof :
We claim the following algorithm achieves the desired properties:
IsGreen: Input: Node v ∈ [k′ ] of G with indegree d = O (log k′ ).
(1) Query and decode the blocks wk′ +vj for vj ∈ parentsG (v). Let ℓ′k′ +vj := ECCD(wk′ +vj ).
Return ‘Red’ if ECCD fails on any input.
(2) Query and decode the block wv . Let x′v := ECCD(wv ). Return ‘Red’ if ECCD fails.
(3) If ECCD(wk′ +v ) = H(s, x′v ◦ wk′ +v1 ◦ wk′ +v2 ◦ · · · ◦ wk′ +vd ), where vj ∈ parentsG (v) for
j ∈ [d], then output ‘Green’
(4) Else output ‘Red’.
15
IsGreen outputs whether or not the label of node v, i.e. ECCD(wk′ +v ), is green by querying at
most O (log k′ ) blocks of w. Since each block is 4ℓ(λ) bits long, and k′ = k/ℓ(λ) = O (n/ℓ(λ)), the
number of bits queried is equivalently O (ℓ(λ) log (n/ℓ(λ))).
Let w ∈ {0, 1}n be the received word obtained from the PPT adversary. Let S ⊆ [k′ ] be the
set of red nodes of G with respect to its labeling obtained from w. Let 0 < α < 1. Recall from
Definition 4.7 that we call a node i ∈ [k ′ ] of G to be α-good under the set S ⊆ [k′ ] if for all r > 0,
the number of nodes of S in any r-sized neighborhood of i is at most α·r. We now give an algorithm
to locally verify if a given node of G is α-good with high probability.
n
Lemma 5.6 For any α < 34 , there exists a procedure that makes O ℓ(λ) log3+ǫ ℓ(λ)
coordinate
queries to w and for any node i ∈ [k′ ] of G does the following:
• Accepts if i is
α
4 -good
under S with probability 1 − negl(n).
• Rejects if i is not α-good under S with probability 1 − negl(n).
Proof :
Consider the following algorithm IsGood, where S is defined to be the set of red nodes:
IsGood: Input: Node i ∈ [k′ ] of G, α < 34 , space parameter ǫ > 0.
(1) If i is not green, then Reject.
(2) For every p ∈ {1, . . . , log k′ } do:
• Sample log1+ǫ k′ nodes U1p ⊆ [i − 2p + 1, i] and U2p ⊆ [i, i + 2p − 1].
• If the fraction of red nodes in U1p or U2p is larger than 34 α, then Reject.
(3) Accept otherwise.
Note that IsGood samples at most O log2+ǫ k′ nodes of G and for each of those nodes, we
check if it is green. Using Algorithm IsGreen described in Lemma 5.5, we can verify if a node is
green using only O (log k′ ) block queries to w. Therefore the number of coordinates of w queried
by IsGood is at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) .
If the node i is red, then i ∈ S and therefore by definition it is not α-good for any α. On the
other hand, if i is α/4-good, then we know that for any r-sized neighborhoods of i, i.e [i − r + 1, i]
and [i, i + r − 1] have at most α · r/4 red nodes. In particular, for all p ∈ [log k′ ], the neighborhoods
U1p = [i − 2p + 1, i] and U2p = [i, i + 2p − 1] contain at most α · 2p−2 red nodes. So on sampling
log1+ǫ k′ nodes uniformly at random from these intervals of size 2p , the probability that we sample
1+ǫ ′
at least 43 α log1+ǫ k′ red nodes is at most e−13α log (k )/12 . Taking a union bound over all log k′
intervals, IsGood accepts any α/4-good node with probability at least 1 − negl(k′ ) = 1 − negl(n) for
ℓ(λ) = polylog n.
We now show that any node which is not α-good under S is not α/4-good for some interval of
size 2p , p > 0. Therefore, IsGood rejects any node which is not α-good with probability at least
1 − negl(k′ ). If node i is not α-good under S, then there exists a neighborhood I of i such that
the number of red nodes in I is at least α|I|. Let R(X) denote the number of red nodes for some
∗
∗
subset X ⊆ V . Let U1 ⊆ I ⊆ U2 where |U1 | = 2p and |U2 | = 2p +1 for some integer p∗ > 0. Then
∗
∗
R(U2 ) ≥ R(I) ≥ α|I| ≥ α|U1 | = α · 2p ≥
16
α p∗ +1
·2
.
4
where the inequality (*) results from i not being α-good.
Let (w, i, x) be the challenge provided by any PPT adversary such that dist(c, w) ≤ τ , where
c = Enc(x). Recall that using Algorithm Dec1 we can successfully correct any index i ≥ 8k − 4ℓ(λ).
Therefore, to design Dec2 , we assume the correctness of node k′ using Dec1 . The procedure Dec2
first checks whether nodes i and node k′ are α-good for some α < 3/4. If they are both α-good,
then by Lemma 4.9 there is a path of green nodes connecting i and node k′ . Node k′ now serves as
an anchor point by being both α-good and correct due to the repetition code, so then Lemma 5.3
implies node i is also unaltered. We now formalize this and describe Dec2 in Lemma 5.7.
Lemma 5.7 Let Enc be as described in Section 5.1. For any 1 ≤ i < 8k − 4ℓ(λ), there exists a
procedure Dec2 with the following properties:
(1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc2 (s, i) = c[i].
(2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that
dist(c, w) ≤ ∆4J k ,
Pr [Decw
2 (s, i) ∈ {c[i], ⊥}] ≥ 1 − negl(n).
Moreover, Dec2 makes at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) queries to input w for any constant ǫ > 0.
Proof :
We claim the following procedure has the desired properties.
Decw
2 : Input: Index i < 8k − 4ℓ(λ).
(1) Let S be the set of red nodes of G with respect to the labels obtained from w.
(2) Let α < 43 .
(3) Reconstruct the label of k′ -th node, ℓk′ ,s using a call to Dec1 .
m
l
i
mod k′ are α-good under S, then return
(4) If node k′ of G with label ℓk′ ,s and node 4·ℓ(λ)
wi ,
(5) Else return ⊥.
First we show that the query complexity of Dec2 is at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) . Observe that
Dec1 described in Lemma 5.4 uses majority decoding
to reconstruct the entire block w2k′ +j , for any
0 ≤ j ≤ k′ − 1. Moreover, it uses at most O log3 n coordinate queries to w in order to reconstruct
any of the last k′ blocks with 1 − negl(n). Therefore we can assume that after Step (3), the label
ℓk′ ,s of G is correct with very high probability. Also, using the procedure described in Lemma
5.6,
we can check if both the nodes k′ and i are α-good using at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) queries
for any ǫ > 0. Therefore the query complexity of Dec2 is O ℓ(λ) log3+ǫ (n/ℓ(λ)) .
To show (1), observe that if w is a codeword produced by Enc, then the label ℓk′ ,s is reconstructed
correctly with probability 1 by Dec1 in the first step. Also since S = ∅, all the nodes of G are
α-good. Therefore, Dec2 always returns the correct codeword symbol.
Now, if w is any string produced by a PPT adversary such that 0 < dist(c, w) ≤ ∆4J k , then from
the analysis of Dec1 in Lemma 5.4, we know that ℓk′ ,s is reconstructed correctly with probability
at least 1 − negl(n). If both nodes i and k′ of G are α-good under S, then by Lemma 4.9, we know
17
that there exists a path in G from node i to node k′ in G which consists of only green nodes. So,
node i is a green ancestor of node k′ . The correctness of wi then follows from Lemma 5.3.
We now combine the two correctors described above to obtain our local corrector Dec as follows:
Decw : Input : Index i.
(1) If i ≥ 8k − 4ℓ(λ), return Decw
1 (s, i)
(2) Else return Decw
2 (s, i).
Lemma 5.8 Let Enc be as described in Section 5.1. For any i ∈ [n], Dec does the following:
(1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc (s, i) = c[i].
(2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that
dist(c, w) ≤ ∆4J k ,
Pr [Decw (s, i) ∈ {c[i], ⊥}] ≥ 1 − negl(n).
Moreover, Dec makes at most O ℓ(λ) log 3+ǫ (n/ℓ(λ)) queries to input w for any constant ǫ > 0.
Proof :
The proof follows from Lemma 5.7 and Lemma 5.4. Since n = (3k′ − 1) · 4ℓ(λ), any
query on an index i < 8k − 4ℓ(λ) is handled by Lemma 5.7 while a query on an index i ≥ 8k − 4ℓ(λ)
uses at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) queries, the
is handled by Lemma 5.4. Since each scenario
3+ǫ
algorithm also uses O ℓ(λ) log
(n/ℓ(λ)) queries. Note that for ℓ(λ) = polylog n, the query
complexity of the decoder is polylog n.
We now show that our construction Π = (Gen, Enc, Dec) is a CRLCC scheme.
Proof of Theorem 2.4: Gen on input a security parameter λ simulates the generator algorithm
GenH of the CRHF to output a random seed s.
Consider s ← Gen(1λ ), Enc described in Section 5.1 and the decoder Dec described in Section 5.2
above. We claim that the triple Π = (Gen, Enc, Dec) is a CRLCC scheme.
From the construction of Enc, we know that the block length of a codeword produced by Enc is
n = (3k′ − 1) · 4 · ℓ(λ) < 12k. Therefore, the information rate of the CRLCC is O (1).
From Lemma 5.8 we know that on input (w, i, x) generated by any PPT adversary such that
dist(Enc(x), w) ≤ ∆4J k , Decw queries at most O ℓ(λ) log3+ǫ (n/ℓ(λ)) coordinates of w and returns
d ∈ {Enc(x)[i], ⊥} with probability at least 1 − negl(n). Also, Dec on input any valid encoding
(Enc(x), i, x) returns Enc(x)[i] with probability 1.
6
Strong-CRLCC
In this section, we give an improved construction that locally corrects a majority of input coordinates.
The Barrier: The challenge in correcting a constant fraction
of
the nodes in the previous
n
construction is that an adversary that is permitted to change O log n symbols can turn all nodes
red in a graph that has outdegree O (log n).
18
Key Idea: We overcome the above mentioned barrier using three ideas. First, we run the
original δ-local expander Gt through an indegree reduction gadget to obtain a new graph G with
k′ = t · m nodes in which almost every node has at most 2 incoming/outgoing edges and each node
u in Gt (called the meta-node) corresponds to m nodes u1 , . . . , um in G.
Second, we introduce the notion of green meta-node u and show that the same key properties we
used for the construction of Weak-CRLCC still hold with respect to the meta-nodes. A meta-node
u = {u1 , . . . , um } is defined to be correct if all of its corresponding nodes u1 , . . . , um are correct
(i.e., ℓ′uj ,s = ℓuj ,s and x′uj = xuj for each j ≤ m). However, we stress that the definition of a
green meta-node does not require that all uj are green. Instead we require that um is green and
most of the nodes u1 , . . . , um−1 are green. Crucially, this definition transfers the depth robustness
properties of the δ-local expander Gt to G. In particular, if a meta-node v is green and correct and
there is a directed path from u to v in Gt containing only green meta-nodes, then u must also be
correct (or we will find a hash collision).
Third, we group the labels ℓu1 ,s , . . . , ℓum ,s into blocks before encoding them using a good error
correcting code with constant rate and constant distance. This forces the attacker to flip at least
Ω (m · ℓ(λ)) bits to tamper any of the meta-nodes. In this way we can ensure that an attacker
must tamper with at least Ω (t · m · ℓ(λ)) bits to make Ω(t) meta-nodes red. Therefore, by choosing
appropriate parameters t and m, we get the Strong-CRLCC.
Metagraph
We will define the notion of a metagraph used in our approach to construct Strong-CRLCCs. For
any graph G = (V, E), let M1 , M2 , . . . Mm be a partition of the vertex set V . We call the graph
Gm = (Vm , Em ) with the following properties to be the metagraph of G.
Nodes: For every partition Mi of V , there is a unique node vi ∈ Vm . We call vi the simple node
and Mi its meta-node.
Edges: There exists an edge between vi and vj in Gm if and only if there exists an edge between u
and v in G for some u ∈ Mi and v ∈ Mj .
Graph Degree Reduction
We now describe our procedure ReduceDegree that reduces the degree of many nodes in a graph,
while simultaneously yielding a desirable meta-graph.
ReduceDegree: (Let G0 be a δ-local expander with δ = 1/100.)
Input: Graph G0 with t vertices and m = max{indeg(G0 ), outdeg(G0 )} + 1
Output: Graph G with m · t vertices.
• For each node u in G0 we add m nodes u1 , . . . , um to G. Along with each of the directed
edges (ui , ui+1 ) and (ui , um ) for i < m.
• For each directed edge (u, v) in G0 we connect the final node um to the first node vj that
currently has indegree at most 1.
Again, the choice of δ = 1/100 is only to satisfy Lemma 4.9.
19
·G· 0·
···
u
G
u1
u2
···
···
um
v
v−1
···
v1
v2
···
vm
Fig. 2: An example of a degree reduction graph
6.1
Enc Algorithm
In this section we describe the Enc algorithm which takes as input a seed s ← Gen 1λ and a message
x ∈ {0, 1}k and returns a codeword c ∈ {0, 1}n . For a security parameter λ, let H : {0, 1}∗ →
{0, 1}ℓ(λ) be a CRHF (see Definition 4.3). Recall that, ECC and ECCD denote the encoding and
decoding algorithms of a good code of rate 1/4 that can decode efficiently from ∆J fraction of
errors.
k
For t = O ℓ(λ)·log
k , let G0 = ([t], E) be a δ-local expander graph on t vertices and degree
(indegree and outdegree) m = O (log t). Let G := ReduceDegree(G0 ) be the graph with k′ :=
nodes output by the degree reducing procedure applied to G0 .
k
ℓ(λ)
Let s ← Gen(1λ )
Enc(s, x):
Input: x = (x1 , · · · , xk′ ) ∈ {0, 1}ℓ(λ)
k′
, where k = k′ · ℓ(λ)
3t−1
, where t = k′ /m and n = O (k).
Output: c = (c1 , · · · , c3t−1 ) ∈ {0, 1}4m·ℓ(λ
• Let (ℓ11 ,s , . . . , ℓ1m ,s , . . . , ℓt1 ,s . . . , ℓtm ,s ) = labG,s (x) be the labeling of the graph G with
input x using the CRHF (see Definition 5.1).
• Let U1 := (ℓ11 ,s , ℓ12 ,s , · · · , ℓ1m ,s ), . . . , Ut := (ℓt1 ,s , ℓt2 ,s , · · · , ℓtm ,s ).
• Let T1 := (x1 , x2 , . . . , xm ), . . . , Tt := (x(t−1)m+1 , x(t−1)m+2 , · · · , xtm ).
• The codeword c consists of the encoding of groups of message bits, followed by encoding
k′
using ECC of groups of labels, followed by t = m
copies of the last encoding.
c = (ECC(T1 ), ECC(T2 ), · · · , ECC(Tt ), ECC(U1 ), ECC(U2 ), · · · , ECC(Ut ),
ECC(Ut ), · · · , ECC(Ut )),
|
{z
}
t times
where ECC(Ui ) = ECC(ℓi1 ,s , . . . , ℓim ,s ) for all i ∈ [t].
Lemma 6.3 is the key lemma that did not hold for our previous construction. It states that if
for any w ∈ {0, 1}n , dist(w, c) ≤ ∆J4 ·k then the number of red meta-nodes is very small. Lemma 6.6
20
is analogous to Lemma 5.3 and asserts that if there is a green path from meta-node u to meta-node
v and v is correct then meta-node u must also be correct. It follows that any meta-node v < 4t that
is α-good must also be correct because v is connected to all other α-good meta nodes, and there
are too many α-good meta nodes for the attacker to corrupt them all. With this observation it is
relatively straightforward to extend the ideas from the previous section to build a strong Dec with
locality O (polylog n).
We also remark that it is possible to allow the rate of our code to approach 1. For example, we
can split the initial input x into chunks of size xi ∈ {0, 1}100λ so that the size of each label ℓi,s is
significantly smaller than the size of the corresponding chunk (We would also need to modify the
underlying ECC so the rate of this code is also close to 1).
6.2
Dec Algorithm
Observe that at the end of the construction, each meta-node contains exactly one node (i.e. the
final node) with indegree more than 2 (it has indegree m) and outdegree more than 2 (it has
outdegree O (m)).
The codeword c = Enc(x) consists of 3 parts. The first 4k bits correspond to the message symbols
x passed m · ℓ(λ) bits at a time through ECC. The next 4k bits correspond to t codewords ECC(Uj ),
and finally the last 4k − 4m · ℓ(λ) bits correspond to the repetitions of the final ECC codeword,
ECC(Ut ). Therefore the length of any codeword produced by Enc is O (n) since m = O (log k).
Claim 6.1 outdeg(G0 ) = Θ(log k).
Definition 6.2 We call a meta-node Mi green if both:
• At least 1 − ∆J fraction of the underlying nodes in Mi are green.
• The final node in Mi is green.
We call a meta-node red if the meta-node is not green. Similarly, we call a meta-node Mi correct if
we are able to correctly decode Mi . Observe that Mi can contain tampered nodes but still be correct.
Observe that encoding the labels of a meta node using a good code, we ensure that a meta-node
can only be corrupted by changing 4m · ℓ(λ) · ∆J bits of the meta-node or finding a hash collision:
Lemma 6.3 If dist(w, c) ≤
∆J k
4 ,
then at most
t
4
meta-nodes in G are red.
Proof : Observe that a meta-node can be made red by changing at least 4m · ℓ(λ) · ∆J bits or
by finding a hash collision. Therefore, by changing at most ∆4J k bits of a codeword, an adversary
k′
k
= 4m
can make at most 4mℓ(λ)
= 4t meta-nodes in G red.
Similar to the decoder Dec of Section 5.2, which splits the decoding procedure for the first
8k−4ℓ(λ) indices and a separate decoding procedure for the remaining indices, the current decoding
procedure has separate subroutine to handle indices corresponding to the first 2t − 1 blocks and a
separate decoding procedure for the remaining indices. In the following, we define m(i) to be the
meta-node corresponding to index i. That is,
m
l
i
l 4mℓ(λ) m, i ≤ 4k
i−4k
m(i) =
4mℓ(λ) , 4k < i ≤ 8k,
t,
i > 8k
21
6.2.1
Query Procedure for m(i) = t
In the case that m(i) = t, we run a procedure Decw
≥t (s, i) that takes advantage of the fact that any
∆J k
adversary that can change at most 4 coordinates of any codeword obtained from Enc. Thus,
the adversary cannot prevent local correction for a query on the last t groups corresponding to the
w
repetition of ECC codeword. Similar to Decw
1 in Section 5.2, the algorithm Dec≥t (s, i) randomly
samples a number of points, takes the majority of the samples, and performs decoding using ECCD.
Lemma 6.4 Let Enc be as described in Section 6.1. For any i ∈ [n] such that m(i) = t, there
exists an algorithm Decw
≥t that does the following:
(1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc≥t (s, i) = c[i].
(2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that
dist(c, w) ≤ ∆4J k ,
n
Pr Decw
≥t (s, i) = c[i] ≥ 1 − log n .
n
2
Moreover, Decw
≥t makes at most O ℓ(λ) · log n queries to input w.
Proof :
Consider the following algorithm Decw
≥t (i) for any i ∈ [n] with m(i) ≥ t:
Decw
≥t : Input : Index i ∈ [n] with m(i) ≥ t.
(1) For each 0 ≤ j < 4mℓ(λ), sample O (log n) indices of w greater than 8k − 4mℓ(λ) and
congruent to j (mod 4mℓ(λ)) uniformly at random.
(2) For each 0 ≤ j < 4mℓ(λ), choose the symbol w̃j that corresponds to the majority of the
samples from Wj .
(3) Correct the word (w̃1 , · · · , w̃4mℓ(λ) ) using ECCD and output index i (mod 4mℓ(λ)).
First, note that for any codeword obtained from Enc, Dec≥t will always output the correct symbol.
Let w be received word which is obtained by altering at most ∆4J k coordinates of some codeword
i.e, 0 < dist(c, w) ≤ ∆4J k for some codeword c obtained from Enc. We know that the last t
coordinates (mod 4mℓ(λ)) of any codeword are exactly the same, c[j] = c[j + 4mℓ(λ)] for all
j ≥ 8k − 4mℓ(λ). Since dist(c, w) ≤ ∆4J k , at most ∆8J of such coordinates j (mod 4mℓ(λ)) are
corrupted in more than 1/4 fraction of the blocks. For the remaining j, each query finds an
unmodified symbol with probability at least 1 − ∆4J . Then by standard Chernoff bounds over the
O (log n) random queries for each j (mod 4m), the probability that the majority of the O log2 n
1
queries are unmodified is at least 1 − nlog
n . Then by a simple union bound, the probability that
n
the majority of the symbols in meta-node Mt are corrected is at least 1 − nlog
n.
Since Dec≥t makes
O
(log
n)
queries
for
each
of
the
m·ℓ(λ)
congruence
classes
and m = O (log n),
then O ℓ(λ) · log2 n queries are made in total.
22
6.2.2
Query Procedure for m(i) < t
Observe from the construction that G0 is the metagraph of G Since G0 is a δ-local expander, then
for any 0 < α < 1 and subset S of vertices, the metagraph G0 − S contains at least t − |S| α2 − 1
α-good nodes by Lemma 4.8. Also, from Lemma 4.9, we know that any two α-good nodes are
connected by a path in G0 − S. Thus, by letting S be the set of all red meta-nodes, any two
α-good meta-nodes in G0 are connected by a path of green meta-nodes. We use these observations
to design the corrector for m(i) < t.
First, we claim the existence of a procedure to test whether a meta-node is green.
Lemma 6.5 Let w = (w1 , · · · w3t−1 ) ∈ {0, 1}n . There exists a procedure IsGreenMeta that uses
coordinate O ℓ(λ) · log2 n queries to w and checks whether a meta-node i of G0 with labels corresponding to w is green.
Proof :
We claim the following procedure satisfies the desired properties:
IsGreenMeta(i): Input : Meta-node index i ∈ [t].
(1) Check if the final node in meta-node i is green:
• Query coordinates of wt+i and retrieve (ℓ′i1 , . . . , ℓ′im ) := ECCD(wt+i ).
• Query the coordinates of wi and retrieve (x′i1 , . . . , x′im ) := ECCD(wi ).
• Check whether ℓ′im = H(s, x′im ◦ ℓ′i1 ◦ · · · ◦ ℓ′im−1 ) for the final node im in meta-node
i, where i1 , . . . , im−1 are the parents of im , which are all in meta-node i.
• If ℓ′im is not consistent, then output ‘Red’.
(2) For each node ij in meta-node i, check whether ij is green:
• Let ij−1 (in meta-node i) and p(j)r (in meta-node p(j)) be the parents of ij .
• Query wt+r and retrieve ℓ′p(j)r using ECCD(wt+p(j) ).
• Check whether ℓ′ij = H(s, x′ij ◦ ℓ′ij−1 ◦ ℓ′p(j)r ).
(3) If at least 1 − ∆J of the nodes in meta-node i are green, then output ‘Green’.
(4) Else, output ‘Red’.
Recall from Definition 6.2 that a green meta-node first requires that at least 1−∆J of the underlying
nodes in meta-node i are green. Since a node is green if its label is consistent with the labels of
its parents, then the procedure IsGreenMeta properly recognizes whether at least 1 − ∆J of the
underlying nodes in i are green after decoding using ECCD. Secondly, a green meta-node requires
that the final node in i is green. In this case, the final node im has m − 1 parents, and again
the procedure recognizes whether ℓ′im = H(s, x′im ◦ ℓ′i1 ◦ · · · ◦ ℓ′im−1 ) after obtaining the labels using
ECCD.
To see that the IsGreenMeta does at most O ℓ(λ) · log2 n coordinate queries, we observe that
in Step (1), we query two blocks of w each of length 4mℓ(λ) bits. Also, in Step (2), for each of the
m − 1 nodes in the meta-node i we queryone additional block
of w to check if it is green. Therefore
the total query complexity is O m2 ℓ(λ) = O ℓ(λ) · log2 n .
23
We now introduce the algorithm for recovering a coordinate for input i whose meta-node m(i)
is less than t.
Decw
<t : Input : Index i ∈ [n] with m(i) < t of G,
1
2
< α < 34 , space parameter ǫ > 0.
(1) If meta-node m(i) is not green, then return ⊥.
(2) For every p ∈ {1, . . . , log t} do:
• Sample log1+ǫ k meta-nodes U1p ⊆ [i − 2p + 1, i] and U2p ⊆ [i, i + 2p − 1].
• Use the procedure IsGreenMeta to check the fraction of red meta-nodes in U1p or
U2p .
• If the fraction of red meta-nodes in U1p or U2p is larger than 34 α, then return ⊥.
(3) Otherwise, compute ECCD(wm(i) ) if i ≤ 4k or, ECCD(wt+m(i) ) if i > 4k and return the i
(mod 4mℓ(λ))-th coordinate.
We crucially use the following lemma to prove the correctness of Dec<t procedure given in Lemma 6.7.
Lemma 6.6 The meta-node parents of a meta-node v of G0 that is green and correct must also be
correct unless a hash collision was found.
Proof :
Let v ∈ [t] be a meta-node that is green and correct and let u be a green meta-node
parent of v in the metagraph G0 . Let the nodes in v be v1 , . . . , vm and the nodes in u be u1 , . . . , um .
Let (x′v1 , . . . , x′vm ) := ECCD(wv ) and ℓ′ = (ℓ′v1 , . . . , ℓ′vm ) := ECCD(wt+v ). If v is green and correct,
then ℓ′vt ,s = ℓvt ,s and x′vt = xvt for each 1 ≤ t ≤ m − 1. Let vu be the node of v connected to u so
that ℓ′vu ,s = H(s, x′vu ◦ ℓ′vu−1 ,s ◦ · · · ℓ′vum ,s ). Similarly, ℓvu ,s = H(s, xvu ◦ ℓvu−1 ,s ◦ · · · ℓvum ,s ), so the
label for um must be correct.
Since u is green, then ℓ′um ,s = H(s, x′um ◦ ℓ′u1 ,s ◦ · · · ◦ ℓ′um−1 ,s ). Similarly, ℓ′um ,s = H(s, xum ◦ ℓu1 ,s ◦
· · · ◦ ℓum−1 ,s ). Assuming no hash collisions are found, then xum = x′um and ℓ′ut ,s = ℓut ,s for each
1 ≤ t ≤ m − 1, so u is both green and correct (after decoding using ECCD).
We now justify the correctness of the Dec<t procedure.
Lemma 6.7 Let Enc be as described in Section 6.1. For any i ∈ [n] such that m(i) < t, Dec<t
does the following:
(1) For any x ∈ {0, 1}k and c = Enc(s, x), Decc<t (s, i) = c[i].
(2) For any x ∈ {0, 1}k , c = Enc(s, x) and w ∈ {0, 1}n generated by any PPT adversary such that
dist(c, w) ≤ ∆4J ,
Pr [Decw
<t (s, i) ∈ {c[i], ⊥}] ≥ 1 − negl(n).
4+ǫ
Moreover, Decw
n queries to input w.
<t makes at most O ℓ(λ) · log
Proof :
First we show that the query complexity of Dec<t is at most O log4+ǫ n . Observe
that we query log t indices p. For each p, we sample log1+ǫ k meta-nodes to test whether the meta-
nodes are green. The IsGreenMeta procedure checks if a meta-node is green using O ℓ(λ) · log2 n
coordinate queries to w. Therefore, the total number of queries is O ℓ(λ) · log4+ǫ n .
24
Note that if w is a codeword produced by Enc, then the meta-node m(i) containing index i is
reconstructed correctly by Dec<t by ECCD(wm(i) ) or ECCD(wm(i)+t ) accordingly. Therefore, Dec<t
always returns the correct codeword symbol.
On the other hand, if w is any string produced by a PPT adversary such that 0 < dist(c, w) ≤
∆J k
4 , then Dec<t first checks whether the meta-node m(i) containing i is α-good. Recall that G0
is a δ-local expander by construction. Thus if meta-node m(i) is α-good under the set of red
meta-nodes S, then by Lemma 4.9, that there exists a path in G0 from meta-node m(i) to a later
meta-node that is α-good that consists of only green nodes. Hence, node m(i) is a green ancestor of
a green and correct meta-node. The correctness of w[i] then follows by applying a simple induction
on Lemma 6.6. We can without loss of generality assume that the last meta-node i.e. t is correct
and green using the Dec≥t described in Section 6.2.1. Therefore, we know the existence of such a
later node which is green and correct.
Combining the two decodersin Section 6.2.1 and Section 6.2.2, we get a decoder for CRLCC which
uses at most O ℓ(λ) · log2 n = polylog n for ℓ(λ) = polylog n. Now we show that we indeed get a
Strong-CRLCC and the decoder does not return a ⊥ for majority of the coordinate queries.
w
Lemma 6.8 Let Dec be defined by running Decw
<t on inputs i ∈ [n] where m(i) < t and Dec≥t on
inputs i such that m(i) = t. Then
1
Pri [Decw (s, i) 6= c[i]] > .
4
′
k
Proof : Recall from Lemma 6.3 that the number of red meta-nodes is at most 4m
. By Lemma 4.8
′
′
k
2
k
the number of α-good nodes in G0 is at least m − 4m α − 1 . Thus, there exists α < 1 so that the
7k ′
number of α-good nodes in G0 is greater than 12m
. Since the adversary can only corrupt a small
constant fraction of coordinates of the codeword, then by a simple Pigeonhole argument there is
an α-good meta-node j that is also correct, for j > 4t . Therefore, each index i such that m(i) ≤ 4t
that is in an α-good meta node has a descendant that is both α-good and correct. Hence, applying
an induction on Lemma 6.6 shows that i is correctable.
References
[ABH17]
Joël Alwen, Jeremiah Blocki, and Ben Harsha. Practical graphs for optimal sidechannel resistant memory-hard functions. In Bhavani M. Thuraisingham, David Evans,
Tal Malkin, and Dongyan Xu, editors, ACM CCS 17, pages 1001–1017. ACM Press,
October / November 2017. 2.1
[ABP17]
Joël Alwen, Jeremiah Blocki, and Krzysztof Pietrzak. Depth-robust graphs and their
cumulative memory complexity. In Jean-Sébastien Coron and Jesper Buus Nielsen,
editors, EUROCRYPT 2017, Part II, volume 10211 of LNCS, pages 3–32. Springer,
Heidelberg, May 2017. 2.1
[ABP18]
Joël Alwen, Jeremiah Blocki, and Krzysztof Pietrzak. Sustained space complexity. In
Advances in Cryptology - EUROCRYPT - 37th Annual International Conference on the
Theory and Applications of Cryptographic Techniques, Proceedings, 2018. (to appear).
2.1, 2.1, 4, 4.6, 4, 4, 4.8, 4, 4.9, 3
25
[ALRW17] Alexandr Andoni, Thijs Laarhoven, Ilya P. Razenshteyn, and Erik Waingarten. Optimal
hashing-based time-space trade-offs for approximate near neighbors. In Proceedings
of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA
2017, Barcelona, Spain, Hotel Porta Fira, January 16-19, pages 47–66, 2017. 1
[AS15]
Joël Alwen and Vladimir Serbinenko. High parallel complexity graphs and memoryhard functions. In Rocco A. Servedio and Ronitt Rubinfeld, editors, 47th ACM STOC,
pages 595–603. ACM Press, June 2015. 2.1
[AT17]
Joël Alwen and Björn Tackmann. Moderately hard functions: Definition, instantiations,
and applications. In Yael Kalai and Leonid Reyzin, editors, TCC 2017, Part I, volume
10677 of LNCS, pages 493–526. Springer, Heidelberg, November 2017. 2.1
[BFLS91]
László Babai, Lance Fortnow, Leonid A. Levin, and Mario Szegedy. Checking computations in polylogarithmic time. In Proceedings of the 23rd Annual ACM Symposium
on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, USA, pages 21–31,
1991. 1
[BGH+ 06] Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil P. Vadhan.
Robust pcps of proximity, shorter pcps, and applications to coding. SIAM J. Comput.,
36(4):889–974, 2006. A preliminary version appeared in the Proceedings of the 36th
Annual ACM Symposium on Theory of Computing (STOC). 1
[BK95]
Manuel Blum and Sampath Kannan. Designing programs that check their work. J.
ACM, 42(1):269–291, 1995. 1
[BL13]
Daniel J. Bernstein and Tanja Lange. Non-uniform cracks in the concrete: The power
of free precomputation. In Kazue Sako and Palash Sarkar, editors, ASIACRYPT 2013,
Part II, volume 8270 of LNCS, pages 321–340. Springer, Heidelberg, December 2013. 1
[BLR93]
Manuel Blum, Michael Luby, and Ronitt Rubinfeld. Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci., 47(3):549–595, 1993. 1
[BR93]
Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for
designing efficient protocols. In V. Ashby, editor, ACM CCS 93, pages 62–73. ACM
Press, November 1993. 1
[BZ17]
Jeremiah Blocki and Samson Zhou. On the depth-robustness and cumulative pebbling
cost of Argon2i. In Yael Kalai and Leonid Reyzin, editors, TCC 2017, Part I, volume
10677 of LNCS, pages 445–465. Springer, Heidelberg, November 2017. 2.1
[CGdW13] Victor Chen, Elena Grigorescu, and Ronald de Wolf. Error-correcting data structures.
SIAM J. Comput., 42(1):84–111, 2013. 1
[CKGS98] Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private information
retrieval. J. ACM, 45(6):965–981, 1998. 1
[CMS99]
Christian Cachin, Silvio Micali, and Markus Stadler. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic
26
Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pages 402–414, 1999.
1
[DGL04]
Yan Ding, Parikshit Gopalan, and Richard Lipton. Error correction against computationally bounded adversaries. Manuscript, 2004. 1, 3
[DGY11]
Zeev Dvir, Parikshit Gopalan, and Sergey Yekhanin. Matching vector codes. SIAM J.
Comput., 40(4):1154–1178, 2011. 1, 3
[DH09]
Irit Dinur and Prahladh Harsha. Composition of low-error 2-query pcps using decodable
pcps. In 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS
2009, October 25-27, 2009, Atlanta, Georgia, USA, pages 472–481, 2009. 3
[Efr12]
Klim Efremenko. 3-query locally decodable codes of subexponential length. SIAM J.
Comput., 41(6):1694–1703, 2012. 1, 3
[EGS75]
Paul Erdös, Ronald L. Graham, and Endre Szemeredi. On sparse graphs with dense
long paths. Technical report, Stanford University, Stanford, CA, USA, 1975. 2.1, 4, 3
[Gas04]
William I. Gasarch. A survey on private information retrieval (column: Computational
complexity). Bulletin of the EATCS, 82:72–107, 2004. 1
[Gol06]
Oded Goldreich. On post-modern cryptography. Cryptology ePrint Archive, Report
2006/461, 2006. http://eprint.iacr.org/2006/461. 1
[GRR18]
Tom Gur, Govind Ramnarayan, and Ron D. Rothblum. Relaxed locally correctable
codes. In 9th Innovations in Theoretical Computer Science Conference, ITCS, pages
27:1–27:11, 2018. 1, 2
[GS16]
Venkatesan Guruswami and Adam D. Smith. Optimal rate code constructions for
computationally simple channels. J. ACM, 63(4):35:1–35:37, 2016. 1, 3
[HO08]
Brett Hemenway and Rafail Ostrovsky. Public-key locally-decodable codes. In Advances
in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Proceedings, pages 126–143, 2008. 1, 3
[HOSW11] Brett Hemenway, Rafail Ostrovsky, Martin J. Strauss, and Mary Wootters. Public key
locally decodable codes with short keys. In 14th International Workshop, APPROX,
and 15th International Workshop, RANDOM, Proceedings, pages 605–615, 2011. 1, 3
[Jus72]
Jørn Justesen. Class of constructive asymptotically good algebraic codes. IEEE Trans.
Information Theory, 18(5):652–656, 1972. 2.1, 4, 4.1, 5.1
[KdW04]
Iordanis Kerenidis and Ronald de Wolf. Exponential lower bound for 2-query locally
decodable codes via a quantum argument. J. Comput. Syst. Sci., 69(3):395–420, 2004.
3
[KL14]
Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography, Second
Edition. CRC Press, 2014. 4, 4.2, 4.3
27
[KM07]
Neal Koblitz and Alfred J. Menezes. Another look at “provable security”. Journal of
Cryptology, 20(1):3–37, January 2007. 1
[KM15]
Neal Koblitz and Alfred Menezes.
The random oracle model: A twentyyear retrospective.
Cryptology ePrint Archive, Report 2015/140, 2015.
http://eprint.iacr.org/2015/140. 1
[KMRS17] Swastik Kopparty, Or Meir, Noga Ron-Zewi, and Shubhangi Saraf. High-rate locally
correctable and locally testable codes with sub-polynomial query complexity. J. ACM,
64(2):11:1–11:42, 2017. 1, 3
[KS16]
Swastik Kopparty and Shubhangi Saraf. Guest column: Local testing and decoding of
high-rate error-correcting codes. SIGACT News, 47(3):46–66, 2016. 1
[KT00]
Jonathan Katz and Luca Trevisan. On the efficiency of local decoding procedures for
error-correcting codes. In Proceedings of the Thirty-Second Annual ACM Symposium
on Theory of Computing, May 21-23, 2000, Portland, OR, USA, pages 80–86, 2000. 1
[LFKN92] Carsten Lund, Lance Fortnow, Howard J. Karloff, and Noam Nisan. Algebraic methods
for interactive proof systems. J. ACM, 39(4):859–868, 1992. 1
[Lip94]
Richard J. Lipton. A new approach to information theory. In STACS, 11th Annual
Symposium on Theoretical Aspects of Computer Science, Proceedings, pages 699–708,
1994. 1, 3
[Men12]
Alfred Menezes. Another look at provable security (invited talk). In David Pointcheval
and Thomas Johansson, editors, EUROCRYPT 2012, volume 7237 of LNCS, page 8.
Springer, Heidelberg, April 2012. 1
[MPSW05] Silvio Micali, Chris Peikert, Madhu Sudan, and David A. Wilson. Optimal error correction against computationally bounded noise. In Theory of Cryptography, Second Theory
of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005,
Proceedings, pages 1–16, 2005. 1, 3
[MR10]
Dana Moshkovitz and Ran Raz. Two-query PCP with subconstant error. J. ACM,
57(5):29:1–29:29, 2010. A preliminary version appeared in the Proceedings of 49th
Annual IEEE Symposium on Foundations of Computer Science (FOCS 2008). 3
[OPS07]
Rafail Ostrovsky, Omkant Pandey, and Amit Sahai. Private locally decodable codes.
In Automata, Languages and Programming, 34th International Colloquium, ICALP,
Proceedings, pages 387–398, 2007. 1, 3
[SS96]
Michael Sipser and Daniel A. Spielman. Expander codes. IEEE Trans. Information
Theory, 42(6):1710–1722, 1996. 2.1
[STV99]
Madhu Sudan, Luca Trevisan, and Salil P. Vadhan. Pseudorandom generators without
the XOR lemma (abstract). In Proceedings of the 14th Annual IEEE Conference on
Computational Complexity, Atlanta, Georgia, USA, May 4-6, 1999, page 4, 1999. 1
[Tre04]
Luca Trevisan. Some applications of coding theory in computational complexity. CoRR,
cs.CC/0409044, 2004. 1
28
[Yek08]
Sergey Yekhanin. Towards 3-query locally decodable codes of subexponential length.
J. ACM, 55(1):1:1–1:16, 2008. 1, 3
[Yek12]
Sergey Yekhanin. Locally decodable codes. Foundations and Trends in Theoretical
Computer Science, 6(3):139–255, 2012. 1
29
| 8cs.DS
|
1
Semantic Web Today: From Oil Rigs to Panama Papers
arXiv:1711.01518v1 [cs.AI] 5 Nov 2017
RIVINDU PERERA∗ , PARMA NAND, and BORIS BAČIĆ, Auckland University of Technology
WEN-HSIN YANG, Industrial Technology Research Institute
KAZUHIRO SEKI, Kobe University
RADEK BURGET, Brno university of technology
The next leap on the internet has already started as Semantic Web. At its core, Semantic Web transforms the document oriented
web to a data oriented web enriched with semantics embedded as metadata. This change in perspective towards the web offers
numerous benefits for vast amount of data intensive industries that are bound to the web and its related applications. The
industries are diverse as they range from Oil & Gas exploration to the investigative journalism, and everything in between.
This paper discusses eight different industries which currently reap the benefits of Semantic Web. The paper also offers a
future outlook into Semantic Web applications and discusses the areas in which Semantic Web would play a key role in the
future.
CCS Concepts: • Information systems → Semantic web description languages; • Computing methodologies →
Ontology engineering; Semantic networks;
Additional Key Words and Phrases: Semantic Web, Linked Open Data, Ontology Engineering, SPARQL
Reference format:
Rivindu Perera, Parma Nand, Boris Bacic, Wen-Hsin Yang, Kazuhiro Seki, and Radek Burget. 2017. Semantic Web Today: From
Oil Rigs to Panama Papers. (October 2017), 21 pages.
http://www.rivinduperera.com/publications
1
INTRODUCTION
The concept of Semantic Web is fast becoming a key instrument in diverse fields since its inception in 2001
through the seminal paper by Berners-lee et al. [7]. Semantic Web extends the current web infrastructure by
transforming the document web to a data web (Web of Data) which is machine readable. It also enables us to
create links within and across the data as it operates at the data level and thus is more granular than the document
level linking in the traditional web. Since the Semantic Web works at the data level with a well specified meaning,
this approach makes it widely applicable throughout diverse domains with seamless integration with a variety of
technologies. The two paragraphs below discuss case studies to illustrate the potential of Semantic Web in two
different areas.
A single offshore oil rig produces terabytes of data in a single day, making Oil and Gas industry one of the
most data intensive industries on the earth today. According to Chevron, a leading oil and gas company, the
current data load is over 6000 TB and growing at a rate of 80% annually. [9]. Instead of the traditional document
collections, Chevron started employing the Semantic Web to manage the excessive data load. The company has
came up with number of tools and techniques, and among them the ontology-driven information integration
∗ Corresponding author: [email protected]
The work reported in this paper is part of the RealText project funded by Auckland University of Technology.
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that
copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.
Copyrights for third-party components of this work must be honored. For all other uses, contact Rivindu Perera.
© 2017 Copyright held by Rivindu Perera.
XXXX-XXXX/2017/10-ART1
http://www.rivinduperera.com/publications
1:2
• R. Perera et al.
case study [8] clearly shows the flexibility and the scalability of the data model. It also reports a number of other
benefits which support easy handling of the massive data load.
On 16 April 2016, "John Doe", a whistle-blower released 2.6 Tb of data (including 320,166 text documents,
2.15 million PDF files, and 4.8 million emails) which is commonly known as Panama Papers and describes how
politicians, business entities, and other individuals evade taxes and other international sanctions. After exactly
one month, on 17 May 2016, a leading Semantic Web company, Ontotext, transformed the Panama Papers into
Linked Data form and introduced this new data collection as Linked Leaks dataset [31] which is entirely based
on the Semantic Web technologies. One of the main advantage of Linked Leaks dataset is that it is easy to query
and identify how different entities mentioned in the dataset interrelate with each other, which was very difficult
to carry out with the original unstructured text documents.
The aforementioned two case studies illustrate the integration of Semantic Web into two diverse fields in order
to represent and process information originally encoded as natural text. The objective of this paper is to present
an overview of applications and other areas where Semantic Web has contributed to improve the workflow with
its wide range of technology stack.
The rest of the paper is structured as follows. The next section is devoted for an introduction to the Semantic
Web. We describe the essence and the foundations of the Semantic Web concepts and interested readers can follow
the references to refer to extended discussions. Section 3 to Section 10 focus on eight different domains which
have benefited widely from the Semantic Web technologies. We present an overview of cutting-edge research
being carried out in these areas as well as some future research opportunities and remaining gaps. Section 11
provides a brief overview of how the semantic web can contribute to other areas which are not investigated so
far. We conclude the paper in Section 12 with an analysis on the presented information.
2
SEMANTIC WEB: A GENTLE INTRODUCTION
This section provides a brief introduction into the Semantic Web technology stack which provides the foundation
for a number of applications in a wide variety of industries.
The origin of the Semantic Web addresses a number of drawbacks of the traditional document oriented web.
Firstly, the documents which contain unstructured text are indexed and retrieved using text matching algorithms
which do not take semantics of the document into account. This results in irrelevant documents in the search
result. Secondly, the websites that generate the content based on structured backend data thus the underlying data
remains hidden, hence is not available for consumption directly by machines. The third and the most important
factor is that current web does not incorporate semantics as metadata. For example, headings in a HTML page
are merely special appearances of text and has no metadata that denotes how that information is related to the
core of the document.
Semantic Web addresses all of the above issues by providing the access to the data together with the metadata
that enables a semantic view of the information contained in the web page. This is enabled by a range of
technologies which specifies guidelines on how this data should be presented.
Figure 1 depicts the technology stacks of the Semantic Web which is a layered diagram containing all major
technologies used in the Semantic Web today. The foundation of the technology stack is the identifiers denoted
in URIs and characters represented in Unicode. Then XML is selected as the main syntax form and on which RDF
layer is placed. The RDF is a simple yet powerful knowledge representation in the form of triples. A RDF triple is
composed of a subject, predicate and an object which are represented in URI form. Current RDF schema allows
objects to be denoted as literal values instead URIs, however, subjects must be represented in URIs pointing
to entities being mentioned. Triples in Semantic Web represents the basic element of information which are
collectively organized under ontologies specified in OWL. In addition, RDFS can also be used to denote a simple
taxonomy, however, it is not powerful as OWL when specifying complex relationships. Semantic Web also
provides a querying language, SPARQL which is similar to the relational database querying language SQL,
Semantic Web Today: From Oil Rigs to Panama Papers •
1:3
Fig. 1. Layered Technology stack of the Semantic Web
however, it is more expressive and has a number of constructs specific to the Semantic Web infrastructure.
Semantic Web also contains the logic specified in Description Logic and also has its roots in Graph theory.
However more importantly, covering all of the layers in the technology stack, the security layer enables the
privacy and protection for the Semantic Web data.
The collection of the aforementioned technology stack helps the Semantic Web to be applied in number of
data intensive application areas. Furthermore, it is also supported by number of active communities, conferences
(e.g., ISWC, ESWC) and W3C (and its working groups) which set the standards for the Semantic Web.
3
OIL AND GAS INDUSTRY
As introduced briefly at the start, Oil and Gas industry is one of the most data intensive industries in the world.
This has influenced a number of Oil and Gas companies to manage the massive data load using the Semantic
Web technology stack.
The Semantic Web applications in the Oil and Gas industry can be described under four main categories.
Table 1 describes these criteria where first three were initially proposed by Chum [8] and we have added the
new category,data security, which focuses on the ways of improving the privacy and security of the data when
applying the Semantic Web infrastructure.
Although applications related to all these areas are not overly prevalent in the industry today, there are several
case studies that focus on different aspects of the four mentioned categories in Table 1. Specifically, Chevron has
carried out number of projects to investigate how Semantic Web can be beneficial to their oil exploration and
management workflow.
1:4
• R. Perera et al.
Table 1. The categories where Semantic Web applications considered in the oil and gas industry
Category
Description
Data standardization
This factor focus on how current oil and gas data can be standardized through
a Semantic Web inspired solution
Data integration
This covers how Semantic Web can combine data coming from different
processes in oil and gas industry and providing a unified view to analysts.
Data sharing and enhancement This covers how Semantic Web technologies help to share data among users,
applications, and other processes. And it further discuss the chances of
enhancing the oil and gas data.
Data security
This will discuss security issues which can arise in Semantic Web enabled
oil and gas industry.
Soma et al. [55] present the semantic web solution for real-time reservoir management system developed at
Chevron. The approach uses the semantic web to access data efficiently and to enhance a consistent view of the
information. The core of the system is relying on a meta-catalog which is a knowledgebase powered by semantic
web technologies. The system first extracts information from the repositories and enhances the data using OWL
inference before being uploaded to the knowledgebase. Furthermore, a SPARQL based querying function is
also provided, so that information can be accessed more efficiently compared to searching the semi-structured
information.
Fluor Corporation’s Accelerating Deployment of ISO 15926 (ADI) project [43, 44] describes how RDF/OWL and
ISO 159263 Part 4 Reference Data Library can be utilized to enhance the information available in the whole life
cycle of a plant. The ISO 159263 Part 4 contains definitions of plant objects and is considered as a main resource
in oil and gas industry. However, as this information is text based, its usability in computerized systems is very
low. Therefore, the ADI project transforms this information into RDF/OWL form so that computer systems can
understand and further enhance the data. In addition, the OWL form of the definitions also helps corporate level
data sharing as well as update the information on demand.
Similar to ADI project, Norwegian Daily Production Report (DPR) project also uses the ISO 15926 to standardize
the production data reporting. DPR also receives number of benefits by applying the ISO standard based ontology.
Mainly, as the production data reports use the computer understandable form of classification (i.e., ontology), the
reports can be queried easily and even the data can be compared automatically supporting automated decision
analysis.
It has also become an important goal to integrate ontologies with the increase in ontology schema to organize
oil field information. The Integrated Information Platform (IIP) project focuses on this special objective where
a platform is designed to integrate ontologies and generate new ontologies. The IIP project currently contains
the information from Petrotechnical Open Software Corporation (POSC) which provides number of ontology
classes based on ISO 15926. Furthermore it is also important to increase the awareness of such projects, so that
the ontology integration can be carried out broadly resulting a conformance within the oil and gas industry for
data definitions.
The case studies discussed in this section illustrated number of different ways that Semantic Web is employed
in the Oil and Gas industry. However, still there are many opportunities to utilize the Semantic Web concepts in
Oil and Gas to improve the workflow and the quality. For instance, Semantic Web can be combined with Internet
Semantic Web Today: From Oil Rigs to Panama Papers •
1:5
of Things (IoT) devices and other hardware accessories that are used to generate information in structured
from with underlying metadata. Such information generation can enhance the information quality as well as
supports the underlying information infrastructure. Furthermore, the need of human friendly systems to access
these information has also become a serious need. As Semantic Web data is represented in triple form unlike
natural text presented in a document (as in traditional approach), the accessibility of the data for human users
has decreased. Due to this, middle-tier frameworks to transform SPARQL, triples, and ontology specifications to
natural language and vice versa has become an important need.
4
MILITARY TECHNOLOGY
With the invention of novel military technologies that range from weaponized mobile robots to armed predator
drones, the amount of information produced is massive and grows exponentially with the number of instances
placed in the battle. More importantly, all the information produced by these automated military units are
important in making decisions on the battle. Military technologists are now very keen on Semantic Web to
manage the growing data load and support the decision analysis phase during the battle.
Halvorsen and Hansen [24] introduce a military information integration approach using Semantic Web
technologies. Military systems that are placed in a battle or towards a common goal often need to share the
information to carry out successful interconnected mission. It is also important that human agents or computerized
agents involved in the battle get background information on the objects and environment of the mission is taken
place. Halvorsen and Hansen [24] utilize the RDF and the information presentation and serialization mechanism
between agents and SPAQL as the communication protocol. The proposed communication protocol contains
both the one-off SPARQL queries as well as streaming queries which offers agents to share information or get
updates continuously on a certain task or change in the environment. In a case study presented by Halvorsen and
Hansen [24] shows how this Semantic Web based information integration system can be used for threat detection.
The case study includes number of information sources including DBpedia which is an open domain Linked
Data source. Using these information source, the system attempts to identify the threats nearby by reasoning
over number of information units which are provided as the RDF triples and acquired through SPARQL queries.
Figure 2 shows an example scenario where threat detection is taken place using the RDF triples and simple
reasoning over the triples.
The Military domain is also keen on applying the Semantic Web techniques to standardize the information
that it generates. For instance, MilInfo [59] is an ontology that contains the military information and is currently
comprised of 188 concepts. The main benefit of developing MillInfo is that the information can be shared between
the systems and information from different systems can be integrated to support the automated decision analysis.
As described previously in the approach presented by Halvorsen and Hansen [24], the information required for a
battle may reach the decision analysis system from different devices, soldiers and even from external systems. The
availability of an ontology such as MillInfo makes the information integration process easier and more accurate.
Similarly, numerous efforts have been taken to develop ontologies to conceptualize the battlefield information.
Air Tasking Order (ATO) ontology [20] is used as the formal document to assign aircrafts to missions. Since ATO
is a rich terminology, the corresponding ontology also contains number of classes which presents the formal
definition of the knowledge. Figure 3 illustrates the aircraft mission ontology which is a part of the ATO and it
also utilizes another two ontologies developed as a part of ATO, aircraft and aircraft configuration load ontology.
Frantz and Franco [20] also describe the process of building the ATO ontology which uses the OWL and has also
carried out reasoning experiments which shows good potential in numerous military applications.
Several other ontologies such as Tactics, Techniques, and Procedures ontology [36]; Air Mobility Command
(AMC) ontology [39, 40]; Computer Generated Forces (CGF) ontology collection [36] which is comprised of 4
different ontologies; and as well as Battle Management Language (BML) ontology [58] also provide a formal
1:6
• R. Perera et al.
Fig. 2. Military Information Integration Example
Fig. 3. A portion of the aircraft mission ontology which is designed by Frantz and Franco [20]
Semantic Web Today: From Oil Rigs to Panama Papers •
1:7
conceptualization of the military information which can be used for machine-to-machine interaction for enhancing
the mission effectiveness and enabling rapid situational awareness [49].
The analysis shows that Semantic Web has number of applications in the military operations in order to make
the safety as well as to achieve the goals in ease. However, there are also some opportunities to integrate Semantic
Web to further improve the military operations as well as to come up with informed decisions. One of the areas
that needs immediate attention is the transformation of information about soldiers to Semantic Web format (i.e.,
Linked Data). This has number of benefits as the data can be used to select soldiers who are ready to include in a
particular battle as well as can also be used to keep track of the soldiers who are retired. The selection of soldiers
for a particular battle can be extremely challenging when the mission is in a critical stage. Thus it may require
selecting soldiers who have prior training on a similar terrain, fluency of a particular language, or even who have
similar physical appearance so that they can reach to the enemy without being noticed. In such scenario it is
important to record all the information of a particular soldier as well as an expressive querying mechanism to
easily select limited number of candidates from a large group (e.g., selecting 5 most suitable soldiers from a 10000
group to execute a critical mission). Secondly, the retired soldiers (mostly high grade officers) have reasonable
knowledge about the battle field as well as sensitive data, it is vital to keep track of these members in a constantly
updated and linked information source which supports advanced querying mechanisms. The Semantic Web
fulfills these gap with its graph storage and SPARQL querying which is expressive than traditional relational
database querying such as SQL queries.
AKTiveSA project [52, 53] investigates the Semantic Web application in Military Operations Other Than
War (MOOTW). MOOTW covers situations such as humanitarian relief, re-establishing normalcy in an area,
noncombatant evacuation operation, and no-fly zone enforcement. Since a number of diverse agencies are
connected in such scenarios, the MOOTW operational team has to deal with a large number of heterogeneous
data sources. AKTiveSA project employs Semantic Web to improve situational awareness in such operations with a
full stack of semantic technologies. In essence, the ontologies are used as the basis for knowledge conceptualization
and to integrate information rapidly, while RDF store is used to store the information with a SPARQL endpoint
which is provided to access information with high expressive power.
5
E-GOVERNMENT
The concept of government has evolved from the first simple form of government created by the Sumerians using
clay tablets as a reporting tool to the 196 governments in the world today which operate based on complex and
advanced technologies including Artificial Intelligence (AI). However, with the advancement of the government
processes and amount of data produced in various departments, arises the need for scalable and enhanced data
managing platforms.
Semantic Web addresses this growth of government data with the new concept of e-Government where
process is largely based on IT related processes. Yang et al. [62] present the semantic information portal and the
semantic search algorithm for the e-government domain. The implementation of a semantic information portal
has numerous benefits compared to the traditional information portal which is based on unstructured text. A
semantic information portal can offer advanced search mechanisms as the information is organized on a domain
ontology which defines the conceptual representation of the data. The underlying search mechanism can utilize
the ontology to come up with search results which are more specific to the query instead of a text search as carried
out in traditional information portals. Furthermore, a semantic information portal supports the decentralization
of information by defaults unlike a centralized traditional information portal. This decentralization is a major
advantage when scaling the information portal to keep massive amount of information and serving exponentially
growing user base. In addition, semantic information portal also supports the automation of the services as the
information can be understood by the computer program as the information is unambigiously associated with
the underlying metadata. Therefore, applications such as decision analysis systems can be developed using the
1:8
• R. Perera et al.
information recorded in the semantic information portal which enables the e-Government services to operate
increased efficiency. Yang et al. [62] also implement the semantic search algorithm to retrieve results for a given
query. Instead of a traditional search approach which with text search, semantic search algorithm can also
associate the metadata associated with information and can hence can achieve a deeper search on the units of
information.
Building ontologies for the e-Government is also at the center of the semantic web based e-Government
applications. Haav [23] describes the process of developing domain ontologies targeting semantic annotation of
e-Government data services. Haav [23] introduces a process comprised of seven steps to build domain ontologies
for e-Government which starts with the collection of concepts and then follows an iterative development.
The advantage of such specified ontology design is that it supports the changes with minimum effort and
the process can be reused in a number of scenarios with minimum modifications. Several other researchers
[18, 22, 25, 28, 50, 51] also discuss how ontologies can be successfully utilized for e-Government applications. The
core advantage as pointed out by these researchers is that an ontology offers the conceptualization of information
which was earlier recorded as unstructured text with no associated meaning.
In addition to the ontologies and the applications, governments are now voluntarily engaged in the open
data initiatives where government data is published to the public to be accessed freely.. Majority of this data
is statistical data which describes the performance factors as well as some figures related to the government
operations. Therefore, RDF Data Cube vocabulary which is introduced to model statistical data has become the
defacto data model for open data published by governments. For instance, United Kingdom has made major
effort towards releasing its data as open linked data utilizing the RDF Data Cube form accessible via 19 publicly
accessible APIs [54]. This approach increases the transparency of the government as well as open new research
opportunities to increase the quality of the government based on the historical data. One of the significant
example is the analysis and visualization carried out on how UK government spending money. Figure 4 shows a
portion of this visualization where distribution of money among different governments is presented in a graph
view.
This section discussed a number of different ways in which the Semantic Web is applied in e-Governence
in order to increase the accessibility of the data as well as to open new opportunities for research and as a
result the quality of the governance is improved. The approaches mentioned here mainly focused on ontologies,
semantic services, data representation, and visualization. However, the structured form of the government data
also generates a number of other benefits towards intelligent use of this data for predictive analysis and future
resource planning. Although such intelligent analysis can be carried out at the government level, it will become
even more important to look at this from the global perspective which enables us to get ready for any upcoming
global challenge. In addition, the core factor behind such global analysis is to improve the linkage of government
datasets. In essence, we also need to focus on automated models to align and link government data thus generating
a massively interlinked government Linked Data cloud which provides a view on how different governments
perform in the globalized world.
6
E-BUSINESS AND E-COMMERCE
E-Business and e-Commerce are also key areas that handle massive amounts of data and utilize this data to make
important decisions which have substantial impact on the future of the organization. Although data is central
these applications, a large proportion is still kept as unstructured data. However in recent times, there has also a
steady trend towards the use of Semantic Web in business and commerce areas.. In this section we discuss how
e-Business and e-Commerce employ Semantic Web to to implement smart solutions that reduce the cost and
increase efficiently leading to higher overrall benefits.
One of the key requirements to enhance the business process with Semantic Web is to come up with ontologies
that can conceptualize the business workflow. Hepp [26] introduces the GoodRelations ontology which can
Semantic Web Today: From Oil Rigs to Panama Papers •
1:9
Fig. 4. A portion of the UK government open data visualization to analyze the money distribution among different departments
act as a core requirement for a successful Semantic Web based e-commerce platform. GoodRelations ontology
can be used to model e-commerce information about products, prices, offers, and many other concepts that are
frequently used in the commercial environment. This extensive representation of e-commerce entities makes the
GoodRelations ontology one of the fundamental tool in applying Semantic Web in e-commerce domain [4, 27, 41].
Akanbi [1] presents the LB2CO, an integrated e-Commerce ontology framework. The LB2CO introduces
two types of agents, namely, search agent and ontology agent to increase the usability of the e-Commerce
applications. The search agent is the main communication point to the consumer and it is capable of analyzing
metadata associated with the products. The ontology agents manages the information where products are
described ontologically, so that search agent can utilize the information and answer queries efficiently. Akanbi
also evaluates the system with a case study where a prototype is built based on the ontological framework. The
approach presents promising results where the consumers queries can be appropriately processed using the
semantics embedded in the query and also there is a wide range of future enhancements for such ontological
framework based e-Commerce platform.
Matchmaking in e-Commerce is yet another area which has widely benefited from Semantic Web. Matchmaking
in the e-Commerce context corresponds to narrowing down the search space of product or service offers in
order to select the best compatible one available. Hence, matchmaking systems need to deal with a number
of different factors which can be numerical scales as well as categorical variables which define requirements
which ultimately need to be aligned with the offer. This offers a good opportunity to employ Semantic Web as
it can work on the structured level of data and have the flexibility of defining the data with semantics which
is very important in the matchmaking process. Paolucci et al. [45] describe the implementation of DAML-S
1:10
• R. Perera et al.
sec:Threat
ent:Infrastructure
sec:ThreatPrevention
sec:Attribute
Fig. 5. A portion of the security ontology introduced by Ekelhart et al. [14]
Matchmaker which is comprised of ontologies, DAML-OIL reasoner, and a matching engine. DAML-S Matchmaker
is capable of automating business processes by interacting with the web services by utilizing the DAML annotated
data. For instance, a user can automate the entire process of planning a trip by initiating the process with a
date. DAML-S Matchmaker is then capable enough to interact with e-commerce applications including airline
services, car rentals, and even accommodation services and complete the rest of the process for the specified
date. The ontology reasoning and other semantic technologies are cornerstones of this process as they helps
the matchmaker to come up with possible solutions for the user needs. Trastour et al. [57] focus on utilizing
DAML+OIL to develop an expressive and flexible web service description language to support business-to-business
e-commerce domain. Trastour et al.’s proposed system contains the entire lifecycle of e-commerce which includes
matchmaking, negotiation, contract formation, and contract fulfillment. The systems is demonstrated using a
prototype matchmaking system that uses FaCT++ (OWL DL Reasoner) and operates on service descriptions in
DAML+OIL.
The security of e-Commerce applications based on Semantic Web has also become a key area to focus as the
application of Semantic Web can significantly change the information management and sharing strategy. . A
detailed discussion on security issues that can be present in the Semantic Web based e-Commerce can be found in
analysis carried out by Ekelhart et al. [14]. According to Ekelhart et al. [14], one of the extremely necessary need
in Semantic Web based e-commerce is to protect the integrity and availability of the ontologies. Ekelhart et al.
[14] propose XML access control as well as introduce the security ontology that helps to model security issues in
the e-commerce domain. Fig. 5 illustrates a portion of the security ontology introduced by Ekelhart et al.. The
figure indicates only the threat section of the security ontology which is composed of three main sub-ontologies,
namely, Threat, Threat Prevention, and Infrastructure.
This section illustrated how Semantic Web can be utilized in e-Business and e-Commerce domains to conceptualize data, build applications, as well as to improve security. However, there is an obvious need for movement
towards Semantic Web based data representation within business organizations. One of the major factors that
influence this movement is the difficulty in employing unstructured text in the decision making process. In
essence, unstructured text is ambiguous and finding the correct information using token matching takes time
and manual effort in a large text corpus related to the business processes. On the other hand, Semantic Web
triples encoded with semantics and schema specifications are much more precise and in addition the triples can
be queried directly hence eliminating the need for errorenous for token-matching based search.
Semantic Web Today: From Oil Rigs to Panama Papers •
7
1:11
E-HEALTH AND LIFE SCIENCES
The Entire health and life science industry is now in the transition to the e-Health movement where patient data
will be kept and analyzed electronically (possible using AI in the future) rather than paper based documents.
However, to develop solutions that work efficiently with electronic patient data that can cater for millions of
users, it needs to have scalable and queryable forms of data representation. In addition, to support integration of
AI in the future for the automation of the decision making process, this data representation should also support
holding metadata which describes the semantics of the data supporting automated systems to understand the
data.
Krummenacher et al. [35] describes the process of building the European Patient Summary (EPS) infrastructure
based on Semantic Web technologies. The EPS project focuses on building a European eHealth infrastructure
that is capable of providing a data accessing and processing platform for primary clinical data stored in eHealth
applications across the European healthcare delivery network. This aim require EPS to develop a scalable
infrastructure that can integrate information in an efficient manner. The EPS project, therefore has selected
Semantic Web that has already shown the capability of information integration in a massive scale.
Semantic Web has also been employed by Podgorelec and Pavlič [48] to integrate and store diagnostic data
of Mitral Valve Prolapse (MVP) syndrome. The architecture of the system is based on inter-connected modules
where RDF provider plays the main role of data acquisition from different sources and integrate them to increase
the accessibility of the data. The data integration framework can also interface with a web portal where the data
can be easily accessed and searched. Specifically, searching of the data which is associated with metadata can
significantly decrease the ambiguity level of the search results..
In addition to the RDF data storage, the ontologies also provide a number of benefits to the eHealth application
by presenting a conceptualization of the domain knowledge. For instance, Kim and Choi [30] present the design of
the knowledge base for heart disease detection. The knowledge base encodes knowledge acquired from ECG and
other information sources using the semantic web as the underlying technology and more specifically focusing
on ontologies to conceptually organize the knowledge. The ECG ontology which is introduced in the research
provides the conceptual overview of the wave properties of ECG such as polarity, lasting period, amplitude, and
shape of wave. This type of conceptualization can ultimately support the automated decision analysis based on
the knowledge base and can vastly reduce the workload of the medical practitioners in the future. Although,
ontologies can contribute to eHealth in a positively beneficial way compared to a simple taxonomy, mismatches
can also occur which could lead underlying knowledge infrastructure into confusions. The research proposed by
Ganguly et al. [21] focusrd on addressing the interoperability issues in ontology based eHealth applications by
resolving mismatches between the conceptual hierarchies.
The case studies discussed above shows how Semantic Web has contributed to eHealth by leveraging the
information accessibility and integration. Some workshops such as Semantic Web for Life Science (SW4LS) are
specifically devoted to discuss the impact of the Semantic Web in the eHealth domain. However, still number
of research challenges and opportunities exist in integration of Semantic Web with eHealth domain. Firstly, a
movement towards rapid conceptualization of medical and health terminologies is essential. Although, Human
Phenotype Ontology (HPO) [33], Systemized Nomenclature of Medicine Clinical Terms (SNOMED- CT) [10] and
several other ontologies have contributed to come up with a detailed specification of conceptualization, there
still remains large amount of medical and clinical knowledge that is not included in the ontologies. In addition,
certain standards and protocols need to be devised before introducing Semantic Web as a consensus data storage
(i.e. in triple stores) medium for eHealth applications as data usage in eHealth domain has number of ethical and
security constraints.
1:12
8
• R. Perera et al.
MULTIMEDIA AND E-CULTURE
Netflix, Spotify, Vevo and other related entertainment services have transformed the entire way we consume
multimedia content, boosting the industry with advanced technologies including AI based recommendation
algorithms. However, with approximately 2500 movies and 1 million songs released to the public annually, the
metadata which carries important information about these releases such as producers, actors, musicians, and
even recording companies are also growing at lightning speed. The multimedia services need this metadata to be
able to offer quality services to their users will also need to be able to handle the growing data load.
Fan and Li [17] propose an image retrieval approach utilizing ontology-guided reasoning. The proposed
approach uses the ontology to identify the semantics associated with user queries and Bayesian Network (BN)
to calculate the relevance of the images to the initial query. The ontology in this approach plays a significant
role on conceptualizing the user query by enhancing it with subclasses, superclass, and the equivalence classes.
This semantics-enabled approach significantly deviates from the traditional approach which focuses on mapping
the user query keywords to the images with no underlying semantics or conceptualization of the query terms.
Ontology utilization in image retrieval is investigated further by Wang et al. [61], introducing the multimodality
ontology to annotate and retrieve animal images. The multimodality ontology is comprised of an animal domain
ontology, textual description ontology, and a visual description ontology. All these three ontologies provide
conceptualization of the animal information and are utilized to annotate and retrieve animal images. Such an
approach can further fine tune and enhance the image retrieval systems, however, it is also important to focus on
how these ontologies can align with each other resolving any mismatches.
The aforementioned two approaches focused on Semantic Web ontologies to retrieve image ontologies. However,
Liu et al. [37] focus on reverse engineering the process by generating the image ontology from the images. The
core of the research resides on building the ontology using the SIFT feature vector which is used as properties. In
addition. Color, texture, and shape are also used to build the ontology. The importance of building the image
ontology in this way is that retrieval of images can be fine-tuned using the feature vector which is more specific
in image annotation.
The Semantic Web concepts are also applied in the video annotation and retrieval to increase the accuracy by
associating the underlying semantics. For instance, Ballan et al. [5] present a framework to annotate and retrieve
videos using ontologies and rules expressed in Semantic Web Rule Language (SWRL). The annotation process
proposed in this research automatically annotates events in a video with semantic annotations using a rule based
approach. The system learns these rules using rules specified in SWRL which can also be used to reasoning which
makes the Ballan et al.’s approach scalable in the video annotation domain.
This section introduced existing methods that Semantic Web is employed in multimedia and eCulture domain.
However, there is also an opportunity to use Semantic Web to improve the user interaction by improved suggestion
algorithms that work based on Linked Data triples. For example, a user may be watching a particular set of
movies or TV series due to a reason such as a common actor/actress, genre, or even the filming location. One of
the future tasks that Semantic Web should focus on is that associating this type of information with multimedia
content as Linked Data, and build a user model which can be represented as a Linked Data graph. Once such
model is available, machine learning algorithms can consume this information as features and can come up with
predictive data analytic models to provide suggestions for a user. In addition, the production companies can also
utilize Semantic Web enabled multimedia data platforms and machine learning models to decide on what themes
they should focus in the future and which actors/actress they should use for the upcoming movies.
9
GEO INFORMATION SYSTEMS
Geo Information Systems (GISs) rarely act individually — in general they are interconnected, and data from
different sources have to interact in order to achieve an objective. This data interaction becomes extremely
Semantic Web Today: From Oil Rigs to Panama Papers •
1:13
challenging with the massively increasing amount of data coming from multiple geo information systems. In
some cases when adapting an already available geo information systems for a different domain, terminology
matching is needed which ultimately requires data re-purposing. Another key feature required from existing geo
information systems is querying of the integrated interconnected data. Semantic Web as a single technology
stack offers unique solution for the aforementioned key challenges in Geo information systems.
Semantic Web enabled ontologies have become a key component in geospatial data conceptualization. GeoNames ontology derives geospatial information from the GEOnet Names Server (GNS) and the Geographic Names
Information System (GNIS) and presents the data in an ontology that can be processed by machine. One of the
key advantages in using ontologies in GIS is that they provide an opportunity to carry out required reasoning
which enables GIS to derive new information as well as better analyze the existing information. In addition,
the ontologies also support the integration of information from different GISs to build a scalable geographical
knowledge infrastructure. To support this information integration using ontologies, a number of researches are
now investigating the geospatial ontology matching as a key task in GIS development [11, 13, 60].
In addition to the data conceptualization, there is a clear surge in Semantic Web vocabularies for Geospatial
data. For instance, GeoSPARQL [6] focuses on designing a SPARQL standard which is more appropriate for
geospatial Semantic Web data. GeoSPARQL extends the current SPARQL formalism by providing topological
SPARQL extension functions and Rule Interchange Format (RIF) Core inference rules. These additions become
essential when quantitative reasoning and query interpretation using Geospatial data.
In addition to GeoSPARQL, number of vocabularies such as stRDF, Geom are also implemented focusing on
Geospatial Semantic Web. Interestingly, these new vocabularies are also integrated into a number of commercial
and open source Semantic Web frameworks (e.g., Apache Marmotta [2], Parliament [34]) to achieve a scalable
and intelligent Geospatial Semantic Web.
O’Dea et al. [42] describe the Semantic Information Demonstration Environment (SIDE) project which is
designed to explore the possibilities of using Semantic Web in the Geospatial analysis services. The SIDE project
allows users to query heterogeneous data sources with the single query client which is provided with a query
interface which can be used to formulate the query. The query is then executed on data sources including
Relational Database Management Systems (RDBMS), web data sources, and RDF instances which are stored
locally. In addition, the SIDE employs acore ontology, Description Logic (DL) reasoner, and a rule based reasoner.
Although SIDE is not available to access, the proposed system offers promising insight into the usage of semantic
web based technologies to make the geospatial information widely accessible.
This section showed the importance and usage of Semantic Web in geo information systems. The future
work in Semantic Web frameworks for geo information systems should focus more on enriching raw data with
additional semantics. In addition, there is a definite need for a systematic method of designing ontologies which
can conceptualize the the rich knowledge essential for Semantic Web frameworks.
10
INVESTIGATIVE AND DIGITAL JOURNALISM
Investigative Journalism is the new face of the journalism that uses deeper level research on a specific case
and compiles a report in with information that would otherwise be either unattainable or difficult to attain
manually by a journalist. The wide ranging availability of data and a smart and focused approach makes the
derived information much more richer and insightful than the information that can be compiled by a journalist
usually working under extreme time constraint.
Although the information is important and the approach is novel from the journalism perspective, the presentation mode still contains inherent accessibility issues. For instance, an investigative journalist can reveal a serious
crime and compile a report mentioning a number of previously hidden reports/communication while making
them public. However, the full benefit of these important documents is usually not reaped as these documents
are based on unstructured text which need significant amount of effort to read, understand, and link entities.
1:14
• R. Perera et al.
Semantic Web comes into play a significant role when investigative journalism faces such hurdles of presenting
the information in an accessible manner.
Panama Papers is the largest known document list that investigative journalists ever worked on. The document
list — which belongs to the the Panamanian law firm and corporate service provider Mossack Fonseca — was
leaked by an anonymous group. The information encoded in this document list contained how individuals and
organizations evade taxes and other sanctions. Although the document list contained very important information
that can generate number of interesting articles, it was a great challenge to analyze and link the natural language
information. For example, a mention of a person appears in number of different locations in the document list and
sometimes referred as his/her associated organization (e.g., the company he/she owns). Meanwhile, Ontotext — a
company that focuses on Linked Data tools — transformed the document list to Linked Data form and released
the new dataset which was introduced as “Linked Leaks dataset” [31]. The Linked Leaks dataset contains the
data in the structured form and can be queried using SPARQL. These two features make the Panama Papers
information easily accessible and also automatically include all the links between different entities. Figure 6
shows an example of the linked entities which is adapted from the technical report published by Kiryakov [31]
and class relationships in Linked Leaks dataset. Listing 1 shows a SPARQL query that can be executed on the
Linked Leaks dataset to find the politicians mentioned in the dataset.
PREFIX o n t o : < h t t p : / / www. o n t o t e x t . com / >
PREFIX l e a k s : < h t t p : / / d a t a . o n t o t e x t . com / r e s o u r c e / l e a k s / >
PREFIX d b r : < h t t p : / / d b p e d i a . o r g / r e s o u r c e / >
PREFIX dbo : < h t t p : / / d b p e d i a . o r g / o n t o l o g y / >
PREFIX r d f s : < h t t p : / / www. w3 . o r g / 2 0 0 0 / 0 1 / r d f −schema #>
PREFIX r d f : < h t t p : / / www. w3 . o r g / 1 9 9 9 / 0 2 / 2 2 − r d f −s y n t a x −ns #>
SELECT DISTINCT ? l e a k _ e n t i t y ? d b p _ e n t i t y ? country_name
FROM o n t o : d i s a b l e −sameAs
{
? l e a k _ e n t i t y l e a k s : mapped− e n t i t y ? d b p _ e n t i t y .
? d b p _ e n t i t y ?p dbr : P o l i t i c i a n .
? d b p _ e n t i t y ? p2 ? c o u n t r y .
? c o u n t r y a dbo : Country .
? c o u n t r y r d f s : l a b e l ? country_name .
FILTER ( l a n g ( ? country_name ) = " en " )
} ORDER BY ? country_name
Listing 1. SPARQL query that can be executed to find the politicians mentioned in the Linked Leaks dataset
Fern et al. [19] describe the NEWS (News Engine Web Services) project which introduces the Semantic Web
to the news agencies. The NEWS project introduces a semantic annotation component to associate news items
with metadata and an intelligence information retrieval component. The NEWS project also defines an ontology
which is expressed as a lightweight RDFS ontology which is comprised of three modules, namely, a categorization
module, a management metadata module, and a content annotation module. The categorization module supports
the automatic news categorization by providing a vocabulary which contains 12 different top level subjects and
contains 1300 categories. The management metadata module annotates the news items with information such as
authorship, news item priority, and media type. The content annotation module is also focused on annotating
news items with basic information.
Semantic Web Today: From Oil Rigs to Panama Papers •
1:15
(a) Links between different entities in the Linked Leaks
dataset as reported by Kiryakov [31]
(b) Class relationships in Linked Leaks dataset
Fig. 6. Links between different entities in the Linked Leaks dataset
Trump World Data [32] is another Linked Data resource that is currently subjected to very controversial
discussions. The dataset contains the public declarations and investigations (carried out by journalists) of Donald
J. Trump. Since Trump has significant amount of corporate connections which include a hotel in Azerbaijan and
a poker company in Las Vegas. The dataset was initially released as tables and further analysis which can reveal
deep relations was resource expensive on such dataset. However, Ontotext. a company which focuses on Linked
1:16
• R. Perera et al.
Data, converted this dataset into RDF form and with a detailed ontology. Furthermore, the dataset was linked to
open domain Linked Data resources such as DBpedia which increased both the value and validity of the data.
This section explained a number of investigative and digital journalism approaches which use Semantic Web
concepts to increase the usability of the data. However, there is also a large open space to try different Semantic
Web approaches in this domain. Specifically, there is a need for a systematic ontology design method for digital
and investigative journalism. This will provide a unique and accessible modeling experience for the journalism,
so that the data can be organized more clearly and consistently across different news agencies.
11
SEMANTIC WEB TOMORROW
The previous sections discussed eight different application domains where Semantic Web is already applied with
numerous benefits. This section focuses on presenting our view on future application areas of Semantic Web and
some initial work carried out in these areas.
11.1
Linking the Unlinked Crimes
The famous quote, “There is nothing new under the sun. It has all been done before”, is credited to the fictional
private detective created by British author Sir Arthur Conan Doyle [12]. The core idea of this quote is that
every crime that takes place in present or in future has some link through similar characteristics to a previous
one that has already taken place. Hence identifying these characteristics and building a linked cloud of crimes
helps help us identify the nexus between cases and which would enhance and increase the effciency of crime
resolution.. Semantic Web data infrastructure (i.e., Linked Data) supports this kind of data linking capability
which can be directly used in criminal investigations. Although some research is already being carried out
in similar areas like human trafficking [56] utilizing Semantic Web technologies, criminology remains largely
untouched area for Semantic Web researchers. In particular, there is a clear shortage of ontologies developed (the
only existing crime ontology we found is Italian crime ontology [3]) to conceptualize the criminology domain
and no effort has been taken to map unstructured text based detailed crime reports to structured form (i.e., triples)
using Natural Language Processing (NLP) technologies including scalable relation extraction approaches such as
OpenIE [16, 38], entity disambiguation, feature based machine learning and deep learning approaches.
11.2
Connecting the Dots in Paintings
One of the predominant skills of humans is being able to express a real or conceptual world artistically by way of
paintings. Thus it has become one of the major areas which follows a number of styles (e.g., Western, far Eastern,
African, Asian) using diverse set of media (e.g., oil, pastel, ink, acrylic), and influenced by number of artists (e.g.,
Pablo Picasso, Leonardo da Vinci, Rembrandt van Rijn). However, the conceptualization of this information (i.e.,
in the form of an extended ontology) as well as organization of this information (i.e., in the form of Linked Data)
has still not been taken into consideration. For example, such conceptualization can pave a way to advanced as
well as more accurate search function for paintings. For example, if a user wants to search portraits from Pablo
Picasso during 1903 to 1908 period, then the only available method currently exist is a text based search using
the information as keywords (e.g, Pablo Picasso painting 1903 to 1908). The accuracy of this search depends on
the way the search engine understands the query as well as the available information. However, by forming a
SPARQL query on a triple store which contains the information about paintings, a user can retrieve accurate
information in structured form and reduces the burden of analyzing the web documents as in traditional search
engine.
Semantic Web Today: From Oil Rigs to Panama Papers •
11.3
1:17
Planning before reaping the harvest
The modern agriculture is a science and unlike the traditional approaches, it currently employs number of
complex scientific processes in order to reach the optimal harvest. However, one of the significant gaps that
exists in agriculture today is the utilization of information in the automated decision analysis process. Since
automated decision analysis is a computational process which needs information in a way that computers can
understand, there is a clear need to transform unstructured agricultural information into a structured form before
implementing automated decision analysis systems. This is a good opportunity to employ Semantic Web as it is
designed specifically to prepare the information in order to make them computer understandable.
11.4
Building the Tower of Babel again
Some work has been already done in the area of linguistics and language processing which uses the Semantic
Web. However, given that linguistics is a very advanced area, the contributions are not significant to state
that linguistics has reasonably used the Semantic Web. Hence, we have included the linguistics and language
processing as an area that Semantic Web should focus more in the future. The work carried out in the area include
lexicalizing triples [47], generating triples using unstructured text [46], SPARQL query verbalization [15], and
transforming natural language questions to SPARQL queries [29]. However, there is no significant effort being
made on building relationship between multiple languages using the interlinked Semantic Web triples (i.e., as a
Linked Data cloud). For instance, languages that belong to one family shares a number of similarities in both
lexical and semantic aspects. Identifying and connecting these similarities using structured form can form a good
foundation for language translations tasks as well as some other deep language processing tasks. In addition, we
also need a detailed conceptualization of language families in the form of an extensive ontology which will also
support the aforementioned task as well as to understand the science behind the languages more clearly.
11.5
Connected Fashions
The fashion and textile industry is embracing the digital world in a very rapid pace. The information which is
related to the industry has become a cornerstone in this new transformation. For instance, the new trends in the
fashion industry originated from different corners in the world, by different designers, promoted by different
groups, and target different social groups. The information units which is related to a particular fashion is
extremely important for business entities to make decisions, identify regions for promoting them, and even to
design advertisements. Semantic Web offers the exact solution that needs to address this gap using interlinked
information infrastructure and conceptualizations of knowledge in the form of ontologies.
11.6
Maritime Web
Maritime information systems manage vast amount of information ranging from geo spatial information to
vessel tracking information. Every bit of information is important as the future planning significantly depend on
the provided information. However, the current maritime information management systems work in isolation
and and use significant amount of human hours during the decision making process. This is mainly due to
the fact that the information is not stored with associated semantics, so that computers cannot understand
the information without human intervention. This opens a clear opportunity for Semantic Web technologies
which are designed to make the information understandable for the computers. In particular, the future maritime
information management should focus on four different aspects: conceptualization of the information, extracting
structured information from the unstructured information sources, information integration within different
maritime service providers by linking the structured information, and integrating Semantic Web enabled geo
spatial information. These four aspects lead the maritime information systems towards a Semantic Web powered
maritime web.
1:18
• R. Perera et al.
11.7
From Connected Drive to Linked drive
Intelligent driver assistance systems such as ConnectedDrive, UConnect, and Entune, transform the automotive
industry to the next dimension by offering a range of services which process vast amount of information.
This information is structured as they are produced mostly by hardware systems or pulled from external web
services. This makes these systems a step closer to integration of Semantic Web, however, this information is
not represented in an interlinked form. The interlinking of information can consider ways of linking of the
information produced by automobile to other external services as well as interlinking the information within
different driver assistance systems. The latter approach is a timely need as such information integration between
the systems is a way forward to collective intelligence in the automotive industry to make the self-driving cars
with a high precision. Furthermore, the integration of Semantic Web in automotive industry will also support a
range of benefits which will inherit from technologies that power up the Semantic Web. For example, the voice
enabled driver assistance systems will be able to use the SPARQL as a information querying mechanism which
will combine the expressive power of SPARQL and communication power of natural language.
11.8
Interpreting Annual Reports
An annual report presents a summary of information in natural language. The summary of the information
illustrates the current status of an organization and its future plans, hence such reports contain critical information
in a condensed form. However, the information is presented in natural language which required more processing
time than structured information. This is because a reader has to read the whole report to get a clear overview
of the information and how the information links to previous reports or to another information source. On
the other hand, interpreting the information encoded in natural language is difficult and onerous during the
decision analysis process based on annual reports which is required by financial advisers. These drawbacks can
be successfully addressed by Semantic Web which focuses on linking information and associating data with
semantics. Some initial work on transforming annual reports into Semantic Web format can be found in the
recent work carried out by Perera and Nand [46]. However, further research on extracting triples from reports,
linking them, and organizing the triples under a rich ontology schema is essential in order to apply Semantic
Web to interpret reports.
12
CONCLUSION
This paper discussed the applications of Semantic Web in eight different genre of industries, including data
intensive industries such as oil and gas exploration to trending industries such as investigative journalism. From
the discussions, we illustrated that Semantic Web has contributed significantly to improve the state-of-the-art in
these industries through the semantic web technology stack. However, we also noticed some of the gaps that
need to be addressed in these industries, and they are also reported at the end of each section.
In addition to the current applications of Semantic Web, in Section 11 we introduced another eight industries
that we think will reap the benefits of the Semantic Web in the future. Although the list is not complete as
Semantic Web will play a role in almost every industry on the earth in the future, however, we only focused on
industries where direct and some fast integration of Semantic Web is feasible.
REFERENCES
[1] Adeyinka K Akanbi. 2014. Lb2co: a semantic ontology framework for b2c ecommerce transaction on the internet. arXiv preprint
arXiv:1401.0943 (2014).
[2] Apache. 2017. Apache Marmotta: Open Platform for Linked Data. Technical Report. The Apache Software Foundation. http://marmotta.
apache.org/
[3] Carmelo Asaro, Maria Angela Biasiotti, Paolo Guidotti, Maurizio Papini, Maria-Teresa Sagri, Daniela Tiscornia, and Others. 2003. A
domain ontology: Italian crime ontology. In ICAIL 2003 Workshop on Legal Ontologies & Web based legal information management. ACM
Semantic Web Today: From Oil Rigs to Panama Papers •
1:19
Press, Scotland, UK.
[4] Jamshaid Ashraf, Richard Cyganiak, Seán O’Riain, and Maja Hadzic. 2011. Open eBusiness Ontology Usage: Investigating Community
Implementation of GoodRelations.. In LDOW.
[5] L Ballan, M Bertini, A Del Bimbo, and G Serra. 2010. Video annotation and retrieval using ontologies and rule learning. IEEE MultiMedia
17, 4 (2010), 80–88. https://doi.org/10.1109/MMUL.2010.4
[6] Robert Battle and Dave Kolas. 2012. Enabling the geospatial semantic web with parliament and GeoSPARQL. Semantic Web 3, 4 (2012),
355–370. https://doi.org/10.3233/SW-2012-0065
[7] Tim Berners-lee, James Hendler, and Ora Lassila. 2001. The Semantic Web. Scientific American 284, 5 (2001), 35–43. https://doi.org/10.
1007/978-3-642-29923-0 arXiv:1204.6441
[8] Frank Chum. 2009. Ontology Driven Information Integration and Delivery. In W3C Workshop on Semantic Web in Oil & Gas Industry.
3–7.
[9] Jim Crompton. 2008. Putting the FOCUS on Data. In W3C Workshop on Semantic Web in Oil & Gas Industry.
[10] Thuppahi Sisira De Silva, Don MacDonald, Grace Paterson, Khokan C Sikdar, and Bonnie Cochrane. 2011. Systematized nomenclature of
medicine clinical terms (SNOMED CT) to represent computed tomography procedures. Computer methods and programs in biomedicine
101, 3 (2011), 324–329.
[11] Francisco Delgado, M. Mercedes Martínez-González, and Javier Finat. 2013. An evaluation of ontology matching techniques on geospatial
ontologies. International Journal of Geographical Information Science 27, 12 (2013), 2279–2301. https://doi.org/10.1080/13658816.2013.
812215
[12] Arthur Conan Doyle. 2013. Sherlock Holmes: The complete novels and stories. Vol. 1. Bantam classics.
[13] Heshan Du, Natasha Alechina, Mike Jackson, and Glen Hart. 2013. Matching formal and informal Geospatial Ontologies. In Lecture
Notes in Geoinformation and Cartography, Vol. 2013-Janua. 155–171. https://doi.org/10.1007/978-3-319-00615-4_9
[14] Andreas Ekelhart, Stefan Fenz, A Min Tjoa, and Edgar R Weippl. 2007. Security Issues for the Use of Semantic Web in E-Commerce.
Springer Berlin Heidelberg, Berlin, Heidelberg, 1–13. https://doi.org/10.1007/978-3-540-72035-5_1
[15] Basil Ell, Denny Vrandečić, and Elena Simperl. 2012. Spartiqulation: Verbalizing sparql queries. In Extended Semantic Web Conference.
Springer, 117–131.
[16] Oren Etzioni, Michele Banko, Stephen Soderland, and Daniel S. Weld. 2008. Open information extraction from the web. Commun. ACM
51, 12 (dec 2008), 68–74. https://doi.org/10.1145/1409360.1409378
[17] L Fan and B Li. 2006. A Hybrid Model of Image Retrieval Based on Ontology Technology and Probabilistic Ranking. In 2006 IEEE/WIC/ACM
International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI’06). 477–480. https://doi.org/10.1109/WI.2006.16
[18] L Fang, S Tang, Y Yang, R Xiao, L Li, X Deng, Y Xu, and Y Xu. 2007. An User-Driven Slight Ontology Framework Based on Meta-Ontology
for Change Management. In Advanced Information Networking and Applications Workshops, 2007, AINAW ’07. 21st International Conference
on, Vol. 1. 1007–1014. https://doi.org/10.1109/AINAW.2007.93
[19] Norberto Fern, Michael Sintek, Ansgar Bernardi, Manuel Fuentes, Angelo Marrara, and Zohar Ben-asher. 2006. NEWS: Bringing
Semantic Web Technologies into News Agencies. In International Semantic Web Conference (ISWC). Springer Berlin Heidelberg, Athens,
United States, 778–791. https://doi.org/10.1007/11926078_56
[20] Albert Frantz and Milvio Franco. 2005. A semantic web application for the air tasking order. Technical Report. DTIC Document.
[21] Pronab Ganguly, Subhagata Chattopadhyay, N. Paramesh, and Pradeep Ray. 2008. An ontology-based framework for managing semantic
interoperability issues in e-health. In 2008 10th IEEE Intl. Conf. on e-Health Networking, Applications and Service, HEALTHCOM 2008.
73–78. https://doi.org/10.1109/HEALTH.2008.4600114
[22] Asunción Gómez-Pérez, Fernando Ortiz-Rodríguez, and Boris Villazón-Terrazas. 2006. Legal ontologies for the spanish e-government.
In Current Topics in Artificial Intelligence. Springer-Verlag, 301–310. https://doi.org/10.1007/11881216_32
[23] Hele-Mai Haav. 2011. A Practical Methodology for Development of a Network of e-Government Domain Ontologies. Springer Berlin
Heidelberg, Berlin, Heidelberg, 1–13. https://doi.org/10.1007/978-3-642-27260-8_1
[24] Jonas Halvorsen and Bjørn Jervell Hansen. 2012. Integrating Military Systems using Semantic Web Technologies and Lightweight
Agents. In NATO RTO AVT-208 Symposium on Technical Advances and Changes in Tactical Missile Propulsion for Air, Sea and Land
Applications. NATO Science & Technology Organization, San Diego, California.
[25] Liquan Han and Ming Li. 2010. Application and research on ontology in e-Government workflow model. In 2010 International Conference
on Computer, Mechatronics, Control and Electronic Engineering, CMCE 2010, Vol. 1. 474–477. https://doi.org/10.1109/CMCE.2010.5610459
[26] Martin Hepp. 2008. Goodrelations: An ontology for describing products and services offers on the web. In International Conference on
Knowledge Engineering and Knowledge Management. Springer, 329–346.
[27] Martin Hepp. 2012. The web of data for e-commerce in brief. In International Conference on Web Engineering. Springer, 510–511.
[28] Knut Hinkelmann, Barbara Thönssen, and Daniela Wolff. 2010. Ontologies for e-government. In Theory and Applications of Ontology:
Computer Applications. Springer International Publishing, 429–462. https://doi.org/10.1007/978-90-481-8847-5_19
[29] Esther Kaufmann, Abraham Bernstein, and Renato Zumstein. 2006. Querix: A natural language interface to query ontologies based on
clarification dialogs. In 5th International Semantic Web Conference (ISWC 2006). Springer, 980–981.
1:20
• R. Perera et al.
[30] Ki-Hyeon Kim Ki-Hyeon Kim and Ho-Jin Choi Ho-Jin Choi. 2007. Design of a Clinical Knowledge Base for Heart Disease Detection. In
7th IEEE International Conference on Computer and Information Technology (CIT 2007). 610–615. https://doi.org/10.1109/CIT.2007.172
[31] Atanas Kiryakov. 2016. Diving in Panama Papers and Open Data to Discover Emerging News. Technical Report. Ontotext AD, Sofia,
Bulgaria. http://ontotext.com/knowledgehub/webinars/discover-emerging-news-with-open-data/
[32] Atanas Kiryakov. 2017. FactForge Debuts: Trump World Data and Instant Ranking of Industry Leaders. Technical Report. Ontotext AD.
https://ontotext.com/knowledgehub/webinars/fact-forge-debutes-trump-world-data-and-instant-ranking/
[33] Sebastian Köhler, Sandra C Doelken, Christopher J Mungall, Sebastian Bauer, Helen V Firth, Isabelle Bailleul-Forestier, Graeme CM
Black, Danielle L Brown, Michael Brudno, Jennifer Campbell, et al. 2013. The Human Phenotype Ontology project: linking molecular
biology and disease through phenotype data. Nucleic acids research 42, D1 (2013), D966–D974.
[34] Dave Kolas, Ian Emmons, and Mike Dean. 2009. Efficient linked-list rdf indexing in parliament. SSWS 9 (2009), 17–32.
[35] Reto Krummenacher, Elena Simperl, L. J B Nixon, Dario Cerizza, and Emanuele Della Valle. 2007. Enabling the European patient
summary through triplespaces. In Proceedings - IEEE Symposium on Computer-Based Medical Systems. 319–324. https://doi.org/10.1109/
CBMS.2007.45
[36] Lee Lacy, Gabriel Aviles, Karen Fraser, William Gerber, Alice M Mulvehill, and Robert Gaskill. 2005. Experiences Using OWL in Military
Applications. Technical Report. CEUR-WS.
[37] Xuejun Liu, Zhenfeng Shao, and Jun Liu. 2010. Ontology-based image retrieval with SIFT features. In Proceedings - 2010 1st International
Conference on Pervasive Computing, Signal Processing and Applications, PCSPA 2010. 464–467. https://doi.org/10.1109/PCSPA.2010.118
[38] Mausam, Michael Schmitz, Robert Bart, Stephen Soderland, and Oren Etzioni. 2012. Open language learning for information extraction.
In Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning. Association for
Computational Linguistics, Jeju Island, 523–534. http://dl.acm.org/citation.cfm?id=2390948.2391009
[39] Alice Mulvehill, Brett Benyo, and Edward DePalma. 2005. Enhancing Decision Support System Development with Semantic Web
Technology. In 9th World Multi-Conference on Systemics, Cybernetics, and Informatics (WMSC). Florida, USA.
[40] Alice Mulvehill, Brett Benyo, David Rager, and Edward DePalma. 2004. ACT-The Automated Clearance Tool: Improving the Diplomatic
Clearance Process for AMC. Technical Report. DTIC Document.
[41] Mehrdad Niknam and Saeed Karshenas. 2013. A semantic web service approach to construction cost estimating. In Computing in Civil
Engineering. American Society of Civil Engineers, 484–491.
[42] D O’Dea, Sean Geoghegan, and Chris Ekins. 2005. Dealing with geospatial information in the semantic web. AOW ’05 Proceedings of the
2005 Australasian Ontology Workshop - Volume 58 (2005), 69–73. http://dl.acm.org/citation.cfm?id=1151945
[43] Onno Paap. 2006. Accelerating Deployment of ISO 15926 (ADI). Technical Report. FIATECH Member Meeting.
[44] Onno Paap and Fluor Corporation. 2008. ISO 15926 for interoperability. In W3C Workshop on Semantic Web in Oil & Gas Industry.
[45] Massimo Paolucci, Katia Sycara, Takuya Nishimura, and Naveen Srinivasan. 2003. Toward a Semantic Web e-commerce. In Business
Information Systems.
[46] Rivindu Perera and Parma Nand. 2016. KiwiLOD: A Framework to Transform New Zealand Open Data to Linked Open Data. International
Journal of Digital Information and Wireless Communications 6, 3 (2016), 206.
[47] Rivindu Perera, Parma Nand, and Gisela Klette. 2016. RealText-lex: A Lexicalization Framework for RDF Triples. The Prague Bulletin of
Mathematical Linguistics 106, 1 (2016), 45–68.
[48] V. Podgorelec and L. Pavlič. 2007. Managing diagnostic process data using semantic web. In IEEE Symposium on Computer-Based Medical
Systems. 127–132. https://doi.org/10.1109/CBMS.2007.68
[49] Mary Pulvermacher, Salim Semy, Leo Obrst, and Suzette Stoutenburg. 2005. Perspectives on Applying Semantic Web Technologies in
Military Domains. (2005).
[50] Peter Salhofer, Bernd Stadlhofer, and Gerald Tretter. 2009. Ontology driven e-government. In Proceedings of the European Conference on
e-Government, ECEG. 540–549. https://doi.org/10.1109/ICSEA.2009.61
[51] Farzad Sanati and Jie Lu. 2012. An ontology for e-government service integration. Computer Systems Science and Engineering 27, 2
(2012), 89–101.
[52] Paul R. Smart, Alistair Russell, and Nigel R. Shadbolt. 2007. AKTiveSA: Supporting civil-military information integration in Military
Operations Other Than War. In 2007 International Conference on Integration of Knowledge Intensive Multi-Agent Systems, KIMAS 2007.
434–439. https://doi.org/10.1109/KIMAS.2007.369849
[53] Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, M. C. Shraefel, and Leslie A. Carr. 2007. AKTiveSA: A technical demonstrator system
for enhanced situation awareness. Computer Journal 50, 6 (2007), 703–716. https://doi.org/10.1093/comjnl/bxm067
[54] Tom Smith, Stefan Noble, David Avenell, and Graham Lally. 2009. DataViz: improving data visualisation for the public sector. Technical
Report. Data team - Cabinet Office. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/7611/1318351.pdf
[55] Ram Soma, Amol Bakshi, and Kanwal Gupta. 2008. Design and Implementation of a Semantic Web Solution for Real-time Reservoir
Management About CiSoft. Technical Report. World Wide Web Consortium.
[56] Pedro Szekely, Craig A. Knoblock, Jason Slepicka, Andrew Philpot, Amandeep Singh, Chengye Yin, Dipsy Kapoor, Prem Natarajan,
Daniel Marcu, Kevin Knight, David Stallard, Subessware S. Karunamoorthy, Rajagopal Bojanapalli, Steven Minton, Brian Amanatullah,
Semantic Web Today: From Oil Rigs to Panama Papers •
[57]
[58]
[59]
[60]
[61]
[62]
1:21
Todd Hughes, Mike Tamayo, David Flynt, Rachel Artiss, Shih-Fu Chang, Tao Chen, Gerald Hiebel, and Lidia Ferreira. 2015. Building and
Using a Knowledge Graph to Combat Human Trafficking. Springer International Publishing, Cham, 205–221. https://doi.org/10.1007/
978-3-319-25010-6_12
David Trastour, Claudio Bartolini, and Chris Preist. 2002. Semantic web support for the business-to-business e-commerce lifecycle. In
Proceedings of the 11th international conference on World Wide Web. ACM, 89–98.
Charles Turnitsa and Andreas Tolk. 2006. Battle management language: A triangle with five sides. In Proceedings of the Simulation
Interoperability Standards Organization (SISO) Spring Simulation Interoperability Workshop (SIW), Huntsville, AL, USA, Vol. 27.
A. Valente, D. Holmes, and F.C. Alvidrez. 2005. Using a Military Information Ontology to Build Semantic Architecture Models for
Airspace Systems. In IEEE Aerospace Conference.
Dalia E Varanka and Michelle Cheatham. 2016. Spatial Concepts for Hydrography Ontology Alignment. In AutoCarto Proceedings Papers.
224–237. http://www.cartogis.org/publications/proceedings.php?year=2016
H Wang, L T Chia, and S Liu. 2007. Semantic Retrieval with Enhanced Matchmaking and Multi-Modality Ontology. In Proceedings of
IEEE International Conference on Multimedia and Expo. 516–519. https://doi.org/10.1109/ICME.2007.4284700
Rui Yang, Nengcheng Chen, and Zhixue Liu. 2006. A new approach to a local E-government portal for information management and
deep searching. Wuhan University Journal of Natural Sciences 11, 5 (2006), 1161–1166. https://doi.org/10.1007/BF02829229
| 2cs.AI
|
1
Dynamic Connectivity Game for Adversarial
Internet of Battlefield Things Systems
arXiv:1708.05741v2 [cs.IT] 22 Dec 2017
Nof Abuzainab and Walid Saad, Senior Member, IEEE,
Abstract—In this paper, the problem of network connectivity
is studied for an adversarial Internet of Battlefield Things (IoBT)
system in which an attacker aims at disrupting the connectivity
of the network by choosing to compromise one of the IoBT nodes
at each time epoch. To counter such attacks, an IoBT defender
attempts to reestablish the IoBT connectivity by either deploying
new IoBT nodes or by changing the roles of existing nodes. This
problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that
explicitly takes into account the characteristics and requirements
of the IoBT network. In particular, the defender’s payoff captures
the IoBT latency as well as the sum of weights of disconnected
nodes at each stage of the game. Due to the dependence of the
attacker’s and defender’s actions at each stage of the game on the
network state, the feedback Stackelberg solution (FSE) is used
to solve the IoBT connectivity game. Then, sufficient conditions
under which the IoBT system will remain connected, when the
FSE solution is used, are determined analytically. Numerical
results show that the expected number of disconnected sensors,
when the FSE solution is used, decreases up to 46% compared to
a baseline scenario in which a Stackelberg game with no feedback
is used, and up to 43% compared to a baseline equal probability
policy.
I. I NTRODUCTION
HE Internet of Things (IoT) is expected to revolutionize the military battlefield in various aspects [1]–[3].
By interconnecting all military units, including soldiers and
vehicles, with various IoT devices, sensors, and actuators,
the IoT provides autonomy in the battlefield and increases
the efficiency of military networks. An IoT-enabled battlefield
will allow military commanders to acquire instanteneous information on the status of the military units. For instance,
wearables can provide instant updates on the situation of soldiers, and sensors mounted on vehicles can provide real-time
information on the status of each vehicle. Another important
IoT feature that makes it suitable for the battlefield is its
support for mobile crowdsensing. In mobile crowdsensing,
various IoT devices such as handheld devices, wearables,
vehicles, and sensors collaborate in sensing a particular type
of information. In traditional military networks, on the other
hand, dedicated sensors are deployed for each application.
Thus, a dense deployment of IoT devices can provide more
T
N. Abuzainab and W. Saad are with the department of Electrical and
Computer Engineering, Virginia Tech, Blacksburg, VA, USA, e-mail: {nof,
walids}@vt.edu
This research was sponsored by the Army Research Laboratory and was
accomplished under Grant Number W911NF-17-1-0021. The views and
conclusions contained in this document are those of the authors and should
not be interpreted as representing the official policies, either expressed or
implied, of the Army Research Laboratory or the U.S. Government. The U.S.
Government is authorized to reproduce and distribute reprints for Government
purposes notwithstanding any copyright notation herein.
Copyright (c) 2012 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to [email protected].
accurate and detailed information about the battlefield, which
can, in turn, allow building comprehensive situation awareness
and enabling more accurate decision making. This imminent
integration of the IoT with military networks forms the nexus
of the so-called Internet of Battlefield Things (IoBT) [1].
Naturally, in an IoBT, connectivity is very critical for the
successful operation of the military network as it is essential
to maintain the autonomy of the system. Military missions,
such as surveillance and situational awareness, will heavily
rely on the information collected for the battlefield, and, thus,
any disconnection in the IoBT system will result in inaccurate
decision making and poor situational awareness. In fact, the
IoBT is more vulnerable than commercial IoT networks due to
the adversarial nature of the battlefield, in which the devices
are continuously subject to security attacks. Moreover, IoBT
devices are typically small and low-cost devices that do not
support strong security mechanisms, and, hence, they can
be easily compromised by adversaries. The vulnerability of
the IoBT devices necessitates the design of novel security
solutions that are robust to adversaries and that can maintain
the connectivity of the IoBT in adversarial settings.
Connectivity reconstruction solutions were initially designed for wireless networks such as in [4] in which the nodes
select their transmission powers to maintain network connectivity. In [5] and [6], connectivity establishment mechanisms
are proposed to reestablish connectivity between sensors that
were isolated, due to faults or attacks, and a central sink in a
sensor network. In [5], the connectivity problem is formulated
as a single leader, multiple followers Stackelberg game in
which a cloud acts as the leader and chooses to activate sleep
nodes in order to maintain full connectivity, whereas the sleep
nodes act as followers with each seeking to maximize the
number of isolated nodes that it reconnects to the network.
In [6], stochastic geometry is used to design a relay-based
connectivity recovery scheme for a wireless sensor network
whose the goal is to optimize the tradeoff between the number
of selected relays and the energy spent to restore connectivity.
In [7], the authors derive conditions for regional connectivity
in an IoT industrial system while optimizing sensor coverage.
The work In [8] proposes a dynamic clustering and routing algorithm to maintain connectivity and achieve energy efficiency
in a large scale sensor network. In [9], a dynamic mobileaware IoT topology control scheme, based on a potential
game, is proposed in order to optimize IoT connectivity. The
work in [10] introduces a resilience mechanism to maintain
percolation-based connectivity in an IoT network in which an
adversary seeks to attack highly connected IoT nodes in order
to achieve the maximum possible damage. In the model of
[10], the IoT nodes report a one bit estimate of their attack
status to a common fusion center. Then, the objective of the
2
fusion center is to choose the nodes to survey such that the
number of nodes with highest degree under attack is kept
below a required threshold. The problem is formulated as a
zero-sum game between the fusion center and the attacker. In
[11], a time-reversal scheme is proposed in an IoT network
to enable connectivity between devices with heterogeneous
bandwidth requirements.
However, most of these existing works [4]–[11] consider
the connectivity problem in conventional sensor networks in
which all the nodes are simple sensors of the same type
and capabilities, whereas in the IoBT, the nodes can have
heterogeneous roles and capabilities. In fact, each IoBT device
can possess multiple sensors each of which is collecting
different types of information. Thus, the importance of each
device is dependent on the number of types of information it
is sensing. Further, the IoBT will integrate high end nodes,
commonly known as sinks, that collect the different information from the IoBT devices and perform complex operations
in order to obtain useful information needed by the military
commanders [1]–[3]. Thus, the effect of disconnection on
the IoBT depends on the type of the node that gets isolated
from the network. Further, prior art such as in [4]–[11] does
not adequately capture the dynamics of interaction between
defenders and adversaries in a battlefield. Thus, there is a need
to introduce new dynamic connectivity solutions that consider
the heterogeneity of the IoBT nodes and dynamically adapt to
the actions of adversaries in the battlefield.
The main contributions of this paper are summarized next:
• We develop a novel adaptive framework for dynamically
optimizing the connectivity of an adversarial IoBT network. In particular, we consider the connectivity problem in an IoBT that includes a set of heterogeneous
devices that sense different types of information. The
IoBT devices must transmit their information, through
intermediary local sinks, to the general sink. We consider
an adversarial IoBT in which an attacker is interested
in causing disconnection to the network by choosing to
compromise one of the IoBT nodes at each time epoch.
Meanwhile, the IoBT operator acts as a defender that
strives to maintain the connectivity of the IoBT network
by either deploying new IoBT nodes or changing the
roles of the nodes. The objective of the attacker and the
defender is to maximize their sum of payoffs until the
end of the military operation.
• We formulate the connectivity problem in the IoBT
using the framework of connectivity games [12] which
are game-theoretic frameworks suitable for addressing
problems that involve the maintenance and restoration
of a network in presence of adversaries. However, in
classical connectivity games, the sole objective is to
restore or maintain the network connectivity, whereas in
the IoBT, there are other performance metrics that must
be considered such as the latency of communication.
Thus, we propose a novel IoBT connectivity game that
is tailored to the characteristics and requirements of the
IoBT. In particular, the attacker’s payoff is expressed as
the sum of weights of disconnected nodes minus the
cost of compromising a node. The defender’s payoff, on
•
the other hand, is expressed as the utility of deploying
a new node minus the sum of weights of disconnected
nodes, the time required to deliver the information to
the IoBT general sink, and the cost of deploying a
new node. Further, in the studied IoBT connectivity
problem, the defender must maintain the number of IoBT
devices sensing the same type of information above a
certain required threshold. Thus, the defender’s strategy
set is coupled with the attacker’s action at each time
epoch. Consequently, we cast the problem as a dynamic
multistage Stackelberg connectivity game in which, at
each stage of the game, the attacker acts as a leader, and
the defender acts as a follower. Due to the dependence
of the attacker’s and defender’s actions in each stage of
the game on the network state, the feedback Stackelberg
equilibrium (FSE) is used to solve the IoBT connectivity
game.
We analytically derive sufficient conditions for the IoBT
network to remain connected at each stage of the game
when the FSE solution is used. Numerical results show
that the expected number of disconnected sensors, when
the FSE solution is used, decreases up to 43% compared
to a baseline scenario in which a Stackelberg game with
no feedback is used, and up to 46% compared to a
baseline equal probability policy.
The paper is organized as follows: Section I describes the
adversarial IoBT system model. Section II presents the formulation of the IoBT connectivity game. Section III presents the
feedback Stackelberg solution of the IoBT game. Section IV
presents sufficient connectivty conditions of the IoBT network
when the FSE is used. Section V presents the simulations
results and analysis. Finally, conclusions are drawn in Section
VI. A complete list of the notations used is in Appendix A.
II. S YSTEM M ODEL
Consider an IoBT network composed of a set D of heterogeneous devices that can be of different types within a set K
of size K. Each IoBT device can possibly represent a vehicle,
a drone, a robot, a surveillance camera, a sensor dedicated for
a certain type of application, a sensor-actuator pair or soldier
equiped with wearable sensors. Each device of type τ ∈ K
encompasses Nτ sensors (and their corresponding actuators)
sensing a subset Hτ of a set I of types of information. Due
to the heterogeneity of the IoBT nodes, in terms of roles
and capabilities, we consider a hierarchical tree structure [15]
1
. The hierarchical IoBT structure provides scalability and
allows the system operator to easily add new devices, which is
suitable for a large-scale IoBT system. The area that the IoBT
network spans is divided into subareas A1 , A2 ,...AH . Within
each area Ah , devices sensing the same type of information
j ∈ I are organized into a cluster Djh . Thus, an IoBT device
equipped with multiple sensors can belong to several clusters.
Within each cluster, one of the devices is chosen to be a cluster
head (CH), and, thus, the rest of the devices transmit their
sensed data to the CH. The CH then collects the information
1 Although the hierarchical network structure is chosen, in general, our
proposed approach can accomodate any network topology
3
GS
LS
LS
Type 1
Information
Type 2
Information
Attacker
Fig. 1: An example of the considered IoBT hierarchical system
with two subareas and two types of information.
received from the devices in the cluster and sends it to a local
sink (LS) serving subarea Ah .
In each subarea Ah , multiple LSs can be deployed for
redundancy. At any time epoch t, only one LS is activated
in each subrea Ah . Deploying redundant LSs ensures that
there is a substitute for the activated LS in case of failure
or malfunction. At each time epoch t, each activated LS
processes its information and performs more sophisticated
operations such as augmented sensing and extraction of useful
information as requested by the global sink (GS). The GS
is a high end node that eventually processes the information
received from the activated LSs in order to identify events
requested by the military commanders and provide situational
awareness. Since the nodes in the considered IoBT are of
heterogeneous capabilities and roles, each node i is assigned a
weight wi depending on its importance. The weight wi of each
device i ∈ D of type τ is measured in terms of the number of
different sensors that the device includes i.e. wi = Nτ . LSs, on
the other hand, perform more sophisticated operations. Thus,
each LS i is assigned a weight wL,i that is higher than the
weights of the devices i.e. wL,i > max1≤τ ≤K Nτ .
In this IoBT, an attacker is interested in minimizing the
connectivity of the network to prevent the GS from detecting important events thus ultimately impairing its decisions.
To achieve this goal, the attacker chooses at each time t
to compromise i.e. gain control over one of the nodes in
B = ∪H
h=1 Lh ∪ D where Lh is the set of LSs in subarea Ah .
In order to compromise each node, an attacker needs to spend
time and computations to complete the attack [13]. Thus, it
is assumed at any time t, the attacker can only compromise
one of the IoBT nodes. Thus, at time t, the attacker chooses
the node which maximizes its payoff which is expressed as
the sum of weights of all nodes that will be disconnected
from the GS, and the cost of compromising each node. This
cost pertains to the resources needed to compromise any given
targeted node. Let cτ be the cost of compromising device
of type τ and cL be the cost of compromising an LS. The
attacker also incurs additional costs cCH and caL in order to
determine the CH of each cluster or the activated LS in each
subarea. The costs cCH and caL can represent, for example,
the security costs of intercepting the beacon messages sent by
the CH or the activated LS to the remaining devices. Thus,
the total cost of attacking device i of type τ in subarea Ah
PM
is given by: ci = cτ + j=1 xijh cCH whereM = |I| and
xijh = 1 indicates that device i is the CH of cluster Djh or
xijh = 0, otherwise. The total cost incurred by attacking LS
i in subarea Ah is given by: cL,i = cLS + yih caL where yih
is the indicator that LS i is activated in subarea Ah . In order
to thwart the attacks made at each time epoch t, the defender
can choose one of the following actions:
1) Deploys a new device of type τ in subarea Ah ;
2) Changes the cluster head in cluster Djh ;
3) Changes the activated LS in subarea Ah ;
4) Deploys a new LS in area Ah .
Action 1) helps in maintaining the number of sensors necessary to maximize the amount of useful information gathered
within an area. Actions 2) and 3) ensure the robustness of
the network in case the currently activated LS or CH fails or
is destroyed by the attacker. In practice, the newly deployed
devices are typically brought from a warehouse that is in
the proximity of the battlefield. Action 4) ensures that there
will always exist an LS that could serve the sensors in any
subarea in case the activated LS fails or is compromised by the
attacker. For actions 1) and 4), the defender will incur a cost of
deploying a device or an LS. Let dτ be the cost of deploying
a device of type τ and let dL be the cost of deploying an LS.
In an IoBT, the newly deployed devices and LSs are intially
stored, prior to deployment, in a storage facility (or a military
base) that is in the proximity of the IoBT network that is
assumed to be secured from the attacker.
The objective of the defender is to maximize a payoff that
captures the difference between the achieved utility and the
sum of its costs until the end of the military operation at time
epoch T . This maximization will be subject to the constraint
that the number of sensors Njh (t) sensing information of type
j in subarea Ah at each time epoch t does not fall below
a certain threshold Nth,jh . This constraint ensures that the
GS as well as the LSs obtain the necessary information of
type j in a certain subarea Ah . The utility achieved from
deploying a device of type τ in subarea Ah is expressed
in terms of the number of clusters that will restore their
numberPof sensors above the threshold and is given by
M
uτ = j=1 I(j ∈ Hτ )I(Njh (t) < Nth,jh ) where I(.) is an
indicator function. The utility achieved from deploying an LS
in subarea Ah is given by uL = B − Lh where Lh = |Lh |
and B is a constant that reflects the recommended number of
LSs in each subarea. The defender’s utility is the utility of
deploying a new device or an LS. The defender’s cost at each
time epoch t is expressed in terms of the sum of weights of
disconnected nodes, the time spent to deliver the information
to the GS, and the cost of deploying a new node.
Due to the clear dependence between the goals and the
actions of the attacker and the defender as well as the impact
of the attacker and defender’s actions on the IoBT network
graph, the problem will be formulated as a noncooperative
positional game [12] and [14], as explained next.
III. I O BT C ONNECTIVITY G AME
Connectivity games are game-theoretic models [12] that
capture situations which require the maintainenance and
4
restoration of the normal operations of a given network. Connectivity games typically involve two players: a constructor
who is responsible for restoration of nodes as well as the
addition of new nodes, and a destructor who removes nodes
from the network. The constructor in our game is the IoBT
defender whereas the destructor is the attacker. A connectivity
game [12] is an interactive game in which the constructor and
the destructor play in alternation until one of the players wins
the game. The winning condition for the constructor involves
maintaining the connectivity of the network. In particular,
there are two types of objectives considered in classsical
connectivity games [12]: 1) A safety objective in which the
constructor must maintain the connectivity of the network in
every step of the game and 2) A reachability objective in which
the constructor must obtain a connected network starting from
a disconnected network.
However, in the IoBT setting, the objective is not only to
maintain the network connectivity but also to maximize the
network efficiency (for example in terms of energy efficiency
and latency). Further, in the IoBT network, devices sense
different types of information, and in order to obtain the
necessary information of each type in a certain area, there is
a need to ensure that the number of devices sensing the same
type of information does not drop below a required threshold.
Moreover, in a real-world IoBT, there is a cost incurred when
a device is destroyed by the attacker or deployed by the
defender, which is not considered in a classical connectivity
game [12]. The heterogeneity of the IoBT devices, in terms
of their importance and roles, is also not taken into account
in classical connectivity games [12].
Given these requirements and characteristics of the IoBT
network, we consider an IoBT connectivity game that extends
classical connectivity games. The IoBT connectivity game
is formulated as a discrete-time deterministic dynamic game
(P, T , X , (Sa,t , Sd,t )t∈T ) with a finite number of stages,
where the set of players P includes the attacker and the
defender, and the set of stages T = {1, 2, ..., T }. In this IoBT
connectivity game, the defender must observe the attacker’s
action before choosing its optimal action in order to maintain the number of devices in each area above the required
threshold. Thus, the IoBT connectivity game is formulated
as a Stackelberg game in which, at each stage t of the
game, the attacker acts as the leader, and the defender acts
as the follower. The state space X = Xa × Xd is the
set of all IoBT networks observed by the attacker and the
defender up to stage T . The state of the game at stage t is
ψt = (ψa,t , ψd,t ) ∈ X where ψa,t is the network observed
by the attacker and ψd,t is the network observed by the
defender. The network state observed by the attacker is given
by: ψa,t = (Da (t), {La,h (t), 1 ≤ h ≤ H}, {Da,jh (t), 1 ≤
j ≤ I, 1 ≤ h ≤ H}, {fa,jh (t), 1 ≤ j ≤ I, 1 ≤ h ≤
H}, {sa,h (t), 1 ≤ h ≤ H}) where Da (t) represents the set
of devices, La,h (t) is the set of LSs in subarea Ah , Da,jh (t)
is the cluster of devices sensing information type j in subarea
Ah , fa,jh (t) is the index of the device that is the CH of
Da,jh (t), and sa,h (t) is the index of the activated LS in
subarea Ah . Similarly, the network state ψd,t observed by
the defender is given by: ψd,t = (Dd (t), {Ld,h (t), 1 ≤ h ≤
H}, {Dd,jh (t), 1 ≤ j ≤ I, 1 ≤ h ≤ H}, {fd,jh (t), 1 ≤
j ≤ I, 1 ≤ h ≤ H}, {sd,h (t), 1 ≤ h ≤ H}) where
Dd (t) represents the set of devices, Ld,h (t) is the set of
LSs in subarea Ah , Dd,jh (t) is the cluster of devices sensing
information type j in subarea Ah , fd,jh (t) is the index of the
device that is the CH of Dd,jh (t), and sd,h (t) is the index of
the activated LS in subarea Ah . fa,jh (t) and fd,jh (t) are set to
be zero if the CHs of Da,jh (t) and Dd,jh (t) are compromised,
respectively. Similarly, sa,h (t) and sd,h (t) are set to be zero
if the activated LS of subarea Ah is compromised in ψa,t and
ψd,t respectively. The defender and the attacker are assumed
to have perfect knowledge on the IoBT network. Assuming
perfect knowledge by the attacker about the IoBT network
allows the defender to account for the worst-case scenario as
is typical in existing works such as in [10].
In our game, the set of pure strategies of the attacker
Sa,t (ψt ) at stage t is Sa,t (ψt ) = {ad,i , i ∈ Da (t)}∪{aL,lh , l ∈
La,h (t), 1 ≤ h ≤ H}, where action ad,i corresponds to
destroying device i, and action aL,lh corresponds to destroying
LS l in subarea Ah . Due to the constraint on the number of
devices in each cluster, the strategy set of the defender at each
stage t is coupled to the attacker’s action at and is a function
of the network state ψt . Hence, the strategy set Sd (ψt , at ) of
the defender is
Sd,t (ψt , at ) =
{bd,τ h , ∀τ | j ∈ Hτ ∀j ∈ Yih (t)} if E1 (at ),
Qd ,
otherwise,
(1)
where condition E1 (at ) is at = ad,i ,
∃j s.t. i ∈
Da,jh (t), Na,jh (t) ≤ Nth,jh , the set Yih (t) = {j ∈ I |
i ∈ Da,jh (t), Nd,jh (t) < Nth,jh }, Nd,jh (t) is the number of
devices in cluster Dd,jh (t) in network ψd,t , Na,jh (t) is the
number of devices in cluster Da,jh (t) in network ψa,t , and
the set Qd is the set of all possible strategies of the defender
given by
Qd = {bc,ijh , i ∈ Dd,jh (t), 1 ≤ j ≤ M, 1 ≤ h ≤ H}
∪{bd,τ h , 1 ≤ τ ≤ K, 1 ≤ h ≤ H} ∪ {bL,h , 1 ≤ h ≤ H}
∪{ba,lh , l ∈ Ld,h (t), 1 ≤ h ≤ H}.
(2)
Action bd,τ h corresponds to deploying a new device of type
τ in subarea Ah , action bc,ijh corresponds to assigning device
i to be the CH of cluster Dd,jh (t), action bL,h corresponds
to deploying a new LS in subarea Ah , and action ba,lh
corresponds to activating LS l in subarea Ah . According to
(25), if the attacker destroys a device and causes the number of
devices in some clusters to drop below the required threshold,
the strategy set of the defender will only include the actions
of deploying a device that restores the number of devices in
each affected cluster to the required threshold. Otherwise, the
defender can choose to either change the CHs, change the LSs,
deploy a new device, or deploy a new LS. The evolution of
the attacker’s state ψa,t is given by
Da (t + 1) =
Da (t) \ {i} if at = ad,i bt 6= bd,τ h ,
Da (t),
otherwise,
La,h (t + 1) =
La,h (t) \ {l} if at = aL,lh , bt 6= bL,h ,
La,h (t),
otherwise,
(3)
(4)
5
Da,jh (t) \ {i} if at = ad,i i ∈ Da,jh (t)
bt 6= bd,τ h ,
Da,jh (t+1) =
D
otherwise,
a,jh (t),
fa,jh (t+1) =
0
(5)
if at = ad,i , i ∈ Da,jh (t), fa,jh (t) = i,
bt 6= bc,i0 jh
i
if bt = bc,ijh , at ∈ Sa (ψt ), i ∈ Da,jh (t),
fa,jh (t), otherwise,
(6)
0 if at = aL,lh , sa,h (t) = l, bt 6= ba,lh ,
l if bt = ba,lh , at ∈ Sa (ψt ),
sa,h (t + 1) =
sa,h (t), otherwise.
(7)
Similarly, the evolution of the defender’s state ψd,t is
Dd (t + 1) =
Ld,h (t+1) =
Dd (t) \ {i} if at+1 = ad,i bt 6= bd,τ h ,
Dd (t),
otherwise,
(8)
Cd,t (at , bt , ψt ) and Ud (at , bt , ψt ) in terms of each pair of the
attacker’s and defender’s pure strategies at and bt are given
in Appendix B.
To increase the uncertainty of its action and improve its
payoff, the attacker will use a mixed strategy q t at each stage
t, thus randomizing its choices across its pure strategies. The
defender, on the other hand, responds with a pure strategy bt
[17]. It is assumed that the defender can perfectly observe
the strategy of the attacker at each stage t. The objective
of the attacker is then to find the optimal mixed strategies
q 1 , q 2 , ..., q T that maximize the sum of its expected payoffs
until stage T
T
X
X
max
qat Pa,t (at , bt , ψt ) s.t. 1 · q t = 1 ∀t, (15)
q 1 ,q 2 ,...,q T
where qat is the probabilitiy with which the attacker chooses
action at . Similarly, the objective of the defender is to find
the optimal strategies b1 , b2 , ..., bT that maximizes the sum of
its expected payoffs up to stage T i.e.
max
Ld,h (t) \ {l} if at+1 = aL,lh , bt 6= bL,h ,
Ld,h (t),
otherwise,
t=1 at ∈Sa,t
b1 ,b2 ,...,bT
(9)
Dd,jh (t) \ {i} if at+1 = ad,i i ∈ Dd,jh (t)
bt 6= bd,τ h ,
Dd,jh (t + 1) =
D
otherwise,
d,jh (t),
(10)
T
X
X
qat Pd,t (at , bt , ψt ) s.t. bt ∈ Sd,t (ψt , at ) ∀t.
t=1 at ∈Sa,t
(16)
Since the attacker’s and the defender’s actions are coupled to
the current stage t and the state ψt , the feedback Stackelberg
equilibrium will be used as a solution, as discussed next.
IV. F EEDBACK S TACKELBERG S OLUTION
The
FSE
applies for situations in which the leader first
0
if
a
t+1 = ad,i , i ∈ Da,jh (t + 1),
chooses
its
strategy
at time instant t t, and, then, the follower
fa,jh (t + 1) = i, bt ∈ Sd,t (ψt , at ),
chooses
its
strategy
based
on the current state and the leader’s
fd,jh (t + 1) =
action.
In
the
proposed
IoBT
connectivity game, the strategy
i
if bt = bc,ijh , at+1 6= ad,i ,
sets
S
(ψ
)
and
S
(ψ
,
a
)
a,t
t
d,t
t t of both the attacker and the
defender depend on the current state ψt . Further, the defender
fd,jh (t), otherwise,
(11) strategy set Sd,t (ψt , at ) at time instant t is dependent only on
the attacker’s action at at the current time instant t according
0
if
a
t+1 = aL,lh , sd,h (t) = l, bt ∈ Sd,t (ψt , at ),
to (25) [16]. Thus, the FSE is a suitable solution for our
IoBT connectivity game. The FSE is subgame perfect and time
l if bt = ba,lh , at+1 6= aL,lh ,
sd,h (t+1) =
consistent. Thus, at each stage t of the game, the FSE considers
the
immediate payoff at stage t as well as the expected sum of
sd,h (t), otherwise.
(12) payoffs of the subsequent stages up to T , in contrast to static
The attacker’s payoff at each stage t is expressed in terms Stackelberg games which only consider the immediate payoff
of its utility which is the sum SD,t (at , bt , ψt ) of weights of at stage t. Hence, the FSE solution is obtained recursively
all nodes that will be disconnected from the GS, and the cost using dynamic programing and solving a Stackelberg game
Ca,t (at , bt ) of destroying node i, as follows:
at each stage t of the game. Further, the dynamic nature of
Pa,t (at , bt , ψt ) = SD,t (at , bt , ψt ) − νCa,t (at , bt , ψt ), (13) the FSE solution makes it adaptive to system changes at any
instant t. In [18], it is shown that the FSE remains stable
where ν is a normalization constant. The defender’s payoff under stochastic Markovian perturbations of the system. The
at stage t is expressed in terms of its utility minus its costs. robustness and adaptability of the FSE solution is desirable for
The costs include the sum of weights of disconnected nodes a dynamic IoBT system that is constantly subject to random
SD,t (at , bt , ψt ), the transmission time Λt (at , bt , ψt ) required changes due to adversarial conditions.
to deliver the information to the GS, and the cost of deploying
Let q = (q 1 , q 2 , ..., q T ) and b = (b1 , b2 , ..., bT ) be respeca new node Cd,t (at , bt , ψt ), as follows:
tively the strategy vectors of the attacker and the defender
respectively. The FSE strategy will be
Pd,t (at , bt , ψt ) = Ud,t (at , bt , ψt ) − ηSD,t (at , bt , ψt )
∗
∗
−µΛt (at , bt , ψt ) − λCd,t (at , bt , ψt ), (14) Definition 1. The strategy profile (q , b ) constitute a feedback Stackelberg equilibrium if ∀ψt ∈ X , t ∈ T ,
where η, µ and λ are normalization constants. For readability,
Ωa,t (q ∗t , b∗t , ψt ) = max
max Ωa,t (q t , bt , ψt ), (17)
the expressions of SD,t (at , bt ), Λt (at , bt , ψt ), Ca,t (at , bt , ψt ),
q t ∈Ma,t bt ∈Rd (q )
t
6
where Ma,t is the space of mixed strategies of the attacker at
stage t, Ωa,t (q t , bt , ψt ) is the expected payoff of the attacker
starting from stage t and for a state ψt , and Rd (q t ) is the
optimal strategy set of the defender to the mixed strategy q t
of the attacker and is given by
Rd (q t ) = {b0t s.t. b0t = arg max Ωd,t (q t , bt , ψt )},
bt
Ωa,t (q t , bt , ψt )
=
qat Ωa,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))
X
qat Pa,t (at , bt ),
(19)
at ∈Sa,t
Ωd,t (q t , bt , ψt )
=
X
qat Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))
at ∈Sa,t
+
X
qat Pd,t (at , bt ),
(20)
with Ωa,T +1 = 0, Ωd,T +1 = 0. From (18) and (20), we can
directly find the optimal action of the defender for a given
attacker action at stage t as follows.
Remark 1. Given an attacker strategy profile q t , the defender
chooses the action b0t such that
qat (Pd,t (at , bt ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt )))
at ∈Sa,t
≤
X
qat (Pd,t (at , b0t ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , b0t ))),
at ∈Sa,t
∀bt ∈ ∩at
s.t. qat >0 Sd,t (ψt , at ).
(21)
In order to find the optimal mixed strategy of the attacker
(i.e. the leader) at each stage t, the leader usually solves a
linear program for each particular strategy b0t chosen by the
follower (as in [19]). Then, it chooses, as optimal solution, the
mixed strategy of the optimization problem that has the highest
payoff. The proposed solution in [19] is considered when the
leader and follower’s actions are not coupled. However, in our
problem and as shown in (25), the follower’s strategy set is
coupled to the network state ψt and to the attacker’s action
at . In other words, if the follower chooses action b0t as its
optimal action and when the network state ψt , it means that the
attacker has chosen its action from the subset S 0 a,t (b0t , ψt ) of
the strategy set Sa,t . We define Jψa,t = {(j, h) s.t. Na,jh (t) =
Nth,jh }. Then, the set S 0 a,t (b0t , ψt ) is obtained as
(
S
0
0
a,t (bt , ψt )
=
Sa,t \ Ra,t , if Jψa,t 6= φ, b0t ∈ Vt ,
Sa,t ,
otherwise,
s.t.
X
qat = 1,
+ Ωa,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , b0t ))),
at ∈S 0 a,t (b0t ,ψt )
X
qat (Pd,t (at , bt ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt )))
at ∈S 0 a,t (bt ,ψt )
≤
X
qat (Pd,t (at , b0t ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , b0t ))).(23)
at ∈S 0 a,t (b0t ,ψt )
In the proposed linear program, for each strategy b0t of the
defender and for a given state ψt , the attacker determines
the optimal probability for each one of its actions according
to (23) while taking into account the best response of the
defender defined in (21). The proposed linear program holds
under the assumption that the attacker has full knowedge of
the defender’s actions and payoffs at each time epoch t. The
conditions under which the IoBT network remains connected
are derived in the following section.
V. C ONNECTIVITY C ONDITIONS
at ∈Sa,t
X
X
qat (Pa,t (at , b0t )
qa,t
0
at ∈S a,t (b0t ,ψt )
∀bt ,
at ∈Sa,t
+
max
(18)
for every bt
∈
∩at s.t. qat >0 Sd,t (ψt , at ), where
Ωd,t (q t , bt , ψt ) is the expected payoff of the defender
starting from stage t. At an FSE, the expected payoffs at
stage t and for state ψt are computed recursively as
X
following linear program for each strategy b0t of the defender
and given a network state ψt
(22)
where Ra,t = {ad,i s.t. i ∈ Djh (t), (j, h) ∈ Jψa,t }, Vt =
Qd \ {bd,ih , ∀i s.t j ∈ Hi ∀j ∈ Yih (t)}, the set Yih (t) = {j ∈
I | i ∈ Da,jh (t), Nd,jh (t) < Nth,jh }, and the set Qd is
defined in (2). Thus, at each stage t, the attacker solves the
In the IoBT, maintaining connectivity at any time is critical
for the successful operation of the network. Thus, the safety
objective of connectivity games is more suitable to the IoBT
than the reachability objective. In our game, the connectivity
of the IoBT network is maintained at each stage t if the
attacker does not choose an action that causes disconnection.
Disconnection occurs if neither a cluster nor an entire subarea
gets disconnected from the GS. To determine the connectivity
conditions under which the IoBT network remains connected,
when the FSE solution is used, we first determine, for each
action b0t of the defender, the set ZD (b0t ) of attacker’s actions
that cause disconnection:
V1 ,
V , ,
2
ZD (b0t ) = S 0 a,t (b0t , ψt ) ∩
V3 ,
V ,
4
if
if
if
if
b0t
b0t
b0t
b0t
= bc,ijh ,
= bd,τ h ,
= ba,lh ,
= bL,h .
(24)
where the set V1 = {afj0 h0 (t) , j 0 6= j or h0 6= h}∪{ash (t) , ∀h},
V2 = {afjh (t) , ∀j, h} ∪ {ash (t) ∀h}, V3 = {afjh (t) , ∀j, h} ∪
{as0h (t) , h0 6= h} and V4 = {afjh (t) , ∀j, h} ∪ {ash (t) , ∀h}.
Thus, given that the optimal action of the defender is
b0t , disconnection does not occur if the attacker does not
choose an action from the set ZD (b0t ). Let Fd,t (at , bt ) =
and
Pd,t (at , bt ) + Ωd,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt )))
Fa,t (at , bt ) = Pa,t (at , bt ) + Ωa,t+1 (q ∗t+1 , b∗t+1 , ψt+1 (at , bt ))).
The following proposition provides sufficient conditions for
the IoBT network to remain connected when the FSE solution
is used.
Proposition 1. The proposed FSE solution(q ∗ , b∗ ) maintains
connectivity of the IoBT network if for every ψt ∈ X , t ∈ T .
For each attacker’s action adt in ZD (b∗t ), there exists ant in
S 0 a,t (b∗t , ψt )\ZD (b∗t ) in which one of the following conditions
hold:
1) B3,t (b∗t ) = φ.
7
∗
d ∗
2) If B1,t (b∗t ) ∪ B2,t (b∗t ) 6= φ, W · Fa,t (an
t , bt ) > Fa,t (at , bt ).
3) If B1,t (b∗t )
minbt ∈B1,t (b∗t )
6=
φ, B2,t (b∗t )
6=
d ∗
Fd,t (ad
t ,bt )−Fd,t (at ,bt )
<
1,
n
n
∗
Fd,t (at ,bt )−Fd,t (at ,bt )
d ∗
Fd,t (ad
t ,bt )−Fd,t (at ,bt )
arg minbt ∈B1,t (b∗t ) Fd,t
n ∗
(an
t ,bt )−Fd,t (at ,bt )
d ∗
Fd,t (ad
t ,bt )−Fd,t (at ,bt )
≤ arg maxbt ∈B2,t (b∗t ) Fd,t (an ,bt )−Fd,t (an ,b∗ ) .
t
t
t
φ,
and
4) If B1,t (b∗t )
minbt ∈B1,t (b∗t )
φ,
and
6=
φ, B2,t (b∗t )
6=
d ∗
Fd,t (ad
,b
)−F
d,t (at ,bt )
t t
n ∗ ≥ 1,
Fd,t (an
t ,bt )−Fd,t (at ,bt )
d ∗
Fd,t (ad
t ,bt )−Fd,t (at ,bt )
arg maxbt ∈B2,t (b∗t ) Fd,t (an ,bt )−Fd,t (an ,b∗ ) ≥ 1.
t
t
t
VI. S IMULATION R ESULTS AND A NALYSIS
∗
5) If B1,t (b∗t ) ∪ B2,t (b∗t ) = φ, Fa,t (an
t , bt ) > 0.
where
n ∗
B1,t (b∗t ) = {bt ∈ Sdn,t | Fd,t (an
t , bt ) − Fd,t (at , bt ) ≥
d
d ∗
0, Fd,t (at , bt ) − Fd,t (at , bt ) ≥ 0},
n ∗
B2,t (b∗t ) = {bt ∈ Sdn,t | Fd,t (an
t , bt ) − Fd,t (at , bt ) <
d
d ∗
0, Fd,t (at , bt ) − Fd,t (at , bt ) ≤ 0},
n ∗
B3,t (b∗t ) = {bt ∈ Sdn,t | Fd,t (an
t , bt ) − Fd,t (at , bt ) ≥
d
d ∗
0, Fd,t (at , bt ) − Fd,t (at , bt ) < 0},
Sdn,t = Sd,t (ψt , adt ) ∩ Sd,t (ψt , ant ),
W =
bm
t =
d ∗
Fd,t (adt , bm
t ) − Fd,t (at , bt )
,
n
m
Fd,t (at , bt ) − Fd,t (ant , b∗t )
arg minbt ∈B1,t (b∗t )
arg max
bt ∈B2,t (b∗
t)
d ∗
Fd,t (ad
t ,bt )−Fd,t (at ,bt )
n ,b∗ ) ,
Fd,t (an
,b
)−F
(a
t
d,t
t
t
t
d ∗
Fd,t (ad
t ,bt )−Fd,t (at ,bt )
n ∗ ,
Fd,t (an
t ,bt )−Fd,t (at ,bt )
Proposition 1 shows that maintaining connectivity at each
time epoch t depends on the payoffs of the attacker and
the defender. Further, the payoff of the defender in (14)
depends on the IoBT network parameters. For example, the
time required to deliver the information to the GS is a function
of the IoBT network capacity, as shown in Appendix B, which
can be controlled by adjusting the transmission bandwidth in
a wireless setting. Thus, in order to maintain connectivity at
each time epoch t, the IoBT operator adjusts its payoffs such
that one of the conditions in Proposition 1 is met.
if C1 (b∗t ),
if C2 (b∗t ),
the condition C1 (b∗t ) = B1,t (b∗t ) 6= φ, B1,t (b∗t ) = φ, the
condition C2 (b∗t ) = B2,t (b∗t ) 6= φ, and the set Qd is defined
in (2).
Proof. Since the attacker uses mixed strategies in our problem,
disconnection does not occur at stage t if qat = 0 for every
at in ZD (b0t ), i.e. the actions in ZD (b∗t ) are dominated. In
[20, Corollary 4], the conditions are derived for the case in
which a variable has a zero value in any optimal solution for a
given linear program.
In particular,
Pn
Pn given a linear program of
the form max j=1 cj xj s.t.
j=1 aij xj ≤ bj , xj ≥ 0, the
variable xr = 0 in the optimal solution of the linear program
if there exists q 6= r such that one of the following conditions
hold:
1) I3 6= φ,
2) If I1 ∪ I2 6= φ then Hcq ≤ cr
c ≥ maxi∈I2 aair
3) If I1 6= φ and I2 6= φ then mini∈I1 b aair
iq
iq
4) if I1 ∪ I2 = φ then cq > 0,
where I1 = {i|aiq > 0 and air ≥ 0}, I2 = {i|aiq <
0 and air ≤ 0}, I3 = {i|aiq ≥ 0 and air < 0},
air
arg min aiq if I1 6= φ,
k=
arg max aair
if I1 = φ and I2 6= φ
iq
akr
b akq c if I1 6= φ,
H=
arg max aakr
if I1 = φ and I2 6= φ
kq
Thus, by applying these conditions to each qat in ZD (b∗t )
our proposed linear program in (23), the result follows.
For our simulations, we consider an IoBT network containing 1000 devices of seven types: Type 1 corresponds
to a radiological sensor, type 2 corresponds to a chemical
sensor, type 3 corresponds to an infrared (IR) camera, type
4 corresponds to an explosives detector, type 5 corresponds to
a surveillance camera, type 6 corresponds to a mititary robot
containing a chemical sensor, a radiological sensor, an infrared
camera and an explosives detector, and type 7 corresponds to a
military unmanned vehicle containing a surveillance camera,
an IR camera, a radiological sensor and a chemical sensor.
The number of subareas considered is H = 5. The number of
LSs available in each subarea is Lh = 2, the weight of each
LS i is set to wL,i = 15, which is chosen to be greater than
the weight of any of the devices at a lower hierarchy level.
The threshold on the number of sensors in each cluster Djh
is set to Nth,jh = 15. The normalizing coefficients are set to:
µ = 100, ν = 1, and λ = 1. The costs of deploying a device
of type τ and an LS are set to be dτ = 0.5Nτ and dL = 50.
All normalization constants and cost values are chosen such
that the costs are comparable to the number of sensors. For
detailed analysis, the following scenarios are considered:
1) The cost of compromising an LS cL is varied between
0 and 200 in steps of 50. The considered value of the
cost caL of determining the activated LS by the attacker
is set to 0. The maximum number of stages considered
is T = 1, 2, 3, where T = 1 corresponds to the case of
Stackelberg equilibrium with no feedback (NFSE). The
cost of determining the CH is set to be cCH = 20 while
the cost of compromising a device of type τ is set to be
cτ = 0.5Nτ .
2) The cost of finding the CH is varied between 0 and
100 in steps of 20. The costs of compromising an LS
and determining the activated LS (caL , cL ) is set to
(100, 50). The maximum number of stages considered
are T = 1, 2, 3.
3) The maximum number of stages T is varied between
1 and 5 in steps of 1. The considered cost values are
cτ = 0.5Nτ and cCH = 20, and the LS costs (caL , cL )
are to set to (0, 50) and (150, 50), respectively.
Fig. 2 shows, for the NFSE, the FSE, and a baseline policy
which assigns equal probabilities to attacking the activated
LSs, the average probability pH of attacking the LS in the
subarea with the highest weight as a function of the cost cL
of compromising an LS. Fig. 2 first shows that the NFSE
probability of attacking the activated LS with the highest
Probability of attacking the LS
with highest weight
0.3
Stackelberg equilibrium (No feedback)
Feedback Stackelberg equilibrium, T=2
Feeback Stackelberg equilibrium, T=3
Equal probability policy
0.25
0.2
0.15
0.1
0.05
0
0
50
100
150
200
Cost of compromising a local sink
Expected number of disconnected
sensors per stage
Stackelberg equilibrium (No feedback)
Feedback Stackelberg equilibrium, T=2
Feedback Stackelberg equilibrium, T=3
Equal probability policy
160
140
120
100
80
60
0
50
100
150
0.2
Stackelberg equilibrium (no feedback)
Feedback Stackeleberg equilibrium, T=2
Feedback Stackelberg equilibrium, T=3
0.15
0.1
0.05
0
0
20
40
60
80
100
Cost of finding the cluster head
Fig. 2: Probability of attacking the LS with the highest weight
vs the cost of compromising an LS
180
Probability of attacking the CH
with highest weight
8
200
Cost of compromising a local sink
Fig. 3: Expected number of disconnected nodes respectively
vs the cost of compromising an LS
weight is 0.19 for cL values less than 100. In this case,
the attacker’s payoff obtained from attacking any activated
LS is considerably higher than the attacker’s payoff achieved
from attacking any other device. Thus, the attacker chooses
to compomise only the five activated LSs. As a result, the
NFSE mixed strategy of the attacker is comparable to the equal
probability policy. As cL increases to 150, the payoffs achieved
by attacking an activated LS and the CHs become comparable,
and the attacker chooses to attack both the LSs and the CHs.
Thus, the probability of attacking the LS with highest weight
decreases to 0.09. When cL increases further to 200, the payoff
resulting from attacking an activated LS becomes considerably
lower than the payoff achieved by attacking any of the CHs,
and, thus, the attacker chooses to attack only the CHs. Next,
when using the FSE with T = 2, the FSE probability of
attacking the activated LS with the highest weight decreases
to 0.163 for cL values less than 100. This is due to the fact
that, by using a FSE, the attacker, as well as the defender, will
take into account the expected sum of payoffs from t + 1 to
T , when computing the FSE probabilities at time t according
to (19). Thus, the attacker’s payoff received from an attack
on any IoBT node increases compared to the NFSE case,
which results in increasing the probability of attacking some
of the IoBT nodes which are not LSs. Hence, the probability of
attacking the LS having the highest weight decreases. Then,
the probability of attacking the LS with the highest weight
decreases as cL increases to 200. However, the probability is
higher than the case of the NFSE. This is because the expected
sum of payoffs achieved by attacking the LS with highest
weight increases compared to the NFSE according to (19).
Finally, when using the FSE with T = 3 and for cL values
less than 100, the probability pH decreases to 0.112 compared
Fig. 4: Probability of attacking the CH with the highest weight
vs the cost of compromising an LS
to the case with T = 2. This is because the expected payoff of
attacking any IoBT node increases with the number of stages
according to (19), which causes pH to decrease. Then, as cL
increases to 200, pH decreases, but it remains higher than the
case when T = 2, since the expected sum of payoffs received
from attacking the LS with the highest weight increases with
T.
Fig. 3 shows the average number ND of disconnected sensors per stage resulting from the NFSE, the FSE, and the equal
probability policy as function of the cost of compromising
an LS. First, using the NFSE and when cL ≤ 100, the
expected number of disconnected sensors is 141 since the
attacker chooses to compromise only the activated LSs. Also,
the expected number of disconnected sensors is slightly higher
than when the attacker chooses to attack each of the activated
LSs with equal probability, since this policy is not optimal.
Fig. 3 also shows that, for cL = 150, the expected number
of disconnected sensors decreases to 83 since the attacker
chooses to compromise either the LSs or the CHs. Thus, the
value of the expected number of disconnected sensors drops
below the value of the equal probability policy. When cL
increases to 200, the expected number of disconnected sensors
decreases to 62 since the attacker will now compromise CHs.
Next, using FSE with T = 2 and for cL < 100, ND decreases
by 9% compared to NFSE, since pH decreases as shown in
Fig. 2. Then, as cL increases to 200, the expected number of
disconnected sensors decreases yet becomes higher than the
NFSE case since pH is higher according to Fig.2. Finally,
when using the FSE with T = 3, the expected number ND
is 107 when cL < 100. This is because, for the considered
cost values, the probability pH decreases with T as shown in
Fig. 2. Then, as cL increases to 200, the expected number of
disconnected sensors decreases, but it remains greater than the
case in which T = 2. This is due to the fact that the probability
pH increases with T when cL is greater than 150 as shown in
Fig. 2.
Fig 4 shows the average probability pc,max of attacking the
CH of the cluster with highest number of sensors resulting
from the NFSE and the FSE versus the cost of finding the
CH. Using NFSE and when cCH is 0, pc,max is 0.17 since the
payoffs resulting from an attack on the CHs are the highest.
As the value of cCH increases to 40, pc,max decreases to
0.09 since the attacker chooses to compromise both LSs and
CHs. Then, pc,max becomes zero as cCH increases up to
100 since the payoffs achieved by compromising the CHs
Stackelberg equilibrium (No feeback)
Feedback Stackelberg equilibirum, T=2
Feedback Stackelberg equilibrium, T=3
Equal probability policy
160
140
120
100
80
60
0
20
40
60
80
100
Cost of finding the cluster head
Fig. 5: Expected number of disconnected sensors per stage vs
the cost of finding the CH
will be considerably lower than the payoffs obtained from
compromising the LSs. Hence, in this case, the attacker will be
compromising the LSs. Next, using the FSE with T = 2 and
when cCH is 0, pc,max is 0.155. Then, when cCH increases up
to 40, pc,max decreases to 0.078. Thus, when cCH is less than
40, the value of pc,max is less than its value when NFSE is
used. This is because the expected sum of payoffs achieved by
attacking any IoBT node is higher than the NFSE according
to (19), which yields a decrease in the probability pc,max . As
cL increases from 40 to 100, pc,max decreases yet its value
becomes higher than the NFSE. This is because the expected
sum of payoffs received from attacking a CH, when using
the FSE, is higher than the case in which the NFSE is used,
which causes the probability to remain positive. Finally, when
using the FSE with T = 3, pc,max varies similar to the case
in which T = 2. However, for cCH less than 40, pc,max is
smaller than the case when T = 2 since the expected sum of
payoffs achieved by attacking any IoBT node increases with
T . Also, for cCH greater than 40, pc,max is higher than the
case when T = 2 since the expected sum of payoffs obtained
from attacking a CH increases with T according to (19).
Finally, Fig. 4 shows that, for the equal probability policy,
the probability of attacking a CH is zero since the attacker
only compromises the activated LSs.
Fig. 5 shows, for both the FSE and the equal probability
policy, the average number of disconnected sensors ND per
stage versus the cost of finding the CH. When using the NFSE
and when cCH = 0, the expected number of disconnected
sensors is 63 since the attacker will be compromising the
CHs. Then, the expected number of disconnected sensors is
82 as the value of cCH increases to 40, since the attacker
will choose proper (non-deterministic) mixed strategies over
both the LSs and CHs. Then, as cCH becomes higher than 40,
the expected number of disconnected sensors increases to 141
and exceeds the value of the equal probability policy since
the attacker will be compromising the activated LSs and the
equal probability policy is not optimal. Next, when using the
FSE with T = 2 and when cCH = 0, the expected number of
disconnected sensors ND is 65. In this case, the value of ND
is slightly higher than the one resulting from the NFSE since
the probability of attacking an LS is positive with FSE. As
cCH increases to 40, the value of ND increases to 81. Then,
as cCH increases to 100, the value of ND increases to 129.
For cCH values higher than 40, the value of ND resulting
from FSE is lower than the NFSE case since the probability
Expected number of disconnected sensors
180
800
Stackelberg equilibrium (No feedback)
Feedback Stackelberg equilibrium
Equal probability policy
700
600
500
400
300
200
100
1
2
3
4
5
Maximum number of stages (T)
Fig. 6: Expected number of disconnected nodes respectively
vs number of stages
Expected number of disconnected sensors
Expected number of disconnected
sensors per stage
9
700
Stackelberg equilirbium (No feedback)
Feedback Stackelberg equilibrium
Equal probability policy
600
500
400
300
200
100
0
1
2
3
4
5
Maximum number of stages (T)
Fig. 7: Expected number of disconnected nodes respectively
vs number of stages
of attacking a device which is not a CH is positive with FSE.
When using the FSE with T = 3, the value of ND varies as
function of cCH in a similar way as when T = 2. Yet, when
cCH is 0, the value of ND is slightly higher than when T = 2.
This is because in this case the probability of attacking an LS
increases with T . Also, for cCH values greater than 40, the
value of ND is lower than when T = 2 since the probability
of attacking a device which is not a CH increases with T for
the considered cost values.
Figs. 6 shows, for the case when the LSs costs (caL , cL ) are
(0, 50), the expected number of disconnected sensors versus
the maximum number of stages T when FSE, the NFSE, and
the equal probabilitiy policy are used, respectively. The NFSE
solution corresponds to finding the Stackelberg equilibrium for
a one stage game played at each time epoch t (1 ≤ t ≤ T ). In
Fig. 6, the expected number of disconnected sensors increases
with the maximum number of stages using the three solutions.
However, the expected number of disconnected sensors, when
the FSE is used, increases at a rate considerably slower than
when either the NFSE or the equal probability power policy
are used. Thus, the results confirm that, using the FSE, the
number of disconnected sensors per stage decreases with T
as opposed to the NFSE in which the attacker chooses its
mixed strategy only over the LSs. The decrease in the number
of disconnected sensors when using the FSE reaches up to
43% compared to the equal probability policy and up to 46%
compared to the Stackelberg equilibrium with no feedback,
when T is 5.
Fig. 7 shows, for the case when the LSs costs (caL , cL ) are
(150, 50), the expected number of disconnected sensors versus
the maximum number of stages T when FSE, the NFSE solution, and the equal probabilitiy policy are used, respectively.
In this case, the expected number of disconnected sensors also
10
increases with the maximum number of stages using the three
solutions. However, the number of disconnected sensors using
the FSE is slightly higher than the case of NFSE. This is due
to the fact that, in the case of no feedback, the attacker’s mixed
strategy does not include attacking the LSs whereas, using the
FSE, the attacker’s mixed strategy includes attacking the LSs,
and the probability of attacking the LSs increases with the
number of stages. The increase in the number of disconnected
sensors reaches up to 14% when T is 5. Nonetheless, the
number of disconnected sensors, using the FSE, decreases by
47% compared to the equal probability policy.
Thus, Figs. 6 and 7 show that the FSE yields a significant
decrease in the number of disconnected sensors when the LS
costs are low. The performance is slightly degraded compared
to the NFSE when the costs of attacking the LSs increase.
However, the number of disconnected sensors remains significantly lower than the equal probability policy.
VII. C ONCLUSION
In this paper, we have considered the connectivity problem
in an Internet of Battlefield Things network in which an adversary attempts to cause disconnection by compromising one
of the IoBT nodes at each time epoch while a defender tries to
restore the connectivity of the IoBT by deploying new IoBT
nodes or changing the roles of nodes. We have formulated
the problem as a multistage Stackelberg game in which the
attacker is the leader and the defender is the follower. Due to
the reliance of the attacker’s and the defender’s actions on the
network state at each stage t, we have adopted the feedback
Stackelberg equilibrium to solve the game. We have obtained
sufficient condition to maintain connectivity at each stage t
when the FSE solution is used. Numerical results show that
the expected number of disconnected sensors, when the FSE
solution is used, decreases up to 46% compared to a baseline
scenario in which a Stackelberg game with no feedback is
used, and up to 43% compared to a baseline equal probability
policy.
R EFERENCES
[1] N. Suri, M. Tortonesi, J. Michaelis, P. Budulas, G. Benincasa, S. Russell,
C. Stefanelli, and R. Winkler, “Analyzing the applicability of internet of
things to the battlefield environment,” in Proc. of International Conference on Military Communications and Information Systems (ICMCIS),
Brussels, Belgium, May 2016, pp. 1-8.
[2] M. Tortonesi, A. Morelli , M. Govoni, J. Michaelis, N. Suri, C. Stefanelli,
and S. Russell“Leveraging Internet of Things within the military network
environment — Challenges and solutions," in Proc. of IEEE World Forum
on Internet of Things (WF-IoT), Reston, VA, Dec. 2016, pp. 111-116.
[3] P. P. Ray, “Towards an Internet of Things based architectural framework
for defence," in Proc. of International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT),
Dec. 2015, Kumaracoil, India, pp. 411-416.
[4] W. H. Lee, J. Choi, J. H. Lee, Y. H. Kim and S. C. Kim, “Distributed
Power Control-Based Connectivity Reconstruction Game in Wireless
Localization," in IEEE Communications Letters, vol. 21, no. 2, pp. 334337, Feb. 2017.
[5] A. Roy, A. Mondal and S. Misra, “Connectivity Re-establishment in
the Presence of Dumb Nodes in Sensor-Cloud Infrastructure: A Game
Theoretic Approach," in Proc. of IEEE 6th International Conference
on Cloud Computing Technology and Science, Singapore, Dec. 2014,
Singapore, Singapore pp. 847-852.
[6] L. Goratti, T. Baykas, T. Rasheed and S. Kato, “NACRP: A Connectivity
Protocol for Star Topology Wireless Sensor Networks," in IEEE Wireless
Communications Letters, vol. 5, no. 2, pp. 120-123, Apr. 2016.
[7] R. Dou and G. Nan, “Optimizing Sensor Network Coverage and Regional
Connectivity in Industrial IoT Systems," in IEEE Systems Journal, no.
99, pp. 1-10, May 2017.
[8] Z. Xu, L. Chen, C. Chen and X. Guan, “Joint Clustering and Routing
Design for Reliable and Efficient Data Collection in Large-Scale Wireless
Sensor Networks," in IEEE Internet of Things Journal, vol. 3, no. 4,
pp. 520-532, Aug. 2016.
[9] X. Zhao, Y. Zhang, C. Jiang, J. Yuan and J. Cao, “Mobile-Aware Topology
Control Potential Game: Equilibrium and Connectivity," in IEEE Internet
of Things Journal, vol. 3, no. 6, pp. 1267-1273, Dec. 2016.
[10] P. Y. Chen, S. M. Cheng and K. C. Chen, “Information Fusion to Defend
Intentional Attack in Internet of Things," in IEEE Internet of Things
Journal, vol. 1, no. 4, pp. 337-348, Aug. 2014.
[11] Y. Han, Y. Chen, B. Wang and K. J. Ray Liu, “Enabling Heterogeneous
Connectivity in Internet of Things: A Time-Reversal Approach," in IEEE
Internet of Things Journal, vol. 3, no. 6, pp. 1036-1047, Dec. 2016.
[12] S. Grüner, F. G. Radmacher, and W. Thomas. “Connectivity games over
dynamic networks,” in Theoretical Computer Science, vol. 493, Jul. 2013,
pp. 46-65.
[13] Y. Zhang, J. Zheng, and M. Ma, Handbook of Research on Wireless
Security, Information Science Reference, 2008.
[14] Z. Han, D. Niyato, W. Saad, T. Başar, and A. Hjørungnes, Game
Theory in Wireless and Communication Networks: Theory, Models, and
Applications, Cambridge University Press, 2012.
[15] W. Pawgasame, “A survey in adaptive hybrid wireless Sensor Network
for military operations,” in Proc. of 2016 Second Asian Conference on
Defence Technology (ACDT), Chiang Mai, Thailand, Jan. 2016, pp. 78-83.
[16] T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory, 2nd
Edition, Society for Industrial and Applied Mathematics, 1998.
[17] B. An, M. Tambe, A. Sinha. “Stackelberg Security Games (SSG) Basics
and Application Overview”, in Improving Homeland Security Decisions,
Cambridge University Press, 2016.
[18] T. Başar and A. Haurie, “Feedback equilibria in differential games with
structural and modal uncertainties,” Advances in Large Scale Systems,
ch. 1, pp. 163–201. JAE Press Inc., Connecticut, May 1984.
[19] V. Conitzer, “On Stackelberg mixed strategies,” Synthese, vol. 193, no.
3, pp. 689–703, Mar. 2016.
[20] D. A. Babayev and S. S. Mardanov,“Reducing the number of variables
in Integer and Linear Programming Problems ," in Computational Optimization and Applications, vol. 3, no. 2, pp. 99–109, May 1994.
A PPENDIX
A PPENDIX A: S UMMARY OF N OTATION
D
Set of IoBT devices.
K
Set of devices’ types.
K
Size of set K
I
Set of information types.
M
Size of set I
Nτ
Number of devices of type τ .
Hτ
Information set of a device of type τ .
Ah
IoBT subarea h.
Djh Cluster sensing information j in subarea Ah .
Nth,jh Minimum required number of sensors in cluster Djh .
wi
Weight of device i.
wL,i Weight of LS i.
Lh
Set of LSs in subarea Ah .
cτ
Cost of compromising a device of type τ .
cL
Cost of compromising an LS.
cCH Cost of determining the cluster head.
caL Cost of determining the activated LS.
dτ
Cost of deploying a device of type τ .
dL
Cost of deploying an LS.
P
Set of players.
T
Set of stages.
X
State space.
Sa,t Attacker’s strategy set at time t.
Sd,t Defender’s strategy set at time t.
ψt
State of the game at time t.
11
ψa,t Network observed by the attacker at time t.
Da (t) Set of devices in ψa,t .
Da,jh (t) Cluster Djh in ψa,t .
fa,jh (t) Index of the device that is CH of cluster Da,jh (t).
La,h (t) Set of LSs in subarea Ah at time t.
sa,h (t) Index of the activated LS in La,h (t).
ψd,t Network observed by the defender at time t.
Dd (t) Set of devices in ψd,t .
Dd,jh (t) Cluster Djh in ψd,t .
fd,jh (t) Index of the device that is CH of cluster Dd,jh (t).
Ld,h (t) Set of LSs in subarea Ah in ψd,t .
sa,h (t) Index of the activated LS in La,h (t).
at
Attacker’s action at time t.
bt
Defender’s action at time t.
ad,i Attacking device i.
aL,lh Attacking LS l in subarea Ah .
bc,ijh Assigning device i to be the CH of Djh .
bd,τ h Deploying a device of type τ in subarea Ah .
ba,lh Activating LS l in subarea Ah .
qt
Attacker’s mixed strategy at time t.
Pa,t Attacker’s payoff at time t.
Pd,t Defender’s payoff at time t.
SD,t Sum of weights of disconnected sensors at time t.
Λt
Delay to deliver the information at time t.
the single hop delay between i and j and is given by:
Λ(i, j) = Rmiji where Rij is the capacity of the link (i, j)
and mi is the packet size of node i.
•
If at = ad,i , bt = bd,kh0 , i ∈ Dh00 (t), h00 6= h0 ,
M
X
SD,t (at , bt ) =
I(i ∈ Djh00 (t) )(xijh00 (t)Wjh00 (t) + x̄ijh00 (t)),
j=1
Λt (at , bt ) = max z̄h (t)I(h 6= h0 ) max z̄jh (t)
1≤h≤H
1≤j≤M
×(I(i ∈
/ Djh (t))(Λjh (fjh (t), sh (t), Djh (t))
+I(i ∈ Djh (t))I(fjh (t) 6= i)(Λjh (fjh (t), sh (t), Djh (t) \ {i})
+Λg (sh (t))) + I(h = h0 ) max I(j ∈
/ Hk )(fjh0 (t), s0h (t), Djh0 (t))
1≤j≤M
+
+I(j ∈ Hk )Λjh0 (fjh0 (t), sh0 (t), Djh
0 (t)) + Λg (sh0 (t))),
+
where Dh (t) is the set of devices in subarea Ah , Djh
(t) =
Djh (t) ∪ {N (t) + 1}, and N (t) + 1 is the index of the
newly deployed device and N (t) is the total number of
devices.
•
If at = ad,i , bt = bd,kh0 , i ∈ Dh0 (t),
SD,t (at , bt ) =
M
X
I(i ∈ Djh0 (t), j ∈
/ Hk )xijh0 (t)Wjh0 (t)
j=1
+ I(i ∈ Djh0 (t), j ∈ Hk )xijh0 (t)(Wjh0 (t) + 1)
+ x̄ijh0 (t),
Λt (at , bt ) = max I(h = h0 )z̄h (t) max I(i ∈ Djh0 (t))I(fjh0 (t) 6= i)
1≤h≤H
A PPENDIX B: E XPRESSIONS OF PAYOFF F UNCTIONS
The expressions of SD,t (at , bt ), Λt (at , bt ) in terms of each
pair of the attacker’s and defender’s pure strategies at and bt
are given as follows.
•
SD,t (at , bt ) =
I(i ∈ Djh (t)) xijh (t)Wjh (t) + x̄ijh (t))
+(I(j ∈
/ Hk )z̄jh (t)Λjh0 (fjh0 (t), sh0 (t), Djh (t) \ {i}))
+I(h 6= h0 ) max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t))
1≤j≤M
+ Λg (sh (t)).
If at = ad,i , bt = bc,kj 0 h0 ,
H X
M
X
•
If a = ad,i , bt = ba,kh00 ,
SD,t (at , bt ) =
h=1 j=1
H X
M
X
I(i ∈ Djh (t))(xijh (t)Wjh (t) + x̄ijh (t))
h=1 j=1
−zj 0 h0 (t)Wj 0 h0 (t),
+I(h = h00 )(−zh00 (t)Wh00 (t)),
Λt (at , bt ) = max z̄h (t) max (1 − I(h = h0 , j = j 0 ))z̄jh (t)
1≤h≤H
1≤j≤M
+
×(I(j ∈ Hk )z̄jh (t)Λjh0 (fjh0 (t), sh0 (t), Djh
(t) \ {i})
1≤j≤M
Λt (at , bt ) = max (I(h 6= h00 )z̄h (t) + I(h = h00 ))
×(I(i ∈ Djh (t))x̄ijh (t)Λjh (fjh (t), sh (t), Djh (t) \ {i})
+I(i ∈
/ Djh (t))Λjh (fjh (t), sh (t), Djh (t)))
1≤h≤H
× max I(i ∈ Djh (t))I(fjh (t) 6= i)
+I(h = h0 , j = j 0 )(I(i ∈ Djh (t))Λjh (k, sh (t), Djh (t) \ {i})
+(I(i ∈
/ Dj 0 h (t))Λjh (k, sh (t), Djh (t))) + Λg (sh (t)),
where for any variable x, x̄ = 1 − x, I(.) is the indicator
function. In this part, all the network variables pertains
to network ψa,t , and the index a is dropped for ease
of notation. xijh (t) is an indicator whether device i is
the CH in cluster Djh (t), fjh (t) is the CH of Djh (t),
sh (t) is the activated LS in subarea h, Wjh (t) is given
by Wjh (t) = Njh (t), zh (t) is an indicator if subrea Ah is
currently disconnected from the GS, zjh (t) is an indicator
if cluster Djh (t) is currently disconnected from the network, Λjh (fjh (t), sh (t), Djh (t)) is the time to transmit
the information from cluster Njh (t) to LS sh (t) and is
given by Λjh (fjh (t), sh (t), Djh (t)) = Λ(fjh (t), sh (t))+
maxn∈Djh (t) Λ(n, fjh (t)), Λ(fjh (t), sh (t)) is the time
needed to transmit the information from CH fjh (t) to
LS sh (t), Λ(n, fjh (t)) is the time needed to transmit the
information from device n to CH fjh (t), and Λg (sh (t))
is the time required to deliver the information from sh (t)
to the GS. For any two IoBT nodes i and j, Λ(i, j) is
1≤j≤M
×Λjh (fjh (t), sh (t), Djh (t) \ {i}))
−I(i ∈
/ Djh (t))Λjh (fjh (t), sh (t), Djh (t)) + Λg (sh (t)),
•
where Wh (t) is given by: Wh (t) =
If at = ad,i , bt = bL,h00 ,
SD,t (at , bt ) =
H X
M
X
P
i∈Dh (t)
wi +wL,sh (t) .
I(i ∈ Djh (t))(xijh (t)Wjh (t) + x̄ijh (t)),
h=1 j=1
Λt (at , bt ) = max z̄h (t) max I(i ∈ Djh )I(fjh (t) 6= i)
1≤h≤H
1≤j≤M
×Λjh (fjh (t), sh (t), Djh (t) \ {i}))
−I(i ∈
/ Djh )Λjh (fjh (t), sh (t), Djh (t))) + Λg (sh (t))).
•
If at = aL,mh0 , bt = ba,kh00 , h0 = h00 ,
SD,t (at , bt ) = −zh00 (t)Wh00 (t),
Λt (at , bt ) = max I(h = h0 ) max Λjh0 (fjh0 (t), k, Djh0 (t))
1≤h≤H
1≤j≤M
+I(h 6= h0 )z̄h (t)( max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t))
1≤j≤M
+I(h = h0 )Λg (k) + I(h 6= h0 )z̄h (t)Λg (sh (t)).
12
•
If at = aL,mh0 , bt = ba,kh00 , h0 6= h00 ,
SD,t (at , bt ) = ymh0 (t)Wh (t) + ȳmh (t)wL,m − zh00 (t)Wh00 (t),
Λt (at , bt ) = max (I(sh0 (t) 6= m, h = h0 ) + I(h 6= h0 ))
1≤h≤H
×z̄h (t)(Λg (sh (t)) + max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)))
1≤j≤M
+I(h = h00 )( max z̄jh00 (t)Λjh00 (fjh00 (t), k, Djh00 (t)) + Λg (k)),
1≤j≤M
where ymh (t) is an indicator that LS m is the activated
LS in subarea Ah .
•
If at = aL,mh0 , bt = bL,h00 ,
SD,t (at , bt ) = ymh0 (t)Wh0 (t) + ȳmh0 wL,m ,
Λt (at , bt ) = max z̄h (t)(I(sh0 (t) 6= k, h = h0 ) + I(h 6= h0 ))
1≤h≤H
× max (z̄jh (t)Λjh (fjh (t), sh (t), Djh ) + Λg (sh (t)).
1≤j≤M
•
If at = aL,mh0 , bt = bd,kh00 , h0 6= h00 ,
SD,t (at , bt ) = ymh0 (t)Wh0 (t) + ȳmh0 (t)wL,m ,
Λt (at , bt ) = max (I(sh0 (t) 6= m, h = h0 ) + (h 6= h0 , h 6= h00 ))
1≤h≤H
×z̄h (t)
M
X
z̄jh (t)(Λjh (fjh (t), sh (t), Djh (t))
j=1
+
+I(h = h00 ))z̄h (t)( max I(j ∈ Hk )z̄jh (t)Λjh (fjh (t), sh (t), Djh
(t))
1≤j≤M
+I(j ∈
/ Hk )z̄jh (t)Λjh (jh (t), sh (t), Djh (t)) + Λg (sh (t))).
•
If at = aL,mh0 , bt = bd,kh00 , h0 = h00 ,
SD,t (at , bt ) = ymh (t)(Wh0 (t) + Nk ) + ȳmh0 (t)wL,m ,
Λt (at , bt ) = max (I(s0h (t) 6= m, h = h0 )z̄h (t)
1≤h≤H
+
×( max I(j ∈ Hk )z̄jh (t)Λjh (fjh (t), sh (t), Djh
(t))
1≤j≤M
+I(j ∈
/ Hk )z̄jh (t)Λjh (fjh (t), sh (t), Djh (t) + Λg (sh (t))))
+I(h 6= h0 )z̄h (t)( max z̄jh (t)Λjh (fjh (t), sh (t), Djh (t)) + Λg (sh (t))).
1≤j≤M
•
If at = aL,mh0 , bt = bc,kj 0 h00 ,
SD,t (at , bt ) = ymh0 (t)Wh0 (t) + ȳmh0 (t)wL,m ,
Λt (at , bt ) = max (I(sh (t) 6= m, h = h0 ) + I(h 6= h0 ))
1≤h≤H
×z̄h (t)( max I(h = h00 , j = j 0 )Λjh (k, sh (t), Djh (t))
1≤j≤M
+(1 − I(h = h00 , j = j 0 ))z̄jh (t)Λjh (fjh (t), sh (t), Djh (t))
+Λg (sh (t))).
The expressions of Ca,t (at , bt ), Cd,t (at , bt ) and
Ud,t (at , bt ) in terms of the pure strategies of the attacker
and the defender are given as follows:
ci ,
cL,k ,
di ,
Cd,t (at , bt ) = dL ,
0,
Ca,t (at , bt ) =
if at = ad,i ,
if at = aL,kh .
if bt = bd,ih ,
if bt = bL,h ,
otherwise.
The expression of the defender’s utility is given by
ui ,
Ud,t (at , bt ) = uL ,
0,
if bt = bd,ih ,
if bt = bL,h ,
otherwise.
| 7cs.IT
|
336
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
КОМПЛЕКСНЫЕ ИНСТРУМЕНТАЛЬНЫЕ СРЕДСТВА ИНЖЕНЕРИИ ОНТОЛОГИЙ
Виталий Величко, Кирилл Малахов, Виталий Семенков, Александр Стрижак
Аннотация: В статье представлен обзор актуальных специализированных инструментальных
средств инженерии онтологий, а также средств аннотирования текстов на основе онтологий.
Рассмотрены основные функции и возможности данных инструментальных средств, их достоинства
и недостатки. Описываются основные компоненты системы формирования онтологий на основе
семантического анализа текстовых массивов. Дается системный сравнительный анализ средств
инженерии онтологий.
Ключевые слова: онтология, инженерия знаний, проектирование онтологии предметной области,
инструментальный комплекс онтологического назначения.
ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms
and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems
Введение
Методология проектирования онтологии предметной области (ПрО) [Палагин, 2012] основывается на
конструктивном использовании следующих категорий – множества концептов, отношений, функций
интерпретации и аксиом. Построение указанных множеств является трудоёмким процессом, как по
времени, так и по количеству вовлечённых в процесс проектирования высококвалифицированных
специалистов. Особенно трудоемко ручное проектирование онтологий, которое мало чем отличается от
тематического проектирования экспертных систем.
Понимание важности решения проблемы создания эффективных инструментальных средств поддержки
процессов проектирования онтологии заданной ПрО, пришло практически одновременно с осознанием
парадигмы компьютерных онтологий. В настоящее время известно более ста инструментальных
программных систем [Гаврилова, 2000; Палагин, 2009], но только ограниченное количество комплексных
программных систем включают редактор онтологических структур, автоматизированное построение
онтологий ПрО, средства поверхностного семантического анализа текстовых документов, используемых
для построения онтологии.
Основные характеристики комплексных программных систем проектирования онтологий
К основным характеристикам комплексных программных систем онтологического инжиниринга можно
отнести: поддерживаемые формализмы и форматы представления онтологий, архитектура программного
обеспечения, интерфейс пользователя, функционал редактора онтологии, средства хранения онтологий,
доступность, дополнительные возможности. Ниже рассмотрим более подробно некоторые из
приведенных характеристик.
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
337
Поддерживаемые формализмы и форматы представления онтологий
Под формализмом понимается некоторая формальная теория [Клини, 1957], лежащая в основе способа
представления онтологических знаний (логика предикатов, фреймовые модели, дескриптивная логика,
концептуальные графы и др.). Выбранный формализм существенно влияет на организацию внутренних
(компьютерных) структур данных и может определять их формат представления.
Формат представления онтологий задаёт вид их хранения в библиотеке, способ передачи онтологических
описаний другим потребителям и метод обработки ее концептов. В качестве форматов онтологических
описаний разработаны определенные языки представления онтологий, наиболее известными из которых
являются OWL, RDFS, KIF.
Некоторые из известных редакторов онтологий поддерживают работу с несколькими формализмами
представления, однако следует учитывать тот факт, что обычно конкретный формализм является
предпочтительным для конкретного редактора [Палагин, 2009].
Функциональность редактора онтологии
Функциональность редактора онтологии является одной из самых важных характеристик, под которой
понимается множество предоставляемых пользователю сервисов работы с онтологическими структурами.
Базовый набор функций редактора онтологии обычно обеспечивает:
работу с одним или несколькими онтологическими описаниями (проектами) одновременно;
графический интерфейс пользователя;
редактирование онтологии (создание, редактирование, удаление концептов, отношений, аксиом и
прочих структурных элементов онтологии);
инкапсулирование онтологий в среду информационных систем.
Дополнительные возможности
К дополнительным возможностям относят поддержку языка запросов, анализ целостности, использование
механизма логического вывода, поддержку удалённого доступа через Интернет, документирование.
Известны три группы инструментальных средств (ИнС) онтологического инжиниринга [Овдей, 2006]. К
первой группе относят инструменты создания онтологий, которые предполагают поддержку совместной
разработки и просмотра, создание онтологии в соответствии с заданной (произвольной) методологией,
поддержку рассуждений.
Ко второй группе относят инструменты объединения, отображения и выравнивания онтологий.
Объединение предполагает нахождение сходств и различий между исходными онтологиями и создание
результирующей онтологии, которая содержит элементы исходных онтологий. Для этого ИнС
автоматически определяют соответствия между концептами или обеспечивают графическую среду, в
которой пользователь сам находит эти соответствия. Процедура отображения заключается в нахождении
семантических связей между концептами различных онтологий. Процедура выравнивания онтологий
устанавливает различные виды соответствия между двумя онтологиями, информация о которых
сохраняется для дальнейшего использования в приложениях пользователя [Noy, 1999].
338
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
К третьей группе относят инструменты для аннотирования Web-ресурсов на основе онтологий.
Содержательный обзор известных инструментов инженерии онтологий, в котором рассмотрены основные
функции и возможности ИнС, их достоинства, недостатки, сравнительный анализ и описание известных
доступных онторедакторов, также приведен в [Овдей, 2006; Noy, 1999; Calvanese, 2007; Филатов, 2007].
Общими недостатками большинства известных инструментальных средств являются:
отсутствие процедур автоматического (автоматизированного) формирования компонент онтологии;
англоязычный интерфейс с пользователем, в котором (для большинства ИнС) не предусмотрено
присвоение имён компонентам онтологии на русском или украинском языке;
структуризация концептов выполняется только по одному типу отношений;
для большинства общедоступных ИнС не предусмотрена работа с большими по объёму
онтологиями (например, для OntoEditFree – до 50 концептов);
большинство инструментов хранит свои онтологии в текстовых файлах, что ограничивает скорость
доступа к онтологиям;
задекларированные функциональные возможности для общедоступных инструментов зачастую так
и остаются нереализованными;
недостаток информации для пользователей в инструкциях.
Рассмотрим более подробно некоторые инструментальные программные системы, предназначенные для
построения онтологий и их использования для решения задач. Универсальные и специализированные
оболочки программных систем являются средством, упрощающим процесс создания интеллектуальной
системы [Артемьева, 2008]. Универсальные оболочки основаны на использовании некоторого
универсального языка представления знаний. В специализированных оболочках при представлении
знаний используется специфичная для предметной области схема, определяемая онтологией той
области, для которой создается оболочка, что позволяет создавать базу знаний эксперту предметной
области без участия посредника, которым является инженер знаний. В сложно-структурированных
предметных областях, связанных с наукой, могут изменяться не только знания, но и онтологии, и, как
следствие, множество классов решаемых задач. Описание особенностей специализированных оболочек
интеллектуальных систем для сложно-структурированных предметных областей приведено на основе
статьи «Интеллектуальная система, основанная на многоуровневой онтологии химии» [Артемьева, 2008].
Специализированная оболочка интеллектуальной системы для сложно-структурированных предметных областей
Информационными компонентами специализированной оболочки для сложно-структурированной ПрО
являются многоуровневая модульная онтология и модульная база знаний. Создание и редактирование
информационных компонент осуществляется многоуровневым редактором онтологий и редактором
знаний, разработка которых основывается на онтологии уровня n.
Редакторы многоуровневых онтологий и знаний должны позволять создание и редактирование
модульных онтологий и знаний, а также обеспечивать возможность повторного использования модулей
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
339
при создании онтологий и знаний новых разделов и подразделов области, причем процесс создания и
редактирования модуля онтологии уровня i-1 должен управляться онтологией уровня i, а процесс
создания и редактирования модуля знаний – онтологией уровня 2.
Редактор онтологии должен обеспечивать возможность выбора того из существующих модулей онтологии
уровня i, который управляет процессом редактирования создаваемого модуля. Аналогично при
редактировании модуля знаний должна обеспечиваться возможность выбора «управляющего» модуля
онтологии уровня 2.
Редакторы онтологии и знаний должны обеспечивать возможность задания структурированной и
неструктурированной части онтологии, а также структурированной и неструктурированной части знаний,
т. е. программным компонентом этих редакторов должен быть специализированный редактор
утверждений, позволяющий вводить онтологические соглашения и законы предметной области.
Редактор знаний должен обеспечивать возможность ввода/вывода значений нестандартных величин при
редактировании знаний. Для значений нестандартных величин в предметной области может
существовать способ их графического представления. Например, для химии [Артемьева, 2008]
графически может быть задана краткая структурная формула или структурная формула химического
соединения. Поэтому редактор знаний должен обеспечивать возможность использования принятого в
предметной области графического способа представления значений нестандартных величин при
создании и редактировании знаний. Величина, которой принадлежит значение некоторого свойства,
задается онтологией уровня 2. Поэтому редактор знаний должен обеспечивать автоматический выбор
(управляемый онтологией уровня 2) средств для графического представления значений нестандартных
величин при редактировании знаний.
Редактор онтологии интерпретирует онтологию уровня i при создании модуля онтологии уровня i-1.
Редактор знаний интерпретирует онтологию уровня 2 при создании модуля знаний. Одна и та же
онтология может интерпретироваться разными способами в разных редакторах знаний. Редакторы знаний
могут отличаться не только способом интерпретации знаний, но и интерфейсом. Очевидно, что более
удобный интерфейс и более понятный эксперту способ интерпретации можно обеспечить для редактора,
предназначенного
для
интерпретации
одной
онтологии,
а
не
класса
онтологий.
Поэтому
специализированная оболочка должна позволять использование редакторов, поддерживающих разные
способы интерпретации модуля онтологии уровня 2 и предоставлять возможность эксперту выбора
требуемого ему редактора знаний.
Значения нестандартных величин используются не только при редактировании знаний, но также при
вводе исходных данных задач. Графический способ задания исходных данных задач более удобен для
специалиста предметной области, поскольку в этом случае отсутствует необходимость громоздкого
вербального описания этих данных. Графическое представление результатов решения является более
наглядным способом представления. Поэтому оболочка должна обеспечивать возможность ввода/вывода
значений нестандартных величин при задании исходных данных задач, а также позволять использование
340
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
принятого в предметной области графического способа представления значений нестандартных величин
при вводе исходных данных задач и выводе результатов их решения.
Как уже отмечалось, величина, которой принадлежит значение некоторого свойства, задается онтологией
уровня 2. Оболочка должна обеспечивать автоматический выбор (управляемый онтологией) средств для
графического представления значений нестандартных величин при задании исходных данных задач.
Каждый раздел сложно-структурированной ПрО характеризуется своим множеством классов прикладных
задач, причем разные множества могут содержать как общие классы задач, так и специфичные для
раздела. Решатель задач может быть предназначен для решения классов задач одного раздела (в этом
случае он использует онтологию и знания этого раздела), либо разных разделов (в этом случае он может
использовать разные онтологии и знания). В первом случае используемая решателем онтология
определяется классом задач. Во втором случае требуется дополнительное указание, какие онтология и
знания должны использоваться в процессе решения. Специализированная оболочка интеллектуальных
систем для сложно-структурированной предметной области должна обеспечивать возможность решения
задач разных классов, причем пользователь должен иметь возможность указания модуля онтологии и
модуля знаний, которые надо использовать при решении задач.
Таким образом, специализированная оболочка должна содержать расширяемые библиотеки систем для
решения задач разных классов, системы автоматического построения методов решения задач по их
спецификации (рис. 1).
Рис. 1. Системы для решения задач и средства их разработки
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
341
Метод решения задач может быть представлен либо в виде алгоритма, либо в виде множества правил
системы продукций. В первом случае для создания решателя задач используется процессор
алгоритмического языка, во втором случае – процессор языка, основанного на правилах, который
является одним из программных компонент специализированной оболочки.
Специализированная система обработки текстовых документов «ЛоТА»
Специализированная система обработки текстовых документов «ЛоТА» [Невзорова, 2001] является
системой класса Text Mining. Система предназначена для анализа специализированных текстов «Логика
работы», описывающих логику работы сложной технической системы в различных режимах
функционирования. Основной задачей анализа является извлечение из данных текстов информационной
модели алгоритмов, решающих определенную задачу в определенной проблемной ситуации, и контроль
структурной и информационной целостности выделенной схемы алгоритмов.
Информационная модель алгоритма включает:
описание входного информационного потока (типы информационных сигналов или семантическое
описание информационного потока с указанием источника информации
конкретный алгоритм,
конкретное измерительное устройство);
описание процессов преобразования входных данных в выходные (допустимый способ разрешения
проблемы);
описание выходного информационного потока (типы информационных сигналов или семантическое
описание информационного потока с указанием точки приема информации).
Решение основной задачи обеспечивается комплексом технологий обработки текстов, включающих:
технологии морфосинтаксического анализа;
технологии семантико-синтаксического анализа;
технологии взаимодействия с прикладной онтологией.
Указанная сумма технологий формируется на основе центрального ядра – прикладной онтологии (в
дальнейшем, авиаонтология [Лукашевич, 2004]), обеспечивающей согласованное взаимодействие
различных программных модулей. Авиаонтология концептуально описывает предметную область
информационного
обеспечения
различных
полетных
режимов
антропоцентрических
систем.
Авиаонтология представляет собой сеть понятий предметной области. Авиаонтология относится к классу
лингвистических (лексических) онтологий и предназначена для встраивания в различные лингвистические
приложения.
Программный комплекс состоит из трех взаимодействующих подсистем: подсистемы лингвистического
анализа технических текстов «Анализатор», подсистемы ведения онтологии «OntoEditor+» и подсистемы
«Интегратор». Взаимодействие подсистем реализовано на базе технологии «клиент-сервер», причем в
различных подзадачах подсистемы выступают в различных режимах (режим сервера или режим клиента).
Инструментальная система визуального проектирования «OntoEditor+» является специализированной
СУБД. Система предназначена для ручного редактирования онтологий, хранящихся в реляционной базе
342
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
данных в формате TPS, а также обслуживания запросов пользователей и внешних программ. Новые
возможности системы обеспечиваются функциональным набором «Лингвистический инструментарий»,
посредством которого реализуется встраивание прикладной онтологии в лингвистические приложения.
Наиболее типичными задачами, решаемыми с помощью инструментария системы «OntoEditor+»,
являются: изучение структурных свойств прикладной онтологии с помощью исследовательского
инструментария системы «OntoEditor+»; построение лингвистической оболочки прикладной онтологии;
задача покрытия текста онтологическими входами; построение выводов по прикладной онтологии и др.
Подсистема
«Анализатор»
реализует
основные
этапы
лингвистической
обработки
текста
(графематический, морфосинтаксический и частичный синтаксический анализ).
Подсистема «Интегратор» исполняет внешний запрос на извлечение знаний из текста. Структура
внешнего запроса содержит компоненты информационной модели алгоритма. Внешний запрос
интерпретируется при взаимодействии с подсистемой «OntoEditor+» как структура, привязанная к
прикладной онтологии. Выделение компонент информационной модели происходит на основе
механизмов отождествления элементов дерева сегментов входного текста (взаимодействие с
подсистемой «Анализатор») и элементов структуры запроса (взаимодействие с подсистемой
«OntoEditor+»).
Инструментальная система визуального проектирования онтологий «OntoEditor+» включает:
лингвистический инструментарий (задачи корпусного исследования (загрузка корпуса; сегментация
на предложения; автоматическое ведение статистики по различным объектам корпуса), построение
лингвистической оболочки онтологии, задача покрытия текста онтологическими входами,
построение выводов по онтологии, поддержка протоколов информационного обмена системы
«OntoEditor+» с внешними программными модулями, в том числе с внешними информационными
ресурсами);
исследовательский инструментарий.
Основные функции подсистемы «Анализатор»:
графематический анализ;
морфосинтаксический анализ;
покрытие текста онтологическими входами (взаимодействие с системой «OntoEditor+»).
Основные функции подсистемы «Интегратор»:
анализ и исполнение внешнего запроса (информационная модель алгоритма);
интерпретация внешнего запроса в терминах прикладной онтологии (взаимодействие с системой
«OntoEditor+»);
интерпретация внешнего запроса в структурных компонентах дерева сегментов (взаимодействие с
системой «Анализатор»);
контроль информационной целостности (анализ компонент внешнего запроса).
Метод контекстного разрешения омонимии является базовым методом в интегральной технологии
разрешения омонимии в системе «ЛоТА». Однако практические задачи системы выявили ряд важных
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
343
аспектов лингвистического анализа, которые стимулировали развитие новых методов разрешения
многозначности.
Интегральная технология разрешения многозначности, разрабатываемая в системе «ЛоТА», включает
следующие методы:
метод контекстного разрешения функциональной омонимии;
метод разрешения функциональной, грамматической и лексической омонимии на основе
индексируемой базы устойчивых коллокаций;
метод разрешения функциональной, грамматической и лексической омонимии на основе
лингвистической оболочки онтологии.
Для эффективного встраивания в лингвистические приложения система «OntoEditor+» поддерживает
группу протоколов информационного обмена с внешними программными модулями системы и внешними
словарными базами данных, обеспечивая работу в режиме клиент-сервер. Разрешение многозначности
(функциональной, морфологической и лексической) во входных текстах происходит на основе механизма
распознавания контекстов омонимов, зафиксированных в индексируемой базе контекстов.
Разработаны три основных механизма пополнения индексируемой базы контекстов функциональных
омонимов:
ручной ввод и редактирование данных по типовым контекстам омонимов;
импорт типовых контекстов омонимов из текстового файла, подготовленного в специальном
формате представления данных;
импорт типовых контекстов омонимов, обнаруженных специальными механизмами поиска
подсистемы «Анализатор».
Данный механизм организован как запрос к подсистеме «Анализатор» с передачей ему от подсистемы
«OntoEditor+» текстового корпуса, по которому проводится поиск. В процессе обработки подсистема
«Анализатор» передает подсистеме «OntoEditor+» информацию об обнаруженных контекстах омонимов,
которая записывается либо в индекс омонимов, либо в автоматическом режиме, либо в режиме диалога с
оператором. Отличительной особенностью режима диалога является режим самообучения, который
реализуется с использованием механизма журнала событий. В данном журнале в зависимости от его
настройки фиксируются те или иные важные события в системе, например, изменение информации в
индексе омонимов или операции взаимодействия с подсистемой «Анализатор». В режиме самообучения
сохраняется и контролируется последовательность ранее сгенерированных диалогов, что обеспечивает
генерацию только уникальных диалогов на разрешение омонимии без повторений.
Лингвистический инструментарий подсистемы «OntoEditor+» обеспечивает встраивание онтологии в
различные приложения, связанные с обработкой текстов. Лингвистический инструментарий реализует
функции загрузки корпуса текстов; автоматическое ведение статистики по различным объектам корпуса;
функции предсинтаксической обработки текста (сегментация предложений, распознавание аббревиатур,
разрешение омонимии на основе специальных протоколов взаимодействия с внешними словарными
ресурсами); построение лингвистической оболочки онтологии; распознавание терминов прикладной
344
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
онтологии во входном тексте (задача покрытия). Сопряжение онтологического и лингвистического
(грамматического) ресурсов реализуется через механизмы лингвистической оболочки онтологии.
Лингвистическая
оболочка
онтологии
создается
с
помощью
разработанного
программного
инструментария, посредством которого фиксируется грамматическая информация об онтологических
концептах и их текстовых формах. Каждый онтологический вход (как правило, многословный термин)
снабжается соответствующей грамматической информацией, при этом для омонима разрешается
соответствующая
(функциональная,
лексическая,
морфологическая)
омонимия.
Грамматическая
информация передается в подсистему «OntoEditor+» от подсистемы «Анализатор» на основе
специальных протоколов взаимодействия. Разрешение лексической, функциональной и морфологической
омонимии выполняется на основе специальных диалогов с экспертом-лингвистом. Отдельные процедуры
реализуют проверки словоформ в составе терминологического входа на согласованность их
грамматических характеристик, также осуществляется контроль достоверности словарной информации.
Контроль достоверности обеспечивает отслеживание изменений, как в составе грамматического словаря,
так и в составе онтологии. Учитывая сложность и многоступенчатость вышеперечисленных процедур, в
подсистеме «OntoEditor+» разработан мастер построения лингвистической оболочки, который вызывается
командой основного меню.
Подсистема «Анализатор» обеспечивает реализацию метода разрешения омонимии на основе
контекстных правил, т. е. фактически используются лингвистические знания системы. Этот метод
является универсальным, не зависит от специфики предметной области и обеспечивает в текущей версии
точность распознавания не ниже 95 %. Однако, для данного метода существуют крайне сложные типы
функциональной омонимии, например, тип «частица/союз». Разрешение данной омонимии возможно во
многих случаях лишь после завершения полного синтаксического анализа.
Взаимодействие подсистемы «OntoEditor+» и подсистемы «Анализатор» осуществляется на основе
специальных протоколов взаимодействия. При применении интегральной технологии разрешение
многозначности происходит в два этапа. На первом этапе подсистема «Анализатор» (клиент) передает
запрос на разрешение омонимии входного текста подсистеме «OntoEditor+» (сервер). Подсистема
«OntoEditor+» возвращает подсистеме «Анализатор» информацию о разрешенных омонимах на основе
своих методов. На втором этапе подсистема "Анализатор" разрешает омонимию оставшихся
неразрешенных омонимов на основе метода контекстных правил.
Интегральная
технология
разрешения
многозначности
эффективно
применяется
на
этапе
предсинтаксического анализа в системе «ЛоТА». По существу, интегральная технология представляет
собой сочетание инженерного и лингвистического подхода к решению поставленной задачи. В основе
проектирования интегральной технологии лежат процессы скоординированного взаимодействия
различных языковых уровней, прежде всего онтологического уровня (обеспечивающего системные
модели знаний о мире) и различных языковых уровней (морфологического и синтаксического). В системе
реализован эффективный механизм взаимодействия различных подсистем, обеспечивающих реализацию
различных методов в составе интегральной технологии. При этом, следует признать, что сам процесс
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
345
согласования языковых взаимодействий достаточно сложен и требует определения большого числа
дефиниций-правил, описывающих условия обработки концептов онтологии.
Интеллектуальная система извлечения данных и их анализа (на основе текстов) ИСИДА-Т
Целью ИСИДА-Т [Кормалев, 2006]; [Киселев, 2004], является извлечение значимой информации
определенного типа из (больших массивов) текста для дальнейшей аналитической обработки.
Результатом работы систем является получение структурированных данных и отношений на них.
Основные компоненты ИСИДА-Т:
Инфраструктурные службы (конфигурирование, параллельная обработка, взаимодействие
модулей);
Лингвистический процессор;
Модули работы со знаниями ПрО;
Интерпретатор правил извлечения информации.
Разработанные в рамках проекта ИСИДА-Т технологии, инструменты и продукты позволяют:
обнаруживать в электронных документах, извлекать и структурировать информацию о
представляющих интерес фактах, событиях, объектах и отношениях;
выполнять мониторинг сайтов в сети Интернет на предмет появления там значимой для
пользователя информации.
Основные рабочие характеристики технологии и продуктов:
поддержка русского языка;
быстрая настройка на предметную область при помощи эффективных инструментальных средств;
высокая точность и полнота анализа за счет использования предметных знаний;
наличие встроенных средств визуализации результатов анализа в виде диаграмм и схем;
легкая интегрируемость в другие информационные системы на любом уровне (программный или
сетевой интерфейс, БД);
функционирование под управлением ОС Windows и большинства Linux-систем;
близкая к линейной масштабируемость при параллельной архитектуре анализа. Возможность
работы на вычислительных машинах кластерного типа.
Некоторые области применения технологий семантического анализа и структурирования текстовой
информации:
информационная поддержка бизнеса (business intelligence) и управление знаниями (knowledge
management);
маркетинговые исследования;
финансовая аналитика;
военная и коммерческая разведка и мониторинг;
информационная поддержка органов государственной власти (в рамках направления «Электронное
правительство»);
346
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
работа библиотек, издательств и СМИ.
Рассмотрим общую организацию инфраструктуры системы ИСИДА-Т. Краеугольным камнем системы
ИСИДА-Т является точная настройка на предметную область и конкретную задачу извлечения. С одной
стороны, это достигается за счет редактирования лингвистических ресурсов, ресурсов знаний, правил
извлечения и правил трансформации. С другой стороны, настройка может потребовать включения в
процесс обработки дополнительных специализированных методов обработки текста. Кроме того, для
каждой задачи необходимо подобрать наиболее подходящие алгоритмические средства анализа из
набора имеющихся. Эти аспекты требуют создания такой архитектуры, при которой легко могут
добавляться и замещаться алгоритмические компоненты процесса извлечения.
Проблема конфигурирования на алгоритмическом уровне потребовала создания модульной архитектуры
и декларативного подхода к определению процесса извлечения. Модули получили название
обрабатывающих ресурсов в противовес лингвистическим ресурсам и ресурсам знаний. В конфигурации
декларируется порядок обработки документа аналитическими модулями, потоки данных между ними, а
также параметры их работы.
Обрабатывающие ресурсы можно разделить на следующие группы.
Ресурсы предобработки. Сюда относятся средства определения кодировки документа, извлечения
текста и стилевой разметки из документа, предварительной фильтрации.
Ресурсы лингвистического анализа. Осуществляют разбор текста на отдельные слова,
морфологический анализ (в том числе специализированные варианты для различных категорий
имен собственных), поверхностный синтаксический анализ и определение границ предложений.
Ресурсы извлечения. Осуществляют поиск в документе целевой лексики и синтаксических
конструкций, а также первичное структурирование информации.
Ресурсы унификации знаний и вывода. Осуществляют унификацию и отождествление элементов
знаний, вывод производных знаний.
Ресурсы подготовки результата. Осуществляют приведение извлеченной информации к
определенному формату и передачу за пределы последовательности обработки (в БД, глобальный
ресурс знаний, файл, приложение).
В системе ИСИДА-Т все модули, в том числе средства общего лингвистического анализа, используют
структуру данных – аннотация. Аннотация – объект, который приписывается фрагменту текста (например,
слову, словосочетанию, предложению, ссылке на сущность предметной области и т. д.) и описывает
свойства этого фрагмента. Аннотации разбиты на конечное множество классов. Каждый класс аннотаций
описывает текст в определенном аспекте. Информация о фрагменте представлена значениями
именованных атрибутов аннотации. Наборы классов и атрибутов аннотаций намеренно не
специфицированы, чтобы можно было использовать произвольный набор обрабатывающих модулей и
представлять необходимую лингвистическую и предметную информацию. Обмен данными между
модулями тоже идет в терминах аннотаций: новые аннотации могут строиться на основании полученных
на предыдущих этапах анализа [Овдей, 2006]. В реализации системы ИСИДА-Т модель аннотаций была
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
347
дополнена некоторыми полезными средствами. В частности, было снято ограничение на атомарность
атрибутов и добавлена возможность устанавливать ссылки между аннотациями.
Для распознавания текстовых ситуаций используется набор правил, описывающих характерные для
конкретной задачи способы выражения ситуации в тексте. Эти правила задают образец для
сопоставления и действия, которые должны быть произведены после успешного сопоставления. Ряд
современных систем извлечения информации (в том числе, система ИСИДА-Т) берут за основу
различные диалекты языка CPSL [Noy, 1999]. Использование этого языка подразумевает разметку текста
при помощи аннотаций.
Язык правил, используемый в системе ИСИДА-Т, является расширением CPSL. Предлагаемые
расширения преследуют две цели: 1) обеспечить возможность описывать более сложные контексты, в
которых встречается целевая информация, и 2) снизить объем рутинной работы при создании системы
правил за счет более компактного описания контекста [Гаврилова, 2000].
Отличия от других реализаций, например, JAPE [Calvanese, 2007] или диалекта CPSL состоят в
следующем.
Реализована встроенная поддержка расширенного спектра типов данных, в том числе, ссылок на
аннотации и множественных значений. Данные этих типов могут использоваться в качестве
значений переменных и значений атрибутов аннотаций.
Логика работы интерпретатора правил приведена в максимальное соответствие поведению
интерпретатора обычных регулярных выражений. Отличия от современной реализации JAPE и
Montreal transducer [Calvanese, 2007] заключаются в поддержке «жадных» и «нежадных»
квантификаторов и опережающей проверки.
Поддерживаются кванторы существования (по умолчанию) и всеобщности, связывающие
элементарные тесты. К кванторам может добавляться отрицание.
Существуют языковые средства, позволяющие гибко проверять взаимное расположение
аннотаций, рассматриваемых в контексте сопоставления, и прочих аннотаций во входной
коллекции.
В тестах могут использоваться функции для обращения к ресурсу знаний, например, проверки
таксономической принадлежности элементов. Для более сложных запросов к ресурсу знаний
используется предметно-ориентированный язык, совпадающий с языком описания левой части
правил трансформации.
Для передачи информации между элементарными тестами, а также в правую часть правил могут
использоваться именованные переменные, значения которых присваиваются явно в ходе
сопоставления. Множество значений переменных входит в контекст сопоставления.
Инструментальное средство проектирования онтологий Protégé
Protégé [Noy, 1999] – локальная, свободно распространяемая Java-программа, разработанная группой
медицинской информатики Стэндфордского университета. Программа предназначена для построения
348
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
(создания, редактирования и просмотра) онтологий прикладной области. Её первоначальная цель –
помочь разработчикам программного обеспечения в создании и поддержке явных моделей предметной
области и включение этих моделей непосредственно в программный код. Protégé включает редактор
онтологий, позволяющий проектировать онтологии, разворачивая иерархическую структуру абстрактных
или конкретных классов и слотов. Структура онтологии сделана аналогично иерархической структуре
каталога. На основе сформированной онтологии, Protégé может генерировать формы получения знаний
для введения экземпляров классов и подклассов. Инструмент имеет графический интерфейс, удобный
для использования неопытными пользователями, снабжен справками и примерами.
Protégé основан на фреймовой модели представления знания OKBC (Open Knowledge Base Connectivity)
[Chaudhri, 1998] и снабжен рядом плагинов, что позволяет адаптировать его для редактирования моделей,
хранимых в разных форматах (стандартный текстовый, в базе данных JDBC, UML, языков XML, XOL,
SHOE, RDF и RDFS, DAML+OIL, OWL).
Используемые формализмы и форматы
Изначально единственной моделью знаний, поддерживаемой Protégé, была фреймовая модель. Этот
формализм сейчас является «родным» для редактора, но не единственным.
Protégé имеет открытую, легко расширяемую архитектуру и, помимо фреймов, поддерживает все
наиболее распространенные языки представления знаний (SHOE, XOL, DAML+OIL, RDF/RDFS, OWL).
Protégé поддерживает модули расширения функциональности (plug-in). Расширять Protégé для
использования нового языка проще, чем создавать редактор этого языка «с нуля».
Protégé основан на модели представления знаний OKBC (Open Knowledge Base Connectivity). Основными
элементами являются классы, экземпляры, слоты (представляющие свойства классов и экземпляров) и
фасеты (задающие дополнительную информацию о слотах).
Пользовательский интерфейс
Пользовательский интерфейс состоит из главного меню и нескольких вкладок для редактирования
различных частей базы знаний и ее структуры. Набор и названия вкладок зависят от типа проекта (языка
представления) и могут быть настроены вручную. Обычно имеются следующие основные вкладки:
Классы, Слоты (или Свойства для OWL), Экземпляры, Метаданные.
Инструментальный комплекс автоматизированного построения онтологий ПрО
Инструментальный комплекс онтологического назначения (ИКОН) для автоматизированного построения
онтологии в произвольной предметной области [Палагин, 2012] является системой, реализующей одно из
направлений комплексных технологий Data & Text Mining, а именно – анализ и обработку больших
объёмов неструктурированных данных, в частности лингвистических корпусов текстов на украинском
и/или русском языке, извлечение из них предметных знаний с последующим их представлением в виде
системно-онтологической структуры или онтологии предметной области.
Извлечение информации (Information Extraction) [Палагин, 2012] –– это подход, позволяющий сузить круг
задач, требующих специфического предметно-ориентированного решения при анализе текста. В рамках
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
349
этого подхода задача обработки текста ограничена распознаванием множества классов ключевых
понятий конкретной предметной области и игнорированием всякой другой информации.
Несмотря на то, что системы извлечения информации могут строиться для выполнения различных задач,
подчас сильно отличающихся друг от друга, существуют компоненты, которые можно выделить
практически в каждой системе.
В состав почти каждой системы извлечения информации входят четыре основных компонента, а именно:
компонент разбиения на лексемы, некоторый тип лексического или морфологического анализа,
синтаксический анализ (микро- и макроуровень), модуль извлечения информации и модуль для анализа
на уровне конкретной предметной области. В зависимости от требований к конкретному программному
продукту в приведённую выше схему добавляют дополнительные модули анализа (специальная
обработка составных слов; устранение омонимии; выделение составных типов, которое может также быть
реализовано на языке правил извлечения информации; объединение частичных результатов).
Разбиение на слова при анализе европейских языков не является проблемой, поскольку слова
отделяются друг от друга пробелом (или знаками препинания). Тем не менее, для обработки составных
слов, аббревиатур, буквенно-цифровых комплексов и ряда других особых случаев требуются
специфические алгоритмы. С границами предложений, как правило, тоже больших проблем не возникает.
Однако при анализе таких языков как японский или китайский, определение границ слова на основе
орфографии невозможно. По этой причине системы извлечения информации, работающие с такими
языками, должны быть дополнены модулем сегментирования текста на слова.
В некоторые системы наряду с обычными средствами лексического и морфологического анализа могут
быть включены модули для определения и категоризации атрибутов частей речи, смысловых нагрузок
слов, имен или других нетривиальных лексических единиц.
ИКОН предназначен для реализации множества компонентов единой информационной технологии:
поиск в сети Интернет и/или в других электронных коллекциях (ЭлК) текстовых документов (ТД),
релевантных заданной ПрО, их индексацию и сохранение в базе данных;
автоматическая обработка естественно-языковых текстов;
извлечение из множества ТД знаний, релевантных заданной ПрО, их системно-онтологическая
структуризация и формально-логическое представление на одном (или нескольких) из
общепринятых языков описания онтологий. Кроме того, внутри этой технологии реализуется
процедура построения, визуализации и проверки семантических структур синтаксических единиц
ТД и понятийных структур заданной ПрО в виде онтографа, названного начальной онтологией ПрО;
создание,
накопление
и
использование
больших
структур
онтологических
знаний
в
соответствующих библиотеках;
системная интеграция онтологических знаний как одна из основных компонент методологии
междисциплинарных научных исследований;
другие процедуры, связанные с автоматизацией приобретения знаний из множества естественноязыковых объектов.
350
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
ИКОН состоит из трёх подсистем и представляет собой интеграцию разного рода информационных
ресурсов (ИР), программно-аппаратных средств обработки и процедур естественного интеллекта (ЕИ),
которые, взаимодействуя между собой, реализуют совокупность алгоритмов автоматизированного,
итерационного построения понятийных структур предметных знаний, их накопления и/или системной
интеграции. Обобщённая блок-схема ИКОН представлена на рис. 2.
Подсистема «Информационный ресурс» включает блоки формирования лингвистического корпуса
текстов, баз данных языковых структур и библиотек понятийных структур. Первый компонент
представляет собой различные источники текстовой информации, поступающей на обработку в систему.
Второй компонент представляет собой различные базы данных обработки языковых структур, часть из
которых формируется (наполняется данными) в процессе обработки ТД, а другая часть формируется до
процесса построения онтологии ПрО и, по сути, является ЭлК различных словарей. Третий компонент
представляет собой совокупность библиотек понятийных структур разного уровня представления (от
наборов терминов и понятий до высокоинтегрированной онтологической структуры междисциплинарных
знаний) и является результатом реализации некоторого проекта (проектирования онтологии ПрО и/или
системной интеграции онтологий).
Рис. 2. Обобщённая блок-схема ИКОН
Подсистема «Программно-аппаратные средства» включает блоки обработки языковых и понятийных
структур и управляющую графическую оболочку, с помощью которой инженер по знаниям осуществляет
общее управление процессом использования связанных информационных технологий.
Подсистема
«Естественный
интеллект»
осуществляет
подготовку
и
реализацию
процедур
предварительного этапа проектирования, а на протяжении всего процесса осуществляет контроль и
проверку результатов выполнения этапов проектирования, принимает решение о степени их
завершённости (и в случае необходимости – повторении некоторых из них).
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
351
ТОДОС – IT-платформа онтологических информационно-аналитических экспертных
систем
ТОДОС – инновационный комплекс программно-информационных и методических средств управления
знаниями с использованием подходов онтологического управления корпоративными информационными
ресурсами, где человек рассматривается как источник определения новых знаний для передачи их в
форме собственного знания через инструментарий [Стрижак, 2013]. ТОДОС обеспечивает для
пользователя единую интегрированную точку доступа – «единое окно» – к информации и приложениям
системы для обеспечения интерактивного взаимодействия при решении прикладных задач.
Принцип ТОДОС – «Ситуационная осведомленность» за счет предоставления пользователям
необходимой информации, касающейся направлений их деятельности и достаточной для принятия
эффективного решения:
Удобное, интуитивно-понятное, многоаспектное представление аналитической информации;
Обеспечение работы с неструктурированной и слабо структурируемой информацией;
Работа с информацией и результатами анализа из любой точки сетевого доступа;
Удовлетворение поиска и запросов пользователей – извлечение знаний;
Обработка и анализ контента, агрегирование и упорядочивание по заданному критерию;
Поддержка принятия решений на основе анализа больших объемов информации;
От данных - к пространственно-распределённым системам управления (ГИС) - от ГИС - к
информации;
Обеспечение взаимодействия и обратной связи.
Концепция ТОДОС:
консолидация и интеграция всей имеющейся корпоративной информации и предоставление ее
через систему «единого окна», за счет чего повышается уровень осведомленности всех категорий
пользователей в их деятельности;
обеспечение «бесшовной» системной интеграции информационных технологий и инноваций с
целью создания информационно-аналитических ресурсов для внедрения в бизнес-процессы
организации;
создание условий «ситуационной осведомленности» для всех заинтересованных категорий
пользователей с многоаспектным анализом массивов документов, их анализом, сравнением,
рейтингованием с выводом отчетов и результатов анализа;
обеспечение онтологического управления информационными массивами, которые объединяются в
единое корпоративное информационное пространство – онтолого-управляемую систему
корпоративных знаний;
поиск в сети Интернет и в файловых электронных коллекциях текстовых документов, релевантных
тематике исследований и экспертизы;
352
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
автоматическая обработка естественно-языковых текстов с выделением поверхностных
семантических отношений для дальнейшего их анализа;
извлечение из множества документов знаний, релевантных выбранной предметной области, их
системно-онтологическая структуризация и формально-логическое представление, а также
построение, визуализация и верификация семантических структур синтаксических единиц
текстовых документов и категориальных знаний заданной предметной области в виде
онтологического графа;
автоматизированное построение онтологий и тезаурусов предметных областей для организации
системы управления знаниями;
автоматизированный анализ и создание системы рейтингов объектов исследования и процессов с
ними связанных с учетом всего множества факторов, влияющих на соответствующие объекты и
процессы;
обеспечение многовекторного исследования объектов и процессов с целью выявления параметров
влияющих на их состояние, развитие и принятия соответствующего объективного решения.
ТОДОС – это:
Модуль КОНСПЕКТ – контекстно-семантический анализ естественно-языкового текста и
построение таксономии документов;
Модуль КОНФОР – классификация и генерация онтологий предметной области;
Модуль ЭДИТОР – конструирование трансдисциплинарных онтологий;
Модуль АЛЬТЕРНАТИВА – онтология задачи выбора для информационно-аналитической
поддержки принятия решений и обеспечения процессов многофакторного анализа и рейтингования;
ПОИСКОВАЯ МАШИНА – поиск лексических структур на основе лингвистической обработки
большого количества распределенных сетевых текстовых массивов;
ЛИНГВИСТИЧЕСКИЙ КОРПУС – электронная библиотека со средствами ассоциативного поиска
семантически связанных информационных массивов;
Модуль КРИПТО – защита информационных массивов от несанкционированного доступа.
Модуль КОНСПЕКТ представляет собой лингвистический процессор [Величко, 2009], который
обеспечивает первичное формирование лингвистического корпуса [Широков, 2005] и позволяет решать
следующие практические задачи:
1) Выделение однословных и многословных терминов документа.
2) Формирование списка терминов с подсчетом их количества в тексте.
3) Навигация по списку терминов с отбором и отражением контекстов предложений из текста с
выделенными терминами.
4) Автоматизированное построение тематического словаря по коллекции документов для использования в
локальной полнотекстовой поисковой системе с целью повышения релевантности поиска.
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
5) Конспектирование текста по заданной теме. Конспект
353
это краткое изложение содержания статьи или
книги. Система автоматически создает текстуальный конспект, где основные положения произведения,
доказательства и выводы передаются словами автора, то есть цитатами. Тема конспекта задается
пользователем программы с помощью ключевого слова или словосочетания. Из исходного текста в
конспект отбираются предложения, содержащие тему, и автоматически отбираются термины текста,
ассоциативно связанные с заданной темой. Пример конспекта, который автоматически построен в среде
модуля КОНСПЕКТ, приведен на рис. 3.
Рис. 3. Фрагмент среды модуля КОНСПЕКТ
Результаты, которые можно получить в ближайшее время при условии доработки разработанной
программы:
1) Повышение качества обработки текстов на украинском и русском языках за счет увеличения объема
словаря системы;
2) Автоматическое определение тематических направлений документа;
3) Сортировка документов по тематическим направлениям;
4) Построение семантической сети терминов документа;
5) Объединение семантических сетей терминов для нескольких документов;
6) Поиск информации в сети Интернет с помощью поискового модуля системы ТОДОС с дополнительной
автоматической семантической фильтрацией результатов поиска. Для дополнительной фильтрации
используются алгоритмы формирования семантических категорий заданной тематики, извлеченных из
354
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
текста. Список документов, которые получает пользователь после дополнительной фильтрации,
сокращается в несколько раз;
7) Конспектирование текста по заданной теме (для украинского языка).
Модуль КОНФОР предназначен для построения семантических связей между объектами предметной
области на основе индуцированной обработки отношений между объектами тематических классов ПрО.
Для этого тематические классы описываются пользователем в соответствии с нижеприведённой схемой:
(имя класса объектов 1),(имя связи), (имя объекта 1),...,(имя объекта n)
(имя класса объектов 2),(имя связи), (имя объекта 1),...,(имя объекта j)
.......................................................................................................................
(имя класса объектов m),(имя связи), (имя объекта 1),...,(имя объекта k)
Согласно схемы заполняется таблица, например MS Excel, ячейки столбца А которой содержат имена
материнских вершин графа, ячейки столбца В – имена связей между вершинами, ячейки столбцов от С до
Z – имена дочерних вершин. Выходной структурой модуля КОНФОР является онтограф ПрО [Палагин,
2012], [Довгий, 2013], вершины которого носят имена объектов.
Модуль ЭДИТОР предназначен для создания, редактирования, просмотра и анализа сетей понятий и
формирования закономерностей, представленных в виде набора значений признаков, которыми
описываются начальные понятия предметной области. Таким образом, описание предметной области
является наглядным и легко интерпретируется пользователем.
Выделение закономерностей происходит методом индуктивного формирования понятий на основе
пирамидальной сети.
Пирамидальной сетью называется ациклический ориентированный граф, вершинами которого выступают
термины (понятия) предметной области, а ребрами (дугами)
семантические связи между терминами
[Гладун, 1994].
Представление информации в виде графа позволяет изучать не только отдельный термин (понятие), но и
получать все его семантические связи с другими понятиями, тем самым осмысливая его роль в данной
системе знаний или в ходе решения задачи.
Однако сетевой граф может выступать не только средством организации знаний. Расширяя
традиционные функции, граф можно превратить в среду, в которой обеспечивается активная работа со
знаниями, а также оригинальным образом решаются учебные задачи.
Концептуальная модель предметной области или онтология состоит из графа (иерархии понятий)
предметной области, связей между ними и законов, которые действуют в рамках этой модели.
Модуль АЛЬТЕРНАТИВА обеспечивает упорядочивание объектов-концептов онтологии, на основе
интегрированной обработки характеризующих их свойств. Для этого используются весовая, бальная и
лингвистическая шкалы. Каждая такая шкала определяет значение критериев, характеризующих свойства
объектов тематической онтологии ПрО. В общем случае свойства-критерии характеризуются различными
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
355
степенями важности, которые при решении задачи выбора задаются некоторыми действительными
числами
весовыми коэффициентами. Перед решением задачи для каждого критерия необходимо
сформировать его значение для каждой альтернативы [Саати, 1989].
Модули ПОИСКОВАЯ МАШИНА и ЛИНГВИСТИЧЕСКИЙ КОРПУС, обеспечивают маркировку и
индексирование семантических единиц, определяющих и описывающих контексты объектов тематических
онтологий ПрО. Контексты семантических единиц составляют электронную библиотеку.
Модуль КРИПТО обеспечивает защиту информационных ресурсов электронной библиотеки системы.
Защита реализуется на основе гомоморфного кодирования. Для создания эффективных методов защиты
системы реализуются механизмы инфраструктуры публичных ключей (PKI). Инфраструктура публичных
ключей позволяет объединить электронные подписи, публичные и частные ключи и пирамиду
виртуальных лиц или организаций, которые могут выполнять действия по управлению тематическими
онтологиями и отображающими их документами.
На основе анализа сопроводительной документации, справочных материалов, доступных в открытых
источниках информации (интернет, научные труды), и, в отдельных случаях, практической работы с
программными системами конструирования онтологий (ИКОН, ТОДОС, Protégé), построена сводная
таблица, обобщающая сравнительные технические характеристики некоторых специализированных
инструментальных средств инженерии онтологий (таблица 1).
Заключение
В статье представлен обзор специализированных инструментальных средств инженерии онтологий. Как
видно из сравнительной таблицы, в которой представлены различные системы конструирования
онтологий, стратегическим направлением развития таких систем является интероперабельность.
Эффективность использования онтологических описаний в основном зависит от возможностей
применения форматов их описаний при решении различных сложных прикладных задач. Наиболее
конструктивным методом решения этой проблемы может быть разработка онтологий задач, которые
смогут
обеспечить
семантическую
синхронизацию
взаимодействий
различных
по
тематикам
информационных систем на основе установления отношений между свойствами их концептов.
Библиография
[Клини, 1957] Клини С. К. Введение в метаматематику [Текст] / С. К. Клини. – М. : Иностранная литература, 1957. –
526 с.
[Палагин, 2012] Палагин А. В. Онтологические методы и средства обработки предметных знаний / А. В. Палагин,
С. Л. Крывый, Н. Г. Петренко. – [монография] – Луганск : изд-во ВНУ им. В. Даля, 2012. – 323 с.
[Гаврилова, 2000] Гаврилова Т. А., Хорошевский В. Ф. Базы знаний интеллектуальных систем / Учебник для вузов. –
СПб, Изд-во «Питер», 2000. – 384 с.
[Палагин, 2009] Палагин А. В., Петренко Н. Г. Системно-онтологический анализ предметной области // УСиМ. – 2009.
– № 4. – С. 3–14.
[Овдей, 2006] Овдей О. М. Обзор инструментов инженерии онтологий / О. М. Овдей, Г. Ю. Проскудина. – Российский
научный электронный журнал «Электронные библиотеки», 2004. – т. 7. – Вып. 4, ISSN 1562-5419. – Режим
356
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
доступа: http://www.elbib.ru/index.phtml?page= elbib/rus/journal/2004/part4/op. – Дата доступа: 19.10.2006. –
Название с экрана.
[Noy, 1999] Noy N. SMART: Automated Support for Ontology Merging and Alignment / N. Noy, M. Musen. – Stanford
Medical Informatics, Stanford Univ. – 1999. – 24 p. Режим доступа: http://ais-portal.ru/2009/03. – Дата доступа:
17.05.2010.
[Calvanese, 2007] Software Tools for Ontology Design and Maintenance / [D. Calvanese, P. Dongilli, G. De Giacomo, A.
Kaplunova, D. Lembo, M. Lenzerini, R. Möller, R. Rosati, S. Tessaris, M. Wessel, I. Zorzi] Project Deliverable
D21,TONES,
2007.
http://www.researchgate.net/publication/240754938_Software_Tools_for_Ontology_Design_and_Maintenance
[Артемьева, 2008] Артемьева И. Л., Рештаненко Н. В. Интеллектуальная система, основанная на многоуровневой
онтологии химии // Программные продукты и системы. – 2008. – № 1. – С. 84-87.
[Филатов, 2007] Филатов В. А. Разработка высокоэффективных средств создания и обработки онтологических баз
знаний / Филатов В. А., Щербак С. С., Хайрова А. А. – Системи обробки інформації, випуск 8 (66), 2007. – С. 120–
124. – Режим доступа: www.nbuv.gov.ua/portal/ natural/soi/2007_8/Filatov.pdf. – Дата доступа: 17.11.2010. –
Название с экрана.
[Невзорова, 2001] Невзорова О. А., Федунов Б. Е. Система анализа технических текстов «ЛоТА»: основные
концепции и проектные решения. // Изв. РАН. Теория и системы управления.– 2001. № 3. – С. 138-149.
[Лукашевич, 2004] Лукашевич Н.В., Невзорова О. А., АвиаОнтология: анализ современного состояния ресурса //
Компьютерная лингвистика и интеллектуальные технологии: труды Международной конференции Диалог’2004. –
Москва, Наука, 2004– т.2 - с. 424-430.
[Кормалев, 2006] Кормалев Д. А., Куршев Е. П. Развитие языка правил извлечения информации в системе ИСИДА-Т
// Труды международной конференции «Программные системы: теория и приложения». — Т. 2. — М. :
Физматлит, 2006. — С. 365-377.
[Киселев, 2004] Киселев С. Л., Ермаков А. Е., Плешко В. В. Поиск фактов в тексте естественного языка на основе
сетевых описаний // Компьютерная лингвистика и интеллектуальные технологии: труды Международной
конференции Диалог’2004. – Москва, Наука, 2004.
[Chaudhri, 1998] OKBC: A Programmatic Foundation for Knowledge Base Interoperability. V. Chaudhri, A. Farquhar, R.
Fikes P. Karp J. Rice // Fifteenth National Conf. on Artificial Intelligence. AAAIPres/The MIT Press, Madison, P.600-607,
1998.http://www.oracle.com/technetwork/java/javase/index.html
[Стрижак, 2013] Стрижак О.Є. Засоби онтологічної інтеграції і супроводу розподілених просторових та семантичних
інформаційних ресурсів [Текст] / Екологічна безпека та природокористування: 3б. наук, праць / М-во освіти і науки
України, Київ. нац. ун-т буд-ва і архіт., НАН України, Ін-т телекомунікацій і гло-бал. інформ. простору; редкол.:
О.С. Волошкіна, О.М. Трофимчук (голов. ред.) [та ін.]. - К., 2013. - Вип. 12. – с.166-177]
[Величко, 2009] Величко В. Автоматизированное создание тезауруса терминов предметной области для локальных
поисковых систем / В. Величко, П. Волошин, С. Свитла // “Knowledge – Dialogue – Solution” International Book
Series “INFORMATION SCIENCE & COMPUTING”, Number 15. – FOI ITHEA Sofia, Bulgaria. - 2009. – pp.24-31.
[Широков, 2005] Корпусна лінгвістика / В.А. Широков, О.В. Булгаков, Т.О. Грязнухіна та ін.. – К.: Довіра, 2005. – 471 с.
[Довгий, 2013] Комп’ютерні онтології та їх використання у навчальному процесі. Теорія і практика. : Монографія / С. О.
Довгий, В. Ю. Величко, Л. С. Глоба, О. Є. Стрижак та ін. – К. : Інститут обдарованої дитини, 2013. – 310 с.
[Стрижак, 2014] Онтологія задачі вибору та її застосування при аналізі лімнологічних систем [Текст] / [О.Є. Стрижак,
В.В. Горборуков, О.В. Франчук, М.А. Попова] // Екологічна безпека та природокористування: 3б. наук, праць / М-во
освіти і науки України, Київ. нац. ун-т буд-ва і архіт., НАН України, Ін-т телекомунікацій і гло-бал. інформ.
простору; редкол.: О.С. Волошкіна, О.М. Трофимчук (голов. ред.) [та ін.]. - К., 2014. - Вип. 15. – С. – 172-183.
[Гладун, 1994] Гладун В.П. Процессы формирования новых знаний [Текст] / В. П. Гладун. – София : СД «Педагог 6»,
1994. – 192 с.
[Саати, 1989] Саати Т. Принятие решений. Метод анализ иерархий: Пер. с англ. / Т. Саати.-М.: Радио и связь, 1989.316 с.
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
357
358
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
359
360
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
International Journal "Information Models and Analyses" Volume 3, Number 4, 2014
361
Информация об авторах
Величко Виталий Юрьевич – к.т.н., старший научный сотрудник, Институт
кибернетики
им. В. М. Глушкова
НАН
Украины,
Киев-187
ГСП,
03680,
просп. акад. Глушкова, 40; e-mail: [email protected]
Основные области научных исследований: индуктивный логический вывод, обработка
естественно-языковых текстов
Малахов Кирилл Сергеевич – младший научный сотрудник, Институт кибернетики
им. В. М. Глушкова НАН Украины, Киев-187 ГСП, 03680, просп. акад. Глушкова, 40; email: [email protected]
Основные области научных исследований: онтологический инжиниринг
Семенков Виталий Васильевич
аспирант, Луганський национальний университет
имени Тараса Шевченка
Основные области научных исследований: онтологический инжиниринг
Стрижак Александр Евгеньевич
к.т.н., старший научный сотрудник, Институт
телекоммуникаций и глобального информационного пространства НАН Украины,
Киев-186, 03186, Чоколовский бульвар, 13; e-mail: [email protected]
Основные области научных исследований:
корпоративные интеллектуальные
системы, поддержка принятия решений
Integrated Tools for Engineering Ontologies
Velychko V.Yu., Malahov K.S., Semenkov V.V., Strizhak A.E.
Abstract: The article presents an overview of current specialized ontology engineering tools, as well as texts’
annotation tools based on ontologies. The main functions and features of these tools, their advantages and
disadvantages are discussed. A systematic comparative analysis of means for engineering ontologies is
presented.
ACM Classification Keywords: I.2 ARTIFICIAL INTELLIGENCE - I.2.4 Knowledge Representation Formalisms
and Methods, H. Information Systems – H.2 DATABASE MANAGEMENT – H.2.4 Systems
| 2cs.AI
|
Anneaux à diviseurs et anneaux de Krull
(une approche constructive)
T. Coquand, H. Lombardi
arXiv:1507.02880v3 [math.AC] 13 Dec 2017
14 décembre 2017
paru dans Communications in Algebra, 44 : 515–567, 2016
Quelques typos dans la bibliographie ont été corrigés par rapport à la version publiée. Par
ailleurs on a mieux organisé les démonstrations de 1.19 et 1.20.
Keywords : Divisor theory, PvMD, Constructive mathematics, Krull domains
MSC 2010 : 13F05, 14C20, 06F15, 03F65
Résumé
Nous présentons dans cet article une approche constructive, dans le style de Bishop,
de la théorie des diviseurs et des anneaux de Krull. Nous accordons une place centrale
aux “anneaux à diviseurs”, appelés PvMD dans la littérature anglaise. Les résultats
classiques sont obtenus comme résultats d’algorithmes explicites sans faire appel aux
hypothèses de factorisation complète.
Abstract
We give give an elementary and constructive version of the theory of “Prüfer
v-Multiplication Domains” (which we call “anneaux à diviseurs” in the paper) and
Krull Domains. The main results of these theories are revisited from a constructive
point of view, following the Bishop style, and without assuming properties of complete
factorizations.
Introduction
Nous présentons dans cet article une approche constructive de la théorie des diviseurs.
L’excellent livre Divisor Theory [8] traite constructivement la clôture intégrale d’un
anneau factoriel dans une extension finie de son corps des fractions. Edwards suppose aussi
que l’anneau factoriel possède de bonnes propriétés pour la factorisation des polynômes.
Nous traitons ici de manière constructive un cas plus général dans lequel nous n’avons
aucune hypothèse de décomposition en facteurs irréductibles. L’exemple le plus important
en pratique reste celui des anneaux géométriques 1 intégralement clos. Et dans ce cas la
décomposition d’un diviseur en somme d’irréductibles n’est pas assurée constructivement.
Nous nous situons dans la suite du livre A Course in Constructive Algebra [18], où est
développée une théorie constructive des domaines de Dedekind (chapitre XII) indépendante
de la possibilité d’une décomposition des idéaux en produit d’idéaux maximaux. Comme cet
article est écrit dans le style des mathématiques constructives à la Bishop, nous donnerons la
version constructive précise que nous choisissons pour beaucoup de notions classiques, même
très bien connues.
1. Algèbres de présentation finie sur un corps discret
1
2
Anneaux à diviseurs et anneaux de Krull
Le (( tour de force )) qui est réalisé par l’adjonction de pgcds idéaux en théorie des nombres
peut-il être généralisé de manière significative ?
Oui, pour certains anneaux intégralement clos, que nous appelons les anneaux à diviseurs,
dénommés (( anneaux pseudo-prüfériens )) dans les exercices de Bourbaki, et (( Prüfer vmultiplication domains )) dans la littérature anglaise. Ils constituent une classe d’anneaux
suffisamment large pour lesquels on a une notion raisonnable de diviseurs, mais où l’on ne
réclame pas l’existence de diviseurs irréductibles.
La théorie correspondante en mathématiques classiques semble due principalement à
Lorenzen, Jaffard, Lucius et Aubert ([2, 15, 19, 20, 21]).
Un développement moderne récent de cette théorie se trouve dans [14].
Cette théorie généralise la théorie plus classique des anneaux dits de Krull, dans laquelle
on réclame une décomposition unique en facteurs premiers pour les diviseurs. Elle a été
élaborée notamment par Krull, Arnold (1929), van der Waerden (1929), Prüfer (1932) et
Clifford (1938) ([1, 6, 17, 24, 26]). Il semble aussi que l’approche de [4] ait eu une forte
influence sur les exposés ultérieurs de la théorie.
En pratique les anneaux à diviseurs sont au départ des anneaux à pgcd intègres ou des
domaines de Prüfer. Ensuite la classe des anneaux à diviseurs est stable par extensions
polynomiales ou entières et intégralement closes, ce qui donne les exemples usuels de la
littérature.
Voici un bref résumé de l’article.
Dans la section 1 nous donnons une version élémentaire et constructive des bases de la
théorie des anneaux à diviseurs. Nous donnons des caractérisations simples des anneaux à
diviseurs (théorèmes 1.5, 1.28 et 1.29). Nous démontrons qu’un anneau intègre cohérent est à
diviseurs si, et seulement si, il est intégralement clos (théorème 1.18). Nous démontrons que
les anneaux à diviseurs de dimension de Krull 6 1 sont les domaines de Prüfer de dimension
de Krull 6 1 (théorème 1.19). Nous donnons en 1.27 un principe local-global concret pour la
divisibilité, les anneaux intégralement clos et les anneaux à diviseurs.
Dans la section 2 nous abordons les questions de décomposition des diviseurs. Nous
expliquons notamment les groupes réticulés de dimension 1 et leurs propriétés de base.
Dans la section 3 nous donnons les propriétés de stabilité essentielles pour les anneaux à
diviseurs : localisation, anneaux de polynômes, clôture intégrale dans une extension algébrique
du corps de fractions.
Dans la section 4 nous donnons un traitement élémentaire et constructif des anneaux de
Krull (les anneaux dont les diviseurs forment un groupe réticulé à décomposition bornée).
Nous indiquons l’algorithme de décomposition partielle pour les familles finies de diviseurs,
nous démontrons un théorème d’approximation simultanée, le théorème (( un et demi )) pour
les anneaux de Krull, et le théorème caractérisant les anneaux de Krull qui ne possèdent
qu’un nombre fini de diviseurs irréductibles.
La question des diviseurs irréductibles est traitée pour l’essentiel dans les énoncés 1.13,
1.14, 1.15 et 1.23, puis précisée en 2.5, 2.11, 3.5, 4.12 et 4.13.
Nous terminons cette introduction par quelques explications concernant notre terminologie.
Dans la littérature anglaise nos (( anneaux à diviseurs )) sont généralement appelés des (( Prüfer
v-multiplication domain )), abrégé en PvMD. Ce n’est vraiment pas très élégant. Ils ont été
introduits en 1967 par M. Griffin dans [13] initialement sous le nom de v-multiplication rings.
Lucius les appelle des anneaux avec une théorie des pgcds de type fini dans [20]. Dans les
exercices de Bourbaki, Algèbre Commutative, Diviseurs, leur nom est anneau pseudo-prüferien.
Pour plus de renseignements sur la littérature existante voir [5, 9, 10, 11].
Nous aurions voulu appeler ces anneaux anneaux divisoriels. Mais dans la littérature
anglaise on trouve (( divisorial ring )) pour un anneau intègre dont tous les idéaux sont (( divisoriels )) au sens de Bourbaki, c’est-à-dire intersections d’idéaux fractionnaires principaux. Cette
T. Coquand, H. Lombardi
3
définition n’est pas pertinente d’un point de vue constructif, car il est impossible de montrer
constructivement que l’anneau Z la satisfait 2 . Néanmoins, nous avons considéré que le terme
(( anneau divisoriel )), que nous convoitions, était déjà pris, et nous nous sommes rabattus
sur le moins élégant (( anneau à diviseurs )).
Signalons aussi que nous introduisons la notion purement multiplicative de liste divisoriellement inversible page 4 dans la section 1. La notion associée d’idéal divisoriellement inversible
dans un anneau intègre coı̈ncide avec celle d’idéal t-inversible, définie dans la littérature sur
les PvMD. Nous pensons cependant que la terminologie divisoriellement inversible est plus
parlante.
Enfin nous définissons page 18 l’anneau de Nagata divisoriel Bdiv (X) d’un anneau
commutatif arbitraire B. Dans le cas d’un anneau intègre, il est appelé dans la littérature
l’anneau de Nagata pour la star opération v, et il est noté Na(B, v)(X).
1
Anneaux à diviseurs
Dans tout l’article, A est un anneau intègre, de corps de fractions K, et l’on note
A∗ = Reg A (le monoı̈de des éléments réguliers) et A× le groupe des unités.
Nous définissons un anneau intègre comme un anneau qui satisfait l’axiome (( tout élément
est nul ou régulier )). Nous n’excluons donc pas a priori le cas de l’anneau trivial. Dans ce
cas A∗ = A et l’anneau total des fractions K est également trivial. Pour qualifier un élément
de A∗ , nous parlerons donc plutôt d’élément régulier que d’élément non nul.
Notez que l’anneau K vérifie l’axiome (( tout élément est nul ou inversible )), que A soit
trivial ou non.
Dans la suite, nous parlerons de A∗/A× comme du monoı̈de de divisibilité de A, et de
K /A× comme du groupe de divisibilité de A. Le premier est vu avec sa structure ordonnée
de monoı̈de positif 3 et le second, isomorphe au symétrisé du premier, est vu comme un
groupe ordonné (ses éléments > 0 sont les classes des éléments de A∗ ).
Nous désignons par GrA (a1 , . . . , an ) la profondeur de a = ha1 , . . . , an i, (abréviation pour
la profondeur du A-module A relativement à l’idéal a). Pour cet article nous suffira de
rappeler les définitions suivantes : une liste (a) = (a1 , . . . , an ) est dite de profondeur > 1 si
les égalités a1 x = . . . = an x = 0 impliquent x = 0. La liste (a) est dite de profondeur > 2 si
en outre, toute liste (x1 , . . . , xn ) proportionnelle (i.e. ai xj = aj xi pour tous i, j) est multiple
de (a) (i.e. il existe x tel que xj = xaj pour tout j). Ces propriétés sont attachées à l’idéal a :
on peut changer de système générateur pour l’idéal.
Rappelons aussi les résultats classiques suivants (nous les utilisons pour k = 1 ou 2) :
si Gr(a) > k et Gr(b) > k alors Gr(ab) > k ; si Gr(a) > k et a ⊆ b alors Gr(b) > k ; si
m
Gr(a1 , . . . , an ) > k alors pour tout m, Gr(am
1 , . . . , an ) > k.
∗
Pgcd fort, ppcm et profondeur > 2
On sait que dans un anneau intègre, deux éléments qui admettent un pgcd n’admettent
pas nécessairement un ppcm, bien que la réciproque soit valable. Voici des précisions sur ce
sujet.
Proposition et définition 1.1 (Pgcd fort, ppcm et profondeur > 2)
Soient A un anneau intègre, et a1 , . . ., an , b, g ∈ A∗ .
2. Une mésaventure analogue arrive avec la définition usuelle de la noethérianité : tout idéal est de type
fini.
3. On définit un monoı̈de positif comme un monoı̈de commutatif simplifiable (M, +, 0) pour lequel est
satisfaite l’implication x + y = 0 =⇒ x = y = 0. Le monoı̈de M peut alors être vu comme la partie positive
d’un groupe ordonné G (en tant que groupe, G est le symétrisé de M .)
4
Anneaux à diviseurs et anneaux de Krull
1. On dit que la famille (ai ) admet l’élément g comme pgcd fort si sont satisfaites les
conditions équivalentes suivantes.
(a) L’élément g vu dans K∗/A× est le pgcd (la borne inférieure) de la liste (a1 , . . . , an ).
(b) Pour tout x ∈ A∗ l’élément xg est un pgcd dans A de (xa1 , . . . , xan ).
∗
(c) Étant donné un multiple commun
Tn a ades ai dans A , l’élément a/g est un ppcm
a
des a/ai (autrement dit g A = i=1 ai A)
(d) (Formulation avec des idéaux fractionnaires
Tn dans K) L’élément 1/g est un ppcm
des 1/ai dans K, autrement dit g1 A = i=1 a1i A.
2. Si g est le pgcd fort de (a1 , . . . , an ), c’est aussi le pgcd fort de n’importe quel autre
système générateur de l’idéal a = ha1 , . . . , an i. On dira donc que g est le pgcd fort de
l’idéal de type fini a.
3. Si g est le pgcd fort de (a1 , . . . , an ), bg est le pgcd fort de (ba1 , . . . , ban ).
4. On a Gr(a1 , . . . , an ) > 2 si, et seulement si, 1 est pgcd fort de (a1 , . . . , an ).
Démonstration. La démonstration est laissée au lecteur.
Naturellement, un pgcd fort est un pgcd.
2
Remarque. Soit A un anneau intègre de corps de fractions K. Pour deux sous-A-modules
non nuls a et b ⊆ K, on note (a : b)K = { x ∈ K | xb ⊆ a } . Dans la terminologie des staropérations, on note a−1 = (A : a)K . Alors a 7→ (a−1 )−1 est une star-opération, généralement
appelée v-opération, et av = (a−1 )−1 est l’intersection des idéaux fractionnaires principaux
(non nuls) qui contiennent a.
Avec ces notations, les propriétés équivalentes du point 1 ci-dessus sont aussi équivalentes
−1 −1
−1
à ha1 , . . . , an i = g1 ou à ha1 , . . . , an i
= hgi. Lorsque l’anneau est cohérent et a, b
−1 −1
de type fini comme A-modules, (a : b)K et (a ) sont de type fini.
Idéaux divisoriellement inversibles
Définition 1.2 Une liste (a) = (a1 , . . . , an ) dans A∗ est dite divisoriellement inversible si
l’on a une liste (b) = (b1 , . . . , bm ) dans A∗ telle que la famille (ai bj )i∈J1..nK,j∈J1..mK admet un
pgcd fort g dans A∗ .
Les deux listes (a) et (b) sont dites inverses divisorielles l’une de l’autre.
Exemples.
1) Dans un anneau à pgcd, les pgcds sont forts et toute famille finie admet la liste (1) comme
inverse divisorielle.
2) Si ha1 , . . . , an i hb1 , . . . , bm i = hgi avec g ∈ A∗ , la liste (a) admet la liste (b) comme inverse
divisorielle et g est le pgcd fort des ai bj .
En notant a = hai et b = hbi, cette propriété des listes (a) et (b) ne dépend que de
l’idéal ab. Et donc la propriété pour la liste (a) d’être divisoriellement inversible ne dépend
que de l’idéal de type fini a = hai. Ceci introduit une nouvelle définition.
Définition 1.3 Soit A un anneau intègre.
— Un idéal de type fini a de A est dit divisoriellement inversible s’il existe un idéal de
type fini b tel que ab admette un pgcd fort. On dit aussi que l’idéal de type fini a et
l’idéal de type fini b sont inverses divisoriels l’un de l’autre.
— L’anneau A est appelé un anneau à diviseurs si tout idéal de type fini non nul est
divisoriellement inversible.
T. Coquand, H. Lombardi
5
Notez que l’inverse divisoriel d’un idéal de type fini, s’il existe, n’est en aucun cas unique.
Il s’agit un peu du même flottement que lorsque l’on parle de l’inverse d’un idéal de type fini
dans un anneau de Prüfer. Mais ici, ce sera encore plus flottant, car deux inverses divisoriels
d’un même idéal de type fini sont rarement isomorphes comme A-modules. Par exemple
dans un anneau à diviseurs si Gr(c) > 2 et si ab admet un pgcd fort g, alors a(bc) admet le
même pgcd fort. Mais si A n’est pas un anneau de Prüfer, en général, b et bc ne sont pas des
A-modules isomorphes.
Remarque. La notion de liste divisoriellement inversible est une notion purement multiplicative
qui peut être définie pour un anneau commutatif arbitraire en utilisant la caractérisation
dans le point 4. de la proposition 1.1. La notion associée d’idéal divisoriellement inversible
dans un anneau intègre coı̈ncide avec celle d’idéal t-inversible, définie dans la littérature sur
les PvMD. Nous pensons cependant que la terminologie divisoriellement inversible est plus
parlante.
Lemme 1.4 Soit (a1 , . . . , an ) une liste divisoriellement inversible dans A∗ et x régulier dans
l’idéal ha1 , . . . , an i.
1. On peut trouver une liste (c1 , . . . , cq ) = (c) tel que x soit le pgcd fort des ai ck .
2. Si l’anneau A est cohérent, on peut prendre pour (c1 , . . . , cq ) un système générateur
de l’idéal transporteur (hxi : a)A .
Démonstration. 1. Considérons une liste (b1 , . . . , bm ) pour laquelle les ai bj admettent un
pgcd fort g. Dans K∗/A× , g est le pgcd de la famille (ai bj )i,j , donc x = xg g est le pgcd de
xai bj
a b
la famille
. Comme les ig j sont dans A et x est combinaison linéaire des ai , on
g
i,j
a
xbj
g
∈ A et on peut prendre pour (c) la liste des
xbj
g .
2. Lorsque A est cohérent, le transporteur c0 = (hxi : a)A est un idéal de type fini qui contient
xb
l’idéal c = g j , j ∈ J1..mK construit au point 1. On doit vérifier que ac0 admet aussi x pour
pgcd fort. Et puisque ac ⊆ ac0 il suffit que x divise tous les générateurs de ac0 , ce qui est clair.
2
Un projet pour le groupe des diviseurs d’un anneau intègre
Comme nous l’avons déjà souligné, du point de vue algorithmique la factorisation totale
n’est pas une propriété (( facile )), et nous sommes surtout intéressés par le fait d’avoir un
bon groupe réticulé construit de manière raisonnable à partir du monoı̈de positif A∗/A× (ou
du groupe ordonné K∗/A× ).
Une manière d’expliquer ce que l’on veut réaliser est de décrire formellement les propriétés
du groupe des diviseurs de A, que nous noterons Div A, et de l’application divA de A∗
dans (Div A)+ , qui à tout élément de A∗ associe le diviseur principal (positif ou nul) qu’il
définit. Nous utilisons une notation additive pour le groupe Div A. Nous nous inspirons ici
de la présentation de la théorie des diviseurs donnée dans le livre [4] consacré à la théorie
des nombres.
Mais comme le suggère [2, Aubert], nous ne mentionnerons ici que la structure multiplicative de A∗ : l’addition dans A ne doit pas intervenir ici ! Voir cependant la proposition 1.8.
Projet divisoriel 1. Les propriétés requises pour divA : A∗ → (Div A)+ sont les suivantes.
D1 Div A est un groupe réticulé et divA un morphisme de monoı̈des :
divA (1) = 0,
divA (ab) = divA (a) + divA (b).
D2 Pour tous a, b ∈ A∗ , divA (a) 6 divA (b) ⇐⇒ a | b.
6
Anneaux à diviseurs et anneaux de Krull
D3 Tout élément de (Div A)+ est la borne inférieure dans Div A d’une famille finie
d’éléments de divA (A∗ ).
On peut écrire ce projet sous la forme équivalente suivante, en demandant de traiter tous
les diviseurs principaux, y compris ceux qui proviennent de K∗ .
Projet divisoriel 2. Les propriétés requises pour divA : K∗ → Div A sont les suivantes.
D01 Div A est un groupe réticulé et divA passe au quotient K∗/A× en donnant un morphisme de groupes ordonnés.
∀x, y ∈ K∗ : divA (xy) = divA (x) + divA (y),
divA (1) = 0, ∀a ∈ A∗ : divA (a) > 0.
D02 Pour tout x ∈ K∗ , divA (x) > 0 ⇐⇒ x ∈ A.
D03 Tout élément de Div A est la borne inférieure dans Div A d’une famille finie d’éléments
de divA (K∗ ).
Dans la suite nous utiliserons parfois (( div )) au lieu de (( divA )) lorsque le contexte sera
clair.
Remarque. La condition D3 implique la propriété qu’un élément de (Div A)+ est égal à la
borne inférieure dans Div A de tous les éléments de div(A∗ ) qui le majorent. Nous utiliserons
souvent cette propriété par la suite.
Mais naturellement la condition D3 est a priori plus forte.
Dans [4] c’est une propriété encore plus faible qui est énoncée : deux éléments de (Div A)+
qui ont les mêmes majorants dans div(A∗ ) sont égaux. Par contre ces auteurs introduisent
deux conditions supplémentaires.
D’une part ils demandent que divA (a + b) > divA (a) ∧ divA (b) (propriété non multiplicative).
D’autre part ils demandent à Div A d’être un groupe réticulé à décomposition complète.
Convention. Il peut être pratique de rajouter 4 un élément +∞ à Div A en posant div(0) = +∞, +∞ > δ et δ + ∞ = ∞ + δ = +∞ pour tout δ ∈ Div A ∪ {+∞} .
Alors les propriétés décrites dans le Projet divisoriel restent valables en acceptant 0 là où on
le refusait. Cette convention présente deux intérêts. Premièrement, (Div A)+ ∪ {+∞} est
un treillis distributif 5 . Deuxièmement, cela permet de traiter de manière plus uniforme les
espaces spectraux implicitement présents dans la théorie.
Le théorème de base
Théorème et définition 1.5 (Anneaux à diviseurs)
Pour que le projet divisoriel puisse être réalisé pour l’anneau A il faut et suffit que A soit
un anneau à diviseurs (toute famille finie non vide de A∗ est divisoriellement inversible).
Dans ce cas le couple (divA , Div A) est unique à isomorphisme unique près.
— On dit alors que A est un anneau à diviseurs avec divA : K∗ → Div A pour théorie
des diviseurs.
— On note alors divA (a1 , . . . , an ) pour divA (a1 ) ∧ · · · ∧ divA (an ).
— Un élément α ∈ Div A est appelé un diviseur principal s’il est de la forme div(x) pour
un x ∈ K∗ .
4. Lorsque A 6= 0 les conditions requises sont satisfaites avec +∞ > Div A. Par contre si A = 0, on ne
rajoute rien du tout, car div(0) = div(1).
5. Lorsque A 6= 0, il manque juste l’élément maximum dans (Div A)+ pour en faire un treillis distributif.
T. Coquand, H. Lombardi
7
Démonstration. Nous laissons à la lectrice le soin de vérifier que les deux projets divisoriels
sont équivalents.
Supposons le projet divisoriel réalisé et montrons que toute liste (a1 , . . . , an ) dans A∗ est
divisoriellement inversible. On note divA (a1 , . . . , an ) pour divA (a1 ) ∧ · · · ∧ divA (an ). On a
nécessairement par distributivité
divA (a1 , . . . , an ) + divA (c1 , . . . , cq ) = divA (ai cj )i∈J1..nK,j∈J1..qK .
et trivialement divA (a1 , . . . , an ) ∧ divA (c1 , . . . , cq ) = divA (a1 , . . . , an , c1 , . . . , cq ).
On a divA (a1 ) > divA (a1 , . . . , an ) de sorte que l’on peut écrire (en vertu de D3 )
divA (a1 ) − divA (a1 , . . . , an ) = divA (c1 , . . . , cq )
pour une famille finie (c1 , . . . , cq ) = (c) dans A∗ . L’égalité
divA (a1 ) = divA (a) + divA (c) = divA (ai cj )i∈J1..nK,j∈J1..qK
nous dit que divA (a1 ) est la borne inférieure de la famille divA (ai cj ) i,j dans Div A. Et
vu D02 , cela implique que a1 est la borne inférieure de la famille (ai cj )i,j dans K∗/A× . Ce
qui signifie que a1 est pgcd fort des ai cj dans A∗ . Ainsi la condition que toute famille finie
soit divisoriellement inversible est bien satisfaite.
Voyons maintenant la question de l’unicité.
Les éléments de Div A s’écrivent tous nécessairement sous forme divA (a) − divA (b) pour
deux listes finies (a) = (a1 , . . . , an ) et (b) = (b1 , . . . , bm ) dans A∗ . On peut même demander
que divA (a, b) = 0, autrement dit que 1 soit pgcd fort des ai et bj dans A∗ .
Pour que l’unicité de la solution du projet divisoriel soit acquise, il suffit de voir qu’on n’a
pas le choix pour décider une égalité
divA (a) − divA (b) = divA (c) − divA (d)
pour des listes finies (a), (b), (c), (d) de A∗ . Cela revient à divA (a) + divA (d) = divA (b) +
divA (c).
De manière plus générale on donne une propriété caractéristique pour une égalité
divA (a1 , . . . , an ) = divA (b1 , . . . , bm ).
Ici, on peut avancer l’un des deux arguments suivants, au choix.
Premier argument.
Si (c1 , . . . , cq ) est une famille inverse divisorielle de (a1 , . . . , an ) avec g pgcd fort des (ai cj ),
l’égalité divA (a) = divA (b) équivaut au fait que g est pgcd fort des (bk cj ).
Deuxième argument.
On donne une propriété caractéristique pour une inégalité divA (a) 6 divA (b). C’est la
propriété suivante.
— Dans K∗ , b est multiple de tous les diviseurs communs à (a1 , . . . , an ). (∗)
En effet, puisqu’on doit avoir divA (1/x) = − divA (x) en raison de D01 , la condition D03 est
équivalente à sa formulation duale : tout élément de Div A est la borne supérieure dans
Div A d’une famille finie d’éléments de divA (K∗ ), et a fortiori il est la borne supérieure de
l’ensemble des divA (x) qu’il majore.
En particulier
divA (b) > α = divA (a) ⇐⇒ divA (b) majore Mα = { divA (x) | x ∈ K∗ , divA (x) 6 α } .
Et Mα est égal à { divA (x) | x ∈ K∗ , &i x | ai }. Et vu D2 , divA (b) > α signifie exactement
que dans K∗ , b est multiple des diviseurs communs à la liste (a).
Supposons maintenant la condition d’existence des inverses divisoriels satisfaite et montrons
que l’on peut construire Div A et divA conformément au projet divisoriel.
Pour cela on munit l’ensemble Lst(A)∗ (ensemble des listes finies non vides d’éléments de A∗ )
de la relation de préordre 4 directement inspirée de la condition (∗) précédente :
(a1 , . . . , an ) 4 (b1 , . . . , bm )
def
⇐⇒
chaque bj est multiple des diviseurs communs à (a).
8
Anneaux à diviseurs et anneaux de Krull
On définit (Div A)+ comme l’ensemble ordonné correspondant (où α = β ⇔ α 4 β et β 4 α).
On vérifie alors que l’on peut définir une addition sur (Div A)+ en posant
def
(a) + (b) = (ai bj )i,j .
En d’autres termes cette loi a priori mal définie (( passe au quotient )). On vérifie ensuite que
l’on obtient par symétrisation un groupe réticulé Div A convenable. Les détails sont laissés
au lecteur.
2
Le résultat dans le lemme qui suit est donné page 388 dans [27, Zafrullah, 2006] : il faut
lire (( PvMD )) au lieu de (( anneau à diviseurs )) et (( t-inversible )) au lieu de (( divisoriellement
inversible )).
Lemme 1.6 Un anneau intègre dans lequel tout idéal fidèle à deux générateurs est divisoriellement inversible est un anneau à diviseurs.
Démonstration. On utilise l’astuce de Dedekind. Pour 3 idéaux arbitraires a, b, c dans un
anneau on a toujours l’égalité
(a + b)(b + c)(c + a) = (a + b + c)(ab + bc + ac).
En outre un produit d’idéaux divisoriellement inversibles est divisoriellement inversible. Donc
si a + b, b + c et a + c sont divisoriellement inversibles, il en va de même pour a + b + c. Cela
permet de passer des idéaux à deux générateur aux idéaux à trois générateurs, puis de proche
en proche à un nombre quelconque de générateurs.
2
Exemples. On a deux exemples fondamentaux, à partir desquels seront construits la plupart
des autres exemples intéresssants en pratique.
1) Un anneau intègre à pgcd A est à diviseurs et l’on a
(Div A, +, 0, 6) ' (K∗ /A× , · , 1, | ).
En outre un inverse divisoriel de n’importe quel idéal de type fini est h1i.
Un anneau à diviseurs dont tous les diviseurs sont principaux est un anneau à pgcd.
2) Un domaine de Prüfer est un anneau à diviseurs et l’on a
(Div A, +, 0, 6, ∧) ' (Gfr(A), · , h1i , ⊇, +).
(rappelons que Gfr(B) désigne en général le groupe des idéaux fractionnaires inversibles
de B : pour un domaine de Prüfer ce sont tous les idéaux fractionnaires de type fini fidèles).
En outre un idéal de type fini fidèle 6 admet un inverse (au sens des idéaux inversibles) qui
est aussi un inverse divisoriel.
3) On donne souvent comme premier
√ exemple d’un anneau de Prüfer qui n’est pas un anneau
de Bezout l’anneau Z[α] où α = −5 dans lequel on a 2 × 3 = (1 + α)(1 − α) avec les 4
éléments irréductibles. Le mystère de la décomposition unique en facteurs premiers est alors
éclairci par les décompositions en produits d’idéaux premiers données par les égalités
h2i = h2, 1 + αi
2
,
h3i = h3, 1 + αi h3, 1 − αi ,
h1 + αi = h2, 1 + αi h3, 1 + αi et h1 − αi = h2, 1 + αi h3, 1 − αi .
avec les trois idéaux h2, 1 + αi, h3, 1 + αi, h3, 1 − αi irréductibles distincts.
Voici un exemple du même style avec un anneau à diviseurs qui n’est ni un anneau à pgcd ni
un domaine de Prüfer. On considère un corps discret k et l’on définit
A = k[A, B, C, D]/hAD − BCi = k[a, b, c, d].
Il s’agit d’un anneau intègre dans lequel a, b, c, d sont des éléments irréductibles. En effet
l’anneau quotient A reste gradué et a, b, c, d sont de degré 1. La suite (a, d) est régulière et
6. Si A est un anneau intègre non trivial, un idéal de type fini est fidèle si, et seulement si, il est non nul.
T. Coquand, H. Lombardi
9
les localisés en a et d sont des anneaux à pgcd. Par exemple A[ a1 ] ' k[A, B, C, 1/A]. Donc A
est un anneau à diviseurs (principe local-global 1.27). En outre divA (a, d) = 0 car l’égalité a
lieu dans les deux localisés (principe local-global 1.27).
On vérifie que hb, ai hb, di = hbi ha, b, c, di, donc divA (b, a) + divA (b, d) = divA (b) car
div(a, b, c, d) = 0.
Donc l’égalité ad = bc sans décomposition unique apparente en facteurs premiers s’explique
par les décompositions en sommes de diviseurs deux à deux orthogonaux dans Div A données
par les égalités
divA (a) = divA (a, b) + divA (a, c)
,
divA (d) = divA (d, b) + divA (d, c) ,
divA (b) = divA (a, b) + divA (d, b)
et
divA (c) = divA (a, c) + divA (d, c).
Notons qu’il est un peu plus délicat de certifier que les quatre diviseurs divA (a, b), divA (a, c),
divA (d, b) et divA (d, c) sont irréductibles. Voir à ce sujet la poursuite de cet exemple pages
11 et 13.
Enfin l’élément a est irréductible mais il n’est pas premier car A/hai ' k[B, C, D]/hBCi.
Donc A n’est pas un anneau à pgcd 7 .
Et l’anneau A n’est pas non plus un domaine de Prüfer car l’égalité divA (a, d) = 0 impliquerait
ha, di = h1i, ce qui n’est pas le cas 8 .
Proposition 1.7 Lorsque A est un anneau à diviseurs avec divA : K∗ → Div A comme
théorie des diviseurs, on a les propriétés suivantes.
1. Pour b, a1 , . . ., an dans A∗ ,
(a) divA (b) 6 divA (a1 , . . . , an ) si, et seulement si, b divise les ai dans A∗ ,
(b) divA (b) > divA (a1 , . . . , an ) si, et seulement si, b est multiple de tous les diviseurs
communs à (a1 , . . . , an ) dans K∗ ,
(c) divA (b) = divA (a1 , . . . , an ) si, et seulement si, b est pgcd fort de (a1 , . . . , an ).
2. Soit α un élément arbitraire de Div A.
(a) α est la borne inférieure d’une famille finie de diviseurs principaux (en conséquence
il est la borne inférieure des diviseurs principaux qu’il minore).
(b) α est la borne supérieure d’une famille finie de diviseurs principaux (en conséquence
il est la borne supérieure des diviseurs principaux qu’il majore).
(c) On peut écrire α sous la forme divA (a) − divA (b) pour deux listes finies (a) et (b)
dans A∗ avec divA (a, b) = 0 (autrement dit 1 est pgcd fort des ai et bj dans A∗ ).
3. On considère deux listes (x) = (x1 , . . . , xn ) et (y) = (y1 , . . . , ym ) dans K∗
V
V
(a) On a l’égalité i divA (xi ) = j divA (yj ) si, et seulement si, (x) et (y) ont les
mêmes diviseurs communs dans K∗ .
W
W
(b) On a l’égalité i divA (xi ) = j divA (yj ) si, et seulement si, (x) et (y) ont les
mêmes multiples communs dans K∗ .
Démonstration. Tout ceci résulte des considérations développées dans la démonstration du
théorème 1.5.
2
On a alors comme corollaire une propriété faisant intervenir (enfin) la structure additive
de l’anneau.
7. Autre argument : le couple (a, b) a pour pgcd 1, mais ce n’est pas un pgcd fort car ad est multiple de a
et b sans être multiple de ab (sinon d serait multiple de b).
8. Un argument plus savant : A étant noethérien cohérent, il serait de dimension 6 1 (théorème XII-7.8
dans [18]), or il contient la suite régulière (a, d, b + c).
10
Anneaux à diviseurs et anneaux de Krull
Proposition et définition 1.8 On suppose que A est un anneau à diviseurs.
1. Pour tous a, b ∈ A∗ on a divA (a) ∧ divA (b) 6 divA (a + b).
2. Pour a1 , . . ., an ∈ A et a ∈ ha1 , . . . , an i, on a
divA (a1 ) ∧ . . . ∧ divA (an ) 6 divA (a).
V
En notant a = ha1 , . . . , an i on voit que le diviseur α = i divA (ai ) ne dépend que de
a. On note donc α = divA (a) = divA (a1 , . . . , an ).
On dit que α est le diviseur de l’idéal de type fini a.
3. Pour deux idéaux de type fini a et b de A on a alors
b ⊇ a ⇒ divA (b) 6 divA (a)
et
divA (ab) = divA (a) + divA (b).
Démonstration. 1. En effet les diviseurs communs à (a, b) dans K∗/A× sont les mêmes que
les diviseurs communs à (a, b, a + b).
Vu la proposition 1.7 on a donc div(a) ∧ div(b) = div(a) ∧ div(b) ∧ div(a + b).
2. Même chose.
2
3. Par distributivité dans le groupe réticulé Div A.
On peut généraliser la proposition 1.8 aux idéaux fractionnaires de type fini de A. On a
alors les implications suivantes (x ∈ K, x, y idéaux fractionnaires de type fini ⊆ K) :
x ∈ x =⇒ divA (x) 6 divA (x),
x⊇y
=⇒ divA (x) 6 divA (y).
Notez que pour x = hx1 , . . . , xn i l’inégalité divA (x) 6 divA (x) signifie que
divA (x1 , . . . , xn ) = divA (x1 , . . . , xn , x) i.e. divA (x) = divA (x + hxi).
Cela signifie aussi que tout y ∈ K qui divise les xi divise x( 9 ).
Exprimer un diviseur comme borne supérieure de diviseurs principaux
Proposition et notation 1.9 Soit A un anneau à diviseurs.
1. Un diviseur > 0 s’écrit α = div(a) pour un idéal de type fini a. Pour exprimer α
comme borne supérieure de diviseurs principaux on considère un inverse divisoriel
b = hb1 , . . . , bm i de l’idéal a. On a donc α + β = div(g) (β = div(b)) pour un g ∈ A∗ .
D’où finalement
Wm
Wm
α = j=1 div( bgj ) = j=1 div(aj ) pour des aj ∈ K∗ .
2. De la même manière, un élément arbitraire de Div A peut s’écrire sous forme α−div(b)
pour un α ∈ (Div A)+ et un b ∈ A∗ . Il s’écrit donc explicitement comme une borne
supérieure finie de diviseurs principaux.
Wm
3. Si α ∈ Div A s’écrit j=1 div(aj ), on a pour x ∈ K :
T
divA (x) > α ⇐⇒ x ∈ i ai A.
On note IdvA (α) ou Idv(α) cet idéal fractionnaire
T
Idv(α) = { x ∈ K | divA (x) > α } = i ai A.
Pq
Enfin pour un idéal fractionnaire c = i=1 ci A, on note de manière abrégée Idv(c)
ou Idv(c1 , . . . , cq ) au lieu de Idv div(c) .
9. Pour x et les xi dans A c’est une condition du type (( pgcd fort )) : pour tout z ∈ A et c ∈ A∗ , si z
divise les cxi , alors z divise cx.
T. Coquand, H. Lombardi
11
4. Pour α et γ ∈ Div A on a α 6 γ si, et seulement si, Idv(α) ⊇ Idv(γ) dans K.
En particulier α = γ si, et seulement si, Idv(α) = Idv(γ).
T
5. Dans le cas de figure du point 1., on a Idv(α) = A ∩ j bgj A = (g : b)A .
T
Pm
6. Si Idv(α) = i ai A = h=1 ch A, alors α = divA (c1 , . . . , cm ).
Ainsi lorsque A est cohérent, l’idéal fractionnaire Idv(α) est de type fini pour tout
diviseur α.
Démonstration. 1 et 2. Clair.
3. De manière générale un diviseur est borne inférieure des diviseurs principaux qui le
majorent. Or dire que divA (x) majore
les divA (aj ), autrement dit qu’il majore leur borne
T
supérieure α, c’est dire que x ∈ i ai A.
4 et 5. Clair d’après 3.
6. Posons
γ = divA (c1 , . . . , cm ). Un diviseur principal divA (x) majore α si, et seulement si,
T
x ∈ i ai A. Ainsi γ > α, et par ailleurs tout diviseur principal qui majore α majore γ.
Donc γ = α car ils sont majorés par les mêmes diviseurs principaux.
2
Exemple. Avec l’exemple 3) page 8, puisque divA (a, b) + divA (a, c) = divA (a), le point 5 cidessus nous donne l’égalité IdvA (a, b) = (a : c)A . Un calcul montre alors que (a : c)A = ha, bi.
Et par suite ha, bi = IdvA (a, b).
En général pour un idéal fractionnaire c = hc1 , . . . , cq i on peut avoir une inclusion stricte
c ( Idv(c) (c’est le cas si c ( Icl(c)). Lorsque l’anneau est cohérent, les intersections finies
d’idéaux fractionnaires principaux sont des idéaux fractionnaires de type fini qui ont donc
un statut particulier.
Remarques. 1) Pour un idéal fractionnaire non nul de type fini a de l’anneau à diviseurs A on
a Idv(a) = (a−1 )−1 , qui est l’intersection des idéaux fractionnaires principaux contenant a.
2) Tout diviseur étant borne supérieure d’une famille finie de diviseurs principaux, on
pourrait choisir de représenter les diviseurs par les intersections finies d’idéaux fractionnaires
principaux comme (( forme canonique )). L’avantage est alors que α = β si, et seulement
si, Idv(α) = Idv(β). Notons que cependant dans l’exemple précédent : divA (a, b) est > 0
mais il ne peut s’écrire comme borne supérieure d’éléments divA (xi ) pour des xi ∈ A car
tout diviseur commun de a et b dans A est une unité.
La proposition 1.9 justifie la définition suivante, et donne le corollaire qui la suit.
Définition et notation 1.10
Soit A un anneau et K = Frac A son anneau total de fractions.
— On appelle idéal divisoriel fini de A une intersection finie d’idéaux fractionnaires
principaux fidèles dans K (i.e., de la forme xA pour un x ∈ K∗ ). Si A est un anneau
à diviseurs, un idéal divisoriel fini est n’importe quel idéal fractionnaire de la forme
Idv(α) pour un α ∈ Div A.
— On note Idif(A) l’ensemble des idéaux divisoriels finis de A.
— Pour un idéal fractionnaire a qui n’est pas supposé de type fini, on définit Idv(a)
comme l’intersection des idéaux fractionnaires principaux fidèles qui contiennent a.
En outre, dans le cas d’un anneau à diviseurs, on écrit div(a) = α si Idv(a) = Idv(α).
Ceci revient à dire que a ⊆ Idv(α) et que α = div(b) pour un idéal fractionnaire de
type fini b ⊆ Idv(a).
NB. Un idéal divisoriel fini n’est pas nécessairement un idéal fractionnaire de type fini, mais
c’est le cas lorsque A est cohérent. Par ailleurs, div(a) = 0 signifie que a contient une suite
de profondeur > 2.
12
Anneaux à diviseurs et anneaux de Krull
Corollaire 1.11 Pour un anneau à diviseurs, les applications
T
W
Idif(A) −→ Div A ,
i xi A 7−→
i divA (xi ) et
Div A −→ Idif(A) ,
α 7−→ Idv(α)
sont des bijections réciproques bien définies.
Quand le groupe des diviseurs est-il discret ?
Un groupe réticulé G est dit discret si la relation d’ordre α 6 β est décidable 10 . Pour cela il
faut et suffit que l’égalité γ = 0 pour un γ ∈ G+ soit décidable, car α 6 β ⇐⇒ α−(α∧β) = 0.
Pour le groupe réticulé Div A, cela veut dire que l’on sait tester si une liste finie (a1 , . . . , an )
dans A∗ admet 1 comme pgcd fort.
En fait savoir tester si divA (x) 6 divA (y) pour x et y ∈ K∗ revient à savoir tester
la divisibilité dans A∗ , et cela va suffire. En effet, pour un anneau à diviseurs
A, on
Wn
peut tester
(
(
α
6
β
?
)
)
pour
α
et
β
dans
Div
A
comme
suit.
On
écrit
α
=
div
A (xi )
i=1
Vm
et β = j=1 divA (yj ) pour des xi et yj ∈ K∗ .
On doit donc tester divA (xi ) 6 divA (yj ) pour chaque couple (i, j). D’où le résultat.
Lemme 1.12 Pour un anneau à diviseurs A les propriétés suivantes sont équivalentes.
1. Le groupe Div A est discret.
2. La divisibilité dans A∗ est décidable (autrement dit A est une partie détachable de
K). On dit aussi dans ce cas que A est un anneau à divisibilité explicite.
C’est le cas lorsque A est fortement discret.
Diviseurs irréductibles
Rappelons qu’un élément π > 0 d’un groupe réticulé G est dit irréductible si toute égalité
π = η + ζ dans G+ implique η = 0 ou ζ = 0. Par ailleurs le (( lemme de Gauss )) dit que
(ξ ⊥ η et ξ 6 η + ζ) =⇒ ξ 6 ζ.
On en déduit le (( lemme d’Euclide )), qui pour un élément irréductible π et deux éléments η
et ζ ∈ G+ , donne, si G est discret, l’implication,
π 6 η + ζ =⇒ π 6 η ou π 6 ζ
En langage de divisibilité on dirait (( tout élément irréductible est premier )).
Comme dans [ACMC], nous appelons (( idéal premier )) tout idéal qui donne par passage au
quotient un anneau sans diviseur de zéro, c’est-à-dire vérifiant xy = 0 ⇒ (x = 0 ou y = 0).
En particulier l’idéal h1i est premier.
On obtient pour les diviseurs irréductibles les deux théorèmes importants suivants.
Théorème 1.13 Dans un anneau à diviseurs à divisibilité explicite, un diviseur α > 0 est
irréductible si, et seulement si, Idv(α) est un idéal premier.
On obtient donc une bijection entre les ensembles suivants.
— Les diviseurs irréductibles.
— Les idéaux divisoriels finis premiers 6= h1i.
10. En mathématiques constructives, la notion de construction (et donc celle de décidabilité) est une notion
primitive qui n’est pas susceptible d’une définition en termes de machines de Turing. Voir [7].
T. Coquand, H. Lombardi
13
Démonstration. Supposons α irréductible et montrons que Idv(α) est un idéal premier. Si
xy ∈ Idv(α), on a div(x) + div(y) > α, donc div(x) > α ou div(y) > α (car α est (( premier ))),
c’est-à-dire x ∈ Idv(α) ou y ∈ Idv(α).
Supposons Idv(α) premier et α 6 β + γ avec
β = div(b1 , . . . , bn ) > 0 et γ = div(c1 , . . . , cq ) > 0.
On montre que α 6 β ou α 6 γ. Ainsi, puisque α > 0, il est (( premier )) et a fortiori irréductible. Commme chaque bi cj est dans Idv(α) (car div(bi cj ) > α), on obtient bi ∈ Idv(α)
ou cj ∈ Idv(α). Or par distributivité du (( ou )) sur le (( et )) dans le calcul des propositions,
on a, en notant Pi pour (( bi ∈ Idv(α) )) et Qj pour (( cj ∈ Idv(α) ))
(&i Pi ) ou (&j Qj ) = &i,j (Pi ou Qj ).
Et si par exemple &i bi ∈ Idv(α) , cela donne α 6 β.
2
Exemples. 1) Soit A un anneau de valuation intègre à divisibilité explicite. C’est un domaine
de Bezout pour lequel le groupe Div A est totalement ordonné discret et il y a au plus un
diviseur irréductible π, qui s’écrit π = div(p) avec Rad(A) = hpi = Idv(π). Ainsi on a un
diviseur irréductible si, et seulement si, Rad(A) est un idéal principal. S’il y a d’autres idéaux
premiers non nuls, c’est-à-dire si le rang du groupe Div A est > 1, ils ne sont pas de la forme
Idv(α). Donc ce ne sont pas des idéaux principaux et ils ne sont pas de type fini.
2) Soit A un anneau à pgcd. Les diviseurs irréductibles correspondent aux éléments irréductibles de l’anneau (à association près), ou encore aux idéaux premiers principaux non nuls.
Si A est factoriel et si x ∈ p premier (6= h0i , h1i), un des éléments irréductibles qui divisent
x, disons p, doit être dans p. Donc si p 6= hpi, il y a au moins deux éléments irréductibles
(non associés) dans p, ce qui fait une suite de profondeur 2, et div(p) = 0.
Théorème 1.14 Dans un anneau à diviseurs à divisibilité explicite non trivial, si p est un
idéal premier de type fini non nul avec π = div(p) > 0, alors p = Idv(p) et π est un diviseur
irréductible.
Démonstration. D’après le théorème 1.13, il suffit de montrer que p = Idv(π), l’inclusion
p ⊆ Idv(π) étant triviale.
Soit a =
6 0 un élément de p. D’après le lemme 1.4, il existe deux listes (b) = (b1 , . . . , bm )
et (c) = (c1 , . . . , cq ) dans A∗ , la deuxième de profondeur > 2, telles que
p hb1 , . . . , bm i = hai hc1 , . . . , cq i
(∗)
Comme π > 0 = div(c1 , . . . , cq ) il y a un cj tel que div(cj ) 6> π, et a fortiori cj ∈
/ p.
Soit x ∈ Idv(p) = (hai : hbi) (point 5 de la proposition 1.9). On a x hbi ⊆ hai, avec (∗) cela
donne ap ⊇ x p hbi = xa hci, donc p ⊇ x hci. Enfin, comme xcj ∈ p et cj ∈
/ p, on obtient x ∈ p.
Ce qu’il fallait démontrer.
2
Exemple. Dans l’exemple 3) page 8, les diviseurs div(a, b), div(a, c), div(d, b) et div(d, c)
sont irréductibles car les idéaux ha, bi, ha, ci, hd, bi et hd, ci sont premiers. Comme div(a, b) +
div(a, c) = div(a) > 0, on a par raison de symétrie div(a, b) > 0 et div(a, c) > 0. On peut
appliquer le théorème 1.14. On obtient en outre sans calcul l’égalité Idv(a, b) = ha, bi et les
trois autres égalités analogues.
Corollaire 1.15 Dans un anneau à diviseurs cohérent à divisibilité explicite non trivial, on
a les propriétés équivalentes suivantes pour un idéal q 6= h0i arbitraire.
— L’idéal q est premier, de type fini, et div(q) > 0.
— L’idéal q est premier, de type fini et div(q) est irréductible.
— L’idéal q est un idéal divisoriel fini premier 6= h1i.
14
Anneaux à diviseurs et anneaux de Krull
— Il existe un diviseur irréductible π tel que q = Idv(π).
Et dans un tel cas q est détachable.
En d’autres termes, on obtient une bijection entre les ensembles suivants :
— les diviseurs irréductibles,
— les idéaux divisoriels finis premiers 6= h1i,
et une égalité entre les ensembles suivants :
— les idéaux divisoriels finis premiers 6= h1i,
— les idéaux de type fini premiers q 6= h0i tels que div(q) > 0.
— les idéaux de type fini premiers q 6= h0i , h1i tels que q = Idv(q).
Propriétés de clôture intégrale
On note IclA (a) la clôture intégrale de a dans A. Quand le contexte est clair, on
utilise Icl(a).
Théorème 1.16 Soit A un anneau à diviseurs et a un idéal de type fini.
1. Pour tout x entier sur a, on a divA (x) > divA (a).
En conséquence,
— divA (a) ne dépend que de Icl(a),
— une inclusion b ⊆ Icl(a) implique divA (b) > divA (a),
— on a Icl(a) ⊆ Idv(a) et l’idéal IdvA (a) est intégralement clos.
2. En particulier A est intégralement clos.
Démonstration. 1. On note ξ = divA (x) et α = divA (a).
La relation de dépendance intégrale s’écrit
xn = u1 xn−1 + · · · + un−1 x + un avec uk ∈ ak .
On a des inégalités divA (uk ) > kα et donc
Vn
Vn
nξ > k=1 (n − k)ξ + div(uk ) > k=1 (n − k)ξ + kα ,
et l’on conclut que ξ > α par [18, fait XI-2.12, point 13.]
2. En effet, un anneau intègre est intégralement clos si, et seulement si, ses idéaux principaux
sont intégralement clos.
2
Exemple. Dans un anneau à pgcd intègre, l’idéal Idv(a) est l’idéal principal engendré par le
pgcd des générateurs de a.
Par exemple sur l’anneau A = k[x, y] (k un corps discret), on a
IdvA x4 , y 3 = h1i et IclA x4 , y 3 = x4 , y 3 , x2 y 2 , x3 y .
Donc x4 , y 3 ( IclA x4 , y 3 ( IdvA x4 , y 3 .
Remarque. La démonstration du théorème précédent n’a pas utilisé toute la force d’un anneau
à diviseurs. Il suffisait d’avoir un groupe réticulé G et une application div : A∗ /A× → G qui
satisfait les points D1 et D2 du projet divisoriel ainsi que le point 1 de la proposition 1.8.
C’est-à-dire : divA est un morphisme de groupes ordonnés qui réfléchit les inégalités et qui
satisfait l’inégalité divA (a) ∧ divA (b) 6 divA (a + b).
Corollaire 1.17 Soit A un anneau à diviseurs. Pour p, q ∈ A[X] on a
div c(pq) = div c(p) + div c(q) .
Démonstration. Cela résulte
de div(ab) = div(a) + div(b), du théorème de Kronecker (c’està-dire c(p)c(q) ⊆ Icl c(pq) , et du théorème 1.16.
2
T. Coquand, H. Lombardi
15
Un autre corollaire est l’équivalence donnée ci-après pour les anneaux cohérents. Notons
que ce théorème est une version constructive non noethérienne du théorème bien connu des
mathématiques classiques qui affirme qu’un anneau noethérien intégralement clos est un
anneau de Krull (voir [22, théorème 12.4]).
Théorème 1.18 Pour un anneau A cohérent intègre, les propriétés suivantes sont équivalentes.
1. L’anneau A est intégralement clos.
2. L’anneau A est à diviseurs.
3. Pour toute famille finie (a1 , . . . , an ) dans A∗ , si hb1 , . . . , bm i = ha1 i : ha1 , . . . , an i
la famille des ai bj admet a1 comme pgcd fort.
A
,
Démonstration. On sait déjà que 2 ⇒ 1, et que lorsque A est cohérent, 2 ⇔ 3 (lemme 1.4).
Il reste à montrer 1 ⇒ 3. On pose a = ha1 , . . . , an i, b = hb1 , . . . , bm i. On veut montrer que
les ai bj admettent a1 comme pgcd fort.
Pour un y ∈ A∗ on montre que ya1 est un pgcd des yai bj . Il est clair que ya1 divise tous
les yai bj . Soit un x ∈ A∗ qui divise tous les yai bj , on doit montrer que la fraction t = a1 y/x
est dans A.
On considère tj = tbj = (ya1 bj )/x, qui est dans A, et on montre que tj ∈ b.
On a tj ai = a1 (yai bj )/x ∈ ha1 i pour chaque i, donc tj ∈ (ha1 i : a)A = b. Ainsi l’élément t
de K vérifie tb ⊆ b. Comme b contient a1 ∈ A∗ , c’est un A-module fidèle. En outre il est de
type fini, et puisque A est intégralement clos, on obtient t ∈ A.
2
NB : il existe des anneaux factoriels (cas particuliers d’anneaux de Krull) non cohérents
(exemple 5.2 dans [12, Glaz], voir page 36).
Exemple important. Tout anneau intègre cohérent régulier est à diviseurs car il est
intégralement clos.
Remarque. On a déjà noté que pour un anneau à diviseurs et un idéal fractionnaire de type
fini a, on a Idv(a) = (a−1 )−1 . Donc pour un anneau cohérent intégralement clos, un idéal
de type fini a et a ∈ a on peut calculer un système générateur fini de Idv(a) par la formule
Idv(a) = (hai : (hai : a)A )A .
Terminologie. Dans la littérature classique, pour un anneau noethérien intégralement
clos A, le groupe Div A est souvent appelé le groupe des diviseurs de Weil, et l’on appelle
diviseur effectif un élément de (Div A)+ , et diviseur positif un diviseur effectif non nul. La
signification du mot effectif étant différente en mathématiques constructives, nous utiliserons
la terminologie suivante : diviseur positif ou nul (au lieu de diviseur effectif) et diviseur
strictement positif (au lieu de diviseur positif).
Anneaux à diviseurs de dimension 6 1
Un anneau intègre zéro-dimensionnel est un corps discret. Ceci règle la question des
anneaux à diviseurs de dimension 6 0.
Dans ce paragraphe, nous voyons que la question de la dimension 6 1 admet une réponse
surprenante par sa simplicité.
Comme corollaire du théorème 1.18, puisqu’un domaine de Prüfer de dimension
de Krull 6 1 est la même chose qu’un anneau intègre cohérent intégralement clos de dimension
de Krull 6 1 ([18, théorème XII-6.2]) on obtient l’équivalence suivante : un anneau intègre
de dimension de Krull 6 1 est un anneau de Prüfer si, et seulement si, c’est un anneau à
diviseurs cohérent.
16
Anneaux à diviseurs et anneaux de Krull
Mais en fait on a mieux, car on peut supprimer la cohérence dans cette équivalence. On
obtient alors une version constructive non noethérienne du théorème des mathématiques
classiques qui affirme qu’un anneau de Krull de dimension 1 est un domaine de Dedekind
([22, théorème 12.5]).
Théorème 1.19 Pour un anneau intègre les propriétés suivantes sont équivalentes.
1. A est un anneau de Prüfer de dimension de Krull 6 1.
2. A est un anneau à diviseurs de dimension de Krull 6 1.
Démonstration. Il faut prouver 2 ⇒ 1. On suppose que A est un anneau à diviseurs et on
doit montrer qu’un idéal a de type fini fidèle est inversible. On a un idéal de type fini b tel
que ab admet un pgcd fort g ∈ A∗ , donc par le lemme 1.20, ab = hgi et a est bien un idéal
inversible.
2
Lemme 1.20 Dans un anneau intègre A de dimension de Krull 6 1, si g est un pgcd fort
de (a1 , . . . , an ), alors ha1 , . . . , an i = hgi.
Démonstration. On suppose sans perte de généralité les ai ∈ A∗ . Puisque g est un pgcd fort
des ai , 1 est un pgcd fort des bi = agi et il suffit de montrer que hb1 , . . . , bn i = h1i. Pour cela,
on reprend mutatis mutandis la démonstration du théorème XI-3.12 dans [18] qui affirme
qu’un anneau intègre à pgcd de dimension 6 1 est un anneau de Bezout.
i
Dans l’anneau zéro-dimensionnel A/hb1 i, chaque bi satisfait bm
= ei pour un idempotent ei .
i
Si e est l’idempotent pgcd des ei modulo b1 , on a dans A l’égalité hb1 i = hb1 , ei hb1 , 1 − ei, donc
mn
2
l’idéal hb1 , ei est localement principal. Et hb1 , ei = hb1 , bm
2 , . . . , bn i. Comme hb1 , . . . , bn i est
m2
mn
de profondeur > 2, il en va de même pour hb1 , b2 , . . . , bn i. Ainsi hb1 , ei est localement
principal et de profondeur > 2. On en déduit qu’il est égal à h1i car un idéal principal de
mn
2
profondeur > 2 est égal à h1i. On conclut avec hb1 , . . . , bn i ⊇ hb1 , bm
2
2 , . . . , bn i = h1i.
Anneaux de valuation discrète
On rappelle qu’un anneau de valuation discrète est par définition un anneau intègre V
donné avec un élément p ∈
/ V× , et dans lequel tout élément de V∗ s’écrit pn u pour un n ∈ N
×
et un u ∈ V . On dit alors que p est une uniformisante de V. On peut voir V comme un
anneau principal à factorisation totale avec p pour seul irréductible (modulo l’association).
Lemme 1.21 (Anneaux de valuation discrète, 1)
Soit A un anneau intègre. Les propriétés suivantes sont équivalentes.
1. A est un anneau de valuation discrète.
2. A est un anneau à diviseurs et Div A ' (Z, >).
3. A est un anneau à diviseurs local de dimension 6 1, Div A est discret et contient un
élément irréductible.
4. A est un anneau principal local à factorisation totale et il existe un a ∈ A∗ \ A× .
Démonstration. 1 ⇒ 2, 3 et 4. Clair
2 ⇒ 1. Soit π le générateur > 0 de Div A. On a π = div(a) pour une famille finie (a1 , . . . , an ) =
(a). Puisque div(ai ) = ni π pour des ni > 0, l’un des ni est égal à 1. Ainsi π = div(p) pour
un p ∈ A∗ . Pour tout autre élément a de A∗ on a div(a) = div(pn ) pour un n > 0, donc a et
pn sont associés. Ainsi A est un anneau de valuation discrète d’uniformisante p.
3 ⇒ 1. En tant qu’anneau à diviseurs local de dimension 1, A est un anneau de valuation
(théorème 1.19). Puisque Div A est discret, A est à divisibilité explicite, et A est réunion
T. Coquand, H. Lombardi
17
disjointe explicite de A× = { x | div(x) = 0 } et Rad A = { x | div(x) > 0 }. Si π est un
diviseur irréductible, il est élément > 0 minimum dans le groupe totalement ordonné Div A,
on l’écrit π = div(p). Donc pour tout a ∈ Rad A, p divise a. En outre la dimension de Krull 6 1
de l’anneau nous donne une égalité pn (1 + px) + ay = 0, donc a divise pn pour un n > 0. Si
n est la plus petite valeur possible et az = pn alors z ∈ A× car 0 6 div(z) < div(p). Ainsi A
est un anneau de valuation discrète d’uniformisante p.
4 ⇒ 3. En effet A est un anneau de valuation, et Div A est discret parce que A est à
factorisation totale. En outre, div(a) > 0, donc il existe un élément irréductible.
2
Remarque. Sous la seule hypothèse que A est un anneau principal local à factorisation bornée
avec un a ∈ A∗ \ A× , il n’y a pas d’algorithme général pour produire un élément irréductible
dans A.
Localisations d’un anneau à diviseurs, 1
Théorème 1.22 Soient A un anneau à diviseurs et S un filtre ne contenant pas 0. L’anneau
S −1 A = AS est un anneau à diviseurs etil y a un unique morphisme de groupes réticulés
ϕS : Div A → Div AS tel que ϕS divA (a) = divAS (a) pour tout a ∈ A∗ . Ce morphisme est
surjectif, donc Div AS ' (Div A)/ Ker ϕS .
Démonstration. On note tout d’abord que AS reste un anneau intègre. Ensuite vue la
proposition 1.1 (point 1c), le résultat tient à ce qu’un ppcm reste un ppcm après localisation,
car les localisations préservent les intersections finies d’idéaux ([18, fait II-6.5]). Ceci implique
que les pgcd forts restent des pgcd forts, que les listes divisoriellement inversibles restent
divisoriellement inversibles, que l’application
ϕS : divA (x1 , . . . , xn ) 7→ divAS (x1 , . . . , xn )
est bien définie, de Div A vers Div AS , et que c’est un morphisme de groupes réticulés.
L’unicité est claire.
2
Pour un filtre S d’un anneau A on appelle hauteur de S la dimension de Krull de AS .
Un filtre S est dit premier si l’anneau AS est local. Autrement dit si l’implication suivante
est satisfaite
x + y ∈ S ⇒ x ∈ S ou y ∈ S.
Lorsque S est premier, détachable et ne contient pas 0, son complémentaire est un idéal
premier détachable p 6= A, et on appelle hauteur de p la hauteur de S. En fait, du point
de vue constructif, la phrase bien définie est : (( le filtre S est un filtre de hauteur 6 k )) (le
filtre S n’est pas supposé détachable). Enfin un idéal premier détachable 6= A admet pour
complémentaire un filtre premier. On obtient ainsi une bijection entre les idéaux premiers
détachables 6= A et les filtres premiers détachables 6= A.
Le lemme suivant est un complément pour le théorème 1.14.
Lemme 1.23 Soit un anneau à diviseurs A et p un idéal de type fini premier détachable de
hauteur 1. Alors div(p) est un diviseur irréductible.
Démonstration. On doit montrer que div(p) > 0. Si S = A \ p, on sait que AS est un
anneau à diviseurs avec un morphisme naturel surjectif de groupes réticulés Div A → Div AS
(théorème 1.22), et par hypothèse AS est de dimension de Krull 1. Donc par le théorème 1.19
c’est un anneau de Prüfer. Comme il est localVc’est un anneau de valuation, d’idéal maximal
pAS . On a divAS (p) = divAS (a1 , . . . , an ) = i divAS (ai ) pour des ai ∈ A∗ ∩ p. Comme les
divAS (ai ) sont deux à deux comparables et tous > 0, on a divAS (p) > 0, ce qui implique
divA (p) > 0.
2
18
Anneaux à diviseurs et anneaux de Krull
Un anneau à la Kronecker
Dans ce paragraphe, les démonstrations sont laissées à la lectrice.
Soit B un anneau arbitraire. On rappelle que l’on note cB,X (p) ou c(p) le contenu de
p ∈ B[X] = B[X1 , . . . , Xn ], c’est-à-dire l’idéal de B engendré par les coefficients de p.
On fixe des indéterminées X et on définit l’ensemble
Sdiv (B) = Sdiv = { f ∈ B[X] | Gr(cB (f )) > 2 } .
Fait 1.24 L’ensemble Sdiv est un filtre.
−1
Définition 1.25 Le sous-anneau Bdiv (X) = Sdiv
B[X] de (Frac B)(X) est appelé l’anneau
de Nagata divisoriel de B.
Remarque. Cette définition est à distinguer de celle des (( Kronecker function rings )) usuels
de la littérature anglaise en théorie multiplicative des idéaux (voir à ce sujet le survey [9]).
Le filtre Sdiv apparaı̂t dans la littérature usuelle dans le cas d’un anneau intègre B de corps
de fractions K, et l’anneau Bdiv (X) est alors appelé anneau de Nagata pour la star opération
v définie comme suit : v : a 7→ (a−1 )−1 . Pour un anneau intègre, notre Bdiv (X) est noté
Na(B, v) ou Na(B, v)(X) par d’autres auteurs.
On vérifie alors les propriétés suivantes.
Proposition 1.26
1. Pour a, b ∈ Reg(B), a divise b dans B si, et seulement si, a divise b dans Bdiv (X).
2. Si A est un anneau à diviseurs, alors
(a) Adiv (X) est un anneau de Bezout,
(b) tout p ∈ A[X] est le pgcd dans Adiv (X) de ses coefficients,
(c) pour f , g ∈ A[X],
f
g
∈ Adiv (X) ⇐⇒ divA (c(g)) 6 divA (c(f )).
En particulier on obtient Div A ' Div (Adiv (X)) ' Adiv (X)∗ /Adiv (X)× .
Le théorème 1.28 démontre la réciproque suivante : si A est intègre et si Adiv (X) est
arithmétique (a fortiori si c’est un anneau de Bezout), alors A est un anneau à diviseurs.
Principe local-global et applications
Principe local-global concret 1.27 (Principe local-global concret pour la divisibilité, les
idéaux divisoriellement inversibles, les anneaux intégralement clos et les anneaux à diviseurs).
Soit A un anneau intègre et (s1 , . . . , sn ) une suite de profondeur > 2. On note Ai = A[ s1i ].
1. Soient a, b, a1 , . . ., ak ∈ A.
(a) a divise b dans A si, et seulement si, a divise b dans chaque Ai .
(b) a est un pgcd fort de (a1 , . . . , ak ) dans A si, et seulement si, a est un pgcd fort de
(a1 , . . . , ak ) dans chaque Ai .
(c) L’idéal a = ha1 , . . . , ak i est divisoriellement inversible dans A si, et seulement si,
il est divisoriellement inversible dans chaque Ai .
2. L’anneau A est intégralement clos si, et seulement si, chaque anneau Ai est intégralement clos.
3. L’anneau A est à diviseurs si, et seulement si, chaque anneau Ai est à diviseurs.
T. Coquand, H. Lombardi
19
Démonstration. 1b (et a fortiori 1a). Pour simplifier on se contente de localiser en trois
monoı̈des S, T et U . Soient c, y ∈ A∗ et supposons que c divise les yai dans A. Après
localisation on trouve que c divise sya pour un s ∈ S, que c divise tya pour un t ∈ T et que c
divise uya pour un u ∈ U . Comme (s, t, u) admet 1 pour pgcd fort dans A, cela implique
que c divise ya dans A.
1c. La démonstration est analogue, donnons les détails.
On considère un idéal de type fini a = ha1 , . . . , a` i avec a1 ∈ A∗ . On doit trouver un idéal
de type fini b tel que ab admette a1 comme pgcd fort (lemme 1.4). Pour simplifier on se
contente de localiser en deux monoı̈des S et T .
Dans le premier localisé on trouve b1 , . . ., bm tels que les uij = ai bj admettent a1 pour pgcd
fort (lemme 1.4).
Dans le deuxième localisé on trouve c1 , . . ., cp tels que les vik = ai ck admettent a1 pour pgcd
fort.
On peut supposer que les bj et ck sont dans A ainsi que les uij /a1 et vik /a1 . On va montrer
que la famille finie formée par les uij et vik admet a1 pour pgcd fort dans A. Pour cela
on considère c et y ∈ A∗ tels que c divise tous les yuij et yvik . Après localisation on trouve
que c divise sya1 pour un s ∈ S et c divise tya1 pour un t ∈ T . Comme s et t admettent 1
pour pgcd fort dans A, cela implique que c divise ya1 dans A. Ainsi l’idéal de type fini b = hb1 , . . . , bm , c1 , . . . , cp i satisfait la condition que ab admet a1 pour pgcd fort.
2 et 3. Résultent des points 1a et 1c.
2
Le corollaire suivant complète la proposition 1.26. Nous retrouvons ici un résultat de [16,
Kang, 1989].
Théorème 1.28 (L’anneau de Nagata divisoriel)
Un anneau intègre A est un anneau à diviseurs si, et seulement si, son anneau de Nagata
divisoriel Adiv (X) est un domaine de Prüfer, ou encore un domaine de Bezout.
Démonstration. Nous montrons que si Adiv (X) est un domaine de Prüfer, tout idéal ha, bi est
divisoriellement inversible. Dans Adiv (X) on a des éléments u, v, s, t tels que sa = ub, tb = va,
et s + t = 1. On peut prendre u, v, s, t ∈ A[X] auquel cas on obtient GrA (c(s + t)) > 2. Les
coefficients de s et t engendrent donc un idéal de profondeur > 2 (i.e. GrA (c(s) + c(t)) > 2).
Or lorsqu’on inverse un coefficient sk de s l’égalité sa = ub dans A[X] nous donne ha, bi = hbi
dans A[1/sk ], et lorsqu’on inverse un coefficient t` de t on obtient ha, bi = hai dans A[1/t` ].
Dans tous les cas l’idéal ha, bi est divisoriellement inversible dans le localisé. On conclut par
le point 1c du principe local-global 1.27 que ha, bi est divisoriellement inversible dans A. 2
Un autre corollaire intéressant est le suivant.
Théorème 1.29 (Idéaux divisoriellement inversibles comme idéaux de type fini (( localement )) principaux) Dans un anneau intègre un idéal de type fini fidèle est divisoriellement
inversible si, et seulement si, il existe une suite (s1 , . . . , sp ) de profondeur > 2 telle qu’après
localisation en chaque si , l’idéal devient principal.
En conséquence un anneau intègre est un anneau à diviseurs si, et seulement si, tout idéal de
type fini devient principal après localisation en les éléments d’une suite de profondeur > 2.
Démonstration. La condition est suffisante d’après le point 1c du principe local-global 1.27.
La condition est nécessaire. On a un idéal a = ha1 , . . . , an i avec les ai ∈ A∗ . Soit b un idéal
de type fini tel que a b = g c, g ∈ A∗ et Gr(c) > 2. Écrivons c = hc1 , . . . , cq i. Fixons un cj et
notons Aj = A[1/cj ]. Sur Aj , g c = hgi, donc l’idéal a est localement principal, donc il existe
(uj,1 , . . . , uj,n ) comaximaux dans Aj tels que uj,i a ⊆ hai i dans Aj pour chaque i ∈ J1..nK.
Cela signifie qu’il existe (vj,1 , . . . , vj,n ) dans A tels que
— vj,i a ⊆ hai i dans A pour chaque i ∈ J1..nK, et
20
Anneaux à diviseurs et anneaux de Krull
m
— l’idéal hvj,1 , . . . , vj,n iA contient une puissance cj j
Bilan : d’une part lorsqu’on inverse un vj,i l’idéal devient égal à hai i, et d’autre part l’idéal
m
engendré par les vj,i contient les cj j , donc il est de profondeur > 2.
2
2
Propriétés de décomposition des groupes réticulés
Groupes réticulés quotients
Un sous groupe H d’un groupe (abélien) ordonné est dit convexe s’il vérifie la propriété :
0 6 x 6 y et y ∈ H impliquent x ∈ H. Sous cette condition, G/H est muni d’une structure
de groupe ordonné quotient, i.e. vérifiant la propriété : (G/H)+ = G+ + H. Certains auteurs
disent sous-groupe isolé.
Le noyau H de la projection canonique d’un groupe réticulé G sur un groupe réticulé
quotient G/H est ce que l’on appelle un sous-groupe solide 11 , c’est-à-dire un sous-groupe
vérifiant la propriété : ξ ∈ H et |ζ| 6 |ξ| impliquent ζ ∈ H.
Pour γ ∈ G on note C(γ) le sous-groupe solide engendré par γ, qui est l’ensemble des ξ
tels que |ξ| soit majoré par un élément n |γ| (n ∈ N). On a donc C(γ) = C(|γ|).
Pour γ et η ∈ G+ on a C(γ) ∩ C(η) = C(γ ∧ η), et C(γ) ⊥ C(η) si, et seulement si, γ ⊥ η.
Enfin C(γ + η) = C(γ ∨ η) est le plus petit sous-groupe solide contenant C(γ) et C(η).
Nous définissons maintenant l’analogue des morphismes de localisation en un monoı̈de
(définis dans la catégorie des anneaux commutatifs en [18, XV-4.5]) dans la catégorie des
groupes réticulés.
Définition 2.1 (Morphismes de passage au quotient pour les groupes réticulés) Soit G un
groupe réticulé et H un sous-groupe solide de G. Un morphisme Π : G → G0 est appelé un
morphisme de passage au quotient par H s’il est surjectif et si Ker Π = H.
Un morphisme de passage au quotient pour un H donné est (( unique à isomorphisme
unique près )) : il y a un unique homomorphisme G0 → G/H qui fait commuter le diagramme
convenable, et c’est un isomorphisme.
Notez que comme Π(z + ) = Π(z)+ pour tout z, on a Π(G)+ = Π(G+ ).
Un principe de recouvrements par quotients
Rappelons le principe constructif suivant énoncé en [18, XI-2.10].
Principe de recouvrement par quotients pour les groupes réticulés.
Pour démontrer une égalité α = β dans un groupe réticulé, on peut toujours supposer que les
éléments (en nombre fini) qui se présentent dans un calcul pour une démonstration de l’égalité
sont comparables, si l’on en a besoin pour faire la démonstration. Ce principe s’applique
aussi bien pour des inégalités que pour des égalités puisque α 6 β équivaut à α ∧ β = α.
Ce principe peut être considéré comme la version constructive du théorème de mathématiques classiques qui dit qu’un groupe réticulé est toujours représentable comme sous-groupe
réticulé d’un produit de groupes totalement ordonnés.
11. On peut consulter [3]. Le théorème 2.2.1 donne les propriétés équivalentes suivantes pour un sous-groupe :
(a) H est solide, (b) H est un sous-groupe réticulé convexe, (c) H est convexe et ξ ∈ H ⇒ ξ + ∈ H, (d) H est
convexe et filtrant.
T. Coquand, H. Lombardi
21
Groupes réticulés de dimension 1
Pour des sous-groupes réticulés H, K, L d’un groupe réticulé G, la notation K = H L
signifie que H ⊥ L et K = H ⊕ L. Autrement dit, lorsque le produit cartésien H × L est
muni de la structure produit catégorique, l’application H × L → K, (ξ, η) 7→ ξ + η est un
isomorphisme de groupes réticulés.
En particulier, en notant H ⊥ = { x ∈ G | ∀h ∈ H, x ⊥ h }, on a alors H + H ⊥ = H H ⊥ .
Lemme 2.2 Soient un groupe réticulé G, et α, β ∈ G+ . Les propriétés suivantes sont
équivalentes.
1. β ∈ C(α) C(α)⊥ .
2. ∃n ∈ N, ∃β1 , β2 ∈ G+ , β1 6 nα, β2 ⊥ α et β = β1 + β2 .
3. ∃n ∈ N, β ∧ nα = β ∧ (n + 1)α, i.e. nα > β ∧ (n + 1)α.
4. ∃n ∈ N, ∀m > n, β ∧ mα = β ∧ (m + 1)α.
5. C(β) ⊆ C(α) C(α)⊥ .
Démonstration. 1 ⇔ 2, 4 ⇒ 3, et 5 ⇒ 1. Clair
2 ⇒ 4. Il suffit de le démontrer lorsque β2 > α et lorsque β2 6 α.
Si β2 > α alors α = 0, et β ∧ mα = 0 pour tout m. Si β2 6 α alors β2 = 0 donc
β = β1 6 nα 6 mα pour m > n, donc β ∧ nα = β ∧ mα.
3 ⇒ 2. On pose β1 = β ∧ nα et β2 = β − β1 . Il suffit de montrer β2 ∧ α = 0 lorsque β > nα
et lorsque β 6 nα. Si β 6 nα, alors β1 = β et β2 = 0. Si β > nα, alors β1 = nα, et
nα = β ∧ nα = β ∧ (n + 1)α = (β1 + β2 ) ∧ (nα + α) = (nα + β2 ) ∧ (nα + α) = nα + (β2 ∧ α),
donc β2 ∧ α = 0.
1 ⇒ 5. La somme directe orthogonale de deux sous-groupes solides est un sous-groupe solide.
2
Définition 2.3
Un groupe réticulé G est dit de dimension 6 1 si pour tout ξ ∈ G+ , on a G = C(ξ) C(ξ)⊥ .
Pour des propriétés équivalentes, voir le lemme 2.2.
Lemme 2.4 Soit G un groupe réticulé de dimension 6 1 et ξ ∈ G. Les propriétés suivantes
sont équivalentes.
1. G est discret
2. C(ξ) et G/C(ξ) sont discrets.
3. C(ξ) est détachable et discret.
4. C(ξ)⊥ est détachable et discret.
Démonstration. 1 ⇔ 2. L’égalité G = C(ξ) C(ξ)⊥ donne les isomorphismes G/C(ξ) ' C(ξ)⊥
et G ' C(ξ) × G/C(ξ). Et un produit de deux groupes est discret si, et seulement si, chaque
facteur est discret.
2 ⇔ 3. G/C(ξ) est discret si, et seulement si, C(ξ) est détachable.
2 ⇔ 4. L’égalité G = C(ξ) C(ξ)⊥ montre que dans cette affaire C(ξ) et C(ξ)⊥ jouent des
rôles symétriques.
2
Lemme 2.5 (Éléments irréductibles dans un groupe réticulé de dimension 6 1)
Soit G un groupe réticulé discret de dimension 6 1 et π > 0 dans G. Les propriétés suivantes
sont équivalentes.
1. π est un élément irréductible.
22
Anneaux à diviseurs et anneaux de Krull
2. C(π) = Zπ ' (Z, > 0).
3. Tout α ∈ G+ s’écrit de manière unique sous forme nπ + α2 avec n ∈ N et α2 ⊥ π
dans G+ .
Démonstration. 1 ⇒ 2 et 3 ⇒ 1. Clair.
2 ⇒ 3. Soit α ∈ G+ . On écrit α = α1 + α2 avec 0 6 α1 6 mπ, m ∈ N et α2 ⊥ π dans G+
(point 2 du lemme 2.2). Puisque G est discret on a un n ∈ N tel que nπ 6 α1 < (n + 1)π.
Donc π = (α1 − nπ) + ((n + 1)π − α1 ) tous deux > 0 et le deuxième > 0. Ceci implique que
le premier est nul.
2
Groupes totalement ordonnés de dimension 1
Un groupe totalement ordonné est un groupe ordonné dans lequel on a x > 0 ou x 6 0
pour tout x. Il est facile de voir que c’est un groupe réticulé.
On note (O, >) l’ensemble ordonné des réels pour lesquels on dispose d’un test de
comparaison aux rationnels. C’est aussi la réunion disjointe de Q et des irrationnels, définis
par leurs fractions continues infinies. L’ensemble O est stable pour les opérations x 7→
(ax + b)/(cx + d), où a, b, c, d sont des entiers avec ad − bc 6= 0. On a aussi une application
bien définie (( identité )), de O vers R. Par contre on ne peut pas démontrer constructivement
que O soit égal à R, ni que O soit discret, ou stable pour l’addition, ou stable pour la
multiplication. Une partie R de O sera appelée un sous-groupe (additif) de O si l’on a une
fonction + : O × O → R qui redonne l’addition dans R.
Lemme 2.6 (Groupes totalement ordonnés discrets archimédiens)
Soit G un groupe réticulé discret non nul. Les propriétés suivantes sont équivalentes.
1. G est totalement ordonné de dimension 1.
2. Pour tous α, β > 0 il existe m ∈ N tel que mα > β.
3. Pour tout α > 0, G = C(α).
4. G est de dimension 1 et pour tout α > 0, G = C(α).
5. G est isomorphe à (R, >) pour un sous-groupe discret de (O, >).
6. Pour tout α > 0 dans G, on a un isomorphisme ϕα : G → Rα tel que ϕα (α) = 1, où
(Rα , >) est un sous-groupe discret de (O, >). En outre ϕα et Rα sont déterminés de
manière unique.
Démonstration. 1 ⇒ 2, 6 ⇒ 5 ⇒ 2, et 2 ⇔ 3 ⇔ 4. Clair
4 ⇒ 1. (l’ordre est total). Pour α et β ∈ G+ il suffit de montrer que α ∧ β = 0 implique
α = 0 ou β = 0. On écrit α = α1 + α ∧ β et β = β1 + α ∧ β. On a α1 ⊥ β1 . Donc si α1 > 0,
une inégalité β1 6 mα1 implique β1 = 0, donc β 6 α.
1 et 2 ⇒ 6. Calcul classique du développement en fraction continue.
2
Sous-groupes premiers d’un groupe réticulé
Définition 2.7
Un sous-groupe solide H d’un groupe réticulé G est dit premier si le quotient G/H est un
groupe totalement ordonné.
Naturellement G/H est discret si, et seulement si, H est une partie détachable de G.
Lemme 2.8 Soit G un groupe réticulé discret de dimension 6 1 et π un élément irréductible.
Alors π ⊥ est un sous groupe premier et G/π ⊥ ' C(π) = Zπ.
T. Coquand, H. Lombardi
23
Démonstration. D’après la définition 2.3, G/π ⊥ ' C(π) et l’égalité C(π) = Zπ traduit le fait
que π est irréductible (lemme 2.5).
2
Remarque. La dimension des groupes réticulés qui intervient dans la définition 2.3 est
la dimension de Krull du treillis distributif, noté Zar G, obtenu en quotientant le treillis
distributif G+ ∪ {∞} par la relation d’équivalence suivante :
ξ ∼ ζ ⇐⇒ ∃n > 0 tel que ξ 6 nζ et ζ 6 nξ.
Autrement dit encore Zar G est l’ensemble des sous-groupes C(ξ) (ξ ∈ G+ ), auquel on rajoute
un élément +∞, avec sa structure de treillis distributif naturelle.
Un groupe réticulé est zéro-dimensionnel si, et seulement si, il est nul. Un groupe totalement
ordonné a pour dimension son rang défini de manière (( usuelle )). Les groupes totalement
ordonnés Z et Q sont de rang 1, un produit fini catégorique a pour rang le maximum des
rangs des facteurs, un produit lexicographique a pour rang la somme des rangs. En mathématiques classiques la dimension d’un groupe réticulé peut être définie comme la longueur
maximum d’une chaı̂ne de sous-groupes premiers (ici, comme pour les idéaux premiers d’un
anneau commutatif, la chaı̂ne H0 ( H1 ( H2 est dite de longueur 2, mais notez que la chaı̂ne
maximale dans Z est 0 ( Z).
Pour un anneau de valuation V la dimension de Div V (son rang en tant que groupe totalement
ordonné) est égale à la dimension valuative de V, qui est égale à sa dimension de Krull. Ceci
s’étend aux domaines de Prüfer mais pas aux anneaux de Krull : un anneau K[X1 , . . . , Xn ]
(où K est un corps discret) est un anneau de Krull de dimension de Krull n (égale à sa
dimension valuative), alors que son groupe de diviseurs reste de dimension 1.
Propriétés de décomposition générales
Nous donnons quelques définitions constructives liées aux propriétés de décomposition
(voir [18, Chapitre XI]).
Définition 2.9 (Quelques propriétés de décomposition dans les groupes réticulés)
1. Une famille (ai )i∈I d’éléments > 0 dans un groupe réticulé admet une décomposition
partielle si l’on peut trouver une famille finie
P (pj )j∈J d’éléments > 0 deux à deux
orthogonaux telle que chaque ai s’écrive
j∈J rij pj avec les rij ∈ N. La famille
(pj )j∈J est alors appelée une base de décomposition partielle pour la famille (ai )i∈I .
2. Un groupe réticulé est dit à décomposition partielle s’il est discret et si toute famille
finie d’éléments > 0 admet une décomposition partielle.
3. Un groupe réticulé est dit à décomposition
bornée lorsque pour tout x > 0 il existe un
Pn
entier n tel que, lorsque x = j=1 xj avec les xj > 0, au moins l’un des xj est nul.
4. Le groupe réticulé à décomposition bornée G est dit absolument borné s’il existe un
entier n tel que dans toute famille de n éléments deux à deux orthogonaux dans G+ ,
il y a un élément nul.
5. Un groupe réticulé est dit à décomposition complète s’il est discret et si tout élément > 0 est une somme d’éléments irréductibles.
Un exemple classique de groupe réticulé à décomposition partielle mais pas à décomposition bornée est le groupe des diviseurs de l’anneau de tous les entiers algébriques complexes
(qui est un anneau de Bezout de dimension 1).
Nous donnons maintenant quelques résultats constructifs de base (voir [18] pour la plupart
d’entre eux, notamment pour le point 2, qui est donné par le théorème XI-2.16 de [18]).
Proposition 2.10 (Quelques relations liant les propriétés de décomposition dans les groupes
réticulés)
24
Anneaux à diviseurs et anneaux de Krull
1. Un groupe réticulé à décomposition complète est à décomposition bornée.
2. Un groupe réticulé discret et à décomposition bornée est à décomposition partielle.
3. Un groupe réticulé à décomposition partielle est de dimension 6 1.
4. Pour un groupe réticulé discret non nul G les propriétés suivantes sont équivalentes.
(a) G est à décomposition complète.
(b) G est à décomposition bornée et il possède un test d’irréductibilité 12 pour les
éléments > 0.
(c) G est à décomposition bornée et tout élément > 0 est minoré par un élément
irréductible.
(d) G est isomorphe comme groupe réticulé à un groupe Z(I) pour un ensemble discret I.
On peut prendre pour I l’ensemble des éléments irréductibles de G.
Démonstration. Vu les résultats présentés dans [ACMC], seul le point 3 réclame une démonstration.
3. On considère
une base de décomposition partielle (π1 , . . . , πk ) pour le couple (ξ, ζ). On
P
écrit ξ = i∈I ni πi avec des ni > 0. On note J la partie complémentaire de I dans J1..kK,
P
P
P
ζ = i mi πi = ζ1 + ζ2 avec ζ1 = i∈I mi πi et ζ2 = i∈J mi πi .
On a bien ζ2 ⊥ ξ, et ζ1 6 mξ si m majore les mi /ni pour i ∈ I.
2
Lemme 2.11 Soit G un groupe réticulé à décomposition complète et IG l’ensemble de ses
éléments irréductibles.
1. Pour tout sous-groupe solide détachable H de G, on a G = H H ⊥ .
2. L’application H 7→ IH = IG ∩ H établit une bijection entre l’ensemble des sous-groupes
solides détachables de G et l’ensemble des parties détachables de IG .
Démonstration. On démontre que si un irréductible π n’est pas dans IH , il est dans H ⊥ . En
effet, si α ∈ H + , l’élément α ∧ π, qui est égal à π ou 0, est nécessairement nul. Le reste suit.
2
Remarque. Dans le lemme précédent, l’égalité G = H H ⊥ ne peut pas être démontrée
constructivement si on remplace l’hypothèse (( G à décomposition complète )) par (( G à
décomposition bornée )). Ceci crée quelques subtilités algorithmiques que l’on retrouvera par
la suite.
Lemme 2.12 Soit (αi )i∈I une
P famille qui admet une base de décomposition partielle dans
un groupe
réticulé
G
:
α
=
πj pour P
des πj deux à deux orthogonaux.
i
j∈J rijW
V
P
Alors i αi = j∈J inf i∈I (rij ) πj et i αi = j∈J supi∈I (rij ) πj .
Nous utilisons maintenant le principe [18, XI-2.10] cité page 20 pour obtenir des résultats
qui s’avèreront utiles pour le groupe des diviseurs d’un anneau à diviseurs en raison de
l’inégalité div(a + b) > div(a) ∧ div(b).
Lemme 2.13VSoient α1 , . . ., αn dans un groupe réticulé G.
On pose γi = j6=i αj et l’on suppose que γi 6 αi pour tout i ∈ J1..nK.
V
V
P
Alors i∈J1..nK
(αi − αk )+ = 0.
j∈J1..nK,j6=i |αi − αj | +
k∈{i,j}
/
12. À la question (( π est-il irréductible ? )), le test doit donner l’une des deux réponses suivantes :
— (( oui )), ou
— (( non et voici π1 , π2 > 0 tels que π = π1 + π2 )).
T. Coquand, H. Lombardi
25
Démonstration. Il suffit de le démontrer lorsque les αi sont totalement ordonnés. Par exemple
si αi et αj sont plus petits que tous les autres, les inégalités γi 6 αi et γj 6 αj donnent αj 6 αi
et αi 6 αj , donc αj = αi .
2
L’inégalité div(a + b) > div(a) ∧ div(b) peut se lire de manière symétrique en disant que
si a1 + a2 + a3 = 0 alors chaque div(ai ) majore la borne inférieure des deux autres. Ceci se
généralise par récurrence comme suit.
Fait 2.14 Dans un anneau à diviseurs on a l’implication
Pn
V
j=1 aj = 0 ⇒
i,j:j>i div(aj ) − div(ai ) = 0.
Démonstration. Pour chaque j, on a −aj ∈ ai | i 6= j , donc div(aj ) >
conclut avec le lemme 2.13.
Lemme 2.15 Soient
un groupe réticuléVG, et β1 , . . ., βp , ξ, ζ dans G+ .
V
On suppose que j∈J1..pK |ξ − βj | = 0 = j∈J1..pK |ζ − βj |.
W
1. On a ξ 6 j∈J1..pK βj .
V
i6=j
div(ai ). On
2
2. On suppose que pour chaque j, k ∈ J1..pK, βj ∈ C(βk ) C(βk )⊥ .
Alors, pour γ, δ ∈ {ξ, ζ, β1 , . . . , βp }, on a γ ∈ C(δ) C(δ)⊥ , i.e. C(γ) ⊆ C(δ) C(δ)⊥ .
Démonstration. Pour le point 1 il faut démontrer une inégalité, et pour le point 2 on veut une
égalité γ + mδ = γ + (m + 1)δ. Il suffit donc (principe [18, XI-2.10]) de faire la démonstration
lorsque les |ξ − βj | sont totalement ordonnés ainsi que les |ζ − βj |.
W
Dans ce cas, il y a un indice h pour lequel ξ = βh , et donc ξ 6 j∈J1..pK βj .
Ceci donne le point 1. Voyons le point 2.
On a aussi un indice ` pour lequel ζ = β` .
D’après le point 4 du lemme 2.2 il y a un entier m tel que
mβj ∧ βk = (1 + m)βj ∧ βk pour tous les j, k.
Ceci reste vrai en remplaçant βj et/ou βk par ξ ou ζ.
2
Propriétés de décomposition pour un groupe réticulé quotient
Proposition 2.16 Soit G un groupe réticulé et π : G → G0 un morphisme de passage au
quotient par un sous-groupe solide H.
1. Si G est de dimension 6 1, G0 l’est également.
2. Si G est à décomposition bornée, G0 l’est également.
3. Si G est à décomposition partielle et si G0 est discret, G0 est à décomposition partielle.
4. Si G est à décomposition complète et si G0 est discret, G0 est à décomposition complète.
5. Si G est discret à décomposition bornée et si H = α⊥ pour un α > 0, alors G0 est
isomorphe à C(α) et absolument borné.
Démonstration. 1. On doit montrer que dans le quotient, pour tous x, y on a un entier n tel
que y ∧ nx = y ∧ (n + 1)x. Or c’est déjà vrai avant de passer au quotient.
Pn
2. On considère un élément x ∈ G+ . On suppose que si x = i=1 xi avec des xi ∈ G+ , alors
l’un des xi est nul.
Pn
+
0
Supposons que l’on ait π(x) = i=1 π(yi ) avec
i ),
Pndes π(yi ) > 0 dans G . Comme π(y+i ) = π(y
−
on peut supposer les yi > 0. On a x = u + i=1 yi avec u ∈ H. On écrit u = u − u , on
remplace y1 par u+ + yP
1.
Pn
n
On a maintenant x = i=1 yi −
u− . On a donc u− 6 i=1 yi et par le théorème de Riesz
P
n
[18, XI-2.11 1 ], on écrit u− = i=1 ui avec 0 6 ui 6 yi . Enfin on remplace chaque yi par
26
Anneaux à diviseurs et anneaux de Krull
Pn
zi = yi − ui et l’on a x = i=1 zi avec des zi > 0, donc l’un des zi est nul, et pour cet
indice i, on a π(yi ) = π(zi ) = 0.
3. On considère une famille finie π(xi ) i∈I on calcule une base de factorisation partielle
de la famille (xi )i∈I . On supprime les éléments de cette base qui deviennent nuls dans le
quotient. Les éléments restants sont > 0 dans le quotient, et deux à deux orthogonaux.
4. Pour π(x) > 0 dans G0 , on considère une factorisation complète de x dans G. Il suffit de
vérifer la propriété suivante : si p est irréductible, alors π(p) est nul ou irréductible. Supposons
que π(p) = π(q) + π(r), tous > 0 dans G0 . On peut supposer q = q + et r = r+ .
On écrit p + u− = q + r + u+ avec u ∈ H. Le théorème de Riesz [18, XI-2.11 2 ] nous donne
des pi et vi > 0 satisfaisant
p = p1 + p2 + p3 , u− = v1 + v2 + v3 , p1 + v1 = q, p2 + v2 = r et p3 + v3 = u+ ,
d’où π(q) = 0 si p1 = 0 et π(r) = 0 si p2 = 0.
5. En effet G est de dimension 6 1 donc G0 ' C(α), qui est absolument borné.
2
Par contre la propriété pour un groupe réticulé d’être discret ne passe pas toujours au
quotient. Fort heureusement on a le lemme 2.4.
3
Propriétés de stabilité pour les anneaux à diviseurs
Localisations d’un anneau à diviseurs, 2
Théorème 3.1 Soient A un anneau à diviseurs, S un filtre ne contenant pas 0, et HS
le sous-groupe solide de Div A engendré par les divA (s) pour s ∈ S. On a les propriétés
suivantes.
1. L’anneau S −1 A = AS est un anneau à diviseurs et il y a un
unique morphisme de
groupes réticulés ϕS : Div A → Div AS tel que ϕS divA (a) = divAS (a) pour tout
a ∈ A∗ . Ce morphisme est surjectif, donc Div AS ' (Div A)/ Ker ϕS .
2. On a HS+ = { α ∈ Div A | ∃s ∈ S, 0 6 α 6 divA (s) }, et les diviseurs principaux
dans HS+ sont les éléments de divA (S).
3. Supposons que Div A = HS H 0 . Alors le morphisme ϕS est un morphisme de
passage au quotient par HS : il permet d’identifier Div AS au groupe réticulé quotient
(Div A)/HS ' H 0 .
Démonstration. 1. C’est le théorème 1.22.
2. En notant H1 = { α ∈ Div A | ∃s ∈ S, 0 6 α 6 divA (s) }, on vérifie facilement que H1 +
H1 ⊆ H1 et que H1 − H1 est un sous-groupe solide dont la partie positive est égale à H1 .
3. Il est clair que ϕS est surjectif et que HS ⊆ Ker ϕS . On doit montrer l’inclusion réciproque.
Un élément du noyau s’écrit α = divA (a1 , . . . , ak ) pour une suite (a1 , . . . , ak ) de profondeur > 2 dans AS . On peut supposer que les ai sont dans A. Si α = α1 + α2 avec α1 ∈ HS
et α2 ∈ H 0 , on a ϕS (α) = ϕS (α2 ). On peut donc supposer α ⊥ HS , c’est-à-dire que la
suite (a1 , . . . , ak , s) est de profondeur > 2 dans A pour tout s ∈ S. On est donc ramené
à montrer que si (a1 , . . . , ak ) est de profondeur > 2 dans AS et (a1 , . . . , ak , s) est de profondeur > 2 dans A pour tout s ∈ S, alors (a1 , . . . , ak ) est de profondeur > 2 dans A. Soit
donc une suite (c1 , . . . , ck ) proportionnelle à (a1 , . . . , ak ). Il existe c ∈ A∗ et s ∈ S tels
que sci = cai pour i ∈ J1..kK. Ceci implique que les suites (a1 , . . . , ak , s) et (c1 , . . . , ck , c) sont
proportionnelles, donc il existe d ∈ A∗ tel que (c1 , . . . , ck , c) = d(a1 , . . . , ak , s). En particulier
(c1 , . . . , ck ) = d(a1 , . . . , ak ), ce qui termine la démonstration.
2
T. Coquand, H. Lombardi
27
Anneaux avec groupe des diviseurs de dimension 1
Lemme 3.2 Soit A un domaine de Bezout avec Div A de dimension 6 1. Pour un a ∈ A∗
les propriétés suivantes sont équivalentes.
1. a ∈ Rad A.
2. Div A = C divA (a) .
Démonstration. 1 ⇒ 2. L’anneau est de Bezout donc tous les diviseurs sont principaux. Pour
un b ∈ A∗ arbitraire, puisque Div A est de dimension 6 1, par le point 2 du lemme 2.2, on
écrit b = b1 b2 avec b1 et b2 ∈ A∗ , b1 | an et divA (a, b2 ) = 0. Puisque l’anneau est de Bezout,
1 ∈ ha, b2 i, et puisque a ∈ Rad A, b2 ∈ A× . Donc divA (b) = divA (b1 ) ∈ C(a).
2 ⇒ 1. Pour tout b ∈ A∗ on a un n ∈ N tel que b | an . Si b = 1 + ax, on a hb, ai = h1i,
donc hbi = hb, an i = h1i.
2
Proposition 3.3 Soit A un anneau à diviseurs de dimension de Krull 6 1. Alors Div A est
de dimension 6 1.
Démonstration. Les anneaux à diviseurs de dimension 6 1 sont des domaines de Prüfer
(théorème 1.19). On utilise alors la propriété de factorisation des idéaux de type fini fidèles
dans un domaine de Prüfer de dimension 6 1 donnée par [18, théorème XII-7.2].
On pourrait aussi argumenter (( plus directement )) en montrant que la dimension de Krull
d’un domaine de Prüfer est égale à la dimension de son groupe des diviseurs.
2
La proposition qui suit est un corollaire du théorème 3.1.
Proposition 3.4 Soit A un anneau à diviseurs et S le filtre engendré par un s ∈ A∗ (i.e.
l’ensemble des x qui divisent une puissance de s). D’après le théorème 3.1, l’anneau AS est
aussi un anneau à diviseurs.
1. Si Div A est discret de dimension 1, il en va de même pour Div AS .
2. Si en outre Div A est à décomposition partielle ou à décomposition bornée ou à
décomposition complète, il en va de même pour AS .
3. Si A est noethérien cohérent fortement discret, alors AS est également noethérien
cohérent fortement discret.
Démonstration. On a HS = C(div(s)) = { ξ ∈ Div A | ∃n ∈ N, |ξ| 6 n div(s) }.
1 et 2. On conclut avec le lemme 2.4 et la proposition 2.16.
3. Résultat classique (cf. [18, principe local-global XII-7.13]).
2
Théorème 3.5
Soient A un anneau à diviseurs avec Div A discret de dimension 1, α un diviseur > 0
et Sα = { x ∈ A∗ | div(x) ⊥ α }. Il est clair que Sα est un filtre détachable, et le théorème 3.1
s’applique. On a les propriétés suivantes.
1. L’anneau Sα−1 A est un anneau à diviseurs avec Div(Sα−1 A) ' C(α).
En particulier Sα−1 A est un anneau de valuation discrète si, et seulement si, C(α) est
isomorphe à (Z, >).
2. Les propriétés suivantes sont équivalentes.
(a) α est un diviseur irréductible.
(b) C(α) = Zα.
(c) Idv(α) est un idéal premier.
(d) Sα est un filtre premier de hauteur 6 1 et A = Sα ∪ Idv(α) (union disjointe de
deux parties détachables).
28
Anneaux à diviseurs et anneaux de Krull
(e) Sα−1 A est un anneau de valuation discrète et si p/1 est une uniformisante, on a
α = divA (p) mod C(α)⊥ .
3. Si en outre l’anneau A est cohérent, les quatre ensembles suivants sont égaux (on
rappelle, théorème 1.13, que α 7→ Idv(α) établit une bijection entre les diviseurs
irréductibles et les idéaux divisoriels finis premiers 6= h1i).
— Les idéaux divisoriels finis premiers 6= h1i.
— Les idéaux de type fini premiers q 6= h0i tels que div(q) > 0.
— Les idéaux de type fini premiers q 6= h0i , h1i tels que q = Idv(q).
— Les idéaux de type fini premiers détachables de hauteur 1.
Démonstration. 1. On a Div A = C(α) C(α)⊥ . On applique donc le point 3 du théorème 3.1.
On a (mêmes notations) HSα = C(α)⊥ , donc Div(Sα−1 A) ' C(α).
Pour la dernière affirmation on applique le lemme 1.21.
2. Notons d’abord que puisque α > 0, Div A n’est pas nul, et A n’est pas un corps. Par
ailleurs les hypothèses impliquent que A est à divisibilité explicite, et que Sα et Idv(α) sont
deux parties détachables disjointes de A.
2a ⇔ 2b. D’après le lemme 2.5.
2a ⇔ 2c. D’après le théorème 1.13.
2d ⇒ 2c, et 2e ⇒ 2c. Clair.
2a ⇒ 2d et 2e. D’après le point 1 et puisque C(α) = Zα ' Div(Sα−1 A), l’anneau Sα−1 A
est un anneau de valuation discrète, et α vu dans Sα−1 A est égal à div( p1 ) si p engendre le
radical. Il reste à voir que le complémentaire de Sα est bien l’idéal Idv(α) (qui est alors
premier de hauteur 1 par définition). Tout diviseur ξ > 0 s’écrit nξ α + ρ avec nξ ∈ N et ρ ⊥ α
(lemme 2.5). Par définition Idv(α) = { x ∈ A | ξ = divA (x) > α }. Dans la décomposition
précédente, cela signifie que nξ > 0, tandis que x ∈ Sα signifie nξ = 0. On a donc bien deux
parties complémentaires de A.
3. Les trois premiers ensembles sont égaux d’après le corollaire 1.15. Il reste à montrer que p
est un idéal de type fini premier détachable de hauteur 1 si, et seulement si, on a div(p) > 0.
L’implication ⇐ est donnée par 2c ⇒ 2d.
L’implication ⇒ est donnée par le lemme 1.23.
2
Stabilité pour les anneaux de polynômes
Dans ce paragraphe, A est un anneau à diviseurs .
Pour p ∈ A[X] = A[X1 , . . . , Xn ], on note c(p) pour cA,X (p).
Lemme 3.6 Une fraction p/q dans K(X) (avec p et q ∈ A[X]) est dans A[X] si, et seulement si, p/q ∈ K[X] et div(c(q)) 6 div(c(p)). Autrement dit, pour
q divise p
p, q ∈ A[X],
dans A[X] si, et seulement si, q divise p dans K[X] et div c(q) 6 div c(p) .
Démonstration. La condition est évidemment nécessaire. Montrons qu’elle est suffisante.
Puisque q divise p dans K[X] on écrit qr = ap avec a ∈ A∗ et r ∈ A[X]. On veut montrer
que r/a ∈ A[X]. Or div c(r) > div(a), car
div c(q) + div c(r) = div(a) + div c(p) .
Et puisque a ∈ A∗ cela signifie que a divise tous les coefficients de r.
2
Le théorème suivant est une version constructive non noethérienne du théorème qui
affirme que si A est un anneau de Krull, il en est de même pour A[X] (voir le théorème 3.8
et [22, théorème 12.4]).
T. Coquand, H. Lombardi
29
Théorème 3.7 Soit A un anneau à diviseurs de corps de fractions K. L’anneau A[X] est
également à diviseurs. En outre on a un isomorphisme naturel de groupes réticulés
∼
Div(A[X]) −→
divA[X] (f ) 7−→
Div(K[X]) × Div A, avec
divK[X] (f ), divA (c(f ) pour (f ∈ A[X]).
Démonstration.
Le groupe de divisibilité de A[X] est G = K(X)× /A× , celui de K[X] est H = K(X)× /K∗ .
Puisque K[X] est un anneau à pgcd, Div(K[X]) est simplement le groupe H, en passant en
notation additive.
Pour un f ∈ K(X)× nous notons fG sa classe dans G et fH sa classe dans H. Nous notons 4
la relation de divisibilité dans ces groupes.
On a un morphisme de groupes ordonnés ϕ : G → G0 = H × Div A donné par
ϕ(fG ) = fH , div c(p) − div c(q)
où f = p/q avec p, q ∈ A[X].
D’après le lemme 3.6, ce morphisme est un isomorphisme sur son image, ce qui permet
d’identifier G à un sous-groupe ordonné de G0 .
On va montrer que ϕ satsifait les requêtes du projet divisoriel 2. Il nous reste à voir que tout
élément ∆ = (fH , δ) du groupe réticulé G0 est borne inférieure d’une famille finie dans G.
On peut supposer ∆ > 0. Cela signifie que δ > 0 et fH = uH pour un u dans A[X]. Cela
donne ∆ = (uH , δ).
Pour b ∈ A∗ , on a div c(bu) = div(b)
+ div c(u) .
Soient b tel que div(b) > δ−div c(u) et w = bu ∈ A[X], alors ϕ(wG ) = (uH , δ1 ) avec δ1 > δ.
L’idéal c(u) de A admet un inverse divisoriel qui peut être écrit sous la forme c(v) pour
un v ∈ A[X]. On a donc
div c(uv) = div c(u) + div c(v) = div(a)
pour un a ∈ A∗ (voir le lemme 1.17). En outre δ = div c(r) avec r ∈ A[X].
0
On pose w0 = uvr/a, on a ϕ(wG
) = (uvr)H , δ , et uH 4 (uvr)H .
0
) dans G0 .
2
Finalement ∆ = (uH , δ) = ϕ(wG ) ∧ ϕ(wG
Un corollaire immédiat est le théorème suivant.
Théorème 3.8 Soit A un anneau à diviseurs. Si le groupe réticulé Div A est discret, ou
de dimension 1, ou à décomposition partielle, ou a décomposition bornée, il en va de même
pour Div(A[X]).
Démonstration. Ceci résulte de ce que Div(A[X]) ' Div A × Div(K[X]) (théorème 3.7) et
de ce que Div(K[X]) est discret et à décomposition bornée (a fortiori de dimension 1 et à
décomposition partielle).
2
Stabilité pour les extensions entières intégralement closes
Lemme 3.9 Soit A un anneau intégralement clos de corps de fractions K et L ⊇ K un
corps discret. Soit B la clôture intégrale de A dans L. Soient a, a0 , a1 , . . ., an dans A.
1. L’élément a divise a0 dans A si, et seulement si, il divise a0 dans B.
2. L’élément a est un pgcd fort de (a1 , . . . , an ) dans A si, et seulement si, il l’est dans
B.
Démonstration. 1. Supposons que x = a0 /a ∈ K soit dans B, on doit montrer qu’il est
dans A. Cela résulte de ce que tout élément de B est entier sur A : x ∈ K ∩ B est entier
sur A donc dans A.
30
Anneaux à diviseurs et anneaux de Krull
2. Vu le point 1, l’affirmation dans B est plus forte que celle dans A. Comme la notion de
pgcd fort est stable par multiplication par un élément de A∗ , on peut supposer que a = 1
est pgcd fort des ai dans A et on doit montrer qu’il l’est dans B. Ainsi on doit montrer que
si b ∈ B divise ya1 , . . . , yan dans B (y ∈ B), alors l’élément z = y/b de L est dans B. Pour
cela il suffit de montrer que z est entier sur A. Par hypothèse zai ∈ B pour chaque i.
On dispose de polynômes unitaires gi ∈ A[X] qui annulent les zai , et fournissent autant de
i
polynômes de K[X] qui annulent z : fi (z) = gi (zai )/am
i . On peut calculer dans K[X] le
pgcd unitaire f de ces derniers polynômes
P
f (X) = X m + k<m cm−k X k .
Alors pour chaque i, le polynôme am
i f (X/ai ) divise gi dans K[X], donc ses coefficients c1 ai ,
c2 a2i , . . ., cm am
sont
dans
A
par
le
théorème de Kronecker, parce que A est intégralement
i
clos. Par exemple les c2 a2i sont dans A. Les a2i sont de pgcd fort 1 donc c2 ∈ A. De même
chaque ck est dans A. Et l’on a bien z entier sur A.
2
Définition et notation 3.10 Pour toute liste (a1 , . . . , an ) = (a) dans A, on note K(a) (T )
Pn
le polynôme j=1 aj T j−1 . On dit que c’est le polynôme de Kronecker associé à la liste
ordonnée (a).
Si (b) = (b1 , . . . , bm ) est une autre liste on définit (a) ? (b) par l’égalité K(a)?(b) = K(a) K(b) .
Si A est un anneau à diviseurs, le corollaire 1.17 implique que
divA (a) + divA (b) = divA (a) ? (b) .
Lemme 3.11 Soit A un anneau à diviseurs de corps de fractions K et L ⊇ K un corps
discret. Soit B la clôture intégrale de A dans L.
Pour toute liste (b) = (b1 , . . . , bn ) dans B∗ il existe une liste (b0 ) = (b01 , . . . , b0m ) telle que la
liste (b) ? (b0 ) soit dans A et admette un pgcd fort dans A∗ .
Démonstration. On considère l’anneau B1 = A[b1 , . . . , bn ] qui est un A-module de type fini.
En fait B1 est un quotient d’un anneau C (non nécessairement
Pn intègre) qui est une A-algèbre
libre de rang fini 13 . On considère le polynôme B = K(b) = k=1 bk T k−1 vu dans C[T ], puis
e ∈ C[T ].
l’élément cotransposé B
e et en revenant de C à B1 , cela nous
Soit NB = NC[T ]/A[T ] (B) ∈ A[T ]. On a NB = B B,
donne un C ∈ B1 [T ] avec BC = NB . Si C = K(c) et NB = K(d) on a (b) ? (c) = (d).
La liste (d) de A admet une inverse divisorielle (a1 , . . . , aq ) = (a) dans A. Ainsi (d) ? (a)
admet un pgcd fort g dans A∗ . Le point 2 du lemme 3.9 nous dit que (d) ? (a) admet le
pgcd fort g dans B. Finalement on obtient que la liste (b) ? (c) ? (a) est dans A[T ] et qu’elle
admet g pour pgcd fort (dans A∗ comme dans B∗ ). Ainsi, la liste (b0 ) = (c) ? (a) satisfait les
requêtes voulues.
2
Théorème 3.12 Soit A un anneau à diviseurs de corps de fractions K et L ⊇ K un corps
discret. Soit B la clôture intégrale de A dans L.
1. L’anneau B est un anneau à diviseurs.
2. On a un unique morphisme de groupes réticulés ϕ : Div A → Div B tel que
ϕ divA (a) = divB (a) pour a ∈ A.
Ce morphisme est injectif : cela permet d’identifier Div A à un sous-groupe réticulé
de Div B.
3. Soit x ∈ B et f un polynôme unitaire de A[X] (de degré d) qui annule x. Avec
ξ = divB (x) et D le ppcm des entiers ∈ J1..dK, on a des éléments γk ∈ Div A ⊆
Div
V B dans le sous-groupe engendré par les diviseurs des coefficients de f , tels que
k |Dξ − γk | = 0.
13. On peut prendre C = A[X1 , . . . , Xn ]/hh1 (X1 ), . . . , hn (Xn )i où hi ∈ A[Xi ] est unitaire. Notons que le
polynôme NB est un polynôme régulier de A[T ] (NB (0) = NC/A (b1 )).
T. Coquand, H. Lombardi
31
Démonstration. 1. Toute liste dans B∗ admet une inverse divisorielle d’après le lemme 3.11.
V
2. L’unicité si existenceVest claire car l’élément divA (a1 , . . . , an ) = i divA (ai ) de (Div A)+
doit avoir pour image i divB (ai ) = divB (a1 , . . . , an ).
Pour l’existence, montrons d’abord que l’on peut définir une application ϕ de (Div A)+
dans (Div B)+ en posant
ϕ(δ) = divB (a1 , . . . , an ) si δ = divA (a1 , . . . , an ) pour des ai dans A∗ .
Le lemme 3.9 nous dit que δ = 0 implique ϕ(δ) = 0.
Supposons que divA (a1 , . . . , an ) = divA (a01 , . . . , a0m ). Il existe donc une liste (x) dans A telle
que les familles (ai xj )i,j et (a0i xj )i,j admettent un même pgcd fort g dans A. Le lemme 3.9
nous dit que les familles (ai xj )i,j et (a0i xj )i,j admettent aussi le pgcd fort g dans B, donc
divB (a) + divB (x) = divB (g) = divB (a0 ) + divB (x),
d’où divB (a) = divB (a0 ). Ceci montre que ϕ est bien définie.
Montrons que ϕ est injective. Si divB (a1 , . . . , an ) = divB (a01 , . . . , a0m ), on considère une
liste (x) dans A telle que la liste (ai xj )i,j admette un pgcd fort g dans A. C’est aussi un
pgcd fort dans B, donc divB (a) + divB (x) = divB (g). Donc divB (a0 ) + divB (x) = divB (g),
ce qui signifie que la liste (a0i xj )ij admet le pgcd fort g dans B. Comme c’est une liste
dans A, elle admet aussi g comme pgcd fort dans A. Donc divA (a0 ) + divA (x) = divA (g).
Et divA (a) = divA (a0 ).
L’application ϕ que l’on vient de définir est un morphisme injectif de monoı̈des positifs,
de (Div A)+ dans (Div B)+ et s’étend de manière unique en un morphisme de groupes
réticulés, de Div A dans Div B (vérification laissée au lecteur).
Pd
3. Soit f (X) = j=1 aj X j ∈ A[X] avec ad = 1 et f (x) = 0. On considère les αj = divB (aj xj )
pour les aj ∈ A∗ . Le fait 2.14 nous dit que
V
j
k
j>k, aj ,ak ∈A∗ divB (aj x ) − divB (ak x ) = 0.
Or
divB (aj xj ) − divB (ak ξ k ) = (j − k) divB (x) − divB (ak ) − divB (aj )
V
+
+
et divB (x) > 0. On a donc j>k Dξ − αjk
= 0 pour des αjk
∈ (Div A)+ .
2
Théorème 3.13 Soit A un anneau à diviseurs de corps de fractions K et L ⊇ K un corps
discret. Soit B la clôture intégrale de A dans L (qui est un anneau à diviseurs d’après le
théorème précédent).
1. Si L admet une base discrète sur K et si Div A est discret (i.e. A est à divisibilité
explicite), alors Div B est discret.
2. Si Div A est de dimension 6 1, il en va de même pour Div B.
Démonstration. 1. On doit tester z ∈ B pour un z ∈ L. Puisque L admet une base discrète
sur K, on peut calculer le polynôme minimal f (X) de z sur K. Et par le théorème de
Kronecker, z est zéro un polynôme unitaire de A[X] si, et seulement si, son polynôme
minimal sur K est dans A[X].
V
2. Le point 3 du théorème 3.12 donne j |Dξ − γj | = 0 pour des γj ∈ (Div A)+ . On a un
résultat du même type pour ζ = div(z). On aura donc une double égalité
V
V
+
+
h Dξ − βh = 0 =
h M ζ − βh
où les βh ∈ Div A. Par le lemme 2.15 on obtient C(Dξ) ⊆ C(M ζ) C(M ζ)⊥ .
Enfin C(Dξ) = C(ξ) et C(M ζ) = C(ζ).
2
32
Anneaux à diviseurs et anneaux de Krull
Autres propriétés de stabilité
La proposition suivante est une sorte de réciproque du théorème 3.12 dans un cas
particulier.
Proposition 3.14 Soit B un anneau à diviseurs, Γ un groupe fini d’automorphismes de B
et A = BΓ le sous-anneau des points fixes de Γ. Alors A est un anneau à diviseurs.
Démonstration. Tout d’abord, A est intégralement clos parce que B est intégralement clos.
Par ailleurs B est entier sur A parce que Γ est fini. Donc B est la clôture intégrale de A
dans Frac(B), ce qui nous amène, à la fin de la démonstration, dans la situation du théorème 3.12.
On considére une liste finie dans A pour laquelle on cherche une inverse divisorielle. Cette
liste donne les coefficients d’un polynôme f ∈ A[X]. Comme la liste admet une inverse
divisorielle dans B, il existe g, h ∈ B[X] et d ∈ B∗ tels que
f g = d h et GrB (c(h)) > 2.
(∗)
En transformant (∗) par les σ ∈ Γ et en faisant le produit des égalités obtenues on a une
égalité
Q
f N G = D H avec N = |Γ| , G = σ∈Γ σ(g), etc.
On écrit ceci sous la forme
f (f N −1 G) = D H où G, H ∈ A[X] et D ∈ A
(#)
On a GrB (c(H)) > 2 car GrB (c(h)) > 2. On applique alors le point 2 du lemme 3.9 et on
obtient GrA (c(H)) > 2. Ainsi (#) fournit un inverse divisoriel de l’idéal c(f ) dans A.
2
Exemple. Soit k un corps discret de caractéristique 6= 2, B = k[X] l’anneau des polynômes
en n indéterminées (n > 2) et A le sous-anneau des polynômes pairs. Alors A est un anneau
à diviseurs, en tant qu’égal à BΓ , avec Γ = hσi, où σ échange Xi et −Xi pour chaque i. On
a par exemple dans A un diviseur irréductible non principal divA (gX1 , gX2 ) pour chaque
polynôme irréductible impair g dans B (divB (gX1 , gX2 ) = divB (g)).
4
Anneaux de Krull
Définition et premières propriétés
Définition 4.1 On appelle anneau de Krull un anneau à diviseurs non trivial dont le groupe
des diviseurs est discret et à décomposition bornée.
Un corps discret est un anneau de Krull dont le groupe des diviseurs est nul. Ce sont
les autres anneaux de Krull qui nous intéressent, ceux pour lesquels existent des diviseurs
strictement positifs.
Définition 4.2 Un anneau à diviseurs est dit à décomposition complète (resp. à décomposition partielle) si son groupe des diviseurs est à décomposition complète (resp. à décomposition
partielle).
Exemples. 1) Si k = Z ou un corps discret, k[X1 , . . . , Xn ] est un anneau à pgcd à divisibilité
explicite et l’on montre facilement que c’est un anneau de Krull. Il est à décomposition
complète lorsque k = Z et pour certains corps discrets, comme Q et ses extensions finies, ou
les corps algébriquement clos.
T. Coquand, H. Lombardi
33
2) Un anneau de valuation discrète est évidemment un anneau de Krull local de dimension 1.
Pour une réciproque voir le lemme 4.5.
3) Les exemples de base d’anneaux de Krull à décomposition complète sont les anneaux
factoriels et les domaines de Dedekind, à condition qu’ils soient à factorisation totale. Voir
aussi le théorème 4.14.
Le fait qui suit rassemble des conséquences de la proposition 2.10 concernant les groupes
réticulés lorsqu’on l’applique au groupe des diviseurs. Le point 3 nous donne une version de
[8, théorème 1, §1.19], que nous reprenons ici dans un cadre constructif plus général. C’est
un outil très utile qui remplace souvent de manière efficace la propriété de décomposition
complète.
Fait 4.3
1. Un anneau à diviseurs à décomposition complète est un anneau de Krull.
2. En mathématiques classiques, les deux notions sont équivalentes car tout groupe
réticulé discret à décomposition bornée est alors à décomposition complète 14 .
3. Un anneau de Krull est à décomposition partielle.
4. Le groupe des diviseurs d’un anneau de Krull A est de dimension 6 1 : pour tout
α ∈ Div A on a Div A = C(α) C(α)⊥ .
Le théorème suivant nous donne un exemple paradigmatique d’anneau de Krull.
Théorème 4.4
1. Un anneau géométrique intégralement clos est un anneau de Krull.
2. La clôture intégrale d’un anneau géométrique intègre dans son corps de fractions est
un anneau de Krull.
Démonstration. 1. Cas particulier de 2.
2. Avec un changement de variables on obtient une mise en position de Noether qui
fait apparaı̂tre l’anneau géométrique A comme une extension finie d’un anneau de polynômes C = k[X1 , . . . , Xr ]. L’anneau C est un anneau à pgcd à factorisation bornée, donc
un anneau de Krull. Si A est intègre, Frac A est une extension finie de k(X1 , . . . , Xr ). On
conclut alors par le théorème 4.17.
2
Concernant le cas crucial des anneaux de valuation discrètes, la situation en mathématiques constructives est un peu plus délicate qu’en mathématiques classiques comme l’indique
le lemme suivant, qui complète le lemme 1.21. En mathématiques classiques tout anneau de
Krull est à décomposition complète et les cinq points sont équivalents.
Lemme 4.5 (Anneaux de valuation discrète, 2)
Soit A un anneau à diviseurs et un α > 0 dans Div A (par exemple α = div(a) avec
a ∈ A∗ \ A× ). Considérons les propriétés suivantes.
1. A est un anneau de valuation discrète.
2. A est un anneau de Krull local de dimension 1.
3. A est un anneau de Krull local et Div A = C(α).
4. A est un anneau principal local à factorisation bornée et Div A = C(α).
5. Div A est discret et | Div A : Zα | 6 k pour un k > 0.
14. On notera que pour ce point la démonstration classique utilise le tiers exclu (pour le test d’irréductibilité
d’un diviseur) mais pas l’axiome du choix.
34
Anneaux à diviseurs et anneaux de Krull
On a l’implication 1 ⇒ 2, et les équivalences 2 ⇔ 3 ⇔ 4 ⇔ 5.
L’implication 2 ⇒ 1 est valable si A est à décomposition complète.
Démonstration. Dans chacun des points on a Div A discret, i.e. A à divisibilité explicite.
4 ⇒ 3, 1 ⇒ 5, et 1 ⇒ 2. Clair.
2 ⇒ 3, 4 et 5. En tant qu’anneau à diviseurs local de dimension 1, A est un anneau de
valuation (théorème 1.19). Pour un ξ ∈ (Div A)+ arbitraire, on considère une base de décomposition partielle (π1 , . . . , πr ) pour (α, ξ). Les πi sont deux à deux orthogonaux, et dans
un anneau de valuation deux diviseurs > 0 sont toujours comparables. Donc un et un
seul des πi , par exemple π1 , est > 0. On a donc α = `π1 pour un ` > 1, ξ = mπ1 pour
un m > 0, d’où Zπ1 ⊆ Div A ⊆ Qα. Enfin si k majore le nombre d’éléments non nuls dans
une écriture de α comme somme d’éléments > 0, on aura nécessairement | Div A : Zα | 6 k
1
Zα.
et Div A ⊆ k!
3 ⇒ 2. On note que C(α) est absolument borné. Le point 1 du théorème 4.10 nous dit que A
est un anneau principal, donc de dimension 6 1. Il s’agit en fait d’un anneau de valuation et
comme ce n’est pas un corps, il est de dimension exactement 1.
1
5 ⇒ 4. De l’inégalité | Div A : Zα | 6 k on déduit que Zα ⊆ Div A ⊆ k!
Zα. Donc Div A
est à décomposition bornée et absolument borné, donc A est un anneau de Krull principal
(théorème 4.10). Il reste à montrer que A est un anneau local. Supposons que x + y est
inversible. Les diviseurs div x et div y s’expriment sous forme mπ et nπ pour un π ∈ Div A.
Comme 0 = div(x + y) > div(x) ∧ div(y), on a bien div(x) ou div(y) nul.
4 ⇒ 1 (lorsque A est à décomposition complète) : si α est minoré par un diviseur irréductible π,
il est clair que Div A = Zπ.
2
Théorème d’approximation simultanée et conséquences
Le point 2 du théorème suivant nous donne une version de [8, théorème 2, §1.20] dans un
cadre constructif plus général.
Théorème 4.6 (Théorème d’approximation simultanée) Soit A un anneau de Krull.
1. Soient (π1 , . . . , π
r ) des diviseurs
P
P > 0 deux à deux orthogonaux et (n1 , . . . , nk ) dans
N. Notons π = i πi et α = i ni πi . Il existe a ∈ A∗ tel que divA (a) = α + ρ avec
ρ > 0 et ρ ⊥ π (a fortiori ρ ⊥ α).
2. Pour tout α ∈ (Div A)+ et tout γ > α on peut trouver a ∈ A∗ tel que div a = α + ρ
avec ρ > 0 et ρ ⊥ γ.
Démonstration. 1. On suppose en un premier temps les πj irréductibles.
Pour chaque i ∈ J1..kK on va trouver un xi tel que
P
divA (xi ) = ni αi + βi , βi = j6=i mj πj + ρi avec mj > nj + 1 et ρi ⊥ π
(∗)i .
Construisons par exemple x1 . Nous considérons γ1 = (n1 −1)π1 +π. C’est un diviseur que l’on
écrit divA (c1 , . . . , cm ) pour des ci ∈ A∗ . On considère une base de décomposition partielle
pour (π1 , . . . , πr , c1 , . . . , cm ).
Comme elle ne raffine aucun des πi , pour l’un des cj , qui est le x1 recherché, la condition (∗)1
est réalisée.
P
Une fois les xi construits on considère x = i xi . On calcule une base de décomposition
partielle pour (x, x1 , . . . , xr ). Comme
elle ne raffine pas les πi on peut appliquer le lemme 4.7,
Pr
et l’on obtient que divA (x) = i=1 ni πi + ρ avec ρ ⊥ π.
Voyons le cas général. On reprend le calcul précédent. Si à une étape du calcul un ou plusieurs
des πj se décomposent, on remplace (π1 , . . . , πr ) par la liste raffinée et on reprend tous les
T. Coquand, H. Lombardi
35
calculs depuis le début. Cet inconvénient ne peut se produire qu’un nombre fini de fois. À la
fin le calcul se déroule comme si les πi étaient irréductibles.
2. On considère
P une base de décomposition partielle (π1 , . . . , πr ) pour (α, γ).
On écrit α = i∈J1..rK ni πi et on applique le point 1.
2
Lemme 4.7 Soit A un anneau à diviseurs avec
P Div A discret.
On suppose donnés (x1 , . . . , xn ) dans A∗ , avec i xi = 0, et (π1 , . . . , P
πr ) une base de décomr
position partielle pour (ξ1 , . . . , ξn ) (où ξi = divA (xi )). On écrit ξi = i=j nij πj . Alors pour
chaque j ∈ J1..rK, la valeur minimum de nij est atteinte au moins deux fois.
P
V
Démonstration.
Puisque i xi = 0 on a pour chaque i ∈ J1..nK ξi > k6=i ξk , ce qui donne
V
nij > k6=i nkj pour chaque j ∈ J1..rK. En particulier si nij est la plus petite valeur (pour
ce j fixé), cet entier doit être égal à l’un des nkj pour k 6= i.
2
On obtient maintenant des corollaires importants du théorème 4.6.
Théorème 4.8 (Théorème un et demi pour les anneaux de Krull)
Soit A un anneau de Krull et α ∈ (Div A)+ .
1. Pour tout a ∈ A∗ tel que α 6 div(a) il existe b ∈ A∗ tel que
α = div(a) ∧ div(b) = div(an ) ∧ div(b) pour tout n ∈ N∗ .
2. Pour tout c ∈ K∗ tel que div(c) 6 α il existe d ∈ K∗ tel que α = div(c) ∨ div(d).
Démonstration. 1. On pose γ = div(a). Le théorème 4.6 nous donne un b ∈ A tel que
div(b) = α + ρ avec ρ > 0 et ρ ⊥ γ. Par suite, pour n ∈ N∗
div(b) ∧ div(an ) = (α + ρ) ∧ nγ = (α ∨ ρ) ∧ nγ = (α ∧ nγ) ∨ (ρ ∧ nγ) = α ∨ 0 = α.
2. Soit a avec div(a) > α puis β = div(a) − α. On a div(c) 6 α, donc 0 6 β 6 div( ac )
avec ac ∈ A∗ . Le point 1. nous donne un e ∈ A∗ tel que β = div( ac , e), donc
α = div(a) − β = div(a) + div( ac ) ∨ div( 1e ) = div(c) ∨ div( ae ),
d’où le résultat avec d = ae .
2
Corollaire 4.9 Soit A un anneau de Krull, et a, b ∈ A∗ . Il existe c et d ∈ A∗ tels que
c
a
=
et divA (a, b, c, d) = 0.
b
d
D’où l’on déduit (en choissant de mettre a en valeur) :
• ha, bi ha, ci = a ha, b, c, di,
• divA (a, b) + divA (a, c) = divA (a),
• Idv(a, b) = (a : c)A et Idv(a, c) = (a : b)A .
En particulier, pour tout diviseur α > 0, et tout a ∈ A∗ tel que div(a) > α, il existe c ∈ A∗
tel que Idv(α) = (a : c)A .
Démonstration. Posons α = divA (a, b) et β = div(a) − α( 15 ). En appliquant le théorème un
et demi à β et a, il existe c ∈ A∗ tel que β = div(a, c). Puisque α + β = div(a) on obtient
que ha, bi ha, ci admet a pour pgcd fort. En particulier bc est divisible par a, on écrit bc = ad
et l’on obtient ha, bi ha, ci = a ha, b, c, di donc div(a, b, c, d) = 0.
Le dernier point résulte de ce que
div(a, b) = div(a) − div(a, c) = div(1) ∨ div( ac ),
donc Idv(a, b) = A ∩ ac A.
2
15. Si A est cohérent on peut prendre β = divA (b) où b = (a : ha, bi) = (a : b)
36
Anneaux à diviseurs et anneaux de Krull
Remarque. Si A est un domaine de Prüfer possédant la propriété un et demi (par exemple s’il
est de dimension 6 1), on a la même propriété sous une forme plus forte : div(a, b, c, d) = 0
est remplacé par ha, b, c, di = h1i.
Le théorème 4.10 est une version constructive du théorème suivant en mathématiques
classiques : un anneau de Krull avec seulement un nombre fini de diviseurs irréductibles est
un anneau principal (conséquence de [22, théorème 12.2]).
Théorème 4.10 Soit A un anneau de Krull.
1. Si Div A est absolument borné, A est un anneau principal.
2. Si Div A est engendré par les diviseurs irréductibles (π1 , . . . , πr ), on obtient en outre
— A est un anneau principal à factorisation
totale,
Qr
— si πi = divA (pi ), l’élément q = i=1 pi engendre l’idéal Rad A,
— les idéaux maximaux détachables de A sont les hpi i.
3. Pour un a ∈ A∗ les propriétés suivantes sont équivalentes.
(a) Div A = C divA (a) (qui est absolument borné).
(b) A est un anneau principal et a ∈ Rad A.
Démonstration. 2. Tout d’abord, il est clair que Div A est à décomposition complète. Comme
un diviseur orthogonal à tous les πi est nul,
P pour tous (n1 , . . . , nr ) dans N, le théorème 4.6
nous donne un a ∈ A∗ tel que divA (a) = i ni πi . Ainsi tout diviseur est principal, autrement
dit A est un anneau à pgcd.
Montrons maintenant que A est un anneau de Bezout. Pour cela il suffit de montrer que
si b et c ont pour pgcd 1, ils sont comaximaux. On écrit
P
P
div(b) = i∈I mi πi , div(c) = i∈J mi πi avec les mi > 0 et I ∩ J = ∅.
Q
Soit K = J1..rK \ (I ∪ J) et d = k∈K pk . Alors div(b + cd) = 0 par le lemme 4.7 (dans la
décomposition des trois éléments div(b), div(cd) et div(b + cd), la valeur minimum 0 doit
être atteinte au moins deux fois sur chaque composante πi ). Ainsi b + cd ∈ A× , et hb, ci = 1.
Montrons que q ∈ Rad A. I.e., pour x ∈ A∗ , 1 + xq ∈ A× (ou encore divA (1 + xq) = 0).
Dans la décomposition des trois éléments divA (1), divA (1 + xq) et divA (xq), la valeur
minimum 0 doit être atteinte au moins deux fois sur chaque composante πi (lemme 4.7).
Montrons que Rad A ⊆ hqi. Si b ∈ A et si un des pi ne figure pas dans les diviseurs de b,
on a hb, pi i = 1 et donc 1 + xb = ypi pour x et y convenables, donc 1 + xb n’est pas inversible.
On laisse à la lectrice le soin de montrer que les hpi i sont les idéaux maximaux détachables.
1. Les démonstrations dans le point 2 fonctionnent en remplaçant les πi du point 2 par des
bases de décomposition partielle pour les éléments de A qui définissent les diviseurs qui
entrent dans la preuve. Les détails sont laissés au lecteur.
3b ⇒ 3a. D’après le lemme 3.2.
3a ⇒ 3b. L’anneau est principal d’après le point 1 Concernant a ∈ Rad A on reprend la
preuve du point 2 en s’appuyant sur des bases de décomposition partielle.
2
Remarques. 1) Dans le point 3a on ne peut pas remplacer l’hypothèse par la simple existence
d’un élément régulier dans Rad A : il y a des anneaux factoriels locaux de dimension de
Krull arbitraire.
2) En mathématiques classiques tout anneau de Krull A avec Div A absolument borné relève
du point 2 ci-dessus. D’un point de vue constructif, la situation est plus problématique : il
est même impossible d’obtenir qu’un anneau de Krull à décomposition complète avec Div A
absolument borné contient un élément a tel que Div A = C(a).
Exemple. On donne ici un anneau de Krull non cohérent. C’est aussi un anneau local à
pgcd. Il n’est pas cohérent (cela montre aussi qu’il n’est pas noethérien). En mathématiques
T. Coquand, H. Lombardi
37
classiques c’est un anneau factoriel en tant qu’anneau de Krull à pgcd. En outre il est de
dimension de Krull 6 2. C’est l’exemple 5.2 dans [12, Glaz].
On considère le corps discret F = F2 ((ai )i∈N , (bi )i∈N ), puis l’anneau local B = F[x, y]1+hx,yi .
On pose pi = ai x + bi y et l’on définit un automorphisme γ de B par
γ(x) = x, γ(y) = y, γ(ai ) = ai + ypi+1 , γ(bi ) = bi + xpi+1 pour tout i.
On a γ(pi ) = pi et γ engendre le groupe G = {Id, γ} d’ordre 2. Enfin A est le sous-anneau BG
des points fixes de G.
Localisations d’un anneau de Krull, diviseurs irréductibles
Le théorème suivant est une conséquence immédiate du théorème 3.1 et de la proposition 2.16. On notera que les hypothèses du point 2 sont toujours satisfaites en mathématiques
classiques.
Théorème 4.11 Soient A un anneau de Krull, S un filtre ne contenant pas 0, et HS le
sous-groupe solide de Div A engendré par les divA (s) pour s ∈ S. Alors AS est un anneau
à diviseurs, Div AS est à décomposition bornée et de dimension 6 1, et il y a un unique
morphisme de groupes réticulés ϕS : Div A → Div AS tel que ϕS divA (a) = divAS (a) pour
tout a ∈ A∗ .
On a en outre les précisions qui suivent.
1. Si AS est à divisibilité explicite, AS est un anneau de Krull.
2. Si HS est détachable et si Div A = HS H 0 pour un sous-groupe solide H 0 , AS est
un anneau de Krull et le morphisme ϕS est un morphisme de passage au quotient
par HS : il permet d’identifier Div AS au groupe réticulé quotient (Div A)/HS ' H 0 .
Rappelons que pour un anneau à diviseurs arbitraire, on a une bijection naturelle entre
les ensembles suivants (théorème 1.13).
— Les diviseurs irréductibles.
— Les idéaux divisoriels finis premiers 6= h1i.
Les points 2 à 4 du théorème suivant rajoutent quelques précisions pour les anneaux de
Krull qui ne sont pas des corps (on suppose d’existence d’un diviseur strictement positif).
Théorème 4.12 Soient A un anneau de Krull, α un diviseur >
{ x ∈ A∗ | div x ⊥ α }.
0 et Sα
=
1. L’anneau B = Sα−1 A est un anneau principal avec Div B ' C(α). En particulier on a
un élément régulier dans Rad B et une borne a priori sur le nombre d’éléments deux
à deux étrangers dans B.
2. Les propriétés suivantes sont équivalentes.
(a) α est un diviseur irréductible.
(b) C(α) = Zα.
(c) Idv(α) est un idéal premier.
(d) Sα est un filtre premier de hauteur 6 1 et A = Sα ∪ Idv(α) (union disjointe de
deux parties détachables).
(e) Sα−1 A est un anneau de valuation discrète et si p/1 est une uniformisante, on a
α = divA (p) mod C(α)⊥ .
3. Si A est à décomposition complète, on obtient selon le point 2. des bijections entre les
trois ensembles suivants.
— Les diviseurs irréductibles.
— Les idéaux divisoriels finis premiers 6= h1i.
38
Anneaux à diviseurs et anneaux de Krull
— Les filtres premiers détachables de hauteur 1.
4. Si A est cohérent, les quatre ensembles suivants sont égaux.
— Les idéaux divisoriels finis premiers 6= h1i.
— Les idéaux de type fini premiers q 6= h0i tels que div(q) > 0.
— Les idéaux de type fini premiers q 6= h0i , h1i tels que q = Idv(q).
— Les idéaux de type fini premiers détachables de hauteur 1.
Démonstration. 1. Résulte du point 1 du théorème 3.5 et du théorème 4.10.
2. C’est le point 2 du théorème 3.5. Ici intervient seulement le fait que Div A est discret de
dimension 1.
3. Il reste à vérifier qu’un filtre premier S de hauteur 1 est de la forme Sπ pour un diviseur
irréductible π.
Le localisé AS est par définition un anneau local de dimension 6 1. D’après le point 1
du théorème 3.1, c’est un anneau à diviseurs dont le groupe des diviseurs Div(AS ) est un
quotient de Div A. En tant qu’anneau à diviseurs local de dimension 1, AS est un anneau
de valuation (théorème 1.19).
Soit x ∈ A∗P
\S, on a divAS (x) > 0 car x ∈
/ A×
S . On considère la décomposition de ξ = divA (x)
sous forme i ni πi avec les πi irréductibles et les ni ∈ N∗ . Les πi restent deux à deux orthogonaux dans AS , et dans un anneau de valuation deux diviseurs > 0 sont toujours comparables.
Donc un et un seul des πi , appelons le π, reste > 0 dans Div(AS ). De la même manière
tout diviseur irréductible distinct de π dans Div A s’annule dans Div(AS ). Ceci montre que
Div(AS ) ' (Z, >) avec π comme seul diviseur irréductible, correspondant à 1 ∈ Z dans
l’isomorphisme. Tous les y ∈ A tels que divA (y) ⊥ π dans A sont dans S car divAS (y) = 0,
i.e. ce sont des unités de AS . Ainsi on obtient bien S = Sπ .
4. C’est le point 3 du théorème 3.5.
2
On se propose maintenant d’étudier, autant que faire se peut, (( toutes )) les localisations
d’un anneau de Krull à décomposition complète.
Le théorème 4.13 généralise pour les anneaux de Krull à décomposition complète des
résultats simples dans le cas d’un anneau factoriel. Il résulte essentiellement du théorème 4.11
et du lemme 2.11. En mathématiques classiques il donne une description exhaustive des
localisés d’un anneau de Krull. En mathématiques constructives on se limite aux localisations
en des filtres détachables particuliers. Ce théorème complète pour les anneaux de Krull le
lemme 2.11 qui décrit les sous-groupes détachables d’un groupe réticulé à décomposition
complète.
Théorème 4.13 Soient A un anneau de Krull à décomposition complète et I l’ensemble de
ses diviseurs irréductibles. On reprend les notations du théorème 3.1.
1. Si S est un filtre et si HS est détachable, alors S est détachable, égal à
{ x ∈ A | ∀π ∈ I, π 6 div(x) ⇒ π ∈ HS } .
En outre Div(AS ) ' (Div A)/HS ' HS ⊥ .
2. Si H est un sous-groupe solide détachable de Div A, l’ensemble
{ x ∈ A | ∀π ∈ I, π 6 div(x) ⇒ π ∈ H }
est un filtre détachable S et HS = H.
3. On obtient ainsi des bijections entre les trois ensembles suivants.
— Les filtres S de A tels que HS est détachable.
— Les sous-groupes solides détachables de Div A.
— Les parties détachables de I.
On suppose dans la suite que S est un filtre avec HS détachable.
T. Coquand, H. Lombardi
39
4. Les propriétés suivantes sont équivalentes.
(a) Le filtre S est de hauteur 1.
(b) L’anneau AS est un anneau de Dedekind à factorisation totale.
Dans ce cas les propriétés suivantes sont équivalentes.
(c) Le sous-ensemble I ∩ HS ⊥ de I est fini non vide.
(d) Rad(AS ) contient un élément non nul.
(e) L’anneau AS est principal et les diviseurs irréductibles de AS forment un ensemble
fini non vide.
5. Le filtre S est premier de hauteur 1 si, et seulement si, I ∩ HS ⊥ est un singleton {π}.
Dans ce cas l’idéal premier p = A \ S est égal à Idv(π).
6. Si S est premier de hauteur 6= 0, 1, I ∩ HS ⊥ est infini et div(p) = 0.
Démonstration. La démonstration est laissée à la lectrice.
2
Remarque. Dans le cadre des anneaux de Krull à décomposition complète, il ne semble pas que
l’on puisse démontrer que HS est détachable dès que S est un filtre détachable (contrairement
au cas des anneaux factoriels). De même on ne peut pas calculer en général la hauteur d’un
filtre S sous la seule hypothèse que HS est détachable.
Un anneau est dit pleinement Lasker-Nœther lorsqu’il est noethérien cohérent fortement
discret et que tout idéal radical est intersection finie d’idéaux premiers de type fini (voir
[23]). Rappelons qu’en mathématiques classiques tout anneau noethérien est pleinement
Lasker-Nœther, et donc, d’après le théorème 4.14, tout anneau noethérien intégralement clos
est un anneau de Krull à décomposition complète.
Théorème 4.14 Un anneau intégralement clos pleinement Lasker-Nœther est un anneau de
Krull à décomposition complète.
Démonstration. Dans un anneau de Krull A, on a vu que tout élément irréductible de Div A
est de la forme divA (p) pour un idéal premier détachable p de hauteur 1. Dans [23], il est
montré que pour un anneau pleinement Lasker-Nœther, on peut calculer explicitement les
idéaux premiers de hauteur 1 qui contiennent un a ∈ A∗ fixé. Ceci permet ensuite de calculer
la décomposition complète du diviseur principal div a en somme de diviseurs irréductibles
(en utilisant le fait que Div A est discret). Les détails sont laissés au lecteur.
2
Stabilité pour les extensions polynomiales
Théorème 4.15 Soit A un anneau de Krull et K son corps de fractions.
1. A[X] est aussi un anneau de Krull.
2. A[X] est à décomposition complète si, et seulement si, A et K[X] sont à décomposition
complète.
Démonstration. Ceci résulte de ce que A[X] est un anneau à diviseurs avec Div(A[X]) '
Div A × Div(K[X]) (théorème 3.7).
2
40
Anneaux à diviseurs et anneaux de Krull
Stabilité pour les extensions entières intégralement closes
Théorème et définition 4.16 (Norme d’un diviseur)
Soit A un anneau à diviseurs non trivial de corps de fractions K et L ⊇ K un corps qui
admet une base finie comme K-espace vectoriel. Soit B la clôture intégrale de A dans L.
L’anneau B est aussi un anneau à diviseurs. On sait construire un homomorphisme de
groupes ordonnés N ∗ : Div B → Div A qui satisfait les propriétés suivantes
1. N ∗ divB (b) = divA NL/K (b) pour tout b ∈ B.
2. Pour β ∈ (Div B)+ , on a β = 0 ⇐⇒ NB/A (β) = 0.
3. Pour tout α ∈ Div A, NB/A (α) = [ L : K ] α.
On note NB/A cet homomorphisme, on l’appelle le morphisme norme.
Démonstration. On rappelle qu’une base de L sur K est aussi une base de L[T ] sur K[T ] ou
de L(T ) sur K(T ). Ceci implique que la fonction norme NL/K s’étend de manière naturelle
en NL[T ]/K[T ] ou en NL(T )/K(T ) . On continue à la noter NL/K . On pose r = [ L : K ].
Rappelons aussi que dans la situation où K = Frac(A), A intégralement clos, et B clôture
intégrale de A dans L, on a NL/K (B) ⊆ A : en fait pour x ∈ B, le polynôme caractéristique
de x a tous ses coefficients dans A, et l’élément cotransposé x
e (qui vérifie xe
x = NL/K (x)) est
un élément de B (par exemple en utilisant [18, corollaire III-8.6]).
Rappelons enfin que B[T ] est la clôture intégrale de A[T ] dans L(T ). Tout ceci implique que
la norme d’un élément g ∈ B[T ] est un élément de A[T ] et que ge ∈ B[T ].
On considère les ensembles Lst(B)∗ et Lst(A) et l’application N : Lst(B)∗ → Lst(A) définie
comme suit
Pm
N (b1 , . . . , bm ) = (a1 , . . . , ap ), où
K(b) =
bk T k−1
Pk=1
p
`−1
et NL/K (K(b) ) =
`=1 a` T
Enfin on définit ν : Lst(B)∗ → (Div A)+ par ν(b) = divA (N (b)). A priori on a p 6 (m−1)r+1.
Notons que pour tout α ∈ Div A, on a ν(α) = r α. Cela résulte de ce que si α = divA (a),
r
alors NL/K (K(a) ) = K(a)
= K(c) , donc divA (c) = r divA (a) par le corollaire 1.17.
On démontre alors les points suivants.
1. Les applications N et ν sont bien définies, autrement dit les ai sont dans A et l’un au
moins est régulier. En effet K(b) ∈ B[T ] donc NL/K (K(b) ) ∈ A[T ] d’après les remarques
préliminaires. Par ailleurs K(b) est régulier, donc la multiplication par K(b) est injective
(de L[T ] vers L[T ]), ce qui implique que son déterminant NL/K (K(b) ) est régulier.
2. Si (b) = (bi )i∈J1..nK et (c) = (cj )j∈J1..mK sont dans Lst(B)∗ , on a défini
P
(b) ? (c) =
i+j=`+1 bi cj `∈J1..m+n−1K
On a K(b)?(c) = K(b) K(c) , donc NL/K (K(b)?(c) ) = NL/K (K(b) ) NL/K (K(c) ).
Et en utilisant le corollaire 1.17 ceci implique
ν (b) ? (c) = ν(b) + ν(c).
3. Si divB (b) = 0 alors ν(b) = 0 . Soit (b0 ) = (b01 , . . . , b0m ) telle que la liste (a) = (b) ? (b0 ) soit
dans A et admette un pgcd fort g dans A∗ (lemme 3.11). Donc (a) = g (a0 ) avec divA (a0 ) = 0.
Ceci donne divB (b0 ) = divB (b) + divB (b0 ) = divB (g). Donc g est pgcd fort dans B de la
liste (b0 ). En particulier on peut écrire (b0 ) = g (c) avec (b) ? (c) = (a0 ).
Ceci implique ν(b) + ν(b0 ) = ν(a0 ) = r divA (a0 ) = 0, donc ν(b) = 0.
4. Si ν(b) = 0 alors divB (b) = 0 .
g
En effet, considérons la liste (b0 ) ∈ Lst(B)∗ définie par K
(b) = K(b0 ) , alors
0 = ν(b) = divA N (b) = divA c(K(b) K(b0 ) )) ,
T. Coquand, H. Lombardi
41
et comme Div A s’identifie à un sous-groupe réticulé de Div B on obtient
0 = divA c(K(b) K(b0 ) ) = divB c(K(b) K(b0 ) )
= divB (b) ? (b0 )
= divB (b) + divB (b0 ).
5. En conséquence des points précédents l’élément ν(b) ∈ (Div A)+ ne dépend que de divB (b)
et l’application correspondante
N ∗ : (Div B)+ → (Div A)+
est un morphisme de monoı̈des, qui s’étend de manière unique en un morphisme (en général
non injectif) de groupes ordonnés N ∗ : Div B → Div A.
Quelques précisions.
On démontre d’abord que l’application ν : Lst(B)∗ → (Div A)+ (( passe au quotient )),
c’est-à-dire que si divB (b(1) ) = divB (b(2) ), alors ν(b(1) ) = ν(b(2) ).
Pour ceci considérons une liste (c) dans B∗ telle que (b(1) ) ? (c) admette un pgcd fort e,
autrement dit (b(1) ) ? (c) = e (z) (∗) où la liste (z) admet 1 pour pgcd fort. Cela signifie divB (b(1) ) + divB (c) = divB (e). L’égalité (∗) implique ν(b(1) ) + ν(c) = ν(e) + ν(z),
i.e. ν(b(1) ) + ν(c) = ν(e) car divB (z) = 0 implique ν(z) = 0.
Comme divB (b(2) ) + divB (c) = divB (e), on on a aussi ν(b(2) ) + ν(c) = ν(e) dans (Div A)+ .
D’où ν(b(1) ) = ν(b(2) ).
Une fois que l’on sait que N ∗ définit une opération de (Div B)+ vers (Div A)+ , on voit que
c’est un morphisme pour l’addition. Comme l’image réciproque de 0 est 0 et puisque (Div B)+
et (Div A)+ sont les parties positives de Div A et Div B, il en résulte que N ∗ s’étend de
manière unique en un morphisme de groupes ordonnés.
2
Théorème 4.17 Soit A un anneau de Krull de corps de fractions K et L ⊇ K un corps qui
admet une base finie sur K. Soit B la clôture intégrale de A dans L. Alors B est un anneau
de Krull.
Démonstration. On sait déjà que B est un anneau à diviseurs (théorème 3.12) et que Div B
est discret (théorème 3.13). Il reste à montrer que Div B est à décomposition bornée.
On considère une décomposition divB (b) = divB (b(1) ) + · · · + divB (b(`) ) dans (Div B)+ . Au
moyen du morphisme norme NB/A elle est transformée en une décomposition de NB/A (b)
dans (Div A)+ . Puisque Div A est à décomposition bornée, si ` est suffisamment grand, un
des termes NB/A (b(i) ) de cette décomposition est nul. Et ceci implique divB (b(i) ) = 0. 2
Remarque. Comme cas particulier, si A est un domaine de Dedekind à factorisation bornée, il
en va de même pour B (il n’est donc pas nécessaire de supposer l’extension L/K séparable).
Conclusion
Nous sommes assez convaincus par l’introduction de l’article [2, Aubert], où l’auteur
déplore que seul Jaffard ait compris Lorenzen, alors que Bourbaki, Gilmer et Larsen-McCarthy
par exemple se sont enferrés dans les idéaux divisoriels qui manquent absolument de finitude.
Ici nous avons enfoncé encore un peu plus le clou, en ne faisant jamais référence à l’(( ensemble ))
de tous les idéaux fractionnaires ni à la théorie des ?-opérations sur cet (( ensemble )).
Notons que nos anneaux à diviseurs sont exactement les anneaux avec une théorie des
pgcds de type fini de [20, Lucius]. Lucius attribue la véritable paternité à Aubert tout en
rectifiant une erreur. L’article de Lucius est surout consacré aux anneaux de Krull : en
rajoutant une condition de type noethérien, il obtient ce qu’il appelle les anneaux avec une
théorie des diviseurs, qui sont les anneaux de Krull. Il attribue à [25, Skula] le fait d’avoir
42
Anneaux à diviseurs et anneaux de Krull
élucidé le rapport entre l’approche qu’il propose (que nous avons grosso modo suivie, mais
dans un cadre simplifié et constructif) et la présentation du problème dans [4].
Signalons aussi les articles [1, Arnold] et [6, Clifford] dans lesquels une théorie purement
multiplicative, à savoir l’étude des (( monoı̈des avec une théorie des diviseurs )) est donnée
pour le cas (( Krull )), c’est-à-dire lorsqu’on demande la décomposition unique en facteurs
premiers. Plus précisément, pour un monoı̈de (S, ·, 1) (( réduit )) (ce qui veut dire que 1 est le
seul élément inversible) et (( régulier )) (ce qui veut dire que tout élément est simplifiable),
on examine dans quelles conditions il est contenu dans un monoı̈de Σ jouissant des trois
propriétés suivantes :
— Σ est isomorphe à un monoı̈de (N(I) , +, 0) (i.e. un monoı̈de réduit régulier avec
décomposition unique en facteurs premiers),
— pour a, b in S, on a a|b dans S si, et seulement si, a|b dans Σ,
— tout élément de Σ est borne inférieure d’une famille finie dans S.
Autrement dit, c’est l’approche habituellement attribuée à [4] mais dans un cadre épuré (pas
de condition non multiplicative) et plus général (pas d’anneau intègre, seulement un monoı̈de
multiplicatif). La thèse de Clifford, reportée dans [6] consiste à généraliser les résultats
d’Arnold dans le cadre de monoı̈des plus généraux. Clifford cite [26, van der Waerden] comme
ayant découvert de manière indépendante essentiellement les mêmes résultats qu’Arnold, au
moins pour le cadre des anneaux noethériens intègres.
Quant aux travaux d’Aubert et Lucius, que nous avons repris ici dans un cadre constructif,
ils consistent à laisser tomber la condition de décomposition unique en facteurs premiers et à
demander seulement que Σ soit partie positive d’un groupe réticulé.
Remerciements. Le travail du premier auteur a été financé par le projet ERC (FP7/20072013) / ERC grant agreement nr. 247219. Nous remercions Marco Fontana et Mohammed
Zafrullah pour toutes les informations et conseils utiles concernant l’approche des PvMD dans
la littérature classique, ainsi que leurs réponses à des questions délicates. Nous remercions
aussi tout particulièrement Claude Quitté pour sa collaboration efficace, sans laquelle cet
article n’aurait pas vu le jour.
Références
[1] Arnold I. (1929). Ideale in kommutativen Halbgruppen. Rec. Math. Soc. Moscow 36,
401–407. 2, 42
[2] Aubert K. (1983). Divisors of finite character. Ann. Mat. Pura Appl. 38, 327–360. 2,
5, 41
[3] Bigard A., Keimel K., Wolfenstein S. (1977). Groupes et anneaux réticulés. LNM
Vol. 608. Springer-Verlag, Berlin-New York. 20
[4] Borevitch Z. I., Chafarevitch I. R. (1967). Théorie des nombres. Les Grands
Classiques Gauthier-Villars. Gauthier-Villars, Paris. 2, 5, 6, 42
[5] Chang G.W. (2008). Prüfer ?-multiplication domains, Nagata rings, and Kronecker
function rings. Journal of Algebra 319, 309–319. 2
[6] Clifford A. H. (1938). Arithmetic and ideal theory of commutative semigroups. Annals
of Math. 39, 594–610. 2, 42
[7] Coquand T. (2014). Recursive functions and constructive mathematics. Chapitre 6
dans Bourdeau M., Dubucs J. (Eds.), Constructivity and Computability in Historical
and Philosophical Perspective. Logic, Epistemology and the Unity of Science Vol. 34.
Dordrecht : Springer, Heidelberg, London. 12
[8] Edwards H. M. (1990). Divisor Theory. Birkhäuser Boston, Inc., Boston, MA. 1, 33,
34
T. Coquand, H. Lombardi
43
[9] Fontana M., Loper K. (2006). An historical overview of Kronecker function rings,
Nagata rings, and related star and semistar operations. p. 169–187 in Multiplicative Ideal
Theory in Commutative Algebra. A tribute to the work of Robert Gilmer, Jim Brewer,
Sarah Glaz, William Heinzer, and Bruce Olberding Editors, Springer, New-York. 2, 18
[10] Fontana M., Zafrullah M. (2009). A “v-operation free” approach to Prüfer vmultiplication domains. Int. J. Math. Math. Sci. Article ID 349010, 8 pages. 2
[11] Fontana M., Zafrullah M. (2011). On v-domains : a survey. In Commutative
Algebra : Noetherian and non-Noetherian Perspectives (M. Fontana, S. Kabbaj, B.
Olberding, and I. Swanson Editors), Springer, New York. 145–179. 2
[12] Glaz S. (2001). Finite conductor rings. Proc. Amer. Math. Soc. 129, 2833–2843. 15, 37
[13] Griffin M. (1967). Some results on v-multiplication rings. Canad. Math. 19, 710-722.
2
[14] Halter-Koch F. (2011). Characterization of Prüfer-like monoids and domains by
gcd-theories, Comm. Algebra 39, 486–496. 2
[15] Jaffard P. (1960). Les systèmes d’idéaux. Dunod, Paris. 2
[16] Kang B. G. (1989). Prüfer v-multiplication domains and the ring R[X]Nv . J. Algebra.
123, 151–170. 19
[17] Krull W. (1936). Beiträge zur Arithmetik kommutativer Integritätsbereiche. II. vIdeale und vollständig ganz abgeschlossene Integritätsbereiche. Math. Z. 41, Vol. 6,
665–679. 2
[18] Lombardi H., Quitté C. (2015). Commutative algebra : constructive methods. Finite
projective modules. Translated from the French. Springer, Berlin. 1, 9, 14, 15, 16, 17, 20,
23, 24, 25, 26, 27, 40
[19] Lorenzen P. (1939). Abstrakte Begründung der multiplikativen Idealtheorie. Math. Z.
45, no 6, 533–553. 2
[20] Lucius F. (1998). Rings with a theory of greatest common divisors. Manuscripta Math.
95, 117–136. 2, 41
[21] Lucius F. (1998). Kronecker’s Divisor Theory and the Generalization of Notions
and Theorems of Classical Algebraic Number Theory to Krull Domains. Mathematica
Gottingensis Vol. 13, 17 pages. 2
[22] Matsumura H. (1989). Commutative ring theory. Cambridge studies in advanced
mathematics, Vol. 8. Cambridge University Press, Cambridge. 15, 16, 28, 36
[23] Mines R., Richman F., Ruitenburg W. A Course in Constructive Algebra. Universitext. Springer-Verlag, (1988). 39
[24] Prüfer H. (1932). Untersuchungen über Teilbarkeitseigenschaften in Körpern. J. Reine
Angew. Math. 168, 1–36. 2
[25] Skula L. (1970). Divisorentheorie einer Halbgruppe. Math. Z. 114, 113–120. 41
[26] van der Waerden B. L. (1929). Zür Produktzerlegung der Ideale in ganz abgeschlossenen Ringe. Math. Annalen 101, 293–308. 2, 42
[27] Zafrullah M. (2006). What w-coprimality can do for you. Dans Multiplicative Ideal
Theory in Commutative Algebra : A tribute to the work of Robert Gilmer, Jim Brewer,
Sarah Glaz, William Heinzer, and Bruce Olberding Editors, Springer, New-York. 387–404
8
44
Anneaux à diviseurs et anneaux de Krull
Table des matières
Introduction
1 Anneaux à diviseurs
Pgcd fort, ppcm et profondeur > 2 . . . . . . . .
Idéaux divisoriellement inversibles . . . . . . . .
Projet pour le groupe des diviseurs . . . . . . . .
Le théorème de base . . . . . . . . . . . . . . . .
Exprimer un diviseur comme borne supérieure de
Quand le groupe des diviseurs est-il discret ? . .
Diviseurs irréductibles . . . . . . . . . . . . . . .
Propriétés de clôture intégrale . . . . . . . . . . .
Anneaux à diviseurs de dimension 6 1 . . . . . .
Anneaux de valuation discrète . . . . . . . . . . .
Localisations d’un anneau à diviseurs, 1 . . . . .
Un anneau à la Kronecker . . . . . . . . . . . . .
Principe local-global et applications . . . . . . .
1
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
diviseurs principaux
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
2 Propriétés de décomposition des groupes réticulés
Groupes réticulés quotients . . . . . . . . . . . . . . . . .
Un principe de recouvrements par quotients . . . . . . . .
Groupes réticulés de dimension 1 . . . . . . . . . . . . . .
Groupes totalement ordonnés de dimension 1 . . . . . . .
Sous-groupes premiers d’un groupe réticulé . . . . . . . .
Propriétés de décomposition générales . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3
3
4
5
6
10
12
12
14
15
16
17
18
18
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
20
20
20
21
22
22
23
3 Propriétés de stabilité pour les anneaux à diviseurs
Localisations d’un anneau à diviseurs, 2 . . . . . . . . . . .
Anneaux avec groupe des diviseurs de dimension 1 . . . . .
Stabilité pour les anneaux de polynômes . . . . . . . . . . .
Stabilité pour les extensions entières intégralement closes .
Autres propriétés de stabilité . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
26
27
28
29
32
4 Anneaux de Krull
Définition et premières propriétés . . . . . . . . . . . . . .
Théorème d’approximation simultanée . . . . . . . . . . .
Localisations d’un anneau de Krull, diviseurs irréductibles
Stabilité pour les extensions polynomiales . . . . . . . . .
Stabilité pour les extensions entières intégralement closes
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
32
. 32
. 34
. 37
. 39
. 40
.
.
.
.
.
Conclusion
41
Références
42
| 0math.AC
|
Generation, Ranking and Unranking of Ordered Trees with
Degree Bounds
Mahdi Amani
Abbas Nowzari-Dalini
Dipartimento di Informatica
Università di Pisa, Pisa, Italy.
m [email protected]
School of Mathematics, Statistics, and Computer Science
Colleague of Science, University of Tehran, Tehran, Iran.
[email protected]
We study the problem of generating, ranking and unranking of unlabeled ordered trees whose nodes
have maximum degree of ∆. This class of trees represents a generalization of chemical trees. A
chemical tree is an unlabeled tree in which no node has degree greater than 4. By allowing up to ∆
children for each node of chemical tree instead of 4, we will have a generalization of chemical trees.
Here, we introduce a new encoding over an alphabet of size 4 for representing unlabeled ordered
trees with maximum degree of ∆. We use this encoding for generating these trees in A-order with
constant average time and O(n) worst case time. Due to the given encoding, with a precomputation
of size and time O(n2 ) (assuming ∆ is constant), both ranking and unranking algorithms are also
designed taking O(n) and O(n log n) time complexities.
1
Introduction
A labeled tree is a tree in which each node is given a unique label. A rooted tree is a tree in which
one of the nodes is distinguished from the others as the root. An ordered tree or plane tree is a rooted
tree for which an ordering is specified for the children of each node. Studying combinatorial properties of restricted graphs or graphs with configurations has many applications in various fields such as
machine learning and chemoinformatics. Studying combinatorial properties of restricted trees and outerplanar graphs (e.g. ordered trees with bounded degrees) can be used for many purposes including virtual
exploration of chemical universe, reconstruction of molecular structures from their signatures, and the
inference of structures of chemical compounds [5, 11, 14, 15, 29, 12, 40]. In this paper we study the generation of unlabeled ordered trees whose nodes have maximum degree of ∆ and for the sake of simplicity,
we denote it by T ∆ tree, also we use Tn∆ to denote the class of T ∆ trees with n nodes.
Chemical trees are the most similar trees to T ∆ trees. Chemical trees are the graph representations
of alkanes, or more precisely, the carbon atom skeleton of the molecules of alkanes [8, 9, 13, 14, 20,
12]. The alkane molecular family is partitioned into classes of homologous molecules, that is molecules
with the same numbers of carbonium and hydrogen atoms; the nth class of alkane molecular family is
characterized by the formula Cn H2n+2 , n = 1, 2, ... [5] with the same numbers of carbonium and hydrogen
atoms. They are usually represented by indicating the carbonium atoms and their links, omitting to
represent hydrogen atoms [5]; therefore, all the nodes would have the same label; carbon (i.e., the tree is
unlabeled), as shown in Figure 1 for n = 3 and n = 4. A chemical tree is defined as a tree in which no node
has degree greater than 4 [12, 14, 13, 9, 8, 20], chemical trees are also considered to be unlabeled [13, 9,
8, 20]. Therefore, T ∆ tree can be considered as a generalization of chemical trees to unlabeled ordered
trees whose nodes have maximum degree of ∆ instead of 4.
Generation, ranking and unranking of trees are very basic problems in computer science and discrete
mathematics [39]. In general, for any combinatorial object of size n, we can define a variety of orderings.
C.A. Muñoz and J. A. Pérez (Eds.) :
Developments in Computational Models
EPTCS 204, 2016, pp. 31–45, doi:10.4204/EPTCS.204.4
c M. Amani, A. Nowzari-Dalini
This work is licensed under the
Creative Commons Attribution License.
32
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
Figure 1: Left: C3 H8 propane, middle and right: C4 H10 butanes.
Since we study trees, let’s consider an arbitrary class of trees of size n (n nodes) showed by Tn (e.g. semichemical trees of size n), the elements of this set (Tn ) can be listed based on any defined ordering. Two
such orderings for the trees are A-order and B-order, which will be explained in the next section. By
having Tn and an ordering (e.g. A-order or B-order), next, rank, and unrank functions are defined as
follows.
For a given tree T ∈ Tn , the next function gives the successor tree of T with respect to the defined ordering, the ‘position’ of tree T in Tn is called rank, the rank function determines the rank of T ; the inverse
operation of ranking is unranking, for a position r, the unrank function gives the tree T corresponding to
this position. A generation algorithm, generates all the elements in Tn with respect to the given ordering
(starting from the first tree, then repeating the next function until producing the last tree) [39].
In most of the tree generation algorithms, a tree is represented by an integer or an alphabet sequence
called codeword, hence all possible sequences of this representation are generated. This operation is
called tree encoding. Basically, the uniqueness of the encoding, the length of the encoding, and the
capability of constructing the tree from its representation, which is called decoding, are essential considerations in the design of the tree encoding schema [39].
Many papers have been published earlier in the literature for generating different classes of trees. For
example we can mention the generation of binary trees in [26, 22, 30, 2, 3, 4, 36], k-ary trees in [27, 10,
31, 19, 37, 18, 17, 1, 35], rooted trees in [7, 32], trees with n nodes and m leaves in [24, 28], neuronal
trees in [25], and AVL trees in [21]. On the other hand, many papers have thoroughly investigated basic
combinatorial features of chemical trees [12, 14, 13, 9, 8, 20, 33].
More related to our work, in [15] a coding for chemical trees without the generation algorithm, and
in [5] the enumeration of chemical trees and in [11, 29] the enumeration of tree-like chemical graphs
have been presented. Hendrickson and Parks in [16] investigated the enumeration and the generation
of carbon skeletons which can have cycles and are not necessarily trees. The work most related to our
paper is an algorithm for the generation of certain classes of trees such as chemical trees in [6] with no
ranking or unranking algorithm. In that paper, all chemical trees with n nodes are generated from the
complete set of chemical trees with n − 1 nodes, the redundant generations are possible and they needed
to minimize the possible redundancy.
The problem of enumeration of ordered trees were also studied in [38] and the generation of different
ordered trees (with no bounds on the degrees of the nodes) were studied in [39]. In [40], a generation
algorithm with constant average delay time but with no ranking or unranking algorithms was given for
all unrooted trees of n nodes and a diameter at least d such that the degree of each node with distance k
from the center of the tree is bounded by a given function. In [34] all unrooted unlabeled trees have been
generated in constant average time with no ranking or unranking algorithms. Nakano and Uno in [23]
gave an algorithm to generate all rooted unordered trees with exactly n nodes and diameter d in constant
delay time. Up to now, to our knowledge, no efficient generation, ranking or unranking algorithms are
known for either ‘chemical trees’ or ‘ordered trees with bounded degrees’.
M. Amani, A. Nowzari-Dalini
33
Figure 2: A T ∆ tree with 13 nodes.
The remaining of the paper is organized as follows. Section 2 introduces the definitions and notions
that are used further. Our new encoding for Tn∆ trees is presented in Section 3. The size of our encoding
is n while the alphabet size is always 4. Based on the presented encoding, a new generation algorithm
with constant average time and O(n) worst case time is given Section 4. In this algorithm, Tn∆ trees
are generated in A-order. Ranking and unranking algorithms are also designed in Section 5 with O(n)
and O(n log n) time complexities, respectively. The presented ranking and unranking algorithms need a
precomputation of size and time O(n2 ) (assuming ∆ is constant).
2
Definition
As mentioned before, the nth class of alkane molecular family is characterized by the formula
Cn H2n+2 , n = 1, 2, ... [5] with the same numbers of carbonium and hydrogen atoms. They are usually
represented by indicating the carbonium atoms and their links, omitting to represent hydrogen atoms.
Therefore, a chemical tree is a tree in which no node has degree greater than 4 [12, 8, 20]. We study the
class of ordered trees whose nodes have maximum degree of ∆ and for the sake of simplicity, we denote
it by T ∆ . T ∆ can be considered as a generalized version of chemical trees.
Formally, a T ∆ tree T is defined as a finite set of nodes such that T has a root r, and if T has more
than one node, r is connected to j ≤ ∆ subtrees T1 , T2 , . . . , T j which each one of them is also recursively
a T ∆ tree and by Tn∆ we represent the class of T ∆ trees with n nodes. An example of a T ∆ tree is shown
in Figure 2.
As mentioned earlier, in most of the tree generation algorithms, a tree is represented by an integer or
an alphabet sequence called codeword, hence, all possible sequences of this representation are generated.
In general, on any class of trees, we can define a variety of ordering for the set of trees. Classical orderings
on trees are A-order and B-order which are defined as follows [30, 39].
Definition 1 Let T and T 0 be two trees in T ∆ and k = max{deg(T ), deg(T 0 )}, we say that T is less than
T 0 in A-order (T ≺A T 0 ), iff
• |T | < |T 0 |, or
• |T | = |T 0 | and for some 1 ≤ i ≤ k, T j =A T j0 for all j = 1, 2, . . . , i − 1 and Ti ≺A Ti0 ;
where |T | is the number of nodes in the tree T and deg(T ) is the degree of the root of T .
Definition 2 Let T and T 0 be two trees in T ∆ and k = max{deg(T ), deg(T 0 )}, we say that T is less than
T 0 in B-order (T ≺B T 0 ), iff
• deg(T ) < deg(T 0 ), or
34
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
Figure 3: An example of a tree T ∈ Tn∆ (for ∆ ≥ 4). Its codeword is “s`s`rmsr`msmr”.
• deg(T ) = deg(T 0 ) and for some 1 ≤ i ≤ k, T j =B T j0 for all j = 1, 2, . . . , i − 1 and Ti ≺B Ti0 .
Our generation algorithm, which is given in the Section 4, produces the sequences corresponding
to Tn∆ trees in A-order. For a given tree T ∈ Tn∆ , the generation algorithm generates all the successor
trees of T in Tn∆ ; the position of tree T in Tn∆ is called rank, the rank function determines the rank of
T ; the inverse operation of ranking is unranking. These functions can be also employed in any random
generation of Tn∆ trees, for example.
3
The encoding schema
The main point in generating trees is to choose a suitable encoding to represent them, and generate their
corresponding codewords. Regarding the properties of Tn∆ , we present our new encoding. For any tree
T ∈ Tn∆ , the encoding over 4 letters {s, `, m, r} is defined as follows. The root of T is labeled by s, and
for any internal node, if it has only one child, that child is labeled by s, otherwise the leftmost child
is labeled by `, and the rightmost child is labeled by r, and the children between the leftmost and the
rightmost children (if exist) are all labeled by m. Nodes are labeled in the same way for any internal
node in each level recursively, and by a pre-order traversal of T , the codeword will be obtained (one
can say the labels ` and r operate as left and right parenthesis to define the fingerprint of a subtree in
the codewords, and s is used when the left and right bounds are the same). This labeling is illustrated
in Figure 3. Using this encoding, the 4-letters alphabet codeword corresponding to the first and last
Tn∆ trees in A-order are respectively “s`m∆−2 r`m∆−2 r . . . `m(n mod ∆)−2 r” and “sn ” which are shown in
the Figure 4-a and Figure 4-b. Now, we prove the validity of this encoding for Tn∆ trees (one-to-one
correspondence).
Definition 3 Suppose that {s, `, m, r}∗ is the set of all sequences with alphabet of s, m, `, r and let A be a
proper subset of {s, `, m, r}∗ , then we call the set A a CodeSet∆ iff A satisfies the following properties:
1. ε ∈ A (ε is a string of length 0),
2. ∀x ∈ A : sx ∈ A,
3. ∀ x1 , x2 , . . . , xi ∈ A, and 2 ≤ i ≤ ∆: `x1 mx2 mx3 . . . mxi−1 rxi ∈ A.
Now we show that a valid codeword is obtained by the concatenation of the character s and each element
of CodeSet∆ .
Theorem 1 Let A be the “CodeSet∆ ” and δ ∈ A. Let C be a codeword obtained by the concatenation of
character s and δ (denoted by sδ ). There is a one-to-one correspondence between C and a T ∆ tree.
M. Amani, A. Nowzari-Dalini
35
Figure 4: a) The first Tn∆ tree in A-order. b) The last Tn∆ tree in A-order.
Figure 5: T ∆ trees encoded by C = sx and C = s`x1 mx2 . . . mx j−1 rx j .
Proof. It can be proved by induction on the length of C. Initially for a codeword of length equal to
1, the proof is trivial. Assume that any codeword obtained in the above manner with length less than n
encodes a unique T ∆ tree. For a given codeword with length n, because of that concatenation of s and δ ,
we have:
1. C = sx, such that x ∈ A, or
2. C = s`x1 mx2 . . . mx j−1 rx j , such that xi ∈ A, ∀1 ≤ i ≤ j ≤ ∆.
For the first case by induction hypothesis, x is a valid codeword of a T ∆ tree T ; therefore, sx is another
codeword corresponding to another T ∆ tree by adding a new root to the top of T . This tree is unique and
shown in Figure 5-a. For the second case, by induction hypothesis and that concatenation of s and δ ,
each sxi for 1 ≤ i ≤ j is a valid codeword for a T ∆ tree; therefore, with replacement of ‘s with ` in sx1 ’
and ‘s with m in sxi for 2 ≤ i ≤ j − 1’ and finally ‘s with r in sx j ’, we can produce `x1 , mx2 , . . . mx j−1 , rx j
codewords. Now they all are subtrees of a T ∆ tree whose codeword is C = s`x1 mx2 . . . mx j−1 rx j (add a
new root and connect it to each one of them). This tree is unique and shown in Figure 5-b.
For a Tn∆ tree, this encoding needs only 4 alphabet letters and has length n. This encoding is simple
and powerful, so it can be used for many other applications besides the generation algorithm. In the next
section, we use it to generate T ∆ trees in A-order.
4
The generation algorithm
In this section, we present an algorithm that generates the successor sequence of a given codeword of a
Tn∆ tree in A-order. For generating the successor of a given codeword C corresponding to a Tn∆ tree T ,
36
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
the codeword C is scanned from right to left. Scanning the codeword C from right to left, corresponds
to a reverse pre-order traversal of T . First we describe how this algorithm works directly on T , then we
present the pseudocode of the algorithm. For generating the successor of a given Tn∆ tree T we traverse
the tree in reverse pre-order as follows.
1. Let v be the last node of T in pre-order traversal.
2. If v doesn’t have any brothers, then
• repeat {v = parent of v.}
until v has at least one brother or v be the root of tree T .
• If v = root, then the tree is the last tree in A-order and there is no successor.
3. If v has at least one brother (obviously it has to be a left brother), delete one node from the subtree
of v and insert this node into its left brother’s subtree, then rebuild both subtrees (each one as a
first tree with corresponding nodes in A-order).
The pseudo code of this algorithm for codewords corresponding to Tn∆ trees is presented in Figure 6.
In this algorithm, the codeword is stored in a global array C so it is used both as the input and the output
codewords (this will be useful to generate all the codewords in constant average time); therefore, when
the algorithms stops, C is updated to the successor codeword. In this algorithm, n shows the size of the
codeword (the number of nodes of the tree corresponded to C), ST size is a variable contains the size
of the subtree rooted by node corresponded to C[i] and SNum holds the number of consecutive visited
s characters. This algorithm also calls two functions updateChildren(i,ChNum) presented in Figure 7,
and updateBrothers(i,ChNum) presented in Figure 8.
The procedure updateChildren(i,ChNum) regenerates the codeword corresponding to the children of
an updated node and the procedure updateBrothers(i,ChNum) regenerates the codeword corresponding
to the brothers of a node with regard to the maximum degree ∆ for each node. In these algorithms, C is
the global array of characters storing the codeword, i is the position of the current node in the array C.
In updateChildren(i,ChNum), ChNum is the number of children of C[i] to regenerate the corresponding
codeword and in updateBrothers(i,ChNum), ChNum is the number of its brothers, instead. Each node
has at most ∆ children, so NChild is a global array which NChild[i] stores the number of children of
the parent of the current node (current node is the node corresponding to C[i]) so it wont exceed ∆, i.e.,
NChild[i] holds the number of left brothers of the node corresponding to C[i] including itself.
Theorem 2 The algorithm Next presented in Figure 6 has a worst case time complexity of O(n) and an
average time complexity of O(1).
Proof. In the algorithm given in Figure 6, we scan the sequence from right to left (corresponding to
the reverse pre-order traversal of the corresponding tree as discussed before). Inside or after every loop
of the algorithm, the variable Current (which keeps track of the node we currently process), decreases
equivalently to the number of iterations, and it can not be decreased more than n times; therefore, the
worst case time complexity of the algorithm is O(n). For computing the average time, it should be noted
that during the scanning process, every time we visit the characters s, m or `, the algorithm terminates,
so we define Sin,∆ as the number of codewords of Tn∆ trees whose last character s, m or ` has distance i
from the end, and Sn,∆ as the total number of Tn∆ trees. Obviously we have:
n
Sn,∆ = ∑ Sin,∆ .
i=1
We define Hn as the average time of generating all codewords of Tn∆ trees,
(1)
M. Amani, A. Nowzari-Dalini
37
Function AOrder-Next(n : integer);
var i,Current, ST size, SNum: integer; f inished, RDeleted: boolean;
begin
Current := n; ST Size := 0; RDeleted := false; f inished := false;
while ( (C[Current] = 0 s0 ) & (Current ≥ 1) ) do
ST Size + +; Current − −;
if (Current = 0) then return (no successor);
while (not f inished) do begin
ST Size + +;
switch C[Current] of
case0 r0 :
i := Current − 1; SNum := 0;
while (C[i] = 0 s0 ) do
SNum := SNum + 1; i − −;
if (C[i] = 0 r0 ) then begin
updateBrothers ( Current , ST Size);
Current := i; ST Size := SNum;
end;
if ( (C[i] = 0 m0 ) or (C[i] = 0 `0 ) ) then begin
if (ST Size = 1) then RDeleted := true;
if (ST Size > 1) then begin
ST Size − −; updateBrothers(Current + 1, ST Size);
Current := i; ST Size := SNum + 1;
end;
end;
case 0 m0 :
if (RDeleted = true) then C[Current] := 0 r0 ;
updateChildren( Current + 1, ST Size − 1); f inished:= true;
case 0 `0 :
if (RDeleted = true) then C[Current] := 0 s0 ;
updateChildren( Current + 1, ST Size − 1); f inished := true;
end;
end;
Figure 6: Algorithm for generating the successor codeword for Tn∆ trees in A-order.
Hn ≤ (k/Sn,∆ ) ∑ni=1 iSin,∆ ,
≤ (k/Sn,∆ ) ∑nj=1 ∑ni= j Sin,∆ .
Where k is a constant value. On the other hand, consider that for Sn+1,∆
we have two cases, in the first
j
case, the last character s, m or ` is a leaf and in the second one, it is not. Therefore, Sn+1,∆
is greater than
j
or equal to just the first case, and in that case by removing the node corresponding to the ‘last character
s, m or ` of the codeword’, the remaining tree will have a corresponding codeword belongs to exactly
one of Skn,∆ cases, for j ≤ k ≤ n. By substituting k and i we have:
Sn+1,∆
≥ ∑ni= j Sin,∆ .
j
Therefore, for Hn we have:
38
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
procedure updateChildren( i,ChNum: integer);
begin
while (ChNum > 0) do begin
if ChNum = 1 then begin
C[i] := 0 s0 ; NChild[i] := 1; i + +; ChNum − −;
end;
if ChNum > 1 then begin
C[i] := 0 `0 ; NChild[i] := 1; i + +; ChNum − −;
while ( (NChild[i] < (∆ − 1)) & (ChNum > 1) ) do begin
C[i] := 0 m0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −;
end;
C[i] := 0 r0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −;
end
end;
end;
Figure 7: Algorithm for updating the children.
Procedure updateBrothers( i,ChNum: integer);
begin
if ChNum = 1 then begin
C[i] := 0 r0 ; NChild[i] := NChild[i − 1]; ChNum − −;
end;
if ChNum > 1 then begin
C[i] := 0 m0 ; ChNum − −; i + +;
while ( (NChild[i] < (∆ − 1) ) & (ChNum > 1) ) do begin
C[i] := 0 m0 ; NChild[i] := NChild[i − 1] + 1; i + +; ChNum − −;
end;
C[i] := 0 r0 ; NChild[i] := NChild[i − 1] + 1;
i + +; ChNum − −; updateChildren(i,ChNum);
end;
end;
Figure 8: Algorithm for updating the neighbors.
Hn ≤ (k/Sn,∆ ) ∑nj=1 Sn+1,∆
,
j
then by using Equation (1),
Hn ≤ kSn+1,∆ /Sn,∆ .
Finally from [39] we know that the total number of ordered trees is growing same as Catalan number,
while Tn∆ is a subset of ordered trees can not grow faster than that, this guarantees that for large enough
values of n, Sn+1,∆ /Sn,∆ = O(1). Therefore, Hn ≤ kO(1) = O(1).
It should be mentioned that this constant average time complexity is without considering the input or the
output time.
M. Amani, A. Nowzari-Dalini
39
Figure 9: Tn∆ tree whose first subtree has exactly m nodes and its root has maximum degree of d.
5
Ranking and Unranking algorithms
By designing a generation algorithm in a specific order, the ranking of algorithm is desired. In this section, ranking and unranking algorithms for these trees in A-order will be given. Ranking and unranking
algorithms usually use a precomputed table of the number of a subclass of given trees with some specified properties to achieve efficient time complexities; these precomputations will be done only once and
n,∆
stored in a table for further use. Let Sn,∆ be the number of Tn∆ trees, Sm,d
be the number of Tn∆ trees whose
∆
first subtree has exactly m nodes and its root has maximum degree of d, and Dn,∆
m,d be the number of Tn
trees whose first subtree has at most m nodes and its root has maximum degree of d.
Theorem 3
n,∆
m
• Dn,∆
m,d = ∑i=1 Si,d ,
n,∆
• Sn,∆ = ∑n−1
i=1 Si,∆ .
Proof. The proof is trivial.
Theorem 4
n,∆
m+1,∆
Sm,d
= Sm,1
×
n−m−1
∑
n−m,∆
(Si,d−1
).
i=1
Proof. Let T be a Tn∆ tree whose first subtree has exactly m nodes and its root has maximum degree of
d; by the definition and as shown in the Figure 9, the number of the possible cases for the first subtree is
m+1,∆
n−m,∆
Sm,1
and the number of cases for the other parts of the tree is ∑n−m−1
(Si,d−1
) (by removing the first
i=1
subtree from T ). Therefore, we have:
m+1,∆
n,∆
Sm,d
= Sm,1
×
n−m−1
∑
n−m,∆
(Si,d−1
).
i=1
Now, let T be a Tn∆ tree whose subtrees are defined by T1 , T2 , . . . , Tk and for 1 ≤ i ≤ k ≤ ∆ : |Ti | = ni
and ∑ki=1 ni = n − 1. One way to compute the rank of tree T is to enumerate the number of trees generated
40
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
before T . Let Rank(T,n) be the rank of T . The number of T ∆ trees whose first subtree is smaller than T1
is equal to:
n1 −1
∑
n,∆
Si,∆
+ (Rank(T1 , n1 ) − 1) ×
i=1
n−n1
n−n ,∆
,
∑ Si,∆−1
1
i=1
and the number of T ∆ trees whose first subtree is equal to T1 but the second subtree is smaller than T2 is
equal to:
n2 −1
∑
n−n1 ,∆
Si,∆−1
+ (Rank(T2 , n2 ) − 1) ×
n−n1 −n2
i=1
∑
n−n1 −n2 ,∆
Si,∆−2
.
i=1
Similarly, the number of T ∆ trees whose first ( j − 1) subtrees are equal to T1 , T2 , . . . , T j−1 and the jth
subtree is smaller than T j is equal to:
n j −1
∑
j
j−1
(n−∑`=1 n` ),∆
Si,∆− j+1
+ (Rank(T j , n j ) − 1) ×
i=1
n−∑`=1 n`
∑
n−∑
j
Si,∆− `=1
j
n` ,∆
.
i=1
Therefore, regarding enumerations explained above, for given tree T ∈ Tn∆ whose subtrees are defined by
T1 , T2 , . . . , Tk , we can write:
Rank(T, 1) = 1,
k
n j −1
Rank(T, n) = 1 + ∑ ( ∑
j
j−1
(n−∑`=1 n` ),∆
Si,∆− j+1
+ (Rank(T j , n j ) − 1)
j=1 i=1
n−∑`=1 n`
∑
(n−∑
j
Si,∆− j`=1
n` ),∆
).
i=1
n,∆
m
Hence, from Theorem 3, by using Dn,∆
m,d = ∑i=1 Si,d , we have:
Rank(T, 1) = 1,
k
(n−∑
j−1
n ),∆
j
(n−∑`=1 n` ),∆
).
j
(n−∑`=1 n` ),(∆− j)
`=1 `
Rank(T, n) = 1 + ∑ (D(n j −1),(∆−
j+1) + (Rank(T j , n j ) − 1)D
j=1
To achieve the most efficient time for ranking and unranking algorithms, we need to precompute
n,∆
Dn,∆
m,d and store it for further use. Assuming ∆ is constant, to store Dm,d values, a 3-dimensional table
denoted by D[n, m, d] is enough, this table will have a size of O(n × n × ∆) = O(n2 ) and can be computed
using Theorems 3 and 4 with time complexity of O(n × n × ∆) = O(n2 ).
To compute the rank of a codeword stored in array C, we also need an auxiliary array N[i] which
keeps the number of nodes in the subtree whose root is labeled by C[i] and corresponds to ni in the above
formula. This array can be computed by a pre-order traversal or a level first search (DFS) algorithm just
once before we call the ranking algorithm.
The pseudo code for ranking algorithm is given in Figure 10. In this algorithm, Beg is the variable
that shows the positions of the first character in the array C whose rank is being computed (Beg is initially
set to 1), and Fin is the variable that returns the position of the last character of C.
Now the time complexity of this algorithm is discussed. Obviously computing the array N[i] takes
O(n). Hence we discuss the complexity of ranking algorithm which was given in Figure 10.
Theorem 5 The ranking algorithm has the time complexity of O(n).
M. Amani, A. Nowzari-Dalini
41
Function Rank( Beg : integer; var Fin: integer) ;
Var R, Point, PointFin, j, Nodes, n: integer;
begin
n := N[Beg];
if (n = 1) then begin
Fin := Beg; return(1) end;
else begin
Point := Beg + 1; R := 0; Nodes := 0; j := 1;
while ( Nodes < n ) do begin
R := R + D[n − Nodes, N[Point] − 1, ∆ − j + 1]+
(Rank(Point, PointFin) − 1)×
D[(n − Nodes − N[Point]), (n − Nodes − N[Point]), ∆ − j];
Nodes := Nodes + N[Point]; j:=j+1;
Point := PointFin + 1;
end;
Fin := Point − 1;
return( R + 1);
end;
end
Figure 10: Ranking algorithm for Tn∆ trees.
Proof. Let T be a Tn∆ tree whose subtrees are defined by T1 , T2 , . . ., Tk and for 1 ≤ i ≤ k ≤ ∆ : |Ti | = ni
and ∑ki=1 ni = n − 1, and let T (n) be the time complexity of the ranking algorithm, then we can write:
T (n) = T (n1 ) + T (n2 ) + . . . + T (nk ) + αk,
where α is a constant and αk is the time complexity of the non-recursive parts of the algorithm. By using
a simple induction, we prove that if β is a value greater than α then T (n) ≤ β n. We have T (1) ≤ β . We
assume T (m) ≤ β (m − 1) for each m < n; therefore,
T (n) ≤ β (n1 − 1) + β (n2 − 1) + . . . + β (nk − 1) + αk,
T (n) ≤ β (n1 + . . . + nk − k) + αk,
T (n) ≤ β n − β k + αk ≤ β n,
So the induction is complete and T (n) ≤ β n = O(n).
If a and b are integer numbers, let (a div b) and (a mod b) denote integer division and remainder
of the division of a and b, respectively (a = (a div b) × b + (a mod b)). Before giving the description
of the unranking algorithm, we have to define two new operators, namely (a div+ b) and (a mod + b) as
follows.
• If b | a, then (a div+ b) = (a div b) − 1, and (a mod + b) = b.
• If b - a, then (a div+ b) = (a div b), and (a mod + b) = (a mod b).
For unranking algorithm, we also need the values of Sn,∆ , these values can be stored in an array of size
n, denoted by S[n] (we assume ∆ is constant). The unranking algorithm is the reverse manner of ranking
algorithm, this algorithm is given in Figure 11. In this algorithm, the rank R is the main input, Beg is
42
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
Function UnRank ( R, Beg, n: integer; Root: char);
var Point, i, t, ChildNum: integer;
begin
if ( (n = 0) or (R = 0) ) then return(Beg − 1)
else begin
if (n = 1) then begin
C[Beg] := Root; return(Beg);
end;
else begin
C[Beg] := Root; Point := Beg + 1;
Root := 0 `0 ; ChildNum := 0;
while (n > 0) do begin
ChildNum + +;
find the smallest i that D[n, i, ∆ −ChildNum + 1] ≥ R;
R := R − D[n, i − 1, ∆ −ChildNum + 1];
if (n − i)= 1 then
if (ChildNum = 1) then Root := 0 s0 ;
else Root := 0 r0 ;
t := S[n];
Point := UnRank( (div+ (R,t)) + 1, Point, i, Root ) +1;
R := mod + (R,t);
n := n − i; Root := 0 m0 ;
end;
return(Point − 1);
end;
end;
end
Figure 11: Unranking algorithm for Tn∆ trees.
the variable to show the position of the first character in the global array C and initially is set to 1. The
generated codeword will be stored in global array C. The variable n is the number of nodes and Root
stores the character corresponding to the node we consider for the unranking procedure. For the next
character, we have two possibilities. If the root is r or s, then the next character, if exists, will be ` or s
(based on the number of root’s children). If the root is m or `, we have again two possible cases: if all
the nodes of the current tree are not produced, then the next character is m, otherwise, the next character
will be r.
Theorem 6 The time complexity of the unranking algorithm is O(n log n).
Proof. Let T be a Tn∆ tree whose subtrees are defined by T1 , T2 , . . ., Tk and for 1 ≤ i ≤ k ≤ ∆ : |Ti | = ni
and ∑ki=1 ni = n − 1, and let T (n) be the time complexity of the unranking algorithm. With regards to the
unranking algorithm, the time complexity of finding j such that D[n, j, ∆ −ChildNum + 1] ≥ R for each
Ti of T is O(log ni ); therefore,
T (n) = O(log n1 + log n2 + . . . + log nk ) + T (n1 ) + T (n2 ) + . . . + T (nk ).
We want to prove that T (n) = O(n log n). In order to obtain an upper bound for T (n) we do as
M. Amani, A. Nowzari-Dalini
43
follows. First we prove this assumption for k = 2 then we generalize it. For k = 2 we have T (n) =
O(log(n1 ) + log(n2 )) + T (n1 ) + T (n2 ). Let n1 = x then we can write the above formula as
T (n) = T (x) + T (n − x) + O(log(x) + log(n − x)) = T (x) + T (n − x) +C0 log(n).
For proving that T (n) = O(n log(n)), we use an induction on n. We assume T (m) ≤ Cm log(m) for all
m ≤ n, thus in T (n) we can substitute
T (n) ≤ C × x log(x) +C × (n − x) log(n − x) +C0 log(n).
Let f (x) = C × x log(x) + C × (n − x) log(n − x), now the maximum value of f (x) with respect to x
and by considering n as a constant value can be obtained by evaluating the derivation of f (x) which is
f 0 (x) = C × log(x) − C × log(n − x). Thus if f 0 (x) = 0 we get x = (n − 1)/2 and by computing f (1),
f (n − 2) and f ((n − 1)/2) we have:
f (1) = f (n − 2) = C × (n − 2) log(n − 2),
f ((n − 1)/2) = 2C × ((n − 1)/2) × log((n − 1)/2) < C × (n − 2) log(n − 2),
so the maximum value of f (x) is equal to C × (n − 2) log(n − 2); therefore,
T (n) ≤ C × (n − 2) log(n − 2) +C0 × log(n).
It is enough to assume C = C0 , then T (n) ≤ C × (n − 2) log(n) +C × log(n) ≤ C × n log(n).
Now, for generalizing the above proof and proving T (n) = O(n log n), we should find the maximum
of the function f (n1 , n2 , . . . , nk ) = ∏ki=1 ni . By the Lagrange method we prove that the maximum value
of f (n1 , n2 , . . . , nk ) is equal to ( nk )k . Then δδ kf = ( nk )k (ln( nk ) − 1) = 0, and
ln( nk ) − 1 = 0,
n
n
k = e ⇒ k = e,
n
so the maximum value of f (n1 , n2 , . . . , nk ) is equal to e e . We know that:
T (n) = O(log n1 + log n2 + . . . + log nk ) + T (n1 ) + T (n2 ) + . . . + T (nk ),
T (n) = O(log(∏ki=1 ni ) + ∑ki=1 T (ni ),
n
T (n) < O(log(n e )) + ∑ki=1 T (ni ),
T (n) < O( ne log e) = O(n) + ∑ki=1 T (ni ).
Finally, by using induction, we assume that for any m < n we have T (m) < β m log m, therefore:
T (n) = O(n) + ∑ki=1 T (ni ),
T (n) < O(n) + ∑ki=1 β O(ni log ni ),
T (n) < O(n) + β log(∏ki=1 (nni i )),
T (n) < O(n) + O(log(nn )),
T (n) = O(n log n).
Hence, the proof is complete.
6
Conclusion
In this paper, we studied the problem of generation, ranking and unranking of ordered trees of size n and
maximum degree ∆ which are a generalization of chemical trees; we presented an efficient algorithm for
the generation of these trees in A-order with an encoding over 4 letters and size n. Also two efficient
ranking and unranking algorithms were designed for this encoding. The generation algorithm has O(n)
time complexity in worst case and O(1) in average case. The ranking and unranking algorithms have
O(n) and O(n log n) time complexity, respectively. The presented ranking and unranking algorithms use
a precomputed table of size O(n2 ) (assuming ∆ is constant). All presented algorithms at this paper are
also implemented. For the future works, generating this class of trees in B-order and minimal change
ordering, and finding some explicit relations for counting them, are major unresolved problems.
44
Generation, Ranking and Unranking of Ordered Trees with Degree Bounds
References
[1] A. Ahmadi-Adl, A. Nowzari-Dalini & H. Ahrabian (2011): Ranking and unranking algorithms for loopless
generation of t-ary trees. Logic Journal of IGPL 19(1), pp. 33–43, doi:10.1093/jigpal/jzp097.
[2] H. Ahrabian & A. Nowzari-Dalini (1998): On the generation of binary trees from (0–1) codes. International
journal of computer mathematics 69(3-4), pp. 243–251, doi:10.1080/00207169808804721.
[3] H. Ahrabian & A. Nowzari-Dalini (1999): On the generation of binary trees in A-order. International journal
of computer mathematics 71(3), pp. 351–357, doi:10.1080/00207169908804813.
[4] H. Ahrabian & A. Nowzari-Dalini (2005): Parallel generation of binary trees in A-order. Parallel Computing
31(8), pp. 948–955, doi:10.1016/j.parco.2005.06.002.
[5] R. Aringhieri, P. Hansen & F. Malucelli (2003): Chemical trees enumeration algorithms. Quarterly Journal
of the Belgian, French and Italian Operations Research Societies 1(1), pp. 67–83, doi:10.1007/s10288-0020008-9.
[6] T. S. Balaban, P. A. Filip & O. Ivanciuc (1992): Computer generation of acyclic graphs based on local vertex
invariants and topological indices. Derived canonical labelling and coding of trees and alkanes. Journal of
Mathematical Chemistry 11(1), pp. 79–105, doi:10.1007/BF01164196.
[7] T. Beyer & S. M. Hedetniemi (1980): Constant time generation of rooted trees. SIAM Journal on Computing
9(4), pp. 706–712, doi:10.1137/0209055.
[8] G. Caporossi, I. Gutman & P. Hansen (1999): Variable Neighborhood Search for Extremal Graphs:
IV: Chemical Trees with Extremal Connectivity Index. Computers & Chemistry 23(5), pp. 469–477,
doi:10.1016/S0097-8485(99)00031-5.
[9] A. A. Dobrynin & I. Gutman (1999): The Average Wiener Index of Trees and Chemical Trees. Journal of
Chemical Information and Computer Sciences 39(4), pp. 679–683, doi:10.1021/ci980158r.
[10] M. C. Er (1992): Efficient generation of k-ary trees in natural order. The Computer Journal 35(3), pp.
306–308, doi:10.1093/comjnl/35.3.306.
[11] H. Fujiwara, J. Wang, L. Zhao, H. Nagamochi & T. Akutsu (2008): Enumerating Treelike Chemical
Graphs with Given Path Frequency. Journal of Chemical Information and Modeling 48(7), pp. 1345–1357,
doi:10.1021/ci700385a.
[12] I. Gutman (1987): Graphs and graph polynomials of interest in chemistry, pp. 177–187. Springer Berlin
Heidelberg, doi:10.1007/3-540-17218-1.
[13] I. Gutman, P. Hansen & H. Mélot (2005): Variable Neighborhood Search for Extremal Graphs. 10. Comparison of Irregularity Indices for Chemical Trees. Journal of Chemical Information and Modeling 45(2), pp.
222–230, doi:10.1021/ci0342775.
[14] I. Gutman & O. E. Polansky (1986): Mathematical concepts in organic chemistry. Springer Berlin Heidelberg, doi:10.1007/978-3-642-70982-1.
[15] P. Hansen, B. Jaumard, C. Lebatteux & M. Zheng (1994): Coding Chemical Trees with the Centered N-tuple Code. Journal of Chemical Information and Computer Sciences 34(4), pp. 782–790,
doi:10.1021/ci00020a010.
[16] J. B. Hendrickson & C. A. Parks (1991): Generation and enumeration of carbon skeletons. Journal of
Chemical Information and Computer Sciences 31(1), pp. 101–107, doi:10.1021/ci00001a018.
[17] S. Heubach, N. Y. Li & T. Mansour (2008): Staircase tilings and k-Catalan structures. Discrete Mathematics
308(24), pp. 5954–5964, doi:10.1016/j.disc.2007.11.012.
[18] J. F Korsh (2005): Generating t-ary trees in linked representation. The Computer Journal 48(4), pp. 488–497,
doi:10.1093/comjnl/bxh110.
[19] J. F. Korsh & P. LaFollette (1999): Loopless generation of Gray codes for k-ary trees. Information processing
letters 70(1), pp. 7–11, doi:10.1016/S0020-0190(99)00035-6.
M. Amani, A. Nowzari-Dalini
45
[20] M. Lepovic & I. Gutman (1998): A collective property of trees and chemical trees. Journal of chemical
information and computer sciences 38(5), pp. 823–826, doi:10.1021/ci980004b.
[21] L. Li (1986): Ranking and unranking of AVL-trees. SIAM Journal on Computing 15(4), pp. 1025–1035,
doi:10.1137/0215073.
[22] J. M. Lucas, D. R. Vanbaronaigien & F. Ruskey (1993): On rotations and the generation of binary trees.
Journal of Algorithms 15(3), pp. 343–366, doi:10.1006/jagm.1993.1045.
[23] S. Nakano & T. Uno (2005): Constant time generation of trees with specified diameter. In: 30th International
Workshop on Graph-Theoretic Concepts in Computer Science, Springer, pp. 33–45, doi:10.1007/978-3-54030559-03.
[24] J. M. Pallo (1987): Generating trees with n nodes and m leaves. International journal of computer mathematics 21(2), pp. 133–144, doi:10.1080/00207168708803562.
[25] J. M. Pallo (1990): A simple algorithm for generating neuronal dendritic trees. Computer methods and
programs in biomedicine 33(3), pp. 165–169, doi:10.1016/0169-2607(90)90038-B.
[26] J. M. Pallo & R. Racca (1985): A note on generating binary trees in A-order and B-order. International
Journal of Computer Mathematics 18(1), pp. 27–39, doi:10.1080/00207168508803477.
[27] F. Ruskey (1978): Generating t-ary trees lexicographically. SIAM Journal on Computing 7(4), pp. 424–439,
doi:10.1137/0207034.
[28] E. Seyedi-Tabari, H. Ahrabian & A. Nowzari-Dalini (2010): A new algorithm for generation of
different types of RNA.
International Journal of Computer Mathematics 87(6), pp. 1197–1207,
doi:10.1080/00207160802140049.
[29] M. Shimizu, H. Nagamochi & T. Akutsu (2011): Enumerating tree-like chemical graphs with given upper
and lower bounds on path frequencies. BMC Bioinformatics 12(14), pp. 1–9, doi:10.1186/1471-2105-12S14-S3.
[30] V. Vajnovszki & J. M. Pallo (1994): Generating binary trees in A-order from codewords defined
on a four-letter alphabet. Journal of Information and Optimization Sciences 15(3), pp. 345–357,
doi:10.1080/02522667.1994.10699193.
[31] V. Vajnovszki & J. M. Pallo (1997): Ranking and unranking k-ary trees with a 4 k-4 letter alphabet. Journal
of Information and Optimization Sciences 18(2), pp. 271–279, doi:10.1080/02522667.1997.10699333.
[32] H. S. Wilf & N. A. Yoshimura (1989): Ranking rooted trees, and a graceful application. Annals of the New
York Academy of Sciences 576(1), pp. 633–640, doi:10.1111/j.1749-6632.1989.tb16444.x.
[33] P. Willett, J. M. Barnard & G. M. Downs (1998): Chemical similarity searching. Journal of chemical information and computer sciences 38(6), pp. 983–996, doi:10.1021/ci9800211.
[34] R. A. Wright, B. Richmond, A. Odlyzko & B. D. McKay (1986): Constant time generation of free trees.
SIAM Journal on Computing 15(2), pp. 540–548, doi:10.1137/0215039.
[35] R. Wu, J. Chang & C. Chang (2011): Ranking and unranking of non-regular trees with a prescribed branching
sequence. Mathematical and Computer Modelling 53(5), pp. 1331–1335, doi:10.1016/j.mcm.2010.12.019.
[36] R. Wu, J. Chang & Y. Wang (2006): A linear time algorithm for binary tree sequences transformation using left-arm and right-arm rotations. Theoretical Computer Science 355(3), pp. 303–314,
doi:10.1016/j.tcs.2006.01.022.
[37] L. Xiang, K. Ushijima & C. Tang (2001): On generating k-ary trees in computer representation. Information
processing letters 77(5), pp. 231–238, doi:10.1016/S0020-0190(00)00155-1.
[38] K. Yamanaka, Y. Otachi & S. Nakano (2009): Efficient enumeration of ordered trees with k leaves. In:
WALCOM: Algorithms and Computation, Springer, pp. 141–150, doi:10.1016/j.tcs.2011.01.017.
[39] S. Zaks (1980): Lexicographic generation of ordered trees. Theoretical Computer Science 10(1), pp. 63–82,
doi:10.1016/0304-3975(80)90073-0.
[40] B. Zhuang & H. Nagamochi (2010): Constant Time Generation of Trees with Degree Bounds. In: 9th
International Symposium on Operations Research and Its Applications, pp. 183–194, doi:10.1.1.385.6436.
| 8cs.DS
|
arXiv:1704.07722v1 [q-bio.MN] 25 Apr 2017
A Convex Approach to Steady State Moment
Analysis for Stochastic Chemical Reactions
Yuta Sakurai and Yutaka Hori∗
Abstract
Model-based prediction of stochastic noise in biomolecular reactions often resorts to approximation with unknown precision. As a result, unexpected stochastic fluctuation causes a
headache for the designers of biomolecular circuits. This paper proposes a convex optimization
approach to quantifying the steady state moments of molecular copy counts with theoretical
rigor. We show that the stochastic moments lie in a convex semi-algebraic set specified by
linear matrix inequalities. Thus, the upper and the lower bounds of some moments can be
computed by a semidefinite program. Using a protein dimerization process as an example, we
demonstrate that the proposed method can precisely predict the mean and the variance of the
copy number of the monomer protein.
1
Introduction
A grand challenge of synthetic biology is to build and control layers of artificial biomolecular
reaction networks that enable complex tasks by utilizing naturally existing reaction resources
in micro-scale organisms such as E. coli. In control engineering community, many theoretical
tools were developed over the last decade to enable model-guided design of biomolecular circuits
including a fold-change detector [7], oscillators [4, 8, 9, 16], an event detector [10], and a lightcontrolled feedback circuit for setpoint control [12, 13]. Other successfully implemented examples
include logic gates [14], a genetic memory [19], and a communication system between cells [2], to
name a few. Given the elementary modules of artificial bimolecular networks, the next step stone
is to assemble the circuit parts to build multiple layers of biomolecular networks that can provide
practical functions.
As is the case with mechanical and electrical engineering, guaranteeing the performance of individual circuit modules at high precision is a key to successfully building large-scale and robust
biomolecular circuits. Biosystems engineering, however, has a unique challenge, in contrast with
other fields of engineering, that the signal-to-noise ratio is so low that the heterogeneity of circuit
states between biological cells is almost impossible to avoid. A major source of the heterogeneity
is the stochastic chemical reactions that are caused by the low copy nature of reactive molecules in
a small-volume reactor, that is, a biological cell. In other words, the events of molecular collision
that fire reactions are more accurately captured by stochastic process rather than continuous and
deterministic process governed by ordinary differential equations (ODEs). This situation raises
a strong need for the theoretical tools that can rigorously certify the performance of stochastic
chemical reactions using statistical norms such as mean and variance of molecular copy numbers.
∗ Y.
Sakurai and Y. Hori are with Department of Applied Physics and Physico-Informatics, Keio University, Japan.
[email protected], [email protected]. This work was supported in part by JSPS KAKENHI
Grant Number JP16H07175 and Keio Gijuku Academic Development Funds.
The random fluctuation of the copy number of molecules can be regarded as a Markov process
that follows the chemical master equation (CME) [6]. Despite a linear ODE, the CME is often
hard to solve analytically because of the infinite dimensionality of the equation. A typical solution
to this problem is to use Monte Carlo simulations [5]. This approach, however, requires high
computational time. Moreover, a strict error bound is hard to obtain. To resolve these issues, the
finite state project [15] provides a systematic way to truncate the equation with an error bound.
Although useful for analyzing transient dynamics, the FSP still suffers from high dimensionality
if one wants to evaluate the probability distribution near the steady state, which is often the
operation point of interest.
A more direct approach to evaluating the statistics of biomolecular circuits is to use the moment
equation, an infinite dimensional ODE derived from the CME. Recently developed moment closure
approaches [18,20] allow for approximately solving the ODE by order reduction technique. The central idea is to approximate the high order moments in the equation using the lower order moments
to derive a finite order closed ODE. Using this method, we can efficiently and directly compute
the statistics of the molecular copy numbers of biomolecular circuits. Although appealing, this
approach requires assuming the underlying probability distribution, which is not apriori in practice. As a result, biocircuit designers have to engineer biomolecular circuits based on approximated
statistics with unknown precision.
The objective of this paper is to propose a novel algebraic approach to rigorously quantifying the
steady state statistics of stochastic biomolecular reactions. Specifically, the main contribution of
this paper is the formulation of an optimization problem that calculates the upper and the lower
bounds of statistical values of molecular copy numbers in biomolecular circuits. We show that the
bounds of the mean and the variance can be obtained by semidefinite programming. In particular,
the proposed method allows for rigorous quantification of the statistics for any stochastic chemical
reactions modeled by the CME as it does not assume underlying probability distribution unlike the
moment closure approach. We illustrate the proposed method by analyzing a stochastic protein
dimerization process.
The organization of this paper is as follows. In Section II, we introduce the CME and derive
the moment equation. Then, the optimization problem for moment computation is formulated
in Section III. In section IV, we analyze the mean and the variance of a stochastic dimerization
process. Finally, Section V summarizes our findings and concludes this paper.
The following notations are used in this paper. N0 := {0, 1, 2, · · · }. N+ := {1, 2, 3, · · · }. R+ :=
{x ∈ R Q
| x ≥ 0}. deg(p(x)) is P
the degree of the polynomial p(x). For multivariate polynomials
p
n
n
p(x) = j=1 xj j , deg(p(x)) := j=1 pj .
2
2.1
Moment Dynamics of Stochastic Chemical Reactions
Model of stochastic chemical reactions
We consider a chemical reaction network consisting of n ∈ N+ species of molecules and denote
the copy number of each molecular species by x = [x1 , x2 , · · · , xn ]T ∈ Nn0 . There are r types of
reactions in the reaction network, and let si = [si1 , si2 , · · · , sin ]T ∈ Zn be the increment of the
molecular copy x by the i-th chemical reaction (i = 1, 2, · · · , r).
Chemical reactions are caused by collisions of molecules. When the reaction volume is sufficiently
large, the copy number of molecules is so large that the collision event occurs almost continuously
in time. On the other hand, in small reactor systems such as microbes, the collision events tend to
be stochastic as the copy number of molecules is small. This results in the stochastic fluctuation
of x. It is known that stochastic chemical reactions can be modeled by a Markov process. More
specifically, we define Px (t) as the probability that there are x molecules at time t. The stochastic
chemical reactions can be modeled by the following Chemical Master Equation (CME) [6],
r
dPx (t) X
{wi (x − si )Px−si (t) − wi (x)Px (t)} ,
=
dt
i=1
(1)
where wi (x) is the transition rate associated with the i-th chemical reaction and is defined by
wi (x) = lim
Px+si(t + ∆t) − Px(t)
(i = 1, 2, · · · , r).
∆t
∆t→0
(2)
The transition rate wi (x) is characterized by the rate of the reaction i (i = 1, 2, · · · , r) We assume
that all of the r reactions are elementary as non-elementary reactions can always be decomposed
into elementary reactions. For elementary reactions, the transition rate wi (x) is a polynomial
of xi ’s, and we utilize this fact in the following subsection to derive the equations of stochastic
moments.
As x is the vector of non-negative positive integers Nn0 , the CME (1) is a linear but an infinite
dimensional ODE with respect to Px (t). An analytic solution to the CME is, thus, hardly obtained
except for some simple examples. In the next subsection, we derive the equations of moment
dynamics to directly compute the statistical values without computing the distribution Px (t).
2.2
The dynamics of moments
In this section, we derive the model of moment dynamics based on the CME (1). First, we define
a stochastic moment by
∞ X
∞
∞ Y
n
n
X
X
Y
α
α
(3)
xj j Px (t),
···
xj j =
mα := E
x1 =0x2 =0
j=1
xn =0 j=1
where α := [α1 , α2 , · · · , αn ] ∈ Nn0 . P
We refer to the sum of the entries of α as the order of the
moment and denote by deg(mα ) := j αj with a little abuse of notation.
The stochastic moments carry all the information of the probability distribution, and some of
the low order moments are useful to define the design specification of stochastic biomolecular
circuits. Figure 1 illustrates an example of the distribution of a molecular copy number x of some
biomolecular reaction. In this case, the analytic form of the distribution is not known, and thus it
is more appropriatep
to specify the design
p goal by statistical norms such mean E[x] = m1 and the
standard deviation E[(x − E[x])2 ] = m2 − m21 of the distribution using the moments.
Q α
To derive the dynamics of stochastic moments, we multiply the model (1) by j xj j and calculate
the expected value by taking sum over Nn0 to obtain the following differential equation.
n
X
Y
d
α
xj j Px (t)
dt x
j=1
=
n
XY
x j=1
where we use
P
x
α
xj j
r
X
{wi (x−si )Px−si(t)−wi (x)Px (t)} ,
(4)
i=1
to abbreviate the sum over the positive orthant.
X
x
:=
∞ X
∞
X
x1 =0 x2 =0
···
∞
X
xn =0
.
(5)
Figure 1: An example of probability distribution Px (t) and its relationship with stochastic moments
As wi (x) is a polynomial of xi (i = 1, 2, · · · , n), we can rewrite the equation (4) as
XX
X
d
mα =
Aα,β mβ
···
dt
β1
β2
(α ∈ Nn0 ),
(6)
βn
where Aα,β are the coefficients of the monomials of the polynomial
r X
X
i=1
{(x1 + si1 )α1 (x2 + si2 )α2
x
αn
1 α2
· · · (xn + sin )αn − xα
1 x2 · · · xn } wi (x).
(7)
Note that the range of the summation in (6) depends on the degree of the polynomial (7). In many
cases, the higher order moments are necessary to characterize the low order moments, i.e., there
are moments mβ satisfying deg(mβ ) > deg(mα ) in the right-hand side of (6). More specifically,
when the reactions are elementary, it is reasonable to assume that the polynomial order of the
transition rates wi (x) are at most two since most practical reactions are unimolecular or bimolecular
reactions [3]. When deg(wi (x)) = 0 or 1, mβ in the right-hand side of equation (6) satisfies
0 ≤ deg(mβ ) ≤ deg(mα ),
(8)
implying that the moment equation is closed, i.e, the dynamics of the i-th order moment can be
written by the i-th or lower order moments. On the other hand, when one or more wi (x)’s are
quadratic, i.e., deg(wi (x)) = 2,
0 ≤ deg(mβ ) ≤ deg(mα ) + 1.
(9)
Thus, the moment equation (6) becomes an infinite dimensional coupled linear ODE, which is hard
to solve analytically.
3
Moment Analysis of Stochastic Chemical Reactions
3.1
Truncation of the moment equation
When we design stochastic chemical reactions using a genetic circuit, the specification of the
circuit is often given by a set of statistical constraints such as the mean and the variance of the
copy numbers of the molecules. In this paper, we consider the following problem.
Problem 1. For a given CME (1), find the lower and the upper bounds of the mean and the
variance of molecular copy number x at steady state.
To solve this problem, let dmα /dt = 0 in the equation (6), and consider the subset of linear
equations by limiting the equations up to the µ-th order moments. Specifically,
XX
X
Aα,β mβ (α ∈ Aµ ⊂ Nn0 ) ,
(10)
0=
···
β1
βn
β2
where the set Aµ is defined by
Aµ :=
(
α∈
Nn0
0≤
n
X
i
)
αi ≤ µ .
(11)
In what follows, we refer to µ as the truncation order. When deg(wi (x)) = 0 or 1, the number of
equations is the same as the number of variables (see (8)), and thus we can compute the unique
solution (if the equations are not degenerated). In the more general case where the transition
rates wi (x) are quadratic, the right-hand side of (10) depends on the higher order moments, i.e.,
deg(mβ ) = µ + 1, as shown in (9) Consequently, the equations become underdetermined, and we
can only conclude that the solution lies on a certain hyperplane unless we consider an infinite
number of equations.
To further specify the solution space of the moments mβ , we utilize the fact that mβ must be
the moments of some (probability) measure defined on the positive orthant. In particular, we use a
so-called moment condition to constrain mβ and formulate a semidefinite program solving Problem
1.
3.2
Necessary condition for mβ to be moments
Q p
Let x be the vector that consists of all of the monomial bases satisfying deg( j xj j ) = p, and
(H)p,q be a matrix of the form
h
i
T
(H)p,q := E xp (xq ) ,
(12)
p
where E[xp (xq )T ] represents the entry-wise expected value of the matrix xp (xq )T . In a similar
manner, we define (Hk )p,q by
i
h
T
(k = 1, 2, · · · , n).
(13)
(Hk )p,q := E xk xp (xq )
It should be noted that the entries of the matrices (H)p,q and (Hk )p,q can be written with mβ
satisfying
(
p+q
for (H)p,q
deg(mβ ) =
.
(14)
p + q + 1 for (Hk )p,q
Using the matrices (H)p,q and (Hk )p,q , we define the following block Hankel matrices H (γ1 ) ({mβ })
(γ )
and Hk 2 ({mβ }) (k = 1, 2, · · · , n).
(H)0,0 (H)0,1 · · · (H)0,γ1
(H)1,0 (H)1,1 · · · (H)1,γ1
(15)
H (γ1 )({mβ }) := .
,
..
..
..
..
.
.
.
(H)γ1 ,0 (H)γ1 ,1 · · · (H)γ1 ,γ1
(Hk )0,0 (Hk )0,1
(Hk )1,0 (Hk )1,1
(γ )
Hk 2 ({mβ }) :=
..
..
.
.
(Hk )γ2 ,0 (Hk )γ2 ,1
· · · (Hk )0,γ2
· · · (Hk )1,γ2
,
..
..
.
.
· · · (Hk )γ2 ,γ2
where γ1 and γ2 are determined as follows.
(µ + 1)/2 (if µ is odd)
γ1 =
,
µ/2
(if µ is even)
γ2 =
(µ − 1)/2 (if µ is odd)
.
µ/2
(if µ is even)
(16)
(17)
(18)
(γ )
Using H (γ1 ) ({mβ }) and Hk 2 ({mβ }), the following proposition provides linear matrix inequality
(LMI) conditions that the moments of some (probability) measure on Rn+ must satisfy.
Proposition 1. [11] Consider a sequence (mβ )β∈Aµ+1 with the set Aµ+1 defined by (11). The
sequence (mβ )β∈Aµ+1 constitutes moments of some measure defined on the positive orthant Rn+ :=
{x ∈ Rn | xk ≥ 0 (k = 1, 2, · · · , n)} only if
H (γ1 ) ({mβ }) 0,
(γ )
Hk 2 ({mβ })
0
(19)
(k = 1, 2, · · · , n).
(20)
The conditions (19) and (20) are called a moment condition and localized moment conditions,
respectively. Combining Proposition 1 with (10), the following theorem specifies semi-algebraic
conditions that the moments of the stochastic chemical reactions must satisfy.
Theorem 1. Consider the stochastic chemical reaction modeled by the equation (1). Let m∗β
denote the steady state moments of the random variable x. For a given truncation order µ, the
moments m∗β satisfy the following conditions.
0=
XX
β1
H
(γ1 )
···
β2
({m∗β })
(γ )
Hk 2 ({m∗β })
X
Aα,β m∗β
(α ∈ Aµ ⊂ Nn0 ) ,
βn
0,
0
(21)
(k = 1, 2, · · · , n),
where Aα,β are the coefficients of the polynomial (7).
Theorem 1 implies that the moments of the stochastic chemical reaction governed by (1) lie in the
semi-algebraic set (21). Thus, Problem 1 can be recast as a relaxation problem over the convex
semi-algebraic set. In particular, we show, in the following section, that the bounds of the mean
and the variance can be computed by semidefinite programming.
Remark 1. In the special case of n = 1 random variable, the conditions (19) and (20) with
γ1 , γ2 → ∞ become both necessary and sufficient for the sequence (mβ )β∈N0 to be the moments of
some measure on R+ [11]. The associated problem is called Stieltjes moment problem named after
the renowned mathematician Thomas Stieltjes. Similar conditions are available for the moments
of measures defined on various domains such as [0, 1], R and semi-algebraic sets (see [11, 17] for
example).
3.3
Semidefinite programming for mean and variance computation
Theorem 1 asserts that the lower and the upper bounds of the steady state statistics, say f (mα ),
can be calculated by solving the following optimization problems, respectively.
min
subject to
f (mα )
(21),
(22)
max
subject to
f (mα )
(21).
(23)
Note that the constrains are convex. In what follows, we show that the bounds of mean and
variance, the two most important statistics of stochastic chemical reactions, can be formulated as
semidefinite programs.
Mean The objective function f (mα ) is obviously linear, and thus the problem falls into the class
of semidefinite programming. For example, if one wants to compute the mean of the copy number
of the i-th molecule, the objective function should be
(24)
f (mα ) = E[xi ] = mei
with ei representing the row vector whose i-th entry is 1 and 0 elsewhere.
In general, the gap between the upper and the lower bounds decreases monotonically with the
increase of the truncation order µ. Thus, there is a tradeoff between computational cost and the
conservativeness of the bounds.
Upper bound of variance By definition, the variance of the copy number of the i-th molecule
is given by
f (mα ) = ei E (x − E[x])(x − E[x])T eT
i
= m2ei − m2ei .
(25)
The second term of the objective function f (mα ) = m2ei − m2ei is quadratic, and the optimization
problem (23) is seemingly not semidefinite programming. However, using the Schur complement,
we can convert the optimization (23) into an equivalent semidefinite programming as follows.
Theorem 2. The solution of the optimization problem (23) with the objective function (25) is
the same as that of the following optimization problem.
max
subject to
V
(21)
m2ei − V
mei
The proof of this theorem can be found in Appendix A.
(26)
mei
1
O.
1
=
2
1
3
=
=
3
( − 1)
2
Figure 2: Genetic circuit producing monomer and dimer proteins
Lower bound of variance The lower bound of variance can be also computed by semidefinite
programming with additional relaxation. Specifically, we first compute the upper bound of the
mean value mei , and then substitute the result into m2ei of the equation (25) to obtain a linear objective function. The estimated lower bound of variance monotonically increases with the
truncation order µ since the upper bound of the mean value mei monotonically decreases.
As the optimization problems shown in this subsection use convex relaxation, there may be the
case where the truncation order µ needs to be unrealistically large to reduce the conservativeness
of the bounds to a practically useful level. To the authors’ experience, however, one will only
need to use µ = 6 to 12-th order moments to obtain a practically useful bounds for small reaction
networks with n = 3 to 5 molecules. The general quantitative analysis, however, is still an open
question.
Remark 2. The moment closure approaches [18, 20] allow for approximating the high order moments, mβ with deg(mβ ) = µ + 1, using the low order moments, mβ with deg(mβ ) ≤ µ, to solve
the equation (10). This approach, however, is based on assumptions on the underlying distribution
Px (t). Thus, the quantification of the approximation error is not easy. On the other hand, the proposed semidefinite programs are advantageous in that they can compute the upper and the lower
bounds of the statistics of stochastic chemical reactions with theoretical rigor without assuming
an underlying distribution.
4
Application to a Stochastic Genetic Circuit
To illustrate the proposed semidefinite programming approach, we analyze a protein dimerization
process, which is one of the simplest examples of stochastic biomolecular reactions. Consider the
chemical reactions shown in Fig. 2, where there are three species of molecules, DNA, monomer
protein and dimer protein, and r = 3 reactions. In Fig. 2, the protein monomer is first produced
from DNA, and then it is either degraded or dimerized. As a result, the copy number of protein
monomer reaches a steady state at t → ∞.
In what follows, our goal is to analyze the steady state mean and variance of the copy number
of the protein monomer. Let the copy number of monomer protein and its α-th order moment be
defined by x and
∞
X
xα Px (t),
mα := E [xα ] =
x=0
respectively. It should be noticed that m0 = 1 by definition. Let DT denote the total copy number
of DNA molecules and assume that DT is a constant. The reaction rates of monomer production,
degradation and dimerization wi (x) (i = 1, 2, 3) are then defined by the polynomials in Table 1.
Table 1: Transition rates wi (x) in Fig. 2
Reaction i Transition rate wi (x)
1
k1 DT
k2 x
2
3
k3 x(x − 1)
Table 2: Parameters of chemical reactions in Fig. 2
Parameter
Value
Meaning
k1
0.7 min−1
Transcription and translation rate
k2
ln(2)/20 copy−1·min−1 Protein (monomer) degradation
0.1 copy−1·min−1
Dimerization rate
k3
DT
50 copy
Total copy of DNA
The stoichiometry of the reactions, or the increment of the copy number of monomer protein by
each reaction, is given by
s1 = 1, s2 = −1, s3 = −2.
Suppose the values of the parameters are given by Table 2. First, we derive the moment equation
(10) by expanding the polynomial (7). Specifically, let the truncation order be µ = 3. Then, we
have
m
0.0 0.0
0.0
0.0 0.0 0
35.0 0.2 −0.2 0.0 0.0 m1
0=
(27)
35.0 69.6 0.7 −0.4 0.0 m2 .
m3
35.0 105.8 105.5 1.7 −0.6
m4
It should be noted that the low order moments m1 , m2 and m3 depend on the higher order moment
m4 since the transition rate w3 (x) is quadratic in x (see Table 1). The equation (27) implies that
the moments of the stochastic reactions are in the nullspace of the matrix. To further constrain
the feasibility set, we use the moment condition and the localized moment condition, which are
given by
m0 m1 m2
m1 m2
m1 m2 m3 O,
O,
(28)
m2 m3
m2 m3 m4
respectively. In practice, the truncation order µ needs to be determined so that the gap between the
lower and the upper bounds is sufficiently small. This might require computing the optimization
problems (22) and (23) multiple times.
To analyze the mean copy number of protein monomer, let the objective function be f (mα ) =
E[x] = m1 and solve the optimization problems (22) and (23). Figure 3 (A) illustrates the computed
lower and the upper bounds of the mean monomer protein copy number for each truncation order
µ. The gap between the bounds monotonically decreases with increasing µ, and with µ = 5, we
can conclude
13.26 ≤ E[x] ≤ 13.27,
which is a sufficient resolution in practice.
(29)
(A)
(B)
30
Variance of protein
copy molecule
Mean of protein
copy molecule
15
10
5
0
Maximum Value
Minimum Value
1
3
5
Order
7
9
Maximum Value
Minimum Value
25
20
15
10
5
0
1
3
5
7
9
Order
Figure 3: Upper and lower bounds of mean copy number and variance.
Next, to calculate the upper bound of the variance, let f (mα ) = E[(x − E[x])2 ] = m2 − m21 ,
and solve the optimization problem (26). The lower bound is also computed using the relaxation
described in Section III. The optimization result in Fig. 3 (B) shows that the variance is bounded
by
9.94 ≤ E[(x − E[x])2 ] ≤ 9.95.
(30)
It should be noticed that these results are mathematically strict and thus enable rigorous quantification of biocircuit performance using the statistical norms.
Remark 3. We have only shown the example of one variable case for the illustration purpose
in this section, but generalization to n random variables is straightforward. However, a critical
challenge for the multivariate case, say n ≥ 10, is the reduction of computation time. The computation burden mainly comes from the number of the variables, which is given by µ+n Cµ . To
overcome the limitation, it would be worth developing a method to reduce the variables that have
little effect on the calculation results since most variables do not appear in the linear constraint as
n gets larger. Development of the reduction technique is left for our future work.
5
Conclusion
In this paper, we have formulated the optimization problem to compute the bounds of the steady
state statistics of stochastic chemical reactions in genetic circuits. First, we have introduced the
steady state moment equation, which is a set of underdetermined linear equations. To restrict
the solution space of the moment equation, our key idea is to use the LMI conditions, which
the moments of some measure must satisfy. Consequently, we have obtained a convex relaxation
problem that can be solved by semidefinite programming. A distinctive feature of the proposed
approach is that it can provide mathematically rigorous upper and lower bounds of the statistics
for any stochastic chemical reactions modeled by the CME. To demonstrate the method, we have
analyzed the protein dimerization process and have obtained tight bounds of the mean and the
variance.
Although we have only considered the steady state moments, we can extend the proposed approach to the analysis of transient moments. The authors are currently working to build a stochastic
biocircuit design tool based on the specifications of transient statistics.
References
[1] S. P. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004.
[2] T. Danino, O. Mondragón-Palomino, L. Tsimring, and J. Hasty. A synchronized quorum of
genetic clocks. Nature, 463(7279):326–330, 2010.
[3] E. T. Denisov, O. M. Sarkisov, and G. I. Likhteshtein. Chemical kinetics: fundamentals and
new developments. Elsevier, 2003.
[4] M. B. Elowitz and S. Leibler. A synthetic oscillatory network of transcriptional regulators.
Nature, 403(6767):335–338, 2000.
[5] D. T. Gillespie. A general method for numerically simulating the stochastic time evolution of
coupled chemical reactions. Journal of Computational Physics, 22(4):403–434, 1976.
[6] D. T. Gillespie. A rigorous derivation of the chemical master equation. Physica A, 188(1–
3):404–425, 1992.
[7] S. Guo, Y. Hori, and R. M. Murray. Systematic design and implementation of a novel synthetic
fold-change detector biocircuit in vivo. Technical report, California Institute of Technology,
2014.
[8] Y. Hori, T.-H. Kim, and S. Hara. Existence criteria of periodic oscillations in cyclic gene
regulatory networks. Automatica, 47(5):1203–1209, 2011.
[9] Y. Hori, M. Takada, and S. Hara. Biochemical oscillations in delayed negative cyclic feedback:
existence and profiles. Automatica, 49(9):2581–2590, 2013.
[10] V. Hsiao, Y. Hori, P. W. K. Rothemund, and R. M. Murray. A population-based temporal
logic gate for timing and recording chemical events. Molecular Systems Biology, 12(869), 2016.
[11] H. J. Landau. Moments in Mathematics. American Mathematical Society, 1987.
[12] A. Milias-Argeitis, M. Rullan, S. K. Aoki, P. Buchmann, and M. Khammash. Automated
optogenetic feedback control for precise and robust regulation of gene expression and cell
growth. Nature Communications, 7(12):1114–1116, 2011.
[13] A. Milias-Argeitis, S. Summers, J. Stewart-Ornstein, I. Zuleta, D. Pincus, H. El-Samad,
M. Khammash, and J. Lygeros. In silico feedback for in vivo regulation of a gene expression circuit. Nature Biotechnology, 29(12):1114–1116, 2011.
[14] T.-S. Moon, C. Lou, A. Tamsir, B. C. Stanton, and C. A. Voigt. Genetic programs constructed
from layered logic gates in single cells. Nature, 491(7423):249–253, 2012.
[15] B. Munsky and M. Khammash. The finite state projection algorithm for the solution of the
chemical master equation. Journal of Chemical Physics, 124(4):044104, 2006.
[16] H. Niederholtmeyer, Z. Sun, Y. Hori, E. Yeung, A. Verpoorte, R. M. Murray, and S. J. Maerkl.
Rapid cell-free forward engineering of novel genetic ring oscillators. eLife, 4:e09771, 2015.
[17] J. A. Shohat and J. D. Tamarkin. The problem of moments. American Mathematical Society,
1943.
[18] A. Singh and J. P. Hespanha. Approximate moment dynamics for chemically reacting systems.
IEEE Transactions on Automatic Control, 56(2):414–418, 2011.
[19] L. Yang, A. A. K. Nielsen, J. Fernandez-Rodriguez, C. J. McClune, M. T. Laub, T. K. Lu, and
C. A. Voigt. Permanent genetic memory with > 1 byte capacity. Nature Method, 11(12):1261–
1266, 2014.
[20] Y.-B. Zhao, J. Kim, and J. P. Hespanha. Hybrid moment computation algorithm for biochemical reaction networks. In Proceedings of IEEE Conference on Decision and Control, pages
1693–1698, 2010.
A
Proof of Theorem 2.
Proof The optimization problem (23) is equivalent to the following problem.
max
subject to
V
f (mα ) ≥ V
(21).
As the objective function is f (mα ) = m2ei − m2ei , the inequality f (mα ) ≥ V in the constraint can
be equivalently written by
m2ei − V mei
O
(31)
1
mei
using Schur compliment [1]. The optimal value of (23) is thus equal to that of (26).
| 3cs.SY
|
arXiv:1709.02748v1 [math.AC] 8 Sep 2017
ON PRESERVATION PROPERTIES AND A SPECIAL
ALGEBRAIC CHARACTERIZATION OF SOME STRONGER
FORMS OF THE NOETHERIAN CONDITION
DANNY ARLEN DE JESÚS GÓMEZ-RAMÍREZ, JUAN D. VÉLEZ,
AND EDISSON GALLEGO
Abstract. We give an elementary proof prove of the preservation of
the Noetherian condition for commutative rings with unity R having at
least one finitely generated ideal I such that the quotient ring is again
finitely generated, and R is I−adically complete. Moreover, we offer as
a direct corollary a new elementary proof of the fact that if a ring is
Noetherian then the corresponding ring of formal power series in finitely
many variables is Noetherian. In addition, we give a counterexample
showing that the ‘completion’ condition cannot be avoided on the former
theorem. Lastly, we give an elementary characterization of Noetherian
commutative rings that can be decomposed as a finite direct product of
fields.
Mathematical Subject Classification (2010): 13E05
Keywords: Noetherian condition, direct product of fields
Introduction
Among the most studied rings in commutative algebra are the Noetherian
ones, i.e., commutative rings with unity such that every ideal can be finitely
generated. Moreover, one needs to increase a little bit the level of formal
sophistication in order to find simple examples of non-Noetherian structures
such as the ring of polynomials in countable many variables over a field or the
ring of algebraic integers. So, (elementary) results preserving and implying the
Noetherian condition after the application of standard algebraic operations
(such as completion, quotient, localization, etc.) are quite useful (see [9],
[4], [11] and [8]). Similarly, new characterizations of (stronger forms of the)
Noetherian condition are oft very valuable for enlightening our understanding
of what finite generation in (non-)commutative algebra means (see [14], [13],
[2] and [7]).
Finally, we will prove in an elementary way two results concerning, on the
one hand, the preservation of the Noetherian condition for a commutative
ring with unity R having at least one finitely generated ideal I such that the
1
2
DANNY A. J. GÓMEZ-RAMÍREZ, JUAN D. VELEZ, AND EDISSON GALLEGO
quotient ring is again finitely generated and R is I−adically complete. In
addition, we also offer as a corollary a new elementary proof of the fact that
the ring of formal power series in finitely many variables is Noetherian, if
its ring of coefficient so is, and we give a counterexample showing that the
‘completion’ condition cannot be avoided. On the other hand, we give a quite
simple algebraic characterization of Noetherian commutative rings that can
be decomposed as a finite direct product of fields.
1. Preservation Properties of the Noetherian Condition
involving a Special Class of Finitely Generated Ideals
In this section, by a ring we will mean a commutative ring with identity,
not necessarily Noetherian.
Let R be a ring, and let I be an ideal of R. We will show that if I
is finitely generated and R/I is Noetherian, then the completion of R with
respect to the I-adic topology is also Noetherian. In general one cannot expect
R to be Noetherian under these hypothesis, as shown in Example 1.3 below.
This result can be regarded as a generalization of the following well known
corollary to the Cohen Structure Theorems ([3]), ([5, pag. 189,201]): if (R, m)
is a quasilocal complete ring (with respect to the m-adical topology) then R
is Noetherian if m is finitely generated. The Noetherian property is deduced
from the fact that under these hypothesis R is a quotient of a power series
ring over a complete discrete valuation ring. We observe that this result can
be recovered immediately from Theorem 1.1 as the very special case when
I is maximal, since R/I is a field, hence automatically Noetherian. While
Cohen Structure Theorems require some machinery, the result below is totally
elementary.
As a corollary, we deduce a quite elementary new proof of the fact that If
A is Noetherian, so it is the power series ring A[[x1 , . . . , xn ]].
Theorem 1.1. Let R be a ring, and let I be a finitely generated ideal of R.
Suppose that R is I-adically complete, and that R/I is Noetherian. Then R
is also Noetherian.
Proof. If R were not Noetherian, a standard argument using Zorn’s Lemma
shows that there is a maximal ideal P in R with respect to the property of not
being finitely generated, and this ideal is necessarily prime. It is clear that P
does not contain I, otherwise, since R/I is Noetherian, any lifting of a set of
generator for P/I coupled with generators of I would also generate P. Thus,
we may assume that there exist z ∈ I such that z ∈
/ P. By the maximality of
P , the ideal P + Rz must be finitely generated. Let fi + ri z, i = 1, . . . , n be
any set of generators, with fi ∈ P.
We claim that {f1 , . . . , fn } is a set of generators for P. Let f be any element
(0)
of P . Then, since f is a priory in P + Rz there must be elements gi ∈ R
ON SPECIAL PROPERTIES INVOLVING THE NOETHERIAN CONDITION
3
such that
(1.1)
f=
n
X
(0)
gi (fi + ri z) =
n
X
(0)
gi fi + zf (1) ,
i=1
i=1
(0)
i=1 gi ri .
Pn
Pn
(0)
Hence, f − i=1 gi fi = zf (1) is in P. Since we
where f (1) =
are assuming z ∈
/ P, and P is prime we deduce f (1) ∈ P.
P
(1)
The same reasoning applied to f (1) yields f (1) =
i = 1n gi fi + zf (2) ,
(1)
for some elements gi ∈ R, and f (2) ∈ P. Replacing f (1) in 1.1 by the right
P
(1)
(0)
hand side of this last equation gives f = ni=1 (gi + zgi )fi + z 2 f (2) . Since
t
z ∈
/ P for any t > 0, a straightforward induction shows that f can be written
as
n
X
(t)
(1)
(0)
(gi + zgi + · · · + z t gi )fi + z t+1 f (t+1) ,
(1.2)
f=
i=1
(t)
for certain elements gi ∈ R, and f (t+1) ∈ P. Since R is complete, hi =
P∞ t (t)
is a well defined element of R.
t=0 z gi
T∞
We now observe that R must be I-adically separated, i.e., t=0 I t is just
b
the kernel of the canonical map i : R −→ RI , which should be the zero ideal,
because i is an isomorphism, since we are making the
Pnassumption that R is
I-adically complete. From this, we deduce that f = i=1 hi fi , since
f−
n
X
i=1
n
∞
n
X
X
X
(j+t+1)
(t)
(1)
(0)
fi
z j gi
hi fi = f − (gi +zgi +· · ·+z t gi )fi −z t+1
i=1
i=1
= z t+1 f (t+1) −
n
X
i=1
∞
X
j=0
(j+t+1)
z j gi
j=0
fi ,
is an element of I t , for all t.
In conclusion, any element f ∈ P can be generated by the set {f1 , · · · , fn } ⊆
P . Therefore, P would be finitely generated, which contradicts our former
assumption.
Corollary 1.2. If A is Noetherian, so it is A[[x1 , . . . , xn ]].
Proof. Let R = A[[x1 , . . . , xn ]] and I = (x1 , . . . , xn ). A standard argument
b
([5, pag. 192]), ([10, pag. 61]) shows that R = B I where B = A[x1 , . . . , xn ].
Since R/IR ≃ A is Noetherian, the previous theorem gives that so it is R.
In general, if R is not complete with respect to the I-adic topology, it is not
true that R is Noetherian under the hypothesis of I being finitely generated
and R/I being Noetherian, not even in the case where I is maximal, as the
following example shows.
4
DANNY A. J. GÓMEZ-RAMÍREZ, JUAN D. VELEZ, AND EDISSON GALLEGO
Example 1.3. Let N denote the set of natural numbers, and let U be any
non principal ultrafilter in N , that is, a collection of infinite subsets of N ,
closed under finite intersection, with the property that for any D ⊂ N , either
D or its complement belongs to U. Let (R, m) be any discrete valuation ring,
and let us denote by Rw a copy of R indexed by the natural w ∈ N. By
S we will denote the ultraproduct, S = u limw→∞ Rw . We recall that
Q this is
defined as the set of equivalent classes in the Cartesian product w∈N Rw ,
where two sequences (aw ) and (bw ) are regarded as equivalent if the set of
indices w where aw = bw is an element of U. This is a ring with the obvious
operations, and it is also local with a principal maximal ideal m′ generated
by the class of (pw ), where mw = (pw ) is the maximal ideal of Rw (see [12,
Ch. 1-2]). If c denotes the class of the sequence of powers (pw )w , then it
′ w
is clear that c belongs to the Jacobson radical of S, ∩∞
w=0 (m ) , and it is
a nonzero element. Consequently, S cannot be Noetherian, even though its
maximal ideal is finitely generated (actually, principal), and S/m′ is a field.
2. A Characterization of a Noetherian Finite Direct Product
of Fields
In this section we will give an elementary algebraic re-formulation of the
fact that a commutative Noetherian ring is the direct product of fields by
means of a idempotent-membership condition, namely, the fact that any of
its elements belongs lo the ideal generated by its-own square.
Theorem 2.1. Let R be a commutative Noetherian ring. Then R is the finite
direct product of fields if and only if any element f ∈ R, holds that f ∈ (f 2 ).
Proof. If R is a finite product of fields, then clearly the desired condition is
satisfied, since any element in R is the direct product of zeros and unities.
Conversely, let us assume, by contradiction, that R is a Noetherian ring
which is not a finite product of fields. We want to prove that there is an
element f ∈ R such that f ∈
/ (f 2 ). In fact, we can reduced to the case of SpecR
connected, because if SpecR is not connected then, due to the Noetherian
hypothesis, we can write SpecR = V (Q1 ) ⊎ · · · ⊎ V (Qs ), where V (Qj ) ∼
=
Spec(R/Qj ) are the connectedQcomponents of SpecR. Hence, by the Chinese
s
Remainder Theorem [1], R ∼
= i=1 R/Qi and by the previous assumption at
least one of the R/Qi is not a field. So, it is enough to find an fi ∈ R/Qi such
that fi ∈
/ (fi2 ) to obtain the desired element f = (0, ..., fi , ..., 0) ∈ R. Now, the
connectedness of SpecR it is equivalent to saying that the only idempotents
of R are trivial ones, namely, zero and one (see for example [6, Ch. 2]).
Lastly, choose f ∈ R neither a unit nor idempotent. Then, f ∈
/ (f 2 ). In
2
fact, by contradiction, if f = cf , for some c ∈ R, and so cf (1 − cf ) = 0,
which means that cf is idempotent. Hence, cf = 0 or cf = 1. In the first
case we have f = (cf )f = 0, and in the second case, f is a unit. Then both
cases contradicts our hypothesis on f .
ON SPECIAL PROPERTIES INVOLVING THE NOETHERIAN CONDITION
5
Acknowledgements
The authors want to thank the Universidad Nacional of Colombia for its
support. In addition, Danny A. J. Gómez-Ramı́rez specially thanks Holger
Brenner for all the inspiring discussions during the preparation of this work.
D. A. J. Gómez-Ramı́rez was supported by the Vienna Science and Technology
Fund (WWTF) as part of the Vienna Research Group 12-004. Finally, he
thanks deeply to Rubents Ramı́rez for being nuestro milagro de vida and for
all the inspiration, to Veronica Ramirez for her unconditional support and to
J. Quintero for (the determination of) being there.
References
[1] Atiyah, M.F., Macdonald, I.: Introducion to Commutative Algebra. Addison-Wesley,
Reading, MA (1969)
[2] Bass, H.: Injective dimension in Noetherian rings. Transactions of the American Mathematical Society 102(1), 18–29 (1962)
[3] Cohen, I.S.: On the structure and ideal theory of complete local rings. Transactions of
the American Mathematical Society 59(1), 54–106 (1946)
[4] Eisenbud, D.: Subrings of Artinian and Noetherian rings. Mathematische Annalen
185(3), 247–249 (1970)
[5] Eisenbud, D.: Commutative Algebra with a View Toward Algebraic Geometry, vol.
150. GTM, Springer-Verlag (1995)
[6] Hartshorne, R.: Algebraic Geometry, vol. 52. GTM, Springer, New York (1977)
[7] He, Z.X.: Characterizations of Noetherian and hereditary rings. Proceedings of the
American Mathematical Society 93(3), 414–416 (1985)
[8] Jategaonkar, A.V.: Localization in Noetherian rings, vol. 98. Cambridge University
Press (1986)
[9] Kunz, E.: On Noetherian rings of characteristic p. American Journal of Mathematics
98(4), 999–1013 (1976)
[10] Matsumura, H.: Commutative Ring Theory. Cambridge University Press, Cambridge
(1989)
[11] Richman, F.: Constructive aspects of Noetherian rings. Proceedings of the American
Mathematical Society 44(2), 436–441 (1974)
[12] Schoutens, H.: The Use of Ultraproducts in Commutative Algebra, Lecture Notes in
Mathematics, vol. 1999. Springer Science & Business Media (2010)
[13] Vamos, P.: The dual of the notion of finitely generated Journal of the London Mathematical Society 1(1), 643–646 (1968)
[14] Van Huynh, D.: A characterization of Noetherian rings by cyclic modules. Proceedings
of the Edinburgh Mathematical Society 39(2), 253–262 (1996)
Vienna University of Technology, Institute of Discrete Mathematics and Geometry, wiedner Hauptstae 8-10, 1040, Vienna, Austria.
Universidad Nacional de Colombia, Escuela de Matemáticas, Calle 59A No 63
- 20, Núcleo El Volador, Medellı́n, Colombia.
6
DANNY A. J. GÓMEZ-RAMÍREZ, JUAN D. VELEZ, AND EDISSON GALLEGO
University of Antioquia, Calle 67 # 53-108, Medellı́n, Colombia.
E-mail address: [email protected]
E-mail address: [email protected]
E-mail address: [email protected]
| 0math.AC
|
arXiv:1509.05537v1 [quant-ph] 18 Sep 2015
The Transfer Function of Generic Linear Quantum
Stochastic Systems Has a Pure Cascade Realization∗
Hendra I. Nurdin, Symeon Grivopoulos, and Ian R. Petersen†
March 16, 2018
Abstract
This paper establishes that generic linear quantum stochastic systems have a pure
cascade realization of their transfer function, generalizing an earlier result established
only for the special class of completely passive linear quantum stochastic systems.
In particular, a cascade realization therefore exists for generic active linear quantum
stochastic systems that require an external source of quanta to operate. The results
facilitate a simplified realization of generic linear quantum stochastic systems for
applications such as coherent feedback control and optical filtering. The key tools
that are developed are algorithms for symplectic QR and Schur decompositions. It is
shown that generic real square matrices of even dimension can be transformed into
a lower 2 × 2 block triangular form by a symplectic similarity transformation. The
linear algebraic results herein may be of independent interest for applications beyond
the problem of transfer function realization for quantum systems. Numerical examples are included to illustrate the main results. In particular, one example describes
an equivalent realization of the transfer function of a nondegenerate parametric amplifier as the cascade interconnection of two degenerate parametric amplifiers with
an additional outcoupling mirror.
1
Introduction
The class of linear quantum stochastic systems [1, 2, 3, 4] represents multiple distinct open
quantum harmonic oscillators that are coupled linearly to one another and also to external Gaussian fields, e.g., coherent laser beams, and whose dynamics can be conveniently
and completely summarized in the Heisenberg picture of quantum mechanics in terms of a
quartet of matrices A, B, C, D, analogous to those used in modern control theory for linear
∗
This research was supported by the Australian Research Council
H. I. Nurdin is with the School of Electrical Engineering and Telecommunications, UNSW Australia,
Sydney NSW 2052, Australia. Email: [email protected]. S. Grivopoulos and I. R. Petersen are with
the School of Engineering and Information Technology, UNSW Canberra, Canberra BC 2610, Australia.
†
1
systems. As such, they can be viewed as a quantum analogue of classical linear stochastic
systems and are encountered in practice, for instance, as models for optical parametric
amplifiers [5, Chapters 7 and 10]. However, due to the constraints imposed by quantum
mechanics, the matrices A, B, C, D in a linear quantum stochastic system cannot be arbitrary, a restriction not encountered in the classical setting. In fact, as derived in [2]
for a certain fixed choice of D, it is required that A and B satisfy a certain non-linear
equality constraint, and B and C satisfy a linear equality constraint. These constraints on
A, B, C, D are referred to as physical realizability constraints [2].
A number of applications of linear quantum stochastic systems have been theoretically
proposed or experimentally demonstrated in the literature. In particular, they can serve as
coherent feedback controllers [2, 6], i.e., feedback controllers that are themselves quantum
systems. In this context, they have been shown to be theoretically effective for cooling
of an optomechanical resonator [7], can modify the characteristics of squeezed light produced experimentally by an optical parametric oscillator (OPO) [8], and, in the setting
of microwave superconducting circuits, a linear quantum stochastic system in the form of
a Josephson parametric amplifier (JPA) operated in the linear regime has been experimentally demonstrated to be able to rapidly reshape the dynamics of a superconducting
electromechanical circuit (EMC) [9]. Linear quantum stochastic systems can also be used
as optical filters for various input signals, including non-Gaussian input signals like single
photon and multi-photon states. As filters they can be used to modify the wavepacket
shape of single and multi-photon sources [10, 11]. Also, linear quantum stochastic systems can dissipatively generate Gaussian cluster states [12] as an important component of
continuous-variable one way quantum computers [13].
In certain quantum control problems, such as in coherent feedback H ∞ [2] and LQG
[6] control problems, the latter being adapted for addressing an optomechanical cooling
problem in [7], the important feature of the controller is its transfer function T (s) =
C(sI − A)−1 B + D rather than the system matrices (A, B, C, D). Therefore, an important
issue in the implementation of coherent feedback controllers is how to realize a controller
with a certain transfer function from a bin of basic linear quantum (optical) devices. This
is a special case of the problem of network synthesis of linear quantum stochastic systems
addressed in [3, 14, 15]. In particular, it was shown in [15], generalizing the results of
[16, 17], that the transfer function of all linear quantum stochastic systems which are
completely passive can be realized by a cascade of one degree of freedom linear quantum
stochastic systems. Completely passive here means that the system can be realized using
only passive linear optical devices which do not need an external source of quanta for their
operation. The question of whether cascade realizations exist for general linear quantum
stochastic systems has remained an open problem. The contribution of this paper is to
resolve this question by proving that, generically, linear quantum stochastic systems do
possess a pure cascade realization. This is significant from a practical point of view, as it
allows for a simpler realization of generic linear quantum stochastic systems.
The remainder of the paper is organized as follows. Section 2 introduces the notation
and gives an overview of linear quantum stochastic systems and the associated realization
2
theory. Section 3 presents a symplectic QR decomposition algorithm. The results of Section
3 form the basis for a symplectic Schur decomposition algorithm that is presented in Section
4 and used to show that the transfer function of generic linear quantum stochastic systems
can be realized by pure cascading. Finally, Section 5 summarizes the contributions of the
paper.
2
2.1
Preliminaries
Notation
√
We will use the following notation: ı = −1, ∗ denotes the adjoint of a linear operator as
well as the conjugate of a complex number. If A = [ajk ] then A# = [a∗jk ], and A† = (A# )> ,
where (·)> denotes matrix transposition. <{A} = (A + A# )/2 and ={A} = 2ı1 (A − A# ).
We denote the identity matrix by I whenever its size can be inferred from context and
use In to denote an n × n identity matrix. Similarly, 0m×n denotes a m × n matrix with
zero entries but drop the subscript when its dimension can be determined from context.
We use diag(M1 , M2 , . . . , Mn ) to denote a block diagonal matrix with square matrices
M1 , M2 , . . . , Mn on its diagonal, and diagn (M ) denotes a block diagonal matrix with the
0 1
square matrix M appearing on its diagonal blocks n times. Also, we will let J =
−1 0
and Jn = In ⊗ J = diagn (J).
2.2
The class of linear quantum stochastic systems
Let x = (q1 , p1 , q2 , p2 , . . . , qn , pn )T denote a vector of the canonical position and momentum operators of a many degrees of freedom quantum harmonic oscillator satisfying the
canonical commutation relations (CCR) [qi , pj ] = 2ıδij , [qi , qj ] = 0, and [pi , pj ] = 0 for
i, j = 1, 2, . . . , n, or, more compactly, xxT − (xxT )T = 2ıJn . A linear quantum stochastic system [2, 6, 3] G is a quantum system defined by three parameters: (i) A quadratic
Hamiltonian H = 12 xT Rx with R = RT ∈ R2n×2n , (ii) a coupling operator L = Kx, where
K is an m × 2n complex matrix, and (iii) a unitary m × m scattering matrix S. For
shorthand, we write G = (S, L, H) or G = (S, Kx, 21 xT Rx). The time evolution x(t) of x
in the Heisenberg picture (t ≥ 0) is given by the quantum stochastic differential equation
(QSDE) (see [1, 2, 3]):
dA(t)
dx(t) = A0 x(t)dt + B0
; x(0) = x,
dA(t)#
dY (t) = C0 x(t)dt + D0 dA(t),
with A0 = 2Jn (R + ={K † K}), B0 = 2ıJn [ −K † S K T S # ], C0 = K, and D0 = S. Here
Y (t) = (Y1 (t), . . . , Ym (t))> is a vector of continuous-mode bosonic output fields that results
from the interaction of the quantum harmonic oscillators and the incoming continuousmode bosonic quantum fields in the m-dimensional vector A(t). Note that the dynamics
3
of x(t) is linear, and Y (t) depends linearly on x(s), 0 ≤ s ≤ t. We refer to n as the degrees
of freedom of the system or, more simply, the degree of the system.
Following [2], it will be convenient to write the dynamics in quadrature form as
dx(t) = Ax(t)dt + Bdw(t); x(0) = x.
dy(t) = Cx(t)dt + Ddw(t),
(1)
with w(t) = 2(<{A1 (t)}, ={A1 (t)}, . . . , <{Am (t)}, ={Am (t)})> and y(t) = 2(<{Y1 (t)},
={Y1 (t)}, . . . , <{Ym (t)}, ={Ym (t)})> . Here, the real matrices A, B, C, D are in one-toone correspondence with A0 , B0 , C0 , D0 . Also, w(t) is taken to be in a vacuum state where
it satisfies the Itô relationship dw(t)dw(t)> = (I + ıJm )dt; see [2]. Note that in this form it
follows that D is a real unitary symplectic matrix. That is, it is both unitary (i.e., DD> =
D> D = I) and symplectic (a real m × m matrix is symplectic if DJm D> = Jm ). However,
in the most general case, D can be generalized to a symplectic matrix that represents a
quantum network that includes ideal infinite bandwidth squeezing devices acting on the
incoming field w(t) before interacting with the system [4, 3]. The matrices A, B, C, D of
a linear quantum stochastic system cannot be arbitrary and are not independent of one
another. In fact, for the system to be physically realizable [2, 6, 3], meaning it represents
a meaningful physical system, they must satisfy the constraints (see [18, 2, 6, 3, 4])
AJn + Jn A> + BJm B > = 0,
Jn C > + BJm D> = 0,
DJm D> = Jm .
(2)
(3)
(4)
Note that, more generally, one can consider linear quantum stocastic systems with less
outputs than inputs by ignoring certain output quadrature pairs in y(t) which are not of
interest, and a corresponding generalized physical realizability conditions analogous to the
above can be derived [18, 19]. However, for the purpose of this paper it is sufficient to
consider systems with the same number of inputs and outputs, as systems with less outputs
than inputs can then be easily handled [19].
Following [20], we denote a linear quantum stochastic system having an equal number
of inputs and outputs, and Hamiltonian H, coupling vector L, and scattering matrix S,
simply as G = (S, L, H) or G = (S, Kx, 21 x> Rx). We also recall the series product / for
open Markov quantum systems [20] defined by G2 / G1 = (S2 S1 , L2 + S2 L1 , H1 + H2 +
={L†2 S2 L1 }), where Gj = (Sj , Lj , Hj ) for j = 1, 2. Since the series product is associative,
Gn / Gn−1 / . . . / G1 is unambiguously defined. The series product corresponds to a cascade
connection G2 / G1 where the outputs of G1 are passed as inputs to G2 ; see [20] for details.
2.3
Realization theory
Given an n degree of freedom linear quantum stochastic system with system matrices
A, B, C, D, how can it be built from a bin of linear quantum components and which components are needed? This is the network synthesis question for linear quantum stochastic
4
systems. It was shown in [3] that any linear quantum stochastic system with n degrees
of freedom system G can be decomposed as the cascade of n one degree of freedom system G1 , G2 , . . . , Gn together with some bilinear interaction Hamiltonians between them,
as illustrated in Fig. 1. It was then shown how each one degree of freedom system can be
realized from a certain bin of linear quantum optical components.
G
H!(1) !(3)
A(t)
G!(1)
H!(1)!(n)
H!(2)!(3)
G!(2)
H!(1)!(2)
G!(3)
G!(n)
Y(t)
H!(3)!(n)
H!(2)!(n)
G!,1
Figure 1: Cascade realization
of Gπ (π is permutation map of {1, 2, . . . , n} to itself),
d
H
with direct interaction Hamiltonians
Hπ(j)π(k)
between
sub-systems Gπ(j) and Gπ(k) for
H
H
A(t) [3]. Illustration is for n > 3.
Y!,1(t)
j, k = 1, 2, . . . , n, following
G
G
G
G
!(1)!(m)
!(1) !(3)
!(1)
!(2)!(3)
!(2)
H!(1)!(2)
!(m)
!(3)
H!(3)!(m)
In certain control problems, such as H ∞H and H 2 /LQG coherent feedback control problems, it is the transfer function of the systems that is important rather than the system matrices G = (A, B, C, D) themselves. The transfer function is defined as ΞG (s) =
C(sI − A)−1 B + D, and rather than realizing a particular quartet (A, B, C, D) one may
consider realizing GT = (T AT −1 , T B, CT −1 , D) for a suitable arbitrary symplectic matrix
T , since G and GT have the same transfer function. The transformation T is required to
be symplectic to ensure that the new internal degrees of freedom z(t) = T x(t) satisfies the
canonical commutation relations. It was shown in [15] that every completely passive linear
quantum stochastic system, a system that can be realized using only passive quantum devices, has a pure cascade realization of its transfer function that does require any bilinear
interaction Hamiltonians between oscillators in the cascade. In the context of Fig. 1 above,
this means that all bilinear interaction Hamiltonians Hπ(i)π(j) can be removed. Purely cascade realizations are simpler to implement and are therefore desirable. However, it is not
known whether the transfer function of general linear quantum stochastic systems outside
of the completely passive class have such a realization. This is an important open problem
that is resolved in this paper.
3
!(2)!(m)
A symplectic QR decomposition algorithm
The main purpose of this section is to develop a symplectic QR decompositon algorithm
and derive a necessary and sufficient condition for real square matrices of even dimension
to possess this decomposition. The symplectic QR decomposition will play an important
role in proving subsequent results that will be presented in Section 4. We begin by recalling
some useful definitions.
Let X be an invertible 2n × 2n skew-symmetric matrix and let h◦, X•i = ◦> X• be a
skew-symmetric bilinear form on R2n induced by X. A set of linearly independent vectors
5
v1 , v2 , . . . , v2n on R2n is said to be a symplectic basis with respect to h◦, X•i if hvi , Xvj i =
−hvj , Xvi i = Xij . The space R2n endowed with h◦, X•i forms a symplectic vector space.
Thus, we shall also refer to h◦, X•i as a symplectic form. A matrix T ∈ R2n×2n is said to
be sympletic with respect to X if T > XT = X. Therefore, if T is sympletic with respect
to X, then T v1 , T v2 , . . . , T v2n is also a symplectic basis for R2n whenever v1 , v2 , . . . , v2n
is a symplectic basis. In this paper, we will be interested in R2n as a symplectic vector
space with X = Jn . Therefore, unless stated otherwise, it is implicit throughout that
the symplectic structure on R2n is with respect to the symplectic form h◦, Jn •i. Note the
standard property that if T is a symplectic matrix then so is T > and T −1 , see, e.g., [21].
This property will often be invoked without further comment.
We also recall the following definition from [15].
Definition 1 A square matrix F of even dimension is said to be lower 2×2 block triangular
if it has a lower block triangular form when partitioned into 2 × 2 blocks:
F11 02×2 02×2 . . . 02×2
F21 F22 02×2 . . . 02×2
F = ..
.. ,
..
..
..
.
.
.
.
.
Fn1 Fn2 . . . . . . Fnn
where Fjk , j ≤ k, is of dimension 2 × 2. Similarly, a matrix F is said to be upper 2 × 2
block triangular if F > is lower 2 × 2 block triangular.
We are now ready to state the main lemma of this section that describes a symplectic
QR decomposition algorithm with respect to the symplectic form h◦, Jn •i. The lemma is
based on a symplectic Gram-Schmidt procedure that is different from symplectic GramSchmidt procedures to construct a canonical symplectic basis in a symplectic vector space,
e.g., [21, Proposition 40] and its proof. It is in the same class of algorithms as, though not
identical to, existing symplectic Gram-Schmidt procedures used in numerical analysis with
respect to the symplectic form h◦, Kn •i with Kn = J ⊗ In [22]. In fact, our procedure is
rather analogous to the Gram-Schmidt procedure in spaces with indefinite inner products
as described in, e.g. [23, Section 3.1]. In the lemma, a symplectic basis is constructed
sequentially from a given and fixed set of linearly independent initial vectors v1 , v2 , . . . , v2n ,
which are presented to the procedure sequentially two at a time in that order. As in the
Gram-Schmidt procedure in indefinite inner product spaces, since the initial vectors are
given, a certain condition is required for the new procedure proposed below to yield a
symplectic basis for R2n .
Lemma 2 (Symplectic QR decomposition) Let V be a real invertible 2n × 2n matrix
with linearly
independent columns v1 , v2 , . . ., v2n from left to right. Let Mi =
v2i−1 v2i ∈ R2n×2 for i = 1, 2, . . . , n and M̃1 = M1 , M̃2 = [ M1 M2 ], and M̃i =
[ M1 M2 . . . Mi ] for i = 3, . . . , n, and assume that Ni = M̃i> Jn M̃i is full rank for
i = 1, 2, . . . , n. Then V has a QR decomposition V = SY for some symplectic matrix S
6
and an upper 2 × 2 block triangular matrix Y . Moreover, S can be constructed recursively
by contructing a sequence of real numbers αj , real 2(j − 1) × 2 matrices Ξj , and real invertible 2j × 2j matrices Sj , for j = 2, 3, . . . , n. Define µ1 as the (1,2) element of the
p
−1
skew-symmetric matrix N1 , α1 = |µ1 | , Ξ1 = I2 , and
1
0
S1 = M1 α1 Ξ1
.
0 sgn(µ1 )
For j = 2, 3, 4, . . . , n, define Sk recursively as
1
0
I2(j−1) αj Ξj 0 sgn(µj )
,
Sj = Sj−1 Mj
1
0
0
αj
0 sgn(µj )
(5)
p
−1
>
|µj | and Ξj = Jj−1 Sj−1
Jn Mj , where µj denotes the (1,2) element of
with αj =
>
(Sj−1 Ξj + Mj ) Jn (Sj−1 Ξj + Mj ). Then Sj satisfies Sj> Jn Sj = Jj for j = 1, 2, 3, . . . , n,
and S = Sn is symplectic. In particular, the columns of Sk are contained as the first 2k
columns of Sk+1 , thus forming a symplectic basis of R2n for k = n. Moreover, defining the
invertible matrices
1
0
αΞ
02×2(n−1)
X1 = 1 1 0 sgn(µ1 )
.
02(n−1)×2
I2(n−1)
and
I2(j−1)
Xj =
0
0
1
0
αΞj
0
0 sgn(µj )
1
0
αj
0
0 sgn(µj )
0
I2(n−j)
for j = 2, 3, . . . , n, then V = SY for an invertible upper 2 × 2 block triangular matrix
Y = X −1 , where X = X1 X2 · · · Xn−1 Xn .
Proof. Since M1> Jn M1 is a real 2×2 skew-symmetric matrix and is full rank by hypothesis,
it is of the form
0 µ1
>
M1 Jn M1 =
,
−µ1 0
with µ1 6= 0. It follows immediately from the given construction of S1 in the statement of
the theorem that S1> Jn S1 = J1 . Therefore, the columns of S1 are mutually skew-orthogonal.
We proceed further by induction.
Suppose that the columns of Sj , as constructed according to the theorem, form a
partial symplectic basis for 1 < j < n, i.e., Sj> Jn Sj = Jj . Consider now the matrix
Zj+1 = Sj Ξj+1 + Mj+1 for some real 2j × 2 matrix Ξj+1 . We will choose Ξj+1 to satisfy
Sj> Jn Zj+1 = 0. This yields the equation Sj> Jn Sj Ξj+1 + Sj> Jn Mj+1 = 0. Since Sj> Jn Sj =
7
Jj we can solve for Ξj+1 to obtain Ξj+1 = Jj Sj> Jn Mj+1 . Define the real 2 × 2 skew>
symmetric matrix Yj+1 = Zj+1
Jn Zj+1 . We will show that Yj+1 6= 02×2 . We first note that
since Nj+1 = [ M1 . . . Mj Mj+1 ]> Jn [ M1 . . . Mj Mj+1 ] is full rank by hypothesis,
so is [ Sj Mj+1 ]> Jn [ Sj Mj+1 ]. This is a consequence of the fact that the columns
of Sj are, by construction, linearly independent linear combinations of the columns of
M1 , M2 , . . . , Mj . Moreover, since
Ij Ξj+1
[ Sj Zj+1 ] = [ Sj Mj+1 ]
,
0
I2
while the matrix
Ij Ξj+1
0
I2
is evidently invertible, we conclude that
[ Sj Zj+1 ]> Jn [ Sj Zj+1 ]
is full rank skew-symmetric. By the given construction of Sj and Ξj+1 , [ Sj Zj+1 ]> Jn [ Sj Zj+1 ]
is necessarily of the form
Jj
0
>
[ Sj Zj+1 ] Jn [ Sj Zj+1 ] =
.
0 Yj+1
From the fact that the left hand side of the identity is full rank, it follows immediately
that Yj+1 is full rank 2 × 2 skew-symmetric. Therefore, it is necessarily of the form
0
µj+1
Yj+1 =
,
−µj+1
0
p
−1
with µj+1 6= 0. Define αj+1 = |µj+1 | . Consider now the matrix
1
0
Z̃j+1 = αj+1 Zj+1
.
0 sgn(µj+1 )
Some brief calculations shows that, by construction, the matrix Z̃j+1 satisfies Sj> Jn Z̃j+1 =
>
0, and Z̃j+1
Jn Z̃j = J1 . Therefore, we have shown for 1 < j < n that if the hypotheses of
the theorem hold and Sj satisfies Sj> Jn Sj = Jj then the matrix Sj+1 given by (5) satisfies
>
Sj+1
Jn Sj+1 = Jj+1 . In particular, S = Sn is a symplectic matrix.
Note that by the above construction each Xi as defined in the lemma is invertible.
Direct calculations then show that V X1 = [ S1 V2→n ], V X1 X2 = [ S2 V3→n ], . . .,
V X1 X2 · · · Xn = Sn = S, where Vj→n is matrix constructed of columns 2j to 2n of V from
left to right. Moreover, clearly X = X1 X2 · · · Xn is upper 2 × 2 block triangular since each
of the Xj in the product has this structure, and therefore so is Y = X −1 . Hence, V has the
symplectic QR decomposition V = SX −1 = SY . This concludes the proof of the lemma.
Let us now look at an example to illustrate Lemma 2.
8
Example 3 Consider the matrix
−15 42 −12 3
33 −22 7
28
.
V =
9
26 −43 44
5
26 −45 −37
It can be verified that V > J2 V and the matrix N1 as defined in Lemma 2 are full rank. The
symplectic matrix produced by executing the symplectic QR decomposition is then
−0.4862 −1.3612 −0.1418 −1.0405
1.0695
0.7130
0.0975
1.4863
S=
0.2917 −0.8427 −0.7193 0.4113 ,
0.1621 −0.8427 −0.7569 −1.1093
while the upper 2 × 2 block triangular matrix Y such that V = SY is
30.8545
0
−0.7130 −28.0024
0
−30.8545 3.2734 −34.7437
;
Y =
0
0
55.6558
0
0
0
0
55.6558
Finally, we give a necessary and sufficient condition for a 2n × 2n matrix V to possess
a symplectic QR decomposition.
Theorem 4 Let V and Nj be as defined in Lemma 2. Then there exists a symplectic QR
decomposition V = SY , with S a symplectic matrix and Y an invertible upper 2 × 2 block
triangular matrix, if and only if the matrices N1 , N2 , . . ., Nn are full rank.
Proof. The if part is the content of Lemma 2. For the necessity of the full rankness
of N1 , N2 , . . ., Nn−1 , first note that V > Jn V = Y > S > Jn SY = Y > Jn Y . Take any k ∈
{1, 2, . . . , n − 1} and partition Y as
Y11,k Y12,k
Y =
,
0
Y22,k
with Y11,k ∈ R2k×2k , Y12,k ∈ R2k×2(n−k) , and Y22,k ∈ R2(n−k)×2(n−k) , where Y11,k and Y22,k are
invertible upper 2 × 2 block triangular matrices. Since Nk = [ I2k 0 ]V > Jn V [ I2k 0 ]> ,
>
from the expression for Y above we immediately get that Nk = Y11,k
Jk Y11,k , which is
>
evidently invertible for k = 1, 2, . . . , n − 1, while Nn = Y Jn Y is invertible by hypothesis.
We now provide an example of an instance where the condition of Theorem 4 fails and
hence V does not have symplectic QR decompositon.
9
Example 5 Consider the matrix
0
0
V =
−1
0
1 0
0 0
0 0
0 −1
0
1
.
0
0
Then V > Jn V is full rank. However, it may be verified that the matrix N1 associated with
V is a zero matrix, hence the condition of Theorem 4 is not satisfied and V does not have
a symplectic QR decomposition.
4
Pure cascade realization of the transfer function of
generic linear quantum stochastic systems
In this section we employ the results from the preceding section to obtain sufficient conditions under which a (physically realizable) linear quantum stochastic system has a pure
cascade realization. It is shown that this condition will be met by generic (in a sense
that will be detailed in this section) linear quantum stochastic systems, thereby extending
the results obtained in [15] for the special case of completely passive systems to generic
linear quantum stochastic systems (including a large class of active systems). Let us now
recall a characterization of linear quantum stochastic systems G that have a pure cascade
realization, i.e., G can be written as G = Gn / Gn−1 / · · · / G1 for some distinct one degree
of freedom systems G1 , G2 , . . . , Gn .
Theorem 6 [15, Theorem 4] Let R = [Rij ]i,j=1,2,...,n with Rij ∈ R2×2 , and K =
[ K1 K2 . . . Kn ] with Ki ∈ Cm . A linear quantum stochastic system G = (S, Kx, 21 x> Rx)
with n degrees of freedom is realizable by a pure cascade of n one degree of freedom harmonic oscillators (without a direct interaction Hamiltonian) if and only if the A matrix is
similar via a symplectic permutation matrix to a lower 2 × 2 block triangular matrix. That
is, there exists a symplectic permutation matrix P such that P AP > = Ã, where à is lower
2 × 2 block triangular. Let R̃ = P RP > = [R̃ij ], K̃ = KP > = [ K̃1 K̃2 . . . K̃n ], with
R̃ij ∈ R2×2 and K̃j ∈ Cm . If the condition is satisfied then G can be explicitly constructed
as the cascade connection Gn / Gn−1 / . . . / G1 with G1 = (S, K̃1 x̃1 , 21 x̃>
1 R̃11 x̃1 ), and Gk =
1 >
(I, K̃k x̃k , 2 x̃k R̃kk x̃k ) for k = 2, . . . , n, where x̃ = (qπ(1) , pπ(1) , qπ(2) , pπ(2) , . . . , qπ(n) , pπ(n) )> ,
and π is a permutation of {1, 2, . . . , n} onto itself such that x̃ = P x.
Remark 7 The theorem has been stated as a minor and trivial generalization of [15,
Theorem 4]. The original did not include the additional freedom of allowing a symplectic
permutation matrix to transform A into lower 2 × 2 block triangular form, corresponding to
a mere permutation of pairs of position and momentum operators in x. For instance, if A
is in upper 2 × 2 block triangular form it can be trivially transformed into lower 2 × 2 block
triangular form by a suitable symplectic permutation matrix, which by [15, Theorem 4]
would then be physically realizable by pure cascading.
10
Given an n degree of freedom linear quantum stochastic system G = (A, B, C, D) with
transfer function ΞG (s) = C(sI − A)−1 B + D, the problem that will be addressed is how
to obtain a cascade of n one degree of freedom linear quantum stochastic systems that has
transfer function ΞG (s), if such a cascade exists. Recall that for any symplectic matrix
T , the system GT = (T AT −1 , T B, CT −1 , D) is a physically realizable system that has the
same transfer function as G. The main strategy is to find a symplectic matrix T such that
GT is the cascade realization that is sought. Before stating the main result, let us recall
the real Jordan canonical form of a real matrix; see, e.g., [24, Section 3.4]. Let A be a real
square matrix then A can always be decomposed as A = V JA V −1 , where JA is a Jordan
canonical form for A. Of course, although A is real, its eigenvalues and eigenvectors can
be complex, but they always come in complex conjugate pairs. That is, if λ and v are a
complex eigenvalue and eigenvector of A then so are λ∗ and v # , respectively. Therefore, in
general, V and JA may have complex entries. However, when A is real it is also similar to a
real Jordan canonical form. A real Jordan block for a real Jordan canonical corresponding
to a real eigenvalue of A is the same as the corresponding block in the Jordan canonical
form. However, to a pair of conjugate complex eigenvalues λk = ak + ıbk and λ∗ = ak − ıbk
there will associated with them one or more real Jordan blocks of the upper 2 × 2 block
triangular form
Ck
I2 02×2 02×2 . . . 02×2
02×2 Ck
I2 02×2 . . . 02×2
..
..
.
.
02×2 ,
02×2 02×2 Ck
.
..
..
... ...
..
.
.
I2
02×2 02×2 02×2 02×2 . . . Ck
with
Ck =
ak b k
−bk ak
.
With respect to the real Jordan blocks, A can be written as Ṽ J˜A Ṽ −1 , where J˜A is a real
Jordan canonical form of A (unique up to permutation of the real Jordan blocks), and Ṽ a
real invertible matrix [24, Section 3.4]. We are now ready to state the main results of this
section.
Lemma 8 (Symplectic Schur decomposition) Let A be a real 2n × 2n matrix. Then
A has a symplectic Schur decomposition A = S −1 U S with U lower 2 × 2 block triangular
if there exists a real invertible 2n × 2n matrix
Ṽ = [ ṽ1 ṽ2 . . . ṽ2n−1 ṽ2n ]
such that
(i) Ṽ brings A into a real Jordan canonical form J˜A = Ṽ −1 AṼ , with J˜A in the upper 2 × 2
block triangular form J˜A = diag(J˜A,r , J˜A,c ), where J˜A,r contains all Jordan blocks corresponding to the (possibly repeated) real eigenvalues of A (in upper triangular form),
and J˜A,c contains all real Jordan blocks corresponding to the complex eigenvalues of
A.
11
(ii) The matrices Ñ1 , Ñ2 , . . ., Ñn−1 given by
Ñ1 = [ ṽ1 ṽ2 ]> Jn [ ṽ1 ṽ2 ],
Ñ2 = [ ṽ1 ṽ2 ṽ3 ṽ4 ]> Jn [ ṽ1 ṽ2 ṽ3 ṽ4 ],
..
.
Ñn−1 = [ ṽ1 ṽ2 . . . ṽ2n−3 ṽ2n−2 ]> Jn [ ṽ1 ṽ2 . . . ṽ2n−3 ṽ2n−2 ].
are all full rank.
If the above conditions hold, let S1 be a 2n × 2n symplectic matrix obtained from
Ṽ by applying the symplectic QR decomposition of Lemma 2 so that Ṽ = S1 Y ,
for an invertible 2n × 2n upper 2 × 2 block triangular matrix Y as given by the
lemma, and let P ∈ R2n×2n be a permutation matrix that implements the mapping
(q1 , p1 , q2 , p2 , . . . , qn , pn )> 7→ (qn , pn , qn−1 , pn−1 , . . . , q1 , p1 )> . Then A has the symplectic Schur decomposition A = S −1 U S with S = P S1−1 and U lower 2 × 2 block
triangular.
Remark 9 Notice that since A and J˜A,c have even dimensions, so does J˜A,r . One can
always choose a real Jordan canonical form of A to be of the form J˜A = diag(J˜A,r , J˜A,c ),
which is upper 2 × 2 block triangular.
Proof. Let A = Ṽ J˜A Ṽ −1 , with J˜A and Ṽ as given in the lemma. By conditions (i) and
(ii), using Lemma 2 we can construct a symplectic matrix S1 such that Ṽ = S1 Y , with
Y real invertible upper 2 × 2 block triangular as given in the lemma. We can thus write
A = Ṽ J˜A Ṽ −1 = S1 Y J˜A Y −1 S1−1 . Moreover, since J˜A = diag(J˜A,r , J˜A,c ), Y , and Y −1 are all
upper 2 × 2 block triangular, the product Y J˜A Y −1 is also upper 2 × 2 block triangular.
Let P ∈ R2n×2n be the permutation matrix defined in the lemma. Notice that, by its
definition, the permutation matrix P is symplectic, and that P ZP > is 2 × 2 lower block
triangular whenever Z is upper 2 × 2 block triangular. It follows from these observations
that P Y J˜A Y −1 P > is lower 2 × 2 block triangular. Therefore, we conclude that SAS −1
with S = P S1−1 is a lower 2 × 2 block triangular matrix, since SAS −1 = P Y J˜A Y −1 P > .
Additionally, notice that S is symplectic since S1−1 (the inverse of a symplectic matrix) and
P are symplectic.
A direct consequence of Lemma 8 is the existence of the cascade realization of the
transfer function of a linear quantum stochastic system when the conditions of the lemma
are satisfied.
Theorem 10 Let G = (A, B, C, D) be a physically realizable n degree of freedom linear
quantum stochastic system. If there exists a matrix Ṽ associated to the 2n × 2n matrix A
satisfying the conditions of Lemma 8 then there exists a symplectic matrix S such that the
transformed system (SAS −1 , SB, CS −1 , D) is physically realizable with SAS −1 lower 2 × 2
block triangular, i.e., ΞG (s) has a pure cascade realization.
12
Proof. Let S be as in Lemma 8, then A = SAS −1 is lower 2 × 2 block triangular.
Therefore, ΞG (s) has a pure cascade realization by Theorem 6.
We emphasize that fulfillment of the full rankness conditions on Ñ1 , Ñ2 , . . ., Ñn−1
depends on the choice of the matrix Ṽ which transforms A into its real Jordan canonical
form (which is not unique). For some choices of Ṽ the full rankness conditions may fail to
hold and thus a pure cascade realization of the transfer function cannot be obtained.
Let us call as admissible all real 2n × 2n matrices A satisfying the conditions of Lemma
8, and refer to those that do not as non-admissible. The following examples illustrate some
samples of non-admissible matrices that cannot meet the conditions of Lemma 8.
Example 11 Consider the matrix
−1 0
0 −1
0 −1 0
0
A=
−1 0 −1 0 ,
0 −1 0 −1
which has the real Jordan decomposition A = Ṽ J˜A Ṽ −1 with (following from Example 5)
0 1 0 0
−1 1
0
0
0 0 0 1
0 −1 1
0
˜
.
Ṽ =
−1 0 0 0 , JA = 0
0 −1 1
0 0 −1 0
0
0
0 −1
It can be easily inspected that for any choice of permutation matrix P such that Ṽ P satisfies
the conditions of Theorem 4, one will find that P J˜A P > will not be upper 2 × 2 block
triangular. This matrix A is therefore non-admissible.
Example 12 Consider the matrix
−2 0
0
0
0 −3 0
4
,
A=
0
0 −1 0
0 −4 0 −3
which has the real Jordan decomposition A = Ṽ J˜A Ṽ −1 with
0 1 0 0
−1 0
0
0
0 0 0 1
0 −2 0
0
˜
Ṽ =
−1 0 0 0 , JA = 0
0 −3 4
0 0 −1 0
0
0 −4 −3
.
As with Example 12 it can be verified that for any choice of permutation matrix P such
that Ṽ P satisfies the conditions of Theorem 4, one will find that P J˜A P > will not be upper
2 × 2 block triangular. Thus A is also non-admissible.
13
We observe the following:
1. All diagonalizable matrices in R2n×2n (including all symmetric matrices) with only
real eigenvalues are admissible. Example 14 to be given below involves this type of
admissible matrix.
2. Non-admissible matrices in R2n×2n include the following cases:
(i) The matrix has a real repeated eigenvalue with geometric multiplicity less than
its algebraic multiplicity, and there exist two mutually skew-orthogonal real
basis vectors v1 and v2 for the invariant subspace of R2n associated with that
eigenvalue. For some matrices of this type it is not possible to permute the
columns of Ṽ and the corresponding rows and columns of J˜A to transform them
into admissible matrices, as illustrated in Example 11.
(ii) The matrix has a pair of conjugate complex eigenvalues λ and λ∗ (not necessarily
repeated) with a corresponding pair of conjugate eigenvectors or generalized
eigenvectors v and v # such that the real vectors v+v # and −ıv+ıv # are mutually
skew-orthogonal. Example 12 illustrates an instance of a non-admissible matrix
with this property.
The non-admissibility of a real 2n × 2n matrix entails rather particular properties that
are unlikely to be possessed by typical matrices. This suggests that admissible real 2n × 2n
matrices are generic in the set of all real 2n × 2n matrices. Generic is in the sense that
the set of admissible matrices contains an open and dense subset of R2n×2n . This is indeed
the case and we state it as the following theorem, with the proof being deferred to the
appendix.
Theorem 13 The set of admissible 2n × 2n matrices is generic in R2n×2n .
Thus, generic matrices in R2n×2n have a symplectic Schur decomposition and the transfer function ΞG (s) of a generic physically realizable linear quantum stochastic system
G = (A, B, C, D) has a pure cascade realization that can be explicitly determined using Lemma 8 and Theorem 10. We conclude this section by applying the results obtained
herein in an example that demonstrates an equivalent realization of the transfer function
of a nondegenerate optical parametric amplifier (NOPA) by a cascade of two degenerate
parametric amplifiers (DPAs) equipped with an additional transmissive mirror.
Example 14 Consider a NOPA with two modes aj = 21 (qj + ıpj ), j = 1, 2, satisfying the
canonical commutation relations [aj , a∗k ] = δjk and [aj , ak ] = 0. The operators describing the
√
√
γa2 ]> , and S = I2 . We take γ = 7.2 × 107
system is H = ı2 (a∗1 a∗2 − a1 a2 ), L = [ γa1
and = 0.6γ = 4.32 × 107 , values that can be realized in a tabletop optical experiment, see,
e.g., the experimental work [25] based on the proposals in [26, 27]. The A, B, C, D matrices
14
for the NOPA are:
−3.6
0
2.16
0
0
−3.6
0
−2.16
;
A = 107
2.16
0
−3.6
0
0
−2.16
0
−3.6
B = −8.4853 × 103 I4 ; C = 8.4853 × 103 I4 ; D = I4 .
We can choose the matrix Ṽ in Theorem 10 to be
0.7071
0
0
0.7071
0
−0.7071 0.7071
0
,
Ṽ =
−0.7071
0
0
0.7071
0
0.7071 0.7071
0
corresponding to the (real) Jordan canonical form
J˜A = Ṽ −1 AṼ = 107 diag(−5.76, −1.44, −5.76, −1.44).
Using Lemma 2, we compute the symplectic matrix S1 and upper
matrix Y as
0.7071
0
0
−0.7071
0
0.7071 0.7071
0
S1 =
−0.7071
0
0
−0.7071
0
−0.7071 0.7071
0
Y = diag(1, −1, 1, −1).
2 × 2 block triangular
;
The required symplectic transformation matrix from Theorem 10 is S = P S1−1 , and
a cascade realization of the transfer function of the NOPA is G1 = (A1 , B1 , C1 , D1 ) =
(SAS −1 , SB, CS −1 , D) with
−5.76
0
0
0
0
−1.44
0
0
;
A1 = 107
0
0
−5.76
0
0
0
0
−1.44
0 −6 6
0
0 −6 0 −6
6
0 6 0
0
6
; C1 = 103 6 0
B1 = 103
−6 0 6 0
0 −6 −6 0 ;
6 0
0 −6
0 −6 0 6
D1 = I4 .
The cascade realization G1 can be decomposed as the cascade G1 = G12 / G11 , with
3ı −3
q1
3
6
G11 = I2 , 10
, −5.4 × 10 (q1 p1 + p1 q1 ) ,
3ı −3
p1
15
and
G12
3
3ı
q2
6
3
, −5.4 × 10 (q2 p2 + p2 q2 ) .
= I2 , 10
−3 −3ı
p2
Each of G11 and G12 can be realized as a DPA with two transmissive mirrors rather than
one; see [3] for details of the realization of G11 and G12 . Note that the pump amplitude for
each NOPA in the cascade realization is 4 × 5.4 × 106 = 2.16 × 107 . Therefore, remarkably,
the cascade realization G12 / G12 requires less total pump power to realize than the original
NOPA, i.e., 2 × (2.16 × 107 )2 in the cascade compared to (4.32 × 107 )2 in the original,
i.e., half the pump power. So, with the cascade realization one obtains a more power
efficient realization of the same transfer function which yields the same amount of twomode squeezing in the two output beams.
Finally, note that if Ṽ had been chosen differently from the one above, for instance, as
0.7071
0
0.7071
0
0
0.7071
0
−0.7071
,
Ṽ =
−0.7071
0
0.7071
0
0
0.7071
0
0.7071
corresponding to
J˜A = Ṽ −1 AṼ = 107 diag(−5.76, −5.76, −1.44, −1.44),
then it may be readily inspected that the full rankness conditions of Lemma 8 are not
satisfied, hence this choice of Ṽ cannot lead to a pure cascade realization of the NOPA.
5
Conclusion
In this paper we have generalized the ideas and results in [17, 15], that focus on the special
class of completely passive linear quantum stochastic systems, to show that the transfer
function of generic linear quantum stochastic systems, which includes a large generic class of
active systems, can be realized by pure cascading. The proof is constructive as the cascade
realization, when it exists, can be explicitly computed. This is of practical importance
as it will allow a simpler realization of a large class of linear quantum stochastic systems
as, say, coherent feedback controllers or quantum optical filters. Numerical examples have
been provided to illustrate the results of the paper. In one example, it is shown that the
transfer function of a nondegenerate optical parametric amplifier has a realization as the
cascade of two degenerate optical parametric amplifiers having an additional outcoupling
mirror, which operates for only half of the pump power required by the nondegenerate
optical parametric amplifier.
Acknowledgement. Contributions: HN developed the symplectic QR and Schur decomposition algorithms, associated results and Example 14, SG and IP proved the genericity of
admissible matrices in discussion with HN. The authors thank the reviewers and Associate
Editor for their constructive and helpful comments on this paper.
16
Proof of Theorem 13
Let M2n (R) denote the set of 2n × 2n real matrices, M̄2n (R) denote the subset of full rank
(i.e. invertible) matrices, and M̄2n,s (R) the subset of those matrices in M̄2n (R) that are
simple (recall that simple matrices are square matrices with simple eigenvalues, i.e., all
eigenvalues are distinct). M̄2n (R) and M̄2n,s (R) are generic (open and dense) in M2n (R),
and in fact they are (non-connected) manifolds of dimension 2n × 2n = 4n2 . Similarly, let
A2n (R) denote the set of real skew-symmetric 2n×2n matrices, and Ā2n (R) the subset of full
rank such matrices. Ā2n (R) is generic (open and dense) in A2n (R), and in fact it is a (nonconnected) manifold of dimension (2n × 2n − 2n)/2 = 2n2 − n. For a matrix X in A2n (R),
we define the principal submatrices X (i) as the upper left corner 2i × 2i submatrices of X
(i.e., the sub-matrices formed by rows and columns 1 to 2i) from X (1) up to X (n) = X.
Let Ã2n (R) be the subset of Ā2n (R) containing matrices X with the property that all
X (i) , i = 1, . . . , n − 1, are full rank. Finally, let M̃2n,s (R) denote the subset of matrices in
M̄2n,s (R) which are admissible. This means that they have the following properties: (i)
there is a real invertible 2n × 2n matrix V that puts them in a real Jordan canonical form
JA (A = V JA V −1 ), which is block-diagonal, with the 1 × 1 real blocks before the 2 × 2
complex blocks (recall that A is simple, so it has no real Jordan blocks of dimension higher
than two), and (ii) V > Jn V ∈ Ã2n (R). The proof uses arguments inspired by the proof of
genericity of simple matrices in the set of all real square matrices of a given dimension, from
[28, Section 5.6]. Also, it relies heavily on methods and results from differential topology.
A standard reference for these methods and results, along with terminology and notation,
is the book [29]. Finally, a crucial argument uses Theorem 5.16 of [30, Chapter II] and
its proof. The proof uses Lemma 15 and Proposition 17, and Lemma 16 is needed in the
proof of Proposition 17. All these results will be proved later on in this appendix.
Lemma 15 Let T ∈ RN ×N be a simple matrix with nonzero eigenvalues. There is a neighborhood of T in RN ×N such that, every matrix in this neighborhood has eigenvectors and
eigenspaces (the latter represented by projection operators onto the respective eigenspaces)
which are continuous functions of their entries, and moreover, their eigenvalues are of the
same type as those of T .
Lemma 16 Let F : M̄2n (R) → Ā2n (R) be defined by F (V ) = V > Jn V . Then, F is onto,
and a submersion (see [29, Section 1.4] for terminology).
Proposition 17 The set V2n of matrices V ∈ M̄2n (R) such that V > Jn V ∈ Ã2n (R), is
open and dense.
We have to show that M̃2n,s (R) is an open and dense (generic) subset of M2n (R). First,
we show that M̃2n,s (R) is an open set. Consider a matrix A ∈ M̃2n,s (R) ⊂ M̄2n,s (R),
and let A = V JA V −1 . The block-diagonal real Jordan canonical form JA of A, has the
1 × 1 real blocks before the 2 × 2 complex blocks, and no real Jordan blocks of dimension
higher than two. Also, V ∈ V2n . Applying Lemma 15 to A, we conclude that there is a
17
neighborhood N 0 (A) such that for every à ∈ N 0 (A), à = Ṽ Jà Ṽ −1 , with Ṽ close to V , and
JÃ close to JA , and with the same block structure. Let E = Ṽ − V . Then, Ṽ > Jn Ṽ = (V +
(i)
E)> Jn (V +E) = V > Jn V +E > Jn V +V > Jn E +E > Jn E. Hence, det Ṽ > Jn Ṽ
= P (i) (E), a
multivariate polynomial of degree 4i in the entries Ejk of E = Ṽ − V , whose constant term
(i)
(i)
is det V > Jn V
. However, for matrices V ∈ V2n , det V > Jn V
6= 0, i = 1, . . . , n − 1.
(i)
>
By continuity, there exists ε0 > 0, such that det Ṽ Jn Ṽ
6= 0, for any E ∈ M2n (R)
with maxjk |Ejk | < ε0 . By shrinking the neighborhood of A if necessary, we can satisfy
maxjk |Ṽjk − Vjk | < ε0 , and hence Ṽ ∈ V2n and à ∈ M̃2n (R). This proves that M̃2n,s (R) is
an open subset of M̄2n,s (R).
To prove that M̃2n,s (R) is a dense subset of M2n (R), we must prove that every A ∈
M2n (R) has a à ∈ M̃2n,s (R) arbitrarily close to it. Since M̄2n,s (R) is a dense subset of
M2n (R), there exists a Ā ∈ M̄2n,s (R) arbitrarily close to A. Let Ā = V̄ JĀ V̄ −1 . Then, JĀ
is a block-diagonal real Jordan canonical form with no Jordan blocks of dimension higher
than two, and can be structured so that it has the 1×1 real blocks before the 2×2 complex
blocks. Also, V̄ ∈ M̄2n (R). If V̄ is not in V2n , we know from Proposition 17 that we can
find a Ṽ arbitrarily close to V̄ that is in V2n . Then, Ã = Ṽ JĀ Ṽ −1 ∈ M̃2n,s (R), and is
arbitrarily close to A. Hence, M̃2n,s (R) is a dense subset of M̄2n,s (R), and the theorem is
proven.
Proof of Lemma 15: Theorem 5.16 of [30, Chapter II] states that, for a simple matrix in CN ×N , there is a neighborhood of matrices in CN ×N that contains it, such that the
eigenvalues of every matrix in this neighborhood are holomorphic functions of the matrix
entries. Furthermore, in the proof of this theorem, it is shown that the eigenspaces of
matrices in this neighborhood are also holomorphic functions of their entries. Specializing
these results to real matrices, we have that for a simple matrix in RN ×N , there is a neighborhood of matrices in RN ×N that contains it, such that the eigenvalues and eigenspaces (with
eigenspaces being represented by projection operators onto the respective eigenspaces) of
every matrix in this neighborhood are analytic functions of its entries. Let T ∈ RN ×N
be a simple matrix with nonzero eigenvalues, and T = U JU −1 a decomposition of it in
a Jordan form (J is diagonal with distinct entries). Let also T̃ ∈ RN ×N be a matrix in
the neighborhood N (T ) of T with the aforementioned properties. Taking the entries of
T̃ arbitrarily close to those of T , the eigenspaces of the two matrices can be made arbitrarily close, as well. Hence, we may change the chosen eigenvectors of T (columns of U )
to form eigenvectors of T̃ in a continuous way. Then, we may write T̃ = Ũ J˜Ũ −1 , where
Ũ is arbitrarily close to U . Similarly, the diagonal matrix J˜ of eigenvalues of T̃ will be
arbitrarily close to J. Due to the property of real matrices to have complex eigenvalues in
conjugate pairs, and the fact that that T has no zero eigenvalues, there is a neighborhood
N 0 (T ) ⊆ N (T ) such that every T̃ ∈ N 0 (T ) has eigenvalues not only close, but of the same
type as T . The reason is that, for a pair of complex conjugate eigenvalues to be created
(destroyed), two distinct real nonzero eigenvalues must coalesce to a double eigenvalue (be
produced by the separation of two equal real eigenvalues). This, however, can be prevented
by shrinking the neighborhood of T as much as necessary.
18
Proof of Lemma 16: First, we show that F is properly defined. Obviously, F (V ) is
antisymmetric. For a V ∈ M̄2n (R), det V 6= 0, so det F (V ) = (det V )2 det Jn = (det V )2 6=
0, and hence F (V ) ∈ Ā2n (R). Next, we show that F is onto. Let X ∈ Ā2n (R). From [24,
Subsection 2.5.14], we know that there exists a 2n × 2n orthogonal matrix Q, and a 2n × 2n
block-diagonal matrix Λ of the form
0 λ1
0 λn
Λ = diag
,...,
,
−λ1 0
−λn 0
with λi ≥ 0, i = 1, . . . , n, such that X = Q> ΛQ. Furthermore, the eigenvalues of X are
±ıλ1 , . . ., ±ıλn ,√and √
hence λi √
> 0, √
for a full rank X. It is easy to see that Λ = D> Jn D,
with D = diag( λ1 , λ1 , . . . , λn , λn ). Then, X = V > Jn V , for V = DQ, and V is full
rank because Q and D are. Hence, F is onto.
Continuity and differentiability follow from the fact that the entries of F (V ) are second
order multivariate polynomials in the entries of V . Finally, we show that F is a submersion,
i.e. that its derivative DFV : TV M̄2n (R) → TF (V ) Ā2n (R) is a surjective linear map from
the tangent space TV M̄2n (R) of M̄2n (R) at V , to the tangent space TF (V ) Ā2n (R) of Ā2n (R)
at F (V ), see [29, Chapter 1] for terminology and notation. Starting from F (V ) = V > Jn V
and “taking differentials” of both sides, we have that dF = (dV )> Jn V + V > Jn dV . Hence,
for a tangent vector v ∈ TV M̄2n (R) (infinitesimal variation dV at V ), we have DFV (v) =
v > Jn V + V > Jn v. The tangent space of M̄2n (R) at any point V is isomorphic to M2n (R),
and the tangent space of Ā2n (R) at any point X is isomorphic to A2n (R). Hence, v ∈
M2n (R), and DFV (v) ∈ A2n (R). Let w be a tangent vector in TF (V ) Ā2n (R). To show
that DFV : TV M̄2n (R) → TF (V ) Ā2n (R) is surjective, we must show that for any such w,
there exists at least one v ∈ TV M̄2n (R), such that DFV (v) = w. This is equivalent to the
equation v > Jn V + V > Jn v = w having a solution v ∈ M2n (R) given any w ∈ A2n (R). Let
v = Jn (V > )−1 v̄ in that equation (recall that for any V ∈ M̄2n (R), V is invertible). Then,
it reduces to −v̄ + v̄ > = w, where the antisymmetry of Jn , and the identity J2n = −I2n were
used. The general solution of this equation is v̄ = u− 21 w, where u is any 2n×2n symmetric
matrix. It is to be expected that the solution for v (equivalently for v̄) is not unique, since
TV M̄2n (R) is a higher dimensional space from TF (V) Ā2n (R). As a matter of fact, the general
solution for v, v = Jn (V > )−1 v̄ = Jn (V > )−1 u− 21 w is parameterized by a 2n×2n symmetric
matrix u. The set of such matrices is a linear space of dimension 12 2n(2n+1) = 2n2 +n, and
its dimension is exactly the difference of dimensions of TV M̄2n (R) (4n2 ) and TF (V ) Ā2n (R)
(2n2 − n). Hence, we proved that DFV is surjective for every V ∈ M̄2n (R), i.e. F is a
(local) submersion.
Proof of Proposition 17: First, we show that the set of V ∈ M̄2n (R) such that
F (V ) = V > Jn V ∈ Ã2n (R), is open in M̄2n (R). Consider such a V . Then, det F (V )(i) 6=
0, i = 1, . . . , n. Let E ∈ M2n (R), and consider det F (V + E)(i) . Since F (V + E) =
(V +E)> Jn (V +E) = V > Jn V +E > Jn V +V > Jn E+E > Jn E, we can see that det F (V +E)(i) =
P (i) (E), a multivariate polynomial of degree 4i in the entries Ejk of E, whose constant term
is det F (V )(i) . By continuity, there exists ε0 > 0, such that det F (V + E)(i) 6= 0, for any
E ∈ M2n (R) with |Ejk | < ε0 , j, k = 1, 2, . . . , 2n. This proves that, the set of V ∈ M̄2n (R)
such that F (V ) = V > Jn V ∈ Ã2n (R), is open in M̄2n (R).
19
Now we shall prove that it is dense as well.
It suffices to show that, for V ∈ M̄2n (R) such
that F (V ) = V > Jn V ∈ Ā2n (R)\Ã2n (R) , there exists a Ṽ ∈ M̄2n (R) arbitrarily close to
V such that F (Ṽ ) = Ṽ > Jn Ṽ ∈ Ã2n (R). Since X = F (V ) = V > Jn V ∈ Ā2n (R)\Ã2n (R) ,
there exists at least one 1 ≤ r ≤ n − 1, such that det X (r) = det F (V )(r) = 0. Since X (r) is
a 2r × 2r real skew-symmetric matrix, there exists an 2r × 2r orthogonal matrix Q such
that X (r) = Q> SQ, with
0 ν1
0 νr
S = diag
,...,
,
−ν1 0
−νr 0
and νi ≥ 0, i = 1, . . . , r. Then, det X (r) = (det Q)2 det S = (ν1 . . . νr )2 . Since det X (r) = 0,
this implies that at least one of the ν’s must be equal to zero. Without loss of generality, we
may assume that the first q are equal to zero, 1 ≤ q ≤ r. Let S̃ be given by the expression
above, where the zero ν’s have been replaced by nonzero ε1 , . . . , εq :
0 ε1
0 εq
0
νq+1
S̃ = diag
,...,
,
,
−ε1 0
−εq 0
−νq+1
0
0 νr
.
...,
−νr 0
Let also,
S
W
−W > U
=
Q
0
0 I2(n−r)
X
Q>
0
0 I2(n−r)
,
and
X̃ =
Q>
0
0 I2(n−r)
S̃
W
>
−W
U
Q
0
0 I2(n−r)
.
It is obvious that X̃ can be arbitrarily close to X, for small enough ε1 , . . . , εq , and
that det X̃ (r) = det S̃ = (ε1 . . . εq νq+1 . . . νr )2 6= 0. We can also see that det X̃ (i) =
P̃ (i) (ε1 , . . . , εq ), for i = 1, . . . , n, where P̃ (i) (ε1 , . . . , εq ) is a multivariate polynomial of degree at most 2i in the variables ε1 , . . . , εq , with constant term equal to det X (i) . Hence,
for small enough ε1 , . . . , εq , all the determinants det X (i) 6= 0 remain so for X̃. So, by
slightly changing X to X̃, we increased the number of principal submatrices X̃ (i) of full
rank by (at least) one, compared with those of X. If, for some principal submatrices of
X̃ (i) (such that det X (i) = 0), we still have det X̃ (i) = 0, we may apply the same procedure
sequentially, and end up with a matrix X̃ ∈ Ã2n (R) arbitrarily close to X. From Proposition 16, F is globally onto. This guarantees that there exists Ṽ ∈ M̄2n (R) such that
Ṽ > Jn Ṽ = F (Ṽ ) = X̃. Moreover, F is a submersion at V . The Local Submersion Theorem
[29, Section 1.4], guarantees that a neighborhood of X = F (V ) (in which we may assume
that X̃ belongs to, because we may construct X̃ to be arbitrarily close to to X) is the image
under F of a neighborhood of V . Then, there exists Ṽ ∈ M̄2n (R) in said neighborhood of
V , such that Ṽ > Jn Ṽ = F (Ṽ ) = X̃ ∈ Ã2n (R). Hence, the set of V ∈ M̄2n (R) such that
F (V ) = V > Jn V ∈ Ã2n (R), is also dense in M̄2n (R), and the proposition is proven.
20
References
[1] V. P. Belavkin, S. C. Edwards, Quantum filtering and optimal control, in: V. P.
Belavkin, M. Guta (Eds.), Quantum Stochastics and Information: Statistics, Filtering
and Control (University of Nottingham, UK, 15 - 22 July 2006), World Scientific,
Singapore, 2008, pp. 143–205.
[2] M. R. James, H. I. Nurdin, I. R. Petersen, H ∞ control of linear quantum stochastic
systems, IEEE Trans. Automat. Contr. 53 (8) (2008) 1787–1803.
[3] H. I. Nurdin, M. R. James, A. C. Doherty, Network synthesis of linear dynamical
quantum stochastic systems, SIAM J. Control Optim. 48 (4) (2009) 2686–2718.
[4] J. E. Gough, M. R. James, H. I. Nurdin, Squeezing components in linear quantum
feedback networks, Phys. Rev. A 81 (2010) 023804–1– 023804–15.
[5] C. W. Gardiner, P. Zoller, Quantum Noise: A Handbook of Markovian and NonMarkovian Quantum Stochastic Methods with Applications to Quantum Optics, 3rd
Edition, Springer-Verlag, Berlin and New York, 2004.
[6] H. I. Nurdin, M. R. James, I. R. Petersen, Coherent quantum LQG control, Automatica 45 (2009) 1837–1846.
[7] R. Hamerly, H. Mabuchi, Advantages of coherent feedback for cooling quantum oscillators, Phys. Rev. Lett. 109 (2012) 173602–1–173602–5.
[8] O. Crisafulli, N. Tezak, D. B. S. Soh, M. A. Armen, H. Mabuchi, Squeezed light in
an optical parametric amplifier oscillator network with coherent feedback quantum
control, Opt. Express 21 (2013) 18371–18386.
[9] J. Kerckhoff, R. W. Andrews, H. S. Ku, W. F. Kindel, K. Cicak, R. W. Simmonds,
K. W. Lehnert, Tunable coupling to a mechanical oscillator circuit using a coherent
feedback network, Phys. Rev. X 3 (2) (2013) 021013–1–021013–13.
[10] G. Zhang, M. R. James, On the response of quantum linear systems to single photon
input fields, IEEE Trans. Automat. Control 58 (5) (2013) 1221–1235.
[11] G. Zhang, Analysis of quantum linear systems’ response to multi-photon states, Automatica 50 (2) (2014) 442–451.
[12] K. Koga, N. Yamamoto, Dissipation-induced pure Gaussian state, Phys. Rev. A 85
(2012) 022103–1–022103–8.
[13] N. C. Menicucci, P. van Loock, M. Gu, C. Weedbrook, T. C. Ralph, M. A. Nielsen,
Universal quantum computation with continuous-variable cluster states, Phys. Rev.
Lett. 97 (2006) 110501–1–110501–4.
21
[14] H. I. Nurdin, Synthesis of linear quantum stochastic systems via quantum feedback
networks, IEEE Trans. Automat. Contr. 55 (4) (2010) 1008–1013, extended preprint
version available at http://arxiv.org/abs/0905.0802.
[15] H. I. Nurdin, On synthesis of linear quantum stochastic systems by pure cascading,
IEEE Trans. Automat. Contr. 55 (10) (2010) 2439–2444.
[16] I. R. Petersen, Cascade cavity realization for a class of complex transfer functions
arising in coherent quantum feedback control, in: Proceedings of the 2009 European
Control Conference (Budapest, Hungary, 23-26 August 2009), 2009.
[17] I. R. Petersen, Low frequency approximation for a class of linear quantum systems
using cascade cavity realization, Systems Control Lett. 6 (1) (2012) 173–179.
[18] S. Wang, H. I. Nurdin, G. Zhang, M. R. James, Synthesis and structure of mixed
quantum-classical linear systems, in: Proceedings of the 51st IEEE Conference on
Decision and Control (Maui, Hawaii, Dec. 10-13, 2012), 2012, pp. 1093–1098.
[19] H. I. Nurdin, Structures and transformations for model reduction of linear quantum
stochastic systems, IEEE Trans. Automat. Control 59 (9) (2014) 2413–2425.
[20] J. Gough, M. James, The series product and its application to quantum feedforward
and feedback networks, IEEE Trans. Automatic Control 54 (11) (2009) 2530–2544.
[21] M. A. de Gosson, Symplectic Methods in Harmonic Analysis and in Mathematical
Physics, Springer, 2011.
[22] A. Salam, On theoretical and numerical aspects of symplectic Gram-Schmidt-like algorithms, Numer. Algorithms 39 (2005) 437–462.
[23] I. Gohberg, P. Lancaster, L. Rodman, Matrices and Indefinite Scalar Products, Vol. 8
of Operator Theory, Birkhäuser, 1983.
[24] R. A. Horn, C. R. Johnson, Matrix Analysis, Cambridge University Press, 1985.
[25] S. Iida, M. Yukawa, H. Yonezawa, N. Yamamoto, A. Furusawa, Experimental demonstration of coherent feedback control on optical field squeezing, IEEE Trans. Automat.
Contr. 57 (8) (2012) 2045–2050.
[26] M. Yanagisawa, H. Kimura, Transfer function approach to quantum control-part II:
Control concepts and applications, IEEE Trans. Automatic Control (48) (2003) 2121–
2132.
[27] J. Gough, S. Wildfeuer, Enhancement of field squeezing using coherent feedback, Phys.
Rev. A 80 (4) (2009) 042107.
[28] M. Hirsch, S. Smale, R. Devaney, Differential Equations, Dynamical Systems, and an
Introduction to Chaos, 2nd Edition, Elsevier, 2004.
22
[29] V. Guillemin, A. Pollack, Differential Topology, Prentice-Hall, 1974.
[30] T. Kato, Pertubation Theory for Linear Operators, Springer-Verlag, 1995.
23
| 3cs.SY
|
NUMERICAL SEMIGROUPS PROBLEM LIST
arXiv:1304.6552v1 [math.AC] 24 Apr 2013
M. DELGADO, P. A. GARCÍA-SÁNCHEZ, AND J. C. ROSALES
1. Notable elements and first problems linear combination, with nonnegative integer coefficients, of a fixed set of integers with greatest
A numerical semigroup is a subset of N (here
common divisor equal to 1. He also raised the
N denotes the set of nonnegative integers) that is
question of determining how many positive inteclosed under addition, contains the zero element,
gers do not admit such a representation. With
and its complement in N is finite.
our terminology, the first problem is equivalent
If A is a nonempty subset of N, we denote by
to that of finding a formula in terms of the genhAi the submonoid of N generated by A, that is,
erators of a numerical semigroup S of the greatest
integer not belonging to S (recall that its
hAi = {λ1 a1 +· · ·+λn an | n ∈ N, λi ∈ N, ai ∈ A}.
complement in N is finite). This number is thus
It is well known (see for instance [41, 45]) that known in the literature as the Frobenius numhAi is a numerical semigroup if and only if ber of S, and we will denote it by F(S). The
elements of H(S) = N \ S are called gaps of
gcd(A) = 1.
If S is a numerical semigroup and S = hAi for S. Therefore the second problem consists in
some A ⊆ S, then we say that A is a system of determining the cardinality of H(S), sometimes
generators of S, or that A generates S. More- known as genus of S ([25]) or degree of singularover, A is a minimal system of generators of S if ity of S ([3]).
In [60] Sylvester solves the just quoted probno proper subset of A generates S. In [45] it is
shown that every numerical semigroup admits a lems of Frobenius for embedding dimension
unique minimal system of generators, and it has two. For semigroups with embedding dimension
greater than or equal to three these problems refinitely many elements.
Let S be a numerical semigroup and let {n1 < main open. The current state of the problem is
n2 < · · · < ne } be its minimal system of gen- quite well collected in [30].
erators. The integers n1 and e are known as
Let S be a numerical semigroup. Following
the multiplicity and embedding dimension of S, the terminology introduced in [39] an integer x
and we will refer to them by using m(S) and is said to be a pseudo-Frobenius number of S
e(S), respectively. This notation might seem if x 6∈ S and x + S \ {0} ⊆ S. We will deamazing, but it is not so if one takes into ac- note by PF(S) the set of pseudo-Frobenius numcount that there exists a large list of manuscripts bers of S. The cardinality of PF(S) is called
devoted to the study of analytically irreducible the type of S (see [3]) and we will denote it by
one-dimensional local domains via their value t(S). It is proved in [18] that if e(S) = 2, then
semigroups, which are numerical semigroups. t(S) = 1, and if e(S) = 3, then t(S) ∈ {1, 2}.
The invariants we just introduced, together with It is also shown that if e(S) ≥ 4, then t(S) can
others that will show up later in this work, have be arbitrarily large, t(S) ≤ m(S) − 1 and that
an interpretation in that context, and this is why (t(S)+1)g(S) ≤ t(s)(F(S)+1). This is the startthey have been named in this way. Along this ing point of a new line of research that consists
line, [3] is a good reference for the translation for in trying to determine the type of a numerical
the terminology used in the Theory of Numerical semigroup, once other invariants like multiplicity, embedding dimension, genus or Frobenius
Semigroups and Algebraic Geometry.
Frobenius (1849-1917) during his lectures pro- number are fixed.
posed the problem of giving a formula for the
Wilf in [66] conjectures that if S is a numerical
greatest integer that is not representable as a semigroup, then e(S)g(S) ≤ (e(S) − 1)(F(S) +
1
2
1). Some families of numerical semigroups for
which it is known that the conjecture is true are
collected in [16]. Other such families can be seen
in [23, 59]. The general case remains open.
Bras-Amorós computes in [5] the number
of numerical semigroups with genus g ∈
{0, . . . , 50}, and conjectures that the growth is
similar to that of Fibonacci’s sequence. However it has not been proved yet that there are
more semigroups of genus g than of genus g + 1.
Several attempts already appear in the literature. Kaplan [23] uses an approach that involves
counting the semigroups by genus and multiplicity. He poses many related conjectures which
could be taken literally and be posed here as
problems. We suggest them to the reader. A different approach, dealing with the asymptoptical
behavior of the sequence of the number of numerical semigroups by genus, has been followed
by Zhao [69]. Some progress has been achieved
by Zhai [68], but many questions remain open.
2. Proportionally modular semigroups
Following the terminology introduced in [52],
a proportionally modular Diophantine inequality is an expression of the form ax mod b ≤ cx,
with a, b and c positive integers. The integers a,
b and c are called the factor, the modulus and the
proportion of the inequality, respectively. The
set S(a, b, c) of solutions of the above inequality
is a numerical semigroup. We say that a numerical semigroup is proportionally modular if
it is the set of solutions of some proportionally
modular Diophantine inequality.
Given a nonempty subset A of Q+
0 , we denote by hAi the submonoid of (Q+
,
0 +) generated by A, whose definition is the same of that
used in the previous section. Clearly, S(A) =
hAi ∩ N is a submonoid of N. It is proved in
[52] that if a, b and c are positive
with
b integers
b
c < a < b, then S(a, b, c) = S a , a−c . Since
S(a, b, c) = N when a ≥ c, and the inequality
ax mod b ≤ cx has the same integer solutions as
(a mod b)x mod b ≤ cx, the condition c < a < b
is not restrictive.
As a consequence of the results proved in [52],
we have that a numerical semigroup S is proportionally modular if and only if there exist
two positive rational numbers α < β such that
S = S([α, β]). This is also equivalent to the existence of an interval I, with nonempty interior,
of the form S = S(I) (see [55]).
By using the notation introduced in [54], a sequence of fractions ab11 < ab22 < · · · < abpp is said to
be a Bézout sequence if a1 , . . . , ap , b1 , . . . , bp are
positive integers and ai+1 bi − ai bi+1 = 1 for all
i ∈ {1, . . . , p−1}. The importance of the Bézout
sequences in the study of proportionally modular semigroups highlights in the following result
proved in [54]. If ab11 < ab22 < · · · < abpp is a Bézout
i
h
sequence, then S ab11 , abpp = ha1 , . . . , ap i.
A Bézout sequence ab11 < ab22 < · · · < abpp is
proper if ai+h bi − ai bi+h ≥ 2 for all h ≥ 2
with i, i + h ∈ {1, . . . , p}. Clearly, every Bézout
sequence can be reduced (by removing some
terms) to a proper Bézout sequence with the
same ends as the original one. It is showed in [9],
that if ab11 < ab22 are two reduced fractions, then
there exists an unique proper Bézout sequence
with ends ab11 and ab22 . Furthermore, in this work
a procedure for obtaining this sequence is given.
It is proved in [54] that if ab11 < ab22 < · · · < abpp
is a proper Bézout sequence, then there exists
h ∈ {1, . . . , p} such that a1 ≥ · · · ≥ ah ≤
· · · ≤ ap (the sequence a1 , . . . , ap is convex). The
following characterization is also proved there:
a numerical semigroup is proportionally modular if and only if there exists a convex ordering if its minimal generators n1 , . . . , ne such that
gcd{ni , ni+1 } = 1 for all i ∈ {1, . . . , e − 1} and
nj−1 + nj+1 ≡ 0 (mod nj ) for all j ∈ {2, . . . , e −
1}.
A modular Diophantine inequality is a proportionally modular Diophantine inequality with
proportion equal to one. A numerical semigroup
is said to be modular if it is the set of solutions of
some modular Diophantine inequality. Clearly,
every modular numerical semigroup is proportionally modular, and this inclusion is strict as
it is proved in [52]. A formula for g(S(a, b, 1)) in
function of a and b is given in [53]. The problems
of finding formulas for F(S(a, b, 1)), m(S(a, b, 1)),
t(S(a, b, 1)) and e(S(a, b, 1)) remain open. It is
not known if the mentioned conjecture of Wilf is
true for modular semigroups neither.
3
A semigroup of the form {0, m, →} is said to
be ordinary. A numerical semigroup S is an
open modular numerical semigroup if it
is orb
b
dinary or of it is the form S = S a , a−1 for
some integers 2 ≤ a < b. Therefore these semigroups are proportionally modular. Moreover, it
is proved in [55] that every proportionally modular numerical semigroup can be expressed as
a finite intersection of open modular numeri
b
cal semigroups. The formulas F S ab , a−1
b
and g S ab , a−1
are also obtained in the just
quoted work. However the rest of the problems previously suggested for modular numerical
semigroups remain still open.
As we mentioned above, a characterization for
proportionally modular numerical semigroups in
terms of its systems of minimal generators is
given in [54]. The question of giving formulas
for the Frobenius number, genus and type of
a proportionally modular numerical semigroup
in terms of its system of minimal generators remains unsolved too.
Following the terminology in [57], a contracted
modular Diophantine inequality is an expression
of the form ax mod b ≤ x − c, where a, b and
c are nonnegative integers and b 6= 0. Let us
denote by T(a, b, c) the set of integer solutions
of the last inequality. Then T(a, b, c) ∪ {0} is a
numerical semigroup. An algorithm that allows
us to determine whether a semigroup is the set
of solutions of a contracted modular Diophantine
equation is given in [57]. A formula for the genus
of T(a, b, c) ∪ {0} is also given there.
A contracted proportionally modular Diophantine inequality is an expression of the form
ax mod b ≤ cx − d, with a, b, c and d nonnegative integers and b 6= 0 6= c. If we denote by
P(a, b, c, d) the set of solutions of such an inequality, then P(a, b, c, d) ∪ {0} is a numerical
semigroup. It is not yet known an algorithm to
determine whether a semigroup is of this form.
The Stern-Brocot tree gives a recursive
method for constructing all the reduced fractions
x
, with x and y positive integers (see [20]). For
y
constructing this tree we start with the expressions 10 and 01 . In each step of the process we
insert between each two consecutive expressions
′
′
m
and m
its median m+m
. We obtain in this
n
n′
n+n′
way the sequences
0
1
<
1
3
<
0
1
<
1
1
<
1
0
1
1
0
1
<
1
2
<
<
2
1
<
1
0
1
2
<
2
3
< 11 <
...
3
2
<
2
1
<
3
1
1
0
<
The Stern-Brocot tree can now be obtained
by connecting each median with the fractions
used for computing it and being in the previous level but not in the levels above it.
1
3
1
4
✡✡
✇
✇✇
✇✇
✹✹
2
5
1
2
❦❦❦❦
❦❦❦
❦
❦
❦
❦
●●
●●
●
2
3
3
5
✡✡
1
1
❙❙❙
❙❙❙❙
❙❙❙❙
3
2
✹✹
3
4
4
3
✡✡
✇
✇✇
✇✇
✹✹
2
1
5
3
●●
●●
●
5
2
✡✡
3
1
✹✹
4
1
m
n
is the comIt is proved in [9] that if
mon predecessor of two fractions ab < dc in the
Stern-Brocot
tree, then m is the multiplicity of
S ab , dc . It could be nice to obtain other constants of the semigroup by looking at this tree.
3. The quotient of a numerical
semigroup by a positive integer
Let S be a numerical semigroup and p be a
positive integer. Let us denote by
S
= {x ∈ N | px ∈ S}.
p
Clearly, Sp is a numerical semigroup, and we will
call it the quotient of S by p. According to this
notation, we will call S2 one half of S and that S4
is a quarter of S. These two cases will have an
special importance in this section.
It is proved in [56] that a numerical semigroup
is proportionally modular if and only if it is the
quotient of an embedding dimension two numerical semigroup by a positive integer. This result
is improved in [32] by proving that a numerical semigroup is proportionally modular if and
only if it is of the form ha,a+1i
with a and d posd
itive
integers.
We
still
do
not
for
haveformulas
ha,a+1i
ha,a+1i
ha,a+1i
ha,a+1i
F
, g
, m
, t
d
d
d
d
ha,a+1i
.
and e
d
4
The next step in this line of research would
be studying those numerical semigroups that are
the quotient of a numerical semigroup with embedding dimension three by a positive integer.
Unfortunately we do not have a procedure that
allows us to distinguish such a semigroup from
the rest. Moreover, we still do not know of any
example of semigroups that are not of this form.
A numerical semigroup S is symmetric if x ∈
Z \ S implies F(S) − x ∈ S. These semigroups have been widely studied. Their main
motivation comes from a work by Kunz ([26])
from which it can be deduced that a numerical semigroup is symmetric if and only if its
associated numerical semigroup ring is Gorenstein. Symmetric numerical semigroups always
have odd Frobenius number, thus for numerical semigroups with even Frobenius number, the
equivalent notion to symmetric semigroups is
that of pseudo-symmetric numerical semigroups.
We say that S is a pseudo-symmetric numerical
semigroup if it has even Frobenius number and
for all x ∈ Z \ S, we have either F(S) − x ∈ S or
. The concept of irreducible semigroup,
x = F(S)
2
introduced in [40], collects these two families
of semigroups. A numerical semigroup is irreducible if it cannot be expressed as the intersection of two semigroups that contain it properly.
It can be proved that a semigroup is irreducible
if and only if it is either symmetric (with odd
Frobenius number) or pseudo-symmetric (with
even Frobenius number).
Intuition (and the tables of the number of numerical semigroups with a given genus or Frobenius number we have) tells us that the percentage of irreducible numerical semigroups is quite
small. It is proved in [44] that every numerical semigroup is one half of an infinite number
of symmetric numerical semigroups. The apparent parallelism between symmetric and pseudosymmetric numerical semigroups fails as we can
see in [37], where it is proved that a numerical
semigroup is irreducible if and only it is one half
of a pseudo-symmetric numerical semigroup. As
a consequence we have that every numerical
semigroup is a quarter of infinitely many pseudosymmetric numerical semigroups. In [61], it is
also shown that for every positive integer d and
every numerical semigroup S, there exist infinitely many symmetric numerical semigroups T
such that S = T /d, and if d ≥ 3, then there exist infinitely many pseudo-symmetric numerical
semigroups T with S = T /d.
From the definition, we deduce that a numerical semigroup S is symmetric if and only if
. Therefore these numerical semig(S) = F(S)+1
2
groups verify Wilf’s conjecture previously mentioned. We raise the following question. If a
numerical semigroup verifies Wilf’s conjecture,
then does so its half?
It can easily be seen that every numerical
semigroup can be expressed as a finite intersection of irreducible numerical semigroups. A
procedure for obtaining such a decomposition is
given in [50]. Furthermore it is also explained
how to obtain a decomposition with the least
possible number of irreducibles. We still do not
know how many numerical semigroups appear
in these minimal decompositions, moreover, we
wonder if there exists a positive integer N such
that every numerical semigroup can be expressed
as an intersection of at most N irreducible numerical semigroups.
In [62] Toms introduces a class of numerical
semigroups that are the positive cones of the
K0 groups of certain C ∗ -algebras. Given a numerical semigroup we say, inspired in this work,
that it admits a Toms decomposition if and
only if there exist positive integers q1 , . . . , qn ,
m1 , . . . , mn and L such that gcd{qi , mi } =
gcd{L, mi } = gcd{L,
Tnqi } = 1 for all i ∈
1
{1, . . . , n} and S = L i=1 hqi , mi i.
T
T
ii
As L1 ni=1 hqi , mi i = ni=1 hqi ,m
, we have that
L
if a numerical semigroup admits a Toms decomposition, then S is a finite intersection of proportionally modular numerical semigroups. It
is proved in [46] that the reciprocal is also true.
Therefore, a numerical semigroup admits a Toms
decomposition if and only if it is an intersection
of finitely many proportionally modular numerical semigroups. These kind of semigroups are
studied in [14], where an algorithm for distinguishing whether a numerical semigroup is an intersection of finitely many proportionally modular numerical semigroups is given. Furthermore,
5
in the affirmative case it gives us a minimal decomposition, and in the negative case it gives us
the least numerical semigroup which is intersection of proportionally modular semigroups and
contains the original numerical semigroup (its
proportionally modular closure).
It is conjectured in [57] that every contracted
modular numerical semigroup admits a Toms decomposition.
Note that the numerical semigroups that admit a Toms decomposition are those that are
the set of solutions of a system of proportionally
modular Diophantine inequalities. It is proved
in [32] that two systems of inequalities are always equivalent to another system with all the
inequalities having the same modulus, which
moreover can be chosen to be prime. Now we
raise the following question: is every system of
proportionally modular Diophantine inequalities
equivalent to a system with all proportions being equal to one?, or equivalently, if a numerical
semigroup admits a Tom decomposition, can it
be expressed as an intersection of modular numerical semigroups?
Following the terminology introduced in [51],
a gap x in a numerical semigroup S is said to
be fundamental if {2x, 3x} ⊂ S (and therefore
kx ∈ S for every integer with k ≥ 2). Let us
denote by FG(S) the set of all fundamental gaps
of S. If X ⊆ Z, then D(X) will denote the union
of all positive divisors of the elements of X. It
can easily be shown that S = N \ D(FG(S)).
Therefore, a way to represent a semigroup is by
giving its fundamental gaps. This representation
is specially useful when studying the quotient
of a semigroup
h S by a positive integer d, since
S
FG d = d | h ∈ FG(S), h ≡ 0 (mod d) .
The cardinality of the set of fundamental gaps
of a semigroup is an invariant of the semigroup.
We can therefore open a new line of research
by studying numerical semigroups attending to
their number of fundamental gaps. It would be
also interesting to find simple sufficient conditions that allow us to decide when a subset X
of N is the set of fundamental gaps of some numerical semigroup.
Let S be a numerical semigroup. In [33]
the set T of all numerical semigroups such that
S = T2 is studied, the semigroup of the “doubles” of S. In the just quoted work we raise the
question of finding a formula that depends on S
and allows us to compute the minimum of the
Frobenius numbers of the doubles of S.
Following this line we can ask ourselves about
the set of all “triples” (or multiples in general)
of a numerical semigroup.
Finally, it would be interesting to characterize the families of numerical semigroups verifying that any of its elements can be realized as a
quotient of some element of the family by a fixed
positive integer.
4. Frobenius Varieties
A directed graph G is a pair (V, E), where V
is a nonempty set whose elements are called vertices, and E is a subset of {(u, v) ∈ V × V | u 6=
v}. The elements of E are called edges of the
graph. A path connecting two vertices x and y
of G is a sequence of distinct edges of the form
(v0 , v1 ), (v1 , v2 ), . . . , (vn−1, vn ) with v0 = x and
vn = y. A graph G is a tree if there exists a
vertex r (called the root of G) such that for any
other vertex x of G, there exists an unique path
connecting x and r. If (x, y) is an edge of the
tree, then x is a son of y. A vertex of a tree is a
leaf if it has no sons.
Let S be the set of all numerical semigroups.
We define the graph associated to S, G(S), to be
the graph whose vertices are all the elements of S
and (T, S) ∈ S × S is an edge if S = T ∪ {F(T )}.
In [45], it is proved that G(S) is a tree with
root N, and that the sons of S ∈ S are the subsets S \ {x1 }, . . . , S \ {xr }, where x1 , . . . , xr are
the minimal generators of S greater than F(S).
Therefore S is a leaf of G(S) if it has no minimal generators greater than F(S). These results
allow us to construct recursively the set of numerical semigroups starting with N.
6
N = h1i
h2, 3i
♣♣♣
♣♣♣
h2, 5i
h3, 4, 5i
qqq
qqq
h4, 5, 6i
◆◆◆
◆◆◆
h3, 5, 7i
▲▲▲
▲▲
h3, 4i
h2, 7i
The level of a vertex in a directed graph is the
length of the path connecting this vertex with
the root. Note that in G(S) the level of a vertex
coincides with its genus as numerical semigroup.
Therefore, the Bras-Amorós’ conjecture quoted
in the end of the first section can be reformulated
by saying that in G(S) there are more vertices
in the (n + 1)th level than in the nth one.
A Frobenius variety is a nonempty family V
of numerical semigroups such that
1) if S, T ∈ V, then S ∩ T ∈ V,
2) if S ∈ V, S 6= N, then S ∪ {F(S)} ∈ V.
The concept of Frobenius variety was introduced
in [38] with the aim of generalizing most of the
results in [6, 14, 48, 49]. In particular, the semigroups that belong to a Frobenius variety can be
arranged as a directed tree with similar properties to those of G(S).
Clearly, S is a Frobenius variety. If A ⊆ N,
then {S ∈ S | A ⊆ S} is also a Frobenius variety. In particular, O(S), the set of all numerical
semigroups that contain S, is a Frobenius variety. We next give some interesting examples of
Frobenius varieties.
Inspired by [1], Lipman introduces and motivates in [27] the study of Arf rings. The characterization of them via their numerical semigroup of values, brings us to the following concept: a numerical semigroups S is said to be Arf
if for every x, y, z ∈ S, with x, y ≥ z we have
x + y − z ∈ S. It is proved in [48] that the set of
Arf numerical semigroups is a Frobenius variety.
Saturated rings were introduced independently in three distinct ways by Zariski ([67]),
Pham-Teissier ([29]) and Campillo ([10]), although the definitions given in these works are
equivalent on algebraically closed fields of characteristic zero. Like in the case of numerical
semigroups with the Arf property, saturated numerical semigroups appear when characterizing
these rings in terms of their numerical semigroups of values. A numerical semigroup S
is saturated if for every s, s1 , . . . , sr ∈ S with
si ≤ s for all i ∈ {1, . . . , r} and z1 , . . . , zr ∈ Z
being integers such that z1 s1 + · · · + zr sr ≥ 0,
then we have s + z1 s1 + · · · + zr sr ∈ S. It is
proved in [49] that the set of saturated numerical semigroups is a Frobenius variety.
The class of Arf and Saturated numerical
semigroups is also closed under quotients by positive integers as shown in [17], though the larger
class of maximal embedding dimension numerical semigroups is not (if S is a numerical semigroup, then e(S) ≤ m(S); a numerical semigroup is said to be a maximal embedding dimension semigroup, or to have maximal embedding
dimension, if e(S) = m(S)). What is the Frobenius variety generated by maximal embedding
dimension numerical semigroups?
As a consequence of [14] and [46], it can be
deduced that the set of numerical semigroups
that admit a Toms decomposition is a Frobenius variety. Every semigroup with embedding
dimension two admits a Toms decomposition. Is
the variety of numerical semigroups admitting
a Toms decomposition the least Frobenius variety containing all semigroups with embedding
dimension two?
The idea of pattern of a numerical semigroup
was introduced in [6] with the aim of trying to
generalize the concept of Arf numerical semigroup. A pattern P of length n is a linear homogeneous polynomial with non-zero integer coefficients in x1 , . . . , xn (for n = 0 the only pattern
is p = 0). We will say that numerical semigroup
S admits a pattern a1 x1 + . . . + an xn if for every sequence s1 ≥ s2 ≥ · · · ≥ sn of elements in
S, we have a1 s1 + · · · + an sn ∈ S. We denote
by SP the set of all numerical semigroups that
admit a pattern P . Then the set of numerical
semigroups with the Arf property is Sx1 +x2 −x3 .
It is proved in [6] that for every pattern P of a
special type (strongly admissible), SP is a Frobenius variety. What varieties arise in this way? It
would be interesting to give a weaker definition
7
of pattern such that every variety becomes the
variety associated to a pattern.
The intersection of Frobenius varieties is again
a Frobenius variety. This fact allows us to
construct new Frobenius varieties from known
Frobenius varieties and moreover, it allows us to
talk of the Frobenius variety generated by a family X of numerical semigroups. This variety will
be denoted by F (X), and it is defined to be the
intersection of all Frobenius varieties containing
X. If X is finite, then F (X) is finite and it is
shown in [38] how to compute all the elements
of F (X).
Let V be a Frobenius variety. A submonoid
M of N is a V-monoid if it can be expressed
as an intersection of elements of V. It is clear
that the intersection of V-monoids is again a Vmonoid. Thus given A ⊆ N we can define the
V-monoid generated by A as the intersection of
all V-monoids containing A. We will denote by
V(A) this V-monoid and we will say that A is a
V-system of generators of it. If there is no proper
subset of A being a V-system of generators V(A),
then A is a minimal V-system of generators of
V(A). It is proved in [38] that every V-monoid
admits an unique minimal V-system of generators, and that moreover this system is finite.
We define the directed graph G(V) in the same
way we defined G(S), that is, as the graph whose
vertices are the elements of V, and (T, S) ∈ V ×
V is an edge of the above graph if S = T ∪
{F(T )}. This graph is a tree with root N ([38]).
Moreover, the sons of a semigroup S in V are
S \ {x1 }, . . . , S \ {xr }, where x1 , . . . , xr are the
minimal V-generators of S greater than F(S).
This fact allows us to find all the elements of
the variety V from N.
The following figure represents part of the
tree associated to the variety of numerical semigroups with the Arf property.
N = V(1),
F = −1
V(2, 3),
F=1
V(3, 4),
F=2
V(4, 5),
F=3
③③
③③
①①
①①①
✈✈✈
✈✈✈
V(2, 5),
F=3
❍❍❍
❍❍❍
❋❋
❋❋
V(5, 6),
F=4
❋❋❋
❋❋
V(4, 6, 7),
F=5
V(3, 5),
F=4
V(2, 7),
F=5
V(3, 7),
F=5
V(2, 9),
F=7
The following figure represents part of the
tree corresponding to saturated numerical semigroups.
V(1),
F = −1
V(2, 3),
F=1
V(3, 4),
F=2
V(4, 5),
F=3
V(5, 6),
F=4
①
①
V(2, 5),
F=3
❋
❋
V(4, 6, 7),
F=5
V(3, 5),
F=4
V(2, 7),
F=5
V(3, 7),
F=5
V(2, 9),
F=7
As a generalization of Bras-Amorós’ conjecture, we can raise the following question. If V
is a Frobenius variety, does there exist on G(V)
more vertices in the (n + 1)th level than in the
nth one? The answer to this question is no, as
it is proved in [38, Example 26]. However, the
same question in the case of V being infinite remains open. Another interesting question would
be characterizing those Frobenius varieties that
verify the Bras-Amorós’ conjecture.
If V is a Frobenius variety and S ∈ V, then
it is known that S admits an unique minimal Vsystem of generators, and moreover it is finite.
The cardinality of the set above is an invariant of
S that will be called the embedding V-dimension
of S, and it will be denoted by eV (S). As a
generalization of Wilf’s conjecture, we would like
to characterize those Frobenius varieties V such
that for every S ∈ V, then eV (S)g(S) ≤ (eV (S)−
1)(F(S) + 1).
8
Clearly, the Frobenius variety generated by irreducible numerical semigroups is S, the set of
all numerical semigroups. What is the Frobenius
variety generated only by the symmetric ones?
and by the pseudo-symmetric ones?
5. Presentations of a numerical
semigroup
Let (S, +) be a commutative monoid. A congruence σ over S is an equivalence relation that
is compatible with addition, that is, if aσb with
a, b ∈ S, then (a+c)σ(b+c) for all c ∈ S. The set
S/σ endowed with the operation [a]+[b] = [a+b]
is a monoid. We will call it the quotient monoid
of S by σ.
If S is generated by {s1 , . . . , sn }, then the map
ϕ : Nn → S, (a1 , . . . , an ) 7→ a1 s1 + · · ·+ an sn is a
monoid epimorphism. Therefore S is isomorphic
to Nn / ∼S , where ∼S is the kernel congruence
of ϕ, that is, a ∼S b if ϕ(a) = ϕ(b).
The intersection of congruences over a monoid
S is again a congruence over S. This fact allows
us, given σ ⊆ S × S, to define the concept of
congruence generated by σ as the intersection of
all congruences over S containing σ, and it will
be denoted by hσi.
Rédei proves in [31] that every congruence
over Nn is finitely generated, that is, there exists
a subset of Nn × Nn with finitely many elements
generating it. As a consequence we have that
giving a finitely generated monoid is, up to isomorphism, equivalent to giving a finite subset of
Nn × Nn .
If S is a numerical semigroup with minimal
generators system {n1 , . . . , ne }, then there exists a finite subset σ of Ne × Ne such that S is
isomorphic to Ne /hσi. We say that σ is a presentation of S. If moreover σ has the least possible
cardinality, then σ is a minimal presentation of
S.
A (non directed) graph G is a pair (V, E),
where V is a nonempty set of elements called
vertices, and E is a subset of {{u, v} | u, v ∈
V, u 6= v}. The non ordered pair {u, v} will be
denoted by uv, and if it belongs to E, then we
say that it is an edge of G. A sequence of the
form v0 v1 , v1 v2 , . . . , vm−1 vm is a path of length
m connecting the vertices v0 and vm . A graph
is connected if any two distinct vertices are connected by a path. A graph G′ = (V ′ , E ′ ) is said
to be a subgraph of G if V ′ ⊆ V and E ′ ⊆ E.
A connected component of G is a maximal connected subgraph of G. It is well known (see for
instance [28]) that a connected graph with n vertices has at least n−1 edges. A (finite) tree with
n vertices is a connected graph with n − 1 edges.
Let us remind now the method described
in [35] for computing the minimal presentation of a numerical semigroup. Let S be a
numerical semigroup with minimal system of
generators {n1 , . . . , ne }. For each n ∈ S,
let us define Gn = (Vn , En ), where Vn =
{ni | n − ni ∈ S} and En = {ni nj | n −
(ni + nj ) ∈ S, i 6= j}. If Gn is connected,
we take σn = ∅. If Gn is not connected and
V1 , . . . , Vr are the sets of vertices corresponding to the connected components in Gn , then
we define σn = {(α1 , α2 ), (α1 , α3 ), . . . , (α1 , αr )},
where αi ∈ ϕ−1 (n) and its j-th component is
zero whenever
nj 6∈ Vi . It is proved in [35]
S
that σ = n∈S σn is a minimal presentation for
S. Let us notice that the set Betti(S) = {n ∈
S | Gn is not connected} is finite, and that its
cardinality is an invariant of S. A line of research could be the study of Betti(S), and its
relation with other invariants of S mentioned
above. In [19] affine semigroups (and thus numerical semigroups) with a single Betti element
are studied. What are those numerical semigroups having two or three Betti elements?
It is also shown in [35] how all the minimal
presentations of a semigroup are. In particular, we can determine whether a numerical semigroup admits a unique minimal presentation.
Motivated by the idea of generic ideal, we may
ask what are the numerical semigroups which
admit a unique minimal presentation, and characterize them in terms of their minimal generators.
If S is a numerical semigroup, then the cardinality of a minimal presentation of S is greater
than or equal to e(S) − 1. Those semigroups
that attain this bound are said to be complete
intersections. This kind of semigroup has been
well studied, and Delorme gives in [15] a good
9
characterization of them. Every numerical semigroup with embedding dimension two is a complete intersection, and every complete intersection is symmetric (see [21]). We raise the following questions. What semigroups can be expressed as the quotient of a complete intersection
by a positive integer? What is the least Frobenius variety containing all the complete intersection numerical semigroups?
Let S1 and S2 be two numerical semigroups minimally generated by {n1 , . . . , nr } and
{nr+1 , . . . , ne }, respectively. Let λ ∈ S1 \
{n1 , . . . , nr } and µ ∈ S2 \ {nr+1 , . . . , ne }, such
that gcd{λ, µ} = 1. We then say that S =
hµn1 , . . . , µnr , λnr+1 , . . . , λne i is a gluing to S1
and S2 . It is proved in [45] how given minimal presentations of S1 and S2 , one easily gets a
minimal presentation of S. The characterization
given by Delorme in [15], with this notation, can
be reformulated in the following way: a numerical semigroup is a complete intersection if and
only if is a gluing to two numerical semigroups
that are a complete intersection. A consequence
of this result is that the set of semigroups that
are a complete intersection is the least family of
numerical semigroups containing N being closed
under gluing. It is well known that the family of
numerical symmetric semigroups is also closed
under gluing ([45]). It would be interesting to
study other families closed under gluing. Which
is the least family containing those semigroups
with maximal embedding dimension and closed
under gluing?
Bresinsky gives in [7] a family of numerical
semigroups with embedding dimension four and
with cardinality of its minimal presentations arbitrarily large. This fact proves that the cardinality of a minimal presentation of a numerical semigroup cannot be upper bounded just in
function of its embedding dimension. Bresinski
also proves in [8] that the cardinality for a minimal presentation of a symmetric numerical semigroup with embedding dimension four can only
be three or five. It is conjectured in [36] that if
S is a numerical semigroup with e(S) ≥ 3, then
the cardinality of a minimal presentation for S
− 1. Barucci
is less than or equal to e(S)(e(S)−1)
2
[2] proves with the semigroup h19, 23, 29, 31, 37i
that the conjecture above is not true. However,
the problem of determining if the cardinality of
a minimal presentation of a symmetric numerical semigroup can be bounded in function of the
embedding dimension remains open.
Let σ be a finite subset of Nn × Nn . By using the results in [41, 45] it is possible to deterNn
is isomorphic
mine algorithmically whether hσi
to a numerical semigroup. However we miss in
the literature families of subsets σ of Nn so that
we can assert, without using algorithms, that
Nn /hσi is isomorphic to a numerical semigroup.
More specifically, we suggest the following problem: given
σ = {((c1 , 0, . . . , 0), (0, a11 , . . . , a1n )), . . . ,
((0, . . . , cn ), (an1 , . . . , ann−1 , 0))},
which conditions the integers ci and ajk have
to verify so that Nn /hσi is isomorphic to a
numerical semigroup? Herzog proved in [21]
that embedding dimension three numerical semigroups always have a minimal presentation of
this form. Neat numerical semigroups introduced by Komeda in [24] are also of this form.
6. Numerical semigroups with
embedding dimension three
Herzog proves in [21] that a numerical semigroup with embedding dimension three is symmetric if and only if it is a complete intersection.
This fact allows us to characterize symmetric numerical semigroups with embedding dimension
three in the following way (see [45]). A numerical semigroup S with e(S) = 3 is symmetric
if and only if S = ham1 , am2 , bm1 + cm2 i, with
a, b, c, m1 and m2 nonnegative integers, such
that m1 , m2 , a and b + c are greater than or
equal to two and gcd{m1 , m2 } = gcd{a, bm1 +
cm2 } = 1. Moreover, as it is proved in [45],
F(ham1 , am2 , bm1 + cm2 i) = a(m1 m2 − m1 −
m2 ) + (a − 1)(bm1 + cm2 ). We also have a
formula for the genus, since S is symmetric,
g(S) = F(S)+1
. Finally, we also know the type,
2
since it is proved in [18] that a numerical semigroup is symmetric if and only if its type is equal
to one.
10
We study in [43] the set of pseudo-symmetric
numerical semigroups with embedding dimension three. In particular, we give the
following characterization.
A numerical
semigroup S with e(S) = 3 is pseudosymmetric if and only if for some ordering
of
its minimal generators, by taking ∆ =
pP
( nni )2 − 4(n1 n2 + n1 n3 + n2 n3 − n1 n2 n3o
),
2 +n3 +∆ n1 +n2 −n3 +∆ −n1 +n2 +n3 +∆
then n1 −n2n
⊂
,
,
2n2
2n3
1
N. Moreover, in this case, F(hn1 , n2 , n3 i) =
∆ − (n1 + n2 + n3 ). We also know the genus
and the type, since if S is a pseudo-symmetric
numerical semigroups, then g(S) = F(S)+2
and
2
by [18], t(S) = 2.
Bresinsky ([7]) and Komeda ([24]) fully characterize those symmetric and pseudo-symmetric
numerical semigroups, respectively, with embedding dimension four. They show that their minimal presentations always have cardinality five.
Curtis proves in [13] the impossibility of giving
an algebraic formula for the Frobenius number
of a numerical semigroup in terms of its minimal generators on embedding dimension three.
We raise the following question. Given a polynomial f (x1 , x2 , x3 , x4 ) ∈ Q[x1 , x2 , x3 , x4 ], study
the family of numerical semigroups S such that
if S is minimally generated by n1 < n2 < n3 ,
and F is the Frobenius number of S, then
f (n1 , n2 , n3 , F ) = 0.
Our aim now is studying the set of numerical
semigroups with embedding dimension three in
general. By [18], we know that these semigroups
have type one or two, and by using [22, 34] if we
are concerned with the Frobenius number and
the genus, we can focus ourselves in those numerical semigroups whose minimal generators are
pairwise relatively prime. The following result
appears in [42]. Let n1 , n2 and n3 three pairwise relatively prime positive integers. Then the
system of equations
n1 = r12 r13 + r12 r23 + r13 r32 ,
n2 = r13 r21 + r21 r23 + r23 r31 ,
n3 = r12 r31 + r21 r32 + r31 r32 .
has a (unique) positive integer solution if
and only if {n1 , n2 , n3 } generates minimality
hn1 , n2 , n3 i. In [42] the authors give formulas
for the pseudo-Frobenius number and the genus
of hn1 , n2 , n3 i from the solutions of the above
system. Thus it seems natural to ask, given
positive integers rij , with i, j ∈ {1, 2, 3}, when
r12 r13 + r12 r23 + r13 r32 , r13 r21 + r21 r23 + r23 r31
and r12 r31 + r21 r32 + r31 r32 are pairwise relatively
prime?
Let S be a numerical semigroup minimally
generated by three positive integers n1 , n2 and
n3 being pairwise relatively prime. For each
i ∈ {1, 2, 3}, let ci = min{x ∈ N \ {0} | xni ∈
h{n1 , n2 , n3 } \ {ni }i}. In [42] formulas for F(S)
and g(S) from ni and ci (i ∈ {1, 2, 3}) are given.
Therefore, if we had a formula for computing c3
from n1 and n2 , we would have solved the problems raised by Frobenius for embedding dimension three. Note that c3 is nothing but the multiplicity of the proportionally modular semigroup
hn1 ,n2 i
. It is proved in [58] that if u is a posin3
tive integer such that un2 ≡ 1 (mod n1 ), then
hn1 ,n2 i
= {x ∈ Z | un2 n3 x mod n1 n2 ≤ n3 x}.
n3
We suggest in this line the problem of finding a
formula that allows us to give the multiplicity of
S(un2 n3 , n1 n2 , n3 ) from n1 , n2 and n3 .
Fermat’s Last Theorem asserts that for any integer n ≥ 3, the Diophantine equation xn + y n =
z n does not admit an integer solution such that
xyz 6= 0. As it is well known, this theorem
was proved by Wiles, with the help of Taylor,
in 1995 ([64, 65]) after 300 years of fruitless attempts. Let us observe that for n ≥ 3, the
Diophantine equation xn + y n = z n has no solution verifying zyz 6= 0 with some of the factors equal to 1. Therefore in order to solve this
equation it can be supposed that x, y and z
are integers greater than or equal to two, and
pairwise relatively prime. It is proved in [63],
that Fermat’s Last Theorem is equivalent to the
following statement: if a, b and c are integers
greater than or equal to two, pairwise relatively
prime, and n is an integer greater than or equal
to three, then the proportionally modular nun n
merical semigroup ha c,b i is not minimally generated by {an , cn−1 , bn }. It would be interesting
to prove this fact without using Fermat’s last
Theorem.
11
7. Non-unique factorization invariants
The invariant ω(S, s) is the least positive integer such that whenever s divides s1 + · · · +
sk for some s1 , . . . , sk ∈ S, then s divides
si1 + · · · + siω(S,s) for some {i1 , . . . , iω(S,s) } ⊆
{1, . . . , k}. The ω-primality of S is defined as
ω(S) = max{ω(S, n1 ), . . . , ω(S, ne )}. In [4] it
is highlighted that numerical semigroups fulfilling ω(S) 6= t(S) are rare. A characterization
for numerical semigroups fulfilling this condition
should be welcomed.
Another problem proposed by A. Geroldinger
is to determine when can we find a numerical
semigroup and an element in it with a given set
of lengths.
Let S be a numerical semigroup minimally
generated by {n1 < · · · < ne }. Then we already
know that S is isomorphic to Ne / ∼S , where
∼S is the kernel congruence of the epimorphism
ϕ : Ne → S, (a1 , . . . , ae ) 7→ a1 n1 + . . . + ae ne .
For s ∈ S, the elements in Z(s) = ϕ−1 (s)
are known as factorizations of s.
Given
(x1 , . . . , xe ) ∈ Z(s), its length is |x| = x1 + · · · +
xe . The set of lengths of s is L(s) = {|x| | x ∈
Z(s)}. If L(s) = {l1 < l2 < · · · < lt }, then the
set of differences of lengths of factorizations of
s is ∆(s)S = {l2 − l1 , . . . , lt − lt−1 }. Moreover
∆(S) = s∈S ∆(s). These sets are known to be
eventually periodic ([12]).
References
L(s)
The elasticity of s ∈ S is ρ(s) = max
,
and
min L(s)
[1] C. Arf, Une interprétation algébrique de la suite
ρ(S) = sups∈S (ρ(s)), which turns out to be a
des ordres de multiplicité d’une branche algébrique,
maximum ([47]). For numerical semigroups it is
Proc. London Math. Soc., 20 (1949), 256-287.
well known that ρ(S) = nn1e .
[2] V. Barucci, Numerical semigroup algebras, in Multiplicative ideal theory in commutative algebra, 39–
For x = (x1 , . . . , xe ), y = (y1 , . . . , ye ) ∈ Ne ,
53, Springer, New York, 2006.
the greatest common divisor of x and y is
[3] V. Barucci, D. E. Dobbs, M. Fontana, Maximality
gcd(x, y) = (min(x1 , y1 ), . . . , min(xe , ye )). The
Properties in Numerical Semigroups and Applicadistance between x and y is d(x, y) = max{|x −
tions to One-Dimensional Analytically Irreducible
gcd(x, y)|, |y − gcd(x, y)|}.
Local Domains, Memoirs of the Amer. Math. Soc.
598 (1997).
An N-chain (with N a positive integer) joining
two factorizations x and y of s ∈ S is a sequence [4] V. Blanco, P. A. Garcı́a-Sánchez, A. Geroldinger,
Semigroup-theoretical characterizations of arithz1 , . . . , zt of factorizations of s such that z1 =
metical invariants with applications to numerical
x, zt = y and d(zi , zi+1 ) ≤ N. The catenary
monoids and Krull monoids, Illinois J. Math, to apdegree of s, c(s), is the least N such that for
pear.
every two factorizations x and y of s, there is an [5] M. Bras-Amorós, Fibonacci-like behavior of the
number of numerical semigroups of a given genus,
N-chain joining them. The catenary degree of
Semigroup Forum, 76 (2008), 379–384.
S is c(S) = sups∈S {c(s)}. This supremum is a
[6]
M.
Bras-Amorós, P. A. Garcı́a-Sánchez, Patterns on
maximum and actually c(S) = maxs∈Betti(S) c(s)
numerical semigroups, Linar Alg. Appl. 414 (2006),
([11]). It was asked by F. Halter-Koch whether
652-669.
this invariant is periodic, that is, if there exists [7] H. Bresinsky, On prime ideals with generic zeo xi =
n ∈ S such that for s “big enough”, c(s + n) =
tni , Proc. Amer. Math. Soc. 47 (1975), 329-332.
[8]
H.
Bresinsky, Symmetric semigroups of integers genc(s).
erated
by four elements, Manuscripta Math. 17
The tame degree of s ∈ S, t(s), is the min(1975),
205-219.
imum N such that for any i ∈ {1, . . . , e} with
[9] M. Bullejos, J. C. Rosales, Proportionally modular
s − ni ∈ S and any x ∈ Z(s), there exists y =
diophantine inequalities and the Stern-Brocot tree,
(y1 , . . . , ye ), such that yi 6= 0 and d(x, y) ≤ N.
Mathematics of Computation 78 (2009), 1211-1226
The tame degree of S is t(S) = sups∈S (t(S)). [10] A. Campillo, On saturation of curve singularities
(any characteristic), Proc. of Symp. in Pure Math.
This supremum is again a maximum and it is
40 (1983), 211-220.
reached in the (finite) set of elements of the form
[11]
S.
T. Chapman, P. A. Garcı́a-Sánchez, D. Llena, V.
ni + w with w ∈ S such that w −nj 6∈ S for some
Ponomarenko, and J. C. Rosales, The catenary and
j 6= i. F. Halter-Koch also proposed the problem
tame degree in finitely generated commutative canof studying the eventual periodicity of S.
cellative monoids, Manuscripta Math. 120 (2006),
253-264.
12
[12] S. T. Chapman, R. Hoyer and N. Kaplan, Delta Sets
of Numerical Monoids are Eventually Periodic, Aequationes Math. 77(2009), 273–279.
[13] F. Curtis, On formulas for the Frobenius number of
a numerical semigroup. Math. Scand. 67 (1990), no.
2, 190-192.
[14] M. Delgado, P. A. Garcı́a-Sánchez, J. C. Rosales, J.
M. Urbano-Blanco, Systems of proportionally modular Diophantine inequalities, Semigroup Forum, 76
(2008), 469-488.
[15] C. Delorme, Sous-monoı̈des d’intersection complète
de N, Ann. Scient. École Norm. Sup. (4), 9 (1976),
145-154.
[16] D. E. Dobbs, G. L. Matthews, On a question of
Wilf concerning numerical semigroups, en Focus on
Commutative Rings Research, 193-202, Nova Sci.
Publ., New York, 2006.
[17] D. E. Dobbs, H. J. Smith, Numerical semigroups
whose fractions are of maximal embedding dimension, Semigroup Forum 82 (2011), no. 3, 412-422
[18] R. Fröberg, C. Gottlieb, R. Häggkvist, On numerical
semigroups, Semigroup Forum, 35 (1987), 63-83.
[19] P. A. Garcı́a-Sánchez, I. Ojeda, J. C. Rosales, Affine
semigroups having a unique Betti element, to appear
in Journal of Algebra and its Applications.
[20] R. L. Graham, D. E. Knuth, O. Patashnik, Concrete mathematics. A foundation for computer science. Addison-Wesley Publishing Company, Advanced Book Program, Reading, MA, 1989.
[21] J. Herzog, Generators and relations of abelian semigroups and semigroup rings, Manuscripta Math. 3
(1970), 175-193.
[22] S. M. Johnson, A linear Diophantine problem, Can.
J. Math., 12 (1960), 390-398.
[23] N. Kaplan, Counting numerical semigroups by genus
and some cases of a question of Wilf, Journal of Pure
and Applied Algebra, 216 (2012) 1016-1032.
[24] J. Komeda, On the existence of Weierstrass points
with a certain semigroup generated by 4 elements,
Tsukuba J. Math, 6 (1982)m 237-270.
[25] J. Komeda, Non-weierstras numerical semigroups,
Semigroup Forum 57(1998), 157-185.
[26] E. Kunz, The value-semigroup of a one-dimensional
Gorenstein ring, Proc. Amer. Math. Soc., 25 (1973),
748-751.
[27] J. Lipman, Stable ideals and Arf rings, Amer. J.
Math., 93 (1971), 649-685.
[28] D. Narsingh, Graph Theory with Applications to
Engineering and Computer Science, Prentice Hall
Series in Automatic Computation, 1974.
[29] F. Pham, B. Teissier, Fractions lipschitziennes et
saturations de Zariski des algébres analytiques complexes, Centre Math. École Polytech., Paris, 1969.
Actes du Congrès International des Mathématiciens
(Nice, 1970), Tome 2, pp. 649–654. Gauthier-Villars,
Paris, 1971.
[30] J. L. Ramı́rez Alfonsı́n, The Diophantine Forbenius
Problem, Oxford University Press, 2005.
[31] L. Rédei, The theory of finitely generated commutative semigroups, Pergamon, Oxford-Edinburgh-New
York, 1965.
[32] A. M. Robles-Pérez, J. C. Rosales, Equivalent
proportionally modular Diophantine inequalities,
Archiv der Mathematik 90 (2008), 24-30.
[33] A. M. Robles-Pérez, J. C. Rosales y P. Vasco, The
doubles of a numerical semigroup, J. Pure Appl. Algebra (aceptado para publicación).
[34] Ö. J. Rödseth, On a linear Diophantine problem of
Frobenius, J. Reine Angew. Math. 301 (1979), 431440.
[35] J. C. Rosales, An algorithmic method to compute
a minimal relation for any numerical semigroup, Internat. J. Algebra Comput. 6 (1996), no. 4, 441-455.
[36] J. C. Rosales, Symmetric numerical semigroups with
arbitrary multiplicity and embedding dimension,
Proc. Amer. Math. Soc. 129 (8) (2001), 2197-2203.
[37] J. C. Rosales, One half of a pseudo-symmetric numerical semigroup, Bull. London Math. Soc. 40
(2008), 347-352.
[38] J. C. Rosales, Families of numerical semigroups
closed under finite intersections and for the Frobenius number, Houston J. Math. 34 (2008), 339-348.
[39] J. C. Rosales, M. B. Branco, Numerical semigroups
that can be expressed as an intersection of symmetric numerical semigroups, J. Pure Appl. Algebra
171 (2-3) (2002), 303–314.
[40] J. C. Rosales, M. B. Branco, Irreducible numerical
semigroups, Pacific J. Math. 209 (2003), 131-143.
[41] J. C. Rosales, P. A. Garcı́a-Sánchez, Finitely generated commutative monoids, Nova Science Publishers, New York, 1999.
[42] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical
semigroups with embedding dimension three, Archiv
der Mathematik 83 (2004), 488-496.
[43] J. C. Rosales, P. A. Garcı́a-Sánchez, Pseudosymmetric numerical semigroups with three generators, J. Algebra 291 (2005), 46-54.
[44] J. C. Rosales, P. A. Garcı́a-Sánchez, Every numerical semigroup is one half of infinitely many symmetric numerical semigroups, Comm. Algebra 36
(2008), 2910-2916.
[45] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical
semigroups, Springer, 2009.
[46] J. C. Rosales, P. A. Garcı́a-Sánchez, Numerical
semigroups having a Toms decompositoin, Canadian
Math. Bull. 51 (2008), 134-139.
[47] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, Atomic commutative monoids and their
elasticity, Semigroup Forum 68 (2004), 64-86.
[48] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, M. B. Branco, Arf numerical semigroups, J.
Algebra 276 (2004), 3-12.
13
[49] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, M. B. Branco, Saturated numerical semigroups, Houston J. Math. 30 (2004), 321-330.
[50] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, J. A. Jimenez-Madrid, The oversemigroups
of a numerical semigroup, Semigroup Forum 67
(2003), 145-158.
[51] J.C. Rosales, P. A. Garcı́a-Sánchez, J.I. Garcı́aGarcı́a, J.A. Jiménez-Madrid, Fundamental gaps
in numerical semigroups, J. Pure Appl. Alg. 189
(2004), 301-313.
[52] J. C. Rosales, P. A. Garcı́a-Sánchez, J. I. Garcı́aGarcı́a, J. M. Urbano-Blanco, Proportionally modular Diophantine inequalities, J. Number Theory 103
(2003), 281-294.
[53] J. C. Rosales, P. A. Garcı́a-Sánchez, J. M. UrbanoBlanco, Modular Diophantine inequalities and numerical semigroup, Pacific J. Math. 218 (2) (2005),
379-398.
[54] J. C. Rosales, P. A. Garcı́a-Sánchez, J. M. UrbanoBlanco, The set of solutions of a proportionally modular Diophantine inequality, J. Number Theory. 128
(2008), 453-467.
[55] J. C. Rosales, J. M. Urbano-Blanco, Opened modular numerical semigroups, J. Algebra 306 (2006),
368-377.
[56] J. C. Rosales, J. M. Urbano-Blanco, Proportionally modular Diophantine inequalities and full semigroups, Semigroup Forum 72 (2006), 362-374.
[57] J. C. Rosales y J. M. Urbano-Blanco, Contracted
modular Diophantine inequalities and numerical
semigroups, Math.Inqual. Appl. 10 (2007), 491-498.
[58] J. C. Rosales, P. Vasco, The smallest positive integer that is solution of a proportionally modular Diophantine inequality, Math. Inequal. Appl. 11 (2008),
203- 212.
[59] A. Sammartano, Numerical semigroups with large
embedding dimension satisfy Wilf’s conjecture,
Semigroup Forum. To appear.
[60] J. J. Sylvester, Mathematical questions with their
solutions, Educational Times 41 (1884), 21.
[61] I. Swanson, Every numerical semigroup is one over d
of infinitely many symmetric numerical semigroups,
in Commutative algebra and its applications, Walter
de Gruyter, Berlin, 2009, 383–386.
[62] A. Toms, Strongly perforated K0 -groups of simple
C ∗ -algebras, Canad. Math. Bull. 46 (2003), 457-472.
[63] J. M. Urbano-Blanco, Semigrupos numéricos proporcionalmente modulares, Tesis Doctoral, Universidad de Granada, Spain, March 2005.
[64] A. Wiles, Modular elliptic curves and Fermat’s last
theorem, Ann. Math. 141 (1995), 443-551.
[65] A. Wiles y R. Taylos, Ring-Theoretic properties of
certain Hecke algebras, Ann. Math. 141 (1005), 553572.
[66] H. S. Wilf, Circle-of-lights algorithm for money
changing problem, Am. Math. Mo. 85 (1978), 562565.
[67] O. Zariski, General theory of saturation and saturated local rings I, II, III, Amer. J. Math. 93 (1971),
573-684, 872-964, 97 (1975), 415-502.
[68] A. Zhai, Fibonacci-like growth of numerical semigroups with a given genus. arXiv:1111.3142v1.
[69] Y. Zhao, Constructing numerical semigroups of a
given genus Semigroup Forum, 80 (2010) 242-254
E-mail address: [email protected]
CMUP and DM-FCUP,
Porto, Portugal
Universidade
do
E-mail address: [email protected]
E-mail address: [email protected]
Departamento de Álgebra, Universidad de
Granada, España
| 0math.AC
|
Heavy hitters via cluster-preserving clustering
Kasper Green Larsen∗
Jelani Nelson†
Huy L. Nguy˜ên‡
Mikkel Thorup§.
arXiv:1604.01357v1 [cs.DS] 5 Apr 2016
April 6, 2016
Abstract
In the turnstile `p heavy hitters problem with parameter ε, one must maintain a highdimensional vector x ∈ Rn subject to updates of the form update(i, ∆) causing the change
xi ← xi + ∆, where i ∈ [n], ∆ ∈ R. Upon receiving a query, the goal is to report every “heavy
hitter” i ∈ [n] with |xi | ≥ εkxkp as part of a list L ⊆ [n] of size O(1/εp ), i.e. proportional to the
maximum possible number of heavy hitters. In fact we solve the stronger tail version, in which
L should include every i such that |xi | ≥ εkx[1/εp ] kp , where x[k] denotes the vector obtained by
zeroing out the largest k entries of x in magnitude.
For any p ∈ (0, 2] the CountSketch of [CCFC04] solves `p heavy hitters using O(ε−p lg n)
words of space with O(lg n) update time, O(n lg n) query time to output L, and whose output
after any query is correct with high probability (whp) 1 − 1/ poly(n) [JST11, Section 4.4]. This
space bound is optimal even in the strict turnstile model [JST11] in which it is promised that
xi ≥ 0 for all i ∈ [n] at all points in the stream, but unfortunately the query time is very slow.
To remedy this, the work [CM05] proposed the “dyadic trick” for the CountMin sketch for
p = 1 in the strict turnstile model, which to maintain whp correctness achieves suboptimal space
O(ε−1 lg2 n), worse update time O(lg2 n), but much better query time O(ε−1 poly(lg n)). An
extension to all p ∈ (0, 2] appears in [KNPW11, Theorem 1], and can be obtained from [Pag13].
We show that this tradeoff between space and update time versus query time is unnecessary.
We provide a new algorithm, ExpanderSketch, which in the most general turnstile model
achieves optimal O(ε−p lg n) space, O(lg n) update time, and fast O(ε−p poly(lg n)) query time,
providing correctness whp. In fact, a simpler version of our algorithm for p = 1 in the strict
turnstile model answers queries even faster than the “dyadic trick” by roughly a lg n factor,
dominating it in all regards. Our main innovation is an efficient reduction from the heavy
hitters to a clustering problem in which each heavy hitter is encoded as some form of noisy
spectral cluster in a much bigger graph, and the goal is to identify every cluster. Since every
heavy hitter must be found, correctness requires that every cluster be found. We thus need
a “cluster-preserving clustering” algorithm, that partitions the graph into clusters with the
promise of not destroying any original cluster. To do this we first apply standard spectral graph
partitioning, and then we use some novel combinatorial techniques to modify the cuts obtained
so as to make sure that the original clusters are sufficiently preserved. Our cluster-preserving
clustering may be of broader interest much beyond heavy hitters.
∗
Aarhus University. [email protected]. Supported by Center for Massive Data Algorithmics, a Center of the
Danish National Research Foundation, grant DNRF84, a Villum Young Investigator Grant and an AUFF Starting
Grant.
†
Harvard University. [email protected]. Supported by NSF grant IIS-1447471 and CAREER award
CCF-1350670, ONR Young Investigator award N00014-15-1-2388, and a Google Faculty Research Award.
‡
Toyota Technological Institute at Chicago. [email protected].
§
University of Copenhagen. [email protected]. Supported in part by Advanced Grant DFF-0602-02499B
from the Danish Council for Independent Research under the Sapere Aude research career programme.
1
Introduction
Finding heavy hitters in a data stream, also known as elephants or frequent items, is one of the
most practically important and core problems in the study of streaming algorithms. The most basic
form of the problem is simple: given a long stream of elements coming from some large universe,
the goal is to report all frequent items in the stream using an algorithm with very low memory
consumption, much smaller than both the stream length and universe size.
In practice, heavy hitters algorithms have been used to find popular destination addresses
and heavy bandwidth users by AT&T [CJK+ 04], to find popular search query terms at Google
[PDGQ05], and to answer so-called “iceberg queries” in databases [FSG+ 98] (to name a few of
many applications). A related problem is finding superspreaders [LCG13], the “heavy hitters” in
terms of number of distinct connections, not total bandwidth.
In the theoretical study of streaming algorithms, finding heavy hitters has played a key role
as a subroutine in solving many other problems. For example, the first algorithm providing nearoptimal space complexity for estimating `p norms in a stream for p > 2 needed to find heavy
hitters as a subroutine [IW05], as did several follow-up works on the same problem [GB09, AKO11,
BO13, BKSV14, Gan15]. Heavy hitters algorithms are also used as a subroutine in streaming
entropy estimation [CCM10, HNO08], `p -sampling [MW10], cascaded norm estimation and finding
block heavy hitters [JW09], finding duplicates [GR09, JST11], fast `p estimation for 0 < p < 2
[NW10, KNPW11], and for estimating more general classes of functions of vectors updated in a
data stream [BO10, BC15].
In this work we develop a new heavy hitters algorithm, ExpanderSketch, which reduces the
heavy hitters problem to a new problem we define concerning graph clustering, which is an area of
interest in its own right. Our special goal is to identify all clusters of a particular type, even if they
are much smaller than the graph we are asked to find them in. While our algorithm as presented is
rather theoretical with large constants, the ideas in it are simple with potential practical impact.
The particular formulation we focus on is finding clusters with low external conductance in
the graph, and with good connectivity properties internally (a precise definition of these clusters,
which we call -spectral clusters, will be given soon). Similar models have been used for finding
a community within a large network, and algorithms for identifying them have applications in
community detection and network analysis. In computer vision, many segmentation algorithms
such as [SM00, AMFM11] model images as graphs and use graph partitioning to segment the
images. In theory, there has been extensive study on the problem with many approximation
algorithms [LR88, ARV09]. Our focus in this work is on theoretical results, with constants that
may be unacceptable in practice.
2
Previous work
In this work we consider the `p heavy hitters problem for 0 < p ≤ 2. A vector x ∈ Rn is maintained,
initialized to the all zero vector. A parameter ε ∈ (0, 1/2) is also given. This is a data structural
problem with updates and one allowed query that are defined as follows.
• update(i, ∆): Updatexi ← xi + ∆, where i ∈ [n] and ∆ ∈ R has finite precision.
• query(): Return a set L ⊆ [n] of size |L| = O(ε−p ) containing all ε-heavy hitters i ∈ [n]
under `p . Here we say i is an ε-heavy hitter under `p if |xi | ≥ εkx[1/εp ] kp , where x[k] denotes
1
the vector x with the largest k entries (in absolute value) set to zero. Note the number of
heavy hitters never exceeds 2/εp .
Unless stated otherwise we consider randomized data structures in which any individual query
has some failure probability δ. Note our definition of ε-heavy hitters includes all coordinates
satisfying the usual definition requiring |xi | ≥ εkxkp , and potentially more. One can thus recover
all the usual heavy hitters from our result by, in post-processing, filtering L to only contain indices
that are deemed large by a separate CountSketch run in parallel. A nice feature of the more
stringent version we solve is that, by a reduction in [JST11, Section 4.4], solving the `2 version of
the problem with error ε0 = εp/2 implies a solution for the `p ε-heavy hitters for any p ∈ (0, 2].
Hence for the remainder of the assume we discuss p = 2 unless stated otherwise. We also note
that any solution to `p heavy hitters for p > 2, even for constant ε, δ, must use polynomial space
Ω(n1−2/p ) bits [BYJKS04].
Before describing previous work, we first describe, in the terminology of [Mut05], three different
streaming models that are frequently considered.
• Cash-register: This model is also known as the insertion-only model, and it is characterized
by the fact that all updates update(i, ∆) have ∆ = 1.
• Strict turnstile: Each update ∆ may be an arbitrary positive or negative number, but we
are promised that xi ≥ 0 for all i ∈ [n] at all points in the stream.
• General turnstile: Each update ∆ may be an arbitrary positive or negative number, and
there is no promise that xi ≥ 0 always. Entries in x may be negative.
It should be clear from the definitions that algorithms that work correctly in the general turnstile
model are the most general, followed by strict turnstile, then followed by the cash-register model.
Similarly, lower bounds proven in the cash-register model are the strongest, and those proven in
the general turnstile model are the weakest. The strict turnstile model makes sense in situations
when deletions are allowed, but items are never deleted more than they are inserted. The general
turnstile model is useful when computing distances or similarity measures between two vectors z, z 0 ,
e.g. treating updates (i, ∆) to z as +∆ and to z 0 as −∆, so that x represents z − z 0 .
For the heavy hitters problem, the first algorithm with provable guarantees was a deterministic
algorithm for finding `1 heavy hitters in the cash-register model [MG82], for solving the non-tail
version of the problem in which heavy hitters satisfy |xi | ≥ εkxk1 . The space complexity and
query time of this algorithm are both O(1/ε), and the algorithm can be implemented so that the
update time is that of insertion into a dynamic dictionary on O(1/ε) items [DLM02] (and thus
expected O(1) time if one allows randomness, via hashing). We measure running time in the word
RAM model and space in machine words, where a single word is assumed large enough to hold
the maximum kxk∞ over all time as well as any lg n bit integer. The bounds achieved by [MG82]
are all optimal, and hence `1 heavy hitters in the cash-register model is completely resolved. An
improved analysis of [BICS10] shows that this algorithm also solves the tail version of heavy hitters.
In another version of the problem in which one simultaneously wants the list L of ε heavy hitters
together with additive ε0 kxk1 estimates for every i ∈ L, [BDW16] gives space upper and lower
bounds which are simultaneously optimal in terms of ε, ε0 , n, and the stream length.
For `2 heavy hitters in the cash-register model, the CountSketch achieves O(ε−2 lg n) space.
Recent works gave new algorithms using space O(ε−2 lg(1/ε) lg lg n) [BCIW16] and O(ε−2 lg(1/ε))
2
reference
[CM05]∗
[CM05]∗
[NNW14]
[CCFC04]
[KNPW11, Pag13]∗
[CH08]
This work
space
ε−1 lg n
ε−1 lg2 n
ε−2 lg n
ε−p lg n
ε−p lg2 n
ε−p lg n
ε−p lg n
update time
lg n
lg2 n
−1
ε lg n
lg n
lg2 n
lg n
lg n
query time
n lg n
−1
ε lg2 n
n lg n
n lg n
ε−p lg2 n
ε−p · nγ
−p
ε poly(lg n)
randomized?
Y
Y
N
Y
Y
Y
Y
`p ,
`p ,
`p ,
`p ,
norm
`1
`1
`1
p ∈ (0, 2]
p ∈ (0, 2]
p ∈ (0, 2]
p ∈ (0, 2]
Figure 1: Comparison of turnstile results from previous work and this work for `p heavy hitters
when desired failure probability is 1/poly(n). Space is measured in machine words. For [CH08],
γ > 0 can be an arbitrarily small constant. If a larger failure probability δ 1/ poly(n) is tolerable,
one lg n factor in space, update time, and query time in each row with an asterisk can be replaced
with lg((lg n)/(εδ)). For [Pag13], one lg n in each of those bounds can be replaced with lg(1/(εδ)).
For [CH08], the query time can be made (ε−p lg n)((lg n)/(εδ))γ .
[BCI+ 16]. A folklore lower bound in the cash-register model is Ω(1/ε2 ) machine words, which
n
follows since simply encoding the names of the up to 1/ε2 heavy hitters requires Ω(lg( 1/ε
2 )) bits.
Despite the `1 and `2 heavy hitters algorithms above in the cash-register model requiring
o(ε−p lg n) machine words, it is known finding ε-heavy hitters under `p for any 0 < p ≤ 2 in
the strict turnstile model requires Ω(ε−p lg n) words of memory, even for constant probability of
success [JST11]. This optimal space complexity is achieved even in the more general turnstile model
by the CountSketch of [CCFC04] for all p ∈ (0, 2] (the original work [CCFC04] only analyzed the
CountSketch for p = 2, but a a very short argument of [JST11, Section 4.4] shows that finding
`p heavy hitters for p ∈ (0, 2) reduces to finding `2 heavy hitters by appropriately altering ε).
For any p ∈ (0, 2], the CountSketch achieves optimal O(ε−p lg n) space, the update time is
O(lg n), the success probability of any query is with high probability (whp) 1 − 1/ poly(n), but the
query time is a very slow Θ(n lg n). In [CM05], for p = 1 in the strict turnstile model the authors
described a modification of the CountMin sketch they dubbed the “dyadic trick” which maintains
whp correctness for queries and significantly improves the query time to O(ε−1 lg2 n), but at the
cost of worsening the update time to O(lg2 n) and space to a suboptimal O(ε−1 lg2 n). An easy
modification of the dyadic trick extends the same bounds to the general turnstile model and also
to ε-heavy hitters under `p for any 0 < p ≤ 2 with the same bounds [KNPW11, Theorem 1] (but
with ε−1 replaced by ε−p ). A different scheme using error-correcting codes in [Pag13, Theorem 4.1]
achieves the same exact bounds for `p heavy hitters when whp success is desired. This tradeoff in
sacrificing space and update time for better query time has been the best known for over a decade
for any 0 < p ≤ 2.
From the perspective of time lower bounds, [LNN15] showed that any “non-adaptive”
turnstile
p
algorithm for constant ε and using poly(lg n) space must have update time Ω( lg n/ lg lg n). A
non-adaptive algorithm is one in which, once the randomness used by the algorithm is fixed (e.g. to
specify hash functions), the cells of memory probed when processing update(i, ∆) depend only on
i and not on the history of the algorithm. Note every known turnstile algorithm for a non-promise
problem is non-adaptive.
3
In summary, there are several axes on which to measure the quality of a heavy hitters algorithm:
space, update time, query time, and failure probability. The ideal algorithm should achieve optimal
space, fast update time (O(lg n) is the best we know), nearly linear query time e.g. O(ε−p poly(lg n)),
and 1/ poly(n) failure probability. Various previous works were able to achieve various subsets of
at most three out of four of these desiderata, but none could achieve all four simultaneously.
Our contribution I: We show the tradeoffs between space, update time, query time, and failure
probability in previous works are unnecessary (see Figure 1). Specifically, in the most general
turnstile model we provide a new streaming algorithm, ExpanderSketch, which for any 0 < p ≤ 2
provides whp correctness for queries with O(lg n) update time, O(ε−p poly(lg n)) query time, and
optimal O(ε−p lg n) space. In fact in the strict turnstile model and for p = 1, we are able to provide
a simpler variant of our algorithm with query time O(ε−1 lg1+γ n) for any constant γ > 0, answering
queries even faster than the fastest previous known algorithms achieving suboptimal update time
and space, by nearly a lg n factor, thus maintaining whp correctness while dominating it in all of
the three axes: space, update time, and query time (see Section D).
2.1
Cluster-preserving clustering
Our algorithm ExpanderSketch operates by reducing the heavy hitters problem to a new clustering problem we formulate of finding clusters in a graph, and we then devise a new algorithm
CutGrabClose which solves that problem. Specifically, the ExpanderSketch first outputs
a graph in which each heavy hitter is encoded by a well-connected cluster (which may be much
smaller than the size of the total graph), then CutGrabClose recovers the clusters, i.e. the heavy
hitters, from the graph. There have been many works on finding clusters S in a graph such that the
conductance of the cut (S, S̄) is small. We will only mention some of them with features similar to
our setting. Roughly speaking, our goal is to find all clusters that are low conductance sets in the
graph, and furthermore induce subgraphs that satisfy something weaker than having good spectral
expansion. It is necessary for us to (1) be able to identify all clusters in the graph; and (2) have
a quality guarantee that does not degrade with the number of clusters nor the relative size of the
clusters compared with the size of the whole graph. As a bonus, our algorithm is also (3) able to
work without knowing the number of clusters.
In the context of heavy hitters, requirement (1) arises since all heavy hitters need to be returned.
The number of heavy hitters is not known and can be large, as is the ratio between the size of
the graph and the size of a cluster (both can be roughly the square root of the size of our graph),
leading to the requirement (2) above. One line of previous works [ST04, AP09, GT12] gives excellent
algorithms for finding small clusters in a much larger graph with runtime proportional to the size of
the clusters, but their approximation guarantees depend on the size of the whole graph, violating
our requirement (2). In fact, requirement (2) is related to finding non-expanding small sets in
a graph, an issue at the forefront of hardness of approximation [RS10]. As resolving this issue in
general is beyond current techniques, many other works including ours attempt to solve the problem
in structured special cases. There are many other excellent works for graph clustering, but whose
performance guarantees deterioriate as k increases, also violating (2). The work [GT14] shows
results in the same spirit as ours: if there are k clusters and a multiplicative poly(k) gap between
the kth and (k +1)st smallest eigenvalues of the Laplacian of a graph, then it is possible to partition
the graph into at most k high conductance induced subgraphs. Unfortunately, such a guarantee is
unacceptable for our application due to more stringent requirements on the clusters being required
4
as k increases, i.e. the poly(k) gap in eigenvalues — our application provides no such promise.
Another work with a goal similar in spirit to ours is [PSZ15], which given the conductances in our
graphs deriving from heavy hitters would promise to find k clusters W up to error poly(k) · |W |
symmetric difference each. Unfortunately such a result is also not applicable to our problem, since
in our application we could have k |W | so that the guarantee becomes meaningless.
A different line of works [MMV12, MMV14] give algorithms with constant approximation guarantees but without being able to identify the planted clusters, which is not possible in their models
in general. In their setting, edges inside each cluster are adversarially chosen but there is randomness in the edges between clusters. Our setting is the opposite: the edges inside each cluster have
nice structure while the edges between clusters are adversarial as long as there are few of them.
From the practical point of view, a drawback with several previous approaches is the required
knowledge of the number of clusters. While perhaps not the most pressing issue in theory, it is
known to cause problems in practice. For instance, in computer vision, if the number of clusters is
not chosen correctly, algorithms like k-means tend to break up uniform regions in image segmentation [AMFM11]. Instead, a preferred approach is hierarchical clustering [AMFM11], which is in
the same spirit as our solution.
Definition 1. An -spectral cluster is a vertex set W ⊆ V of any size satisfying the following two
conditions: First, only an -fraction of the edges incident to W leave W , that is, |∂(W )| ≤ vol(W ),
where vol(W ) is the sum of edge degrees of vertices inside W . Second, given any subset A of W ,
let r = vol(A)/ vol(W ) and B = W \ A. Then
|E(A, B)| ≥ (r(1 − r) − ) vol(W ).
Note r(1 − r) vol(W ) is the number of edges one would expect to see between A and B had W been
a random graph with a prescribed degree distribution.
Our contribution II: We give a hierarchical graph partitioning algorithm combining traditional
spectral methods and novel local search moves that can identify all -spectral clusters in a potentially
much larger graph for below some universal constant, independent of the number of clusters or
the ratio between the graph size and cluster sizes. More precisely, consider a graph G = (V, E).
In polynomial time, our algorithm can partition the vertices in a graph G = (V, E) into subsets
V1 , . . . V` so that every -spectral cluster W matches some subset Vi up to an O( vol(W )) symmetric
difference. The algorithm is described in Section 6, with guarantee given by Theorem 1 below.
Theorem 1. For any given ≤ 1/2000000 and graph G = (V, E), in polynomial time and linear
space, we can find a family of disjoint vertex sets U1 , . . . U` so that every -spectral cluster W of G
matches some set Ui in the sense that
• vol(W \ Ui ) ≤ 3 vol(W ).
• vol(Ui \ W ) ≤ 2250000 vol(W )
Moreover, if v ∈ Ui , then > 4/9 of its neighbors are in Ui .
An interesting feature of our solution is that in optimization in practice, it is usually expected
to perform local search to finish off any optimization algorithm but it is rarely the case that one
can prove the benefit of the local search step. In contrast, for our algorithm, it is exactly our local
search moves which guarantee that every cluster is found.
5
3
Preliminaries
The letter C denotes a positive constant that may change from line to line, and [n] = {1, . . . , n}.
We use “with high probability” (whp) to denote probability 1 − 1/ poly(n).
All graphs G = (V, E) discussed are simple and undirected. We say that a graph is a λ-spectral
expander if the second largest eigenvalue, in magnitude, of its unnormalized adjacency matrix is at
most λ. Given two
P vertex sets S, T ⊆ V , we define E(S, T ) = E ∩ (S × T ). For S, we define the
volume vol(S) = v∈S deg(v), and boundary ∂S = E(S, S) where S = V \ S. We specify volG and
∂G when the graph may not be clear from context. We define the conductance of the cut (S, S) as
φ(G, S) =
|∂S|
.
min{vol(S), vol(S)}
If S or S is empty, the conductance is ∞. We define the conductance of the entire graph G by
φ(G) = min φ(G, S).
∅(S(V
4
Overview of approach
We now provide an overview of our algorithm, ExpanderSketch. In Section A we show turnstile
heavy hitters with arbitrary ε reduces to several heavy hitters problems for which ε is “large”.
Specifically, after the reduction whp we are guaranteed each of the ε-heavy hitters
√ i in the original
stream now appears in some substream updating a vector x0 ∈ Rn , and |x0i | ≥ (1/ C lg n)kx0[C lg n] k2 .
√
√
That is, i is an Ω(1/ lg n)-heavy hitter in x0 . One then finds all the Ω(1/ lg n) heavy hitters in
each substream then outputs their union as the final query
overview
√ result. For the remainder of this
2
we thus focus on solving ε-heavy hitters for ε > 1/ C lg n, so there are at most 2/ε = O(lg n)
heavy hitters. Our goal is to achieve failure probability 1/ poly(n) with space O(ε−2 lg n), update
time O(lg n), and query time ε−2 poly(lg n) = poly(lg n).
There is a solution, which we call the “b-tree” (based on [CH08]), which is almost ideal (see
Section B.2 and Corollary 1). It achieves O(ε−2 lg n) space and O(lg n) update time, but query
time inverse polynomial in the failure probability δ, which for us is δ = 1/ poly(n). Our main idea is
to reduce to the case of much larger failure probability (specifically 1/ poly(lg n)) so that using the
b-tree then becomes viable for fast query. We accomplish this reduction while maintaining O(lg n)
update time and optimal space by reducing our heavy hitter problem into m = Θ(lg n/ lg lg n)
separate partition heavy hitters problems, which we now describe.
In the partition ε-heavy hitters problem, there is some parameter ε ∈ (0, 1/2). There is also
some partition P = {S1 , . . . , SN } of [n], and it is presented in the form of an oracle O : [n] → [N ]
such that for any i ∈ [n], O(i) gives the j ∈ [N ] such that i ∈ Sj . In what follows the partitions will
be random, with Oj depending on some random hash functions (in the case of adapting the b-tree
to partition heavy hitters the Oj are deterministic; see Section B.2). Define a vector y ∈ RN such
that for each j ∈ [N ], yj = kxSj k2 , where xS is the projection of x onto a subset S of coordinates.
The goal then is to solve the ε-heavy hitters problem on y subject to streaming updates to x: we
should output a list L ⊂ [N ], |L| = O(1/ε2 ), containing all the ε-heavy hitters of y. See Section B
for more details.
6
update(29, ∆)
m = 3 chunks
enc(i) = 0
1
1
update(1, v)
1
update(3, v)
P1
P2
t
0
1
update(1, v)
P3
Figure 2: Simplified version of final data structure. The update is x29 ← x29 + ∆ with m = 3, t = 2
in this example. Each Pj is a b-tree operating on a partition of size 2t .
Now we explain how we make use of partition heavy hitters. For each index i ∈ [n] we can
view i as a length lg n bitstring. Let enc(i) be an encoding of i into T = O(lg n) bits by an errorcorrecting code with constant rate that can correct an Ω(1)-fraction of errors. Such codes exist with
linear time encoding and decoding [Spi96]. We partition enc(i) into m contiguous bitstrings each
of length t = T /m = Θ(lg lg n). We let enc(i)j for j ∈ [m] denote the jth bitstring of length t when
partitioning enc(i) in this way. For our data structure, we instantiate m separate partition heavy
hitter data structures from Section B.2 (a partition heavy hitter variant of the b-tree), P1 , . . . , Pm ,
each with failure probability 1/ poly(lg n). What remains is to describe the m partitions Pj . We
now describe these partitions, where each will have N = 2O(t) = poly(lg n) sets.
Now, how we would like to define the partition is as follows, which unfortunately does not quite
work. For each j ∈ [m], we let the jth partition Pj have oracle Oj (i) = enc(i)j . That is, we partition
the universe according to the jth chunks of their codewords. See Figure 2 for an illustration, where
upon an update (i, ∆) we write for each Pj the name of the partition that is being updated. The
key insight is that, by definition of the partition heavy hitters problem, any partition containing
a heavy hitter i ∈ [n] is itself a heavy partition in Pj . Then, during a query, we would query
each Pj separately to obtain lists Lj ⊆ [2t ]. Thus the Pj which succeed produce Lj that contain
the jth chunks of encodings of heavy hitters (plus potentially other t-bit chunks). Now, let us
perform some wishful thinking: suppose there was only one heavy hitter i∗ , and furthermore each
Lj contained exactly enc(i∗ )j and nothing else. Then we could obtain i∗ simply by concatenating
the elements of each Lj then decoding. In fact one can show that whp no more than an arbitrarily
small fraction (say 1%) of the Pj fail, implying we would still be able to obtain 99% of the chunks
of enc(i∗ ), which is sufficient to decode. The main complication is that, in general, there may be
more than one heavy hitter (there may be up to Θ(lg n) of them). Thus, even if we performed
wishful thinking and pretended that every Pj succeeded, and furthermore that every Lj contained
exactly the jth chunks of the encodings of heavy hitters and nothing else, it is not clear how to
perform the concatenation. For example, if there are two heavy hitters with encoded indices 1100
and 0110 with m = t = 2, suppose the Pj return L1 = {11, 01} and L2 = {00, 10} (i.e. the first
and second chunks of the encodings of the heavy hitters). How would we then know which chunks
matched with which for concatenation? That is, are the heavy hitter encodings 1100, 0110, or are
they 1110, 0100? Brute force trying all possibilities is too slow, since m = Θ(lg n/ lg lg n) and each
|Lj | could be as big as Θ(lg n), yielding (C lg n)m = poly(n) possibilities. In fact this question is
quite related to the problem of list-recoverable codes (see Section C), but since no explicit codes are
7
Layer #:
Layer #:
Layer #:
Layer #:
1
2
3
..
..
..
..
..
..
..
..
..
..
..
..
m
(a)
(b)
(c)
(d)
Figure 3: Each vertex in row j corresponds to an element of Lj , i.e. the heavy hitter chunks output
by Pj . When indices in Pj are partitioned by hj (i) ◦ enc(i)j ◦ hj+1 (i), we connect chunks along
paths. Case (a) is the ideal case, when all j are good. In (b) P2 failed, producing a wrong output
that triggered incorrect edge insertions. In (c) both P2 and P3 failed, triggering an incorrect edge
and a missing vertex, respectively. In (d) two heavy hitters collided under h3 , causing their vertices
to have the same name thereby giving the appearance of a merged vertex. Alternatively, light items
masking as a heavy hitter might have appeared in L3 with the same h3 evaluation as a heavy hitter
but different h4 evaluation, causing the red vertex to have two outgoing edges to level 4.
known to exist with the efficiency guarantees we desire, we proceed in a different direction.
To aid us in knowing which chunks to concatenate with which across the Lj , a first attempt
(which also does not quite work) is as follows. Define m pairwise independent hash functions
h1 , . . . , hm : [n] → [poly(lg n)]. Since there are O(lg n) heavy hitters, any given hj perfectly hashes
them with decent probability. Now rather than partitioning according to Oj (i) = enc(i)j , we
imagine setting Oj (i) = hj (i) ◦ enc(i)j ◦ hj+1 (i) where ◦ denotes concatenation of bitstrings. Define
an index j ∈ [m] to be good if (a) Pj succeeds, (b) hj perfectly hashes all heavy hitters i ∈ [n],
and (c)
√ for each heavy hitter i, the total `2 weight from non-heavy hitters hashing to hj (i) is
o((1/ lg n)kx[1/ε2 ] k2 . A simple argument shows that whp a 1 − fraction of the j ∈ [m] are good,
where can be made an arbitrarily small positive constant. Now let us perform some wishful
thinking: if all j ∈ [m] are good, and furthermore no non-heavy elements appear in Lj with the
same hj but different hj+1 evaluation as an actual heavy hitter, then the indices in Lj tell us which
chunks to concatenate within Lj+1 , so we can concatenate, decode, then be done. Unfortunately
a small constant fraction of the j ∈ [m] are not good, which prevents this scheme from working
(see Figure 3). Indeed, in order to succeed in a query, for each heavy hitter we must correctly
identify a large connected component of the vertices corresponding to that heavy hitter’s path —
that would correspond to containing a large fraction of the chunks, which would allow for decoding.
Unfortunately, paths are not robust in having large connected component subgraphs remaining
even for O(1) bad levels.
The above consideration motivates our final scheme, which uses an expander-based idea first
proposed in [GLPS14] in the context of “for all” `1 /`1 sparse recovery, a problem in compressed
sensing. Although our precise motivation for the next step is slightly different than in [GLPS14],
and our query algorithm and our definition of “robustness” for a graph will be completely different,
the idea of connecting chunks using expander graphs is very similar to an ingredient in that work.
8
The idea is to replace the path in the last paragraph by a graph which is robust to a small fraction
of edge insertions and deletions, still allowing the identification of a large connected component in
such scenarios. Expander graphs will allow us to accomplish this. For us, “robust” will mean that
over the randomness in our algorithm, whp each corrupted expander is still a spectral cluster as
defined in Section 6. For [GLPS14], robustness meant that each corrupted expander still contains
an induced small-diameter subgraph (in fact an expander) on a small but constant fraction of the
vertices, which allowed them a recovery procedure based on a shallow breadth-first search. They
then feed the output of this breadth-first search into a recovery algorithm for an existing listrecoverable code (namely Parvaresh-Vardy codes). Due to suboptimality of known list-recoverable
codes, such an approach would not allow us to obtain our optimal results.
An expander-based approach: Let F be an arbitrary d-regular connected graph on the vertex
set [m] for some d = O(1). For j ∈ [m], let Γ(j) ⊂ [m] be the set of neighbors of vertex j. We
partition [n] according to Oj (i) = z(i)j = hj (i) ◦ enc(i)j ◦ hΓ(j)1 ◦ · · · ◦ hΓ(j)d where Γ(j)k is the kth
neighbor of j in F . Given some such z, we say its name is the first s = O(lg lg n) bits comprising
the hj portion of the concatenation. Now, we can imagine a graph G on the layered vertex set
V = [m] × [2s ] with m layers. If Lj is the output of a heavy hitter query on Pj , we can view each
element z of Lj as suggesting d edges to add to G, where each such z connects d vertices in various
layers of V to the vertex in layer j corresponding to the name of z. The way we actually insert
the edges is as follows. First, for each j ∈ [m] we instantiate a partition point query structure Qj
as per Lemma 14 with partition Pj , failure probability 1/ poly(lg n), and error parameter cε for a
small constant c. We modify the definition of a level j ∈ [m] being “good” earlier to say that Qj
must also succeed on queries to every z ∈ Lj . We point query every partition z ∈ Lj to obtain an
estimate ỹz approximating yz (for the exact form of approximation, see Eq. (4) from Lemma 14).
We then group all z ∈ Lj by name, and within each group we remove all z from Lj except for the
one with the largest ỹz , breaking ties arbitrarily. This filtering step guarantees that the vertices in
layer j have unique names, and furthermore, when j is good all vertices corresponding to heavy
hitters appear in Lj and none of them arePthrown out by this filtering. We then let G be the graph
created by including the at most (d/2) · j |Lj | edges suggested by the z’s across all Lj (we only
include an edge if both endpoints suggest it). Note G will have many isolated vertices since only
m · maxj |Lj | = O(lg2 n/ lg lg n) edges are added, but the number of vertices in each layer is 2s ,
which may be a large power of lg n. We let G be its restriction to the union of non-isolated vertices
and vertices whose names match the hash value of a heavy hitter at the m different levels. This
ensures G has O(lg2 n/ lg lg n) vertices and edges. We call this G the chunk graph.
Now, the intuitive picture is that G should be the vertex-disjoint union of several copies of
the expander F , one for each heavy hitter, plus other junk edges and vertices coming from other
non-heavy hitters in the Lj . Due to certain bad levels j however, some expanders might be missing
a small constant -fraction of their edges, and also the m bad levels may cause spurious edges
to connect these expanders to the rest of the graph. The key insight is as follows. Let W be the
vertices of G corresponding to some particular heavy hitter, so that in the ideal case W would be
a single connected component whose induced graph is F . What one can say, even with m bad
levels, is that every heavy hitter’s such vertices W forms an O()-spectral cluster as per Definition 1.
Roughly this means that (a) the cut separating W from the rest of G has O() conductance (i.e.
it is a very sparse cut), and (b) for any cut (A, W \A) within W , the number of edges crossing the
cut is what is guaranteed from a spectral expander, minus O() · vol(W ). Our task then reduces to
9
move
right
to
the
hi there
move
right
...
to
the
hi there
...
(a)
(b)
again
again
Figure 4: Each small oval is a spectral cluster. They are well-connected internally, with sparse
cuts to the outside. The large oval is the rest of the graph, which can look like anything. Cut (a)
represents a good low-conductance cut, which makes much progress (cutting the graph in roughly
half) while not losing any mass from any cluster. Cut (b) is also a low-conductance cut as long
as the number of small ovals is large, since then cutting one cluster in half has negligible effect on
the cut’s conductance. However, (b) is problematic since recursing on both sides loses half of one
cluster forever.
finding all -spectral clusters in a given graph. We show in Section 6 that for each such cluster W ,
we are able to find a (1 − O())-fraction of its volume with at most O() · vol(W ) erroneous volume
from outside W . This suffices for decoding for a sufficiently small constant, since this means we
find most vertices, i.e. chunks of the encoding, of the heavy hitter.
For the special case of `1 heavy hitters in the strict turnstile model, we are able to devise a
much simpler query algorithm that works; see Section D for details. For this special case we also
give in Section E a space-optimal algorithm with O(lg n) update time, whp success, and expected
query time O(ε−1 lg n) (though unfortunately the variance of the query time may be quite high).
4.1
Cluster-preserving clustering
An -spectral cluster is a subset W of the vertices in a graph G = (V, E) such that (1) |∂W | ≤
vol(W ), and (2) for any A ( W with vol(A)/ vol(W ) = r, |E(A, W \A)| ≥ (r(1 − r) − ) vol(W ).
Item (2) means the number of edges crossing a cut within W is what you would expect from a
random graph, up to vol(W ). Our goal is to, given G, find a partition of V such that every
-spectral cluster W in G matches some partition up to vol(W ) symmetric difference.
Our algorithm CutGrabClose is somewhat similar to the spectral clustering algorithm of
[KVV04, Section 4], but with local search. That algorithm is quite simple: find a low-conductance
cut (e.g. a Fiedler cut) to split G into two pieces, then recurse on both pieces. Details aside, Fiedler
√
cuts are guaranteed by Cheeger’s inequality to find a cut of conductance O( γ) as long as a cut
of conductance at most γ exists in the graph. The problem with this basic recursive approach is
shown in Figure 4 (in particular cut (b)). Note that a cluster can be completely segmented after a
few levels of recursion, so that a large portion of the cluster is never found.
Our approach is as follows. Like the above, we find a low-conductance cut then recurse on both
sides. However, before recursing on both sides we make certain “improvements” to the cut. We
10
say A ⊂ V is closed in G if there is no vertex v ∈ G\A with at least 5/9ths of its neighbors in A.
Our algorithm maintains that all recursive subcalls are to closed subsets in G as follows. Suppose
we are calling CutGrabClose on some set A. We first try to find a low-conductance cut within
A. If we do not find one, we terminate and let A be one of the sets in the partition. Otherwise,
if we cut A into (S, S̄), then we close both S, S̄ by finding vertices violating closure and simply
moving them. It can be shown that if the (S, S̄) cut had sufficiently low conductance, then these
local moves can only improve conductance further. Now both S and S̄ are closed in A (which by a
transitivity lemma we show, implies they are closed in G as well). We then show that if (1) some
set S is closed, and (2) S has much more than half the volume of some spectral cluster W (e.g. a
2/3rds fraction), then in fact S contains a (1 − O())-fraction of W . Thus after closing both S, S̄,
we have that S either: (a) has almost none of W , (b) has almost all of W , or (c) has roughly half
of W (between 1/3 and 2/3, say). To fix the latter case, we then “grab” all vertices in S̄ with
some Ω(1)-fraction, e.g. 1/6th, of their neighbors in S and simply move them all to S. Doing this
some constant number of times implies S has much more than 2/3rds of W (and if S was in case
(a), then we show it still has almost none of W ). Then by doing another round of closure moves,
one can ensure that both S, S̄ are closed, and each of them has either an O()-fraction of W or a
(1 − O())-fraction. The details are in Section 6. It is worth noting that our algorithm can make
use of any spectral cutting algorithm as a black box and not just Fiedler cuts, followed by our
grab and closure steps. For example, algorithms from [OV11, OSV12] run in nearly linear time
and either (1) report that no γ-conductance cut exists (in which case we could terminate), (2) find
√
a balanced cut of conductance O( γ) (where both sides have nearly equal volume), or (3) find an
√
O( γ)-conductance cut in which every W ⊂ G with vol(W ) ≤ (1/2) vol(G) and φ(W ) ≤ O(γ) has
more than half its volume on the smaller side of the cut. Item (2), if it always occurred, would
give a divide-and-conquer recurrence to yield nearly linear time for finding all clusters. It turns
out item (3) though is even better! If the small side of the cut has half of every cluster W , then
by grabs and closure moves we could ensure it is still small and has almost all of W , so we could
recurse just on the smaller side. It appears an O(|E| lg |V |)-space implementation of such a cutting
algorithm achieving this guarantee would lead to O(ε−2 lg2+o(1) n) query time for whp heavy hitters
(with O(ε−2 lg1+o(1) n) expected query time), but in this version of our work we simply focus on
achieving O(ε−2 poly(lg n)).
5
General turnstile updates
In this section we analyze our algorithm ExpanderSketch described in Section 4. Recall that our
final algorithm, including the reduction in Section A, is as follows. First we pick a hash function
h : [n] → [q] from a Θ(lg n)-wise independent hash family for q = d1/(ε2 lg n)e. Then we initialize
q data structures D1 , . . . , Dq , where
each Dk is an ε0 -heavy hitters data structure as described
√
in Section 4, for ε0 = max{ε, 1/ C lg n}. We also during intialization construct a d-regular λ0 spectral expander F on m = Θ(lg n/ lg lg n) vertices for some d = O(1), where λ0 = d for some
(small) constant > 0 to be specified later. Such an F can be constructed in time poly(lg n) with
d = poly(1/) deterministically [RVW02], then stored in adjacency list representation consuming
O(lg n/ lg lg n) words of memory.
The Dk are independent, and for each Dk we pick hash functions hk1 , . . . , hkm : [n] → [poly(lg n)]
independently from a pairwise independent family and instantiate partition ε0 -heavy hitter data
k (as b-trees; see Section B.2) with O k : [n] → [2O(t) ] for j ∈ [m] defined by
structures P1k , . . . , Pm
j
11
Ojk (i) = hkj (i) ◦ enc(i)j ◦ hkΓ(j)1 ◦ · · · ◦ hkΓ(j)d . Each Pjk has failure probability 1/ poly(lg n). We
also instantiate partition cε-point query data structures Qk1 , . . . , Qkm with small constant c and
failure probability 1/ poly(lg n) as per Lemma 14, with the same Ojk . Here enc is an encoding as in
Section 4 mapping into T = O(lg n) bits, and t = T /m = Θ(lg lg n). Γ(j)k is the kth neighbor of
j in F . To answer a query to our overall data structure, we query each Dk separately then output
the union of their results. To answer a query to Dk , we form a chunk graph Gk from the outputs of
the Pjk as in Section 4. We then find all 0 -spectral clusters using Theorem 1 for a sufficiently small
constant 0 , throw away all clusters of size less than m/2, then from each remaining cluster W 0 we:
(1) remove all vertices of degree ≤ d/2, (2) remove v ∈ W 0 coming from the same layer j ∈ [m]
as some other v 0 ∈ W 0 , then (3) form a (partially corrupted) codeword using the bits associated
with vertices left in W 0 . We then decode to obtain a set B k containing all heavy hitter indices
i ∈ h−1 (k) with high probability. We then output L = ∪qk=1 B k as our final result.
Henceforth we condition on the event E that every heavy hitter i ∈ [n] is ε0 -heavy in Dh(i) ,
which happens whp by Theorem 5. Our final analysis makes use of the following.
Lemma 1. Suppose E occurs. Focus on a particular k ∈ [q]. Let x0 = xh−1 (k) be the projection of
x onto vertices hashing to k. As in Section 4, we say an index j ∈ [m] is good if (a) Pjk succeeded,
(b) hkj perfectly hashes all ε0 -heavy hitters in x0 , (c) for each ε0 -heavy hitter i, the total `2 weight
√
from non-heavy hitters in h−1 (k) hashing to hj (i) is under hj is o((1/ lg n))kx[1/ε02 ] k2 , and (d) Qkj
succeeded on every z ∈ Lkj . Call j bad otherwise. Then if the failure probability of each Pjk , Qkj is
1/ lgC+1 n, the range of each hkj is [lgC+3 n], and m = C lg n/ lg lg n for some constant C > 0, then
with probability 1 − 1/nc the number of bad levels is at most βm, where c can be made an arbitrarily
large constant and β an arbitrarily small constant by increasing C.
Proof. The probability of (b), that hkj perfectly hashes all O(lg n) ε0 -heavy hitters, is 1 −
O(1/ lgC+1 n). For (c), focus on a particular heavy hitter i. The expected squared `2 mass
from non-ε0 heavy hitters colliding i under hj is (1/ lgC+3 n)kx[1/ε02 ] k22 by pairwise independence
of hj . Thus by Markov, the probability that more than (1/ lg2 n)kx[1/ε02 ] k22 squared `2 mass collided with i from light items is at most 1/ lgC+1 n. Since there are only O(lg n) ε0 -heavy hitters, by a union bound we have
√ that (c) holds, i.e. that no heavy hitter collides with more
than (1/ lg n)kx[1/ε02 ] k2 = o(1/ lg n)kx[1/ε02 ] k2 `2 mass from light items under `j , with probability 1 − O(1/ lgC n). For (d), we perform O(1/ε02 ) = O(lg n) point queries on Qkj , and each point
query has failure probability 1/ lgC+1 n, so the probability that any of the point query fails is at
most 1/ lgC n. Thus j is bad with probability O(1/ lgC n). Now also choose m = C lg n/ lg lg n.
Then the probability that there are more than βm bad levels is at most, for some constant C 0
independent of C,
0 βm
βC lg n/ lg lg n 0 βC lg n/ lg lg n
m
C
C 0e
Ce
1
1
≤
=
· βC 2 = βC 2 −o (1) ,
C
C
n
βm
β
n
n
lg n
β lg n
using ab ≤ (ea/b)b . Thus the lemma holds for β = 1/C, and c = C/2 for sufficiently large n.
Our correctness analysis also makes use of the following lemma [AC88, Lemma 2.3] to show
that, with high probability, each heavy hitter is represented by an 0 -spectral cluster. The lemma
states that for spectral expanders, sets expand with small sets S satisfying even better expansion
properties. Some version of this lemma is known in the literature as the expander mixing lemma.
12
Lemma 2. [AC88] Let A be the adjacency matrix of a d-regular graph with vertex set V . Suppose
the second largest eigenvalue of A in magnitude is λ > 0. Then for any S ⊆ V , writing |S| = r|V |,
|∂S| ≥ (d − λ)(1 − r)|S|.
Theorem 2. Assume n is larger than some constant. Let A be the algorithm from Theorem 1
which finds all 0 -spectral clusters in a graph on O(ε0−2 lg n/ lg lg n) vertices and edges whp in time
T and space S. For any 0 < ε < 1/2, there is an algorithm solving the ε-heavy hitters problem
in general turnstile streams on vectors of length n whp with space and update time O(ε−2 lg n) and
O(lg n), respectively. Answering a query uses an additional O(S) = o(ε−2 lg n) space and runs in
time O(ε−2 lg1+γ n + qT ) = O(ε−2 poly(lg n)), by q successive calls to A. Here γ > 0 can be chosen
as an arbitrarily small constant.
Proof. We first analyze space and running times. We store F , taking O(lg n/ lg lg n) space, which
can be ignored as it is dominated by other parts of the algorithm. Storing h requires O(lg n) words
of memory. Let us now focus on a specific Dk . It stores m hash functions drawn independently
from a pairwise family mapping [n] to [poly(lg n)], consuming O(m) = O(lg n/ lg lg n) space. The
m b-trees combined Pjk consume space m · O(ε0−2 t) = O(ε0−2 lg n), and the same for the Qkj . Thus
the total space per Dk is O(ε0−2 lg n), and thus the total space across the entire algorithm is
O(qε0−2 lg n) = O(ε−2 lg n). We also need an additional O(S) space to run A repeatedly during
a query. For the update time, we first hash using h, taking O(lg n) time. Then within a Dk we
perform m hash evaluations hkj , taking total time O(m). We then compute the encoding enc(i) of
i, taking O(lg n) time, then perform m b-tree updates taking total time m · O(t) = O(lg n). Thus
the total update time is O(lg n). For the query time, for a given Dk we have to query m b-trees,
taking time m · O(ε0−2 t lgγ n) = O(ε0−2 lg1+γ n). We also run A on Gk , taking time T . Thus the
total query time is O(q(ε0−2 lg1+γ n + T )) = O(ε−2 lg1+γ n + qT ).
Now it only remains to argue correctness. Each Lk has size O(1/ε02 ) with probability 1, which
is a guarantee of the b-tree. Then when we form the chunk graph Gk , it has O(ε0−2 lg n/ lg lg n)
vertices. We only insert a decoded spectral cluster into L if its size is at least m/2, so there can be
at most O(1/ε02 ) such clusters found. Thus |L| ≤ O(q/ε02 ) = O(1/ε2 ) with probability 1.
It now only remains to show that each heavy hitter i ∈ [n] is represented by some spectral
cluster of size at least m/2 in Gh(i) . We assume event E, which happens whp. Now let us focus on
a particular Gk . Define x0 = xh−1 (k) . We will show that each ε0 -heavy hitter in x0 is represented
by such a cluster in Gk . Focus on a particular ε0 -heavy hitter i. Let W be the set of m vertices
{(j, hkj (i))}m
j=1 . Suppose that all levels j ∈ [m] were good. We claim that in this case, W would be
an isolated connected component in Gk , and furthermore the induced graph on W would be F . To
see this, observe that before filtering by Qkj , z k (i)j appears in Lkj (see Section 4 for the definitions
of Lj and z(i)j ; Lkj , z k (i)j are then the natural modifications corresponding to k ∈ [q]). Once we
group the z ∈ Lkj by name and filter according to Qkj , let z 6= z k (i)j be such that its name also
equals hkj (i). Since level j is good, none of the mass of z is from a heavy hitter. Thus by condition
√
(c) in the definition of goodness, the `2 weight yz of partition z is at most o(1/ lg n)kx[1/ε02 ] k2 .
Thus by the condition of Eq. (4), since Qkj succeeds we will will have ỹz k (i)j > ỹz and not remove
z k (i)j from Lkj . Thus z k (i)j remains in Lkj even after filtering. Since this is true across all j ∈ [m],
we will add all edges of F to W . Furthermore no vertices outside W will connect to W , since edge
insertion requires mutual suggestion of the edge by both endpoints. Thus, in the case of all good
13
levels, by Lemma 2 for any subset A of W with |A| = r|W | = rm,
|E(A, W \A)| ≥ (d − λ0 )r(1 − r)|W | = (r(1 − r) − r(1 − r)
λ0
λ0
)d|W | ≥ (r(1 − r) − )dm.
d
4d
By Lemma 1, the number of bad levels is at most βm with high probability, for β an arbitrarily
small constant. Let us now understand the possible effects of a bad level on W . Suppose j is bad.
Then the Lkj obtained after filtering by Qkj may not include z k (i)j . Thus W may lose at most d
edges from F (those corresponding to edges incident upon vertex j in F ). Second, Lkj after filtering
may instead contain some z whose name is hkj (i), but whose edge suggestions differ from z k (i)j ,
possibly causing edges to be inserted within W which do not agree with F , or even inserting edges
that cross the cut (W, G\W ). At most d such edges are inserted in this way. Thus, across all bad
levels, the total number of F -edges deleted within W is at most βdm, and the total number of
edges crossing the cut (W, G\W ) is also at most βdm. Also, the volume vol(W ) is always at most
dm and at least (1 − β)dm. Thus after considering bad levels, for any subset A of W as above,
|E(A, W \A)| ≥ (r(1 − r) −
λ0
− β)dm ≥ (r(1 − r) − 0 ) vol(W ).
4d
for 0 ≥ β + λ0 /(4d). Furthermore, the number of edges leaving W to G\W is
|∂(W )| ≤ βdm ≤
β
vol(W ) ≤ 0 vol(W )
1−β
for 0 ≥ β/(1 − β). Thus W is an 0 -spectral cluster in Gk representing i for 0 = max{β +
λ0 /(4d), β/(1 − β)} = max{β + /4, β/(1 − β)}. Thus by Theorem 1, A recovers a W 0 missing at
most 30 vol(W ) volume from W , and containing at most 22500000 volume from G\W . Note we
remove any vertex from W 0 of degree ≤ d/2, so W 0 contains at most 55000000 m vertices from
outside W . Furthermore, since there are at most βdm edges lost from W due to bad levels, at
most 2βm vertices in W had their degrees reduced to ≤ d/2, and thus removing low-degree vertices
removed at most 2βm additional vertices from W . Also, since the max degree in Gk is d and at
most a 2β fraction of vertices in W have ≤ d/2 degree, since W 0 is missing at most 30 vol(W )
vertices from W , this corresponds to at most 2βm + 60 m vertices missing from W . We then form
a (corrupted) codeword C 0 ∈ {0, 1}mt by concatenating encoding chunks specified by the vertices
in W 0 . Since then at most a (55000060 + 2β)-fraction of entries in enc(i) and C 0 differ, for , β
sufficiently small constants we successfully decode and obtain the binary encoding of i, which is
included in L.
Remark 1. It is possible to slightly modify our algorithm so that the ε−2 lg1+γ n summand in
the query time becomes ε−2 lg1+o(1) n. We state the modification here without providing the full
details. Specifically, rather than implement the Pjk as b-trees, one could instead implement them
as recursive versions of the ExpanderSketch on a smaller universe. Then, after a single level of
recursion down, one switches back to using b-trees. Then the b-trees at the second level of recursion
have query time which includes an arbitrarily small power of lg lg n, which is lgo(1) n. One may be
tempted to avoid b-trees altogether and simply continue the recursion to the leaves, but due to the
blowup in bitlength of the partition sizes stemming from concatenating hj values, it seems such an
∗
approach would result in the space complexity being multiplied by an additional 2O(lg n) factor.
14
6
Cluster-preserving clustering
In this section we present our cluster-preserving clustering, partitioning the graph into clusters with
the promise to preserve and identify all -spectral clusters as per Definition 1.
The main goal of this section is to prove Theorem 1. To prove Theorem 1, we shall use cuts
based on Cheeger’s inequality. Given an undirected graph G = (V, E), let its Laplacian matrix be
LG (normalized so that (LG )i,i = 1 for all i). It is known that that LG is positive semidefinite
with eigenvalues 0 = λ1 ≤ λ2 ≤ . . . ≤ λ|V | with λk = 0 iff G has at least k connected components.
A fundamental result in spectral graph theory is the following, which is a robust form of this fact
when k = 2.
Theorem 3 (Cheeger’s inequality for graphs [AM85, Alo86, SJ89]). For G = (V, E) an undirected
graph, let λ2 be the second smallest eigenvalue of LG . Then a cut (S, S) satisfying
p
p
λ2
≤ φ(G) ≤ φ(G, S) ≤ 2λ2 ≤ 2 φ(G)
2
(1)
can be found in time poly(|V |) and space O(|V | + |E|).
Algorithm 1 Top level of cluster preserving clustering of G0 as stated in Theorem 1.
1: function Main(G0 )
2:
{U1 . . . , U` } ← CutGrabClose(G0 )
3:
For each Ui , recursively remove v ∈ Ui with ≥ 5/9ths neigbors outside Ui .
. Cleaning
4:
return {U1 . . . , U` }
5: end function
Algorithm 2 Cluster preserving clustering of G = G0 |V , approximately isolating clusters W of
G0 .
1: function CutGrabClose(G = G0 |V )
2:
Use Theorem 3 to find a cut (S, S) satisfying Eq. (1); say |S| ≤ |S|.
3:
if φ(G, S) ≥ 1/500 then return {V }
. We’ve identified a potential cluster.
4:
else
5:
LocalImprovements(G, S, V )
. Local improvements of both S, S.
6:
Grab(G, S)
7:
LocalImprovements(G, S, S)
. Local improvements of S.
8:
Grab(G, S)
9:
LocalImprovements(G, S, S)
. Local improvements of S.
10:
LocalImprovements(G, S, S)
. Local improvements of S.
11:
C ←CutGrabClose(G|S) ∪ CutGrabClose(G|S)
12:
return C
13:
end if
14: end function
We are now ready to describe our algorithm, presented in pseudo-code in Algorithms 2–4.
At the top level, from Main, the function CutGrabClose is fed as input the graph G = (V, E)
from Theorem 1. We denote this top level graph G0 = (V0 , E0 ). CutGrabClose is a recursive
15
Algorithm 3 Local improvements across cut (S, S) only moving vertices from T .
function LocalImprovements(G, S, T )
. (S, S) is a cut in G = (V, E)
while ∃v ∈ T with at least 5/9ths of its edges crossing the cut do . Local improvement.
3:
Move v to the other side of the cut.
4:
end while
5: end function
1:
2:
Algorithm 4 Expanding S by grabbing all vertices with 1/6th neighbors in S.
1: function Grab(G, S)
2:
Let T be set of vertices from G \ V with at least 1/6th of its neighbors in S.
3:
S ← S ∪ T.
4: end function
algorithm, working on induced subgraphs G = G0 |V of G0 , producing a family of disjoint subsets
of the vertices. Suppose G0 has an -spectral cluster W . Our goal is to show that one set in the
final partition produced by CutGrabClose matches W in a slightly weaker sense than Theorem 1
(namely volUi (Ui \ W ) = O( vol(W )) instead of the second matching condition). At the end of the
section, we describe how the last cleaning step in Main removes extraneous mass from candidate
clusters and achieves the stronger conditions in Theorem 1.
On input G = (V, E), CutGrabClose works as follows: if there is no low-conductance cut,
it returns just the single-element partition {V }. Otherwise, it finds a low-conductance cut (S, S).
It then performs a sequence of recursive local improvements and two grabs to maintain certain
invariants in our analysis. Namely, we want to maintain the invariant that throughout all levels of
recursion, most of W stays in the same recursive branch. Here, by most of W , we mean relative to
the volume of W in the original G0 . This will ensure that the final output C of the topmost level
of recursion contains a single set S matching W .
We now proceed with a formal description. Since we will be talking both about the original
graph G0 and the recursive induced subgraphs G = G0 |V , we will sometimes use a subscript to
indicate which graph we are working in, e.g., if A ⊆ V , then volG (A) and volG0 (A) are the volumes
of A in G and G0 respectively. Since the subgraphs are all induced, the edge sets are always
determined from the vertices included.
Closure We say set A of vertices from G is closed in G if there is no vertex v ∈ G\A with at least
5/9 of its neighbors in A. The closure property is transitive, which is very useful for our recursion:
Lemma 3. If A ⊆ V ⊆ V (G0 ), A is closed in G0 |V , and V is closed in G0 , then A is closed in
G0 .
Proof. Suppose for a contradiction that we have a vertex v ∈ G0 \A with at least 5/9ths of its
neighbors in A. Then v also has 5/9ths of its neighbors in V , but V is closed in G0 , so v should be
in V . However, in G0 |V , the vertex v can only have lost neighbors from outside A, so in G0 |V , v
also has at least 5/9ths of its neighbors in A. This contradicts that A is closed in G0 |V .
We say that a vertex set A ⊆ V0 dominates the -spectral cluster W if volG0 (W ∩ V ) >
(1 − 3 ) volG0 (W ). We will show that if A is closed and has more than 2/3 of the volume of W ,
then it dominates W :
16
Lemma 4. If A is closed in G0 and volG0 (W ∩ A) ≥
2
3
volG0 (W ), then A dominates W .
Proof. By assumption r = volG0 (W \ A)/ volG0 (W ) ≤ 1/3. By the spectral expansion of W , we
have
E(W \ A, W ∩ A) ≥ (r(1 − r) − ) vol(W ) ≥ (1 − r − /r) vol(W \ A).
G0
G0
The average degree from W \ A to A is thus at least (1 − r − /r), which is bigger than 5/9 if
3 ≤ r ≤ 1/3 and ≤ 1/27 (we have < 1/2000000). This would contradict that A is closed, so we
conclude that r < 3, and hence that volG0 (W ∩ A)/ volG0 (W ) = 1 − r > 1 − 3.
We shall frequently use the fact that if V dominates W , then within V ∩ W , there is not much
difference between volume in G and G0 . More precisely,
Lemma 5. Consider an arbitrary set S ⊂ V . If V dominates W then volG0 (W ∩ V ) ≤ volG (W ∩
S) + 4 volG0 (W ).
Proof. The edges from W ∩ S in G0 that are not in G, are either edges leaving W , of which,
by isolation of W , there are at most volG0 (W ), or edges to W \ V , of which there at at most
volG0 (W \ V ) = volG0 (W ) − volG0 (V ∩ W ) ≤ 3 volG0 (W ).
We now continue describing our algorithm to isolate W (plus any other -spectral cluster). As
our invariant, we are given some induced subgraph G = (V, E) of G0 such that
(1) V is closed in G0 .
(2) V dominates W .
To maintain this invariant, we want to show that CutGrabClose finds a cut (S, S) where both
sides are closed and one side dominates W . We also want to make sure that both sides are nonempty. By definition, this follows if the conductance is below 1, and we will, in fact, always keep
the conductance below 1/9.
The first step of CutGrabClose is to use Theorem 3 to find a cut (S, S) of G satisfying
Eq. (1); say |S| ≤ |S| (line 2 of Algorithm 2). If φ(G, S) ≥ 1/500, we will just return {V }. The
following lemma states that V does not have too much volume in G outside W .
Lemma 6. If φ(G, S) ≥ 1/500, then volG (V \ W ) ≤ 1000000 volG0 (W ).
Proof. By isolation of the -cluster W in G0 , we have |∂G0 (W )| ≤ volG0 (W ). However, ∂G (V \
W ) = ∂G (V ∩ W ) ⊆ ∂G0 (W ), so |∂G (V \ W )| ≤ volG0 (W ).
Suppose volG (V \ W ) > 1000000 volG0 (W ). We want to conclude that φ(G, V \ W ) <
1/1000000. To do that, we also need to argue that volG (V ∩ W ) > 1000000 volG0 (W ). Since
V dominates W , we have volG0 (V ∩ W ) > (1 − 3 ) volG0 (W ) and by Lemma 5, we have
vol(V ∩ W ) ≥ vol(V ∩ W ) − 4 vol(W ) ≤ (1 − 7 ) vol(W ) > 1000000 vol(W ).
G
G0
G0
G0
G0
The last equality follows because ≤ 1/2000000. We have now proved that volG (V \ W ) >
1000000 volG0 (W ) implies that φ(G) ≤ φ(G,
p V \ W ) < 1/1000000. By Eq. (1) this contradicts
that we did not find a cut of size less than 2 φ(G) < 1/500.
The last cleaning in Main will reduce the volume of V \ W in G0 as required for Theorem 1.
We shall return to that later. Below we assume that we found a low conductance cut (S, S) of G
with φ(G, S) ≤ 1/500. We are going to move vertices between S and S, and will always maintain
a conductance below 1/9.
17
Local improvements towards closure We are now going to move vertices between S and S
to make sure that W is mostly contained in one side. As a first step, we will make sure that both
sides are closed (line 5 of Algorithm 2). This is done iteratively. If one vertex has at least 5/9ths
fraction of its neighbors on the other side of the cut, we move it to the other side, calling it a local
improvement (c.f. Algorithm 3). When no more local improvements are possible, both sides S and
S must be closed in G. We call these moves improving because they always improve both cut size
and conductance, as described more formally below.
Lemma 7. Consider a local improvement moving a vertex v. It reduces the cut size by at least
dG (v)/9. It also improves the conductance if it was below 1/9 before the move.
Proof. When we move v, we replace at least 95 dG (v) cut edges by at most 49 dG (v) cut edges,
reducing the cut size by at least dG (v)/9. The volume moved is dG (v), so if φ(G, S) < 1/9 and the
0
new cut is (S 0 , S ), we get
φ(G, S 0 ) =
|∂G (S 0 )|
min{volG
(S 0 ), vol
G (S
0
)}
≤
|∂G (S)| − dG (v)/9
< φ(G, S).
min{volG (S), volG (S)} − dG (v)
When both sides are closed under local improvements, we have a situation where either W is
almost completely dominated by one side, or it roughly balanced between the two sides. More
precisely,
Lemma 8. When both S and S are closed in G (and hence in G0 ), then either volG0 (S ∩ W ) <
3 volG0 (W ), or (1/3 − 3 ) volG0 (W ) < volG0 (S ∩ W ) < (2/3) volG0 (W ), or volG0 (S ∩ W ) >
(1 − 3 ) volG0 (W ).
Proof. This follows almost directly from Lemma 4. We just note that since volG0 (S ∩ W ) +
volG0 (S ∩ W ) = volG0 (V ∩ W ) ≥ (1 − 3 ) volG0 (W ), if volG0 (S) ≤ (1/3 − 3 ) volG0 (W ), then
volG0 (S ∩ W ) ≥ 2/3 volG0 (W ), and then, by Lemma 4, we have volG0 (S ∩ W ) > (1 − 3 ) volG0 (W ),
and hence volG0 (S ∩ W ) < 3 volG0 (W ).
Grabbing for dominance Having made sure that both sides are closed, as described in Lemma 8,
we now have W either almost completely dominated by one side, or roughly balanced between both
sides. We will now introduce a grab operation (c.f. Algorithm 4) that in the balanced case will
help S get dominance. The grab operation itself is simple. In one round, it moves every vertex
to S that before the grab has more than 1/6th of its neighbors in S. An important point here is
that contrary to the local improvements, the grabbing is not recursive. We are actually going to do
this grabbing twice, interspersed with local improvements (c.f., Algorithm 2): First we grab from
S, then we do local improvements of S, only moving vertices to S, thus only closing S. We do this
grabbing followed by local improvements from S twice, calling it the big expansion of S (Algorithm
2 lines 6–9). Finally we do local improvements of S. We will prove that when all this is completed,
then one of the two sides dominate W , but first we have to argue that the conductance stays low.
Lemma 9. With the above grabs and local improvements, the conductance always stays below 1/9.
Proof. Our starting point is a Cheeger cut (S, S) with conductance φ(G, S) ≤ 1/500. From
Lemma 7 will never increase the conductance if it is below 1/9. Thus, it is only the grabs that can
18
increase the conductance. Let S 0 be the result of the grab from S. We know that all the vertices
grabbed from S have at least 1/6th of their neighbors in S. This means that |∂G (S 0 )| ≤ 5|∂G (S)|
and volG (S 0 ) ≤ volG (S) + 6∂G (S). It follows that
φ(G, S 0 ) ≤
5|∂G (S)|
|∂G (S 0 )|
≤
0
0
min{volG (S), volG (S)} − 6|∂G (S)|
min{volG (S ), volG (S )}
5
5|∂G (S)|
=
≤
φ(G, S).
(1 − 6φ(G, S))
(1 − 6φ(G, S)) min{volG (S), volG (S)}
Before the first grab, we have conductance below 1/500, which the grab now increases to at most
6/((1 − 6/500)500) < 1/80. The second grab can then increase the conductance to at most 6/((1 −
6/80)80) < 1/12, so, in fact, the conductance will always stay below 1/12.
Below we first argue that if we started with balance, then after the big expansion of S, we have
volG0 (S ∩ W ) ≥ (1 − 3 ) volG0 (W ).
Lemma 10. If S is closed and volG0 (W \ S) ≤ (2/3) volG0 (W ), then S dominates W after the big
expansion from S.
Proof. Let r = volG0 (W \ S)/ volG0 (W ) ≤ 2/3. If we can show that the big expansion of
S brings r ≤ 1/3 − 3 , then we are done by Lemma 4 since S is closed and volG0 (S ∩ W ) ≥
(1 − r − 3 ) volG0 (W \ S).
We study the effect of a single grab from a closed set S. By spectral expansion, we have
|E(W \ S, S ∩ W )| ≥ (r(1 − r) − ) volG0 (W ).
Let T be the set of vertices from W moved by the grab, that is, T is the set of vertices from
W \ S with at least 1/6th of their neigbors in S. Also, let B be the set of vertices from W \ S that
are not moved, that is, B = W \ (S ∪ T ). Then
|E(S ∩ W, B)| ≤ |E(S, B)| < vol(B)/6 ≤ vol(W \ S)/6 = r vol(W )/6.
G
G0
G0
The number of edges from S ∩ W to vertices from W \ S that will be grabbed is therefore at least
|E(S∩W, T )| = |E(S∩W, W \S)|−E(S∩W, B) ≥ (r(1−r)− −r/6) vol(W ) = (5r/6−r2 − ) vol(W ).
G0
G0
The function f (r) = 5r/6 − r2 is convex, having its minimum over any interval in its end points.
We are only concerned with r ∈ [(1/3 − 3 ), 2/3], where the smallest value is f (2/3) = 1/9. The
number of edges to grabbed vertices is thus |E(S ∩ W, T )| ≥ (1/9 − ) volG0 (W ).
We also know that before a grab, the set S is closed. Therefore, every vertex v outside S has
less than 59 dG (v) edges going to S, and no more going to S ∩ W . We conclude that
9
9
vol(T ) ≥ vol(T ) ≥ |E(S ∩ W, T )| ≥ (1/9 − ) vol(W ) ≥ (1/5 − 2 ) vol(W ).
G0
G
G0
G0
5
5
Each grab thus decreases r = volG0 (W \S)/ volG0 (W ) by (1/5−2 ). Starting from r ≤ 2/3, with two
grabs followed by local improvements of S, we thus end up with r ≤ 2/3 − 2(1/5 − 2 ) ≤ 4/15 + 4 .
This is less than the desired 1/3 − 3 if < 1/105, which is indeed the case.
Next, we will show that S dominated W before the big expansion of S, then S will also dominate
W at the end.
19
Lemma 11. Suppose that S and S are closed and that S dominate W . Then S will also dominate
W after a big expansion from S followed by local improvements of S.
Proof. We want to show that after the big expansion of S, we still have volG0 (W ∩S) ≥ 23 volG0 (W ).
This can only increase when we subsequently do local improvements of S, closing S, and then the
result follows from Lemma 4.
Stepping back to S before the big expansion, we are trying to bound how much volume from
volG (W \ S) that can be moved to S. Both for local improvements and for grabbing, the chance of
moving v to S increases the more neighbors v has in S. Thus, we maximize the potential of moving
vertices from W to S if we assume that we start with all of V \ W in S. The only cut edges are
now those between S and W \ S.
When a local improvement moves a vertex v to S, we replace at least 95 dG (v) cut edges with at
most 49 dG (v) cut edges while increasing volG (W ∩ S) by dG (v). It follows that if local improvements
increase volG (S) by x, then they decrease |∂G (S)| by at least x/9.
When we grab a set T of vertices to S, we know that each vertex v ∈ T had at least 16 dG (v) of
its edges to S. When the grab is done, setting S 0 = S ∪ T , we have at most 56 dG (v) edges from v to
W \ S 0 . We conclude that |∂G (S 0 )| ≤ 5|∂G (S)| and that volG (S 0 ) ≤ volG (S) + 6|∂G (S)|. Subsequent
local improvements can further increase the volume by at most 9|∂G (S 0 )| ≤ 45|∂G (S)|. Thus, when
we from S do one grab followed by local improvements, we increase the volume volG (S) by at most
51|∂G (S)|.
We now note that if we did local improvements of S before the grab, then we would only get
a smaller bound. More precisely, if the the local improvements moved volume x to volG (S), then
|∂G (S)| would be reduced by x/9 before the grab, and then the total volume increase would be at
most x + 51(|∂G (S)| − x/9) ≤ 51|∂G (S)|.
We now study the big expansion from S, starting with a grab followed by any number of local
improvements followed by another grab followed any number of local improvements. From the above
analysis, it follows that the total increase in volG (S) is at most 6|∂G (S)|+51·5|∂G (S)| ≤ 261|∂G (S)|.
This bounds the total volume moved from volG (W \ S) to volG (S).
We started with volG (W ∩ S) ≤ 3 volG0 (W ). Also, originally, before the big expansion, the set
S was closed, so vertices from S had less than a fraction 5/9 of their neighbors in S. This fraction
could only be reduced when we artificially added all of V \W to S. After this artificial change, which
only improved movement of vertices from W \ S to S, we had |∂S| ≤ 59 volG (W ∩ S) + |∂G (W )| ≤
(5/3 + 1) volG0 (W ). Thus, after the big expansion, we end up with
vol(W ∩ S) ≤ (3 + 261(5/3 + 1) vol(W ) < 699 vol(W ).
G
G0
G0
Finally, by Lemma 5, we have volG0 (W ∩ S) ≤ volG (W ∩ S) + 4 volG0 (W ) ≤ 703 volG0 (W ),
which with ≤ 1/1000000, is much less than the required (1/3 − 3 ) volG0 (W ).
Finally we need
Lemma 12. Suppose that S is closed and dominates W . Then both of these properties are preserved
if we do local improvements of S.
Proof. It sufficies to consider a local improvement moving a single vertex v to S.
First we show that S being closed is preserved when we do a local improvement from S moving
a vertex v to S. Suppose for contradiction that we afterwards had some vertex u ∈ S with 5/9ths
20
of its neighbors in S. Then we cannot have u = v; for we moved v because it had 5/9ths of its
neighbors in S. However, any other u 6= v can only have fewer neighbors in S after the move.
Since S starts dominating, we start with volG0 (W \ S) ≤ 3 volG0 (W ). The dominance can
only be affected if v ∈ W , and we only move v to S because it has at least 5/9ths of its neighbors
in S. Trivially v can have at most volG0 (W ∩ S) + |∂G0 (W )| ≤ 4 volG0 (W ) neighbors in S, so
we conclude that dG (v) ≤ 95 · 4 volG0 (W ) < 8 volG0 (W ), and by Lemma 5, we have dG0 (v) ≤
dG (v) + 4 volG0 (W ) < 12 volG0 (W ). Thus we end up with volG0 (W \ S) < 15 volG0 (W ). This
is much less that (1/3 − 3 ) volG0 (W ). Since S remains closed, we conclude from Lemma 4 that S
still dominates W , hence that volG0 (W \ S) ≤ 3 volG0 (W ).
Let us now sum up what we have proved. Suppose we found an initial cut (S, S) of conductance
below 1/500. This is when we start modifying the cut, and we need to show that our invariants
are preserved for the recursive calls.
By Lemma 12, the local improvements of S followed by the final local improvements of S imply
that both sets end up closed, so invariant (1) is satisfied. The hard part was ensure that one side
dominates W . We had Lemma 9 showing that we keep the conductance below 1/9. First we did
local improvements of both sides. By Lemma 8, we end up either with one side dominating W , or
with W roughly balanced between the sides. If W is balanced or dominated by S, then after by
big expansion from S, by Lemma 10, S dominates W . By Lemma 12, this dominance is preserved
when we do the final local improvements of S. If instead S dominated W , then, by Lemma 11 this
is dominance is preserved. Thus we always end up with one side dominating W , so invariant (2) is
satisfied. We conclude that W is always dominated by one branch of the recursion.
The recursion finishes when no small cut is found. We have V dominating S, and by Lemma 6,
we have volG (V \ W ) ≤ 1000000 volG0 (W ). Thus we have proved
Theorem 4. For any given ≤ 1/2000000 and graph G0 , in polynomial time, CutGrabClose
(Algorithm 2) finds a partitioning {U1 , . . . U` } of the vertex set so that every -spectral cluster W
of G0 matches some set Ui in the sense that
• vol(W \ Ui ) ≤ 3 vol(W ).
• volG0 |Ui (Ui \ W ) ≤ 1000000 vol(W )
The only detail missing in proving Theorem 1 is that we want a bound on volG0 (Ui \ W ) rather
than volG0 |Ui (Ui \ W ). This is where the last cleaning of Main (Algorithm 1) comes in. It removes
all vertices from Ui with more than 5/9ths of their neighbors outside Ui , so now, for all v ∈ Ui , we
have dG0 (v) ≤ 94 dG0 |Ui (v).
Lemma 13. The cleaning of Ui preserves that Ui dominates W , and now volG0 (Ui \ W ) ≤
9
4 volG0 |Ui (Ui \ W ) ≤ 225000000 vol(W ).
Proof. Recall that Ui before the cleaning is closed and dominates W . The cleaning has exactly
the same effect as if we did local improvements of V (G0 ) \ Ui , so by Lemma 12, we preserve both
that Ui is closed, and that it dominates W .
Theorem 4 and Lemma 13 immediately imply the statement of Theorem 1.
Acknowledgments
We thank Noga Alon for pointing us to [AC88, Lemma 2.3], Jonathan Kelner for the reference
[OSV12], Lorenzo Orecchia and Sushant Sachdeva for answering several questions about [OV11,
21
OSV12], Piotr Indyk for the reference [GLPS14], Graham Cormode for the reference [Pag13], Yi
Li for answering several questions about [GLPS14], Mary Wootters for making us aware of the
formulation of the list-recovery problem in coding theory and its appearance in prior work in
compressed sensing and group testing, Atri Rudra for useful discussions on list-recovery algorithms
for Parvaresh-Vardy and Folded Reed-Solomon codes, and Fan Chung Graham and Olivia Simpson
for useful conversations about graph partitioning algorithms.
References
[AC88]
Noga Alon and Fan R. K. Chung. Explicit construction of linear sized tolerant networks.
Discrete Mathematics, 72:15–19, 1988.
[AKO11]
Alexandr Andoni, Robert Krauthgamer, and Krzysztof Onak. Streaming algorithms via
precision sampling. In 52nd Annual Symposium on Foundations of Computer Science
(FOCS), pages 363–372, 2011.
[Alo86]
Noga Alon. Eigenvalues and expanders. Combinatorica, 6:83–96, 1986.
[AM85]
Noga Alon and Vitali Milman. Isoperimetric inequalities for graphs, and superconcentrators. Journal of Combinatorial Theory, Series B, 38(1):73–88, 1985.
[AMFM11] Pablo Arbelaez, Michael Maire, Charless Fowlkes, and Jitendra Malik. Contour detection and hierarchical image segmentation. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 33(5):898–916, 2011.
[AP09]
Reid Andersen and Yuval Peres. Finding sparse cuts locally using evolving sets. In
Proceedings of the 41st annual ACM Symposium on Theory of Computing (STOC),
pages 235–244, 2009.
[ARV09]
Sanjeev Arora, Satish Rao, and Umesh Vazirani. Expander flows, geometric embeddings and graph partitioning. Journal of the ACM (JACM), 56(2):5, 2009.
[ASS08]
Noga Alon, Oded Schwartz, and Asaf Shapira. An elementary construction of constantdegree expanders. Combinatorics, Probability and Computing, 17(3):319–327, May
2008.
[BC15]
Vladimir Braverman and Stephen R. Chestnut. Universal sketches for the frequency
negative moments and other decreasing streaming sums. In RANDOM, pages 591–605,
2015.
[BCI+ 16]
Vladimir Braverman, Stephen R Chestnut, Nikita Ivkin, Jelani Nelson, David P
Woodruff, and Zhengyu Wang. BPTree: an `2 heavy hitters algorithm using constant
memory. abs/1603.00759, 2016.
[BCIW16] Vladimir Braverman, Stephen R. Chestnut, Nikita Ivkin, and David P. Woodruff. Beating CountSketch for heavy hitters in insertion streams. In Proceedings of the 48th
Annual ACM Symposium on Theory of Computing (STOC), to appear, 2016.
22
[BDW16]
Arnab Bhattacharyya, Palash Dey, and David P. Woodruff. An optimal algorithm
for `1 -heavy hitters in insertion streams and related problems. In Proceedings of the
35th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
(PODS), 2016.
[BICS10]
Radu Berinde, Piotr Indyk, Graham Cormode, and Martin J. Strauss. Space-optimal
heavy hitters with strong error bounds. ACM Trans. Database Syst., 35(4):26, 2010.
[BKSV14]
Vladimir Braverman, Jonathan Katzman, Charles Seidell, and Gregory Vorsanger. An
optimal algorithm for large frequency moments using O(n1−2/k ) bits. In RANDOM,
pages 531–544, 2014.
[BO10]
Vladimir Braverman and Rafail Ostrovsky. Zero-one frequency laws. In Proceedings of
the 42nd ACM Symposium on Theory of Computing (STOC), pages 281–290, 2010.
[BO13]
Vladimir Braverman and Rafail Ostrovsky. Approximating large frequency moments
with pick-and-drop sampling. In APPROX, pages 42–57, 2013.
[BYJKS04] Ziv Bar-Yossef, T. S. Jayram, Ravi Kumar, and D. Sivakumar. An information statistics approach to data stream and communication complexity. J. Comput. Syst. Sci.,
68(4):702–732, 2004.
[CCFC04]
Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in
data streams. Theor. Comput. Sci., 312(1):3–15, 2004.
[CCM10]
Amit Chakrabarti, Graham Cormode, and Andrew McGregor. A near-optimal algorithm for estimating the entropy of a stream. ACM Transactions on Algorithms, 6(3),
2010.
[CH08]
Graham Cormode and Marios Hadjieleftheriou. Finding frequent items in data streams.
PVLDB, 1(2):1530–1541, 2008.
[Che09]
Mahdi Cheraghchi. Noise-resilient group testing: Limitations and constructions. In
17th International Symposium on Fundamentals of Computation Theory (FCT), pages
62–73, 2009.
[CJK+ 04]
Graham Cormode, Theodore Johnson, Flip Korn, S. Muthukrishnan, Oliver
Spatscheck, and Divesh Srivastava. Holistic UDAFs at streaming speeds. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages
35–46, 2004.
[CM05]
Graham Cormode and S. Muthukrishnan. An improved data stream summary: the
count-min sketch and its applications. J. Algorithms, 55(1):58–75, 2005.
[CW79]
Larry Carter and Mark N. Wegman. Universal classes of hash functions. J. Comput.
Syst. Sci., 18(2):143–154, 1979.
[DKN10]
Ilias Diakonikolas, Daniel M. Kane, and Jelani Nelson. Bounded independence fools
degree-2 threshold functions. In Proceedings of the 51th Annual IEEE Symposium on
Foundations of Computer Science (FOCS), pages 11–20, 2010.
23
[DLM02]
Erik D. Demaine, Alejandro López-Ortiz, and J. Ian Munro. Frequency estimation of
internet packet streams with limited space. In Proceedings of the 10th Annual European
Symposium on Algorithms (ESA), pages 348–360, 2002.
[FSG+ 98]
Min Fang, Narayanan Shivakumar, Hector Garcia-Molina, Rajeev Motwani, and Jeffrey D. Ullman. Computing iceberg queries efficiently. In Proceedings of 24rd International Conference on Very Large Data Bases (VLDB), pages 299–310, 1998.
[Gan15]
Sumit Ganguly. Taylor polynomial estimator for estimating frequency moments. In
42nd International Colloquium on Automata, Languages, and Programming (ICALP),
pages 542–553, 2015.
[GB09]
Sumit Ganguly and Lakshminath Bhuvanagiri. Hierarchical sampling from sketches:
Estimating functions over data streams. Algorithmica, 53(4):549–582, 2009.
[GLPS14]
Anna C. Gilbert, Yi Li, Ely Porat, and Martin J. Strauss. For-all sparse recovery in
near-optimal time. In 41st International Colloquium on Automata, Languages, and
Programming (ICALP), pages 538–550, 2014.
[GNP+ 13] Anna C. Gilbert, Hung Q. Ngo, Ely Porat, Atri Rudra, and Martin J. Strauss. `2 /`2 foreach sparse recovery with low risk. In Proceedings of the 40th International Colloquium on Automata, Languages, and Programming (ICALP), pages 461–472, 2013.
[GR09]
Parikshit Gopalan and Jaikumar Radhakrishnan. Finding duplicates in a data stream.
In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 402–411, 2009.
[GT12]
Shayan Oveis Gharan and Luca Trevisan. Approximating the expansion profile and
almost optimal local graph clustering. In Foundations of Computer Science (FOCS),
2012 IEEE 53rd Annual Symposium on, pages 187–196. IEEE, 2012.
[GT14]
Shayan Oveis Gharan and Luca Trevisan. Partitioning into expanders. In Proceedings
of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages
1256–1266, 2014.
[HNO08]
Nicholas J. A. Harvey, Jelani Nelson, and Krzysztof Onak. Sketching and streaming
entropy via approximation theory. In 49th Annual IEEE Symposium on Foundations
of Computer Science (FOCS), pages 489–498, 2008.
[HW15]
Brett Hemenway and Mary Wootters. Linear-time list recovery of high-rate expander
codes. In 42nd International Colloquium on Automata, Languages, and Programming
(ICALP), pages 701–712, 2015.
[INR10]
Piotr Indyk, Hung Q. Ngo, and Atri Rudra. Efficiently decodable non-adaptive group
testing. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete
Algorithms (SODA), pages 1126–1142, 2010.
[IW05]
Piotr Indyk and David P. Woodruff. Optimal approximations of the frequency moments
of data streams. In Proceedings of the 37th Annual ACM Symposium on Theory of
Computing (STOC), pages 202–208, 2005.
24
[JST11]
Hossein Jowhari, Mert Saglam, and Gábor Tardos. Tight bounds for Lp samplers,
finding duplicates in streams, and related problems. In Proceedings of the 30th ACM
SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS),
pages 49–58, 2011.
[JW09]
T. S. Jayram and David P. Woodruff. The data stream space complexity of cascaded
norms. In 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS),
pages 765–774, 2009.
[KNPW11] Daniel M. Kane, Jelani Nelson, Ely Porat, and David P. Woodruff. Fast moment estimation in data streams in optimal space. In Proceedings of the 43rd ACM Symposium
on Theory of Computing (STOC), pages 745–754, 2011.
[KNW10]
Daniel M. Kane, Jelani Nelson, and David P. Woodruff. On the exact space complexity
of sketching and streaming small norms. In Proceedings of the Twenty-First Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1161–1178, 2010.
[KVV04]
Ravi Kannan, Santosh Vempala, and Adrian Vetta. On clusterings: Good, bad and
spectral. J. ACM, 51(3):497–515, 2004.
[LCG13]
Yang Liu, Wenji Chen, and Yong Guan. Identifying high-cardinality hosts from
network-wide traffic measurements. In IEEE Conference on Communications and Network Security, (CNS), pages 287–295, 2013.
[LNN15]
Kasper Green Larsen, Jelani Nelson, and Huy L. Nguy˜ên. Time lower bounds for nonadaptive turnstile streaming algorithms. In Proceedings of the Forty-Seventh Annual
ACM on Symposium on Theory of Computing (STOC), pages 803–812, 2015.
[LR88]
Tom Leighton and Satish Rao. An approximate max-flow min-cut theorem for uniform multicommodity flow problems with applications to approximation algorithms.
In Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 422–431, 1988.
[MG82]
Jayadev Misra and David Gries. Finding repeated elements. Sci. Comput. Program.,
2(2):143–152, 1982.
[MMV12]
Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Approximation algorithms for semi-random partitioning problems. In Proceedings of the 44th
Annual ACM Symposium on Theory of Computing Conference (STOC), pages 367–384,
2012.
[MMV14]
Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Constant
factor approximation for balanced cut in the PIE model. In Proceedings of the 46th
Annual ACM Symposium on Theory of Computing (STOC), pages 41–49, 2014.
[Mut05]
S. Muthukrishnan. Data streams: Algorithms and applications. Foundations and
Trends in Theoretical Computer Science, 1(2), 2005.
[MW10]
Morteza Monemizadeh and David P. Woodruff. 1-pass relative-error Lp -sampling with
applications. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on
Discrete Algorithms (SODA), pages 1143–1160, 2010.
25
[NNW14]
Jelani Nelson, Huy L. Nguy˜ên, and David P. Woodruff. On deterministic sketching
and streaming for sparse recovery and norm estimation. Lin. Alg. Appl., 441:152–167,
January 2014. Preliminary version in RANDOM 2012.
[NPR12]
Hung Q. Ngo, Ely Porat, and Atri Rudra. Efficiently decodable compressed sensing by
list-recoverable codes and recursion. In 29th International Symposium on Theoretical
Aspects of Computer Science (STACS), pages 230–241, 2012.
[NW10]
Jelani Nelson and David P. Woodruff. Fast manhattan sketches in data streams. In
Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on
Principles of Database Systems (PODS), pages 99–110, 2010.
[OSV12]
Lorenzo Orecchia, Sushant Sachdeva, and Nisheeth K. Vishnoi. Approximating the
exponential, the lanczos method and an Õ(m)-time spectral algorithm for balanced
separator. In Proceedings of the 44th Symposium on Theory of Computing Conference,
(STOC), pages 1141–1160, 2012.
[OV11]
Lorenzo Orecchia and Nisheeth K. Vishnoi. Towards an SDP-based approach to spectral methods: A nearly-linear-time algorithm for graph partitioning and decomposition. In Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete
Algorithms (SODA), pages 532–545, 2011.
[Pag13]
Rasmus Pagh. Compressed matrix multiplication. TOCT, 5(3):9, 2013.
[PDGQ05] Rob Pike, Sean Dorward, Robert Griesemer, and Sean Quinlan. Interpreting the data:
Parallel analysis with Sawzall. Scientific Programming, 13(4):277–298, 2005.
[PSZ15]
Richard Peng, He Sun, and Luca Zanetti. Partitioning well-clustered graphs: Spectral
clustering works! In Proceedings of The 28th Conference on Learning Theory (COLT),
pages 1423–1455, 2015.
[RS10]
Prasad Raghavendra and David Steurer. Graph expansion and the unique games conjecture. In Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC),
pages 755–764, 2010.
[RVW02]
Omer Reingold, Salil Vadhan, and Avi Wigderson. Entropy waves, the zig-zag graph
product, and new constant-degree expanders. Annals of Mathematics, 155(1):157–187,
2002.
[SJ89]
Alistair J. Sinclair and Mark R. Jerrum. Approximative counting, uniform generation
and rapidly mixing Markov chains. Information and Computation, 82(1):93–133, 1989.
[SM00]
Jianbo Shi and Jitendra Malik. Normalized cuts and image segmentation. IEEE
Transactions on Pattern Analysis and Machine Intelligence, 22(8):888–905, 2000.
[Spi96]
Daniel A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE
Trans. Information Theory, 42(6):1723–1731, 1996.
[ST04]
Daniel A Spielman and Shang-Hua Teng. Nearly-linear time algorithms for graph
partitioning, graph sparsification, and solving linear systems. In Proceedings of the
36th Annual ACM Symposium on Theory of Computing (STOC), pages 81–90, 2004.
26
Appendix
A
Heavy hitters reduction from small to large
The main theorem of this section is the following.
Theorem 5. Let 0 < , δ < 1/2 be such that 1/2 > lg(1/δ). Then there is a reduction from
turnstile
`2 heavy hitters with parameter and failure probability δ to z = d1/(2 lg(1/δ))e separate
√
(1/ t)-heavy hitters problems for t = C lg(1/δ) for some constant C > 0, and where each such
0
problem must
√ be solved with failure probability at most δ = δ/(3z). Specifically, given an algorithm
for the (1/ t)-heavy hitters problem with these parameters using space S, update time tu and query
time tq , the resulting algorithm for -heavy hitters from this reduction uses space O(z · S + lg(1/δ)),
and has update time tu + O(lg(1/δ)) and query time O(z · tq ).
Proof. We pick a hash function h : [n] → [z] at random from a Θ(lg(1/δ))-wise independent family
as in [CW79]. Such h requires O(lg(1/δ))
√ space to store and can be evaluated in O(lg(1/δ)) time.
We also instantiate z independent (1/ t)-heavy hitter data structures P1 , . . . , Pz each with failure
probability δ 0 . Upon receiving an update (i, v) in the stream, we feed the update (i, v) to Ph(i) . To
answer a query, we first query each Pj to obtain a list Lj , then we output L = ∪zj=1 Lj .
This concludes the description of the data structures stored, and the implementations of update
and query. The space bound and running times thus follow.
We now argue correctness. Let H be the set of -heavy hitters of x, so that |H| ≤ 2/2 . It
follows by the Chernoff bound and union bound over all j ∈ [z] that, for some constant C > 0,
P(∃j ∈ [z], |H ∩ h−1 (j)| > C lg(1/δ)) < δ/3.
h
(2)
We next invoke Bernstein’s inequality, which says there exists constant
c > 0 such that for indeP
pendent X1 , . . . , Xr each bounded by K in magnitude with σ 2 = i E(Xi − E Xi )2 ,
X
X
2
2
∀λ > 0, P(|
Xi − E
Xi | > λ) . e−cλ /σ + e−cλ/K .
i
i
We will consider the collection of random variables Xi indexed by i ∈ [n]\H defined as follows (so
r = n − |H|). Fix j ∈ [z]. Define Xi = 1h(i)=j · x2i . It then follows that K < 2 · kx[1/2 ] k22 and
σ2 =
X
x4i (1/z − 1/z 2 ) ≤
i∈H
/
X
2
2
· kx[1/2 ] k22 ·
x2i =
· kx[1/2 ] k42
z
z
i∈H
/
It then follows by Bernstein’s inequality and a union bound over all j ∈ [z] that
X
x2i > C2 lg(1/δ)kx[1/2 ] k22 ) < δ/3.
P(∃j ∈ [z],
h
(3)
i∈H
/
h(i)=j
Now, the hash function h divides the input stream into z separate substreams, with x(j) denoting the vector updated by the substream containing i with h(i) = j (i.e. (x(j))i = 1h(i)=j · xi ).
Conditioned on the events of (2), (3) occurring, we have that any i ∈ H satisfies x2i ≥ 2 kx[1/2 ] k22 ≥
1/(C lg(1/δ)) · kx(h(i))[C lg(1/δ)] k22 . Thus if we also condition on every Pj succeeding, which happens
with probability at least 1 − zδ 0 = 1 − δ/3 by a union bound, then our output L is correct. Thus
our overall failure probability is at most δ.
27
B
Partition heavy hitters and the b-tree
We first define a generalization of the heavy hitters problem that we call partition heavy hitters.
The standard heavy hitters problem is simply the special case when P = {{1}, . . . , {n}}, and the
oracle O is the identity map.
Definition 2. In the `2 partition heavy hitters problem there is some error parameter ∈ (0, 1/2).
There is also some partition P = {S1 , . . . , SN } of [n], and it is presented in the form of an oracle
O : [n] → [N ] such that for any i ∈ [n], O(i) gives the index j ∈ [N ] such that i ∈ Sj . Define a
vector y ∈ RN such that for each j ∈ [N ],
sX
yj =
x2i .
i∈Sj
The goal then is to solve the `2 -heavy hitters problem on y subject to streaming updates to x. That
is, x is being updated in a stream, and we should at the end output a list L ⊂ [N ], |L| = O(1/2 ),
such that L contains all the -heavy hitters of y.
A related problem is the `2 partition point query problem, in which queries takes as input some
j ∈ [N ] and must output a value ỹj such that α1 yj − ky[1/2 ] k2 ≤ ỹj ≤ α2 yj + ky[1/2 ] k2 for some
approximation parameters α1 , α2 , . We call such a solution an (α1 , α2 , )-partition point query
algorithm.
We now describe the b-tree, introduced in [CH08] (and also called the Hierarchical CountSketch there and in other parts of the literature) and analyze its performance for solving the
partition heavy hitters problem. The b-tree was only suggested in [CH08] for the strict turnstile
model, and a detailed analysis was not given. Here we give a fully detailed analysis showing that,
in fact, that structure gives good guarantees even in the general turnstile model, and even for the
partition heavy hitters problem. Before delving into the b-tree, we will analyze the performance of
the PartitionCountSketch, a very slight modification of the CountSketch, for the partition
point query problem.
B.1
PartitionCountSketch
In the idealized PartitionCountSketch one chooses independent hash functions h1 , . . . , hL :
[N ] → [k] and σ1 , . . . , σL : [N ] → {−1, 1} from pairwise independent families, and β1 , . . . , βL :
[n] → R independently from a Cα -wise independent family for some small constant α > 0. The
marginal distribution of βt (i) for P
any i ∈ [n] and t ∈ [L] is the standard gaussian N (0, 1), and Cα
n
is chosen so that for any z ∈ R , i zi βt (i) has Kolmogorov distance at most α from N (0, 1) (see
Theorem 6). One also initializes counters Ca,b to 0 for all (a, b) ∈ [L] × [k], each consuming one
machine word. The space is then clearly O(kL) machine words.
The update algorithm for xi ← xi +∆ performs the change Ct,ht (O(i)) ← Ct,ht (O(i)) +∆·σt (O(i))·
βt (i) for each t ∈ [L]. To answer an `2 point query to index i ∈ [N ], one outputs ỹi being the median
value of |Ct,ht (i) | across t. In the actual, non-idealized version of PartitionCountSketch, the
marginal distribution of each βt (i) is a discretized gaussian with precision fitting in a single machine
word; see [KNW10, Section A.6] for details. We henceforth just discuss the idealized version. In
fact, for the types of instances of partition heavy hitters that our heavy hitters algorithm needs
to solve, the βt can be replaced with pairwise independent hash functions mapping to {−1, 1} (see
28
Remark 2), which would make an implementation less complicated. We instead have chosen to
analyze the version with gaussians since doing so then does not require us to limit the types of
partition heavy hitter instances we can handle, thus providing a more general guarantee that may
prove useful as a subroutine in future works.
Before analyzing PartitionCountSketch, we state a useful theorem from [KNW10].
Theorem 6. [KNW10] Let z ∈ Rn and 0 < α < 1 be arbitrary. There exists a constant Cα
depending on α such that if β1 , . . . , βn are Cα -wise independent standard gaussians and g is standard
gaussian, then
X
∀A < B ∈ R, | P(
βi zi ∈ [A, B]) − P(g ∈ [A, B])| < α.
i
In fact Cα can be taken as some value in O(1/α2 ) by combining the FT-mollification construction in [DKN10] with Lemma 2.2 and the argument in the proof of Theorem 2.1 in [KNW10].
Using the FT-mollification construction in [KNW10] would imply the weaker statement that Cα =
Ω(lg6 (1/α)/α2 ) suffices. In our current setting either is acceptable since α is some fixed constant.
The following lemma shows the correctness of PartitionCountSketch, following an argument similar to that of [CCFC04, Lemma 3].
Lemma 14. For L & lg(1/δ) and k & 1/2 ,
∀j ∈ [N ], P(ỹj ∈
/ [(1/20)yj − ky[1/2 ] k2 , 3yj + ky[1/2 ] k2 ]) < δ.
(4)
That is, the PartitionCountSketch with these parameters is an (α1 , α2 , )-partition point query
structure with failure probability δ, for α1 = 1/20, α2 = 3.
P
Proof. For t ∈ [L], define wt ∈ RN with (wt )j = i∈Sj βt (i)xi . Then by Theorem 6, P((wt )j ∈
p
[−α1 , α2 ]) ≤ P(yj g ∈ [−α1 , α1 ]) + α1 for g a standard gaussian. Since P(|g| ≤ ) ≤ 2/π for any
> 0,
p
P(|(wt )j | > α1 yj ) ≥ 1 − α1 (1 + 2/π) > 8/9.
(5)
Also by pairwise independence of βt , E(wt )2j = yj2 , so
P(|(wt )j | > α2 yj ) < 1/α22 = 1/9.
(6)
Next, let H ⊂ [N ] be the set of indices of top 1/(42 ) entries of y in magnitude. Note
E |
ht ,βt
X
1
βt (i)xi | ≤ √ · ky[1/2 ] k2
k
(j)
ht (O(i))=ht
O(i)∈H∪{j}
/
by pairwise independence of βt , ht . Thus
X
P (|
ht ,βt
βt (i)xi | > ky[1/2 ] k2 ) < 1/9
(7)
ht (O(i))=ht (j)
O(i)∈H∪{j}
/
by Markov’s inequality. Also Eht |h−1
t (ht (j)) ∩ (H\{j})| ≤ |H|/k < 1/9, so
P(∃j 0 ∈ (H\{j}) : ht (j 0 ) = ht (j)) < 1/9
29
(8)
by Markov’s inequality. Thus by a union bound, the conditions of (5), (6), (7), and (8) all happen
simultaneously with probability at least 5/9. Now note when all these events occur,
|Ct,ht (j) | ∈ [α1 yj − ky[1/2 ] k2 , α2 yj + ky[1/2 ] k2 ]
(9)
Thus by a chernoff bound, the probability that the median over t ∈ [L] of |Ct,ht (j) | does not satisfy
(9) is exp(−Ω(l)) < δ.
Remark 2. It is possible to obtain the main result of this paper, i.e. our bounds for (non-partition)
heavy hitters, without ever making use of Theorem 6. This might be useful for pedagogical reasons,
since the proof of Theorem 6 is somewhat complicated. We sketch how to do so here. We chose
to present the approach above since it divides our final algorithm into a more abstracted set of
subproblems, which we felt made it easier to describe. Furthermore, the “partition heavy hitters”
problem as formulated above seems quite clean and may find uses as a subroutine elsewhere.
The main idea to avoid Theorem 6 is as follows. First, in our application of partition heavy
hitters to solve the vanilla heavy hitters problem (see the proof of Theorem 2), we are only interested
in the case where each partition Sj in P contains at most one -heavy hitter i ∈ [n] with respect to
x. Furthermore, the other items in the same partition will, with good probability over the choice
of the hash function hj used in the ExpanderSketch, have much smaller total `2 mass than |xi |.
These observations can be used to show that, for applying partition heavy hitters to heavy hitters
as in Theorem 2, the βt above can be replaced with pairwise independent hash functions mapping
to {−1, 1}. This ensures that the “noise”, i.e. the non-heavy indices in the same partition as i,
with say 8/9 probability do not subtract much away from |xi | so that |(wt )j | will be Ω(|xi |). Note
that in the general partition heavy hitters problem the range of the βt cannot just be {−1, 1}. The
reason is that we want (5), (6), (7), and (8) to hold simultaneously with some probability strictly
larger than 1/2, to allow invoking Chernoff. However, (5) alone can fail with probability at least
1/2 even when using fully independent βt : [n] → {−1, 1}. For example, consider when a partition
j ∈ [N ] contains exactly two elements with equal weight. Then with probability 1/2 their signs are
opposite, in which case (wt )j equals zero. Note this is not an issue when Sj contains a single heavy
hitter that is much heavier than the total `2 mass in the rest of the partition.
The second issue is that PartitionCountSketch is again used in the b-tree (see Section B.2
below), which we use in our final heavy hitters algorithm. Unfortunately there, we do not have
the guarantee that each partition contains one item much heavier than the combined mass of the
rest. One way around this is to simply not use the b-tree at all, but to just use the PartitionCountSketch itself. Doing so, though, would make our final query time blow up to O(−2 lgC n)
for a large constant C. This can be fixed, and one can achieve our same current query time, by
instead implementing the data structures Pj in Section 5 as themselves recursive instantiations of
the ExpanderSketch data structure! Then after a constant number of levels of recursion (even
one level down), one then implements the Pj using the PartitionCountSketch (see Remark 1).
All in all, [KNW10] is thus avoided. We do not delve further into the details since the bounds do
not improve, and we feel that a fully detailed exposition is not worth the effort.
We also record a lemma here which will be useful later.
Lemma 15. Consider an instance of partition heavy hitters with partition P = {S1 , . . . , SN } and
oracle O. Suppose A ⊂ [N ], and D is an (α1 , α2 , 0 )-partition point query structure for some
0 < α1 ≤ 1 ≤ α2 which succeeds on point querying every j ∈ A, where 0 = (α1 /3). Then if L ⊆ A
30
is defined to be the 2/002 indices of A with the largest point query results from D for 00 = 0 /α2 ,
then L contains all partition -heavy hitters contained in A.
Proof. Let ỹj be the result of a point query of j ∈ A using D. If j ∈ A is a partition -heavy
hitter then
ỹj ≥ α1 ky[1/2 ] k2 − (α1 /3)ky[1/02 ] k2 ≥ (2/3)α1 ky[1/2 ] k2 .
by Eq. (4). Meanwhile, if some j 0 is not even an 00 -partition heavy hitter, then
ỹj 0 < α2 00 ky[1/02 ] k2 + 0 ky[1/02 ] k2 ≤ (2/3)α1 ky[1/02 ] k2 .
Thus every set which is not even a partition 00 -heavy hitter has a point query value strictly less
than every partition -heavy hitter in A. Since there are at most 2/002 sets which are partition
00 -heavy hitters, correctness follows, since L by definition contains the 2/002 sets with largest point
query values.
B.2
b-tree
Here we describe the b-tree for partition heavy hitters, which is a slight modification of the Hierarchical CountSketch from [CH08] for non-partition strict turnstile heavy hitters. We assume
2 ≤ b ≤ N is an integer power of 2.
For what follows, we assume vector entries in both x ∈ Rn and y ∈ RN are 0-based indexed, e.g.
x = (x0 , . . . , xn−1 )T and y = (y0 , . . . , yN −1 )T . Conceptually we create virtual streams J0 , . . . , Jlgb N .
For the stream Jr we solve an instance of partition point query with br sets in the partition defined
as follows. At the level r = lgb N , the partition is Plgb N = P = {S0 , . . . , SN −1 }, with oracle
Olgb N = O. For 0 ≤ r < lgb N , the partitions are defined inductively: we imagine a complete b-ary
tree on {0, . . . , N − 1} where the jth leaf node denotes Sj , and for r < lgb N each internal node
represents a set equal to the union of the sets at its children. Said succinctly, for r < lgb N , the
oracle evaluation Or (i) equals O(i)/blgb N −r . Note that since b = 2` is a power of 2, Or can be
implemented in constant time by bitshifting right `(lgb N − r) positions (lgb N is a fixed value that
can be computed once and stored during initialization).
When an update (i, v) is seen in the actual stream, it is fed into a PartitionCountSketch
Pr at level r for each 0 ≤ r ≤ lgb N , with partition Pr and oracle Or . Each Pr is chosen to
be a (1/20, 3, /60)-partition point query structure, i.e. the error parameter is 0 = /60. Set
Q = 2b(lgb N )/002 , which is an upper bound on the total number of point queries we make to all
Pr combined. We set the failure probability for each Pr to be η = δ/Q = Θ(2 δ/(b lgb N )).
To answer a heavy hitters query, we walk down the tree as follows (our goal is to have, at all
times 0 ≤ r ≤ lgb N , a list Lr of size O(1/2 ) which contains all the -heavy hitter partitions at
level r). First we set L0 = {0}. Then for r = 1 to lgb N , we point query every child of an element
of Lr−1 . We then set Lr to be the nodes at level r whose point query result were amongst the 2/002
highest for 00 = 0 /3 = /180. We finally return L = Llgb N as our set of partition heavy hitters.
Theorem 7. Suppose 1/N c ≤ < 1/2 and δ ∈ (0, 1/2). Then the b-tree as described above produces
a correct output L for partition -heavy hitters with probability at least 1 − δ for any 2 ≤ b ≤ N .
Furthermore, for any constant c0 ≥ 1 and any constant 0 < γ < γ0 where γ0 depends on c, c0 ,
0
for any failure probability 1/N c ≤ δ < 1/2, there is a choice of b so that the b-tree uses space
O(−2 lg N ), has update time O(lg N ), and query time O((−2 lg N )((lg N )/(δ))γ ). The constants
in the big-Oh depend on 1/γ.
31
Proof. We have |L| ≤ 2/002 = O(1/2 ) by definition of the algorithm. Note that we make at most
Q point queries since each Lr has size at most 2/002 , and each element of Lr has at most b children.
Also, there are lgb N values of r for which we query children (since the leaves have no children).
Thus the total number of queries is at most 2b(lgb N )/002 = Q. Now we show that, conditioned
on the event that all Q point queries succeed, correctness holds by induction on r. This would
complete the correctness analysis, since the probability that any point query fails at all is at most
Qη = δ, by a union bound. For the induction, our inductive hypothesis is that Lr contains every
-partition heavy hitter at level r. This is true for r = 0 since L0 = {0}, and the root of the
tree contains only a single partition. Now, assume Lr−1 satisfies the inductive hypothesis. Since
any ancestor of a partition -heavy hitter is itself an -partition heavy hitter, it follows that every
partition heavy hitter at level r is the child of some set in Lr−1 . Thus if we let A be the collection
of children of sets in Lr−1 , Lemma 15 implies that Lr also contains all the partition -heavy hitters
As for space and time bounds, we choose b to be ((lg N )/(δ))γ , rounded up to the nearest
integer power of 2. This is at most N for γ sufficiently small since , δ > 1/ poly(N ), and at least 2
for N larger than some constant depending on γ (which we can assume without loss of generality, by
padding the partition with empty sets). By Lemma 14 and choice of b, the space is asymptotically
1 lg N
1 lg N
·
lg(1/η) ' 2 ·
· (lg(1/δ) + lg b + lg lg N + lg(1/)) ' −2 lg N.
2 lg b
lg b
The update time is asymptotically
lg N
lg N
lg(1/η) '
· (lg(1/δ) + lg b + lg lg N + lg(1/)) ' lg N.
lg b
lg b
The query time is asymptotically
b lg N
lg N γ
b lg N
·
lg(1/η) ' 2 ·
· (lg(1/δ) + lg b + lg lg N + lg(1/)) ' −2 lg N · (
) .
2
lg b
lg b
δ
Corollary 1. For any constant 0 < γ < 1/2, (non-partition) heavy hitters with error parameter
∈ (0, 1/2) and failure probability 1/ poly(n) < δ < 1/2 can be solved with space O(−2 lg n), update
time O(lg n), query time O(−2 lg n((lg n)/(δ))γ ), and failure probability δ.
√
Proof. We can assume > 1/ n without loss of generality, since otherwise the trivial solution of
keeping x in memory explicitly suffices. Otherwise, the claim follows from Theorem 7 by considering
the partition P = {{1}, . . . , {n}} with N = n and O(i) = i.
C
Connection between heavy hitters and list-recoverable codes
Our approach is somewhat related to list-recoverable codes, which were first used in group testing
in [Che09, INR10] and in compressed sensing in [NPR12] (and also in subsequent compressing
works, e.g. [GNP+ 13, GLPS14]). We say a code C ⊂ [q]m is (, `, L)-list recoverable if for any
sequence of lists L1 , . . . , Lm ⊂ [q] with |Lj | ≤ ` for all j ∈ [m], there are at most L codewords in
C whose jth symbol appears in at least a (1 − )-fraction of the lists Lj . A decoding algorithm is
then given these m lists and must find these at most L codewords. To see the connection to our
32
current heavy hitters problem, it is known (via the probabilistic method) that such codes exist with
|C| ≥ n, q = poly(lg n), m = O(lg n/ lg lg n), and `, L = O(lg n), where can be made an arbitrarily
small constant (see for example the first row of [HW15, Figure 1]). Suppose we had such a code C
with encoding function enc : [n] → C. Then our heavy hitters algorithm could follow the scheme
of Figure 2. That is, we would instantiate m b-trees P1 , . . . , Pm for partition heavy hitters with
Oj (i) = enc(i)j . By picking constants appropriately in the parameter settings, one can ensure that
whp at most an -fraction of the Pj fail. Thus, whp every heavy hitter appears in a (1 − )-fraction
of the lists Lj , and we would then perform list-recovery decoding to find all the heavy hitters. The
trouble with this approach is that there currently are no explicit codes achieving these parameter
settings, let alone with linear time encoding and fast decoding. Indeed, this is the source of slight
suboptimality in the `1 /`1 “for all” compressed sensing scheme of [GLPS14].
The key to our progress is to sidestep the lack of explicit optimal list-recoverable codes with
linear-time encoding and fast decoding by realizing that list-recoverability is stronger than what
we actually need. First of all, list-recovery says that for all choices of lists L1 , . . . , Lm , some
condition holds. In our case the lists are random (symbols in it contain concatenations with random
hash evaluations hj ), since our heavy hitters algorithm is allowed to be a randomized algorithm.
Secondly, our decoding algorithm does not need to handle arbitrary lists, but rather lists in which
each symbol has a distinct name (recall from Section 4 that the “name” of z(i)j is hj (i)). This is
because, in our problem, with good probability any list Lj has the property that for each heavy
hitter i with z(i)j ∈ Lj , z(i)j will be reported by a partition point query data structure to have
much heavier weight than any other z ∈ Lj with the same name. Thus our post-processing step
using Qj allows us to only have to perform decoding from lists with a certain structure which does
not exist in the general list-recovery problem, namely that no two symbols in Lj agree on the first
few (namely O(lg lg n)) bits.
D
A simpler query algorithm for strict turnstile `1 heavy hitters
In this section, we describe our simpler algorithm for strict turnstile `1 heavy hitters. The high-level
idea is the following: Recall the general turnstile algorithm from Section 5. There we end up having
to find -spectral clusters. This subproblem arose because several data structures Pjk may err and
thereby insert spurious edges into the graph G. Now in the strict turnstile case, we can roughly
ensure that we can recognize when a Pjk errs. By simply deleting all edges returned by such a Pjk ,
the remaining graph G has each heavy hitter corresponding to a number of connected components
that are completely disjoint from the subgraphs corresponding to other heavy hitters and noise
from light elements. Furthermore, for each heavy hitter, one of these connected components has at
least 90% of the corresponding codeword enc(i). We can thus replace the cluster finding algorithm
by a simple connected components algorithm and thereby obtain a much simpler algorithm. This
section gives all the details of the above.
Our solution needs the more standard definition of heavy hitters: On a query, we must return
a set L containing all indices i where xi ≥ kxk1 and no indices j such that xj < (/2)kxk1 .
The first thing our solution in the strict turnstile case needs, is the fact that one can maintain
kxk1 exactly in O(1) space and with O(1) update time. This follows trivially by maintaining a
counter C that is initialized as 0, and upon every update (i, ∆), we update C ← C + ∆. Since we
are in the strict turnstile model, we will always have C = kxk1 .
The second thing is a variant of partition point queries that have been adapted to the `1 strict
33
turnstile case.
Definition 3. In the `1 strict turnstile partition point query problem there is some error parameter
∈ (0, 1/2). There is also some partition P = {S1 , . . . , SN } of [n], and it is presented in the form
of an oracle O : [n] → [N ] such that for any i ∈ [n], O(i) gives the index j ∈ [N ] such that i ∈ Sj .
Define a vector y ∈ RN such that for each j ∈ [N ],
X
yj =
xi .
i∈Sj
On a query for index j ∈ [N ], we must output a value ỹj such that yj ≤ ỹj ≤ yj + ky[1/] k1 .
Lemma 16. For any failure probability 1/ poly(n) < δ < 1/2, there is a solution to the strict
turnstile partition point query problem with space O(−1 lg(1/δ)) words, update time O(lg(1/δ)) and
query time O(lg(1/δ)). Furthermore, the solution guarantees that even when it errs, the returned
estimate ỹj is at least yj .
Proof. Simply implement the CountMin sketch of [CM05] on the vector y. Thus on an update
(i, ∆), feed the update (O(i), ∆) to the CountMin sketch and on a query for yj , return the estimate
for j in the CountMin sketch.
Using Lemma 16, we can also modify the b-tree from Section B.2 to obtain a no false negatives
guarantee. More specifically, define a new version of heavy hitters called threshold heavy hitters
with no false negatives. We say that an algorithm solves threshold `1 heavy hitters with no false
negatives and failure probability δ, if it supports taking a query value φ > 0. If the query value φ
is less than kx[1/] k1 , then the algorithm may return an arbitrary answer. If φ ≥ kx[1/] k1 , then
with probability at least 1 − δ, it must return a set L that has size O(φ−1 kxk1 ) and contains all
indices i with xi ≥ φ and no indices j with xj ≤ φ − (/2)kx[1/] k1 . With the remaining probability
at most δ, it returns the empty set.
Such algorithms can thus recognize when they err (indicated by an empty return set) on queries
for sufficiently large φ. The following lemma essentially follows from the b-tree solution in Theorem 7
combined with Lemma 16:
Lemma 17. Suppose 1/nc ≤ δ < 1/2 where c > 0. Let γ be any constant satisfying 0 < γ < γ0
for some fixed constant γ0 . Then there is a modification of the b-tree described in Section B.2
and a choice of b, which in the strict turnstile `1 setting solves threshold heavy hitters with no
false negatives and failure probability at most δ. Furthermore, the b-tree uses space O(−1 lg n),
has update time O(lg n), and query time O((−1 lg n)((lg n)/(δ))γ ). The constants in the big-Oh
depend on 1/γ.
Proof. Take the b-tree solution as described in Section B.2. Replace each PartitionCountSketch for Pr with the algorithm from Lemma 16 with approximation factor 0 = /2. This means
that at each level of the b-tree, we can do a point query for the total mass of a subtree. By
Lemma 16 these estimates are never underestimates, even when the algorithm errs. And when the
algorithm does not err, the returned estimate is at most 0 ky[1/] k1 ≤ 0 kx[1/] k1 = (/2)kx[1/] k1
too high. We set the failure probability for each data structure from Lemma 16 to O(δ/(b lgb n)).
On a query for all indices i with xi ≥ φ, we traverse the tree roughly as described in Section B.2.
The main difference is that when choosing the set Lr after having point queried every child of nodes
34
in Lr−1 , we choose Lr to be all nodes where the point query returned an estimate of at least φ. In
case |Lr | > 3−1 at any level, we abort and return L = ∅.
Now observe that if no query to the children of nodes in Lr−1 err, then for φ ≥ kx[1/] k1 , there
can be no more than 3−1 nodes for which the estimate is at least φ. This follows since if the
point queries did not err, then the true mass of those subtrees must be at least φ − (/2)kx[1/] k1 ≥
(/2)kx[1/] k1 . There can be at most 3−1 such subtrees. Thus conditioned on not making an error
in any point query on the first r − 1 levels of the b-tree, we will visit at most 3−1 nodes on level
r. It follows that we only abort and return an empty list in case some query errs. And if no query
errs, we will ask only O(−1 b lgb n) queries. Since we set the failure probability in each algorithm
from Lemma 16 to O(δ/(b lgb n)), the lemma follows.
We only need one more ingredient in our solution, namely a property of edge-expander graphs.
We have not been able to find a reference for this result, but suspect it is known.
Lemma 18. If G = (V, E) is a d-regular δ-edge-expander, then for any constant 0 < µ < 1, if we
remove any set of at most (δµ/2)|V | vertices in G and their incident edges, then there remains a
connected component of size at least (1 − µ)|V |.
Proof. Let S ⊆ V be any set of at most (δµ/2)|V | vertices in G. The number of edges with
an endpoint in S is at most d|S| since G is d-regular. Let C1 , . . . , Cm ⊆ V be the connected
components in GV \S , where GV \S is the graph obtained from G by removing the vertices S and
all edges incident to S. Assume for contradiction that |Ci | < (1 − µ)|V | for all Ci . For each Ci , let
Ci∗ denote the smaller of Ci and V \ Ci . It follows from |Ci | being less than (1 − µ)|V | that
µ
|V |
∗
· |Ci | < |Ci | ≤ min
, |Ci | .
1−µ
2
Since G is a δ-edge-expander and |Ci∗ | ≤ |V |/2, there are at least
µ
∗
δd|Ci | ≥ δ min 1,
· d|Ci | ≥ δ min{1, µ}d|Ci | = δµd|Ci |
1−µ
edges across the cut (Ci∗ , V \Ci∗ ) in G. This cut is just (Ci , V \Ci ). But Ci is a connected component
in GV \S and thus all edges leaving P
Ci in G must go to a node in S. Therefore, the number of edges
incident to a node in S is at least i δµd|Ci | = δµd(|V | − |S|). But |S| ≤ (δµ/2)|V | and hence
|V | − |S| ≥ (1 − δµ/2)|V | ≥
1 − δµ/2
· |S|.
δµ/2
We thus have at least
1 − δµ/2
· d|S| = 2(1 − δµ/2)d|S| > d|S|
δµ/2
edges incident to S. But this contradicts that there are only d|S| edges incident to S.
δµ
The following result due to Alon et al. [ASS08] shows that there exists efficient explicit edgeexpanders:
Theorem 8 (Alon et al. [ASS08]). There exists a constant δ > 0, such that for any positive integer
n, there exists a 12-regular δ-edge-expander G = (V, E) with n/2 ≤ |V | ≤ n. Furthermore, G is
constructable in time O(poly(n)).
We have set the stage for the description of our simpler `1 strict turnstile solution. Our new
algorithm is described in the following:
35
Strict Turnstile Algorithm. If = o(1/ lg n), we re-execute the reduction in Section A, modified to the `1 setting. More specifically, we hash to z = Θ(1/( lg(1/n))) subproblems. Each
subproblem is solved with a threshold heavy hitters structure with = O(1/ lg n) and failure probability 1/ poly(n). Thus on a query to report all heavy hitters, we use the fact that we know kxk1
exactly in order to query each threshold heavy hitters structure with φ = kxk1 . By an analysis
similar to Section A, with probability at least 1 − 1/ poly(n), this will ensure φ ≥ ky[1/] k1 where y
denotes the vector corresponding to any of these subproblem. If is Ω(1/ lg n), we can also reduce
to threshold heavy hitters with the same and failure probability 1/ poly(n) simply by maintaining
one structure and querying it with φ = kxk1 . Thus we have now reduced the problem to solving
threshold heavy hitters with = Ω(1/ lg n) in the `1 strict turnstile case, where we are guaranteed
that the query value φ is at least kx[1/] k1 .
We now focus on solving threshold heavy hitters with = Ω(1/ lg n) and failure probability
1/ poly(n) for a query value φ ≥ kx[1/] k1 . Following Section 5, we construct the 12-regular δedge-expander from Theorem 8 with m = Θ(lg n/ lg lg n) vertices. Call it F . This takes poly lg n
time. We store it in adjacency list representation, consuming O(lg n/ lg lg n) words of memory.
We then pick hash functions h1 , . . . , hm : [n] → [poly(lg n)] independently from a pairwise independent family and instantiate data structures D1 , . . . , Dm . Each Di is the threshold heavy hitters
with no false negatives from Lemma 17. The failure probability of each structure is 1/ poly(lg n)
and the approximation factor is .
On an update (i, ∆), we compute in O(lg n) time an encoding enc(i) of i into a string of length
T = O(lg n) bits by an error-correcting code with constant rate that can correct an Ω(1)-fraction
of errors (as in Section 5). We again partition enc(i) into m contiguous bitstrings each of length
t = T /m = Θ(lg lg n). We let enc(i)j denote the jth bitstring. For each j = 1, . . . , m, we feed the
update (hj (i) ◦ enc(i)j ◦ hΓ(j)1 ◦ · · · ◦ hΓ(j)12 , ∆) to Dj (similarly to Section 5).
On a query with threshold φ > 0, we query each Dj with φ. Let Lj be the output of Dj . If Lj is
non-empty, we go through all returned values and check if there are two with the same name (same
hj (i)). If so, we overwrite Lj ← ∅ and say that Dj failed. Now in all remaining Lj , all names are
unique. From these lists, we construct the same layered graph G as described in Section 4. Recall
that we only add edges if both endpoints suggest it. Now the crucial observation which makes the
`1 strict turnstile easier to solve, is that the Dj ’s guarantee no false negatives. Thus if some Dj did
not err and did not fail, then no node in G corresponding to a name hj (i) returned by Dj , can be
connected by an edge to a node hj 0 (i0 ) returned by a Dj 0 for any i0 6= i. To see this, notice that the
actual index hj 0 (i) ◦ enc(i)j 0 ◦ hΓ(j 0 )1 ◦ · · · ◦ hΓ(j 0 )12 corresponding to hj 0 (i) must not be in Lj 0 for
this to happen. But we are guaranteed no false negatives, so if Dj 0 returns anything, it must have
hj 0 (i) ◦ enc(i)j 0 ◦ hΓ(j 0 )1 ◦ · · · ◦ hΓ(j 0 )12 in its output. To summarize, for every index i with xi > φ, all
Dj that did not err and did not fail produce nodes corresponding to names hj (i), and these nodes
are not connected to nodes of name hj 0 (i0 ) for an i0 6= i. Furthermore, for two Dj and Dj 0 that both
did not err and fail, the edges between the returned nodes are in the graph G. But the hash function
hj have collisions with probability 1/ poly(lg n) and the data structures Dj have failure probability
1/ poly(lg n). Thus with probability 1 − 1/ poly(n), there are at most a γ-fraction of the Dj that
either fail or err. Here we can choose γ as an arbitrarily small constant by increasing the polylogs
in 1/ poly(lg n) failure probability. By Lemma 18, we get that with probability 1 − 1/ poly(n), each
index i with xi ≥ φ has a connected component in G of size at least 0.9m. We now finish off by
computing all connected components in G. For each component of size at least 0.9m, we stitch
together the pieces enc(i)j to obtain 90% of the codeword enc(i). We decode i in linear time in
36
its bit length, which is O(lg n) time. Finally, we verify all these returned indices by doing a point
query against a separate CountMin structure with failure probability 1/ poly(n) and the same .
This also costs O(lg n) time per index.
Since we are guaranteed that each returned list Lj has size at most φ−1 kxk1 , the query time
is O(φ−1 kxk1 lg n) for decoding codewords and for verifying the recovered indices (the norm of the
vector represented by each Dj is precisely the same as the norm of x). Now φ is kxk1 , so the
time spent is O(−1 lg n). For querying the structures Dj , Lemma 17 gives us a query time of
O((−1 lg lg n)((lg lg n poly(lg n))/))γ ) per Dj . Since = Ω(1/ lg n), we can choose γ sufficiently
0
small to obtain a query time of −1 lgγ n for any constant γ 0 > 0. Since we have m = O(lg n/ lg lg n),
the total time for querying all Dj is O(−1 lg1+γ n) for any constant γ > 0.
For the update time, observe that each Dj has update time O(lg lg n) and there are O(lg n/ lg lg n)
such structures to be updated, for a total of O(lg n) time. Computing enc(i) also takes O(lg n)
time. The space is optimal O(−1 lg n) words.
Theorem 9. For any constant 0 < γ < 1/2, heavy hitters with error parameter ∈ (0, 1/2) and
failure probability 1/ poly(n) < δ < 1/2 can be solved in the strict `1 turnstile setting with optimal
O(−1 lg n) space, update time O(lg n), query time O(−1 lg1+γ n), and failure probability δ.
E
Expected Time for Strict Turnstile `1
If we are satisfied with expected query time, then there is an even simpler and very practical
algorithm for the strict turnstile `1 case. The algorithm is based on the b-tree, but with b = 2, i.e.
a binary tree. As in Section D, we solve the more standard variant of heavy hitters in which we must
return a set L containing all indices i where xi ≥ kxk1 and no indices j such that xj < (/2)kxk1 .
For what follows, we assume vector entries in x ∈ Rn are 0-based indexed, e.g. x = (x0 , . . . , xn−1 )T .
Conceptually we create virtual streams J0 , . . . , Jlg2 n . For the stream Jr we solve an instance of
partition point query with 2r sets in the partition defined as follows. At the level r = lg2 n, the
partition is Plg2 n = P = {S0 , . . . , Sn−1 }, with oracle Olg2 n = O. For 0 ≤ r < lg2 n, the partitions
are defined inductively: we imagine a complete binary tree on {0, . . . , n − 1} where the jth leaf
node denotes Sj , and for r < lg2 n each internal node represents a set equal to the union of the
sets at its children. Said succinctly, for r < lg2 n, the oracle evaluation Or (i) equals O(i)/2lg2 n−r .
Note that Or can be implemented in constant time by bitshifting right `(lg2 n − r) positions (lg2 n
is a fixed value that can be computed once and stored during initialization).
When an update (i, v) is seen in the actual stream, it is fed into a PartitionCountSketch
Pr at level r for each 0 ≤ r ≤ lg2 n, with partition Pr and oracle Or . Each Pr is chosen to be
the partition point query structure from Lemma 16 with error parameter 0 = /2 and failure
probability δ = 1/4. This has each Pr using O(−1 ) words of space, supporting updates and queries
in O(1) time. We also maintain one CountMin sketch on x with error parameter 0 = /2 and
failure probability 1/ poly(n).
The space is O(−1 lg n) and the update time is O(lg n).
To answer a heavy hitters query, we walk down the tree as follows (our goal is to have, at all
times 0 ≤ r ≤ lg2 n, a list Lr of size O(1/−1 ) which contains all the -heavy hitter partitions at
level r). First we set L0 = {0}. Then for r = 1 to lg2 n, we point query every child of an element
of Lr−1 . We then set Lr to be the nodes at level r whose point query result was at least kxk1 .
Recall from Section D that in the strict turnstile `1 setting, we can maintain kxk1 exactly. Once
37
we have computed Llg2 n , we point query each element in the list against the CountMin sketch
and filter out those indices where the returned value is less than kxk1 .
The key insight is that the data structure from Lemma 16 never returns an underestimate.
Thus the list Llg2 n will always contain all indices i with xi ≥ kxk1 . The only issue is that we may
consider more candidate heavy hitters than really exist, which might increase the query time tq .
We show that in fact tq remains small in expectation.
Let the 2n − 1 nodes in the conceptual binary tree be called u1 , . . . , u2n−1 . During query, we
traverse this tree starting at the root. While visiting a node u at level r, we query it in Pr and only
recurse to its children if the subtree corresponding to u is declared to have mass at least kxk1 at
level r. For j ∈ [2n − 1] let Yj be an indicator randomPvariable for whether Pr declares uj as having
mass at least kxk1 . Note the runtime of a query is j Yj . Thus the expected runtime satisfies
tq = E
2n−1
X
Yj =
j=1
X
E Yj .
j
Now, what is E Yj ? Call a node uj which actually corresponds to a subtree of mass at least
(/2)kxk1 heavy. Then for heavy uj , we use the simple upper bound E[Yj ] ≤ 1; there are at
most 2−1 lg n such heavy j summed over the entire tree. Otherwise, if d is the distance to the
lowest ancestor v of uj which is heavy, then for Yj to be 1, it must be that every point query to an
ancestor of uj below v must fail. This happens with probability 1/4d−1 since the data structures are
independent across the levels of the tree. However, if we fix d and ask how many nodes in the entire
tree have shortest distance to a heavy ancestor equal to d, then that is at most (2−1 lg n) · 2d−1 .
Therefore the expected query time tq for traversing the tree is:
X
j
−1
E Yj ≤ (
lg n) ·
∞ r
X
2
r=0
4
= O(−1 lg n).
Finally, we also have |Llg2 n | queries to a CountMin sketch with failure probability 1/ poly(n).
These queries cost O(lg n) time each. Thus we need to bound O(lg n) · E |Llg2 n |. By an argument
similar to the above, consider a leaf uj corresponding to an index j with xj ≤ (/2)kxk1 . Let d
denote the distance from uj to its nearest heavy ancestor. For uj to be in Llg2 n , every point query
on this path must fail. This happens with probability 1/4d−1 . Now how many leaves can have
shortest distance to a heavy ancestor equal to d? Since we are only considering leaves, ancestors of
distance d are at the exact same level for all leaves. But a level has at most 2−1 heavy nodes, and
thus there are at most (2−1 ) · 2d−1 leaves with distance exactly d to their nearest heavy ancestor.
By an argument similar to the above, we get that E |Llg2 n | = O(−1 ). We conclude:
Theorem 10. For any constant 0 < γ < 1/2, heavy hitters with error parameter ∈ (0, 1/2) and
failure probability 1/ poly(n) < δ < 1/2 can be solved in the strict `1 turnstile setting with optimal O(−1 lg n) space, update time O(lg n), expected query time O(−1 lg n), and failure probability
1/ poly(n).
38
| 8cs.DS
|
Comparison-Based Choices
arXiv:1705.05735v1 [cs.DS] 16 May 2017
Jon Kleinberg ∗
Sendhil Mullainathan †
Johan Ugander ‡
Abstract
A broad range of on-line behaviors are mediated by interfaces in which people make choices among
sets of options. A rich and growing line of work in the behavioral sciences indicate that human choices
follow not only from the utility of alternatives, but also from the choice set in which alternatives are
presented. In this work we study comparison-based choice functions, a simple but surprisingly rich class
of functions capable of exhibiting so-called choice-set effects. Motivated by the challenge of predicting
complex choices, we study the query complexity of these functions in a variety of settings. We consider
settings that allow for active queries or passive observation of a stream of queries, and give analyses both
at the granularity of individuals or populations that might exhibit heterogeneous choice behavior. Our
main result is that any comparison-based choice function in one dimension can be inferred as efficiently
as a basic maximum or minimum choice function across many query contexts, suggesting that choice-set
effects need not entail any fundamental algorithmic barriers to inference. We also introduce a class of
choice functions we call distance-comparison-based functions, and briefly discuss the analysis of such
functions. The framework we outline provides intriguing connections between human choice behavior
and a range of questions in the theory of sorting.
1
Introduction
Modern information systems across a broad range of domains wrestle with increasingly expansive and heterogeneous corpora of data describing human decisions — from online marketplaces such as Amazon and
AirBnB recording diverse purchasing behavior to search engines and recommendation systems that process
continuous clickstreams, where clicks reflect choices.
Many of the decisions made in these on-line environments have a consistent structure: users are presented
with a set of options — a list of recommended books, search results, flight options, or users to follow —
and they select one or more items from the set. The ubiquity of this framework has led to an active line of
research on the problem of learning ranking functions [1]. There are many formulations in the literature,
but the essential core is to assume that a user has a ranking over alternatives that is hidden from us, and
by observing their choices we would like to infer this ranking. This question can be asked at the level of
individuals or at the level of populations containing heterogeneous but related rankings.
Choice-set effects. A central assumption in the work on rankings is that individuals start from an underlying
total order on the possible alternatives. Roughly speaking, consider an inventory Z = {z1 , z2 , . . . , zn } of
possible choices, globally ordered so that a particular user prefers zi to zj for i < j. When the user is
∗
Department of Computer Science, Cornell University. Email: [email protected]
Department of Economics, Harvard University. Email: [email protected]
‡
Department of Management Science & Engineering, Stanford University. Email: [email protected].
This work is supported in part by a Simons Investigator Award, an ARO MURI grant, a Google Research Grant, Facebook
Faculty Research Grants, and a David Morgenthaler II Faculty Fellowship.
†
1
presented with a set of choices S ⊆ Z, they select the item in S that is ranked first according to this global
order. There are many variations on this basic pattern — there may be noise in the selection, or options may
be unobserved — but the total ordering is a crucial part of the structure.
A long line of work in behavioral science [25, 22, 15, 9, 28], however, indicates that people’s empirical
choices tend to deviate in significant ways from this picture. A person’s choice will in fact typically depend
not just on the total ordering on the full set of alternatives Z, which is often enormous and implicit, but
also on the choice set S they are shown as part of the specific decision at hand. Notable examples of such
choice-set effects include the compromise effect, similarity aversion, and the decoy effect (also known as
asymmetric dominance), and have been observed in diverse contexts both offline and online; recent work
in machine learning has highlighted the prevalence of choice-set effects [23, 4, 33, 19] and non-transitive
comparisons [7, 8], particularly in online search, online ads, and online games.
A canonical example of a choice-set effect is the so-called compromise effect [24]: faced with the choice
between a mediocre option for $10, a good option for $15, and an excellent option for $20, people will tend
to choose the good option for $15; but faced instead with a choice between the same good option for $15,
the excellent option for $20, and an outstanding option for $25, people will be more likely to choose the
excellent option for $20. In other words, there is a tendency to favor the option that compromises between
the two extremes in the set that is presented.
More generally, suppose that a set of products exhibit a trade-off between two factors — for example,
price vs. quality, power vs. reliability, or aesthetics vs. fuel efficiency. There is a naturally defined onedimensional set of products that are on the Pareto frontier: they are the options for which no other product is
more desirable in both factors. Consider four products A, B, C, and D that are arranged in this order along
the one-dimensional frontier (A is the least powerful but most reliable, and D as the most powerful but least
reliable). In a wide variety of settings, B will be empirically chosen more often when it is presented as one
of the three choices S = {A, B, C} than when it is one of the three choices S 0 = {B, C, D} — in other
words, when it is the compromise option rather than an extreme option. By the same reasoning, C will be
chosen more often when it is presented as part of S 0 than as part of S.
One can ask whether this is simply a representational issue, but in fact it is much deeper. The point is that in
any model based on a total ordering on the alternatives Z, a user would prefer either B or C, and this would
hold in any choice set S that contains both of them. But B and C are options in both the sets S = {A, B, C}
and S 0 = {B, C, D}, and the aggregate distribution of choices in favor of B versus C changes across these
two sets. This suggests that the relative ordering of B and C in fact is not well-defined in isolation, but must
be evaluated in the context of the choice set (S or S 0 ). It matters what else is on offer.
Comparison-based choice functions. In this paper, we consider a set of basic algorithmic questions that
arise when we seek to infer models of user choice in the presence of comparison-based choice-set effects. We
focus on a basic formulation in which these effects arise, and show how our framework makes it possible
to derive asymptotic bounds on query complexity and sample complexity in performing these types of
inference. We set up the problem as follows.
(1) Embedding of alternatives. The full collection of alternatives is a set U = {u1 , . . . , un }, and there is
an embedding of U into a space of attributes X via a function h : U → X. For most of our discussion
we will take X to be the real line R1 , so that h(ui ) is a real number; thus most of the time we can think of
the embedded points {h(u1 ), . . . , h(un )} as representing a one-dimensional trade-off continuum as in the
discussion above. We will assume that the embedding h is not known to us. Indeed, while we sometimes
might know the crucial one-dimensional attribute of an item, such as a price, the important attributes in
many settings will not be explicitly presented to us: a user might have a mental ordering of clothing styles
on a spectrum from “too dull” to “too ostentatious,” or restaurants on a spectrum from “too bland” to “too
2
exotic,” or book or movie recommendations on a spectrum from “too much what I’m already reading” to
“too far from my interests.”
(2) Choice functions. We focus on an individual who is presented with a subset S ⊆ U of a fixed size k and
chooses one element from S. Throughout this discussion we will refer to subsets of U of size k as k-sets of
U . We study k-sets, rather than subsets of arbitrary/varying size, both for conceptual clarity and also with
the motivation that many of our motivating applications — online recommendations and search results —
often present choices between a fixed number of options.
An individual’s selections are represented using a choice function f : for each k-set S ⊆ U , we define
f (S) ∈ S as the individual’s selection when presented with S. We say that f exhibits choice-set effects if
the identity of the set S affects the relative choice between two elements: specifically, f exhibits choice-set
effects if there exist k-sets S and T , and elements ui and uj , such that ui , uj ∈ S ∩ T , and f (S) = ui
while f (T ) = uj . If such choices can occur then a choice between ui and uj depends on whether they are
presented in the context of S or T ; one can view such a contextual effect as a violation of the independence
of irrelevant alternatives (“IIA”) [21].
We define choice functions here as deterministic for a given individual. Later in this work we study populations composed of a mixture of different choice functions, and our results there can be interpreted equivalently as applying to the choices of an individual making probabilistic decisions corresponding to a randomization over different choice functions. We can contrast such probabilistic choices (those expressible as
mixtures), with random utility models (RUMs) [3, 17]: they lack some of the flexibility of RUMs; but discrete choice models such as RUMs on the other hand typically entail other restrictions, including assuming
the independence of irrelevant alternatives. Identifying the expressive limits of random mixtures of choice
functions for modeling probabilistic choice is an intriguing open challenge.
(3) Comparison-based functions. We focus here on comparison-based choice functions, which incorporate
the ordinal structure inherent in preference learning, but which are still rich enough to exhibit choice-set
effects. A choice function f on k-sets is comparison-based if the value f (S) can be computed purely using
comparisons on the ordering of the numbers {h(ui ) : ui ∈ S}. It is not hard to see that for any comparisonbased choice function f on k-sets, there is a number ` between 1 and k so that for all k-sets S, the value
f (S) is equal to the `th ranked element in S according to the embedding h(·). We can therefore characterize
any comparison-based choice functions in one dimension as a position-selecting choice function for some
position ` of k.
Thus, comparison-based choice functions represent different versions of the compromise effects discussed
earlier: faced with a set S of k options ranked along a one-dimensional spectrum, an individual would
choose the `th ranked option. For example, when k = 3 and ` = 2, the individual always chooses the
middle of three options, much like the sample instance with choices A, B, C, D discussed earlier. It is not
hard to verify, using examples such as this one, that a comparison-based choice function exhibits choice-set
effects if and only if 2 ≤ ` ≤ k − 1.
Choice functions over k-sets as we define them here are very general mathematical functions, capable of
encoding an arbitrary choice for every k-set. Comparison-based functions in one dimension, however, are
a structured subset of choice functions that provide a useful abstraction of many decision contexts. We are
not aware of any prior inference work on general comparison-based functions, which is surprising given the
central role of binary comparison in the fundamental problem of sorting. We focus on comparisons in one
dimension. Comparison functions in higher dimensions can have a significantly more complex structure;
extending our results to higher dimensions is beyond the scope of the present work.
A short-coming of comparison-based functions is that they lack the ability to grasp “similarity,” an impor3
tant aspect of choice-set effects such as similarity aversion and the decoy effect, and one that requires a
notion of distance beyond ordinal comparison. As a step towards extending our framework to model such
effects, we also study distance-comparison-based choice functions that model choices according to distance
comparisons, possibly in high-dimensional latent spaces.
The present work: Asymptotic complexity of inference. There are many questions that one can consider
for models of comparison-based choice functions; here we study a basic family of problems that are inherent
in any inference procedure, and which form an interesting connection to fundamental questions in sorting.
The basic problem we study has the following structure: we observe a sequence of choices of the form
(S, f (S)), and at the end of this sequence we must correctly report the value of f (S) for all (or almost all)
k-sets S. The question is how few observations (S, f (S)) we need in order to achieve various measures
of success. We ask this question for different models of how the observations are generated. We first
consider active queries, in which we can choose S and receive the value of f (S); we investigate the potential
for efficient inference both when a single individual is making choices with a fixed function f , and for
population mixtures of different choice functions. As a second model we consider passive queries, a model
whereby a stream of pairs (S, f (S)) is generated uniformly at random over possible k-sets S, without the
control over S offered by the active query model.
For active queries, a natural baseline for understanding the problem formulation is the problem of sorting,
which precisely consists of the case k = 2 and ` = 1. A comparison-based sorting algorithm asks about a
sequence of pairs S = {ui , uj }, and for each such pair it is told the identity of the preferred element. An
efficient sorting algorithm given O(n log n) such queries can learn the sorted order of the elements, and thus
can answer queries of the form f (S) for arbitrary pairs after learning the sorted order.
We show that all comparison-based choice functions in one dimension exhibit the same O(n log n) active
query complexity: for every ` and k, there is an algorithm that can ask about a sequence of O(n log n)
k-sets S as queries, and from the values of f (S) it is then prepared to correctly report f (S) for all k-sets
S. Roughly speaking, the algorithm works by first identifying a small set of elements that cannot be the
answer to any query, and then it uses these elements as “anchors” on which to build sets that can simulate
comparisons of pairs. Note that as the set size k grows, the O(n log n) queries form a smaller and smaller
fraction of the set of all nk possible k-sets.
We then consider active queries for population mixtures, in which different people use different comparisonbased choice functions on k-sets, and when we pose a query S, we get back the answer f (S) for an individual
selected uniformly at random from the population. We show that for a fixed but unknown vector of probabilities for each choice function under some natural non-degeneracy conditions we can determine f (S) for
each segment of the population after O(n log n) active queries. The algorithm here uses random sampling
ideas combined with techniques for sorting using noisy comparators [10].
For passive queries, where an algorithm is presented with a stream of values (f (S), S) for randomly selected
sets S, the question is how long we need to observe values from the stream before being able to compute
f (S) for all (or almost all) k-sets S. We show that for comparison-based choice functions f that exhibit
choice-set effects (with ` between 2 and k − 1), we can do this after observing o(nk ) values from the stream
with high probability; for an arbitrary ε > 0 and δ > 0, we can, with probability at least 1 − δ, determine
f (S) for at least a 1 − ε fraction of all k-sets S. Our analysis here builds on a sequence of combinatorial
results on sorting in one round, culminating in an asymptotically tight analysis of that problem by Alon and
Azar [5, 2].
Finally, we consider how our results for comparison-based functions apply to distance-comparison-based
choice functions in which the geometry of the alternatives’ embedding plays a consequential role. A range
4
of earlier work have made use of the ambient space in different ways, including methods such as conjoint
analysis [3, 12]. Here, we consider the effect of performing comparisons among the pairwise distances
between alternatives. This consideration enables us to reason about elements that are either central or
outliers in a comparison-based fashion, providing a plausible model for the choice-set effect commonly
known as similarity aversion. This line of inquiry into metric embeddings also connects our results with
recent research in the learning and crowdsourcing literature on learning stochastic triplet embeddings [30]
and inferences using the crowd median algorithm [13].
2
Active query complexity
We will first focus on active query algorithms that may choose queries sequentially based on the results of
previous queries, and our goal here is to develop algorithms that after performing a small number of queries
can take an arbitrary k-set S ⊆ U from a universe of n alternatives and correctly output f (S).
We have previously noted that every comparison-based choice function over a one-dimensional ordering
takes the form of a position-selecting choice function choosing the `th alternative of k for some ordering;
we will denote this function by qk,` . Our results in this section show that for any fixed k ≥ 2 and any
fixed but unknown ` ∈ {1, ..., k}, we can in fact learn the output for any input using an efficient twophase algorithm that performs only O(n log n) queries. This algorithm determines ` (up to a reflection we
discuss below) by the time it terminates, but we also give a simple algorithm that recovers ` (up to the same
reflection) more directly in just O(1) queries (without learning the output for all inputs). Thus, we establish
that learning the position ` of a comparison-based choice function does not require running a comprehensive
recovery algorithm.
For recovering the choice function, we note that the orientation of the embedding is inconsequential. This
symmetry is clear when considering the simplest example of k = 2, where f is either a max selector q2,1 or
a min selector q2,2 . In order to deduce f (S) for every S we needn’t know whether f is choosing the max or
min, as we will simply learn an embedding aligned with our selector. More generally, we have no way or
need to distinguish between qk,` over a given embedding and qk,k−`+1 over the same embedding reversed,
as they result in the exact same choices.
Recovering choice functions. The algorithm we propose consists of two phases. In the first phase, we
use O(n) queries to identify a set of “ineligible” alternatives. In the second phase, we use those ineligible
alternatives to “anchor” the choice set down to a binary comparison between two eligible alternatives, allowing us to determine the ordering of the eligible alternatives in O(n log n) queries using comparison-based
sorting.
Theorem 2.1. Given a choice function f over k-sets S in a universe of n alternatives, there is an algorithm
that recovers f after O(n log n) queries, meaning that after this set of queries it can output f (S) for any S.
We prove this theorem by describing the algorithm together with its analysis, divided into its two phases of
operation. For the first phase, we identify the ineligible elements. In the second phase, we simulate pairwise
comparisons.
Proof. We begin the first phase by observing that for a position selector qk,` making comparison-based
choices over k-sets S ⊆ U with |U | = n, there are k − 1 alternatives that will never be chosen. For maxselectors qk,k these are the k − 1 minimal alternatives, for min-selectors qk,1 these are the k − 1 maximal
alternatives, and for general qk,` these are the ` − 1 maximal and k − ` minimal alternatives from the
embedded order.
5
a
c
b
f (S) = b
d
= ineligible alternatives
S⇤ = {
S 2= {
k
` item(s)
}
`
a
c
b
}
1 item(s)
d
Figure 1: For a given comparison-based choice function f over an unknown embedding, there are ineligible
alternatives that will never be chosen, illustrated here for k = 4 and ` = 3. The elements are embedded in a
1-dimensional space, where the ` − 1 maximal and k − ` minimal elements can never be chosen.
To find these elements, we run a simple discard algorithm. Commencing with k arbitrary initial alternatives
in a choice set S1 , we query the choice function f and learn the choice f (S1 ). We then construct our next
choice set by discarding the previous choice and selecting a new arbitrary alternative u ∈ U \ S1 to form
S2 = (S1 \ f (S1 )) ∪ u. We query for f (S2 ), and repeat this discard procedure for n − k + 1 queries.
After the last query we will have exhausted U and learned that S ∗ = Sn−k+1 \ f (Sn−k+1 ) are precisely the
k − 1 alternatives in U that can never be selected by f . Having found the k − 1 ineligible alternatives S ∗ ,
we arbitrarily select k − 2 alternatives from S ∗ to form a set S −2 . See Figure 1 for an illustration of this
procedure.
In the second phase of the algorithm we use the set S −2 constructed above as padding for a choice set
construction with two open positions: notice that for any two alternatives ui and uj , a query for f ({ui , uj }∪
S −2 ) will amount to binary comparison between ui and uj . If ` = 1 or ` = k, we know that this will be
a max or a min selection, respectively. However, for intermediate values of ` we do not yet know whether
such binary comparisons will be a max or a min selection, as it depends on what k − 2 elements from S ∗
were chosen to construct S −2 . There exists no basis for choosing S −2 from S ∗ in a non-arbitrary way, as
we have no way of ever choosing any of the alternatives in S −2 . However, as noted earlier in the case of
recovering choice functions for k = 2, we can simply assume that the comparator we have constructed is
selecting the max of ui and uj , and then learn the order of the eligible alternatives from binary comparisons
as oriented by that comparator. After O(n log n) padded comparison queries, we obtain a sorted order of
the eligible alternatives.
To conclude this second phase, we perform a single additional query to determine `, the position being
selected, which is as yet unknown and unused. By querying for what we’ve come to suppose are the first
k eligible elements, the chosen alternative will identify the `th position in the recovered embedding of the
eligible alternatives. We again emphasize that we have no way of distinguishing between qk,` over a given
embedding and qk,k−`+1 over the same embedding reversed, but the direction of the ordering is nonessential,
as the choices are identical for all choice sets. Having learned the embedded order of the eligible alternatives
in U as well as the position ` being selected, we can now discern the choice f (S) for any k-set S ⊆ U .
As a further point, it is notable that no part of this algorithm depends on `, as it is only learned at the end of
the final query, meaning that the entire algorithm is in fact indifferent to whether an individual is selecting
minima, maxima, or intermediate positions.
Lastly, we observe that the classic lower bound on sorting applies as a lower bound here as well, for fixed
` and k: there are (n − k + 1)!/2 possible permutations of how the eligible alternatives can be embedded
(ignoring the k − 1 ineligible alternatives). Each query cements at most k − 1 relative orderings, at most
6
reducing the number of feasible orderings by a factor of k − 1. We thus require at least logk ((n − k)!/2)
queries to learn a choice function, yielding a lower bound of Ω(n log n), as for sorting.
Type classification. It can be valuable to learn how a choice function makes comparisons without necessarily learning the ordering implicated in the comparisons. Here we establish that we can learn `, up to the
noted reflection equivalence, using O(k) queries without learning the order of the alternatives.
Proposition 2.2. By querying for all k-set subsets of an arbitrary (k + 1)-set, we can determine `, up to
reflection.
Proof. The algorithm performs k + 1 queries for all the subsets of size k, where each of these subsets can
be defined by what element is excluded. The k + 1 alternatives have an unknown internal ordering, and
we let ui denote the ith alternative in order. From these queries, there can be only two possible elements
selected as the output across the k different subsets: either the chosen alternative in the (` + 1)th ordered
position (when the excluded element is one of u1 , . . . , u` ) or the chosen alternative in the `th ordered (when
the excluded element is one of u`+1 , . . . , uk+1 ). Of these k + 1 k-sets, the (` + 1)th element will be chosen
` times, and the `th element will be chosen k − ` + 1 times.
Thus, for any k, in order to determine the position ` of a position-selecting choice function, one can simply
take an arbitrary set of k+1 elements and query for all subsets of k. Then ` (up to reflection) is the frequency
of the less frequent of the two response elements.
3
Population mixtures
The results in the previous section assumed that all queries were evaluated by the same deterministic choice
function f , where f (S) was consistently selecting the `th ordered alternative from within each k-set S. In
this section, we show that we can recover choice functions in a more general setting, where the position `
chosen by f is drawn from a distribution over possible positions.
This setting covers two generalizations of our active query results. First, it describes situations where a single
individual is being repeatedly queried, and may exhibit compromise effects for some queries, independently
at random. Second, it describes situations where the queries are handled by a population of individuals that
all base their choices on the same ordered embedding, but differ in what position within an ordering that
their choice functions select for. We show that we can still recover choice functions in this setting using
O(n log n) queries, almost surely.
Recalling one of our motivating examples from the introduction, this is a plausible reality: faced with a
choice of restaurants ranging from “too bland” to “too exotic,” some individuals will compromise, while
some will optimize for one of the extremes. In online settings the choices being made often come from
heterogeneous populations, and we wish to develop an algorithm that can still recover choices in these
settings.
We define a mixed choice function as a comparison-based choice function on k-sets S ⊂ U where the `th
ordered element in S is selected independently at random with probability π` . A mixed choice function
is then completely defined by an
P ordering of U and a probability distribution (π1 , ..., πk ) over positionselecting choice functions with ki=1 πi = 1. To avoid degeneracies, we require that π` > 0, ∀`, and also
require constant separation between the probabilities, |π` − π`0 | > γ, ∀`, `0 with ` 6= `0 , for some constant
γ > 0.
7
In its most basic instance, a mixed choice function over 2-sets is simply a noisy binary comparator over an
ordering, with (π1 , π2 ) = (p, 1 − p) for some probability p. In this case, results from the sorting literature
contribute that as long as p is bounded away from 1/2, the order can be recovered in O(n log n) queries
almost surely [10]. Our contribution in this section is to generalize this result to arbitrary mixtures of
comparison-based choice functions.
We begin by showing that for any > 0, we can recover the mixture probabilities (π1 , ..., πk ) of a mixed
choice function with probability at least 1− in a number of queries that is O(1) in n, the size of U . We then
show that we can indeed recover any mixed choice function f using O(n log n) queries with probability at
least 1 − .
Recovering mixture probabilities. We begin by showing that we can recover the mixture probabilities
using a modified version of the algorithm we presented for recovering ` in an active query framework.
Theorem 3.1. Let f be a mixed comparison-based choice function over k-sets in a universe of n alternatives. Let π = (π1 , ..., πk ) be the mixture distribution of f , and let π` > 0, ∀`, and |π` − π`0 | > γ, ∀`, `0
with `0 6= `, for some constant γ > 0.
For any > 0 and δ ∈ (0, γ/2) there exists a constant C > 0 such that an algorithm using C queries can
recover π, meaning that it outputs a probability vector p for which
P r(max` |π̂` − π` | ≤ δ) ≥ 1 −
holds for either π̂ = (p1 , ..., pk ) or π̂ = (pk , ..., p1 ).
Proof. Our strategy is to study a single (k + 1)-set S + closely, and by querying each k-set within S +
sufficiently many times we can recover the mixture distribution with the required precision. We index the
k + 1 k-sets within S + as S1 , ..., Sk+1 .
We define the random variables
u
Xi,j
(
1 if query i of subset Sj returns u ∈ Sj
=
0 otherwise,
(1)
u ] = π j for a vector of probabilities π j = (π j , ..., π j ) that is an unknown permutation of
where E[Xi,j
u
1
k
(π1 , ..., πk ).
We first show that for each subset we can recover the complete set of probabilities with the specified precision and correctly ordered by their relative frequency. In a second stage we will then align the permuted π j
vectors and thereby recover π itself (or π’s reflection).
P
u
For each Sj , we consider the estimates π̂uj = C1 C
i=1 Xi,j , and we show that this is correct to within the
requested error tolerance if we choose C large enough. Recalling that δ < γ/2, a two-sided Chernoff bound
tells us that:
!
!
C
j 2
1 X u
(δ
)
u
Xi,j − πuj ≥ δuj πuj ≤ 2 exp −
Pr
Cπuj ,
C
2 + δuj
i=1
for which we can set δuj = δ/πuj and use πuj ≤ 1, ∀j, u to obtain
δ2
j
j
Pr |π̂u − πu | ≥ δ ≤ 2 exp −
C .
2+δ
8
a
b
c
d
⇡1
⇡2
⇡3
S1
S2
a
b
c
a
b
d
S3
a
c
d
S4
b
c
d
Figure 2: A graphical sketch of the population alignment algorithm in Theorem 2, shown for k = 3. Left:
a 4-set contains four 3-sets, S1 , S2 , S3 , S4 . Right: by querying for each 3-set sufficiently often, we can
identify the frequencies π1 , π2 , π3 with which each element occurs and then identify π1 and π3 by the fact
that their frequencies corresponds to the same element in all but one of the 3-sets.
Let us define the bad events Ej,u = {|π̂uj − πuj | ≥ δ}, when we failed to recover πuj (the probability of
selecting u from subset Sj ) within the specified precision. By taking the Union Bound across the sets Sj
and their alternatives u, we can set C > 2+δ
) to obtain
log( 2k(k+1)
δ2
k+1 X
k
X
j
j
Pr π̂uj − πuj ≥ δ > 1 − .
Pr max π̂u − πu ≤ δ ≥ 1 −
u,j
j=1 u=1
The remaining challenge is to determine what probability corresponds to what choice position, and we will
show that recovering this correspondence is guaranteed if the bad events did not occur.
We recover the correspondence using an alignment procedure: since δ < γ/2, inside each Sj we can order
the elements from most frequently selected to least frequently selected. In this order the ith most frequent
choice inside each vector π̂ j will correspond to the same underlying position selection for each Sj . The
most frequently selected element from each Sj will have been selected by the `-selector with the largest π`
in π, and so on, for each selection frequency.
To discern what frequency corresponds to what `, we look across the subsets S1 , . . . , Sk+1 and identify the
two probabilities π1 and πk by the fact that they will be the only two frequencies that have selected some
element u only once at that frequency, and another element v the remaining k times at that frequency. In
other words, the alternatives selected at those frequencies will have the structure {u, v, ...., v} for some u
and v, and these must be the frequencies π1 and πk . See Figure S1 for an illustration in the case of k = 3.
We arbitrarily assign the more frequent of these two frequencies to be π1 , recalling that we’re only looking
to recover π up to reflection. The other frequency is assigned to be πk .
Lastly, for each of these two end frequencies π1 and πk we take the “other” element v (that made up k − 1 of
the k choices at that frequency), and find what frequency corresponds to when each v was selected exactly
twice, identifying the probabilities π2 and πk−1 . Since π` > 0 for all `, we can continue this overlap
procedure for all the frequencies, allowing us to identify the probability π` corresponding to each position
`. This alignment procedure fails only if one of the earlier bad events failed, and so we can return any one
of the π̂ j , which all had the necessary precision, and reorder it by our alignment procedure to produce our
output p.
A recovery algorithm for mixtures. We now show that in this setting where queries are handled by a
mixed choice function—either representing a random individual or a random mixture of individuals—we
can recover the choice function in O(n log n) queries with high probability, matching the asymptotic query
complexity of the non-population case for any fixed error probability. We run our recovery algorithm against
the mixture population, but for the purposes of recovering f (S) for every S we assume that ` is then known.
9
Theorem 3.2. Let f be a mixed comparison-based choice function over k-sets in a universe of n alternatives. Let π = (π1 , ..., πk ) be the unknown mixture distribution of f , and let π` > 0, ∀`, and |π` − π`0 | > γ,
∀`, `0 with ` 6= `0 , for some constant γ > 0.
Let f1 , ..., fk be pure versions of f , where π` = 1 for f` , over the same ordered embedding. For any > 0
there exists an algorithm using O(n log n) queries to f that with probability at least 1 − can recover f` (S)
for all `, all S.
Our proof is constructive. The strategy for this algorithm is to first run our procedure from Theorem 2
for recovering π using a constant number of queries. We then focus on max-selectors, and run a modified
discard algorithm (from Theorem 1) to identify the alternatives that are ineligible to the subpopulation of
max-selectors. We use these ineligible alternatives for the max-selectors to create an anchored k-set that
can furnish a noisy binary comparator. By employing results for sorting under noisy comparisons [10], we
obtain the order over the alternatives that are eligible to a max-selector. If we only needed to recover fk (S)
for every S, where fk is the max-selector, we would be done. In order to also learn the order of the maxineligible alternatives, we run a second sort using a query anchored with min-ineligible alternatives, thereby
also recovering the order of the max-ineligible alternatives.
Proof. We begin by running the algorithm from Theorem 2 with a sufficiently large number of queries C1
to obtain an estimate π̂ of π, such that Pr(max` |π̂` − π` | ≤ γ/2) > 1 − /5 where C1 is a constant in n
for every and γ. The usual caveats for reflection of the mixture vector apply, and we learn π for one of the
orientations, arbitrarily chosen. We focus on our estimate of πk , the probability that a query is answered by
a max-selector.
We now initiate our standard discard algorithm, which we will use to find max-ineligible alternatives, starting
with an arbitrary k-set S ⊂ U . In each discard step, we plan to identify the max element by posing enough
queries to the population that the frequency with which we observe the maximum element is close enough
to πk . Let Ei be the bad event that discard round i incorrectly identified the max element in the set (πk was
not recovered with sufficient precision), and let D be the success event whereby no bad events occur and the
discard algorithm terminates with the alternatives that are ineligible for the max-selectors. Using C2 queries
in each round i of the discard algorithm we can bound Pr[Ei ] using two-sided Chernoff bounds, followed by
the Union Bound across the n − 2 rounds of our discard algorithm to obtain:
Pr[D] ≥ 1 −
n−2
X
i=1
Pr[Ei ] ≥ 1 − 2(n − 2) exp −
γ2
C2 .
8 + 2γ
0
0
Selecting C2 > 8+2γ
log( 10
) log(n) = C2 log(n), we obtain that Pr[D] > 1 − /5 with C2 n log n queries
γ2
0
across all the rounds of this discard algorithm, where C2 is constant in n.
Conditional on succeeding thus far, we can now create a padded k-set from the max-ineligible alternatives
∗
Smax
that were never selected during our discard algorithm, forming a binary comparator for any u and v
−2 for any (k − 2)-set S −2 ⊂ S ∗ . The max alternative will be selected
from a k-set of the form {u, v} ∪ Smax
max
max
with probability πk , and the second most maximal alternative will be selected with probability πk−1 . Our
goal is to hand this comparator off to the Feige et al. comparison-based query algorithm [10], but we note that
the Feige et al. algorithm requires a binary comparator that returns each element with probabilities {p, 1−p}
for some p > 1/2. Our comparator, meanwhile, will “fail” with constant probability ∆ = 1 − πk − πk−1 ,
−2 will be selected that is not one of the elements u or v being
in the sense that some alternative u∗ ∈ Smax
subjected to the noisy binary comparison. If one of πk or πk−1 exceed 1/2 then we can apply the Feige et
−2 as a choice of the less frequent of the two
al. procedure as-is, as we can simply bundle any choice u∗ ∈ Smax
10
positions, producing the necessary binary comparator. If the selection probabilities πk and πk−1 are both
less than 1/2, we can modify our comparator as follows.
For each step s that the Feige et al. algorithm performs a query, we repeat the query until we first see
one of k or k − 1. This means that the outcome space is not {k, k − 1, fail}, but just {k, k − 1}, one of
which will have a fixed probability p > 1/2. Let Cs be a random variable that takes a value equal to the
number of queries needed before first seeing k or k − 1. Seeing as Cs is geometrically distributed, we
have E[Cs ] = 1/∆, the inverse of the failure probability. But now the total number of queries being run
P log n
throughout the Feige et al. algorithm is Dn
Cs , for a constant D large enough to control the Feige
s=1
P log n
et al. error to at most /5, and so in expectation it takes E[ Dn
Cs ] = (1/∆)Dn log n queries. By
s=1
Markov’s inequality
the
probability
that
the
number
of
queries
exceeds
its expectation by a multiplicative
P log n
5D
factor of 5/ is Pr( Dn
C
≥
n
log
n)
≤
/5.
s
s=1
∆
This modification of Feige et al. will then still only take C3 n log n queries, for C3 = 5D/(∆), to succeed in
sorting the max-eligible alternatives, with two possible bad events: the failure of the Feige et al. algorithm,
with probability at most /5, and the number of queries exceeding the query budget, with probability at most
/5. This latter event is only a concern when both πk and πk−1 are less than 1/2.
If we only needed to recover the choices of a max-selector, we would be done. In order to recover all queries
for any positions `, however, we also need to know the order of the max-ineligible alternatives. To recover
such choices, we switch our focus from the max-selector subpopulation to the min-selector subpopulation.
∗ that contains the k − 2 maximum
As a final step we repeat the above procedure using an anchoring set Smin
alternatives of the ordering we just recovered. We then run the Feige et al. procedure to order the alternatives
∗ . Here u
in Uscrap = un−k−2 ∪ Smax
n−k−2 is the last element of the order recovered above, included to orient
∗
was the set of max-ineligible alternatives
the sort order with regard to the overall sorted order, and Smax
that we are trying to order. Since |Uscrap | = k − 1, we can drive this error probability below 1 − /5 with
a large constant C4 that does not depend on n, thereby also recovering the order over the max-ineligible
alternatives.
We have outlined five separate bad events that would make the algorithm fail. By taking the Union Bound
over the five bad event probabilities, each controlled to have an error ≤ /5, the overall algorithm performs
four sets of queries (where there are two bad events associated with the third set of queries) and succeeds
with probability at least 1 − after C1 + C20 n log n + C3 n log n + C4 queries, asymptotically O(n log n) as
specified.
4
Passive query complexity
We now shift our attention to passive query algorithms, algorithms that pose all their queries at once without
the sequential benefit of previous responses. This framework is motivated by a common scenario in the study
of large datasets of recorded choices from online marketplaces, ranking algorithms, and recommendation
systems. These systems are teeming with choices being made over sets of alternatives, but often one cannot
adaptively guide the queries towards our goal of recovering choice functions. What if we simply had a large
corpus of choices by an individual over random subsets? Could we still recover the choice function? If so,
how few queries would we need?
In this section we analyze a model for this process, in which we are not able to select queries but instead
have to watch them passively. We focus on the output of a single f ; handling population mixtures in a
passive query model is an interesting open question.
11
Model of passive choice streams. We analyze the following process for generating and analyzing a stream
of random queries that arrive over time. For each possible k-set S, we define a Poisson process of rate α: we
draw a length of time t from an exponentially distributed random variable of rate α (with density αe−αx ),
and after this time t elapses, we put the set S into the stream. We iterate this, repeatedly drawing a random
length of time t and putting S into the stream when t is reached.
We run the process for each k-set S simultaneously, creating a merged stream of k-sets as they are selected
and put into the stream. Now, suppose we observe the merged stream over the interval [0, T ]. For any fixed
k-set S, the probability that it appears in the interval is 1 − e−αT , a quantity that we’ll refer to as pT . An
algorithm is provided with the value f (S) for each k-set that appears in the stream during [0, T ]. After
seeing these values it must correctly report the value of f (S) for almost every k-set. We want an algorithm
that can achieve this goal while keeping T as small as possible.
Our streaming model is arguably the simplest plausible model for generating collections of (choice set,
choice) decisions that are independently drawn with replacement. Other seemingly simple models that
query for a random set of k-sets without replacement exhibit an implausible slight dependence between
decisions in the decision collection.
A recovery algorithm for passive streams. Our main result for this streaming model of passive queries is
that for 2 ≤ ` ≤ k − 1 there is an algorithm able to provide the desired performance guarantee for a choice
of T with pT → 0, which is to say that the probability of seeing any fixed k-set S even once goes to zero.
Equivalently, this result implies that we can recover f (S) for almost every k-set after only seeing a tiny
fraction of all possible k-sets.
Theorem 4.1. Let f be a choice function over k-sets in a universe of n alternatives that selects the `th
ordered position, with k ≥ 3 and 2 ≤ ` ≤ k − 1 known. For every ε > 0 and δ > 0, there is a constant
ξ > 0 and an algorithm that takes the stream over the interval [0, T ] with pT = ξ log n log log n/n and with
probability at least 1 − δ will recover the correct value of f (S) for at least a 1 − ε fraction of all k-sets.
Proof. The algorithm operates in two phases similarly to the algorithm for active queries, in that it first
identifies the set S ∗ of k − 1 ineligible alternatives that cannot be selected in any query. Then it selects k − 2
of these arbitrarily to form a set S −2 and analyzes sets of the form {ui , uj } ∪ S −2 to decide the relative
ordering of pairs (ui , uj ). The key difference from the case of active queries is that the algorithm needs to
operate using only the k-sets that were handed to it initially at random, so it can’t steer the queries to seek
out the set S ∗ , or run an adaptive sorting algorithm on arbitrary pairs (ui , uj ).
Because the algorithm has two phases, we split the time interval [0, T ] into two intervals [0, T1 ] and (T1 , T1 +
T2 ]. Note that for a given k-set S, the Union Bound implies that pT1 + pT2 is an upper bound on the
probability seeing S during [0, T ], and hence pT1 + pT2 ≥ pT .
Given a time interval [0, T ] for generating the stream, for a sufficiently large constant b to be specified below,
we choose T so that pT ≥ b log n/n + b log n log log n/n. We split [0, T ] into [0, T1 ] and (T1 , T1 + T2 ] so
that pT1 ≥ b log n/n and pT2 ≥ b log n log log n/n.
Let D[a, b] denote the k-sets observed in the stream during the interval [a, b]. We will use D1 = D[0, T1 ]
for the first phase, and D2 = D(T1 , T1 + T2 ] for the second phase. Note that the contents of D1 and D2 are
independent of each other, an important facet of the streaming model.
Phase 1: Finding ineligible elements. In the first phase, the algorithm will look at D1 and identify the set
S ∗∗ of elements v ∈ U for which v is not the output f (S) for any S ∈ D1 . Clearly S ∗ ⊆ S ∗∗ , since no
element of S ∗ can be the answer to any f (S). Now fix v 6∈ S ∗ ; what is the probability that it belongs to
S ∗∗ ?
12
Every eligible alternative v will be the output f (S) for some S ∈ D1 as long as there’s a k-set in D1
containing exactly ` − 1 elements above v and exactly k − ` element below v. Note that since 2 ≤ ` ≤ k − 1,
this means that there are a non-zero number
of elements above and below v in this case. Let’s call such a
query a “revealing query” for v. Out of nk possible queries there are at least n−2 such revealing queries for
v, since in the worst case there’s only one way to choose k − 2 alternatives above and n − 2 ways to choose
one alternatives below, or vice versa. Each revealing query for v is chosen with probability p ≥ b log n/n.
The probability that none of these n − 2 revealing queries is chosen is then
(1 − p)n−2 ≤ (1 − b(log n)/n)n−2 ≤ (1 − b(log n)/n)n/2 ≤ e−(b/2) log n = n−b/2 .
Now taking the Union Bound over all n−k eligible alternatives v says that the probability there exists a v for
which no revealing query is chosen is bounded by n · n−b/2 ≤ n−(b/2)+1 . Let E1 denote the “bad event” that
S ∗ 6= S ∗∗ , and let δ0 ≤ δ/4 be a constant. By choosing b large enough, we have Pr [E1 ] ≤ n−(b/2)+1 ≤ δ0 .
Phase 2: Simulating pairwise comparisons. In phase 2 we now use k − 2 of the ineligible elements as
anchors for performing pairwise comparisons. Recall that because we have split the stream over two disjoint
time intervals, the algorithm’s behavior now is independent of its success or failure at finding S ∗ in phase 1,
so in our analysis we’ll assume it has succeeded in finding S ∗ .
For this phase, we use p to denote pT2 , where T2 was chosen such that p ≥ b log n log log n/n. To begin,
we fix an arbitrary set S −2 of k − 2 elements from S ∗ , and let U 0 = U \ S −2 . Let G be the undirected
graph on U 0 in which (ui , uj ) is an edge if and only if {ui , uj } ∪ S −2 is a k-set in D1 . Note that G is a
uniform sample from the distribution Gn−k+2,p , the Erdős-Rényi random graph distribution. By a theorem
of Alon and Azar [2], it follows that if we compare the pairs of elements (ui , uj ) defined by the edges of G,
then with probability at least 1 − δ1 we will be able to infer the relative order of at least a 1 − γ fraction of
pairs of elements of U 0 , where γ and δ1 depend on b. The remaining γ fraction of pairs are simply left with
their choice uninferred. Let E2 denote the “bad event” that the Alon-Azar algorithm does not succeed, with
Pr [E2 ] ≤ δ1 . We choose b large enough that γ ≤ ε/2k 2 and δ1 ≤ δ/4. Let H be a directed acyclic graph on
U 0 in which ui points to uj if the Alon-Azar procedure has inferred that ui is ranked ahead of uj , and there
is no edge between ui and uj otherwise.
Now we use the following procedure to answer queries of the form f (S). If S 6⊆ U 0 then S contains an
ineligible element and we answer arbitrarily. Otherwise, if S ⊆ U 0 , we look at all the pairwise comparisons
of elements in S according to H. If these pairwise comparisons form a complete acyclic digraph then we
choose the `th element in order; otherwise we answer arbitrarily.
For how many k-sets do we get the correct answer? Let P denote the set of node pairs in U 0 × U 0 for which
there is no edge in H. If E2 does not happen, then |P | ≤ γ n−k+2
. The number of k-sets that involve a pair
2
from P is thus at most
X
(ui ,uj )∈P
n−k
n−k+2 n−k
n
≤γ
≤ γk 2
.
k−2
2
k−2
k
Meanwhile, the number of k-sets that involve an element outside U 0 is at most
(k − 2)
n−1
k
n
n
≤ (k − 2)
≤γ
,
k−1
n
k
k
provided that n is large enough relative to k that k(k − 2)/n ≤ γ. But if a k-set S satisfies S ⊆ U 0 , and
S × S contains no pair of P , then all pairwise comparisons inside S have been determined and thus we can
report the correct
value
of f (S). Hence if E2 does not occur, we report the correct value on all but at most
n
n
2
γ(1 + k ) k ≤ ε k k-sets, as desired.
13
The full algorithm and its analysis. Now let’s consider the full algorithm. It starts by identifying a set
S ∗∗ of ineligible elements in phase 1. If S ∗∗ does not have k − 1 elements, it terminates with no answer.
Otherwise, it runs the second phase on the assumption that S ∗ = S ∗∗ .
If the event E1 ∪ E2 does not occur, then S ∗ = S ∗∗ and the output of phase 2 satisfies the performance
guarantee of Theorem 4.1. With probability at least 1 − (δ1 + δ2 ) ≥ 1 − δ/2, this union E1 ∪ E2 does not
occur, in which case the full algorithm satisfies the performance guarantee.
The above proof holds for all values of ` except for the two extremes of ` = 1 and ` = k, as stated.
This distinction is intriguing since the two extreme values are the ones that don’t exhibit choice-set effects:
the individual making decisions is then selecting elements according to a fixed total ordering of U . The
challenge with ` = 1 and ` = k is actually that the notion of “ineligible” elements becomes more subtle:
there are elements whose relative position in the embedding can be resolved, but only with a very large
number of passive queries. Finding the right performance guarantee for this case is an interesting open
question.
5
Distance comparison
All of our results thus far focus on recovering choice functions that are comparison-based functions over
ordered alternatives. As noted in the introduction, this class of functions is surprisingly rich, with the ability
to capture compromise effects in choices along any one-dimensional frontier, a choice-set effect that cannot
be exhibited by functions that merely maximize over an ordering. The preceding sections develop a theory
of inference for such comparison-based functions.
In this section we shift our focus to recovering choice functions defined by a different structural relationship,
namely distance comparisons in a metric embedding. A choice function f on k-sets is distance-comparisonbased if the value f (S) can be computed purely using comparisons on the pairwise distances in a embedding
h with metric d(·, ·), i.e. based on comparisons on the set of pairwise distances {d(h(ui ), h(uj )) : ui , uj ∈
S}.
Distance comparisons form the basis of an additional important family of choice scenarios, namely choice
queries answered with the “most medial” or the “most distinctive” alternative in a set, and in particular they
model an important choice-set effect called similarity aversion [28]: given a choice between two dissimilar
alternatives A and B and one of two alternatives A0 and B 0 that are similar to A and B respectively, similarity aversion arises when f ({A, B, B 0 }) = A but f ({A, B, A0 }) = B. Essentially: given two similar
alternatives and one dissimilar alternative, the dissimilar option is chosen.
It is important to note that similarity aversion cannot be modeled by a choice function that is strictly
comparison-based: such a function can only evaluate ordinal comparisons, and when considering two elements A and B embedded in one dimension, a comparison-based function cannot resolve whether a third
element A0 positioned between A and B is closer to A or closer to B.
The remainder of the section has the following format. First we show how similarity aversion can be modeled using distance-comparison-based choice functions. Next, we present two observations that suggest
some of the difficulties that must be overcome to learn such functions, a seemingly more difficult inference context than comparison-based functions. We then connect our observations to a broader literature on
learning metric embeddings, albeit without resolving our inference questions.
14
b
a
c
Figure 3: A k-set S = {a, b, c} of k = 3 alternatives embedded in 2 dimensions. In this setting
we can think of distance comparison as a comparison-based choice between three pairwise distances
{d(a, b), d(b, c), d(a, c)}. When a distance-comparison-based choice function f selects the outlier a, this
choice is effectively a comparison-based choice of the shortest distance, d(b, c). When f selects the median
element b, this choice is effectively a comparison-based choice of the longest distance, d(a, c).
Similarity aversion from distance comparisons. We now describe two choice functions of principle
importance, and their capacity for being formulated as distance-comparison-based functions: the median
choice function and the outlier choice function. We restrict our definitions to choices over k-sets where k is
odd. The outlier choice function for triplets (k = 3) will serve as our model of similarity aversion.
The median choice function selects the element of a k-set S in Rm with metric d(·, ·) that minimizes the
sum of distances to all other elements. In m = 1 dimension this choice is the traditional median element,
and it can be selected according to the following distance-comparison procedure: repeatedly find the pair
of alternatives x, y ∈ S that are furthest apart and remove them from S. Since k is odd, after (k − 1)/2
rounds there will be a single remaining element; return that element as the choice. Thus we see that the
median choice function can be formulated as both a comparison-based function—in the earlier sections,
q(k−1)/2,k —or as a distance-comparison-based function.
For m > 1 dimensions and sets of size k = 3 it is easy to verify that the above distance-comparison
procedure will still return the element that minimizes the sum of distances. For m > 1 and k > 3, however,
it is an open question whether a distance-comparison-based function can return the element that minimizes
the sum of distances. Observe that this question amounts to solving a version of the Fermat-Weber problem
[32] with a very restricted functional toolkit, and may be quite difficult. We are not aware of any prior work
on the capabilities of distance-comparison-based functions. Here we are principally interested in the special
case of k = 3, allowing us to skirt this difficulty.
Building on the median choice function, the outlier choice function selects the element of a k-set S that is
farthest (in Rm using d(·, ·)) from the median element (the median element being the element that minimizes
the sum of distances to all elements). The outlier choice function can clearly be written as a distancecomparison-based function whenever the median choice function can. For k = 3 elements it is precisely a
model of similarity aversion on triplets.
As a general comment on the capabilities of distance-comparison-based functions, it is clear that they can
make choices that ordinary comparison-based functions cannot, but it is important to highlight that the
reverse is also true: the median choice function is the only position-selection function (in one dimension)
that can be formulated as a distance-comparison-based function. A distance-comparison-based function
cannot select a maximal or minimal element (or any off-center position), since it has no way of orienting a
choice with regard to the direction of “more” (in any dimension). The sets of comparison-based functions
and distance-comparison-based functions are therefore not neatly nested.
Distance comparison for triplets. In the particular case of k = 3, where choices are made over triplets
S = {u, v, w}, we can think of a choice for an alternative u ∈ S implicitly as a choice for the distance
15
d(v, w) between the two remaining alternatives in S. For a triplet {u, v, w}, the effective comparison-based
query is over the set of distances {d(u, v), d(u, w), d(v, w)}, where a choice of a pairwise distance
maps to
a choice of the complementary alternative. See Figure 3 for an illustration. There are N = n2 distances,
and so it may seem as though it would be possible to learn the ordering in O(N log N ) queries in the active
query framework, with similar results carried over for other query frameworks. Reality is more complicated.
We now give two observations on the difficulties of carrying over comparison-based results to distance
comparisons. The first observation asks: when are there enough queries to learn the relative ordering of all
the distances? The second observation pertains to the restricted nature of the distance triplets that can be
queried.
n
First, notice that each query for a 3-set furnishes 2 inequalities between distances. There are
3 triplet
queries for n elements, which
means that querying for every possible 3-set
would produce 2 n3 inequalities.
Meanwhile there are n2 pairwise distances, meaning that there are n2 ! possible permutations of the distances, only one of which is the sorted order. A sufficient condition for inferring all choices is to know the
sorted order of all the distances. Focusing on the outlier choice function (selecting the minimum distance
that effectively returns the outlier element) in onedoes not need to know the relative order of the two largest
distances. This tells us that it would take log2 ( n2 !) − 1 bisections of the set of permutations to identify the
sorted order of all but the two largest distances.
We observe that 2 n3 < log2 ( n2 !) − 1 for n ≤ 5, which tells us that for n ≤ 5 elements we will learn the
choice for every query before we can possibly know the sorted order of the relevant pairwise distances. This
tells us that a generic procedure that seeks to learn all the pairwise distances will not always succeed.
While our earlier query complexity results focus on asymptotic complexity, the correctness of these algorithms holds for all n. The limiting observation presented here is specific to distance comparisons
and does
n
not apply to ordinary comparisons: in that context there are only n! permutations rather than 2 !.
Second, observe that we cannot query for general triplets of distances {d(u, v), d(w, x), d(y, z)}, but are
in fact restricted to queries in the special case of w = u, y = x, and z = v. It is unclear for what n it is
possible to learn the relative ordering of all the distances from such restricted distance comparisons. While
both of these initial observations are discouraging, an efficient inference algorithm for distance-comparisonbased functions would contribute a useful tool for learning in the presence of similarity aversion and other
choice-set effects, and we deem it important to present distance-comparison-based functions as significant
objects of study.
As an additional open direction for future work, we briefly mention the choice-set effect known as the decoy
effect (or asymmetric dominance). The decoy effect describes when the presence of a similar but inferior
alternative increases the desirability of an option. The difference between similarity aversion and the decoy
effect is that the former hinges on similarity while the latter incorporates both similarity and inferiority.
As such, modeling the decoy effect requires a composition of both comparison and distance-comparison.
We leave the study of this alluring general class of choice functions, which contains comparison-based and
distance-comparison-based choice functions as special cases, as future work.
Relationship to metric embeddings. Beyond providing a model for similarity avoidance in the behavioral
sciences, the ability to recover distance-comparison-based choice functions also speaks to a broad literature
on learning metric embeddings of data from distance-comparison-based queries [20]. In that literature,
the stochastic triplet embedding technique [30] has recently been introduced as a way to embed a generic
dataset of elements through answers to choices of the form “Is A more similar to B or to C?”. This question is
effectively a comparison-based query requesting a choice from the set {d(A, B), d(A, C)}. As an extension
of that work, the crowd median algorithm [13] tries to learn embeddings from triplet queries with the request
16
“Out of three shown items pick one that appears to be different from the two others.” The crowd median
algorithm is employing precisely the outlier choice function for k = 3 described in this section.
Known work on the crowd median algorithm, however, leaves open the question of what embeddings it
can learn. We observe that outside the behavioral modeling that drove our work, a slight modification of
the crowd median algorithm to align with our results gives a method that can in fact learn embeddings
efficiently. We define the generalized crowd median algorithm, which instead asks questions of the form
“of these k pairs, which pair is least similar?”. Under this more flexible query framework, the ordering on
the distance could then be inferred by the algorithms developed in this work: for n elements, it would then
be possible in an active query framework to learn the ordering of the N = n2 distances in O(N log N )
queries, for large n.
Our treatment of distance-comparison-based queries also speaks to a broad line or research in psychology on
pair selection queries used to infer cognitive embeddings [26, 14, 27]. In these settings, sets of k elements
(where k is often large) are presented to subjects with the question “which two elements are most similar?”.
Such queries generalize the crowd-median algorithm. Lastly, very recent work has developed learning
results for binary clustering (a simple form of embedding) using so-called triangle queries of the form
“which of these birds belong to the same species?” [31], with possible relevance to learning from distancecomparison-based choices.
6
Discussion
The prevalence of choice-set effects in human decision-making highlights a need for a principled inference
model that can support learning such effects. In this work we’ve proposed a framework aimed at helping
with such an integration, focussing on comparison-based choices. A natural line of inquiry extending from
choice-set effects quickly leads to rich issues related to the theory of sorting, including passive sorting
(“sorting in one round”) and sorting with noisy information.
There are clearly many directions for further work. We begin by mentioning a very concrete problem: while
we studied passive queries and population mixtures, we did not attempt to combine these two aspects to infer
a mixed collection of choice functions from a stream of passively observed queries. A challenge in trying to
achieve such a combination can be seen in the technical ingredients that would need to be brought together;
the mechanics of the Feige et al. procedure [10] and Alon-Azar procedure [2] are not obviously compatible.
Even the basic question of binary sorting with passive queries in the presence of noisy information appears
to be fairly open.
Many questions remain regarding how to capture relevant population-level heterogeneities in large-scale
choice corpora. Our framework for comparisons generally assumed a universally agreed upon ordered
embedding, and it is very reasonable to suggest generalizations to a dispersed distribution over possible
embeddings. A long line of work has brought distributions over rankings into the literature on learning
preferences [18, 11, 6], including through comparisons [16], and it would be natural to explore analogous
distributional modeling for the embedding that underlies comparison-based choice functions. Analyzing
mixtures of comparison-based choice functions as a model of probabilistic discrete choice [3] is another
closely related open research direction.
One can also consider generalizing the embedding that defines the structure of the alternatives and the choice
sets. For example, we could think about the alternatives as being embedded not just in one dimension (or
a one-dimensional Pareto frontier) but in multiple dimensions, and an individual could execute a sequence
of comparison-based rules to select an item from a choice set. Such a generalization could provide a way to
17
incorporate a number of other well-documented choice-set effects [28], and could form intriguing potential
connections to the elimination by aspects [29] model of discrete choice.
We find it encouraging that in the face of choice behavior much more complex than ordered preferences,
we are able to fully match most of the known query complexity results from the theory of sorting from
binary comparisons. Continued work to develop a more complete theory of inference for other increasingly
rich classes of choice functions has the potential to lay a foundation for a much needed unified theory for
learning choice-set effects.
References
[1] Shivani Agarwal, Corinna Cortes, and Ralf Herbrich. Learning to Rank (NIPS workshop). MIT Press,
2005.
[2] Noga Alon and Yossi Azar. Sorting, approximate sorting, and searching in rounds. SIAM J Discrete
Math, 1(3):269–280, 1988.
[3] George Baltas and Peter Doyle. Random utility models in marketing research: a survey. J Bus Res,
51(2):115–125, 2001.
[4] Austin Benson, Ravi Kumar, and Andrew Tomkins. On the relevance of irrelevant alternatives. In
WWW, pages 963–973, 2016.
[5] Béla Bollobás and Moshe Rosenfeld. Sorting in one round. Israel Journal of Mathematics, 38(12):154–160, 1981.
[6] Mark Braverman and Elchanan Mossel.
arXiv:0910.1191, 2009.
Sorting from noisy information.
arXiv preprint
[7] Shuo Chen and Thorsten Joachims. Modeling intransitivity in matchup and comparison data. In
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, pages 227–
236. ACM, 2016.
[8] Shuo Chen and Thorsten Joachims. Predicting matchups and preferences in context. In Proceedings of
the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages
775–784. ACM, 2016.
[9] Federico Echenique, Sangmok Lee, and Matthew Shum. The money pump as a measure of revealed
preference violations. Journal of Political Economy, 119(6):1201–1223, 2011.
[10] Uriel Feige, Prabhakar Raghavan, David Peleg, and Eli Upfal. Computing with noisy information.
SIAM J. Computing, 23(5):1001–1018, 1994.
[11] Michael A Fligner and Joseph S Verducci. Distance based ranking models. J Roy Statist Soc Ser B,
pages 359–369, 1986.
[12] Paul E. Green, Abba M. Krieger, and Yoram Wind. Thirty years of conjoint analysis: Reflections and
prospects. Interface, 31, 2001.
[13] Hannes Heikinheimo and Antti Ukkonen. The crowd-median algorithm. In HCOMP, 2013.
18
[14] Li-Jun Ji, Zhiyong Zhang, and Richard E Nisbett. Is it culture or is it language? examination of
language effects in cross-cultural research on categorization. Journal of personality and social psychology, 87(1):57, 2004.
[15] Emir Kamenica. Contextual inference in markets: On the informational content of product lines.
American Economic Review, 98(5):2127–2149, 2008.
[16] Tyler Lu and Craig Boutilier. Learning mallows models with pairwise preferences. In ICML, pages
145–152, 2011.
[17] R Duncan Luce. The choice axiom after twenty years.
15(3):215–233, 1977.
Journal of Mathematical Psychology,
[18] Colin L Mallows. Non-null ranking models. i. Biometrika, pages 114–130, 1957.
[19] Stephen Ragain and Johan Ugander. Pairwise choice markov chains. In NIPS, pages 3198–3206, 2016.
[20] Matthew Schultz and Thorsten Joachims. Learning a distance metric from relative comparisons. NIPS,
page 41, 2004.
[21] Amartya Sen and Prasanta K Pattanaik. Necessary and sufficient conditions for rational choice under
majority decision. Journal of Economic Theory, 1(2):178–202, 1969.
[22] Eldar Shafir, Itamar Simonson, and Amos Tversky. Reason-based choice. Cognition, 49:11–36, 1993.
[23] Or Sheffet, Nina Mishra, and Samuel Ieong. Predicting consumer behavior in commerce search. In
ICML, 2012.
[24] Itamar Simonson. Choice based on reasons: The case of attraction and compromise effects. Journal
of Consumer Research, 16:158–174, 1989.
[25] Itamar Simonson and Amos Tversky. Choice in context: Tradeoff contrast and extremeness aversion.
Journal of Marketing Research, 29(3):281–295, 1992.
[26] Sandra S Smiley and Ann L Brown. Conceptual preference for thematic or taxonomic relations:
A nonmonotonic age trend from preschool to old age. Journal of Experimental Child Psychology,
28(2):249–257, 1979.
[27] Thomas Talhelm, Jonathan Haidt, Shigehiro Oishi, Xuemin Zhang, Felicity F Miao, and Shimin Chen.
Liberals think more analytically (more “weird”) than conservatives. Pers Soc Psychol Bull, 41(2):250–
267, 2015.
[28] Jennifer S Trueblood, Scott D Brown, Andrew Heathcote, and Jerome R Busemeyer. Not just for
consumers context effects are fundamental to decision making. Psychological science, 24(6):901–
908, 2013.
[29] Amos Tversky. Elimination by aspects: A theory of choice. Psychological Review, 79(4):281–299,
1972.
[30] Laurens Van Der Maaten and Kilian Weinberger. Stochastic triplet embedding. In MLSP, pages 1–6,
2012.
[31] Ramya Korlakai Vinayak and Babak Hassibi. Crowdsourced clustering: Querying edges vs triangles.
In NIPS, pages 1316–1324, 2016.
[32] George O Wesolowsky. The Weber problem: History and perspectives. Computers & Operations
Research, 1993.
19
[33] Dawei Yin, Bin Cao, Jian-Tao Sun, and Brian D. Davison. Estimating ad group performance in sponsored search. In WSDM, pages 143–152, 2014.
20
| 2cs.AI
|
Go game formal revealing by Ising model
Matías Alvaradoa , Arturo Yeeb, and Carlos Villarreal c
a
Center of Research and Advanced Studies – IPN, Department of Computer Science, Av. Instituto
Politécnico Nacional 2508, San Pedro Zacatenco, 07360, Ciudad de México.
b
Universidad Autónoma de Sinaloa, Facultad de Informática Culiacán, Sinaloa, México.
c
National Autonomous University of Mexico
(UNAM), Institute of Physics, Circuito de la
Investigación Científica, Ciudad Universitaria, 04510, Ciudad de México.
Abstract
Go gaming is a struggle for territory control between rival, black and white, stones on a board.
We model the Go dynamics in a game by means of the Ising model whose interaction coefficients
reflect essential rules and tactics employed in Go to build long-term strategies. At any step of the
game, the energy functional of the model provides the control degree (strength) of a player over
the board. A close fit between predictions of the model with actual games is obtained.
Keywords: Ising model; Dichotomy Variables Phenomenon; Computer Go; Go game
phenomenology.
1. Introduction
Mathematical modeling and algorithmic setting of Go game is a meaningful problem in the state
of the art of sciences. The complex interaction among elementary black and white stones over a
squared board in Go gaming, looks-like similar to the modeling of complex interaction from
simple elements in major nature [24, 25] and social phenomena [26, 30]. Formal analysis of Go
game is core in advances in computer science likewise the analysis of Chess was during the 20th
century [1]. We use the Ising model [24] classical tool for modeling dynamic changes in complex
interaction to fundament the algorithm to quantify the cooperation strength among allied stones or
tension against the adversary stones struggling in a Go game beat. At some moments during a Go
match, a phase-transition-like process corresponds to strong preeminence of blacks over white or
conversely. The ever intricate Go interaction and the measure of each gamer’ strength at any
game step, as the major challenge for Go automation, it is fine model with the Ising Hamiltonian.
10/19/2017 2:14 PM
1.1 Go game
Go is a 2 players, zero-sum and complete information game, black versus white stones that
official goban board is a 19 x 19 grid [2]. By turn, each player places one black/white stone on an
empty board cross-point position; black plays first then white and so on. White receives a
compensation komi by playing the second turn [3]. Goal of a GO successful game is to get the
most of the board territory by means of GO tactics of invasion, reduction, nets, ladders and
connections. One stone’s liberty is a contiguous empty board cross-point in the vertical or
horizontal direction. Stone allocation in an empty board neighborhood is an invasion, and if
adversarial places one stone close to invasion it does a reduction. Same color stones do a net over
adversarial stones by surrounding them, and do a ladder by surrounding and leaving a sole liberty,
Atari, to adversarial stones. Connection of ally stones is by placing one same color stone between
them. Same color stones joined in horizontal or vertical line form up one indivisible compound
stone, hence single or compound stones are struggling for achieving territory control. A stone
placed on board is captured by adversary reducing their liberties to zero then removed. Principal
concepts for GO are being alive or dead. A stone is alive if cannot be captured and is dead if
cannot avoid be captured. Placement of stone being directly captured is suicide that is not
allowed. Go strategies follow sequences of tactics aimed for the most board area control. The
game ends when both players pass turn. The score is computed based on both board territory
occupied and the number of adversarial single stones captured. The winner has the largest
territorial control and the largest number of captures, as the most usual criteria.
The hardest task for Go gaming is to evaluate the control board area and the dominion status of a
player at a given stage of the game, for humans or computer players. Fig. 1 shows the flow
diagram for computer Go gaming, which disarming simplicity not avoids a complex
combinatorial process to attain efficient strategies [11, 12].
10/19/2017 2:14 PM
Fig. 1 Go gaming flow diagram
1.2 Computer Go
To overcome the above mentioned Go gaming complexity was a major challenge for human Go
players, as well as by last two decades for computer Go scientists and developers [2], [13].
Categorical computer AlphaGo's triumph of 4/5 over Lee Sedol, one of the best world Go player,
was a meaningful triumph of computational intelligence by 2016 [42]. Top preeminence of
AlphaGo is the 60 - 0 simultaneous triumphs over the best human Go players by February 2017
[14], [15, 16].
A Go gaming state or Go state is a board configuration given by the combination of black-whiteempty board Go gaming positions. The Go state space cardinality is 319x19 ~ 10172. The game tree
records the different game decisions the players can try during a game from the start to the end,
so records the different paths between the got states. One path from start to end state registers the
sequence of moves in a match. Go game tree cardinality is by 10a, a = 10172. As a result, the
automation of successful Go tactics and strategies, translated in efficient paths to win a match, is
hugely complex. In average, the branching factor for Go ranges 200 - 300 possible moves at each
player’s turn, while 35 - 40 moves for Chess, which state space and game tree cardinality is 1050
and by 10123 [11]; respectively 1018 and 1054 for Checkers.
Hard task in Go automation as for human Goers as well, is to estimate the potential to strength
territory dominance for a given try, that implies classify the best sequence of states pick from the
enormous number of Go states to decide next advantageous Go move [3, 17, 18]. Computer Go
[10] uses heuristic-search [15, 16], machine learning [17] and pattern recognition techniques to
identify eyes, ladders and nets [18], [19], [9]. Monte Carlo Tree Search (MCTS) was extensively
used for simulation-based search algorithms [15, 20, 21] through the record of moves of previous
games, and given a Go state, from thousands or millions simulations the best average is applied to
ponder the next movement [15, 20], that is highly time consuming. The no apply of a-prioriknowledge to identify tactics or strategies is the major drawback of MCTS usage in computer Go
[22, 23] [23]. In computer (cost) complexity to solve a problem [39], time refers to the number of
execution steps an algorithm used to, and space refers to the memory amount used to. Go gaming
complexity is EXPTIME-complete [40], and more precisely PSPACE-complete [41].
10/19/2017 2:14 PM
1.3 Recognition challenge
The recognition and discrimination of meaningful perceptual stimuli presupposes the active
formation of stable perceptual elements to be recognized and discriminated. First, consider the
spontaneous grouping of stones of the same color which occurs during visualization of a GO
board. The stones are organized into distinct groups, clusters, or armies even though they may be
sparsely scattered about or somewhat intermingled. Grouping is usually the result of proximity of
stones of the same color or the predominance of stones of one color in an area, but can be affected
by other characteristics of the total board situation. Closely related in grouping is segmentation,
which is also discussed in Kohler. The area subtended by the board is divided into black and
white territories, each of which maintains its own integrity in the visual field. These segments are
a measure of the territory which is controlled by either side, hence are an important factor in the
assessment of a GO board. Another example is the formation of "spheres of influence" about a
stone or group of stones. Influence is not an inherent property of stones, but appears to be induced
in them by our process of perception. Yet they are a crude measure of the potential of a stone or
army of stones for controlling territory on the board. The spontaneous image formed by the
visualization of a GO board appears to be a complicated assemblage of perceptual units and
subunits. For example, the stones themselves have their own perceptual identity while at the same
time they are parts of chains or groups of stones. This report will describe a simulation model for
visual organization. It will use transformations which create information corresponding to the
perceptual features discussed above, storing them in a computer internal representation.
Our point is the use of the Ising model and Hamiltonian to precise characterize the intense
interaction in Go gaming, as for interaction in electromagnetism and thermodynamic is made. In
Section 2 the CFG (Common Fate Graph), the Ising model and the energy function to estimate
the synergy strength of each set of ally stones in a Go state are introduced. In Section 3
experiments and the analytical comparison of results follow; Section 4 is for Discussion and
Section 5 for Conclusions.
Table 1.
2. Go gaming synergy
In our proposal a Go state is represented by a CFG [6], being essential to stand back efficient
automation. CFG represents a Go state by means of principal and secondary nodes, see Fig 2:
each Go stone in the state is a CFG principal node labeled with the number of single stones that
10/19/2017 2:14 PM
compose it, and each stone’s liberty is a CFG secondary node. Go state representation by CFG it
neatly comprises the each stone’ size, the linked relationship with allies, with adversaries, and
with liberties around each of the stones. Using CFG, Go sequence of moves, so the deployment of
tactics and strategies during a Go game is easy logged, thus follow up the evolution of game
interaction –depicted in a lattice graph–, formalized by the Ising energy function and the
algorithms do quantify the force of atoms or molecules of black and white stones regarding to the
relative position among allies and adversaries on board.
Fig. 2 White stone in the left superior corner is 11 single stones, 6 liberties, 1 shared with the
below white 5 single stones, and one black liberty shared with at right black 18 single stones.
2.1 Ising model and Hamiltonian
Ising model describes magnetic properties of materials from the interactions of constituent atomic
spins, as elementary magnetic moments which possess a dichotomy behavior that point randomly
in the up or down directions; variables 𝑥𝑖 represent the ith-spin state and may acquire dichotomy
value 1 or -1. Each spin interacts with neighboring spins or with external fields that tend to align
them in the applied direction, and depending on the strength of interactions, whole system get
phase transitions among emergent spin clusters domains, percolate through the whole system, or
fill out complete regions of the material. The spins are arranged in a n-dimensional lattice, which
energy interaction is described, restricted to n=2, by the Hamiltonian Eq. (1):
10/19/2017 2:14 PM
𝐻 = − ∑ 𝑤𝑖𝑗 𝑥𝑖 𝑥𝑗 − 𝜇 ∑ ℎ𝑖 𝑥𝑖
𝑖𝑗
(1)
𝑖
wij sets for interaction between spin 𝑖 and 𝑗, 𝜇 the magnitude of an external magnetic field, and
ℎ𝑖 the magnetic field contribution at site 𝑖; for a homogeneous external field, ℎ𝑖 = 1.
Phase transition by heat transfer it transforms a thermodynamic system from one state of matter
to another, usually between solid, liquid and gaseous states of matter [24]: a liquid that become
gas upon heating to the boiling point results in an abrupt change in volume. Hence, properties of
the matter suddenly change as a result of the change of condition on temperature, pressure or
others. Phase transitions are common in nature phenomena [25, 32, 36] in Biology, Physics or
Chemistry, and is applied in cutting edge top technologies [31, 33, 38].
2.2 The Go game energy function
Our definition of energy function stands back algorithms to compute the power of stone patterns
in a Go state, this way account board dominance. We use specific 2 dimensional Ising model for
displaying phase transition in Go board. The energy function uses CFG representation of Go
states to captures the interaction among allied stone, versus adversaries, as well as with respect to
liberties involved in. Associated to Ising Hamiltonian in Eq. (1), the Go energy function should
embrace parameters to deal with:
The numbers of atomic (single) stones in a molecular (compound) stone.
The number of eyes a stone is involving.
The tactic pattern the stone is making.
What’s the strength of ally stones that do synergy among it.
What’s the strength of adversary stones that adversarial fight.
To get this goal, we propose the quantitative description of stone 𝑖 by means of the elements
involved in Eq. (2):
𝑘
𝑖
𝑥𝑖 = 𝑐𝑖 (𝑛𝑖 + 𝑟𝑒𝑦𝑒
).
(2)
𝑛𝑖 sets the number of single stones, 𝑟𝑒𝑦𝑒 is the constant to represent the occurrence of an eye,
𝑟𝑒𝑦𝑒 > 1, or 𝑟𝑒𝑦𝑒 = 0 if no eye; 𝑘𝑖 sets the number of eyes in stone 𝑖, and 𝑐𝑖 is the stone color, 1
10/19/2017 2:14 PM
𝑘
𝑖
for white, and -1 for black. Hence, 𝑟𝑒𝑦𝑒
quantifies the impact of the number of eyes in 𝑖, and
𝑘𝑖 = 2 says that could never be captured. If no eye 𝑥𝑖 just indicates the 𝑖 size and color.
In Hamiltonian of Ising model for Go parameter, 𝑤𝑖𝑗 sets the ratio of union or repulsion between
each pair 𝑖, 𝑗 of single or compound stones, so 𝑤𝑖𝑗 encompasses tensions alongside paths joining
stone 𝑖 to 𝑗, being affected by the presence and strength of adversary stones that may impede the
𝑖 − 𝑗 connection; or, as well as, by the presence of allied stones that result in mutual strengthen.
Up to rules and tactics in Go gaming the feature interaction among stones is assessed by means of
next Eq. (3):
(𝑖𝑗)
𝑤𝑖𝑗 = ∑𝑠 𝑟𝑡 𝑥𝑠
(𝑖𝑗)
𝑥𝑠
(3)
describes each stone s lying between 𝑖 and 𝑗, that makes a tactic pattern; 𝑟𝑡 sets a quantify of
a-priori known power of the pattern 𝑡: eye (𝑟𝑒𝑦𝑒 ), net (𝑟𝑛𝑒𝑡 ), ladder (𝑟𝑙𝑎𝑑 ), invasion (𝑟𝑖𝑛𝑣 ),
reduction (𝑟𝑟𝑒𝑑 ). Pattern parameters fit a total order > induced by a-priori knowledge of Go
tactics power, by an averaging procedure from real matches between top level players –estimation
open to analysis and precisions: we say that an eye tactic has top power, followed by a net, a
ladder, an invasion and a reduction. Thus, 𝑟𝑒𝑦𝑒 > 𝑟𝑛𝑒𝑡 > 𝑟𝑙𝑎𝑑 > 𝑟𝑖𝑛𝑣 > 𝑟𝑟𝑒𝑑 > 𝑟𝑠𝑙 . Single liberty
parameter value is 𝑟𝑠𝑙 = 1.
In the Go game perspective, the first term of Hamiltonian in Eq. (1) accounts the interaction of
collaboration among patterns of same color stones, or the fight against adversaries; for second
term, the particular external field ℎ𝑖 adds the number of liberties the stone 𝑖 has. Henceforth,
given any Go state, by definitions in equation (2) and (3) used in equation (1) we quantify the
every stone’s power and, on the base of each of them, the interaction strength among ally and/or
adversarial stones: what’s the contribution of each eye, ladder or net pattern; or by invasion,
reduction or connection tactics.
2.3 Phase Transition
On the other hand, the evolution leading to territory control as a result of phase-transition-like
process, like parallel version of changes of matter by heat transmission in nature phenomena, is
follow up. The heated stones sequentially placed as a Go move it eventually change the state
board abruptly, similar to matter changes. This sequence of moves (states) yields to a Go phasetransition process that it brings sudden board area dominance. In Fig 3 the sequential placement
of red-black-flag stones makes the override over white in this board area, alike sequential local
phase transition.
10/19/2017 2:14 PM
Fig. 3 Go phase-transition by placement of black stones.
3. Experiments
We use Go games’ information in http://www.go4go.net/ to evaluate this proposal. Results of
experiments show the worth using Ising Hamiltonian to compute the synergy strength of Go state
patterns during games. Actually, close similar results to the ones in top official tournaments [5],
including the AlphaGo games against human Go players, are obtained.
The standard format of smart game files (SGF) containing the decision game trees of games [4] is
CFG translated to quantify any Go state by the energy function.
3.1 Human Go games
In experiments the energy function is applied to quantify the patterns’ strength in every Go state
during a match. The strength of black and white stones patterns is valued to pinpoint what is
better placed on board at each state in the sequence. After each move comparison between black
versus white patterns’ strength by energy functions follows. In next figures blue line is for blacks
and red line is for whites.
10/19/2017 2:14 PM
Classical Go games in Fig 4 and Fig 5, well known games are the input to simulator. In 1961-0913,14, both 9p, Sugiuchi Masao, play black stones versus Fujisawa Hosai, the winner that plays
white stones.
In Fig 5, the game in 2003-04-23 , between Yi Se Tol played black stones and beat to white
stones player Hong Chang Sik.
10/19/2017 2:14 PM
In Fig 6 we illustrate the dynamic of the match played by Murakawa with black stones versus
Cho Chikun with whites in the 39th Japanese Kisei. Since the start and during one hundred
movements, according to the valuation of the energy function, almost equal strength of black and
white stones happened.
Fig. 6 During moves 100 – 170 the stones patterns’ strength values are separated, black strength
favored, the separation becomes bigger during moves 171 – 230 and white strength favored. At
the end, the strength of black stones is 667 and is 481 for white, as our energy function estimates.
This match score reported from human organization is similar win for black as well.
In Fig 7 graph shows the comparison of strength of Go patterns in match Lee Changho with
black stones versus Ryu Suhang 3p with whites, in Korean League 2014. According to energy
function calculus the strength of black stones is 424 and for the white player is -51, likewise
result reported. The black-whites balanced dominance breaks by the placement of a single stone
that leads to capture a lot of adversarial stones and mostly control the formerly shared area.
10/19/2017 2:14 PM
In described experiments the final score using energy function is according to the report from
each tournament’s organizers of top qualified Go players. We made dozens of similar
experiments using the Ising model energy function to evaluate the interaction and stones patterns
strength, from initial to final states in Go matches that is reported in http://www.go4go.net/. In 19
off 30 matches we got correct result, 8 off 30 we got minor error than 5%, and we got a bit noncorrect result error, in a range of 6% - 10%, close to the correct match score. Please, see related
material in http://delta.cs.cinvestav.mx/~matias/Teoria_Juegos/Go/EnergyFunction.
Fig. 7 A close fight happens in around 70 off 100 movements, so each stones pattern strength
were similar there. At move-state 73 a phase transition occurs and strength for blacks becomes
each late state greater than the strength for whites, until the game end.
10/19/2017 2:14 PM
3.2 AlphaGo versus humans players
(a) Gu Li vs. AlphaGo 2017
(b) AlphaGo vs. Zhou Ruiyang 2017
(c) Chang Hao vs. AlphaGo 2017
(d) AlphaGo vs. Shin Jinseo 2017
(e) AlphaGo vs. Cho Hanseung 2017
Fig.
6
Top
tournament
of
AlphaGo
please
see
the
official
results
at
https://deepmind.com/research/alphago/match-archive/master/.
Notorious feature of AlphaGo gaming is its ability to keep a kind of equilibrium during any
game, that avoids the temptation to try an always increasing control of board. For AlphaGo is
quite enough to keep the current advantage, so easily give up to certain board area influence
being aware of its strength over the whole board and game. This feature, to some extent, it
10/19/2017 2:14 PM
contrasts to the human Go players’ behavior trying to get the absolute prevail over adversary.
Human Goers may usually play to get this absolute, and by this mind lost details of weak
positions, that eventually lead for loosing points even the whole game. Obsession for ever
increasing board control is not a weakness of AlphaGo as a remarkable quality. This mentioned
AlphaGo feature requires a well-known knowledge of the game board configuration at any play
done.
3.3 AlphaGo vs. Lee Sedol games
Lee Sedol is one top Go player who won 18 Go world titles since he was 12 years. AlphaGo –
Lee Sedol was a five-game match gamed by March 2016 in Seoul, Korea. Lee Sedol played
blacks the odd games and whites the pair games. There, AlphaGo won the first, second, third
and fifth game and Lee Sedol the fourth, so 4/5 games won AlphaGo, being the first time a
computer defeat a top master so categorical. Figures 7 shows the graphs of each of the five
games: G1, G2, G4 and G5, each score similar to the official result. In G3 there is a small
difference between the official result and the obtained from simulation.
(a) Lee Sedol vs. AlphaGo (G1)
(b) AlphaGo vs. Lee Sedol (G2)
(c) Lee Sedol vs. AlphaGo (G3)
(d) Lee Sedol vs. AlphaGo (G4)
10/19/2017 2:14 PM
(e) Lee Sedol vs. AlphaGo (G5)
Fig. 7 Lee Sedol vs AlphaGo https://deepmind.com/research/alphago/match-archive/alphagogames-english/.
4. Discussion
Analysis of Go gaming shows the relevance of tactical moves causally connected [35]. Go
gaming records on long-term influence moves [15], so the right playing the early moves has
strong effects to the late moves outcome options. Historically, Go matches in ancient cultures
spend months and most of this time during the first 10 – 15 moves a game in average. Current
competition long hours, but most of this time is spent in the first dozen of moves as well.
Go gaming interaction processes among single black and white stones, simple elements –likewise
occurring in nature and social major phenomenon– that evolves to complex stones shapes
struggling to control most of Go board area. Ising model captures crucial features of interaction
phenomena, and we show that quite models the evolution of a Go game as the stochastic process
between dichotomy variables, spin black or white assigned to atomic and molecule Go stones;
eventually Go gaming interaction displays a phase-transition-like process, when circumstance of
balanced black-white dominance abruptly changes, and black stones strength dominance over a
given board area overriding white, or conversely.
4.1 Phenomenology of Go game
The closeness between our algorithmic simulation results and data from matches in top Go
tournaments make relevant our claim: phenomenology of Go gaming is well comprehended by
applying Ising model to analyze the evolution of complex patterns interaction during a game,
particularly the phase transitions process occurring there.
The alive and dead stones dynamic is a
10/19/2017 2:14 PM
The major advance in Go automation it backs in a bio-inspired method trying to emulate the
visual cortex of felines and eagles, characterized by an acute vision system. It results in the
artificial deep neural network (DNN) [42] that embraces dozens of layers each with long number
of neurons; the intense correlation and composition, like in the mentioned animals’ visual cortex
process, makes DNN a skillfully tool for recognition in complex scenarios. AlphaGo DNN uses
convolution integral functions for neurons activation [42].
Even the powerful computer AlphaGo empowerment, the phenomenology of Go gaming is not
revealing yet. We claim that phenomenology of Go gaming is superior comprehended modeling
Go interaction by means of Ising model. The likely stochastic process of pattern on Go board,
constructed by Go tactics during a beat is precisely modeled by Ising Hamiltonian. Some of the
interaction dynamic in Go gaming converges to phase transitions, likewise interaction phenomena
in physics, chemistry and biology, all they being modeled by Ising model. The stronger
interaction among same color stones the weaker interaction among adversarial ones. The energy
function modeling each of these processes embraces the atomic or molecular stones each other
influencing through time passing and temperature changes. Go gaming temperature corresponds
to the player’s talent displayed during the game.
We observe that the end behave of Ising Hamiltonian for Go not fits the usual thermodynamics
behave. At the end of any game there is ever one winner, so, the global systems is out of the
thermodynamics equilibrium.
4.2 Ising model in nature and social sciences
Classical Ising model deal with interaction and transitions properties occurring in statistical
physics [31], chemistry phenomena [24], and population biology [25]; recently, Ising model
apply is clever in nuclear medicine imaging [31], neural networks [32] and kinetics of protein
aggregation studies [34], and in complex pattern recognition on biological processes to classify
molecular or tissues patterns, by managing huge databases in Bioinformatics [36-38]. In economy
Ising model is applied to analyze non-equilibrium phase transitions [26] or macroeconomic
modeling, where emergence of patterns resulting from the collective interaction of a multitude of
elementary components or agents is observed [33]. In decision making approach a phase
transition threshold, with spontaneous symmetry-breaking of prices, leads to spontaneous
valuation in absence of earnings [26], similar to emergence of spontaneous magnetization in
absence of a magnetic field. In game theory, the interaction of the spin-player and the state-action
in the Ising model energy function is for payoff then apply the Nash equilibrium [27]; as well to
10/19/2017 2:14 PM
analyze repeated games [28], or to modeling systems on next nearest neighbor interaction with
phase transitions [29]. In Evolutionary Dynamics of cooperation in the Prisoner’s Dilemma game,
results on a dipole-model-like, interpreting the start of a lattice of cooperation as a thermo
dynamical phase transition [30].
5. Conclusions
Phenomenology of Go gaming as dichotomy variables interaction process is clarified by Ising
model. Experimental computer simulations allow conclusions that black – white stones’
interaction during Go gaming is traced by means of the proposed Ising model energy function.
Strength of any Go stones pattern is precisely calculated as a result of the relative positions
among ally stones as well as with respect to adversaries that dynamically change during the
match evolving. Evolution in Go gaming patterns eventually yields to phase-transition-like
phenomena occurring when one stone placement strength territory control at some board area that
overrides adversaries. During a Go match any stone at board is affected from the global board
state, which effect may be seen as the external field in the Ising model.
Acknowledgment: A. Yee special thanks to PROFAPI Programa de Fomento y Apoyo a
Proyectos de Investigación, with number PROFAPI2015/ 304. All the authors thank to Dr.
Ricardo Quintero Zazueta, the top senior Mexican Go player and researcher of the Education
Mathematics Department in CINVESTAV. He suggested the two classical Go games we simulate
and makes suggestions to subtle points in the paper.
References
[1] J. McCarthy, AI as sport, Science, 276 (1997) 1518-1519.
[2] K. Chen, Z. Chen, Static analysis of life and death in the game of Go, Inf. Sci. Inf. Comput.
Sci., 121 (1999) 113-134.
[3] D.B. Benson, Life in the game of Go, Information Sciences, 10 (1976) 17-29.
[4] Smart Game Format, in http://senseis.xmp.net/?SmartGameFormat.
[5] Go4go, in http://www.go4go.net/go/.
[6] T. Graepel, M. Goutrié, M. Krüger, R. Herbrich, Learning on Graphs in the Game of Go, in:
G. Dorffner, H. Bischof, K. Hornik (Eds.) Artificial Neural Networks — ICANN 2001, Springer
Berlin Heidelberg, 2001, pp. 347-352.
[7] N. Yoshiaki, Strategic Concepts of Go, Ishi Press, Japan, 1972.
[8] J. Kim, Learn to Play Go, Good Move Press, New York, 1994.
10/19/2017 2:14 PM
[9] A. Yee, M. Alvarado, Well-Time pattern recognition in Go gaming automation, in:
Mathematical Methods and Computational Techniques in Science and Engineering (MMCTSE),
2014, pp. 174-181.
[10] B. Bouzy, T. Cazenave, Computer Go: an AI Oriented Survey, Artificial Intelligence, 132
(2001) 39-103.
[11] L.V. Allis, Searching for Solutions in Games and Artificial Intelligence, in, University of
Limburg, The Netherlands, 1994.
[12] Elwyn R. Berlekamp, D. Wolfe, Mathematical Go: Chilling Gets the Last Point, A K Peters
Ltd Massachusetts, 1997.
[13] P. Drake, Y.-P. Chen, Coevolving partial strategies for the game of go, in: the International
Conference on Genetic and Evolutionary Methods 2008, pp. 312-318.
[14] M. Müller, Computer Go, Artificial Intelligence, 134 (2002) 145-179.
[15] S. Gelly, L. Kocsis, M. Schoenauer, M. Sebag, D. Silver, C. Szepesvari, O. Teytaud, The
Grand Challenge of Computer Go: Monte Carlo Tree Search and Extensions, Communication of
the ACM 55, 3 (2012) 106-113.
[16] D. Silver, R.S. Sutton, M. Müller, Temporal-difference search in computer Go, Mach.
Learn., 87 (2012) 183-219.
[17] N. Richards, D.E. Moriarty, R. Miikkulainen, Evolving Neural Networks to Play Go,
Applied Intelligence, 8 (1998) 85-96.
[18] E.D. Werf, H.J. Herik, J.H.M. Uiterwijk, Learning to Estimate Potential Territory in the
Game of Go, in: H.J. Herik, Y. Björnsson, N. Netanyahu (Eds.) Computers and Games, Springer
Berlin Heidelberg, Ramat-Gan, Israel, 2006, pp. 81-96.
[19] E.H.J. Nijhuis, Learning Patterns in the Game of Go, in: Artificial Intelligence, Universiteit
van Amsterdam, Amsterdam, 2006.
[20] S. Gelly, D. Silver, Monte-Carlo tree search and rapid action value estimation in computer
Go, Artificial Intelligence, 175 (2011) 1856-1875.
[21] C.B. Browne, E. Powley, D. Whitehouse, S.M. Lucas, P.I. Cowling, P. Rohlfshagen, S.
Tavener, D. Perez, S. Samothrakis, S. Colton, A Survey of Monte Carlo Tree Search Methods,
Computational Intelligence and AI in Games, IEEE Transactions on 4(2012) 1-43.
[22] G. Chaslot, S. Bakkes, I. Szita, P. Spronck, Monte-Carlo Tree Search: A New Framework
for Game AI, in: Proc. Artif. Intell. Interact. Digital Entert. Conf, 2008, pp. 216-217.
[23] J.B. Hoock, L. Chang-Shing, A. Rimmel, F. Teytaud, W. Mei-Hui, O. Teytaud, Intelligent
Agents for the Game of Go, Computational Intelligence Magazine, IEEE, 5 (2010) 28-42.
10/19/2017 2:14 PM
[24] E. Bonaccorsi, S. Merlino, M. Pasero, G. Macedonio, Microsommite: crystal chemistry,
phase transitions, Ising model and Monte Carlo simulations, Phys. Chem. Miner., 28 (2001) 509522.
[25] H. Matsuda, The Ising Model for Population Biology, Prog. Theor. Phys., 66 (1981) 10781080.
[26] D. Sornette, Stock market speculation: Spontaneous symmetry breaking of economic
valuation, Physica A: Statistical Mechanics and its Applications, 284 (2000) 355-375.
[27] S. Galam, B. Walliser, Ising model versus normal form game, Physica A: Statistical
Mechanics and its Applications, 389 (2010) 481-489.
[28] Z. Hongzhi, Y. Zhongxing, Ising-type suppergames on planar lattices, in:
Advanced
Computational Intelligence (ICACI), 2013 Sixth International Conference on, 2013, pp. 233-237.
[29] R. Jack, K.Y.M. Wong, Next nearest neighbour Ising models on random graphs, Journal of
Statistical Mechanics: Theory and Experiment, 2012 (2012) P09007.
[30] L.M. Floría, C. Gracia-Lázaro, J. Gómez-Gardeñes, Y. Moreno, Social network reciprocity
as a phase transition in evolutionary cooperation, Physical Review E, 79 (2009) 026106.
[31] J. Peter, R. Freyer, M.F. Smith, C. Scarfone, R.E. Coleman, R.J. Jaszczak, Nuclear medicine
image segmentation using a connective network, in: Nuclear Science Symposium, Conference
Record., IEEE, 1996, pp. 1782 -1786.
[32] G. Tkacik, E. Schneidman, M.J.I. Berry, W. Bialek, Ising models for networks of real
neurons, (2006).
[33] M. Aoki, New Approaches to Macroeconomic Modeling: Evolutionary Stochastic
Dynamics, Multiple Equilibria, and Externalities as Field Effects, Cambridge University Press
1998.
[34] M.-Y. Tsai, J.-M. Yuan, S.-H. Lin, Thermodynamic Insight into Protein Aggregation Using a
Kinetic Ising Model, J. Chin. Chem. Soc., 62 (2015) 21-25.
[35] B. Georgeot, O. Giraud, The game of go as a complex network, Europhysics Letters, 97
(2012).
[36] M. Hue, M. Riffle, J.-P. Vert, W. Noble, Large-scale prediction of protein-protein
interactions from structures, BMC Bioinformatics, 11 (2010) 1-9.
[37] M.D. Ritchie, A.A. Motsinger, W.S. Bush, C.S. Coffey, J.H. Moore, Genetic programming
neural networks: A powerful bioinformatics tool for human genetics, Appl. Soft Comput., 7
(2007) 471-479.
10/19/2017 2:14 PM
[38] O. Wolkenhauer, D. Fell, P. De Meyts, N. Bluthgen, H. Herzel, N. Le Novere, T. Hofer, K.
Schurrle, I. van Leeuwen, SysBioMed report: Advancing systems biology for medical
applications, Systems Biology, IET, 3 (2009) 131-136.
[39] Sanjeev Arora, B. Barak, Computational Complexity: A Modern Approach, Cambridge
University Press, Cambridge, 2009.
[40] R.A. Hearn, Games, Puzzles, and Computation, in: Department of Electrical Engineering
and Computer Science, Massachusetts Institute of Technology, Cambridge, 2006.
[41] C.H. Papadimitriou, Computational Complexity, Addison Wesley, Reading, Massachusetts
1993.
[42] D. Silver, A. Guang, A. Guez, L. Sifre1, G. van den Driessche, J. Schrittwieser, I.
Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner,
I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel & D. Hassabis, Mastering the
game of Go with deep neural networks and tree search, Nature, 529, 42016.
10/19/2017 2:14 PM
| 2cs.AI
|
Dyson’s spike for random Schroedinger operators and
Novikov-Shubin invariants of groups
arXiv:1602.06626v1 [math.PR] 22 Feb 2016
Marcin Kotowski
Bálint Virág
February 23, 2016
Abstract
We study Schroedinger operators with random edge weights and their expected
spectral measures µH near zero. We prove that the measure exhibits a spike of the form
µH (−ε, ε) ∼ |logCε|2 (first observed by Dyson), without assuming independence or any
regularity of edge weights. We also identify the limiting local eigenvalue distribution,
which is different from Poisson and the usual random matrix statistics. We then use the
result to compute Novikov-Shubin invariants for various groups, including lamplighter
groups and lattices in the Lie group Sol.
Contents
1 Introduction
2 The
2.1
2.2
2.3
2.4
2.5
2
eigenvalue process and its limit
The expected spectral measure of H . . . . . . .
Transfer matrices . . . . . . . . . . . . . . . . . .
Crossings and the rotation process . . . . . . . . .
Upper and lower bounds on the number of jumps
Convergence to the scaling limit . . . . . . . . . .
.
.
.
.
.
5
5
6
9
11
14
3 Local statistics and the expected spectral measure at zero
3.1 Local eigenvalue statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 The expected spectral measure at zero . . . . . . . . . . . . . . . . . . . . .
17
17
19
4 Spectral measures for groups
4.1 Random Schroedinger operators from group ring elements . . . . . . . . . .
4.2 Semidirect products by hyperbolic matrices . . . . . . . . . . . . . . . . . . .
4.3 Lamplighter groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24
24
25
29
1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
Introduction
In this paper, we study a class of Schroedinger operators with random edge weights given
by:
(Hf )(i) = ai−1 f (i − 1) + ai f (i + 1)
where ai form a stationary process. One can think of such an operator as a perturbation of
the standard adjacency operator on Z (with all ai = 1) by random noise. It is well known
that the presence of even small amount of noise can dramatically influence the spectral
properties of H. While the spectral measure of the standard adjacency operator is absolutely
continuous, the noisy variant typically has a fully discrete spectrum with exponentially
localized eigenfunctions. This phenomenon is known as Anderson localization and is well
studied in mathematical physics.
A natural object of study is the expected spectral measure, denoted µH , which is the
spectral measure of H averaged over all random instances. Here, another phenomenon
occurs, related to the behavior of µH at zero. The standard adjacency operator on Z has
spectral measure µ with bounded density near zero, so in particular µ(−ε, ε) ∼ πε . In
contrast, µH can exhibit behavior of the form:
µH (−ε, ε) ∼
C
,
|log ε|2
which goes to 0 as ε → 0 slower than any power of ε. If µH happens to have a density,
this means it must have a sharp spike near 0 of the form 1ε · |logCε|3 . This phenomenon was
first observed in the famous paper by Dyson [Dys53], who proved µH (−ε, ε) ∼ |logCε|2 for a
specific choice of edge weight distribution. One could expect that such behavior should be
typical, independent of any particular properties of the distribution, and indeed, heuristic and
numerical arguments supporting this claim have been given in the physics literature [ER78].
However, despite over 60 years from Dyson’s original paper, the only rigorous general result
in this direction was [CP89], where authors prove a lower bound µH (−ε, ε) ≥ |logCε|3 for
independent weights with bounded continuous density supported away from zero.
In this paper, we settle the question, proving:
Theorem 1.1. Let ai be i.i.d. random variables such that σ 2 = Var log |ai | < ∞. Then for
the random Schroedinger operator H defined by:
(Hf )(i) = ai−1 f (i − 1) + ai f (i + 1)
we have
µH (−ε, ε) =
σ2
(1 + oε (1))
log2 ε
(1)
Notably, we do not assume any regularity of the distribution: it can even take finitely
many values. A version of this theorem holds also for edge weights which are not independent,
as long as they satisfy suitable correlation decay (see Theorem 3.10 for precise statement).
2
Our theorem easily reproduces Dyson’s result from [Dys53], see the discussion after Theorem
3.10.
The crucial ingredient in the proof is truncating the operator H to a finite interval and
finding a discrete process that counts its eigenvalues. We then proceed to identify a scaling
limit of this process, which involves the Brownian Motion arising as the limit of the discrete
|.
random walk with steps log | a2i−1
a2i
In the course of proving the theorem, we also establish eigenvalue bounds for finite
Schroedinger operators. These are expressed in terms of up- and down-crossings, see Sections
2.3 and 2.4 for details and precise definitions:
Proposition 1.2. Let Hn be a Schroedinger operator of size n, with n odd, with edge weights
ai . Let Mnλ denote the number of eigenvalues of Hn inside the interval (0, λ). Let Dn1±δ denote
P
the number of (1 ± δ) |log λ|-downcrossings made by the process ki=1 log a2i−1
. Let Bnδ be
a2i
2δ
δ
denote the number of k for which |log |ak || > 8δ |log λ|. Then for any δ ∈ (0, 1) and λ < 16n
we have:
Dn1+δ − 2Bnδ ≤ Mnλ ≤ Dn1−δ + 2Bnδ
Under the same assumptions, the analysis also yields an explicit limit of the local eigenvalue statistics around 0. The limiting distribution has a simple description in terms of upand down-crossings, or wells, made by the underlying Brownian Motion. Figure 1 shows an
example of wells made by a Brownian Motion. We highlight that the limiting distribution
is different from Poisson or the usual random matrix statistics.
Figure 1: A random walk path with two wells of depth 4
Theorem 1.3. Let ai be i.i.d. random variables such that σ 2 = Var log |ai | < ∞. Let H be
the random Schroedinger operator defined by:
(Hf )(i) = ai−1 f (i − 1) + ai f (i + 1)
3
and let Hn the restricton of H to an interval of length n + 1. Let {Λn (t, η), t, η √> 0} be
the process equal to the number of eigenvalues of Hbtnc inside the interval (0, e−η n ). Let
{Λ(t, η), t, η > 0} be the process equal to the total number of disjoint η-wells that a Brownian
Motion with variance σ 2 makes inside the interval [0, t] (see Definition 2.16). Consider a
subsequence of n such that btnc is odd.
Then the process Λn (t, η) converges to the process Λ(t, η), i.e. all finite dimensional
distributions of Λn converge weakly to finite dimensional distributions of Λ(t, η).
(n)
As a corrollary, for the smallest positive eigenvalue λ0 of Hn , we have:
(n)
− log λ0
√
n
=⇒ σ · sup |B(t)|
t∈[0,1]
in distribution, where B(t) is a Brownian Motion of variance 1 (see Remark 3.4).
We then proceed to apply our result to computation of topological invariants of groups
called the Novikov-Shubin invariants. Let G be a finitely generated group and H ∈ C[G] a
group ring element that determines a self-adjoint operator H : `2 (G) → `2 (G) with spectral
measure µH . The Novikov-Shubin invariant of H, denoted α(H), is determined by the
behavior of µH at zero:
α(H) := lim inf
ε→0
log(µH (−ε, ε) − µH ({0}))
log ε
Informally, if α(H) = α and α > 0, this means that µH (−ε, ε) behaves like ∼ εα . In general,
Novikov-Shubin invariants are rather difficult to compute, but carry interesting topological
information about manifolds with fundamental group G – see [Eck00], [Lüc02] for further
background on α(H).
Of particular interest is the question of positivity of α(H). Note, for example, that
behavior of the form µH ∼ |logCε|2 implies α(H) = 0. It was conjectured by Lott and Lück
[LL95] that α(H) > 0 for any group G and any H ∈ C[G]. This has been recently disproved
in [GV]. Our paper provides a new counterexample:
Theorem 1.4. There exists a group G = Z2 oA Z, with A a hyperbolic matrix, and H ∈ C[G]
corresponding to a random walk on G such that α(H) = 0.
In comparison to previous work, this gives a simple counterexample which is not only
finitely presented, but also a lattice in a Lie group (Sol), see Section 4.2 for a more precise
statement. In conjunction with [GV], our technique can be also used to prove α(H) = 0 for
lamplighter groups Γ o Z with Γ arbitrary, see Section 4.3.
The connection between group theory and random Schroedinger operators comes in the
form of a construction due to [Gra14] that allows one, for certain semidirect products G, to
build, given H ∈ C[G], a random Schroedinger operator whose expected spectral measure is
equal to µH (see Section 4.2 for details). To compute this measure, one needs the full power
of our main theorem. For lamplighters, one obtains i.i.d. edge weights, but the underlying
4
distribution can be discrete (e.g. for Z2 o Z), so it is important that we have (1) without
any smoothness assumption about the edge weights. In the case G = Z2 oA Z, the resulting
operator has dependent edge weights, which we can handle thanks to the hyperbolic nature
of the underlying map.
The paper is organized as follows. In Section 2, we restrict H to a finite interval and
derive a process that counts the eigenvalues of this restriction. This part is completely
deterministic. In Section 3, we use that process to prove the main theorem which establishes
equation (1) under suitable assumptions. Then, in Section 4, we describe the connection
to group theory and proceed to apply the main theorem to computations for the groups
mentioned above.
2
2.1
The eigenvalue process and its limit
The expected spectral measure of H
Let Ω be a probability space and let (. . . , a−1 , a0 , a1 , . . . ) : Ω → RZ be a bi-infinite sequence of
real numbers drawn from some joint shift-invariant probability distribution. We will always
assume that almost surely, none of ai are equal to 0. The distribution defines a random
Schroedinger operator H given by:
(Hf )(i) = ai−1 f (i − 1) + ai f (i + 1)
In this section, we define what is meant by the expected spectral measure of H. There
are standard definitions of this object, but we want to avoid technicalities coming from (i)
the fact that the moments of the ai may not exist; and (ii) having to find the domain of H
on which it is self-adjoint.
Let µ, ν be probability measures. The Kolmogorov distance dK (µ, ν) is defined as dK (µ, ν) =
supx |µ(−∞, x] − ν(−∞, x]|. Note that if a sequence of measures µn forms a Cauchy sequence
with respect to dK , it converges weakly to some measure µ.
Let Hn denote the finite dimensional operator equal to the restriction of H to the set
{1, . . . , n + 1} by setting ai = 0 for i ∈
/ {1, . . . , n}. In this way, we obtain a random finite
dimensional operator Hn whose (random) spectral measure µHn is defined as its empirical
eigenvalue distribution. Let µn denote the expected spectral measure of Hn , i.e. the average
of µHn take over the randomness of edge weights.
Proposition 2.1. The sequence of measures {µ2k −1 }∞
k=1 converges weakly to some limit
1
measure µ that satisfies dK (µ, µ2k −1 ) ≤ 2k .
e 2k+1 −1 denote the operator
Proof. For k ≥ 1, consider the operators H2k −1 and H2k+1 −1 . Let H
e 2k+1 −1 has a possibly
obtained from H2k+1 −1 by setting a2k = 0. Since the matrix H2k+1 −1 − H
e 2k+1 −1 ) ≤ 1. By a standard matrix
nonzero entry only at a2k , we have rank(H2k+1 −1 − H
inequality [BS10, Theorem A.43]:
dK (µH2k+1 −1 , µHe
2k+1 −1
)≤
1
2k+1
e 2k+1 −1 ) ≤
· rank(H2k+1 −1 − H
5
1
2k+1
(2)
e 2k+1 −1 consists of two disjoint blocks corresponding to vertices
Note that the matrix H
k
k
{1, . . . , 2 } and {2 + 1, . . . , 2k+1 }. This and the shift-invariance of the distribution of
e 2k+1 −1 is the same as the
(. . . , a−1 , a0 , a1 , . . . ) implies that the expected spectral measure of H
expected spectral measure of H2k −1 . Thus, inequality (2) holds after taking expectations:
dK (µ2k , µ2k+1 ) ≤
1
2k+1
(3)
Altogether, (3) implies that the sequence of measures µ2k is a Cauchy sequence, so it
converges weakly to a measure µ. The bounds used above easily imply that d(µ, µ2k ) ≤
P∞ 1 i+1
= 21k as claimed.
i=k 2
Definition 2.2. The expected spectral measure µT of the random Schroedinger operator H
is defined as the limit measure µ constructed in Proposition 2.1.
Note that in the case where all ai are bounded, H is a bounded operator on `2 (Z). One
can then define the spectral measure of an instance Hω as follows. Let δ0 (0) = 1, δ0 (i) = 0
for i 6= 0. The spectral measure µHω is defined via specifying its moments:
Z
k
mk = δ0 , (Hω ) δ0 =
xk dµHω
(4)
R
Since the operator Hω is bounded, the moment sequence mk specifies the measure uniquely.
One then defines the expected spectral measure µH simply as the expectation of the measures
µHω . The approximation by finite operators claimed in Proposition 2.1 is then obtained by
a bounded operator analogue [BSV13, Lemma 6.1] of inequality (2).
2.2
Transfer matrices
Throughout the following sections, we are concerned with a single instance Hω , which we
will call H from now on. Therefore, H is a fixed, deterministic operator – we introduce the
probabilistic part of the analysis in Section 3.
To control the spectral measure of H, we will approximate H by operators Hn supported
on finite intervals. In Section 2.2, we use the standard transfer matrix approach to derive
a process that counts the eigenvalues of Hn . After the setup contained in Section 2.3, we
analyze the process in Section 2.4 and find its limiting behavior in Section 2.5.
Let Hn be the restriction of H to the set {1, . . . , n + 1}, i.e. the operator obtained from
H by putting all weights outside the interval [1, n + 1] equal to 0. For any given λ ∈ R, we
are interested in computing the number of eigenvalues of Hn inside the interval [0, λ]. We
shall perform this computation using the transfer matrix approach.
We start with the eigenvalue equation. For the first and last equation we set a0 = an+1 =
1, φ0 = φn+2 = 0. The eigenvalue equation can be then written as:
Hn φ = λφ
ak−1 φk−1 − λφk + ak φk+1 = 0, k = 1, 2, . . . , n + 1
6
Letting:
λ
Tk−1
λ
=
ak
1
− ak−1
ak
0
, k = 1, 2, . . . , n + 1
we can write the recursion as:
φk+1
φk
λ
= Tk−1
φk
φk−1
In particular, λ is an eigenvalue if and only if for some c we have:
0
λ 1
λ
= Tn · · · · · T0
0
c
(5)
We will be interested in the evolution of (Tk0 · · · · · T00 )−1 · Tkλ · · · · · T0λ as k changes from
0 to n. Let:
λ
ak
− ak+1
1 0
0
1
λ
0 −1 λ
ak+1
Rk := (Tk ) Tk =
=
− ak+1
0
− aλk 1
1
0
ak
Now we rewrite:
0
0
0
0
λ
(Tk0 · · · · · T00 )−1 · Tkλ · · · · · T0λ = (Rkλ )Tk−1 ·····T0 · (Rk−1
)Tk−2 ·····T0 · · · · · R0λ
(6)
where RkA = A−1 Rk A.
It is desirable to express (6) in a more tractable way. Define:
Sk =
k
X
2 log
i=1
a2i−1
a2i
We first compute products of odd and even numbers of Tk0 . We have:
!
ak+1
ak+1
ak
0
−
0
−
0
−
ak+2
0
ak+2
ak+1
Tk+1
Tk0 =
=
ak
0
− ak+1
1
0
1
0
(7)
so:
− 1 Sk
0
0
T2k
· T2k−1
· · · · · T10 · T00 = (−1)k
2
0
− εka·e2k+1
1
0
εk · e 2 S k
1
0
0
0
T2k+1
T2k
· T2k−1
· · · · · T10 · T00 = (−1)k+1
where we have written
Qk
i=1
a2i−1
a2i
1
(8)
!
εk+1 · e 2 Sk+1
0
0
εk ·e− 2 Sk
a2k+1
as εk · e 2 Sk with εk = ±1.
7
!
1
(9)
We now have:
0
0
0
0
λ T2k−1 ·····T0
λ
)T2k ·····T0 (R2k
)
=
Qλk := (R2k+1
1−
λ2
a22k+1
Sk
−λe
−Sk
λ ae2
2k+1
1
!
(10)
We will now prove a lemma that justifies the usefulness of the representation (6). Let
H = {z ∈ C : =z ≥ 0} ∪ {∞} be the upper half plane. We can identify a vector ( ab ) with
a point z ∈ H by letting z = ab . In this identification, the vector ( 10 ) is mapped to ∞.
We can translate the action of matrices on vectors into action on H. Recall that matrices
A ∈ SL(2, R) act by isometries of the hyperbolic plane H in the upper half plane model. A
matrix:
a b
A=
c d
. To simplify notation, we will
corresponds to the map TA : H → H such that TA (z) = az+b
cz+d
write A instead of TA .
From now on we assume that n is odd. This implies that
(Tn0 · · · · · T00 )−1 (0) = 0
(11)
Lemma 2.3. Let Mnλ denote the number of eigenvalues of Hn inside the interval [0, λ] and
0
0
let Jnλ denote the number of times the process (Rkλ )Tk−1 ·····T0 · · · · · R0λ (∞) passes 0 or ∞ as k
ranges from 0 to n. Then Mnλ = d 21 Jnλ e.
Proof. Let A = [0, λ] × [0, n]. We define f : [0, λ] × {0, . . . , n} → ∂H by:
∗
0
∗
0
f (λ∗ , k) = (Rkλ )Tk−1 ·····T0 · · · · · R0λ (∞)
and interpolate f linearly to obtain a continuous map f : A → S 1 . Note that by (5) and
(11), λ∗ is an eigenvalue whenever:
∗
0
∗
0
(Rkλ )Tk−1 ·····T0 · · · · · R0λ (∞) = 0
Figure 2: The loop from Lemma 2.3
Let S1 , S2 , S3 , S4 be the sides of the rectangle A (see Figure 2). Since A is contractible
and f is continuous, the loop f : S1 ∪ S2 ∪ S3 ∪ S4 → ∂H has winding number zero. Since
f (S1 ) = f (S4 ) = {∞}, the same is true for the loop f : S2 ∪ S3 → ∂H. Since f is monotone
on both of these intervals, with opposite direction, the number of times it passes 0 on them
is the same, which easily finishes the proof.
8
2.3
Crossings and the rotation process
In Section 2.2 we have shown that in order to study the number of eigenvalues of Hn , we
have to study the time evolution of a process given by composing rotations (see equation 10
and remark thereafter). In the following sections, we study this process in detail and derive
its continuous-time scaling limit.
We consider a fixed, deterministic operator Hn on the interval of size n, given by edge
weights {ak }nk=1 . The process constructed in the previous section can be described informally
as follows. Starting from the initial point v0 ∈ R, each point vk will be moved by a rotation
−S
Rk to a new point vk+1 . The center of each rotation, equal to i |ae2k+1k | , is obtained as a product
of ai and λ represents the speed of rotation.
Formally, we study the process defined by:
!
e−Sk
λ2
λ
1
−
2
2
a2k+1
a2k+1
,
Qλk =
Sk
−λe
1
λ
vkλ = Qλk−1 (vk−1
)
v0λ = ∞
The process described in (10) is exactly of this form.
Let H = {z ∈ C : Imz ≥ 0} ∪ {∞} and ∂H = R ∪ {∞}. Since we would like to study
the points log vk for vk ∈ ∂H, it is natural to
introduce the following setup. For k ∈ Z, let
F∞
Ak = {R + k · iπ} ∪ {−∞, +∞}. Let A = k=1 Ak be the union of lines plus points ±∞,
connected in such a way that A2k ∩ A2k+1 = {+∞}, A2k−1 ∩ A2k = {−∞}. Considering
exp : A → ∂H, we can treat its inverse as a (multi-valued) map log : ∂H → A, where
A2k ⊆ log({z ≥ 0}) and A2k+1 ⊆ log({z ≤ 0}).
Remark 2.4. Note that A has a natural ordering inherited from the real line, which we
will denote by ≥A . If x ∈ Aj and y ∈ Ai for j > i, then x ≥A y. If x, y are in the
same component, x ≥A y means x ≥ y if x, y ∈ A2i or x ≤ y if x, y ∈ A2i+1 . The time
evolution governed by Qk is monotone with respect to this ordering, i.e. if y ≥A y 0 , then
Qk (y) ≥A Qk (y 0 ).
The processes studied below will consist of points starting at +∞ ∈ A1 and decreasing
monotoneously until they jump past −∞ to A2 , whereupon they increase until they jump
to A3 , and so on.
We introduce the scaled version of the processes, defined as follows:
1
Sk
|log λ|
1
Yk =
log vkλ
|log λ|
Xk =
Xk is supposed to represent the rescaled motion of the rotation center, while Yk is the rescaled
trajectory of vk . With this setup, Yk takes values in A, either in A2i if vkλ ≥ 0 or A2i+1 if
vkλ ≤ 0. It jumps from Ai to Ai+1 whenever vkλ changes sign.
9
λ
Note that for vk−1
> 0, so that Yk−1 ∈ A2i for some i, we can write:
(1 −
1
Yk =
log
|log λ|
λ2
)λ−Yk−1
a22k−1
+
1
λ1+Xk−1
a22k−1
1 − λ1−Yk−1 −Xk−1
where Yk ∈ A2i if the expression under the absolute value is nonnegative and Yk ∈ A2i+1
otherwise.
2
Remark 2.5. Assume that vk−1 > 0 and 1 − a2λ > 0. Then vk makes a jump, i.e. vk ≤ 0,
2k−1
if and only if 1 − Xk−1 − Yk−1 ≤ 0.
We now introduce the concept of crossings, which relate to the number of jumps made
by the process. Let X(t) be a real valued function from R or Z. Define
M (t1 , t2 ) = max X(t)
t∈[t1 ,t2 ]
m(t1 , t2 ) = min X(t)
t∈[t1 ,t2 ]
Definition 2.6. Let τ0 = 0 and define for i ≥ 1:
τ2i−1 = inf{s ≥ τ2i−2 | M (τ2i−2 , s) − X(s) ≥ α}
τ2i = inf{s ≥ τ2i−1 | m(τ2i−1 , s) − X(s) ≤ −α}
We will say that X has made a α-downcrossing at time τ2i−1 and a α-upcrossing at time τ2i ,
for i ≥ 1. Both down- and upcrossings will be called crossings.
Definition 2.7. Given a function X(t) and α > 0, the α-crossing process associated to X
is defined as:
(
−M (τ2i , t) + α2 ∈ A2i+1 , for t ∈ [τ2i , τ2i+1 )
Z α (t) =
−m(τ2i−1 , t) − α2 ∈ A2i , for t ∈ [τ2i−1 , τ2i )
where τk are times of subsequent crossings as in Definition 2.6.
Informally, the proces Z α (t) evolves as follows. It is started in A1 at α2 and decreases
monotoneously as it is ”pushed” by −M (τ0 , t) + α2 . The moment M (τ0 , t) − X(t) ≥ α, Z α (t)
jumps to A2 and everything starts afresh, only with −M (τ0 , t)+ α2 replaced with −m(τ1 , t)− α2
and moving in the opposite direction. The process jumps to A3 when X(t) − m(τ1 , t) ≥ α
and so on.
Definition 2.8. We say that a process Y has made a jump at time k if Yk ∈ Aj and
Yk−1 ∈ Aj−1 .
With these definitions, the first crossing is always a downcrossing. Note that the times
of successive jumps of the α-crossing process Z α (t) are exactly the times of α-crossings of
the underlying function X.
10
2.4
Upper and lower bounds on the number of jumps
In this Section, we prove upper and lower bounds on the number of jumps
of Y in terms of
√
− n
but are stated and
crossings made by X. The Propositions below will be used for λ = e
proved in generality, with λ arbitrary. Proposition 1.2 follows by recalling that by Lemma
2.3, the number of eigenvalues is d 12 Jn e and that is simply the number of downcrossings.
In both Propositions below, we consider the processes Y and Z α , the α-crossing process
associated to X for appropriate value of α. We will only consider the case when Y, Z ∈ A2i ,
as the case of the odd numbered component is handled in a similar way. We can write the
one step recursion for Z as Zk+1 = z 0 (Xk+1 , Zk ), where z 0 is given by:
(
if z ≥ −x + α2
−x + α2 ∈ A2i+1 ,
z 0 (x, z) =
max{z, −x − α2 } ∈ A2i , otherwise
Likewise, we can write the one step recursion for Y as Yk+1 = y 0 (Xk , Yk , a2k+1 ), where y 0
is given by:
2
(1 − λa2 )λ−y + a12 λ1+x
1
0
log
y (x, y, a) =
|log λ|
1 − λ1−y−x
In both proofs, we will repeatedly use the following estimates, which hold if |log |ak || ≤
δ
|log λ|, δ < 2 and λ < 1:
16
δ
λ8 <
1−
δ
1
< λ− 8
2
ak
δ
λ2
> 1 − λ2− 8 > 0
2
ak
(12)
(13)
Proposition 2.9. Pick δ ∈ (0, 2). Let Jn be equal to the number of jumps made by {Yk }nk=1 .
Let Cn be equal to the number of (2 − δ) |log λ|-up- or down-crossings made by Sk and let
4δ
δ
δ
Bn be the number of k such that |log |ak || > 16
|log λ|. Then for all λ < 32n
we have
Jn ≤ 2Bn + Cn .
Proof. First, we replace Y by a process defined as follows. Suppose that Yk ∈ Ai . Whenever
δ
|log |ak || > 16
|log λ|, instead of following its usual evolution, the modified process jumps to
Yk ∈ Ai+2 , i.e. the same point, but two components ahead. Since Y can make at most one
jump in one step, the modified process is always ahead of Y , in particular, it makes at least
as many jumps. Thus, it suffices to bound the number of jumps of Y by Cn , under the
δ
assumption that |log |ak || ≤ 16
|log λ|, since the remaining jumps are taken care of by the
term 2Bn .
Let Z be the (2 − δ)-crossing process associated to X (Definition 2.7). Recall that Cn ,
the number of (2 − δ)-crossings made by X, is equal to the number of jumps made by Z.
Thus we need to prove that Z makes at least as many jumps as Y .
Recall the one step recursion for Y and Z. Suppose that Zk ∈ Ai and let Wk = Zk +
δ
· k. The evolution of Wk is governed by the recursion:
(−1)i 4n
δ
0
0
i δ
w (x, w, k) = z x, w − (−1)
· k + (−1)i
· (k + 1)
4n
4n
11
Note that w0 makes jumps at the same time as z 0 . We claim that in order to prove that Z
makes at least as many jumps as Y , it suffices to prove that for any values of x, w, a, k such
that k ≤ n and a satisfies (12), (13) we have:
w0 (x, w, k) ≥A y 0 (x, w, a)
(14)
We prove inductively that Wk ≥A Yk+1 , from which the claim about the number of jumps
follows as Wk makes a jump if and only if Zk makes a jump. For the base case k = 0, we
have:
2
1 − λa2
δ
1
δ
1
0
log
>1+
log(1 − λ2− 8 ) > 1 −
(15)
y (∞) =
|log λ|
λ
|log λ|
8
4δ
δ
δ
where the last estimate follows from λ 8 < 12 , easily implied by λ < 32n
. Thus, Y1 > 1− 8δ >
1− 2δ = Z0 . The map y 0 is monotone, meaning that y1 ≤A y2 implies y 0 (x, y1 , a) ≤A y 0 (x, y2 , a).
The inductive step then follows by applying (14) and then monotonicity::
Wk+1 = w0 (Xk+1 , Wk , k) ≥A y 0 (Xk+1 , Wk , a2k+3 ) ≥A y 0 (Xk+1 , Yk+1 , a2k+3 ) = Yk+2
Note that the increments of w0 and y 0 are translation invariant, so without loss of generality
we can put x = 0. The results hold for all values of ak satisfying the assumptions, so we
suppress the variable a and write y(w) for y(0, w, a).
We only consider the case when y, z ∈ A2i as the case of the odd numbered component
δ
.
is handled in a similar way. We first claim that if 1 − 4δ ≥ u ≥ −1 + 2δ , then y 0 (u) − u < 4n
We have:
2
(1 − λa2 )λ−u +
1
y (u) − u =
log
|log λ|
1 − λ1−u
0
1
λ
a2
3
δ
1
1 + λ1+u− 8
−u ≤
log
≤
|log λ|
1 − λ1−u
(12)
3
δ
δ
1
1
1
1 + λ8δ
λ4 + λ8δ
2 · λ4
≤
log
·
·
δ ≤
δ
|log λ|
|log λ| 1 − λ 4
|log λ| 1 − λ 4δ
1 − λ4
The assumptions λ <
δ
32n
4δ
and δ < 2 easily imply
δ
1
|log λ|
y 0 (u) − u < 8 · λ 4 <
< 2 and
1
δ
< 2, so we get:
1−λ 4
δ
4n
4δ
δ
again by λ < 32n
.
We now prove (14). The first case to consider is when y 0 does not jump, which by Remark
2.5 and (13) implies w < 1. Then, either w0 jumps and the claim is trivial, or it does not.
δ
δ
In that case, we have w < 1 − 2δ + 4n
· k < 1 − 4δ and z 0 = max{w − 4n
· k, −1 + 2δ }. If
δ
δ
δ
δ
δ
w ≥ −1 + 2 + 4n · k, then z 0 = w − 4n · k, so w0 = w + 4n . Also 1 − 4 ≥ w ≥ −1 + 2δ , so
δ
δ
y 0 (w) − w < 4n
= w0 − w as desired. If w < −1 + 2δ + 4n
· k, then:
δ
δ
δ
δ
δ
δ
0
0
y (w) < y −1 + +
· k < −1 + +
·k+
= z0 +
· (k + 1) = w0
2 4n
2 4n
4n
4n
12
The other remaining case is when y 0 makes a jump, so w ≥ 1. This means that z ≥
δ
· k > 1 − 4δ > 1 − 2δ , so z 0 makes a jump as well. Also, z 0 = 1 − 2δ ∈ A2i+1 and w0 > z 0 .
1 − 4n
It thus suffices to prove that y 0 ≤A 1 − 2δ in A2i+1 , which translates to y 0 ≥ 1 − 2δ since we are
in an odd numbered component. We have y 0 (w) > y 0 (∞) and y 0 (∞) > 1 − 2δ by (15).
Proposition 2.10. Pick δ ∈ (0, 2). Let Jn be equal to the number of jumps made by {Yk }nk=1 .
Let Cn be equal to the number of (2 + δ) |log λ|-up- or down-crossings made by Sk and let Bn
δ
be the number of k such that |log |ak || > 16
|log λ|. Then for all λ < 1 we have Cn −2Bn ≤ Jn .
Proof. As in Proposition 2.9, we replace Y by a process which makes two jumps whenever
δ
|log |ak || > 16
|log λ|. Now it suffices to bound the number of jumps of Y from below by Cn ,
δ
|log λ|, since the remaining jumps are taken care of
under the assumption that |log |ak || ≤ 16
by the term 2Bn .
Let Z be the (2 + δ)-crossing process associated to X (Definition 2.7). We only consider
the case when Yk , Zk ∈ A2i as the other one is handled in a similar way. Recall that Cn , the
number of (2 + δ)-crossings made by X, is equal to the number of jumps made by Z. Thus
we need to prove that Y makes at least as many jumps as Z.
Recall the one step recursion for Y and Z. We claim that in order to prove that Y makes
at least as many jumps as Z, it suffices to prove that for any values of x, z, a such that a
satisfies (12), (13) we have:
z 0 (x, z) ≤A y 0 (x, z, a)
(16)
We prove inductively that Zk ≤A Yk+1 for all k ≥ 0. The base case is clear since Z0 = 1+ 2δ and
Y1 < 1. The map y 0 is monotone, meaning that y1 ≤A y2 implies y 0 (x, y1 , a) ≤A y 0 (x, y2 , a).
The inductive step then follows by applying (16) and then monotonicity::
Zk+1 = z 0 (Xk+1 , Zk ) ≤A y 0 (Xk+1 , Zk , a2k+3 ) ≤A y 0 (Xk+1 , Yk+1 , a2k+3 ) = Yk+2
Note that the increments of z 0 and y 0 are translation invariant, so without loss of generality
we can put x = 0. The results hold for all values of ak satisfying the assumptions, so we
suppress the variable a and write y(w) for y(0, w, a).
To prove (16), consider first the case when y 0 (z) does not make a jump, which by Remark
2.5 and (13) means z < 1. This in particular means that z 0 does not make a jump, so
z 0 = max{z, −1 − 2δ }. Since y 0 is increasing, we have y 0 (z) > z. On the other hand, since
z ≥A −∞, we have:
y 0 (z) ≥ y 0 (−∞) =
1
1
δ
log 2 λ ≥ −1 −
|log λ|
a
8
Thus, y 0 ≥ max{z, −1 − 8δ } ≥ z 0 , finishing the claim.
The other case is when y 0 makes a jump from A2i to A2i+1 , so that z ≥ 1. Then either
z < 1 + 2δ , so z 0 remains in A2i and the claim is trivial, or z ≥ 1 + 2δ ∈ A2i . In that case
z 0 = 1 + 2δ ∈ A2i+1 and we need to prove y 0 ≥A 1 + 2δ ∈ A2i+1 , that is, y 0 ≤ 1 + 2δ since we are
13
in the odd numbered component. Since z ≥A 1 + 2δ ∈ A2i , by monotonicity of y 0 we have:
δ
2
(1 − λa2 )λ−1− 2 + a12 λ
1
δ
0
0
=
log
≤
y (z) ≤ y 1 +
δ
2
|log λ|
λ− 2 − 1
δ
3
1 + a12 λ2+ 2
δ
1
δ
1
1 + λ2+ 8 δ
1+ +
log
<
1
+
+
log
δ
δ
2 |log λ|
2 |log λ|
λ− 2 − 1
λ− 2 − 1
It suffices to make the expression under the logarithm smaller than 1. This is easily implied
2
δ
by λ < 1 and λ− 2 > 3, which follows from the assumption that λ < 31 δ .
We note that for even values of n, we obtain similar statements, but with roles of downand upcrossings reversed. In particular, we obtain an analogue of Proposition 1.2 for even
n, which is identical but bounds the number of jumps in terms of upcrossings, rather than
downcrossings of Sk .
2.5
Convergence to the scaling limit
We now
study the continuous-time scaling limit of the processes Y . To this end, we put
√
λ = e− n and consider a sequence of processes Y (n) such that the underlying functions X (n)
converge to some function X. The reason for this particular scaling is related to Brownian
scaling which we shall use in Section 3 when introducing the probabilistic part of the analysis.
In the formula below the reader should recognize the same scaling as in the Central Limit
Theorem.
√
We introduce the continuous time version of the discrete process X with scaling λ = e− n .
For any η, we can write:
1
(n)
(n)
Sη2 nt
Xηn
(t) := p
2
η n
(n)
We introduce the superscript n to emphasize that for different values of n, the sums Sk
(n)
depend on different sets of edge weights {ak }nk=1 for each n. While it may seem natural to
consider sequences obtained from a single infinite operator H restricted to finite intervals,
we will need the main theorem of this section stated in generality.
We will establish the main theorem of this section under the following assumptions.
(n)
Condition 2.11. Xn (t) converge uniformly on some interval [0, T ] to a function X(t) such
that X(0) = 0.
Condition 2.12. Fix some ν > 0. Whenever M (t) − X(t) = 2ν (resp. m(t) − X(t) = −2ν),
for any ε > 0 there exists t0 < t+ε such that M (t0 )−X(t0 ) > 2ν (resp. m(t0 )−X(t0 ) < −2ν).
Condition 2.13. We have:
(n)
lim max
n→∞ k=1,...,n
log |ak |
√
=0
n
14
(17)
Note that Condition 2.13 is not implied by Condition 2.11 since Condition 2.11 only
(n)
implies that log
a2k−1
(n)
a2k
(n)
are small in the limit and implies nothing about log |ak | .
(n)
Theorem 2.14. Let Xn (t) be a sequence of piecewise linear functions that converge uniformly on some interval [0, T ] to a function X(t) such that X(0) = 0 (Condition 2.11).
Suppose that X(t) satisfies Condition 2.12 with ν = 1 and Condition 2.13 is satisfied. Let Jn
(n)
denote the number of jumps made by {Yk }nk=1 and let J denote the number of 2-crossings
made by X. Then Jn converges to J as n → ∞.
Proof. Let Cnα denote the number of α-crossings made by Xn , let C α denote the number of
(n)
δ √
n.
α-crossings made by X and let Bnδ denote the number of k such that log ak
> 16
Pick δ > 0. By applying Propositions 2.9 and 2.10 with λ = e−
obtain:
Cn2+δ − 2Bnδ ≤ Jn ≤ Cn2−δ + 2Bnδ
√
n
, for large enough n we
(18)
Since Xn converge to X uniformly, it is easy to see that for large enough n we have Cn2+δ ≥
C 2+2δ and Cn2−δ ≤ C 2−2δ . Moreover, Condition 2.12 implies that C 2−2δ and C 2+2δ converge
to C 2 = J as δ → 0. Also, by Condition 2.13 we have that Bnδ converges to 0 as n → ∞.
Thus, we can make the upper and lower bound in (18) arbitrarily close to J by first picking
small enough δ and then large enough n, depending on δ, which finishes the proof.
Remark 2.15.
always bounded
τi . This can be
process Z 2 . We
jumps.
The proofs of Proposition 2.9 and 2.10 imply that the discrete process Y is
from both sides by (2 ± δ)-crossing processes Z 2±δ , outside of jump times
actually used to prove the convergence of the processes Y to the 2-crossing
do not spell out the details as we only need the convegence of the number of
We are now ready to prove the Lemma which summarizes the connection between the
asymptotic number of eigenvalues of Schroedinger operators described in Section 2.2 and the
processes introduced above.
Definition 2.16. We say that an interval [a, b] ⊆ [0, T ] is an s-well of X for some s > 0 if:
1. b = T or X(a) = X(b); 2. X(a) > X(x) for all x ∈ (a, b) and X(a) − X(x) ≥ s for some
x ∈ (a, b).
Remark 2.17. Note that the maximal number of disjoint s-wells made by X inside [0, T ] is
equal to the number of s-downcrossings.
Lemma 2.18. Let {H (n) }∞
n=1 be a family of Schroedinger operators, each given by edge
(n) n
(n)
weights {ai }i=1 . Let Hm denote the operator H (n) restricted to the interval [1, m + 1]. For
√
(n)
t, η > 0, let Λn (t, η) denote the number of eigenvalues of Hbtnc inside the interval [0, e−η n ].
Consider a subsequence of n such that btnc is odd. Suppose that Conditions 2.11. 2.12 and
(n)
2.13 are satisfied, including Condition 2.12 with ν = η. In particular, Xn converge to some
function X. Let Λ(t, η) denote the number of 2η-downcrossings of X inside the interval
[0, 12 t]. Then Λn (t, η) converges to Λ(t, η) as n → ∞.
15
Figure 3: X(t) makes a 4-downcrossing at t1 and t3 and 4-upcrossing at t2 and t4 . The
resulting 4-wells are shown in grey.
Proof. Recall that:
(n)
Sk
=
k
X
(n)
Ui
=
k
X
(n)
2 log
(n)
a2i
i=1
i=1
a2i−1
1 (n)
Xn(n) (t) = √ Snt
n
where the superscript n emphasizes that, for different n, the sums S (n) depend on a different
(n)
set of edge weights ai .
(n)
Put T = η12 t. By letting n0 = η 2 n, Λn (t, η) is equal to the number of eigenvalues of HbT n0 c
inside the interval [0, e−
√
n0
]. By Lemma 2.3, this is equal to d 12 Jn e, where Jn is the number of
1
T n0
√
0
2
jumps made up to time 12 T n0 by the process {Y (n),λ }k=1
, with λ = e− n and the underlying
(n)
random walk being Xn0 . Note that the scaling factor n0 is now different than the sample
number n. The factor of 21 appears since each step of the discrete process used in Section
2.3 actually corresponds to two steps of the eigenvalue counting process from Section 2.2(see
equation (10)).
We have:
1 (n) 1 1 (n)
(n)
Xn0 (t) = √ Sn0 t = · √ Sη2 nt
η
n
n0
(n)
(n)
Since by assumption Xn (t) → X(t), we have Xn0 (t) → Xη (t) := η1 · X(η 2 t).
Since X satisfies Condition 2.12 with ν = η, it follows that Xη satisfies the same condition
with ν = 1. Since the assumptions of Theorem 2.14 are satisfied for Xη , the number of jumps
1
T n0
2
made by {Y (n),λ }k=1
converges to the number of 2-down- or upcrossings that Xη makes inside
16
the interval [0, 21 T ]. This is the same as the number of 2η-crossings made by X inside [0, 21 t].
This finishes the proof by noting that if C is the number of 2-down- or upcrossings, then
d 12 Ce is the number of 2-downcrossings since the first crossing is always a downcrossing.
3
Local statistics and the expected spectral measure
at zero
In this section, we use the limiting process from the previous section to derive the limit
of local eigenvalue statistics of Hn and compute µH , the expected spectral measure of the
random Schroedinger operator H, near zero. The main focus of this section are Theorem
3.3, Lemma 3.9 and Theorem 3.10. We shall use the notation from Section 2. Whenever
we speak of convergence in distribution of processes, we shall mean weak convergence of
measures on C([0, T ]).
3.1
Local eigenvalue statistics
In this Section, we consider a random Schroedinger operator with edge weights given by a
sequence of random variables {ai }∞
i=1 . We define:
n
X
1
a2i−1
, Sn =
Ui , Xn (t) = √ Sbntc
Ui = 2 log
a2i
n
i=1
2
Definition 3.1. Suppose that {Ui }∞
i=1 satisfy EUi = 0 and EUi < ∞. We say that Ui satisfy
the functional Central Limit Theorem if Xn converge in distribution on some interval [0, T ]
to a Brownian motion X with mean zero.
2
Proposition 3.2. Suppose that {ai }∞
i=0 are identically distributed and E(log |ai |) < ∞.
Then for any ε > 0 we have:
|log |ak ||
√
P max
>ε →0
k=1,...,n
n
i.e. the sequence of variables {maxk=1,...,n
log |ak | ∞
√
}n=1
n
converges to 0 in probability.
Proof. Let Xk = log2 |ai |, so that EXk < ∞. A simple exercise in probability (see e.g. [Bil95],
Problem 21.3) shows that when variables Xk are identically distributed with EX1 < ∞, we
have E maxk=1,...,n Xk = o(n). This together with Markov’s inequality proves the desired
claim.
If the functional Central Limit Theorem is satisfied, we can use Lemma 2.18 and Skorokhod almost sure representation to obtain convergence in distribution of the local eigenvalue statistics. This describes the limiting local eigenvalue distribution around 0 in terms
of crossings made by a Brownian motion, recall Definition 2.6. We note that the limiting
distribution is not Poisson, as Proposition 3.5 shows that it exhibits a Gaussian tail.
17
Theorem 3.3. Suppose that Ui satisfy the functional Central Limit Theorem and let Var log |ai | =
σ 2 < ∞. Let Hm be the operator H restricted to the interval [1, m + 1]. For t, η > 0, let
{Λn (t, η), t, η > 0} denote√ the random process equal to the number of eigenvalues of Hbtnc
inside the interval [0, e−η n ] and let {Λ(t, η), t, η > 0} denote the random process equal to
the maximal number of disjoint η-wells made by a Brownian motion with variance σ 2 inside
the interval [0, t]. Consider a subsequence of n such that btnc is odd.
Then the process Λn (t, η) converges to the process Λ(t, η), i.e. all finite dimensional
distributions of Λn converge weakly to finite dimensional distributions of Λ.
Proof. By assumption, Xn converge weakly to X, which is a Brownian Motion with variance
8σ 2 . By Skorokhod representation theorem ([Kal02], Theorem 4.30), we can find a common
probability space such that Xn → X uniformly almost surely. The maximum process M − X
is equal in distribution to a reflected Brownian motion and it is standard ([MP10]) that
almost surely the Brownian motion has no isolated zeros. These two facts easily imply
that X almost surely satisfies Condition 2.12 for any value of ν. Moreover, by Proposition
3.2 and almost sure representation of variables converging in probability, we obtain that
Condition 2.13 is satisfied almost surely. Thus, almost surely the conditions of Theorem
2.14 are satisfied.
By Lemma 2.18, for any t, η it holds that Λn (t, η) converges to the number of 2η-wells
that X makes inside the interval [0, 21 t]. By Brownian scaling this has the same distribution
as the number of η-wells that a Brownian motion with variance σ 2 makes inside the interval
[0, t], which is exactly Λ(t, η). The same statement holds for Λn treated as a process - for
any finite number of {(t1 , η1 ), . . . , (tk , ηk )} convergence holds simultaneously almost surely
for all ti , ηi , which implies weak convergence of all finite dimensional distributions.
Note that the limiting 2-crossing process Z 2 is discontinuous, but is right continuous with
left limits. Then Remark 2.15 also implies that the processes Y (n) converge weakly to Z 2 .
We do not describe this in detail as below we only need the weak convergence of the number
of eigenvalues and not of the processes Y (n) themselves.
Remark 3.4. Various questions about the eigenvalues of Hn can be phrased in terms of
(n)
crossings made by the limiting Brownian Motion X. For example, let λ0 be the smallest
− log λ
(n)
positive eigenvalue of Hn . It follows from the preceding Theorem that √n 0 converges in
distribution to the maximal size of a downcrossing made by X inside the interval [0, 1], that
is, the maximal η such that M (t) − X(t) = η for some t ∈ [0, 1]. Since M (t) − X(t) is equal
in distribution to a reflected Brownian motion |X(t)|, we obtain that:
(n)
− log λ0
√
n
=⇒ σ · sup |B(t)|
t∈[0,1]
in distribution, where B(t) is the standard Brownian Motion of variance 1.
Proposition 3.5. With Λ(t, η) defined as in Theorem 3.3, for some constants a, b > 0
depending on t, η, σ we have
2
P(Λ(t, η) > m) ≤ ae−bm
18
Proof. Suppose that Λ(t, η) > m, so X(t) has made more than 2m
η-up- or down-crossings
√
η
t
inside the interval [0, t]. By Brownian scaling, we can put η 0 = σ and instead consider η 0 crossings of a standard Brownian motion inside the interval [0, 1] Let T1 , . . . , T2m be the times
between subsequent η-up- or down-crossings. The times Ti are independent and identically
distributed. Moreover, note that R(t) = M (t) − X(t) has the distribution of a reflected
Brownian motion, so by the reflection principle we have:
η 02
P(Ti ≤ x) = P(max R(t) ≥ η 0 ) ≤ 2 · P(max B(t) ≥ η 0 ) = 4 · P(B(x) ≥ η 0 ) ≤ 4e− 2x
[0,x]
[0,x]
Since there are more than 2m crossings
P2m inside [0, 1], this means that T1 + . . . T2m < 1.
2m
Let ∆2m = {(x1 , . . . , x2m ) ∈ [0, 1] | i=1 xi ≤ 1}. We have:
Z
P(T1 + . . . T2m < 1) ≤
2m
Y
Z
P(Ti ∈ dxi ) ≤ 4
∆2m i=1
Z
1
−2m2 η 02 P2m
4
e
x
i=1 i
≤ 4 · vol(∆2m ) · e−2η
02 ·m2
02
η
− 2x
e
∆2m i=1
−2η 02 ·m2
=4·
∆2m
3.2
2m
Y
i
Z
=4
02
− η2
e
P2m
1
i=1 xi
≤
∆2m
e
(2m)!
The expected spectral measure at zero
Having established weak convergence of the local eigenvalue statistics, we now set the background to compute the expected spectral measure of H. We shall consider sequences of Ui
satisfying the following technical condition:
Condition 3.6. At least one of the following holds:
1. for some γ > 2 we have E |log |ai ||γ < ∞ and for some constant C and any n ≥ 1:
γ
E |U1 + · · · + Un |γ ≤ Cn 2 ,
(19)
2. The ai are i.i.d. and E |log |ai ||2 < ∞.
Note that in the i.i.d. case a standard computation verifies the inequality (19) with
γ = 2. However, we will later work in the setting when Ui are dependent, but exhibit a
suitable correlation decay (see Section 4.2).
Having established weak convergence of the number of jumps, we would like to establish
that the convergence also holds in expectation. This will be implied by the upcoming Lemma
3.8. An important element in the proof is the maximal inequality of [Mó76], whose special
case says the following:
P
Proposition 3.7. Let S(i, j) = jk=i Uk , M (i, j) = maxi≤k≤j S(i, k). If for some γ > 2 and
A > 0 we have:
γ
E |S(i, j)|γ ≤ A(j − i + 1) 2
19
for all j > i ≥ 1, then:
γ
E |M (i, j)|γ ≤ cγ · A(j − i + 1) 2
for all j > i ≥ 1, with the constant cγ depending only on γ.
Lemma 3.8. Suppose that Ui satisfy Condition 3.6. Let Jn be the random variable equal
to the number of jumps made by Y (n) in the interval [1, n]. Then the family of variables
{Jn }n≥1 is uniformly integrable.
Proof. By Proposition 2.9 with δ = 1 and λ = e−
greater than some global constant n0 , where:
Bn =
n
X
√
n
, we obtain Jn ≤ 2Bn + Cn for all n
1{|log|ai ||> 161 √n}
i=1
1 √
is the number of times i such that |log |ai || > 16
n and Cn is the number of 1-crossings
made by Xn . Thus, it suffices to show that Bn and Cn are uniformly integrable. We will first
prove the general case. Then we give a different argument for the i.i.d. case under weaker
moment assumptions.
To prove that Bn is uniformly integrable, it suffices to show that EBn → 0. By Condition
3.6 we can estimate:
1√
E |log |ai ||γ
.
EBn = n · P |log |ai || >
n ≤n·
γ
1 γ
16
)
n 2 ( 16
Since γ > 2, this converges to 0 as n → ∞.
For a crossing [s, t], its length is t − s. To show that Cn are uniformly integrable, it
suffices to show that the expected number of 1-crossings [s, t] of length at most n · 2−`0 is
at most ε(`0 ) for all n, where ε(`0 ) → 0 as `0 → ∞. Indeed, for given `0 the number of
1-crossings that are longer is bounded independently of n.
We first bound the expected number e(n, `) of 1-crossings that are of length at least
n · 2−` and at most 2n · 2−` . To each such crossing [s, t] we associate the first time of the form
k · b2−` nc contained in [s, t] for some integer k. Each such time is contained in at most one
such crossing, so the number of such crossings is bounded above by the sum of the indicators
over such times that a crossing contains that time.
As a consequence, e(n, `) is bounded by the number of such times, which is 2` , times
the maximal probability that a crossing contains a given time. If this happens, then the
range (i.e. the maximum minus the minimum)√of the process Sk over the interval [i,
√j] of
−`
size 4n · 2 centered at that time is at least n. In particular, either M (i, j) ≥ n/2,
or the same holds for the absolute minimum. By Markov’s inequality, Proposition 3.7 and
Condition 3.6 we get
P(M (i, j) ≥
√
n/2) ≤
2γ/2 E|M (i, j)|γ
c · E|S(i, j)|γ
c0 · (4n · 2−` )γ/2
≤
≤
nγ/2
nγ/2
nγ/2
20
giving e(n, `) ≤ 4γ/2 c0 · 2` 2−`γ/2 . As a result, the expected number of 1-crossings of length at
most n · 2−`0 is at most
dlog2 ne
c
X
2`(1−γ/2) <
`=`0
c · 2`0 (1−γ/2)
=: ε(`0 ) → 0
1 − 2(1−γ/2)
as long as γ > 2.
Proof of the i.i.d. case. We now prove the i.i.d. case assuming only E |log |ai ||2 < ∞. It
suffices to show that the variance of Bn is uniformly bounded in n. The Bn are Bernoulli
random variables, so their variance is bounded by their mean. We have
E |log |ai ||2
1√
n ≤n·
E(Bn ) = n · P |log |a1 || >
,
1 2
16
n( 16
)
which is bounded.
To show that Cn is uniformly integrable, it suffices to show exponential tails uniform in
n, namely a bound of the form P(Cn ≥ k) < ck for some c < 1. Let a be a large constant
to be chosen later. We divide the interval [1, n] into a intervals I1 , . . . , Ia of size na . Let Nn,j
denote the number of crossings with starting points in Ij . It suffices to show that each Nn,j
has exponential tails uniform in n.
If the walk makes at least 2 crossings inside Ij √
= [s, t], then the maximal absolute
increment between times
√ s, t in this interval is at least n. With the notation of Proposition
3.7 either M (s, t) ≥ n/2 or the same holds for the absolute minimum. By the classical
Kolmogorov maximal inequality for i.i.d variables
P(M (s, t) > λ) ≤
(s − t) · Var Ui
,
λ2
which gives
P (Ni,j ≥ 2) ≤ 2 ·
n/a · Var Ui
.
n/4
(20)
By choosing a large enough, we can make the right hand side smaller than some global
constant b < 1, which we fix from now on.
We can write for any i:
P(Nn,j ≥ 2i) =
i
Y
P(Nn,j ≥ 2k | Nn,j ≥ 2k − 2)
k=1
If we stop the random walk in the time interval Ij after the 2k − 2nd crossing (when it
exists), the conditional law of the remaining stretch is another independent random walk
in a smaller interval. The conditional probability of the remaining walk making a double
crossing is at most b again. This shows that all terms in the above product are bounded
above by b, so Nn,j has exponential tails uniform in n, as required.
21
The crucial step in computing the spectral measure of H is approximation by an operator
Hn on a finite interval. The spectral measure of Hn is computed in the following lemma.
Lemma 3.9. Fix K > 0 and let n = bK 2 |log ε|2 c be odd (in particular, n → ∞ as ε → 0).
Let Hn be equal to the operator H restricted to the interval {1, . . . , n + 1} and let µn be its
expected spectral measure. Assume that for all i Var log |ai | = σ 2 < ∞. Suppose that:
1. Ui satisfy the functional Central Limit Theorem (Definition 3.1)
2. Ui satisfy Condition 3.6
Then there exists cK such that limK→∞ cK = 0 and for sufficiently small ε:
µn (−ε, ε) −
σ2
log2 ε
≤
cK
log2 ε
Proof. Let MK,n denote the number of eigenvalues of Hn inside the interval [−ε, ε] and let
+
MK,n
denote the number of eigenvalues inside the interval [0, ε]. We start by ruling out zero
eigenvalue of Hn . The equation for eigenvectors (see Section 2.2) with λ = 0 can be solved
recursively and for odd n the only solution is identically zero. Since we assumed n is odd,
all the eigenvalues of Hn are thus nonzero. Since the underlying graph is bipartite, every
eigenvalue λ+ ∈ (0, ε] has a corresponding eigenvalue λ− = −λ+ ∈ [−ε, 0), so:
+
MK,n = 2MK,n
Let JK denote the number of K1 -crossings that a Brownian motion with variance σ 2 makes
inside the interval [0, 1]. By Brownian scaling this is the same as the number of 1-crossings
that a Brownian motion with variance σ 2 makes inside the interval [0, K 2 ]. By assumption,
1 √
satisfy the functional Central Limit Theorem. Since ε = e− K n , by putting
Ui = 2 log a2i−1
a2i
+
t = 1, s = K1 in Theorem 3.3 we obtain that MK,n
converges weakly to 12 JK . Thus we
obtain:
1
+
MK,n = 2MK,n ⇒ 2 JK = JK + 1{JK =2k+1}
2
By Lemma 3.8 the family {MK,n }n≥1 is uniformly integrable since MK,n differs from the
number of jumps by at most one. Weak convergence thus implies convergence in expectation,
so by letting:
aK,n = EMK,n − EJK − E1{JK =2k+1}
(21)
for each fixed K we have limn→∞ aK,n = 0.
We shall now compute EJK . We shall use standard properties of Brownian motion,
which can be found e.g. in [MP10]. We first compute τ , the expected time to make an up
or down crossing. Let X be a Brownian motion with variance σ 2 . Consider τ1 = inf{t ≥ 0 :
M (0, t)−X(t) = 1}. Since M (0, t)−X(t) has the distribution of a reflected Brownian motion,
τ1 has the same distribution as τ2 = inf{t ≥ 0 : X(t) = 1 ∨ X(t) = −1}. It is standard that
22
Eτ2 < ∞. If X(t) is stopped at time τ2 , by Wald identity we obtain EX(τ2 )2 = σ 2 · Eτ2 ,
which gives Eτ2 = σ12 . Clearly we can treat the event {m(0, t) − X(t) = −1} in the same
way, so we have:
1
τ = Eτ2 = 2
(22)
σ
Now, let Ti be i.i.d. random variables equal to the times between successive up or down
crossings made by X(t). Note that ETi = τ and we can write JK as:
JK = sup{n :
n
X
Ti ≤ K 2 }
i=1
In other words, JK is equal to the number of jumps up to time K 2 , made by a renewal
process with expected renewal time τ . By the law of large numbers for renewal processes
K
= τ1 . Let:
[Dur10], it follows that limK→∞ EJ
K2
bK =
1
EJK
−
2
K
τ
(23)
so that limK→∞ bK = 0.
In this way we obtain:
EMK,n (21) EJK + E1{JK =2k+1} + aK,n
=
=
n
n
EJK
E1{JK =2k+1} + aK,n (23) τ1 + bK
E1{JK =2k+1} + aK,n (22)
K2
+
+
=
=
2
2
n
n
log ε
log ε
1
1
σ2
+
(bK + 2 (E1JK =2k+1 + aK,n ))
2
2
K
log ε
log ε
µn (−ε, ε) =
Recall that limn→∞ aK,n = 0, and n = K 2 |log ε|2 , so for fixed K for sufficiently small ε
aK,n < 1. Also, E1{JK =2k+1} ≤ 1. Thus, we can let cK = bK + K32 and the lemma is
proved.
We are now ready to prove our main theorem.
Theorem 3.10. Let µH be the expected spectral measure of H as defined by Definition 2.2.
With notation and assumptions of Lemma 3.9 the following holds:
µH (−ε, ε) =
σ2
(1 + oε (1))
log2 ε
Proof. Let n = K 2 |log ε|2 be equal to n = 2k for some k, with K > 0 to be chosen later.
By Proposition 2.1 and choice of n = 2k , we have dK (µH , µn ) ≤ n1 . By the definition of
the Kolmogorov distance, this implies:
|µn (−ε, ε) − µH (−ε, ε)| ≤
23
2
2
= 2
n
K log2 ε
By Lemma 3.9, there exists some ε(K) such that for all ε < ε(K) we have:
µn (−ε, ε) −
σ2
cK
2 ≤
log2 ε
|log ε|
Using the triangle inequality and multiplying by | log ε|2 /σ 2 we get
2
|log ε|2
1
µH (−ε, ε) ·
−1 ≤ 2
+ cK .
σ2
σ
K2
Since limK→∞ cK = 0, for every δ > 0 we can find K(δ) such that the right hand side is
smaller than δ for all ε < ε(K(δ)), which proves the claim.
We now discuss how the above result relates to Dyson’s results from [Dys53]. Dyson
1
considers random variables λj and the matrix Λ defined by Λj+1,j = −Λj,j+1 = iλj2 and
zero otherwise. He then proceeds to compute the function M (z), defined as the fraction of
1
√ √
eigenvalues of Λ inside the interval (− z, z). To translate to our setting, we put ai = λi2
in the definition of the operator Hn and note that Λ is conjugate√to Hn by a diagonal matrix
A with Ak,k = (−i)k−1 . We then get M (z) = µH (−ε, ε) for ε = z.
In Section VI, Dyson computes the asymptotics of M (z) explicitly for λj drawn from the
nn
λn−1 e−nλ , where n ≥ 1 is an integer parameter. These
probability distribution Gn (λ) = (n−1)!
asymptotics can be easily
√ recovered from Theorem 3.10 by simply computing the variance
Var log |ai | with ai = λi . For example, for n = 1 λj are exponential random variables and
2
by computing the variance of their logarithm we obtain µ(−ε, ε) ∼ |logCε|2 for C = 14 · π6 ,
which is in agreement
√ with Dyson’s explicit computation (formula (72) in [Dys53]; the factor
1
comes from ε = z in the formula for M (z)).
4
4
4.1
Spectral measures for groups
Random Schroedinger operators from group ring elements
In this section, we use random Schroedinger operators to study spectral measures of group
ring elements. The construction and exposition below is based on [Gra14]. We assume
familiarity with Pontryagin duality for Abelian groups.
Let Γ be a discrete group, M a discrete Abelian group and ρ : Γ y M an action of Γ
c denote the Pontryagin dual of M . Each m ∈ M determines a function
on M . Let X = M
m
b : X → C, given by m(x) = x(m), and by linearity we can extend this to C[M ], i.e. to any
f ∈ C[M ] we associate fb : X → C, which we shall call the Fourier transform of f .
Given ρ, we also have a dual action ρb : Γ y X, given by (b
ρ(γ)(x))(m) = x(ρ(γ −1 ) · m).
If we choose a generating set S for Γ, we can consider the Schreier graph Schr(Γ, X, S)
associated to the dual action ρb.
We consider the semidirect product corresponding to the action ρ, i.e. the group G =
M o Γ. Let H ∈ C[G] be a self-adjoint group ring element, which we identify with the
24
corresponding self-adjoint operator H : `2 (G) → `2 (G). Every such element can be written
as:
X
H=
γ · fγ
γ
where fγ ∈ C[M ]. Let fbγ : X → C denote the dual of fγ .
For x ∈ X, let Schr(x) denote the connected component of the Schreier graph Schr(Γ, X, S)
containing x. We define Hx : `2 (Schr(x)) → `2 (Schr(x)) as the convolution operator on
Schr(x) with the following edge labels. The label of edge from y to ρb(γ) · y is given by
fbγ (y). Note that since X is equipped with the Haar measure ν, we can treat Hx as a random
operator, where x is chosen randomly according to ν.
For a self-adjoint H : `2 (G) → `2 (G), µH will denote its spectral measure, i.e. the unique
measure such that for any k ≥ 0, we have:
Z
k
δe , H δe =
xk dµH (x)
R
where δe ∈ `2 (G) equals 1 at e (the identity element) and zero otherwise.
In order to compute µH , we invoke the following theorem [Gra14], which gives the correspondence between the spectral measure of H and the expected spectral measure of Hx .
Theorem 4.1. The spectral measure µH is equal to the expected spectral measure of the
family Hx , i.e. for any Borel subset A:
Z
µH (A) =
µHx (A)dν(x)
X
In the examples we study, we shall take Γ = Z and fγ 6= 0 only for γ = a, a−1 , where
a = 1 is the standard generator of Z. In that case, the corresponding operator Hx can be
easily described. If x ∈ X is chosen from the Haar measure ν on X, for almost every x
Schr(x) will be isomorphic to Z, with the edge weight from n to n + 1 given by fbγ (b
ρ(an )(x)).
Therefore Hx is a random Schroedinger operator on Z, where the randomness in edge weights
fbγ (b
ρ(an )(x)) comes from the random choice of x.
The above correspondence shows that in order to compute µH , it suffices to analyze the
expected spectral measure of the random Schroedinger operator Hx . We shall now perform
this computation for specific examples, using results derived in previous sections.
4.2
Semidirect products by hyperbolic matrices
In this section we consider groups G of the following form.
Let
Z act on Z×Z by a hyperbolic
2 1
matrix A ∈ SL(2, Z). For concreteness we take A =
.
1 1
Let G = Z × Z oA Z be the corresponding semidirect product. Let s, t be the standard
generators of Z × Z and let a denote the generator of Z. Note that groups of this type
correspond precisely to lattices in the Sol group [MS12].
25
We consider the switch-walk operator H ∈ C[G] shifted by 5e:
H = a · (s + t + s−1 + t−1 + 5e) + (s + t + s−1 + t−1 + 5e) · a−1
We shall prove the following theorem:
Theorem 4.2. The spectral measure of H ∈ C[G] satisfies:
µH (−ε, ε) =
C
(1 + oε (1))
log2 ε
for some constant C > 0. In particular, the Novikov-Shubin invariant of H is equal to 0.
We start with a technical lemma needed to ensure that assumptions of the main theorem
are satisfied.
Lemma 4.3. Let {Ui }∞
i=1 be a stationary sequence of random variables such that EUi = 0,
4
EUi < ∞. Let Ui1 ,...,ik = Ui1 · · · · · Uik . Assume that Ui1 ,...,ik satisfy uniformly exponential
correlation decay, i.e. there exist c > 0 and λ < 1 such that for any l ≥ 2 and any
i1 ≤ · · · ≤ ik ≤ ik+1 ≤ · · · ≤ il we have:
EUi1 ,...,ik ,ik+1 ,...,il − EUi1 ,...,ik · EUik+1 ,...,il ≤ cλik+1 −ik
Then Ui satisfy Condition 3.6 with γ = 4, i.e. for some constant C > 0:
E(U1 + · · · + Un )4 ≤ Cn2
Proof. Let us expand:
E(U1 + · · · + Un )4 =
X
EUi1 ,...,i4
1≤i1 ,...,i4 ≤n
Let us order the indices so that i1 ≤ · · · ≤ i4 . We define a block of size l to be a maximal
set of indices I = {ik , ik+1 , . . . , ik+l−1 } such that |ik+j − ik+j−1 | ≤ b log n for j = 1, . . . , l − 1,
with b chosen so that cλb log n = n−2 .
Consider a term in which there is a block containing only a single index ik . The number
of such terms is at most n4 . By correlation decay, for each such term we can write:
EUi1 ,...,ik−1 ,ik ,...,i4 ≤ EUi1 ,...,ik−1 · EUik ,...,i4 + n−2 ≤ EUi1 ,...,ik−1 · (EUik · EUik+1 ,...,i4 + n−2 ) + n−2
Since EUi = 0, the contribution from a single such term is O(n−2 ), so the total contribution
from such terms is O(n2 ).
If there is no block with only a single index, then there is either one block {i1 , i2 , i3 , i4 } or
two blocks {i1 , i2 }, {i3 , i4 }. The number of one block terms is at most n · (b log n)3 = O(n2 ),
so we only need to bound the contribution from the two block terms. Note that for any k:
EUik ik+1 ≤ cλik+1 −ik
26
Since i3 − i2 > b log n, we have:
EUi1 ,i2 ,i3 ,i4 ≤ EUi1 ,i2 · EUi3 ,i4 + n−2 ≤ c2 · λi2 −i1 · λi4 −i3 + n−2
The second term is again bounded by the number of possible terms n4 times n−2 , which
gives O(n2 ). For the first term on the right hand side, there are n choices for i1 and i3 , and
once these are chosen, summation over possible values of i2 and i4 gives a geometric series
1
, so we obtain that the total contribution is also O(n2 ).
bounded by 1−λ
Proof of Theorem 4.2. We apply the construction from Section 4.1. The Pontriagin dual of
Z × Z is equal to T = S 1 × S 1 , with the dual action ρb given by ρb(a)(x) = AT x. To simplify
expressions we define B = AT . Let f = s + t + s−1 + t−1 + 5e. The dual fb : T → C is given
by:
fb(z1 , z2 ) = 2Rez1 + 2Rez2 + 5
By construction from Section 4.1, the random Schroedinger operator corresponding to H is
given as follows. The random edge weight from n to n + 1 is given by an = fb(B n x), where
x ∈ T chosen uniformly from the Haar measure.
It suffices to check that the random Schroedinger operator defined as above satisfies the
explicitly, we obtain:
assumptions of Theorem 3.10. Writing Ui = log a2i−1
a2i
fb(B 2i−1 x)
Ui = log
fb(B 2i x)
Letting φ : T → R be equal to:
φ(y) = log
2Re(B −1 y1 ) + 2Re(B −1 y2 ) + 5
2Re(y1 ) + 2Re(y2 ) + 5
(24)
and S = B 2 we can write Ui = φ(S i x). Note that, thanks to the shift by 5e, φ is a well
defined C ∞ -function on T.
We first check that Ui satisfy the functional Central Limit Theorem. We say that φ :
T → R is a coboundary if there exists a measurable h such that φ = h − h ◦ S. We can
invoke the functional Central Limit Theorem proved for actions of toral automorphisms in
[LB99], which can be stated as follows:
Proposition 4.4. Let S : T → T be a toral map generated by a hyperbolic matrix. Let
φ ∈ L2 (T) with Fourier series:
X
φ(·) =
ck · e2iπhk,·i
k∈Z2
R
such that c0 = T φ = 0.
If φ is not a coboundary and the Fourier coefficients ck satisfy for some A > 0 and θ > 2:
c(k1 ,k2 ) ≤ A
2
Y
i=1
1
1
2
(1 + |ki |) logθ (2 + |ki |)
then the functional Central Limit Theorem holds for the sequence {S i φ}∞
i=0 .
27
(25)
This statement is implied by the main theorem of [LB99] via Remark 1 therein.
Since φ as defined is (24) is a smooth function, its Fourier coefficients ck decay faster
than any polynomial |k|−α , so in particular condition (25) is satisfied.
It remains to check that φ is not a coboundary.
To this end, it suffices to exhibit a
Pk−1
k−1
i
periodic orbit {x, Sx, . . . , S x} such that i=0 φ(S x) 6= 0. Recalling that S = B 2 and
φ(y) = g(B −1 y) − g(y) for g(y) = log |2Rey1 + 2Rey2 + 5|, this is equivalent to:
g(x) + g(B 2 x) + · · · + g(B 2k x) 6= g(Bx) + g(B 3 x) + · · · + g(B 2k+1 x)
(26)
2 1
Recall that B = AT =
. It is readily checked that the set {( 13 , 0), ( 32 , 13 ), ( 23 , 0), ( 13 , 23 )}
1 1
4
4
3
4
2
2
is periodic and corresponds to the set of points {(e 3 iπ , 1), (e 3 iπ , e 3 iπ ), (e 3 iπ , 1), (e 3 iπ , e 3 iπ )} ⊆
T. After computing both sides of (26) we conclude that they are not equal, which proves
that φ is not a coboundary. Note that this is the only step of the proof where we use the
specific form of the matrix A and the same proof will hold for different choices of A, provided
one can prove that φ is not a coboundary (e.g. by exhibiting a suitable periodic orbit).
The second step is to verify that Ui satisfy Condition 3.6. This is taken care of by
Lemma 4.3, provided we can establish uniform exponential correlation decay. Actions of
hyperbolic matrices are well known to satisfy such exponential decay of correlations for
smooth observables. We use the main theorem from [Rue76], which implies the following as
a special case:
Proposition 4.5. Let S : T → T be a toral map generated by a hyperbolic matrix. Then
there exist C, k > 0 such that if φ0 , φ00 : T → R are C 1 functions, we have:
0
00
0
µ((φ0 ◦ S −m ) · (φ00 ◦ S −m )) − µ(φ0 ) · µ(φ00 ) ≤ Ckφ0 kC 1 · kφ00 kC 1 · e−k|m −m
R
where µ(f ) = T f dµ and µ is the Lebesgue measure.
00 |
We use the notation of Lemma 4.3. Let l ≥ 2 and let i1 ≤ · · · ≤ ik ≤ ik+1 ≤ · · · ≤ il be
such that |ik+1 − ik | ≥ n. Define:
0
φ (x) = Ui1 +n,...,ik +n =
k
Y
Uij +n =
j=1
00
φ (x) = Uik+1 ,...,il =
l
Y
j=k+1
Uij =
k
Y
φ(S ij +n x)
j=1
l
Y
φ(S ij x)
j=k+1
so that EUi1 ,...,ik = µ(φ0 ◦ S −n ) = µ(φ0 ) and EUik+1 ,...,il = µ(φ00 ).
With this notation, we have:
Ui1 ,...,il =
l
Y
Uij = (φ0 ◦ S −n ) · φ00
j=1
0
−n
00
and EUi1 ,...,il = µ((φ ◦ S ) · φ ). Note that kφ0 kC 1 , kφ00 kC 1 are bounded by a global constant
that depends only on l and kφkC 1 . Applying Proposition 4.5 for m0 = 0, m00 = n proves that
the assumptions of Lemma 4.3 are satisfied, so Ui satisfy Condition 3.6.
28
4.3
Lamplighter groups
We shall now describe how a similar approach can be used for computing spectral measures
of lamplighter groups. We start with the standard lamplighter group Z2 o Z = ⊕Z Z2 o Z.
Let Z2 = {e, t}. Let e0 denote the element of ⊕Z Z2 that has e at every position and
let ti denote the element of ⊕Z Z2 that has t at position zero and e elsewhere. Consider the
switch-walk operator H ∈ C[Z2 o Z] given by:
H = a · (p · e0 + (1 − p) · t0 ) + (p · e0 + (1 − p) · t0 ) · a−1
so letting fa = p · e0 + (1 − p) · t0 we have:
H = a · fa + fa · a−1
This operator corresponds to the random walk on G where at each step we move either left
or right and then either leave the current lamp intact with probability p or change it with
probability 1 − p.
Q
The Pontriagin dual of M = ⊕Z Z2 is equal to X = Z Z2 , with the Haar measure on
X being the usual product measure. Since ρ : Z y M is action by translations, the dual
action ρb : Z y X is given by (b
ρ(a)(y))j = yj−1 , i.e. the Bernoulli shift. Therefore, the edge
weights in the corresponding
random
Schroedinger operator will be
Q
Q i.i.d. with distribution
y0
b
b
determined by fa : Z Z2 → C. Since eb0 = 1, t0 = (−1) , for y ∈ Z Z2 we have:
fba (y) = p + (1 − p)(−1)y0
so the edge weight is equal to 1 or 2p − 1 with probability
We consider p 6=
1
,
2
1
2
each.
as otherwise the relevant random variables log
a2i−1
a2i
are infinite with
positive probability (note that p = 21 gives edge weights 0 or 1, i.e. the edge percolation on
Z). For such an operator we can apply Theorem 3.10 and obtain the spectral measure at
zero to be µH (−ε, ε) ≈ |logCε|2 , with C = 14 (log |2p − 1|)2 .
A similar approach can be used for general lamplighter groups of the form G = Λ o Z,
where the lamp group Λ is not necessarily
Abelian or finite. Let Λ be generated by a set S
P
1
s
closed under inverses and let λ = |S|
s∈S 0 . Consider the switch-walk operator H ∈ C[G]
given by:
H = a · λ + λ · a−1
Such an operator corresponds to the random walk on G where at each step we move either
left or right and then change the lamp by performing a step of a simple random walk in Λ.
In this setting, it is known (Grabowski and Virág, unpublished) that the random Schroedinger
operator corresponding to H is obtained by putting i.i.d. weights on the edges, each drawn
from the distribution given by µλ , the spectral measure of the simple random walk on Λ. As
before, we are in position to use Theorem 3.10 and get µH (−ε, ε) ≈ |logCε|2 .
NoteP
that this method can be extended to H of more general form, where instead of
1
λ = |S| s∈S s0 we consider general elements f ∈ C[⊕Z Λ], in particular, involving si for
29
i 6= 0. In that case, the edge weights in the corresponding random Schroedinger operator
will not be independent anymore. However, what remains true is the edge weights are
obtained by a factor of i.i.d. process. More precisely, if f contains only si for |i| ≤ k, the
edge weights in the operator will be obtained as follows - we put i.i.d. labels on the edges and
then each edge is assigned a weight that depends only on the labels in a neighborhood of that
edge of size k. Thus, the obtained weights are weakly dependent and the same technique as
in Section 4.2 can be used to obtain the theorem in this case.
Acknowledgements
The work was supported by the Canada Research Chair program, the Marie Curie grant
SPECTRA, the OTKA grant K109684, and the NSERC Discovery Accelerator Program.
References
[Bil95]
Patrick Billingsley, Probability and Measure, 3 ed., Wiley-Interscience, April 1995.
[BS10]
Zhidong Bai and Jack W. Silverstein, Spectral analysis of large dimensional random
matrices, second ed., Springer Series in Statistics, Springer, New York, 2010.
[BSV13] Charles Bordenave, Arnab Sen, and Balint Virag, Mean quantum percolation, http:
//arxiv.org/abs/1308.3755, 2013.
[CP89]
Massimo Campanino and J. Fernando Perez, Singularity of the density of states for
one-dimensional chains with random couplings, Communications in Mathematical
Physics 124 (1989), no. 4, 543–552.
[Dur10] R. Durrett, Probability: Theory and examples, Cambridge Series in Statistical and
Probabilistic Mathematics, Cambridge University Press, 2010.
[Dys53] Freeman J. Dyson, The dynamics of a disordered linear chain, Phys. Rev. 92 (1953),
1331–1338.
[Eck00] Beno Eckmann, Introduction to l2-methods in topology: Reduced l2-homology, harmonic chains, l2-betti numbers, Israel Journal of Mathematics 117 (2000), no. 1,
183–219 (English).
[ER78]
T. P. Eggarter and R. Riedinger, Singular behavior of tight-binding chains with
off-diagonal disorder, Phys. Rev. B 18 (1978), 569–575.
[Gra14] Lukasz Grabowski, On turing dynamical systems and the atiyah problem, Inventiones mathematicae 198 (2014), no. 1, 27–69 (English).
[GV]
Lukasz Grabowski and Balint Virag, Spectra of lamplighter graphs via
random schrodinger operators, http://people.maths.ox.ac.uk/grabowski/
lamplighters_via_schroedinger.pdf.
30
[Kal02] O. Kallenberg, Foundations of modern probability, Probability and Its Applications,
Springer New York, 2002.
[LB99]
Stéphane Le Borgne, Limit theorems for non-hyperbolic automorphisms of the torus,
Israel Journal of Mathematics 109 (1999), no. 1, 61–73 (English).
[LL95]
John Lott and Wolfgang Lück, L 2-topological invariants of 3-manifolds, Inventiones mathematicae 120 (1995), no. 1, 15–60 (English).
[Lüc02] W. Lück, L2-invariants: Theory and applications to geometry and k-theory, A Series
of Modern Surveys in Mathematics Series, Springer, 2002.
[Mó76]
F. Móricz, Moment inequalities and the strong laws of large numbers, Zeitschrift
für Wahrscheinlichkeitstheorie und Verwandte Gebiete 35 (1976), no. 4, 299–314
(English).
[MP10] P. Mörters and Y. Peres, Brownian motion, Cambridge Series in Statistical and
Probabilistic Mathematics, Cambridge University Press, 2010.
[MS12]
Emil Molnár and Jenő Szirmai, Classification of sol lattices, Geometriae Dedicata
161 (2012), no. 1, 251–275 (English).
[Rue76] David Ruelle, A measure associated with axiom-a attractors, Am. J. Math. 98
(1976), 619–654 (English).
31
| 4math.GR
|
IEEE COMMUNICATIONS LETTERS
1
Joint Fractional Time Allocation and Beamforming
for Downlink Multiuser MISO Systems
arXiv:1706.01771v2 [cs.IT] 28 Aug 2017
Van-Dinh Nguyen, Hoang Duong Tuan, Trung Q. Duong, Oh-Soon Shin, and H. Vincent Poor
Abstract—It is well-known that the traditional transmit beamforming at a base station (BS) to manage interference in serving
multiple users is effective only when the number of users is less
than the number of transmit antennas at the BS. Non-orthogonal
multiple access (NOMA) can improve the throughput of users with
poorer channel conditions by compromising their own privacy
because other users with better channel conditions can decode the
information of users in poorer channel state. NOMA still prefers
that the number of users is less than the number of antennas at
the BS transmitter. This paper resolves such issues by allocating
separate fractional time slots for serving the users with similar
channel conditions. This enables the BS to serve more users within
the time unit while the privacy of each user is preserved. The
fractional times and beamforming vectors are jointly optimized
to maximize the system’s throughput. An efficient path-following
algorithm, which invokes a simple convex quadratic program at
each iteration, is proposed for the solution of this challenging
optimization problem. Numerical results confirm its versatility.
Index Terms—Beamforming, fractional time allocation, nonconvex optimization, path-following method.
I. I NTRODUCTION
In multi-user communication, the signal received by any user
(UE) is a superposition of the desired information and the
information intended for other UEs. Transmit beamforming at a
base station (BS) plays a pivotal role in focusing the energy of
the desired signal and suppressing the multi-user interference
to achieve better throughput at UEs [1], [2]. For effective
beamforming, the number of UEs usually does not exceed the
number of transmit antennas. Using more transmit antennas
and thus increasing the dimensionality of beamforming vectors
can improve the UEs’ throughput with reduced transmit power.
However, allocating more transmit power under fixed number
of transmit antennas still does not necessarily improve the UEs’
throughput.
This work was supported in part by the National Research Foundation of
Korea (NRF) grant funded by the Korean government (MSIT) (No. NRF2017R1A5A1015596), in part by Basic Science Research Program through
the NRF funded by the Ministry of Education (No. 2017R1D1A1B03030436),
in part by the U.K. Royal Academy of Engineering Research Fellowship under
Grant RF1415/14/22 and by the U.K. Engineering and Physical Sciences
Research Council (EPSRC) under Grant EP/P019374/1, and in part by the
KAUST Grant No. OSR-2016-CRG5-2958-0 and U.S. National Science Foundation Grant ECCS-1647198. (Corresponding author: Oh-Soon Shin.)
V.-D. Nguyen and O.-S. Shin are with the School of Electronic Engineering
and the Department of ICMC Convergence Technology, Soongsil University,
Seoul 06978, Korea (e-mail: {nguyenvandinh, osshin}@ssu.ac.kr).
H. D. Tuan is with the Faculty of Engineering and Information Technology,
University of Technology Sydney, Broadway, NSW 2007, Australia (email:
[email protected]).
T. Q. Duong is with the School of Electronics, Electrical Engineering and
Computer Science, Queen’s University Belfast, Belfast BT7 1NN, United
Kingdom (e-mail: [email protected]).
H. V. Poor is with the Department of Electrical Engineering, Princeton
University, Princeton, NJ 08544 USA (e-mail: [email protected]).
Non-orthogonal multiple access (NOMA) [3], [4] has been
introduced to improve the UEs’ throughput by allowing UEs
with better channel conditions to access and decode the signals,
which are intended for the UEs with poorer channel conditions.
In other words, the UEs with poorer channel conditions can
achieve higher throughput by compromising their information
privacy in NOMA [5]. This privacy compromise for the UEs
with poor channel conditions is unavoidable in NOMA. Moreover, by restricting all beamforming vectors in the same space,
beamforming in NOMA still needs that the dimension of this
space, which is equal to the number of transmit antennas,
should not be less than the number of UEs to allow the
suppression of multiuser interference [6].
It is noteworthy that the UEs with good channel conditions
may need only a fraction of the time unit to achieve their needed
throughput. Therefore, by serving them only per fractional
time, the BS still has the remaining time room to serve the
UEs with poor channel conditions. In this way, the information
privacy for each UE is preserved because all UEs are allowed
to decode their own information only. More importantly, the
number of UEs supported at the same fractional time is
effectively reduced. Thus, the BS will not need more transmit
antennas to suppress the multi-user interference. In this letter,
the fractional time allocation to UEs with similar channel
conditions and beamforming are enhanced for improving the
system’s throughput and meeting the UEs’ quality-of-service
(QoS) in terms of the throughput requirement. This problem is
mathematically modelled by a highly nonconvex optimization
problem, for which a path-following computational procedure
of low complexity is then developed for its computation.
Finally, the numerical examples are provided to demonstrate
the advantage of the proposed optimization scheme.
Notation. We use bold upper-case letters for matrices, bold
lower-case letters for column vectors, lower-case letters for
scalars. ℜ{x} denotes the real part of a complex number
x. The notation (·)H stands for the Hermitian transpose.
x ∼ CN (η, Z) means that x is a random vector following
a complex circular Gaussian distribution with mean η and
covariance matrix Z.
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
Consider a multiuser downlink system over a given frequency
band with a BS equipped with Nt > 1 antennas in serving
2K single-antenna UEs as illustrated by Fig. 1. There are K
UEs (1, k), k = 1, . . . K, which are located in a zone nearer
to the BS, called by zone-1, and K UEs (2, k), k = 1, . . . , K,
which are located in a zone farer from the BS, called by zone-2.
Denote by K , {1, 2, . . . , K} and M = {1, 2}×K. Within one
time unit, BS uses the fraction time (FT) τ1 := τ (0 < τ < 1)
2
IEEE COMMUNICATIONS LETTERS
500
to serve UEs (1, k) and uses the remaining FT τ2 := (1 − τ )
to serve UEs (2, k).
The BS deploys a transmit beamformer wi,k ∈ CNt ×1 to
deliver the information signal xi,k with E{|xi,k |2 } = 1 to UE
(i, k). Let hi,k ∈ CNt ×1 be the channel vector from the BS
to UE (i, k), which is assumed to follow frequency flat fading
with the effects of both large-scale pathloss and small-scale
fading counted. The complex baseband signal received by UE
(i, k) can be expressed as
X
yi,k = hH
i,k wi,k xi,k +
Ri,k wi , τi
2
|hH
i,k wi,k |
2
2
|hH
i,k wi,j | + σi,k
j∈K\{k}
2
2
|hH
i,k wi,j | + σi,k
(1)
under the additional condition
ℜ{hH
i,k wi,k }
≥ 0, (i, k) ∈ M.
2
(ℜ{hH
i,k wi,k })
(i,j)∈M\{(i,k)}
2
2
|hH
i,k wi,j | + σi,k
w,τ
X
(i,k)∈M
y-coordinate (m)
(2,4)
Ri,k (wi , τi ) s.t. (2),
Ri,k wi , τi ≥ R̄i,k , ∀(i, k) ∈ M,
max
τ1 kw1 k2 + τ2 kw2 k2 ≤ Pbs
,
τ1 ≥ 0, τ2 ≥ 0, τ1 + τ2 ≤ 1.
100
300
500
Scenario with K = 4.
III. C ONVEX Q UADRATIC - BASED PATH - FOLLOWING
METHOD
1/α1 + 1/α2 ≤ 1, α1 > 0, α2 > 0.
(i,k)∈M
Ri,k (wi , 1/αi ) ≥ R̄i,k , ∀(i, k) ∈ M,
2
(3)
(4a)
(4b)
(4c)
(4d)
Here R̄i,k sets a minimum throughput requirement for UE (i, k)
max
and Pbs
is a given power budget. Since Ri,k (wi , τi ) is a
nonconcave function, the optimization problem (4) is regarded
as a highly nonconvex optimization problem, for which finding
a feasible point is already computationally difficult. The next
section is devoted to a computational path-following procedure
for its solution.
(5)
The problem (4) can be equivalently expressed as
X
Ri,k (wi , 1/αi ) s.t. (2), (5), (6a)
max Φ(w, α ) ,
(2)
with the full inter-zone interference. Here and in the sequence
w , (w1 , w2 ) and τ , (τ1 , τ2 ).
We are interested in the following problem of jointly designing FT (τ1 , τ2 ) and the beamformers (w1 , w2 ) to maximize the
system sum throughput (ST):
max
(2,1)
(1,3)
−500
−500 −300 −100
α
w,α
The main advantage of this FT-based beamforming scheme is
that there is no inter-zone interference in (1) that is in contrast
with the conventional scheme to concurrently serve all UEs,
under which the throughput at UE (i, k) is
′
Ri,k (w) = ln 1 + P
(2,2)
The most important step is to provide an effective lower
bounding approximation for the function Ri,k (wi , τi ) defined
by (1) to facilitate a path-following computational procedure of
the problem (4). We use the variable changes α , (α1 , α2 ) =
(1/τ1 , 1/τ2 ), which satisfy the following convex constraint:
which by [7] can be equivalently reformulated by
2
(ℜ{hH
i,k wi,k })
(1,4)
(1,1)
−300
Fig. 1.
j∈K\{k}
Ri,k wi , τi = τi ln 1 + P
−100
(1,2)
x-coordinate (m)
where the first term is the desired signal, the second term is the
2
multi-user interference, and the third term ni,k ∼ CN (0, σi,k
)
is additive noise. For wi , (wi,k )k∈K , the throughput at UE
(i, k) is
= τi ln 1 + P
(2,3)
100
hH
i,k wi,j xi,j + ni,k
j∈K\{k}
300
BS
UEs in zone-1
UEs in zone-2
2
(1 − 1/α2 )kw1 k + kw2 k /α2 ≤
(6b)
max
Pbs
.
(κ)
(6c)
(κ)
At a feasible point (w(κ) , α (κ) ), define xi,k , ℜ{hH
i,k wi,k } >
P
(κ)
(κ)
(κ) 2
(κ)
(κ) 2
H
2
0, yi,k , j∈K\{k} |hi,k wi,j | + σi,k , di,k , (xi,k ) /yi,k >
(κ)
(κ)
(κ)
(κ)
(κ)
(κ)
0, ai,k , 2Ri,k (wi , 1/αi ) + di,k /αi (di,k + 1) >
(κ)
(κ)
(κ)
(κ) (κ)
0, bi,k , (di,k )2 /αi (di,k + 1) > 0, and ci,k ,
(κ)
(κ)
Ri,k (wi , 1/(αi )2 ) > 0. It follows from the inequality (13)
in the appendix that
(κ)
Ri,k (wi , 1/αi ) ≥ Ri,k (wi , αi )
over the trust region
(κ)
H
2ℜ{hH
i,k wi,k } − ℜ{hi,k wi,k } > 0, ∀(i, k) ∈ M,
(7)
for the concave function
(κ)
Ri,k (wi , αi )
,
(κ)
(κ)
ai,k −bi,k
2
2
H
j∈K\{k} |hi,k wi,j | + σi,k
(κ)
−ci,k αi .
(κ)
(κ)
H
xi,k (2ℜ{hi,k wi,k } − xi,k )
P
Next, due to the convexity of function kw1 k2 /α2 , it is true that
(κ)
(κ)
(κ)
(κ)
kw1 k2 /α2 ≥ 2ℜ{(w1 )H w1 }/α2 − (kw1 k2 /(α2 )2 )α2 .
An inner convex approximation of nonconvex constraint (6c)
is then given by
(κ)
(κ)
kw1 k2 + kw2 k2 /α2 − 2ℜ{(w1 )H w1 }/α2
(κ)
(κ)
+(kw1 k2 /(α2 )2 )α2
max
≤ Pbs
. (8)
Initialized by a feasible point (w(0) , α (0) ) for (6), the following
convex quadratic program (QP) is solved at the κ-th iteration
NGUYEN et al.: JOINT FRACTIONAL TIME ALLOCATION AND BEAMFORMING FOR DOWNLINK MULTIUSER MISO SYSTEMS
(κ+1)
TABLE I
S IMULATION PARAMETERS
Parameters
Noise power density
Path loss from the BS to UE (i, k), σPL
Radius of cell
Coverage of zone-1 UEs
Distance between the BS and nearest user
α(κ+1)
to generate the next feasible point (w
,α
):
X
(κ)
Ri,k (wi , αi ) s.t.
max Φ(κ) (w, α ) ,
α
w,α
(i,k)∈M
≥ R̄i,k , ∀(i, k) ∈ M, (2), (5), (7), (8).
(9)
As problem (9) involves m = 2(3K + 1) quadratic and linear
constraints, and n = 2(KNt + 1) real decision variables, its
computational complexity is O(n2 m2.5 + m3.5 ).
Note that Φ(w, α )
≥
Φ(κ) (w, α ) ∀(w, α ),
(κ)
(κ)
(κ)
and Φ(w , α )
=
Φ (w(κ) , α (κ) ). Moreover,
(κ)
(κ+1)
(κ+1)
Φ (w
,α
)
>
Φ(κ) (w(κ) , α (κ) ) whenever
(κ+1)
(κ+1)
(κ)
(w
,α
) 6= (w , α (κ) ) because the former
and the latter, respectively, are the optimal solution and
feasible point for (9). Therefore, Φ(w(κ+1) , α (κ+1) ) ≥
Φ(κ) (w(κ+1) , α (κ+1) ) > Φ(κ) (w(κ) , α (κ) ) = Φ(w(κ) , α (κ) ),
showing that (w(κ+1) , α (κ+1) ) is a better feasible point than
(w(κ) , α (κ) ) for (6). The sequence {(w(κ) , α (κ) )} of improved
feasible points for (6) thus converges at least to a locally
optimal solution satisfying the Karush-Kuh-Tucker conditions
[8]. We summarize the proposed QP-based path-following
procedure in Algorithm 1.
Generation of an initial point.: Initialized from a feasible
point (w(0) , α (0) ) for constraints (5) and (8), we iterate the
convex program
(κ)
max min Ri,k (wi , αi )/R̄i,k
α (i,k)∈M
w,α
(κ)
s.t. (2), (5), (7), (8) (10)
(κ+1)
(κ+1)
)/R̄i,k ≥ 1 to
, αi
till reaching min(i,k)∈M Ri,k (wi
make (w(κ+1) , α (κ+1) ) feasible for (6) and thus usable as an
initial feasible point for implementing Algorithm 1.
IV. N UMERICAL R ESULTS
Monte Carlo simulations have been implemented to evaluate
the performance of the proposed algorithm for K = 4 (8 UEs)
and Nt = 5 per the scenario in Fig. 1. The channel vector hi,k
between the BS and UE√(i, k) at a distance di,k (in kilometres)
is generated as hi,k = 10−σPL /10 h̃i,k , where σPL is the path
loss (PL) in dB and h̃i,k ∼ CN (0, INt ) represents small-scale
effects. The other parameters are given by Table I. Without
loss of generality, R̄i,k ≡ R̄ is set. The numerical results are
obtained using the parser YALMIP [9].
We compare the performance of the proposed FTbased beamforming scheme with five other beamforming schemes: (i) “Conventional DL,” under which the
problem
is formulated similarly as:
P of ST maximization
′
′
maxw (i,k)∈M Ri,k (w) s.t. Ri,k (w) ≥ R̄i,k , (i, k) ∈
50
Proposed FT
NOMA
FT + NOMA in both zones
FT + NOMA in zone-1
FT + NOMA in zone-2
Conventional DL
40
30
20
20
25
30
35
max
Transmit power at the BS, Pbs
[dBm]
40
(a) R̄ = 0 bps/Hz.
60
Average sum throughput (bps/Hz)
(κ)
Ri,k (wi , αi )
Value
-174 [dBm/Hz]
128.1 + 37.6log10 (di,k ) [dB]
500 [m]
200 [m]
> 10 [m]
60
Average sum throughput (bps/Hz)
Algorithm 1 QP-based path-following algorithm for ST maximization problem (4)
Initialization: Iterate (10) for an initial feasible point
(w(0) , α (0) ). Set κ := 0
1: repeat
2:
Solve convex quadratic program (9) to obtain the optimal
solution: (w(κ+1) , α (κ+1) ).
3:
Set κ := κ + 1.
4: until Convergence
3
50
40
Proposed FT
NOMA
FT + NOMA in both zones
FT + NOMA in zone-1
FT + NOMA in zone-2
Conventional DL
30
20
10
20
25
30
35
max
Transmit power at the BS, Pbs
[dBm]
40
(b) R̄ = 1 bps/Hz.
Fig. 2.
max .
Average sum throughput versus Pbs
max
M, kw1 k2 + kw2 k2 ≤ Pbs
under the definition (3); (ii)
“NOMA”: each UE in zone-1 is paired with an UE in zone2 according to the clustering algorithm in [10] to create a
virtual cluster. In each cluster, both UEs decode the signal
intended for the UE in zone-2 and then the UE in zone-1
processes successive interference cancellation (SIC) to cancel
the interference of the UE in zone-2 in decoding its own signal;
(iii) “FT + NOMA in both zones”: under FT, NOMA is zonewide adopted; (iv) “FT + NOMA in zone-1”: under FT, NOMA
is adopted only in zone-1; and (v) “FT + NOMA in zone-2”:
under FT, NOMA is adopted only in zone-2. The reader is
referred to [6, Sec. V] for beamforming under NOMA, which
is used in these five schemes. The computational complexity of
each iteration in NOMA is similar to that of (9). Note that the
performance of NOMA-based beamforming can be improved
by involving more UEs in virtual clusters [6, Sec VI] but the
UEs’ privacy is more compromised. On average, Algorithm 1
requires about 10 iterations for convergence.
Fig. 2 plots the average achievable ST versus the transmit
max
power Pbs
for Nt = 5. For R̄ = 0 bps/Hz shown in Fig. 2(a),
one can see that the ST of the proposed FT-based beamforming
is higher than that achieved by the other schemes in the high
transmit power region. On the other hand, the conventional DL
outperforms NOMA and FT+NOMA schemes for high transmit
4
IEEE COMMUNICATIONS LETTERS
Average sum throughput (bps/Hz)
60
40
20
0.4
0.6
0.8
1
Throughput threshold, R̄ [bps/Hz]
1.2
max = 30 dBm.
Average sum throughput versus R̄ for Pbs
Average max-min throughput (bps/Hz)
Fig. 4.
V. C ONCLUSIONS
The paper has proposed a fractional time-based beamforming
scheme at a base station to serve two groups of users, which
is able to improve the network throughput while preserving
the information privacy for the users. Accordingly, a pathfollowing computational procedure for the joint design of
fractional times and beamforming vectors to maximize the
network throughput has been developed. Extensive simulations
have been provided to demonstrate the superior performance
of the proposed scheme over the exiting schemes.
30
10
0.2
Fig. 3.
others schemes.
Proposed FT
NOMA
FT + NOMA in both zones
FT + NOMA in zone-1
FT + NOMA in zone-2
Conventional DL
50
5
4
3
Proposed FT
NOMA
FT + NOMA in both zones
FT + NOMA in zone-1
FT + NOMA in zone-2
Conventional DL
A PPENDIX
For all x > 0, x̄ > 0, y > 0, ȳ > 0, t > 0, and t̄ > 0, it is
true that
ln(1 + x2 /y)
y
(12)
≥ a − b 2 − ct
t
x
y
− ct
(13)
≥ a−b
x̄(2x − x̄)
2
1
0
20
25
30
35
max
Transmit power at the BS, Pbs
[dBm]
over the trust region
40
2x − x̄ > 0,
max .
Average max-min throughput versus Pbs
power by making the ST concentrated at those UEs with good
channel conditions. Apparently, NOMA does not look efficient
when there is no UEs’ QoS requirement. In Fig. 2(b) with R̄ =
1 bps/Hz, the conventional DL performs worse than NOMA
max
at high Pbs
. The low STs of FT+NOMA-based schemes are
probably attributed to the fact that NOMA is more efficient by
max
exploiting their channel differentiation. Increasing Pbs
leads
to a remarkable gain in ST by the proposed FT compared with
the other schemes. In addition, the proposed FT is feasible in
max
all range of Pbs
while the other schemes cannot offer such
max
high QoS to UEs at low Pbs
.
The plot of the ST versus QoS requirement threshold R̄ ∈
[0.2, 1.2] bps/Hz is illustrated in Fig. 3. We can observe
that the proposed FT-based beamforming performs quite well
and only slightly degrades when R̄ increases. The performance
gap between the proposed FT-based beamforming and other
schemes substantially increases by increasing R̄. It is expected
because the proposed FT-based beamforming can tune the
power allocation in meeting zone-2 UEs’ QoS requirements
without causing interference to the zone-1’s UEs.
Next, we look for the max-min UE throughput optimization
problem
max min Ri,k (wi , τi )
w,τ (i,k)∈M
s.t. (4c), (4d)
(11)
which can be addressed similarly by solving the convex program (10) (with R̄i,k ≡ 1) at each iteration.
Fig. 4 plots the average UEs’ worst throughput as a function
max
of Pbs
. It shows that the worst throughput achieved by the
conventional DL and FT + NOMA-based schemes is saturated
max
once Pbs
is beyond a threshold. It also reveals that the
proposed FT-based beamforming and FT + NOMA in zone1 achieve worst throughput that is higher than that achieved by
(14)
2
where a = 2[ln(1+d)]/t̄+d/t̄(d+1) > 0, b = d /t̄(d+1) > 0,
c = [ln(1 + d)]/t̄2 > 0, d = x̄2 /ȳ. Inequality (12) follows
from [11] while inequality (13) is obtained by using x2 ≥
x̄(2x − x̄) > 0 over the trust region (14).
R EFERENCES
[1] X. Shang, B. Chen, and H. V. Poor, “Multiuser MISO interference
channels with single-user detection: Optimality of beamforming and the
achievable rate region,” IEEE Trans. Inf. Theory, vol. 57, no. 7, pp. 4255–
4273, July 2011.
[2] G. Caire and S. Shamai, “On the achievable throughput of a multiantenna
Gaussian broadcast channel,” IEEE Trans. Inf. Theory., vol. 49, no. 7, pp.
1691 – 1706, July 2003.
[3] Z. Ding, R. Schober, and H. V. Poor, “A general MIMO framework for
NOMA downlink and uplink transmission based on signal alignment,”
IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4483–4454, June
2016.
[4] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. L. I, and H. V. Poor,
“Application of non-orthogonal multiple access in LTE and 5G networks,”
IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2017.
[5] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to nonorthogonal multiple access,” IEEE Trans. Wireless Commun., vol. 15,
no. 1, pp. 537–552, Jan. 2016.
[6] V.-D. Nguyen, H. D. Tuan, T. Q. Duong, H. V. Poor, and O.-S. Shin,
“Precoder design for signal superposition in MIMO-NOMA multicell
networks,” IEEE J. Select. Areas Commun., 2017, to appear, available
at http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7974739.
[7] A. Wiesel, Y. Eldar, and S. Shamai, “Linear precoding via conic optimization for fixed MIMO receivers,” IEEE Trans. Signal Process., vol. 54,
no. 1, pp. 161 – 176, Jan. 2006.
[8] B. R. Marks and G. P. Wright, “A general inner approximation algorithm
for nonconvex mathematical programms,” Operations Research, vol. 26,
no. 4, pp. 681–683, July 1978.
[9] J. Löfberg, “YALMIP: A toolbox for modeling and optimization in
MATLAB,” in Proc. 2004 IEEE Inter. Symposium on Computer Aided
Control Systems Design, Sept. 2004, pp. 284–289.
[10] B. Kimy, S. Lim, H. Kim, S. Suh, J. Kwun, S. Choi, C. Lee, S. Lee, and
D. Hong, “Non-orthogonal multiple access in a downlink multiuser beamforming system,” in Proc. IEEE Military Commun. Conf. (MILCOM),
Nov. 2013, pp. 1278–1283.
[11] V.-D. Nguyen, T. Q. Duong, H. D. Tuan, O.-S. Shin, and H. V. Poor,
“Spectral and energy efficiencies in full-duplex wireless information and
power transfer,” IEEE Trans. Commun., vol. 65, no. 5, pp. 2220–2233,
May 2017.
| 7cs.IT
|
arXiv:1712.08418v2 [math.GR] 8 Jan 2018
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA
GROUPS
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Abstract. There are several natural families of groups acting on rooted
trees for which every member is known to be amenable. It is, however, unclear what the elementary amenable members of these families
look like. Towards clarifying this situation, we here study elementary
amenable bounded automata groups. We are able to isolate the elementary amenable bounded automata groups in three natural subclasses of
bounded automata groups. In particular, we show that iterated monodromy groups of post-critically finite polynomials are either virtually
abelian or not elementary amenable.
Contents
1. Introduction
2. Preliminaries
3. Reduced form
4. Technical results
5. Groups containing odometers
6. Kneading automata groups
7. Generalized basilica groups
8. Groups of abelian wreath type
9. Examples
References
1
5
8
11
15
21
28
35
41
45
1. Introduction
A group G is amenable if there exists a finitely additive translation invariant probability measure on all subsets of G. This definition was given
by J. von Neumann, [23], in response to the Banach-Tarski and Hausdorff
paradoxes. He singled out the property of a group which forbids paradoxical
actions.
The class of elementary amenable groups, denoted by EG, was introduced
by M. Day in [6] and is defined to be the smallest class of groups that
contains the finite groups and the abelian groups and is closed under taking
Date: January 9, 2018.
The second author was supported by NSA MSP #H98230-16-1-0047.
1
2
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
subgroups, quotients, extensions, and directed unions. The fact that the
class of amenable groups is closed under these operations was already known
to von Neumann, [23], who noted at that at that time there was no known
amenable group which did not belong to EG.
No substantial progress in understanding the class of elementary amenable
groups was made until the 80s. C. Chou, [5], showed that all elementary
amenable groups have either polynomial or exponential growth. Shortly
thereafter, R. Grigorchuk, [9], gave an example of a group with intermediate
growth, and such groups are necessarily amenable but by Chou’s work are
not elementary amenable. Grigorchuk’s group served as a starting point in
developing the theory of groups with intermediate growth.
In the same paper, Chou showed that every infinite finitely generated
simple group is not elementary amenable. In [14], it was shown that the
topological full group of a Cantor minimal system is amenable, and by the
results of H. Matui, [16], this group has a simple and finitely generated
commutator subgroup, in particular, it is not elementary amenable. This
was the first example of an infinite finitely generated simple amenable group.
The strategy of Matui has been extended in [4] and [17] to minimal actions of
Zd and groupoids, respectively. This has produced more examples of finitely
generated simple amenable groups in combination with results of [13], where
it is demonstrated that there are minimal actions of Z2 on the Cantor set
with amenable topological full groups.
Groups of automorphisms of rooted trees were the only source of groups
of intermediate growth until a recent result of V. Nekrashevych, [20], who
found finitely generated, torsion subgroups of the topological full group of
intermediate growth. These groups cannot act on rooted tree, since they
are simple.
Summarizing the above, the currently known sources of non-elementary
amenable groups are groups acting on rooted trees and topological full
groups of Cantor minimal systems.
There has been considerable progress in establishing amenability of groups
acting on rooted trees. L. Bartholdi, V. Kaimanovich, and Nekrashevych
in [2] proved that groups acting on rooted trees with bounded activity are
amenable; these are the so-called bounded automata groups. This was extended to groups of linear activity by G. Amir, O. Angel, and B. Virág in
[1], and in [15], Nekrashevych, M. de la Salle, and the first named author
extended this result further to groups of quadratic activity. These results
produce large families of amenable groups, but they do not identify the
non-elementary amenable members of the families. The first named author established what seems to be the first results studying the elementary
amenable groups that act on rooted trees in [12]. The present article picks
up this thread of research again. We here consider the elementary amenable
bounded automata groups.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
3
Question 1.1. What do elementary amenable bounded automata groups
look like? How close are they to abelian?
Question 1.1 in full generality seems out of reach at the moment. We answer here the question for three large classes of bounded automata groups,
which contain many of the hitherto studied examples. Two of these classes
are new, and they appear to be interesting in their own right. We additionally present several examples which place restrictions on how one might
specify “close to abelian.”
1.1. Iterated monodromy groups. The iterated monodromy groups of
post-critically finite polynomials, see [18, Chapter 5], form a compelling and
natural class of bounded automata groups. The study of these groups has
generated a significant body of research in both dynamics and group theory.
See, for example, [8, 19].
For this class of groups, we answer the motivating question completely.
Theorem 1.2 (See Corollary 6.11). Every iterated monodromy group of a
post-critically finite polynomial is either virtually abelian or not elementary
amenable.
1.2. Generalized basilica groups. For a finite set X, let X ∗ be the free
monoid on X. By identification with its Cayley graph, X ∗ is naturally a
rooted tree. For g ∈ Aut(X ∗ ) and v ∈ X ∗ , the section of g at v is denoted
by gv ; see Section 2 for the relevant definitions.
Definition 1.3. We say that G ≤ Aut(X ∗ ) is a generalized basilica
group if G admits a finite generating set Y such that for every g ∈ Y either
gx = 1 for all x ∈ X or gx ∈ {1, g} for all x ∈ X with exactly one x such
that gx = g.
Remark 1.4. The classical basilica group can be represented as a generalized basilica group. The representation is given by considering the natural
action of the basilica group on [4]∗ , the 4-regular rooted tree, by restricting
the action on the binary tree to even levels; see Example 3.11.
A key feature of generalized basilica groups is a reduction theorem, Theorem 7.7, which reduces the analysis to self-replicating groups. Using this
reduction, we answer the motivating question for a class of generalized basilica groups for which we have some control over the “cycle structure” of the
generators.
Definition 1.5. Let G = hY i ≤ Aut(X ∗ ) be a generalized basilica group.
We say that G is balanced if for each g ∈ Y such that there is x ∈ X for
which gx = g, the least n ≥ 1 for which g n fixes x is also such that gn fixes
X.
Note that the basilica group acting on [4]∗ is balanced.
Theorem 1.6 (See Corollary 7.18). Every balanced generalized basilica group
is either (locally finite)-by-(virtually abelian) or not elementary amenable.
4
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Examples 9.1 show our theorem for balanced groups cannot be sharpened.
While a proof eludes us, we expect the following conjecture to hold.
Conjecture 1.7. Every generalized basilica group is either (locally finite)by-(virtually abelian) or not elementary amenable
The class of generalized basilica groups encompasses the torsion-free bounded
automata groups, suggesting it is a natural class.
Proposition 1.8 (See Corollary 3.9). If G ≤ Aut(X ∗ ) is a torsion-free
bounded automata group, then there is a torsion-free generalized basilica
group H and k ≥ 1 such that H is isomorphic to a subgroup of G and
k
G ֒→ Sym(X k ) ⋉ H X .
Proposition 1.9 (See Corollary 3.10). Every torsion-free self-replicating
bounded automata group admits a faithful representation as a generalized
basilica group.
We also exhibit countably many non-isomorphic balanced generalized
basilica groups; see Examples 9.1. The class of balanced generalized basilica
groups, and hence the class of generalized basilica groups, is thus as large as
it can be, since there are only countably many bounded automata groups.
1.3. Groups of abelian wreath type. Let π1 : Aut(X ∗ ) → Sym(X)
be the homomorphism induced by the action of Aut(X ∗ ) on X. Under the
natural identification with finitary elements, we regard Sym(X) ≤ Aut(X ∗ ),
when convenient.
Definition 1.10. We say that G ≤ Aut(X ∗ ) is of abelian wreath type if
π1 (G) ≤ Sym(X) is abelian and G admits a finite self-similar generating set
Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {g} ∪ π1 (G)
for all x ∈ X with exactly one x such that gx = g.
Remark 1.11. The Gupta-Sidki groups and the more general GGS groups
are of abelian wreath type.
A group G ≤ Aut(X ∗ ) of abelian wreath type embeds into the inverse
limit (· · ·≀X A≀X A) where A is the abelian group π1 (G). This class of bounded
automata groups seems to be among the simplest such groups, because the
structure of these groups is minimally complicated by permutation-grouptheoretic phenomena.
We answer the motivating question completely for self-replicating groups
of abelian wreath type.
Theorem 1.12 (See Theorem 8.13). Every self-replicating group of abelian
wreath type is either virtually abelian or not elementary amenable.
The infinite dihedral group shows that Theorem 8.13 is sharp; see Example 9.2. The GSS groups are self-replicating as soon as they are infinite, so
Theorem 1.12 applies to these groups. Additionally, as there are countably
many self-replicating GGS groups, there are countably many isomorphism
types of self-replicating groups of abelian wreath type.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
5
1.4. Groups containing odometers. An element d ∈ Aut(X ∗ ) is said to
be an odometer if hdi acts transitively on X and dx ∈ {1, d} for all x ∈ X
with exactly one x ∈ X such that dx = d. Odometers arise somewhat naturally in bounded automata groups. For instance some iterated monodromy
groups will contain these; see Example 5.9. On the other hand, our theorem for groups with odometers plays an important technical role in other
arguments, so one is welcome to regard this theorem as a useful technical
tool.
Theorem 1.13 (See Theorem 5.14). Every bounded automata group that
contains an odometer is either virtually abelian or not elementary amenable.
Let G be a bounded automata group containing a level transitive element
d. The element d is well-known to be conjugate in the full automorphism
group of the rooted tree to an odometer, but the conjugator need not preserve the property of G being a bounded automata group. In Theorem 1.13,
we need the element to be an odometer in the bounded representation of G.
2. Preliminaries
For a group G acting on a set X and Y ⊆ X, we write G(Y ) for the pointwise stabilizer of Y in G. For g, h ∈ G, the commutator [g, h] is ghg −1 h−1 .
2.1. Bounded automata groups. For a finite set X of size at least 2, let
X ∗ be the free monoid on X; the identity is the empty word. By identification with its Cayley graph, X ∗ is naturally a rooted tree, but in practice
and in the work at hand, it is often more useful to think of X ∗ as words.
We write X k to denote the words of length k. An automorphism g of X ∗
is a bijection such preserves the prefix relation. That is, a is a prefix of b if
and only if g(a) is a prefix of g(b). Automorphisms of X ∗ act on X ∗ from
the left, and we denote the group of automorphisms by Aut(X ∗ ).
For each k ≥ 1, the group Aut(X ∗ ) acts on the set of words of length k.
We let πk : Aut(X ∗ ) → Sym(X k ) denote the induced homomorphism. It is
sometimes convenient to see πk (Aut(X ∗ )) ≤ Aut(X ∗ ), and this is achieved
as follows: Say σ ∈ πk (Aut(X ∗ )) and v ∈ X l with l ≥ k. Writing v = xw
with x ∈ X k and w ∈ X ∗ , we define σ(v) := σ(x)w. One verifies that this
identification gives that πk (Aut(X ∗ )) ≤ Aut(X ∗ ).
For a word w ∈ X ∗ , the words with prefix w, wX ∗ , are isomorphic to X ∗
by the map ψw : X ∗ → wX ∗ defined by ψw : x 7→ wx. For g ∈ Aut(X ∗ ) and
w ∈ X ∗ , the element g induces an automorphism gw ∈ Aut(X ∗ ) defined by
−1
◦ g ◦ ψw .
gw := ψg(w)
The automorphism gw is called the section of g at w. A straightforward
computation shows the operation of taking sections enjoys two fundamental
properties.
Lemma 2.1. Let X be a non-empty finite set, g, h, and k be elements of
Aut(X ∗ ), and v1 and v2 be elements of X ∗ . Then,
6
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
(a) gv1 v2 = (gv1 )v2
(b) (hk)v = hk(v) kv
Remark 2.2. The previous lemma ensures that map Aut(X ∗ ) × X ∗ →
Aut(X ∗ ) by (g, v) 7→ gv is a cocycle.
An automorphism g ∈ Aut(X ∗ ) is called finitary if there is some k ≥ 1
such that gv = 1 for all v ∈ X k . The least k such that gv = 1 for all v ∈ X k is
called the depth of the finitary element g. An automorphism g ∈ Aut(X ∗ )
is called directed if there is some k ≥ 1 and w ∈ X k such that gw = g and
gv is finitary for all v ∈ X k \ {w}. The least such k is called the period
of g, and the vertex w ∈ X k is called the active vertex of g on X k and is
denoted by v g . We say that g is strongly active if g(v g ) 6= v g . We say g
is strongly directed if there exists k ≥ 1 and w ∈ X k such that gw = g
and gu = 1 for all u ∈ X k \ {w}. An element d ∈ Aut(X ∗ ) is said to be an
odometer if hdi acts transitively on X and dx ∈ {1, d} for all x ∈ X with
exactly one x ∈ X such that dx = d.
For the work at hand, the following features of automorphisms of rooted
trees play an integral role.
Definition 2.3. An automorphism g ∈ Aut(X ∗ ) is finite state if S(g) :=
{gv | v ∈ X ∗ } is finite. The element g is bounded if there is N ≥ 0 such
that for all n ≥ 1,
|{v ∈ X v | gv 6= 1}| ≤ N.
Finitary automorphisms and directed automorphisms are clearly bounded
and finite state. A partial converse also holds.
Proposition 2.4 ([2, Proposition 2.7]). An automorphism g ∈ Aut(X ∗ ) is
bounded and finite state if and only if there exists m ≥ 1 such that each
section gv for v ∈ X m is either finitary or directed.
We are now prepared to define the bounded automata groups.
Definition 2.5. A (set) group G ≤ Aut(X ∗ ) is self-similar if gw ∈ G for
all w ∈ X ∗ and g ∈ G.
Definition 2.6. A group G ≤ Aut(X ∗ ) is said to be a bounded automata
group if G is finitely generated and self-similar and every element g ∈ G is
bounded and finite state.
Remark 2.7. Bounded automata groups are named as such, because they
are exactly the groups such that the generators are given by a bounded
automaton; see [18, Chapter 1.5].
2.2. Self-replicating groups. Letting Aut(X ∗ )(w) be the stabilizer of w
in Aut(X ∗ ), the map
φw : Aut(X ∗ )(w) → Aut(X ∗ )
by g 7→ gw is a homomorphism. We call φw the section homomorphism
at w. For a group G ≤ Aut(X ∗ ), we denote the image φw (G(w) ) by secG (w),
and secG (w) is called the group of sections of G at w.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
7
Definition 2.8. A group G ≤ Aut(X ∗ ) is called self-replicating if G is
self-similar, acts transitively on X and secG (x) = G for all x ∈ X.
Remark 2.9. The terms “fractal” and “recurrent” have previously appeared in the literature in place of “self-replicating.” We understand that
“self-replicating” is the currently accepted term.
For a self-replicating group G ≤ Aut(X ∗ ), it follows by induction on the
length of v ∈ X ∗ that secG (v) = G for all v ∈ X ∗ . Self-replicating groups
additionally act transitively on X k for every k, not just on X. Groups
that act transitively on X k for all k ≥ 1 are called level transitive. For
g ∈ Aut(X ∗ ) an odometer, hgi is level transitive.
In the present work, weak forms of self-similarity and self-replication arise
frequently.
Definition 2.10. We say G ≤ Aut(X ∗ ) is weakly self-similar if secG (v) ≤
G for every v ∈ X ∗ . We say that G weakly self-replicating if secG (v) = G
for every v ∈ X ∗ .
A weakly self-similar (weakly self-replicating) group need not be selfsimilar (self-replicating). This holds even in the case that G acts transitively
on X. See Example 9.4
Remark 2.11. In the work at hand, we will need to analyze subgroups of a
bounded automata group which are weakly self-similar, but not self-similar.
The expert will note that one can conjugate a weakly self-similar group to
obtain a self-similar group. However, if one conjugates the supergroup to
make the subgroup in question self-similar, the conjugate often fails to be a
bounded automata group.
2.3. Elementary amenable groups.
Definition 2.12. The class of elementary amenable groups, denoted
by EG, is the smallest class of groups such that the following hold.
(1) EG contains all abelian groups and finite groups.
(2) EG is closed under taking subgroups, group extensions, quotients,
and direct limits.
By work of D. Osin, [21], the class EG admits a simpler description. Let
us define recursively classes EGα for α an ordinal as follows.
• EG0 is the class of abelian groups and finite groups.
• Given EGα , let EGeα be the class of EGα -by-EG0 groups and let EGlα be
the groups given by a direct limit of groups in EGα . We define EGα+1 :=
EGeα ∪ EGlα .
S
• For λ a limit ordinal, we define EGλ := β<λ EGβ .
S
Theorem 2.13 (Osin, [21, Theorem 2.1]). EG = α∈ORD EGα .
In view of Osin’s theorem, the class of elementary amenable groups admits
a well-behaved ordinal-valued rank.
8
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Definition 2.14. For G ∈ EG, we define
rk(G) := min{α | G ∈ EGα }
and call rk(G) the construction rank of G.
Corollary 2.15. If G ∈ EG is finitely generated and neither finite nor
abelian, then there is L E G such that G/L is finite or abelian and rk(G) =
rk(L) + 1.
Proposition 2.16. Let G ∈ EG.
(1) If H ≤ G, then rk(H) ≤ rk(G). ([21, Lemma 3.1])
(2) If L E G, then rk(G/L) ≤ rk(G). ([21, Lemma 3.1])
(3) If {1} → K → G → Q → {1} is a short exact sequence, then
rk(G) ≤ rk(K) + rk(Q).([21, cf. Lemma 3.2])
(4) rk(G × G) = rk(G). (folklore)
3. Reduced form
A given representation of a bounded automata group may not always be
optimal. The reduction developed herein produces a canonical representation of a bounded automata group which often makes arguments simpler.
This technique appears to be folklore.
Given a tree X ∗ and k ≥ 1, the group Aut(X ∗ ) acts faithfully on (X k )∗ ,
giving an embedding rk : Aut(X ∗ ) ֒→ Aut((X k )∗ ). The map rk is just the
restriction of the action of Aut(X ∗ ) to (X k )∗ ⊂ X ∗ (which is a free monoid
on X k and hence an |X|k -regular tree).
Lemma 3.1. Suppose that g ∈ Aut(X ∗ ) and k ≥ 1.
(1) For any w ∈ (X k )∗ and g ∈ G, rk (gw ) = (rk (g))w .
(2) If g is finitary, then rk (g) is finitary.
(3) If g is directed, then rk (g) is directed.
(4) If g is strongly directed, then rk (g) is strongly directed.
Proof. Set O := X k and take w ∈ O ∗ . By definition, the section of g at w
−1
◦ g ◦ ψw where ψv : X ∗ → vX ∗ by x 7→ vx. The map rk
in X ∗ is gw = ψg(w)
is restriction to O ∗ , so we see that
−1
↾O∗ ◦g ↾O∗ ◦ψw ↾O∗ = (rk (g))w .
rk (gw ) = (gw ) ↾O∗ = ψg(w)
Hence, (1) holds.
If g is finitary, then we can find some n ≥ 1 such that gw = 1 for all
w ∈ O n . Claim (1) shows that (rk (g))w = 1 for all w ∈ On , so rk (g) is
finitary, verifying (2).
If g is (strongly) directed, we can find some n ≥ 1 such that for all w ∈ On
either gw = g or gw is finitary (trivial). If gw is finitary (trivial), then claims
(1) and (2) ensure that (rk (g))w is finitary (trivial). If gw = g, then (1)
implies that rk (g) = rk (gw ) = (rk (g))w . We conclude that for every w ∈ O n
either (rk (g))w = rk (g) or rk (g)w is finitary (trivial). Hence, rk (g) is a
(strongly) directed element of Aut(O∗ ), establishing (3) and (4).
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
9
Corollary 3.2. If G ≤ Aut(X ∗ ) is a bounded automata group and k ≥ 1,
then rk (G) ≤ Aut((X k )∗ ) is a bounded automata group.
Proof. This is immediate from Proposition 2.4 and Lemma 3.1.
Recall that for each k ≥ 1, there is a homomorphism from Aut(X ∗ ) into
Sym(X k ) denoted by πk : Aut(X ∗ ) → Sym(X k ). The functions πk and rk
enjoy the following relationship:
π1 ◦ rk = πk .
Recall also that we may see πk (Aut(X ∗ )) ≤ Aut(X ∗ ) whenever necessary.
Definition 3.3. For G ≤ Aut(X ∗ ) a bounded automata group, we say that
G is in reduced form if G admits a finite generating Y such that for every
g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {g} ∪ π1 (G) for all x ∈ X
with exactly one x such that gx = g. We say that Y is a distinguished
generating set for G. We write G = hY i ≤ Aut(X ∗ ) to indicate that Y is
a distinguished generating set for G.
Note that one may always assume that Y is a self-similar set by adding
each section from π1 (G) of a directed element of Y to Y . Neither the reduced
form nor the distinguished generating set for a given reduced form are unique
in general. However, all bounded automata groups can essentially be put in
reduced form. Establishing this requires a result from the literature.
Theorem 3.4 ([18, Theorem 3.9.12]). For G ≤ Aut(X ∗ ) a bounded automata group, there is a finite self-similar set Z ⊆ G consisting of finitary
and directed elements such that for all g ∈ G there is N for which gv ∈ Z
for all v ∈ X k and k ≥ N .
The directed elements of the set Z in Theorem 3.4 are all strongly directed
if and only if in the automaton with state set Z (and the obvious transitions),
each non-trivial state belonging to a cycle cannot reach any state off that
cycle except for the trivial state.
Theorem 3.5. For G ≤ Aut(X ∗ ) a bounded automata group, there are a
finite set Z ⊆ G and k ≥ 1 such that the following hold:
(1) rk (G) ≤ Aut((X k )∗ ) is a bounded automata group.
(2) Setting H := rk (hZi), H ≤ Aut((X k )∗ ) is a bounded automata group
in reduced form with distinguished generating set rk (Z). Moreover,
if the directed elements of the set from Theorem 3.4 are strongly
directed, then H is generalized basilica.
k
(3) There is an injective homomorphism G → Sym(X k ) ⋉ H X .
Proof. Let W be a finite generating set for G and let Z ⊂ G be as given by
Theorem 3.4; in particular, Z is closed under taking sections. By taking a
common multiple of the periods of directed d ∈ Z, we may find m such that
for each directed d ∈ Z and x ∈ X m the section dx is either finitary or equal
10
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
to d. Taking n large enough, we may assume that fx = 1 for all x ∈ X n and
finitary f ∈ Z.
Let k be a sufficiently large multiple of m so that k ≥ n and gv ∈ Z for
all g ∈ W and v ∈ X k . For every directed d ∈ Z and x ∈ X k , either dx
is finitary and in πk (G) or dx = d. For every finitary f ∈ Z and x ∈ X k ,
fx = 1. Set O := X k and let rk : Aut(X ∗ ) → Aut(O∗ ) be the canonical
inclusion. Corollary 3.2 ensures that rk (G) is again a bounded automata
group, verifying (1). It is easy to verify that hZi ≤ Aut(X ∗ ) is a bounded
automata group using that Z is closed under taking section, so H = rk (hZi)
is a bounded automata group by a second application of Corollary 3.2.
Let us now argue that H ≤ Aut(O∗ ) is in reduced form. Set Y := rk (Z);
note that Y is closed under takings sections by Lemma 3.1 as Z is closed
under taking sections. Via Lemma 3.1, Y consists of finitary elements and
directed elements, since Z consists of such elements. Say that rk (f ) ∈ Y
is finitary. Lemma 3.1 ensures that f ∈ Z must also be finitary. For each
x ∈ O, fx = 1, so in view of Lemma 3.1, (rk (f ))x = 1 for all x ∈ O. Say that
rk (d) ∈ Y is directed. It follows that d ∈ Z must be directed. For x ∈ O
such that dx is finitary, we have that dx ∈ Z. Applying again Lemma 3.1,
we deduce that (rk (d))x is finitary and an element of π1 (H). For x ∈ O such
that dx = d, we likewise deduce that (rk (d))x = rk (d). For all x ∈ O, it is
thus the case that (rk (d))x ∈ {rk (d)} ∪ π1 (H). Moreover, if d is strongly
directed, then so is rk (d) by Lemma 3.1. We conclude that H is in reduced
form and that if each directed element of Z is strongly directed, then H is
generalized basilica. Claim (2) thus holds.
For claim (3), each g ∈ W is such that gx ∈ Z for any x ∈ X k by
choice of k. From Lemma 3.1, we deduce that for each rk (g) ∈ rk (G)
and o ∈ O, (rk (g))o ∈ rk (hZi) = H. We define G → Sym(O) ⋉ H O by
g 7→ π1 (rk (g))(rk (g)o )o∈O . One easily verifies that this is a well-defined
monomorphism.
Using a second fact from the literature, we obtain a useful corollary.
Proposition 3.6 ([18, Proposition 2.11.3]). If G is a self-replicating bounded
automata group, then Z as in Theorem 3.4 is a generating set for G.
Corollary 3.7. If G ≤ Aut(X ∗ ) is a self-replicating bounded automata
group, then there is k ≥ 1 such that rk (G) ≤ Aut((X k )∗ ) is a self-replicating
bounded automata group in reduced form. In particular, G has a faithful
representation as a self-replicating bounded automata group in reduced form.
Remark 3.8. Theorem 3.5 motivates the form of our definitions of generalized basilica groups and abelian wreath type groups. Our definitions assume
the group is in reduced form to avoid cumbersome reduction steps.
We deduce two further corollaries of Theorem 3.5, which elucidate the
connection between torsion-free bounded automata groups and generalized
basilica groups. In a torsion-free bounded automata group, every finitary
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
11
element is trivial and hence every directed element is strongly directed.
Theorem 3.5 thus implies the following consequence.
Corollary 3.9. If G ≤ Aut(X ∗ ) is a torsion-free bounded automata group,
then there are a torsion-free generalized basilica group H such that H is
isomorphic to a subgroup of G and k ≥ 1 such that
k
G ֒→ Sym(X k ) ⋉ H X .
Corollary 3.10. If G ≤ Aut(X ∗ ) is a self-replicating torsion-free bounded
automata group, then G admits a faithful representation as a generalized
basilica group.
Let us conclude this section by working out the reduced form of the classical basilica group.
Example 3.11. Let a, b ∈ Aut([2]∗ ) be defined recursively by
(
(
iv
i=0
1v
i=0
a(iv) :=
and b(iv) :=
ib(v) i = 1
0a(v) i = 1.
The group G := ha, bi ≤ Aut([2]∗ ) is called the basilica group; see [10].
There is a convenient notation for the generators, representing them as elements of Sym([2]) ⋉ G2 , called wreath recursion: the wreath recursion of a
is a = (1, b), and that of b is b = (01)(1, a).
We see that a1 = b and b1 = a, so G is not in reduced form. Consider
r2 (G). Set ã := r2 (a) and b̃ := r2 (b). In view of Lemma 3.1, ã11 = r2 (a11 ) =
r2 (a) = ã, and b̃11 = b̃. One further checks that all other sections of ã
and b̃ on [2]2 are trivial. In wreath recursion, e
a = (23)(1, 1, 1, e
a ) and eb =
(02)(13)(1, 1, 1, eb). Hence, r2 (G) is in reduced form, and furthermore, the
group is a generalized basilica group. In fact, r2 (G) is a balanced generalized
basilica group.
4. Technical results
This section establishes the key technical result of this work, Lemma 4.2,
as well as several general technical observations for later use.
4.1. Elementary amenable self-replicating groups. Let γ(x1 , . . . , xn )
be a word in the free group on n generators. For a group G, the verbal
subgroup of G given by γ(x1 , . . . , xn ) is
γ(G) := hγ(g1 , . . . , gn ) | gi ∈ Gi.
Note that verbal subgroups are always characteristic subgroups of G.
A group is called max-n if every increasing chain of normal subgroups
eventually stabilizes. We will only require that all finitely generated virtually
abelian groups are max-n, but the class of max-n groups is in fact large and
complicated.
Recall that rk(G) denotes the construction rank of an elementary amenable
group G.
12
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Lemma 4.1. Suppose that G ≤ Aut(X ∗ ) is an elementary amenable selfreplicating group. Let γ and β be words such that G/β(γ(G)) is a max-n
group. Then there are weakly self-replicating normal subgroups M and N of
G with
(1) N ≤ M , γ(G) ≤ M , and β(γ(G)) ≤ N ;
(2) rk(M ) = rk(γ(G)) and rk(N ) = rk(β(γ(G))); and
(3) β(M/N ) = 1.
Proof. Fix x ∈ X and let φx : G(x) → G be the section homomorphism at
x. Clearly γ(G(x) ) ≤ γ(G)(x) ≤ G(x) , and as φx is onto, we have
γ(G) = φx (γ(G(x) )) ≤ φx (γ(G)(x) ) ≤ φx (G(x) ) = G.
Similarly, we have
β(γ(G)) = φx (β(γ(G(x) ))) ≤ φx (β(γ(G))(x) ) ≤ φx (G(x) ) = G.
We now define two sequences of normal subgroups of G: Set K0 := γ(G),
H0 := β(γ(G)) and Kn+1 := φx ((Kn )(x) ), Hn+1 := φx ((Hn )(x) ). Trivially,
H0 ≤ K0 , so Hn ≤ Kn for all n ≥ 0 by induction. The previous paragraph
ensures that K0 ≤ K1 and H0 ≤ H1 , so Kn ≤ Kn+1 , Hn ≤ Hn+1 for
all n ≥ 0, again by induction. Normality follows by induction because φx
is onto. We claim that β(Kn /Hn ) = 1 for all n ≥ 0. This is trivial for
n = 0. Assume that β(Kn /Hn ) = 1. Note that (Kn )(x) ∩ Hn = (Hn )(x) and
so β((Kn )(x) /(Hn )(x) ) ≤ β(Kn /Hn ) = 1. As Kn+1 /Hn+1 is a quotient of
(Kn )(x) /(Hn )(x) , we deduce that β(Kn+1 /Hn+1 ) = 1.
Since G/β(γ(G)) is a max-n group, there is L such that KL = KL+1 and
HL = HL+1 . We claim M := KL and N := HL for such an L satisfy the
lemma. The previous paragraph ensures that M and N are normal in G.
We see that secM (x) = KL+1 = KL = M , and since the section subgroups
are conjugate to each other, secM (y) = M for all y ∈ X. The obvious
induction argument now gives that secM (v) = M for all v ∈ X ∗ , so M is
weakly self-replicating. The same argument shows that N is weakly selfreplicating. Claims (1) and (3) follow from the previous paragraph. In view
of Proposition 2.16, induction shows rk(Kj ) = rk(K0 ) = rk(γ(G)) for all
j. The group M is thus such that rk(M ) = rk(γ(G)). A similar argument
shows rk(N ) = rk(β(γ(G))), completing the proof of (2).
By considering the special case that β is a letter, we obtain the following.
Lemma 4.2. Suppose that G ≤ Aut(X ∗ ) is an elementary amenable selfreplicating group. Let γ be a word such that G/γ(G) is a max-n group.
Then there is a weakly self-replicating M E G such that γ(G) ≤ M and
rk(M ) = rk(γ(G)).
There are a couple of important corollaries of Lemma 4.2. We say a word
w(x1 , . . . , xn ) is d-locally finite if every d-generated group G such that
w(G) = {1} is finite.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
13
Lemma 4.3 (cf. [7, p. 517]). For every d-generated finite group A, there is
a d-locally finite word w such that w(A) = 1.
Corollary 4.4. Suppose that G ≤ Aut(X ∗ ) is a finitely generated elementary amenable self-replicating group. If G is non-abelian, then there is a
weakly self-replicating M E G such that G/M is either finite or abelian
and rk(M ) + 1 = rk(G). Furthermore, if rk(G) is witnessed (in the sense
of Corollary 2.15) by a normal subgroup N , then G/M is finite if G/N is
finite and G/M is abelian if G/N is abelian.
Proof. That G is self-replicating ensures that G is not finite. Since G is
non-abelian, Corollary 2.15 supplies N E G such that G/N is either finite
or abelian and rk(N ) + 1 = rk(G).
If G/N is abelian, Lemma 4.2 applied to the verbal subgroup [G, G] supplies the desired subgroup M . Let us suppose that N is of finite index in
G. Say that G is d-generated and let γ be a d-locally finite word such that
γ(A) = 1 where A := G/N , whose existence is given by Lemma 4.3. We
thus have that γ(G) ≤ N . It is also that case that G/γ(G) is finite, since
G/γ(G) is a d-generated group and γ(G/γ(G)) = 1, so rk(γ(G))+1 = rk(G).
Applying Lemma 4.2 to γ(G) supplies the desired subgroup M .
In the case of a self-replicating elementary amenable group for which the
rank is given by a finite index subgroup, we can say a bit more.
Corollary 4.5. Suppose that G ≤ Aut(X ∗ ) is a finitely generated elementary amenable self-replicating group. If G is not virtually abelian and admits
M E G with finite index such that rk(M ) + 1 = rk(G), then there are weakly
self-replicating subgroups A E G and F E G such that
(1) A ≤ F , F/A is abelian, and G/F is finite; and
(2) rk(F ) + 1 = rk(A) + 2 = rk(G).
Proof. Since M is finitely generated and neither finite nor abelian, as G is
not virtually abelian, Corollary 2.15 supplies a normal subgroup N E M
such that M/N is either finite or abelian and rk(N ) + 1 = rk(M ). It cannot
be the case that M/N is finite, since this contradicts the rank of G, so M/N
is abelian. Say that G is d-generated and let γ be a d-locally finite word such
that γ(A) = 1 where A := G/M , whose existence is given by Lemma 4.3.
It follows that γ(G) ≤ M and G/γ(G) is finite. Since M/N is abelian, it
follows that [γ(G), γ(G)] ≤ N . Thus
rk(G) ≤ rk(γ(G)) + 1 ≤ rk(M ) + 1 = rk(G),
and
rk(γ(G)) ≤ rk([γ(G), γ(G)]) + 1 ≤ rk(N ) + 1 = rk(M ) = rk(γ(G)).
We conclude that rk(γ(G))+1 = rk(G) and rk([γ(G), γ(G)])+2 = rk(γ(G))+
1 = rk(G).
The group G/[γ(G), γ(G)] is a finitely generated virtually abelian (as
G/γ(G) is finite) and hence a max-n group. Applying Lemma 4.1 with
14
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
β = [x, y], we can find weakly self-replicating F and A normal in G such that
A ≤ F , F/A is abelian, γ(G) ≤ F (and so G/F is finite), rk(F ) = rk(γ(G))
and rk(A) = rk([γ(G), γ(G)]). This completes the proof.
4.2. Generalities on self-similar groups. The results here are primarily
for the reader’s convenience, as these results are easy consequences of the
definitions. We will appeal to these results throughout this work and often without explicit reference. The reader already comfortable with groups
acting on rooted trees can safely skip this subsection.
Lemma 4.6. Suppose that G ≤ Aut(X ∗ ), G acts level transitively on X ∗ ,
and H E G is weakly self-similar. If H fixes x ∈ X k for some k ≥ 1, then
H is trivial.
Proof. That H is normal ensures that H fixes X k . That H contains secH (v)
for all v ∈ X ∗ implies that H in fact fixes (X k )n for all n ≥ 1. Hence, H
acts trivially on X ∗ .
Lemma 4.7. Suppose that G ≤ Aut(X ∗ ) acts transitively on X and suppose
that there is a weakly self-similar M E G such that G/M is abelian or M
acts transitively on X. If g ∈ G fixes y and x in X and gx = 1, then gy ∈ M .
Proof. Take f ∈ G such that f (x) = y. If M acts transitively on X, we take
f ∈ M . The commutator [f, g−1 ] is an element of M , and [f, g−1 ]y ∈ M
since [f, g−1 ] fixes y and M is weakly self-replicating. Noting that (f −1 )y =
(fx )−1 , we see
[f, g−1 ]y = (f g−1 f −1 g)y = fx · 1 · (fx )−1 · gy = gy .
Hence, gy ∈ M .
Lemma 4.8. Suppose that G ≤ Aut(X ∗ ) acts transitively on X and is
weakly self-replicating. If H E G is weakly self-similar and of finite index in
G, then H acts transitively on X.
Proof. Fix x ∈ X and let φx : G(x) → G be the section homomorphism,
which is surjective because G is weakly self-replicating. Since H is weakly
self-similar, the surjective homomorphism φ̃x : G(x) H/H → G/H by gH 7→
φx (g)H is well-defined. The group G(x) H/H is thus a subgroup of G/H that
surjects onto G/H. As G/H is finite, we deduce that G/H = G(x) H/H.
Hence, H acts transitively on X.
4.3. Example: the basilica group. We close our technical discussion by
exhibiting how these results are applied to prove the basilica group is nonelementary amenable. The basic strategy applied here is used throughout
this work.
Let G := he
a, ebi ≤ Aut([4]∗ ) be the basilica group in the reduced form
as given in Example 3.11. The group G is self-replicating; one can verify
this directly or see [10]. The elements e
a and eb in wreath recursion are
e
e
a = (23)(1, 1, 1, e
a ) and b = (02)(13)(1, 1, 1, e
b).
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
15
Let us suppose toward a contradiction that G is elementary amenable.
One easily verifies that G is not abelian. Corollary 4.4 thus produces a
weakly self-replicating subgroup M E G such that rk(M ) + 1 = rk(G) and
G/M is either finite or abelian. We see that e
a2 = (1, 1, e
a, e
a) and eb2 =
(1, eb, 1, eb). Lemmas 4.7 and 4.8 imply that e
a ∈ M and eb ∈ M , so M = G.
This contradicts the rank of G. We conclude that G is not elementary
amenable.
Remark 4.9. The general strategy to show a given self-replicating bounded
automata group is not elementary amenable is to contradict the rank of the
group via the weakly self-replicating subgroups provided by either Corollary 4.4 or Corollary 4.5. In the case of the basilica group, the squares e
a2
2
and e
b act trivially on [4] and have some trivial sections, so we may apply
Lemmas 4.7 and 4.8 to deduce that M = G, which contradicts the rank. In
general, we must work much harder.
5. Groups containing odometers
It is convenient to begin with our theorems on bounded automata groups
containing odometers.
Definition 5.1. An element d ∈ Aut(X ∗ ) is said to be an odometer if hdi
acts transitively on X and dx ∈ {1, d} for all x ∈ X with exactly one x ∈ X
such that dx = d.
In the course of proving these results, we upgrade Corollary 4.5, and the
resulting more powerful statement, Corollary 5.11, will be used frequently
in later sections.
5.1. Self-replicating groups. This preliminary section shows that bounded
automata groups containing an odometer are close to being self-replicating.
We begin by characterizing self-replication for generalized basilica groups.
Lemma 5.2. Suppose that h ∈ Aut(X ∗ ) is such that hx ∈ {1, h} for all
x ∈ X with at most one x such that hx = h. For any w, v ∈ X and j ∈ Z
for which hj (v) = w, there is i such that hi (v) = w and (hi )v = 1 and
0 ≤ |i| < |X|.
Proof. If no x ∈ X is such that hx = h, then the lemma is immediate.
Suppose there is a unique x ∈ X with hx = h. Choose j with |j| ≥ 0 least
such that hj (v) = w. If (hj )v = 1, we are done. Otherwise, it is the case
that (hj )v = h±1 , since we chose |j| least. As that cases are similar, let us
suppose that (hj )v = h (i.e., j > 0).
Let O be the orbit of x under hhi. The word x is the unique element of
X for which h has a non-trivial section, so (hk )z = 1 for all z ∈ X \ O and
k ∈ Z. We deduce that v ∈ O. Take m ≥ 1 least such that hm fixes x and
observe that (hm )y = h for all y ∈ O. The element h−m hj = hj−m is thus
such that hj−m (v) = w and (hj−m )v = h−1 h = 1 and |j − m| < |X|.
16
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Lemma 5.3. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica
group and let O be an orbit of G on X. For all x ∈ O, it is then the case
that secG (x) = hY ′ i where Y ′ is the collection of directed g ∈ Y such that
v g ∈ O.
Proof. Take d ∈ Y and let W1 , . . . , Wl list the orbits of hdi on O, for some
1 ≤ k ≤ n. For w, v ∈ Wj , there is some power i such that di (v) = w and
(di )v = 1 by Lemma 5.2. Plainly, di G(v) d−i = G(w) , and we deduce that
secG (w) = (di )v secG (v)((di )v )−1 .
Hence, secG (w) = secG (v), since (di )v = 1. We conclude that secG (w) =
secG (v) for all w, v ∈ Wj and 1 ≤ j ≤ l. Since G = hY i and acts transitively
on O, it follows that secG (v) = secG (w) for all v, w ∈ O.
For x ∈ O and h ∈ Y , the section hx is an element of hY ′ i. Inducting
on the word length, one sees that gx ∈ hY ′ i for all g ∈ G, so a fortiori
secG (x) ≤ hY ′ i. On the other hand, for d ∈ Y ′ , take n ≥ 1 least such that
dn fixes v d . The section of dn at v d is d, so d ∈ secG (v d ) = secG (x). We
conclude that hY ′ i = secG (x) for all x ∈ O, verifying the lemma.
Proposition 5.4. For G = hY i ≤ Aut(X ∗ ) a generalized basilica group, G
is self-replicating if and only if G is generated by the directed elements of Y
and G acts transitively on X.
Proof. Suppose first that G is self-replicating. By definition, G acts transitively on X. Fix x ∈ X and let Z ⊆ Y be the directed elements. An easy
induction argument shows that gx ∈ hZi for all g ∈ G. We deduce that
G = secG (x) ≤ hZi ≤ G, and thus, G is generated by Z.
For the converse, let Z be the directed elements of Y . Since G acts
transitively on X, secG (x) = hZi for all x ∈ X by Lemma 5.3. As hZi = G,
we deduce that secG (x) = G.
A version of Proposition 5.4 holds for bounded automata groups with
odometers.
Proposition 5.5. Suppose that G = hY i ≤ Aut(X ∗ ) is a bounded automata
group in reduced form. If G is self-replicating, then G is generated by
Z := {dx | d ∈ Y is directed and x ∈ X}.
The converse holds if G contains an odometer.
Proof. Suppose first that G is self-replicating. Fix x ∈ X. An easy induction
argument shows that gx ∈ hZi for all g ∈ G. We deduce that G = secG (x) ≤
hZi ≤ G, and thus, G is generated by Z.
For the converse, let h ∈ G be an odometer. Immediately, we see that G
acts transitively on X. For each x and y ∈ X distinct, Lemma 5.2 supplies
i such that hi (x) = y and (hi )x = 1. Fixing x ∈ X, for any g ∈ G and
y ∈ X, there are i and j such that hj ghi fixes x and (hj ahi )x = gy . The
image of the section homomorphism secG (x) = φx (G(x) ) therefore contains
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
17
all sections gy for g ∈ G and y ∈ X. In particular, secG (x) contains Z, so
secG (x) = G. We conclude that G is self-replicating.
Our final preliminary lemma shows that one can easily reduce to the group
generated by the set Z.
Lemma 5.6. Suppose that G = hY i ≤ Aut(X ∗ ) is a bounded automata
group in reduced form. Letting Z := {dx | d ∈ Y is directed and x ∈ X},
the group hZi is a bounded automata group in reduced form, and
G ֒→ Sym(X) ⋉ hZiX .
Proof. That hZi is a bounded automata group in reduced form is immediate.
For each x ∈ X and h ∈ Y , it follows the section hx is an element of
Z. Inducting on the word length, one sees that gx ∈ hZi for all g ∈ G and
x ∈ X. The map
G → Sym(X) ⋉ hZiX
given by g 7→ π1 (g)((gx )x∈X ) is thus well-defined. One verifies that this map
is also a monomorphism.
5.2. Generalized basilica groups.
Lemma 5.7. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating generalized basilica group that is non-abelian. If H E G is weakly self-replicating
and G/H is abelian, then G/H is finite.
Proof. In view of Proposition 5.4, we may assume that Y consists of directed
elements.
Suppose first that k ∈ Y does not act transitively on X and let n ≥ 1 be
least such that kn fixes X. There is some x ∈ X such that (kn )x = 1, and
there is y ∈ X such that (kn )y = ki for some i ≥ 1. Applying Lemma 4.7,
we conclude that (kn )y = ki ∈ H. Hence, k is torsion in G/H.
We next consider h ∈ Y that acts transitively on X. Suppose toward a
contradiction that hi ∈
/ H for all i ≥ 1. Fix k ∈ Y \ {h−1 } and fix y ∈ X
such that k(y) 6= y and ky = 1. By Lemma 5.2, there is |X| > |i| ≥ 1 such
that hi k(y) = y and (hi )k(y) = 1. The element hi k has non-trivial sections
exactly at some x1 , . . . , xl in X where l ∈ {|i|, |i| + 1}, since hi has |i| many
non-trivial sections (all equal to h or h−1 ) and k has one non-trivial section.
Say that x1 is the element of X at which the section of hi k is of the form
ak for a ∈ {1, h±1 }.
Suppose there is some xj such that xj and x1 lie in different orbits of the
cyclic group hhi ki acting on X. Let m ≥ 1 be least such that (hi k)m fixes xj .
The section ((hi k)m )xj is of the form hr for some 1 ≤ |r| ≤ i. The element
(hi k)m also fixes y and has a trivial section at y. Applying Lemma 4.7, we
deduce that hr ∈ H, which is absurd. It is thus the case that all xj lie in
the same orbit of hhi ki acting on X. Take m ≥ 1 least such that (hi k)m
fixes x1 and observe that ((hi k)m )x1 = hi k. Applying again Lemma 4.7, we
conclude that hi k ∈ H.
18
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
For any other y ′ ∈ X such that k(y ′ ) 6= y ′ and ky′ = 1, the same argument
gives |X| > |j| ≥ 1 such that hj k(y ′ ) = y ′ and hj k ∈ H. Thus, hj−i =
hj kk−1 h−i ∈ H. In view of our reductio assumption, we conclude that
i = j. Therefore, hi k fixes all y ∈ X such that k(y) 6= y and ky = 1.
Say that k fixes x and kx = 1. Letting l ≥ 1 be least such that kl fixes
v k , Lemma 4.7 implies that k ∈ H. Since hi k is also in H, hi ∈ H, which is
absurd. We conclude that k fixes no x such that kx = 1. The element hi k
must then fix all y ∈ X \ {v k }, so hi k fixes X. The subgroup H contains
all sections of hi k, since it is weakly self-similar, so if i > 1 or i = 1 and
vh 6= k(vk ), then h ∈ H, which we assume to be false. The element hk
therefore fixes X, and (hk)vk = hk. It follows that hk = 1. This concludes
the reductio argument, since k 6= h−1 .
We have now established that every element k ∈ Y is such that ki ∈ H
for some i, hence G/H is finite.
Theorem 5.8. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica
group. If G contains an odometer, then either G is virtually abelian or G is
not elementary amenable.
Proof. Without loss of generality, we may assume that Y contains π1 (G)∩G.
Let K be the subgroup generated by the directed members of Y . The subgroup K equals hZi where Z is as in Lemma 5.6, so in view of Lemma 5.6, K
is virtually abelian if and only if G is virtually abelian. By replacing G with
K if needed, we assume that each element of Y is directed. Proposition 5.4
now ensures that G is self-replicating.
Let us suppose toward a contradiction that G is elementary amenable but
not virtually abelian. Applying Corollary 4.4, there is H E G such that H
is weakly self-replicating, rk(H) + 1 = rk(G), and G/H is either finite or
abelian. In the case that G/H is abelian, Lemma 5.7 ensures that G/H is
in fact finite. The group G thus admits a weakly self-replicating H E G
such that rk(H) + 1 = rk(G) and G/H is finite. Since H E G is of finite
index, Corollary 4.5 supplies a weakly self-replicating A E G such that G/A
is virtually abelian and rk(A) + 2 = rk(G).
Fix h ∈ G such that h is an odometer and form L := Ahhi. For each x and
y ∈ X distinct, Lemma 5.2 supplies i such that hi (x) = y and (hi )x = 1.
Fixing x ∈ X, for any a ∈ A and y ∈ X, there are i and j such that
hj ahi fixes x and (hj ahi )x = ay . The image of the section homomorphism
secL (x) = φx (L(x) ) therefore contains all sections of A.
For any k ∈ Y , there is some a ∈ A such that a(k(v k )) 6= k(v k ), by
Lemma 4.6. The element k−1 ak is a member of A, and (k−1 ak)vk = ak(vk ) k.
The group secL (x) thus contains ak(vk ) k and ak(vk ) . Hence, k ∈ secL (x), and
we deduce that secL (x) = G. On the other hand, A(x) E L(x) , and L(x) /A(x)
is abelian. Thus, A = secA (x) E secL (x) = G, so G/A is abelian. This
implies that rk(G) = rk(A) + 1 which is absurd.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
19
Example 5.9. Let G := he
a, ebi ≤ Aut([4]∗ ) be the basilica group in the reduced form as given in Example 3.11. The elements e
a and eb in wreath recursion have the following form: e
a = (23)(1, 1, 1, e
a ) and eb = (02)(13)(1, 1, 1, eb).
We now see that
e
aeb−1 = (23)(1, 1, 1, e
a )(02)(13)(1, eb−1 , 1, 1) = (0312)(1, e
ae
b−1 , 1, 1).
Hence, e
ae
b−1 is an odometer, so G contains an odometer. Theorem 5.8 now
gives a second proof that G is not elementary amenable.
5.3. Technical results revisited.
Lemma 5.10. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating
bounded automata group in reduced form. If G is elementary amenable but
not virtually abelian, then there is a weakly self-replicating M E G such that
G/M is finite and rk(M ) + 1 = rk(G)
Proof. In view of Lemma 3.1, if G is in reduced form, then rk (G) ≤ Aut((X k )∗ )
is again in reduced form for any k ≥ 1. By passing to r2 (G), we may thus
assume that |X| > 2.
By Corollary 4.4, there is a weakly self-replicating N E G such that G/N
is either finite or abelian and rk(N ) + 1 = rk(G). Suppose that G/N is
abelian. We will argue that G/N is finite. Letting F be the collection of
finitary elements of G, we will in fact show that F N is of finite index in G.
This suffices to prove the theorem as F is locally finite, and hence G/N will
have a locally finite subgroup of finite index, and hence is finite.
Fix d ∈ Y directed and suppose first that hdi does not act transitively
on X. Let x ∈ X be such that dx = d and y ∈ X be such that y is not in
the orbit of x under hdi. Taking m ≥ 1 to be least such that dm fixes X, it
follows that (dm )x = (f d)i for some i ≥ 1 and f finitary and (dm )y = r for r
some finitary. Since G is self-replicating, there is h ∈ G such that h(y) = x
and hy = 1. The commutator [h, d−m ] is an element of N , and
[h, d−m ]x = r −1 (f d)i ,
which is an element of N as N is weakly self-replicating. Since G/N is
abelian, it follows that di ∈ F N .
Now suppose that d ∈ Y acts transitively on X. In view of Theorem 5.8,
there must be a non-trivial finitary element f ∈ Y . We may find a power
n := |X| > i ≥ 1 such that di f fixes some x ∈ X. This presents two cases:
(di f )x is finitary or (di f )x = rdr ′ for r and r ′ finitary. The cases are similar,
so we only consider the latter. Recall that n > 2. If i = n − 1, then d−1 f
fixes x, so we replace d with d−1 . We may thus assume that n − 1 > i.
Replace di with dj where j := i − n and note that 1 < |j|. The sections of
j
d f have three possible forms: finitary, rdr ′ d−1 r ′′ with r, r ′ , and r ′′ finitary,
or rd−1 r ′ with r and r ′ finitary. The section (dj f )x is of the form rdr ′ d−1 r ′′ ,
and since i < n − 1, there is some y ∈ X such that (dj f )y = sd−1 s′ with s
and s′ finitary elements.
20
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Let k be least such that (dj f )k fixes y. Since G is self-replicating, there
is h ∈ G such that h(x) = y and hx = 1. The commutator [(dj f )k , h] is an
element of N , and
[(dj f )k , h]y = ak . . . a1 ((dj f )x )−k ,
where each ai has one of aforementioned forms, (dj f )x has the form rdr ′ d−1 r ′′
and a1 = ((dj f )k )y is of the form sd−1 s′ .
Since G/N is abelian, the ai of the form rdr ′ d−1 r ′′ are equal to a finitary modulo N . We may thus write [(dj f )k , h]y mod N = b1 . . . bm mod N
where each bi is either finitary or of the form sd−1 s′ . Commuting the finitaries to the left modulo N , we see that [(dj f )k , h]y mod N = f ′ d−l mod N
for f a finitary and l non-zero. On the other hand, [(dj f )k , h]y ∈ N since
N is weakly self-replicating. It now follows that dl ∈ F N .
We have now demonstrated that every z ∈ Y admits l such that z l ∈ F N .
Hence, F N is of finite index in G as G/N is finitely generated abelian.
In view of Corollary 4.5, Lemma 5.10 yields the following consequence.
Corollary 5.11. Suppose that G ≤ Aut(X ∗ ) is a self-replicating bounded
automata group. If G is elementary amenable but not virtually abelian, then
there are weakly self-replicating subgroups N E G and M E G such that
(1) N ≤ M , M/N is abelian, and G/M is finite; and
(2) rk(M ) + 1 = rk(N ) + 2 = rk(G).
Corollary 5.11 ensures that various examples of elementary amenable
groups do not have faithful representations as self-replicating bounded automata groups.
Proposition 5.12. Suppose that G is an elementary amenable group that is
not virtually abelian. If every finite index subgroup has the same rank as G,
then G has no faithful representation as a self-replicating bounded automata
group.
Proof. Suppose for contradiction G has a faithful representation as a selfreplicating bounded automata group. Appealing to Corollary 3.7, we may
assume that G ≤ Aut(X ∗ ) is a representation of G as a bounded automata
group in reduced form. Lemma 5.10 now implies that G has a finite index
subgroup of lower rank. This contradicts our hypotheses.
Corollary 5.13. The groups A ≀ Z where A is a non-trivial abelian group do
not have faithful representations as self-replicating bounded automata groups.
Corollary 5.13 is rather interesting because the classical lamplighter group
Z/2Z ≀ Z does have representations as a self-replicating group [18, cf. Proposition 1.9.1] (see also [22] where Z/2Z is replaced by an arbitrary finite
abelian group), and on the other hand, Example 9.3 below shows it has
representations as a bounded automata group. However, one can never find
a representation which is simultaneously as a self-replicating group and as
a bounded automata group
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
21
5.4. The general case.
Theorem 5.14. Suppose that G ≤ Aut(X ∗ ) is a bounded automata group.
If G contains an odometer, then either G is virtually abelian or G is not
elementary amenable.
Proof. Suppose toward a contradiction that G is elementary amenable but
not virtually abelian. Via Theorem 3.5, it is enough to consider G = hY i ≤
Aut(X ∗ ) to be in reduced form. Without loss of generality, we may assume
that Y contains an odometer h.
Setting Z := {dx | d ∈ Y is directed and x ∈ X}, Lemma 5.6 implies that H := hZi is a bounded automata group in reduced form, and
G ֒→ Sym(X) ⋉ H X . Moreover, h ∈ Z, so H contains an odometer and
is elementary amenable but not virtually abelian. Proposition 5.5 further
implies that H is self-replicating.
Applying Corollary 5.11, there is a weakly self-replicating M E H such
that H/M is virtually abelian and rk(M ) + 2 = rk(H). Using the odometer
h ∈ H, set L := M hhi. For each u and w ∈ X 2 distinct, Lemma 5.2 supplies
i such that hi (u) = w and (hi )u = 1. Fixing v ∈ X 2 , for any m ∈ M and
w ∈ X 2 , there are i and j such that hj mhi fixes v and (hj mhi )v = mw . The
image of the section homomorphism secL (v) = φv (L(v) ) therefore contains
mw for every m ∈ M and w ∈ X 2 .
For any directed k ∈ Y and x ∈ X the active vertex of k, there is some
a ∈ M such that ak(x) 6= k(x), by Lemma 4.6. The section (k−1 )ak(x) is
finitary of depth one, so
(k−1 )ak(x)x′ = ((k−1 )ak(x) )x′ = 1
for any x′ ∈ X. The element k −1 ak is a member of M , and for any y ∈ X,
(k−1 ak)xy = (k−1 )ak(x)ak(x) (k(y)) ak(x)k(y) ky = ak(x)k(y) ky
The group secL (v) thus contains ak(x)k(y) ky and ak(x)k(y) . Hence, ky ∈
secL (v). We deduce that Z ⊆ secL (v), so secL (v) = H. On the other hand,
M(v) E L(v) , and L(v) /M(v) is abelian. Since M = secM (v) E secL (v) = H,
we deduce that H/M is abelian. Therefore, rk(H) = rk(M ) + 1 which is
absurd.
6. Kneading automata groups
6.1. Preliminaries. For a permutation σ ∈ Sym(X), a complete cycle
decomposition of σ is a cycle decomposition including all length one cycles.
Definition 6.1. Let X be a finite set and α = (σ1 , . . . , σn ) be a sequence
of permutations of X. Say that each σi has complete cycle decomposition
ci,1 . . . ci,ki . We define the cycle graph of α, denoted by Γα , as follows:
V Γα := X ⊔ {(i, j) | 1 ≤ i ≤ n and 1 ≤ j ≤ ki }
and
EΓα := {{(i, j), x} | x appears in ci,j } .
22
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
The graph Γ is a bipartite graph with bipartition consisting of X and
C := {(i, j) | 1 ≤ i ≤ n and 1 ≤ j ≤ ki }. Some authors define the cycle
graph using only non-trivial cycles. We allow trivial cycles to make our
discussion more streamlined later. Allowing for trivial cycles only adds
leaves to the graph. In particular, these leaves to do affect whether or not
the cycle graph is a tree.
Definition 6.2. For X a finite set, a finite sequence α of elements of Sym(X)
is called tree-like if the cycle graph is a tree.
We will find tree-like sequences in the definition of kneading automata
groups. Let us note several facts for later use.
Lemma 6.3. If (σ1 , . . . , σn ) is a tree-like sequence of permutations of a
finite set X, then H := hσ1 , . . . , σn i acts transitively on X.
Proof. First note that if x, x′ ∈ X are connected by a path of length 2, then
they belong to a cycle of some σi and are hence in the same orbit of H.
Since the cycle graph Γ is bipartite, and hence any path between elements
of X decomposes as a composition of length two paths of the above sort, H
is transitive by the connectivity of Γ.
For a permutation σ ∈ Sym(X), we denote the collection of fixed points
in X of σ by fix(σ).
Lemma 6.4 ([11, Lemma 6.5]). Let X be a finite set and α = (σ1 , . . . , σn )
be a tree-like sequence of permutations of X. Then
(1) For any i 6= j, |fix(σi )| + |fix(σj )| ≥ 2.
(2) If |fix(σi )| + |fix(σj )| ≤ 3 for some i 6= j, then σk = 1 for all k ∈
/
{i, j}.
6.2. Kneading automata. A set Y ⊆ Aut(X ∗ ) is called self-similar if
gx ∈ Y for every x ∈ X and g ∈ Y .
Definition 6.5. We say that G ≤ Aut(X ∗ ) is a kneading automata
group if G admits a finite self-similar generating set Y such that the following hold:
(1) For each non-trivial h ∈ Y , there is a unique g ∈ Y and x ∈ X such
that gx = h.
(2) For each h ∈ Y and each cycle (x1 . . . xn ) of π1 (h), possibly of length
one, there is at most one 1 ≤ i ≤ n such that hxi 6= 1.
(3) The sequence (π1 (h))h∈Y \{1} is tree-like.
We call Y a distinguished generating set and write G = hY i ≤ Aut(X ∗ )
to indicate that Y is a distinguished generating set for G.
A straightforward verification shows that a kneading automata group is
a bounded automata group. Furthermore, kneading automata groups naturally arise in the study of iterated monodromy groups.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
23
Theorem 6.6 (Nekrashevych, [18, Theorem 6.10.8]). Every iterated monodromy group of a post-critically finite polynomial has a faithful representation as a kneading automata group
Kneading automata groups enjoy several useful properties.
Lemma 6.7. If G = hY i ≤ Aut(X ∗ ) is a kneading automata group, then
G ≤ Aut(X ∗ ) is a self-replicating bounded automata group
Proof. To see that G is self-replicating, we must verify that G acts transitively on X and the section homomorphisms are onto for every x ∈ X.
Since (π1 (y))g∈Y \{1} is tree-like, π1 (G) acts transitively on X, so G acts on
X transitively.
To see that the section homomorphisms are onto, we first argue that for
each v, w ∈ X, there is k ∈ G such that k(v) = w with kv = 1. Fix g ∈ Y
and say that {O1 , . . . , On } lists the orbits of hgi on X. Take v, w ∈ Oi and
fix |j| ≥ 1 least such that g j (v) = w. If (g j )v = 1, we are done, so let us
suppose that (g j )v is non-trivial. By the definition of a kneading automata
group, there is a most one z ∈ Oi such that gz is non-trivial. Say that gz = h
and let m ≥ 1 be least such that gm fixes z. The element g m fixes Oi and
(gm )u = h for every u ∈ Oi . On the other hand, (gj )v = h±1 , since we chose
j with |j| least. Either gj−m or gj+m , depending on the sign of (gj )v , then
sends v to w with trivial section at v.
For an arbitrary v, w ∈ X, there is a word γ = gnin . . . g1i1 with gk 6=
gk+1 ∈ Y such that γ(v) = w. We may further assume that Σnj=1 |ij | is least
among all such words γ. The image g1i1 (v) lies in the orbit of v under hg1 i.
Appealing to the previous paragraph, we may replace g1i1 , if necessary, with
g1i1 ±mi for some mi such that that g1i1 ±mi (v) = g1i1 (v) and (g1i1 ±mi )v = 1.
Doing this for each gj as necessary, we produce a new word γ ′ such that
γ ′ (v) = w and (γ ′ )v = 1.
Fix x ∈ X and let g ∈ Y . By the definition of a kneading automata
group, there is h ∈ Y and z ∈ X such that hz = g. The previous paragraph
supplies γ and δ such that γ(x) = z with γx = 1 and δ(h(z)) = x with
δh(z) = 1. The element δhγ fixes x, and
(δhγ)x = δh(z) hz γx = hz = g.
The image φx (G(x) ) of the section homomorphism at x thus contains Y . We
conclude that φx (G(x) ) = G, and G is self-replicating.
In addition to self-replication, kneading automata groups enjoy a robustness property. Specifically, the representation rk (G) is again a kneading
automata group, for any k ≥ 1. This was proved in [18, Proposition 6.7.5]
using the dual automaton and a topological argument; here we provide a
simple counting argument.
Lemma 6.8 ([18, Proposition 6.7.5]). If G = hY i ≤ Aut(X ∗ ) is a kneading
automata group, then
24
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
(1) for all k ≥ 1, rk (G) = hrk (Y )i ≤ Aut((X k )∗ ) is a kneading automata
group;
(2) there is k ≥ 1 such that rk (G) = hrk (Y )i ≤ Aut((X k )∗ ) is a kneading
automata group in reduced form.
In particular, every kneading automata group has a faithful representation
as a kneading automata group in reduced form.
Proof. For any k, conditions (1) and (2) of the definition of a kneading
automata group are easily verified to hold for rk (G). To prove (3), we show
that (πk (y))y∈Y \{1} is a tree-like sequence in Sym(X k ) for any k ≥ 1. We use
that a finite connected graph is a tree if and only if it has Euler characteristic
1. Set Z := Y \ {1}
Let us begin by making several observations. Let Γi be the cycle graph
of (πi (y))y∈Z . Define li : Z → N by setting li (g) to be the number of orbits
of hgi on X i . For g ∈ Z, let Yg,i := {gx | x ∈ X i } \ {1}. As G is a kneading
automata group, it follows that Z = ⊔g∈Z Yg,i .
We observe that the functions li+1 are defined in terms of l1 and li . Fix
g ∈ Z. The difference li (g) − |Yg,i | is the number of orbits O of hgi on X i
such that gx = 1 for every x ∈ O. For each such orbit O and x ∈ X, the
set of words Ox is an orbit of hgi on X i+1 . There are thus |X|(li (g) − |Yg,i |)
many orbits of hgi on X i+1 of this type. For any other orbit O, let h ∈ Yg,i
be the non-trivial section of g for some x ∈ O; the orbit O for a given h is
unique. For any W an orbit of hhi acting on X, the argument in the second
paragraph of the proof of Lemma 6.7 (which only uses conditions (1) and
(2) of a kneading automata group) shows that OW is an orbit of hgi acting
on X i+1 . We conclude that
X
li+1 (g) = |X| (li (g) − |Yg,i |) +
l1 (h).
h∈Yg,i
Note further that Γi is connected for every i, since G acts transitively on
X i . Additionally,
X
li (g) and |EΓi | = |Z||X|i .
|V Γi | = |X|i +
g∈Z
We now argue by strong induction on i ≥ 1 for the claim that (πi (y))y∈Z is
a tree-like sequence. The base case holds by definition. Suppose (πi (y))y∈Z
is a tree-like sequence for all i ≤ k. To verify the inductive claim, it suffices
to show that |V Γk+1 | − |EΓk+1 | = 1.
The inductive hypothesis ensures that
X
li (g) = |Z||X|i − |X|i + 1
g∈Z
for any i ≤ k. For k + 1, we have
|V Γk+1 | = |X|k+1 +
X
g∈Z
lk+1 (g).
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
25
In view of the relationship between the functions li , we substitute to obtain
P
P
|V Γk+1 | = |X|k+1 + g∈Z |X| (lk (g) − |Yg,k |) + h∈Yg,k l1 (h)
P
P
= |X|k+1 + |X| g∈Z lk (g) − |X||Z| + g∈Z l1 (g)
= |X|k+1 + |X|k+1 |Z| − |X|k+1 + |X| − |X||Z| + |Z||X| − |X| + 1
= |X|k+1 |Z| + 1.
Hence, |V Γk+1 | − |EΓk+1 | = 1, as required. Therefore, rk (G) is kneading
automata group.
Lemma 6.7 ensures that G is a self-replicating bounded automata group,
and by Corollary 3.7, there is k such that rk (G) is in reduced form. Hence,
rk (G) is a kneading automata group in reduced form.
6.3. Elementary amenable kneading automata groups. We begin by
extracting a result from the proof of [11, Theorem 8.2]. For g ∈ Aut(X ∗ ),
let fixk (g) be the collection of fixed points of hgi acting on X k .
Lemma 6.9. Let G = hY i ≤ Aut(X ∗ ) be a kneading automata group in
reduced form with |X| > 3. If there are distinct g and h in Y such that
|fix1 (g)| + |fix1 (h)| = 2, then either
(1) |fix2 (g ′ )| + |fix2 (h′ )| > 3 for all distinct, non-trivial g′ and h′ in Y ,
or
(2) G is the infinite dihedral group.
Proof. Since G is self-replicating, it is infinite. Suppose that (1) fails. Say
that g ′ and h′ in Y are such that |fix2 (g′ )| + |fix2 (h′ )| ≤ 3. Lemma 6.8 tells
us that r2 (G) is a kneading automata group, so Lemma 6.4 implies that
π2 (d) acts trivially on X 2 for all d ∈ Y \ {g′ , h′ }. If h or g is an element of
Y \ {g ′ , h′ }, then h or g fixes X, which contradicts that |fix1 (g)| + |fix1 (h)| =
2. We conclude that {g, h} = {g ′ , h′ }. In particular, |fix2 (g)| ≤ 3 and
|fix2 (h)| ≤ 3.
As G is in reduced form, all finitary elements of Y have depth one, so
there are no non-trivial finitary elements in Y \ {g, h}, since all elements of
Y \ {g, h} act trivially on X. If d ∈ Y \ {g, h} is directed, then the previous
paragraph ensures that it fixes X 2 . Every section dx for x ∈ X \ {v d } is
trivial where v d is the active vertex for d on level one, as d fixes X 2 . The
element d therefore acts trivially on X ∗ , and d = 1. Hence, Y = {g, h, 1}.
Take Γ the cycle graph for (π1 (g), π1 (h)) and set n := |X|. Let Kg and
Kh be the number of non-trivial cycles in g and h, respectively, and Fg and
Fh be the number of trivial cycles in g and h, respective. Euler’s formula
for trees implies that |V Γ| − |EΓ| = 1. In view of the definition of Γ, we see
that
|V Γ| = n + Kg + Fg + Kh + Fh
and |EΓ| = 2n. Therefore, Kg +Kh = n−1. Observe that |fix1 (g)∪fix1 (h)| =
2, as G = hg, hi acts transitively on X and hence g, h do not have a common
fixed point. If fix1 (g)∪fix1 (h) = {x, x′ }, then it follows that every element of
X \{x, x′ } belongs to both a non-trivial cycle of π1 (g) and a non-trivial cycle
26
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
of π1 (h) and x, x′ each belong to a non-trivial cycle of exactly one of π1 (g)
or π1 (h). It follows that 2n − 2 ≥ 2Kg + 2Kh with equality if and only if
π1 (g), π1 (h) are both products of disjoint two-cycles in their respective cycle
decompositions (omitting trivial cycles). As Kg +Kh = n−1, we deduce that
π1 (g) and π1 (h) are products of disjoint two-cycles, so |π1 (g)| = |π1 (h)| = 2.
We now have two cases: (a) Y contains a non-trivial finitary element, and
(b) Y contains no non-trivial finitary element. For case (a), suppose that g is
finitary. The element g therefore has order two, since G is in reduced form.
If g fixes a point u ∈ X, then g must fix pointwise uX in X 2 , since gu = 1.
This implies that |fix2 (g)| > 3, which is absurd. We conclude that g acts
fixed point freely on X, so h fixes two points v1 , v2 of X. If some hvi = 1,
then h fixes vi X contradicting that |fix2 (h)| ≤ 3. Since G is a kneading
automata group with self-similar generating set Y = {g, h, 1}, we deduce
that, up to relabelling, hv1 = h, hv2 = g and all other sections of h are
trivial. Since π1 (h) is a product of disjoint two-cycles and g is an involution,
it now follows that h2 = 1. Hence, G is an infinite dihedral group.
For case (b), both g and h are directed, and as Y is self-similar, neither g
nor h has non-trivial finitary sections. Take u ∈ X \ {v g }. If g fixes u, then
|fix2 (g)| > 3, since gu = 1; this is absurd. The only possible fixed point of g
in X is its active vertex v g . Likewise, the only possible fixed point of h in
X is its active vertex v h . Therefore, g fixes v g , and h fixes v h . We conclude
that g and h are torsion with |g| = |h| = 2. The group G is thus infinite
and generated by two involutions, so G is an infinite dihedral group.
We are now ready to prove the desired theorem.
Theorem 6.10. Suppose that G = hY i ≤ Aut(X ∗ ) is a kneading automata
group. If G is elementary amenable, then G is virtually abelian.
Proof. Suppose toward a contradiction that G is not virtually abelian. We
begin with several reductions. In view of Lemma 6.7, G is a self-replicating
bounded automata group, and by Lemma 6.8, we may assume that G is in
reduced form. By passing to r2 (G), where r2 : Aut(X ∗ ) → Aut((X 2 )∗ ) is the
canonical inclusion, we may assume that |X| > 3. If g, h ∈ Y are distinct
elements such that |fix1 (g)| + |fix1 (h)| = 2, then Lemma 6.9 ensures that
|fix2 (g′ )|+|fix2 (h′ )| > 3 for all distinct, non-trivial g′ and h′ in Y . Passing to
r2 (G) a second time, we may additionally assume that |fix1 (g)|+|fix1 (h)| > 3
for all distinct, non-trivial g and h in Y .
Applying Corollary 5.11, we obtain weakly self-replicating M E G and
F E G such that rk(M ) + 2 = rk(G) = rk(F ) + 1, M ≤ F , F/M is abelian,
and G/F is finite. By Lemma 4.8, F also acts transitively on X. We now
have two cases (1) every g ∈ Y fixes at least two points on X, and (2) some
unique g ∈ Y fixes one or fewer points on X.
Let us suppose first that every g ∈ Y has at least two fixed points. Fix
h ∈ Y directed. Since h fixes at least two points, we may find x ∈ X such
that h fixes x and hx =: σ is finitary. The section σ is again an element
of Y , so it fixes some x′ ∈ X, as it also fixes two points. The element h
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
27
therefore fixes xx′ , and hxx′ = σx′ = 1, since G is in reduced form. Let v h
be the active vertex of h in X 2 and d ≥ 1 be least such that hd fixes v h . For
O the orbit of v h under hhi, that G is a kneading automata group ensures
that v h is the only element of O for which h has a non-trivial section. It
follows that (hd )vh = h. Since (hd ) also fixes xx′ , Lemma 4.7 implies that
h ∈ F.
For any non-trivial section hz of h, the definition of the kneading automata
ensures that hz is the only non-trivial section of h on the orbit for z under
hhi. Taking k ≥ 1 least such that hk fixes z, it follows that (hk )z = hz .
Recalling that F is weakly self-similar, we conclude that hz ∈ F . It now
follows from Proposition 5.5 (as G is self-replicating) that F = G, which
contradicts the rank of G.
Suppose next that there is a unique g ∈ Y that has at most one fixed
point on X. Fix h ∈ Y \ {g} directed. The element h has at least three
fixed points in X, so there is x ∈ X such that h fixes x, hx is finitary, and
hx 6= g. The section hx fixes some x′ ∈ X, as it differs from g. Hence, h fixes
xx′ , and hxx′ = 1. Just as in the previous case, it now follows that h ∈ F .
The quotient F/M is abelian, and F acts on X transitively. As Lemma 4.7
also applies in this setting, we can run the argument again to deduce that
h ∈ M , and as in the previous case, hx ∈ M for all x ∈ X. We conclude
that hx ∈ M for all x ∈ X and h ∈ Y \ {g}. The subgroup M therefore
contains Y \ ({gx | x ∈ X} ∪ {g}).
Let us now consider the element g. The quotient G/M cannot be abelian
because rk(G) = rk(M ) + 2 and so {gx | x ∈ X} ∪ {g} is not equal to
{1, g}. The element g thereby admits non-trivial finitary sections and, in
particular, is not, itself, finitary. Fix x ∈ X such that gx is a non-trivial
finitary element σ and note that σ ∈ Y \ {g} fixes a point x′ ∈ X.
Let d ≥ 1 be least such that gd fixes v := v g and let m ≥ 1 be least
such that gm fixes x. Since G is a kneading automaton group, and hence
each orbit of g has at most one non-trivial section, (g d )v = g and (gm )x =
2
2
σ. Observe that gd fixes vv, g m fixes xx′ (gm )xx′ = 1 and (gd )vv = g.
2
2
The element g d m thus fixes vv and xx′ . Moreover, (g d m )xx′ = 1 and
2
(gd m )vv = gm . Applying Lemma 4.7, we deduce that gm ∈ F . The element
2
gd m is therefore also in F , and since F/M is abelian, a second application of
Lemma 4.7 ensures that gm ∈ M . The element gm fixes x, and (g m )x = σ.
Therefore, σ ∈ M , since M is weakly self-similar. We conclude that M
contains every finitary section of g and hence Y \ {g}. The quotient G/M
is thus abelian, which contradicts the rank of G.
Theorems 6.6 and 6.10 yield an immediate corollary.
Corollary 6.11. Every iterated monodromy group of a post-critically finite
polynomial is either virtually abelian or not elementary amenable.
28
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
7. Generalized basilica groups
Definition 7.1. We say that G ≤ Aut(X ∗ ) is a generalized basilica
group if G admits a finite generating set Y such that for every g ∈ Y
either gx = 1 for all x ∈ X or gx ∈ {1, g} for all x ∈ X with exactly one x
such that gx = g. We call Y a distinguished generating set and write
G = hY i ≤ Aut(X ∗ ) to indicate that Y is a distinguished generating set for
G.
A straightforward verification shows that a generalized basilica group is
a bounded automata group.
7.1. A reduction theorem. The reduction result established herein reduces many questions for generalized basilica groups to the self-replicating
case. It follows by induction on the number of directed elements of a distinguished generating set.
Our first lemma gives a tool to reduce to groups with possibly fewer
number of directed generators, based on the orbits of the group on the first
level of the tree.
Lemma 7.2. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica
group, let O1 , . . . , On list the orbits of G on X, and let Yi ⊆ Y be the
collection of g ∈ Y such that v g ∈ Oi . For each i, hYi i ≤ Aut(X ∗ ) is a
generalized basilica group generated by directed elements, and
G ֒→
n
Y
Sym(Oi ) ⋉
n
Y
hYi iOi .
i=1
i=1
Aut(X ∗ )
Proof. That each hYi i ≤
is a generalized basilica group generated
by directed elements is immediate.
For each x ∈ Oi and h ∈ Y , the section hx is an element of hYi i. Inducting
on the word length, one sees that gx ∈ hYi i for all g ∈ G and x ∈ Oi .
Letting πQ
1 : G → Sym(X) be the induced homomorphism, we see that
π1 (G) ≤ n1=1 Sym(Oi ). We may now define
G→
n
Y
i=1
Sym(Oi ) ⋉
n
Y
hYi iOi .
i=1
by g 7→ π1 (g)((gx )x∈Oi )ni=1 . One verifies that this function is a monomorphism.
Our next lemmas address the case in which Lemma 7.2 does not reduce
the number of directed elements.
Lemma 7.3. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica
group. If O ⊆ X is setwise preserved by the action of G on X, then O∗ is
setwise preserved by G, and the induced homomorphism φ : G → Aut(O ∗ ) is
such that φ(G) is a generalized basilica group with distinguished generating
set φ(Y ).
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
29
Proof. That G is self-similar ensures that O ∗ is setwise preserved by G. Take
−1
◦ g ◦ ψw where ψv : X ∗ → vX ∗
g ∈ G and w ∈ O∗ . By definition, gw = ψg(w)
by x 7→ vx. The map φ is nothing but restriction to O ∗ , so we see that
−1
↾O∗ ◦g ↾O∗ ◦ψw ↾O∗ = φ(g)w .
φ(gw ) = (gw ) ↾O∗ = ψg(w)
It now follows that φ(G) ≤ Aut(O∗ ) is a generalized basilica group with
generating set φ(Y ).
We call the action of G on O ∗ a sub-basilica action of G induced from
X ∗.
Lemma 7.4. Let O ⊆ X and let G be the subgroup of Aut(X ∗ ) consisting
of those elements that fix O∗ pointwise and have trivial sections outside of
∗
O ∗ . Then G ∼
= Sym(X \ O)O and hence is locally finite.
Proof. It is clear that G is a subgroup of Aut(X ∗ ) since if f, g ∈ G and
w∈
/ O∗ , we have (f g)w = fg(w) gw = 1 as g(w) ∈
/ O ∗ . There is a well-known
∗
∗
set-theoretic bijection of Aut(X ) with Sym(X)X sending an element g to
∗
its ‘portrait’ (π1 (gw ))w∈X ∗ ∈ Sym(X)X . Put Y := X \ O. An element
g ∈ Aut(X ∗ ) belongs to G if and only if gw = 1 for w ∈
/ O∗ and π1 (gw ) ∈
∗
Sym(Y ) for w ∈ O (where Sym(Y ) is viewed as a subgroup of Sym(X)
∗
in the usual way). There is thus a bijection π : G → Sym(Y )O given by
π(g) = (π1 (gw ))w∈O∗ . The mapping π is a homomorphism because if f, g ∈
G and w ∈ O ∗ , then (f g)w = fg(w) gw = fw gw as g fixes O ∗ pointwise. This
proves the first statement. Since the variety of groups generated by any
∗
finite group is locally finite, it follows that Sym(Y )O is locally finite.
Lemma 7.5. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica
group generated by directed elements. If there is an orbit O ⊆ X of G such
that v g ∈ O for all g ∈ Y , then the homomorphism φ : G → Aut(O ∗ ) induced
by the action G y O ∗ enjoys the following properties:
(1) φ(G) is a self-replicating generalized basilica group with generating
set φ(Y ), and
(2) ker(φ) is locally finite.
Proof. For (1), Lemma 7.3 ensures that φ(G) ≤ Aut(O∗ ) is a generalized
basilica group with generating set φ(Y ). Lemma 5.3 implies that secG (v) =
G for all v ∈ O, so secφ(G) (v) = φ(G) for all v ∈ O. Since G acts transitively
on O, φ(G) is self-replicating.
For (2), clearly ker(φ) fixes O∗ pointwise. Since v g ∈ O for all g ∈ Y ,
it follows that fv = 1 for all v ∈ X \ O and f ∈ G. As G is self-similar,
it follows that fw = 1 for all f ∈ G and w ∈
/ O∗ . Indeed, we may write
∗
∗
w = uav with u ∈ O , a ∈ X \ O, and v ∈ X , so fw = ((fu )a )v = 1v = 1.
∗
Thus, ker(φ) is isomorphic to a subgroup of Sym(X \ O)O , and hence is
locally finite, by Lemma 7.4.
Bringing together our lemmas produces the desired reduction theorem.
To state our main theorem in full generality requires a definition.
30
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Definition 7.6. Suppose that Q is a property of generalized basilica groups.
We say that Q is a sub-basilica stable property if for every generalized
basilica group G = hY i ≤ Aut(X ∗ ) with property Q, the following holds: For
every generalized basilica group of the form hY ′ i ≤ Aut(X ∗ ) with Y ′ ⊂ Y ,
g′ i induced by a sub-basilica action of hY ′ i
any generalized basilica group hY
has property Q. In particular, hY ′ i has Q.
Observe that any property of groups stable under passing to subgroups
and quotients is sub-basilica stable.
Theorem 7.7. Let Q be a sub-basilica stable property and suppose that P is
a property of groups enjoyed by abelian groups and stable under taking subgroups, finite direct products, and P -by-finite groups. If every self-replicating
generalized basilica group with property Q has property P , then every generalized basilica group with property Q is (locally finite)-by-P .
Proof. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized basilica group with
property Q. We argue by induction on the number of directed elements in Y ,
denoted by δ(Y ), for the theorem. If δ(Y ) ≤ 1, then G is virtually abelian
by Lemma 5.6, and we are done. Suppose the theorem holds up to n and
say that δ(Y ) = n + 1. Let O1 , . . . , Ol list the orbits of G on X and let
Yi ⊆ Y be the collection of directed d ∈ Y such that v d ∈ Oi . Lemma 7.2
supplies an injection
G ֒→
l
Y
i=1
Sym(Oi ) ⋉
l
Y
HiOi .
i=1
It is enough to show that each Hi is (locally finite)-by-P
Each Hi ≤ Aut(X ∗ ) is again a generalized basilica group with property
Q, since Q is sub-basilica stable. If no Oi contains v d for every directed
d ∈ Y , each Hi is such that δ(Yi ) < n + 1. The inductive hypothesis then
ensures that each Hi is (locally finite)-by-P .
Suppose some Oi contains v d for every directed d ∈ Y . Without loss
of generality, i = 1, so Hj = {1} for j > 1. Clearly each Hj with j > 1
is (locally finite)-by-P . We apply Lemma 7.5 to the group H1 . Letting
K := ker(H1 y O1∗ ), Lemma 7.5 ensures that H1 /K ≤ Aut(O1∗ ) is a selfreplicating generalized basilica group, and K is locally finite. Since H1 /K
is the group induced by a sub-basilica action, H1 /K has property Q, hence
H1 /K has property P . We conclude that H1 is (locally finite)-by-P .
We can do better for torsion-free bounded automata groups. The proof
is essentially the same as that of Theorem 7.7, so we leave it to the reader.
Theorem 7.8. Suppose that P is a property of groups enjoyed by abelian
groups and stable under taking subgroups, finite direct products, and P -byfinite groups. If every self-replicating torsion-free bounded automata group
has property P , then every torsion-free bounded automata group has P .
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
31
7.2. Groups with center. A system of imprimitivity for a group action
G y X is a G-equivariant equivalence relation on X. That is, x ∼ y if and
only if g(x) ∼ g(y). The equivalence classes of a system of imprimitivity are
called blocks of imprimitivity. A block B is called trivial if it equals
either X or a singleton set.
Lemma 7.9. Suppose that h ∈ Aut(X ∗ ) is a directed automorphism such
that hx ∈ {1, h} for all x ∈ X. Let B ⊆ X be a non-trivial block of imprimitivity for the action of hhi on X and O be the orbit of v h under the action
of hhi on X. If |O ∩ B| ≥ 2, then there is j ∈ Z and w ∈ B such that hj
stabilizes B setwise, (hj )w = h±1 , and (h−j )w = 1.
Proof. Let i ≥ 0 be least such that hi (v h ) ∈ B.
Suppose first that i = 0, so v h ∈ B. Set w := v h . Let j > 0 be least such
that hj (w) ∈ B and observe that hj (w) 6= w since |O ∩ B| ≥ 2. The element
hj stabilizes B setwise, and it is clear that (hj )w = h. On the other hand,
(h−j ) has non-trivial sections at {h(w), . . . , hj (w)}, and this set excludes w.
We conclude that (h−j )w = 1, establishing the lemma in this case.
Suppose next that i > 0 and set w := hi (v h ). Let j > 0 be least such
that hj+i (v h ) ∈ B. The element h−j setwise stabilizes the block B, so
h−j (w) = hi−j (v h ) ∈ B. If j ≤ i, then we contradict the choice of i, so j > i.
It now follows that (h−j )w = h−1 . On the other hand, hj (w) = hj+i (v h ). As
j + i > j, h−j has a trivial section at hj (w). We deduce that (hj )w = 1.
Lemma 7.10. Let G ≤ Aut(X ∗ ) be self-similar, 1 6= d ∈ G be directed such
that dx ∈ {1, d} for all x ∈ X, and O be the orbit of v d ∈ X under the
action of hdi. Then, O is setwise stabilized by CG (d), and gv ∈ CG (d) for
all g ∈ CG (d) and v ∈ O .
Proof. Take n ≥ 1 least such that dn fixes O. The element dn is such that
(
d if v ∈ O
(dn )v =
1 else.
For any v ∈ O and z ∈ CG (d), we see that
(d−n )z(v) zv d = (d−n zdn )v = zv .
The sections of d−n are either d−1 or 1, and the non-trivial sections occur
for exactly the v ∈ O. It is therefore the case that z(v) ∈ O and d commutes
with zv . The group CG (d) thus setwise stabilizes O, and gv ∈ CG (d) for all
g ∈ CG (d) and v ∈ O.
Lemma 7.11. For G ≤ Aut(X ∗ ), if v ∈ X ∗ is such that secG (v) = G, then
secZ(G) (v) ≤ Z(G). In particular, if G is weakly self-replicating, then Z(G)
is weakly self-similar.
Proof. We see that Z(G)(v) ≤ Z(G(v) ) ≤ G(v) . Therefore,
secZ(G) (v) = φv (Z(G)(v) ) ≤ φv (Z(G(v) )) ≤ Z(φv (G(v) )) = Z(G).
The lemma now follows.
32
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Theorem 7.12. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating
generalized basilica group. If Z(G) is non-trivial, then G is abelian.
Proof. By Proposition 5.4, we may assume that Y consists of directed elements. Set Z := Z(G) and for O ⊆ X, define
SO := {zv | z ∈ Z and v ∈ O} ∪ Z.
Fix d ∈ Y and let Od be the orbit of hdi on X such that v d ∈ Od .
Lemma 7.10 ensures that CG (d) contains SOd , so d ∈ CG (SOd ). Let W ⊆ X
be maximal such that Od ⊆ W and d ∈ CG (SW ). We argue that W = X.
Let us first see that W is invariant under the action of Z. Take v ∈ W
and z ∈ Z. For g ∈ Z, we see that (gz)v = gz(v) zv . Since d commutes with
(gz)v and zv , it follows that d commutes with gz(v) . The element d thus
commutes with gz(v) for every g ∈ Z, hence z(v) ∈ W , since W is maximal.
We next argue that W is invariant under each c ∈ Y . Fixing c ∈ Y , we
have two cases. For the first case, suppose that Oc ∩ W = ∅, where Oc ⊆ X
is the orbit of v c under hci. Take g ∈ Z and fix v ∈ W . We see that
gv = (c−1 gc)v = (c−1 )gc(v) gc(v) cv = (c−1 )cg(v) gc(v)
Since W is invariant under Z, g(v) ∈ W . The element cg(v) is thus not in
Oc , so (c−1 )cg(v) = 1. We conclude that gv = gc(v) , hence d commutes with
gc(v) . Therefore, c(v) ∈ W by maximality, and W is invariant under the
action of c.
For the second case, suppose that Oc ∩ W 6= ∅. Applying Lemma 7.10,
Oc is Z-invariant. The intersection Oc ∩ W is then also Z-invariant, so
|Oc ∩ W | ≥ 2, since Z cannot fix any vertex of X by Lemmas 4.6 and 7.11.
The orbits of Z on Oc form a non-trivial system of imprimitivity for hci, so
there is a non-trivial block of imprimitivity B ⊆ Oc ∩ W for the action of hci
on X. Via Lemma 7.9, we may find w ∈ B and j ∈ Z such that (cj )w = c±1 ,
(c−j )w = 1, and cj setwise fixes B.
Let z ∈ Z be such that z(cj (w)) = w. The element c−j zcj is an element
of Z, and w ∈ W . The element d thus commutes with (c−j zcj )w . On the
other hand,
(c−j zcj )w = (c−j )w zcj (w) (cj )w = zcj (w) c±1 ,
so d commutes with zcj (w) c±1 . Furthermore, d commutes with zcj (w) since
cj (w) ∈ B ⊆ W . We deduce that d commutes with c.
For any vertex u ∈ W and g ∈ Z, d commutes with (c−1 gc)u . On the
other hand,
(c−1 gc)u = (c−1 )g(c(u)) gc(u) cu
Since the sections of c are either equal c or trivial, d commutes with cu and
(c−1 )g(c(u)) . We conclude that d commutes with gc(u) , so c(u) ∈ W by the
choice of W . The set W is thus setwise fixed by every c ∈ Y . Our group
G = hY i acts transitively on X, so it is the case that W = X.
For any c ∈ Y , there is z ∈ Z such that z(c(v c )) 6= c(v c ) by Lemma 4.6.
Taking such a z, c−1 zc ∈ Z, and we have that d commutes with (c−1 zc)vc ,
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
33
by our work above. Furthermore,
(c−1 zc)vc = zc(vc ) c,
and d commutes with zc(vc ) . We infer that d commutes with c.
Since d is arbitrary, it now follows that all elements of Y commute, hence
G is abelian.
We can now upgrade Theorem 5.8 in the self-replicating case. We note
that Theorem 5.8 cannot be upgraded itself since one can always add finitary
elements.
Corollary 7.13. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating
generalized basilica group. If G contains an odometer, then either G is
abelian or G is not elementary amenable.
Proof. Suppose that G is elementary amenable. By Theorem 5.8, G is virtually abelian. Suppose for contradiction that G is not abelian. Applying Corollary 4.4, there is H E G such that H is weakly self-replicating,
rk(H) + 1 = rk(G), and G/H is finite. Observe that H is abelian, since it
must be infinite with rank 0.
Take h ∈ G an odometer. Since G/H is finite, there is i > 0 such that
hi ∈ H. Set m := |X|i. The element hm is in H, and (hm )x = hi for all
x ∈ X. Since H is abelian, f −1 hm f = hm for any f ∈ H. For any x ∈ X,
it is then the case that (fx )−1 hi fx = hi . We conclude that CG (hi ) contains
H along with fx for all f ∈ H and x ∈ X.
Take d ∈ Y . In view of Lemma 4.8, there is f ∈ H such that f (d(v d ))) 6=
d(v d ). The element d−1 f d is in H, and (d−1 f d)vd = fd(vd ) d. The centralizer
CG (hi ) therefore contains fd(vd ) d. Since CG (hi ) also contains fd(vd ) , we infer
that d ∈ CG (hi ). The element hi is therefore central in G.
The group G thus has non-trivial center. Applying Theorem 7.12, we
conclude that G is abelian, which is absurd.
Theorem 7.12 and Theorem 7.7 together imply all nilpotent generalized
basilica groups are virtually abelian.
Corollary 7.14. Every nilpotent generalized basilica group is virtually abelian.
Proof. Nilpotent groups have non-trivial centers. Theorem 7.12 thus implies
that every self-replicating nilpotent generalized basilica group is virtually
abelian.
The property Q of being nilpotent is closed under subgroups and quotients, so a fortiori it is a sub-basilica stable property. The property P of
being virtually abelian is enjoyed by abelian groups and stable under taking
subgroups, finite direct products, and forming P -by-finite groups. We may
thus apply Theorem 7.7 to conclude that every nilpotent generalized basilica
group is (locally finite)-by-virtually abelian.
Every subgroup of a finitely generated nilpotent group is finitly generated. Hence, every nilpotent generalized basilica group is finite-by-virtually
34
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
abelian. Since generalized basilica groups are residually finite, it follows that
every nilpotent generalized basilica group is virtually abelian.
Corollary 7.15. Every torsion-free nilpotent bounded automata group is
virtually abelian.
7.3. Balanced groups.
Definition 7.16. Let G = hY i ≤ Aut(X ∗ ) be a generalized basilica group.
We say that G is balanced if for each directed g ∈ Y , the least n ≥ 1 for
which gn fixes v g ∈ X is also such that g n fixes X pointwise.
For G = hY i ≤ Aut(X ∗ ) balanced, take g ∈ Y directed and let c1 . . . cn be
the cycle deomposition of π1 (g) ∈ Sym(X). That G is balanced ensures that
for ci such that v g appears in ci , the order |cj | divides |ci | for all 1 ≤ j ≤ n.
This condition gives us control over the generators analogous to how the
tree-like condition did for kneading automata groups.
Theorem 7.17. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating
generalized basilica group. If G is balanced, then either G is abelian or G is
not elementary amenable.
Proof. By Proposition 5.4, we may assume that Y consists of directed elements.
Suppose that G is elementary amenable. If Y contains an element that
acts transitively, i.e., an odometer, then Corollary 7.13 implies that G is
abelian, and we are done.
Let us suppose that each element of Y does not act transitively and suppose toward a contradiction that G is not abelian. Applying Corollary 4.4,
there is H E G such that H is weakly self-replicating, rk(H) + 1 = rk(G),
and G/H is either finite or abelian.
For each d ∈ Y , let n be least such that dn fixes v d . Since G is balanced,
n
d fixes X, and as hdi does not at transitively on X, there is x ∈ Y such
that (dn )x = 1. In view of Lemma 4.7, we deduce that d ∈ H. As d is
arbitrary, we conclude that H = G which is absurd since rk(H) < rk(G).
The group G is thus abelian.
Corollary 7.18. Every balanced generalized basilica group is either (locally
finite)-by-(virtually abelian) or not elementary amenable.
Proof. Theorem 7.17 ensures that every self-replicating generalized basilica
group that is balanced and elementary amenable is virtually abelian.
The property Q of being balanced and elementary amenable is a subbasilica stable property. The property P of being virtually abelian is enjoyed
by abelian groups and stable under taking subgroups, finite direct products,
and forming P -by-finite groups. We may thus apply Theorem 7.7 to conclude
that every balanced and elementary amenable generalized basilica group is
(locally finite)-by-virtually abelian.
Remark 7.19. Example 9.1 below shows that Theorem 7.18 is sharp.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
35
We conclude this section with a sufficient condition to be a balanced
generalized basilica group.
Proposition 7.20. Suppose that G = hY i ≤ Aut(X ∗ ) is a generalized
basilica group that acts transitively on X. If π1 (G) ≤ Sym(X) is abelian,
then G is balanced.
Proof. Let d ∈ Y be directed. The image π1 (hdi) is a normal subgroup of
π1 (G), so the orbits of hπ1 (d)i form a system of imprimitivity for the action
of π1 (G) on X. Since π1 (G) is transitive, all orbits of hπ1 (d)i have the same
size, and it follows that d is balanced.
8. Groups of abelian wreath type
Definition 8.1. We say that G ≤ Aut(X ∗ ) is of abelian wreath type if
π1 (G) ≤ Sym(X) is abelian and G admits a finite self-similar generating set
Y such that for every g ∈ Y either gx = 1 for all x ∈ X or gx ∈ {g}∪π1 (G) for
all x ∈ X with exactly one x such that gx = g. We call Y a distinguished
generating set and write G = hY i ≤ Aut(X ∗ ) to indicate that Y is a
distinguished generating set for G.
A straightforward verification shows that a group of abelian wreath type
is a bounded automata group. Let us note several immediate consequences
of abelian wreath type; the proofs are elementary and so are left to the
reader.
Observation 8.2. Let G ≤ Aut(X ∗ ) be a self-replicating group of abelian
wreath type.
(1) For all non-trivial f ∈ Sym(X) ∩ G and v ∈ X, f (v) 6= v.
(2) For all v ∈ X, G(v) = G(X) .
(3) For all g, h ∈ G, [g, h] ∈ G(X)
8.1. The case of the binary tree. We here consider the bounded automata groups G that have a faithful representation in reduced form on
[2]∗ . Any faithful representation G = hY i ≤ Aut([2]∗ ) in reduced form is
necessarily of abelian wreath type.
Let us first list all possible non-trivial automorphisms of [2]∗ that can
appear as the distinguished generators of a bounded automata group G =
hY i ≤ Aut([2]∗ ) in reduced form. We give the automorphisms in wreath
recursion.
Observation 8.3. Letting σ ∈ Sym(2) be the non-trivial element, any nontrivial generator g of a bounded automata group G = hY i ≤ Aut([2]∗ ) in
reduced form has one of the following types, up to taking an inverse:
(I) g = σ,
(II) g = (σ, g) or g = (g, σ),
(III) g = σ(1, g), or
(IV) g = σ(σ, g).
36
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Lemma 8.4. If G = hY i ≤ Aut([2]∗ ) is a bounded automata group in
reduced form and G contains an element of type (IV ), then G is not elementary amenable.
Proof. The group G must contain σ, since it is self similar and contains an
element of type (IV ). Say that g = σ(σ, g) is an element of type (IV ) in G.
It suffices to show H := hσ, gi is not elementary amenable.
Let us suppose toward a contradiction that H is elementary amenable.
The group H is a self-replicating and clearly non-abelian, so we apply Corollary 4.4 to find a weakly self-replicating M E G such that rk(M )+1 = rk(G).
In view of Lemma 4.6, we infer that M acts transitively on [2].
We see that σg = (σ, g), so (σg)2 = (1, g2 ). Taking m ∈ M such that
m(0) = 1, we have that [(1, g2 ), m] ∈ M , and as M is weakly self-similar,
[(1, g2 ), m]1 = g2 ∈ M . The square g2 equals (gσ, σg), so σg = (σ, g) ∈ M ,
using again that M is weakly self-similar. A final application of weak selfsimilarity implies that σ and g are elements of M . This is absurd, since M
must be a proper subgroup.
Lemma 8.5. If G ≤ Aut([2]∗ ) is a bounded automata group of abelian
wreath type and G contains elements of type (II) and (III), then G is not
elementary amenable.
Proof. The group G must contain σ, since it is self similar and contains
an element of type (II). As the proofs are the same, let us assume that
G contains g = (σ, g). Let us also assume that the type (III) element
is h = σ(1, h). It now suffices to show H := hσ, g, hi is not elementary
amenable.
Let us suppose toward a contradiction that H is elementary amenable.
The group H is a self-replicating and clearly non-abelian, so we apply Corollary 4.4 to find a weakly self-replicating M E G such that rk(M )+1 = rk(G).
In view of Lemma 4.6, we infer that M acts transitively on [2].
We see that σh = (1, h). Taking m ∈ M such that m(0) = 1, we have
that [(1, h), m] ∈ M , and as M is weakly self-similar, [(1, h), m]1 = h ∈ M .
The commutator [g, h] is then also an element of M . Moreover,
[g, h] = ghg −1 h−1 = (σ, g)σ(1, h)(σ, g −1 )σ(h−1 , 1) = (σhg −1 h−1 , gσ)
we conclude that gσ ∈ M , since M is weakly self-replicating. As h =
σ(1, h) ∈ M , it is then the case that gσh = (σ, g)(1, h) = (σ, gh) ∈ M . From
a second application of weak self-similarity, it follows that σ, g, and h are
elements of M . This is absurd as M is a proper subgroup of H.
Remark 8.6. The groups H arising in the proofs of Lemma 8.4 and 8.5 seem
like they may be of independent interest. They appear to be the “smallest”
non-elementary amenable bounded automata groups.
Theorem 8.7. If G = hY i ≤ Aut([2]∗ ) is a bounded automata group in
reduced form, then either G is virtually abelian or G is not elementary
amenable.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
37
Proof. Suppose that G is elementary amenable. In view of Lemma 8.4, Y
contains no element of type (IV ). We now have two cases.
Suppose first that Y contains one or two elements of type (II). The
case of one element is an easy adaptation of the proof for the case of two
elements, so we only consider the latter. In view of Lemma 8.5, Y does not
contain an element of type (III). It now follows that Y has three non-trivial
elements: Y = {σ, (g, σ), (σ, h)}. Seeing as σ(σ, g)σ = (h, σ), the group G
is generated by two involutions, σ, (σ, g), so G is either finite or the infinite
dihedral group.
Suppose next that Y contains an element of type (III). As in the previous
case, Y does not contain an element of type (II). The non-trivial elements of
Y then consist of either a single type (III) element or a type (III) element
and a type (I) element. In the former case, G is abelian, and in the latter
case, G is virtually abelian.
8.2. Elementary amenable groups. We are now prepared to prove our
main theorem of this section.
Lemma 8.8. Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating group
of abelian wreath type that is elementary amenable. If G is non-abelian, then
there is some directed d ∈ Y and x ∈ X such that dx is a non-trivial finitary
element.
Proof. We prove the contrapositive. If every directed d ∈ Y is such that
dx ∈ {1, d} for all x ∈ X, then G is a generalized basilica group, and in view
of Proposition 7.20, G is furthermore balanced. Theorem 7.17 thus implies
that G is abelian.
Suppose that G = hY i ≤ Aut(X ∗ ) is a self-replicating group of abelian
wreath type with |X| > 2 and suppose that G is elementary amenable
but not virtually abelian. Corollary 5.11 supplies a weakly self-replicating
M E G such that rk(M ) + 1 = rk(G) and G/M is finite. Recall that M
acts transitively on X by Lemma 4.8. Setting F := π1 (G) ∩ G, Lemma 8.12
below claims that G = F M ; by Lemma 8.8, F contains non-trivial elements.
To prove this requires three preliminary lemmas, that amount to checking
three cases.
Fix c ∈ Y some directed element, let v ∈ X be the active vertex of c on
X, and say that O ⊆ X is the orbit of v under the action of hci on X.
Lemma 8.9. If there is l ∈ F such that lc fixes some x ∈ X, then there is
k ∈ F such that kc ∈ M .
Proof. Set d := lc. Since G has abelian wreath structure, d fixes X. If
dw = 1 for some w ∈ X, then c ∈ M by Lemma 4.7, since dv = c. We thus
suppose that dw 6= 1 for all w ∈ X. In view of Lemma 8.8, we may fix a nontrivial f ∈ F , and we may also fix m ∈ M such that m(v) ∈ X \ {v, f (v)}.
Such an m exists since |X| > 2 and M is weakly self-replicating and of finite
index. Set y := mv .
38
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
The commutator [m−1 , d−1 ] is in M , so
[m−1 , d−1 ]v = (m−1 d−1 md)v = y −1 hyc
is in M for some h ∈ F . On the other hand, [m−1 , f d−1 f −1 ] is also an
element of M , so
[m−1 , f d−1 f −1 ]v = y −1 h′ ydf −1 (v)
is in M for some h′ ∈ F . The element k := df −1 (v) is also a non-trivial
finitary element.
We now have that c and a non-trivial finitary element k are elements of
y −1 F yM . The quotient y −1 F yM/M is abelian, so [k, c−1 ] ∈ M . As k−1
moves c(v), it follows that [k, c−1 ]v = k′ c for some k′ ∈ F . Thus, k′ c ∈ M ,
completing the proof.
Lemma 8.10. If some non-trivial element of F setwise stabilizes O, then
there is k ∈ F such that kc ∈ M .
Proof. Fix a non-trivial f ∈ F such that f stabilizes O. If |O| ≤ 2, then
f c fixes pointwise O, and Lemma 8.9 implies that there is k ∈ F such that
kc ∈ M . We thus assume that |O| > 2.
Let j > 1 be least such that cj fixes O and take i < j least such that
f ci fixes O pointwise. If i = j − 1, then f c−1 fixes O pointwise, and there
is k ∈ F such that kc−1 ∈ M by Lemma 8.9. In this case, ck−1 ∈ M ,
so conjugating by k−1 , we see that k−1 c ∈ M . We may thus assume that
i < j − 1. If f ci has a trivial section at some z ∈ X, then as in the previous
lemma, Lemma 4.7 implies that kc ∈ M for some k ∈ F . We may thus also
assume that all sections of f ci at z ∈ X are non-trivial.
The element f ci has non-finitary sections at
Ω := {v, c−1 (v), . . . , c−i+1 (v)}.
Note that |O \ Ω| ≥ 2, since |Ω| = i while |O| = j. We may find m ∈ M
such that
m(v) ∈ O \ (Ω ∪ c−1 (Ω)),
since Ω ∪ c−1 (Ω) is only one element larger than Ω. Set y := mv .
The commutator [m−1 , (f ci )−1 ] is in M , so
[m−1 , (f ci )−1 ]v = y −1 h1 yh0 c
is in M for some h1 , h0 ∈ F . On the other hand, c−1 f ci+1 has non-finitary
sections exactly at Ω ∪ c−1 (Ω). In particular, (c−1 f ci+1 )v = c−1 k0 c for some
non-trivial k0 ∈ F , since we assume that f ci has no trivial sections. The
commutator [m−1 , (c−1 f ci+1 )−1 ] is in M , so
[m−1 , (c−1 f ci+1 )−1 ]v = y −1 k1 yc−1 k0 c
is in M , for some k1 ∈ F .
We now have that h0 c and c−1 k0 c are elements of y −1 F yM , hence h0 c
and k0 are elements of y −1 F yM , since F is an abelian group. The quotient
y −1 F yM/M is abelian, so [k0 , (h0 c)−1 ] ∈ M . As k0−1 moves c(v), it follows
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
39
that [k0 , (h0 c)−1 ]v = k′ c where k′ ∈ F . Thus, k′ c ∈ M , completing the
proof.
Lemma 8.11. If c strongly active and no non-trivial element of F setwise
stabilizes O, then there is k ∈ F such that kc ∈ M .
Proof. Suppose first that hci has only two orbits O1 = O and O2 on X. The
group F therefore has exponent two. Take i > 1 least such that ci fixes O1 .
Let m ∈ M be such that m(v) ∈ O2 and set y := mv . We now see that
[m−1 , c−i ]v = y −1 h1 yhc is in M , where h1 , h ∈ F . The group M is normal,
so hcy −1 h1 y ∈ M . Hence,
hcy −1 h1 yy −1 h1 yhc = (hc)2 ∈ M.
If h = 1, then considering the section [f, c−2 ]v for f ∈ F non-trivial shows
that kc ∈ M for some k ∈ F , since f −1 (O1 ) = O2 and c2 is not trivial. Let
us thus suppose that h is non-trivial, so h(O1 ) = O2 . The element (hc)2 has
non-finitary sections exactly at v and c−1 h(v). The inverse (hc)−2 therefore
has non-finitary sections exactly at c2 (v) and ch(v). We compute:
[c−1 , (hc)−2 ]c−1 h(v) = (c−1 )h(v) ((hc)−2 )c2 h(v) cch(v) ((hc)2 )c−1 h(v) .
It now follows that [c−1 , (hc)−2 ]c−1 h(v) = l1 cl0 for l1 , l0 ∈ F . Conjugating by
l0 , we see that there is k ∈ F such that kc ∈ M .
Let us suppose finally that hci has at least three orbits O1 , O2 , and O3
and let i be least such that ci fixes O1 . If ci has a trivial section, then
Lemma 4.7 ensures that kc ∈ M for some k ∈ F . We may thus assume that
every section of ci is non-trivial. Fix f ∈ F non-trivial, and without loss
of generality, f (O1 ) = O2 . Let m ∈ M be such that m(v) ∈ O3 and set
y := mv . The commutator [m−1 , c−i ] is in M , so
[m−1 , c−i ]v = y −1 h1 yh0 c
is in M , where h1 , h0 ∈ F . The commutator [m−1 , f c−i f −1 ] is also in M , so
[m−1 , f c−i f −1 ]v = y −1 k1 yk0
is in M where k1 , k0 ∈ F , since f ci f −1 has non-finitary sections only on O2 .
Note also that k0 is non-trivial since ci has every section non-trivial.
We now have that h0 c and a non-trivial finitary element k0 are elements
of y −1 F yM . The quotient y −1 F yM/M is abelian, so [k0 , (h0 c)−1 ] ∈ M .
As k0 moves v, it follows that [k0 , (h0 c)−1 ]v = k′ c where k′ ∈ hF i. Thus,
k′ c ∈ M .
Bringing together the previous three lemmas, we obtain the desired result.
Lemma 8.12. Suppose that G = hY i ≤ Aut(X ∗ ) with |X| > 2 is a selfreplicating group of abelian wreath type. If G is elementary amenable but
not virtually abelian, then the weakly self-replicating M E G supplied by
Corollary 5.11 is such that (π1 (G) ∩ G)M = G and rk(M ) + 1 = rk(G). In
particular, G/M is finite and abelian.
40
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Proof. Let M E G be the finite index subgroup given by Corollary 5.11 and
take d ∈ Y directed. If d is not strongly active, then f := 1 ∈ F := π1 (G)∩G
is such that f d fixes a vertex in X. Lemma 8.9 thus gives k ∈ F such that
kd ∈ M . If d is strongly active, then either there is some non-trivial f ∈ F
such that f setwise stabilizes the orbit of v d ∈ X under the action of hdi
acting on X or there is not. In the former case, Lemma 8.10 supplies k ∈ F
such that kd ∈ M and in the latter, Lemma 8.11 gives k ∈ F such that
kd ∈ M .
It now follows that F M = G, and the lemma is verified.
The desired theorem is now in hand.
Theorem 8.13. If G = hY i ≤ Aut(X ∗ ) is a self-replicating group of
abelian wreath type, then either G is virtually abelian, or G is not elementary
amenable.
Proof. The case that |X| = 2 is settled by Theorem 8.7. We thus assume
that |X| > 2. Set F := π1 (G) ∩ G. We suppose toward a contradiction that
G is elementary amenable but not virtually abelian.
Applying Corollary 5.11, we obtain non-trivial weakly self-replicating L E
G and M E G such that L ≤ M , G/M is finite, M/L is abelian, and
rk(L) + 2 = rk(M ) + 1 = rk(G). Lemma 8.12 ensures further that F M = G.
We now argue that G/L is abelian, which contradicts the rank of G.
We have two cases: (1) M ∩ F 6= {1}, and (2) M ∩ F = {1}. For case
(1), fix a non-trivial f ∈ F ∩ M . By Lemma 8.12, each d ∈ Y directed
admits h ∈ F such that hd ∈ M . Taking hd ∈ M , [f, (hd)−1 ] ∈ L, so
[f, (hd)−1 ]vd = kd is an element of L where k ∈ F . We conclude that for
each directed d ∈ Y there is h ∈ F such that hd ∈ L. It is thus the case
that F L = G, so G/L is abelian, giving the desired contradiction.
For case (2), fix d ∈ Y directed and let h ∈ F be such that hd ∈ M . If
hd fixes v d , then (hd)vd = d ∈ M . Hence h ∈ F ∩ M = {1}. The element d
must be strongly active since else since d 6= 1, it has a finitary section that
belongs to M and so M contains a non-trivial element of F . We conclude
that d does not fix v d . We may thus assume that hd does not fix v d . Set
d˜ := hd and observe that d˜ has exactly one non-finitary section, namely
d˜vd = d.
˜ acts intransitively on X, let i be least such that d˜i fixes X. Since
If hdi
M intersects F trivially, it must be the case that d˜i has trivial sections at
˜ The group M acts transitively on
all w outside the orbit of v d under hdi.
′
X, so Lemma 4.7 implies that h d ∈ L for some h′ ∈ F .
˜ acts transitively on X. Fix f ∈ F that is non-trivial;
Suppose that hdi
˜ d ), then f acts like
such an element exists by Lemma 8.8. If f (v d ) = d(v
a |X|-cycle on X, since π1 (G) is abelian. Since |X| > 2, f 2 is non-trivial,
˜ d ). By possibly replacing f with f 2 , we may assume that
and f 2 (v d ) 6= d(v
d
d
˜
f (v ) 6= d(v ). The elements f d˜−1 f −1 and d˜ are in M , so [f d̃−1 f −1 , d˜−1 ] ∈
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
L. Moreover,
[f d˜−1 f −1 , d˜−1 ]
vd
41
˜−1
˜ ˜ d d = h′ d,
= (d˜−1 )f −1 d(v
˜ d ) (d )d˜2 (vd ) df −1 d(v
)
where h′ ∈ F .
We now conclude that for all d ∈ D, there is h ∈ F such that hd ∈ L.
Hence, F L = G, and so G/L is abelian, giving the desired contradiction.
The infinite dihedral group shows that virtually abelian groups indeed
arise as self-replicating groups of abelian wreath type; see Example 9.2.
8.3. GGS groups. We pause here to recall the GGS groups and observe
that Theorem 8.13 applies to these groups. See [3] for more information on
these groups.
For p an odd prime, form the p-regular rooted tree [p]∗ . Let a ∈ Aut([p]∗ )
be such that a(iz) = ((i + 1) mod p)z for word iz ∈ [p]∗ , where i ∈ [p].
The automorphism a cyclically permutes the first level of the tree and acts
rigidly below the first level. Take a p − 1-tuple α := (e0 , . . . , ep−2 ) where
ei ∈ {0, . . . , p − 1} for each 0 ≤ i ≤ p − 2. Using wreath recursion, we define
bα ∈ Aut([p]∗ ) by bα := (ae1 , . . . , aep−2 , b).
Definition 8.14. For α = (e1 , . . . , ep−1 ) a p − 1-tuple where ei ∈ {0, . . . , p −
1} for each 1 ≤ i ≤ p − 1, the GGS group associated to α is the group
Gα := ha, bα i ≤ Aut([p]∗ ).
Proposition 8.15. If some coordinate of α is non-zero, then the GGS group
Gα is a self-replicating group of abelian wreath type.
Proof. We see that π1 (Gα ) = hai = Cp . Thus, Gα is of abelian wreath type.
That Gα is self-replicating is also clear, and well-known.
Corollary 8.16. The only elementary amenable GGS groups are the cyclic
groups Cp .
9. Examples
9.1. Balanced generalized basilica groups. Define a, b ∈ Aut([5]∗ ) by
wreath recursion:
a := (01)(34)(1, 1, 1, 1, a) and b := (12)(34)(1, 1, 1, b, 1).
The group G := ha, bi ≤ Aut([5]∗ ] is a balanced generalized basilica group.
On [5], G has two orbits U := {0, 1, 2} and V := {3, 4}, and v a , v b are
elements of V .
Setting c := ab, an easy computation shows that c = (012)(1, 1, 1, c, 1).
The element c fixes V , and it follows that c ∈ K := ker(G y V ∗ ). In view
of Lemma 7.5, K is locally finite, and since G is two generated, it follows
that G/K ≃ Z. The group G is thus elementary amenable.
Claim. The set {b−n cbn | n ≥ 0} consists of pairwise distinct elements of
K.
42
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
Proof. Noting that b2 = (1, 1, 1, b, b), it is immediate that
b−2n cb2n = (012)(1, 1, 1, b−n cbn , 1).
An easy calculation shows that
b−2n−1 cb2n+1 = (021)(1, 1, 1, 1, b−n cbn ).
Arguing by induction on i for the claim that {b−n cbn | i ≥ n ≥ 0} consists
of pairwise distinct elements proves the claim.
The claim implies the kernel K is infinite. Since all subgroups of a finitely
generated virtually abelian group are finitely generated, we deduce that G
is not virtually abelian. This example shows that Corollary 7.18 is sharp.
We next exhibit a large family of generalized basilica groups.
Definition 9.1. For a prime p ≥ 3, let c be the cycle (0 . . . p − 1) and define
gp , hp ∈ Aut([p]∗ ) by gp := c(gp , 1, . . . , 1) and hp := c(1, hp , 1, . . . , 1). We
define Gp := hgp , hp i.
Proposition 9.2. For each prime p ≥ 3, Gp is a self-replicating balanced
generalized basilica group, weakly branch, and not elementary amenable.
Proof. It is immediate that G := Gp is a balanced generalized basilica group,
since g := gp and h := hp act transitively on [p]. The elements g p and hp
are such that (gp )x = g and (hp )x = h for all x ∈ X. It follows that Gp
is self-replicating. In view of Corollary 7.13, we need only to check that
G is not abelian to conclude that G is not elementary amenable. This is
immediate by considering sections:
(gh)0 = 1 and (hg)0 = hg.
It is clear that hg is non-trivial, so g and h do not commmute.
Let us finally verify that G is weakly branch. The commutator [g p , h]
fixes X and
(
[g, h] i = 2
p
[g , h]i =
1
else
The rigid stabilizer ristG (2) is non-trivial, and it follows that ristG (i) is
i
non-trivial for all i ∈ X. One verifies that [gp , h] lies in ristG (2i ) and
i
[gp , h]2i = [g, h], where 2i is the word in [p]∗ consisting of i many 2’s. We
infer that all rigid stabilizers are infinite. Since G acts transitively on each
level, G is weakly branch.
To distinguish the Gp requires a result from the literature on weakly
branch groups. For a tree X ∗ , the boundary of X ∗ , denoted by ∂X ∗ , is
the collection of infinite words X ω with the product topology. The group
Aut(X ∗ ) has an action on ∂X ∗ by homeomorphisms which is induced from
the action Aut(X ∗ ) y X ∗ . The product measure on ∂X ∗ arising from the
uniform measure on X is preserved by Aut(X ∗ ). This measure is called the
Bernoulli measure.
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
43
Theorem 9.3 (See [18, Theorem 2.10.1]). Suppose that G ≤ Aut(X ∗ ) and
H ≤ Aut(Y ∗ ) are weakly branch groups. If φ : G → H is an isomorphism of
groups, then there is a measure preserving homeomorphism F : ∂X ∗ → ∂Y ∗
such that φ(g)(F (α)) = F (g(α)) for all α ∈ ∂X ∗ , where ∂X ∗ and ∂Y ∗ are
equipped with the respective Bernoulli measures
Theorem 9.4. For p 6= q with p, q ≥ 3, Gp and Gq are not isomorphic.
Proof. Suppose for contradiction there are p 6= q such that Gp is isomorphic
to Gq . Appealing to Theorem 9.3, there is a measure preserving homeomorphism F : ∂[p]∗ → ∂[q]∗ .
Fix O ⊆ ∂[p]∗ clopen with measure p1 . The image F (O) is a clopen
set in ∂[q]∗ with measure p1 . We may then find disjoint basic clopen sets
W1 , . . . , Wn of ∂[q]∗ such that F (O) = ⊔ni=1 Wi . The sets Wi are basic, so
for each 1 ≤ i ≤ n there is ki ≥ 1 such that µ(Wi ) = q1ki . We deduce that
n
1 X 1
=
.
p
q ki
i=1
Letting m := max{ki | 1 ≤ i ≤ n}, we see that
n
q m X m−ki
q
,
=
p
i=1
and the right hand side is an integer. This implies that p divides q which is
absurd.
9.2. The infinite dihedral group.
Example 9.5. Let X := [3] and via wreath recursion, define a, b ∈ Aut(X ∗ )
by a := (01)(1, 1, a) and b := (02)(1, b, 1). The group G := ha, bi is a
self-replicating generalized basilica group isomorphic to the infinite dihedral
group.
In regards to Question 1.1, Example 9.5 shows that virtually abelian is
the best one can hope for in the case of self-replicating generalized basilica
groups.
Example 9.6. Let X := [2] and via wreath recursion, define a, b ∈ Aut(X ∗ )
by a := (01)(1, 1) and b := (a, b). The group G := ha, bi is a self-replicating
bounded automata group of abelian wreath type and is isomorphic to the
infinite dihedral group.
Example 9.6 shows that Theorem 8.13 is sharp. One naturally wonders
if the infinite dihedral group is the only possible non-abelian, but virtually
abelian example.
44
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
9.3. The lamplighter group. Let X := [4] and form Aut(X ∗ ). Define
elements of Aut(X ∗ ) by a := (02)(13)(1, 1, 1, a) and b := (02)(1, b, 1, 1). One
easily verifies that G := ha, bi ≤ Aut(X ∗ ) is a bounded automata group. In
fact G is a bounded automata group that is both a generalized basilica group
and of abelian wreath type.
The element b has order 2, and a simple calculation shows the following:
a2n ba−2n = (02)(1, an ba−n , 1, 1) and a2n+1 ba−2n−1 = (02)(1, 1, 1, an ba−n )
for all n ≥ Z.
We now argue that C2 ≀Z is isomorphic to G; recall that C2 denotes Z/2Z.
This requires two claims.
Claim. For any n 6= m in Z, an ba−n and am ba−m commute
Proof. It suffices to show that an ba−n and am ba−m commute for all n, m ≥
0. Set Ωn := {ai ba−i | 0 ≤ i ≤ n}. We argue by induction on n that
an+1 ba−n−1 commutes with every g ∈ Ωn . For the base case, n = 0, we see
baba−1 =
=
=
=
(02)(1, b, 1, 1)(02)(1, 1, 1, b)
(1, b, 1, b)
(02)(1, 1, 1, b)(02)(1, b, 1, 1)
aba−1 b,
and thus b and aba−1 commute.
Suppose the inductive claim holds for n and take am ba−m ∈ Ωn+1 . The
cases that m is odd while n + 1 is even and m is even while n + 1 odd follow
as the base case. Let us now suppose that m and n + 1 are both even; the
case where they are both odd is similar. We then have that an+2 ba−n−2 =
(1, ak ba−k , 1, 1) where k < n + 2 and that am ba−m = (02)(1, al ba−l , 1, 1)
where l < n + 2. We see that
an+2 ba−n−2 am ba−m = (1, ak ba−k al ba−l , 1, 1)
and
am ba−m an+2 ba−n−2 = (1, al ba−l ak ba−k , 1, 1).
The inductive hypothesis ensures that ak ba−k al ba−l = al ba−l ak ba−k . Therefore, am ba−m and an+2 ba−n−2 commute, completing the induction.
Qn
Claim. For any distinct i1 , . . . , in in Z, the product j=1 aij ba−ij is not 1.
Proof. Suppose for a contradiction that the claim is false,
Q and let n be least
such that there are distinct i1 , . . . , in for which g := nj=1 aij ba−ij = 1. By
conjugating with an appropriate power of a, we may assume
Pn that all ij are
positive. We may also take the i1 , . . . , in to be such that j=1 ij is least.
Q
The section of g at 1 must have the form sj=1 akj ba−kj . Likewise, the
Q
section of g at 3 must have the form rj=1 alj ba−lj . These two sections
must also be trivial, and since n ≥ 2, it cannot be the case that r = 0 =
s. We may thus assume without loss of generality that s ≥ 1. Since we
choose n to be least, it is indeed the case that s = n. However, lj < ij , so
ON ELEMENTARY AMENABLE BOUNDED AUTOMATA GROUPS
45
Pn
P
< nj=1 ij . This contradicts out choice of i1 , . . . , ij . This completes
the reductio.
j=1 lj
Proposition 9.7. The lamplighter group C2 ≀ Z is isomorphic to G.
L
L
Proof. We have that C2 ≀ Z = Z C2 ⋊ Z. We define Φ : Z C2 ⋊ Z → G by
Y
(f, n) 7→
ai ba−i an
i∈Supp(f )
where Supp(f ) := {i ∈ Z | f (i) 6= 0}.
Let us verify Φ is a homomorphism:
Φ((f, n)(g, m)) = Φ((f
Q + n.g, n + m))
=
ai ba−i an+m
Qi∈Supp(f +n.g) Q
i ba−i
i ba−i an+m
=
a
a
i∈Supp(n.g)
Qi∈Supp(f )
Q
i
−i
i+n ba−i−n an+m
=
a
ba
a
Qi∈Supp(f )
i∈Supp(g)
Q
i
−i
n
i ba−i am
=
a
ba
a
a
i∈Supp(f )
i∈Supp(g)
= Φ((f, n))Φ((g, m)).
The third equality uses that the conjugates of b by powers of a commute
and that b has order two.
Q
i ba−i an =
a
It is clear that Φ is surjective. For injectivity, if
i∈Supp(f )
Q
1, then n = 0, and i∈Supp(f ) ai ba−i = 1. The second claim ensures that
Q
i −i = 1 exactly when the product is trivial. It follows that Φ
i∈Supp(f ) a ba
is injective.
9.4. Weak self-replication. Let X := [2] and form Aut(X ∗ ). Let σ be
the cycle (01) and define a := σ(σ, σa). The group G := hai is isomorphic
to Z, so it cannot contain the section σ. On the other hand, one checks
that σaσ = a−1 , so a2 = (a, a−1 ). The section homomorphism φx : G(x) →
Aut(X ∗ ) thus has image G. The group G is weakly self-replicating but not
self-similar, so it is not self-replicating.
References
1. G. Amir, O. Angel, and B. Virág, Amenability of linear-activity automaton groups.,
J. Eur. Math. Soc. (JEMS) 15 (2013), no. 3, 705–730. 2
2. L. Bartholdi, V. Kaimanovich, and V. Nekrashevych, On amenability of automata
groups, Duke Math. J. 154 (2010), no. 3, 575–598. MR 2730578 (2011k:20048) 2, 6
3. G. Baumslag, Topics in combinatorial group theory, Lectures in mathematics ETH
Zrich, Birkhuser, Basel ; Boston, 1993 (eng). 41
4. M. Chornyi, K. Juschenko, and V. Nekrashevych, On topological full groups of Zd actions, arXiv:1602.04255. 2
5. C. Chou, Elementary amenable groups, Illinois J. Math. 3 (1980), 396–407. 2
6. M. Day, Amenable semigroups, Illinois J. Math. 1 (1957), 509–544. 1
46
KATE JUSCHENKO, BENJAMIN STEINBERG, AND PHILLIP WESOLEK
7. M.D. Fried and M. Jarden, Field arithmetic, third ed., Ergebnisse der Mathematik
und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in
Mathematics], vol. 11, Springer-Verlag, Berlin, 2008, Revised by Jarden. MR 2445111
(2009j:12007) 13
8. S. Godillon, Introduction to iterated monodromy groups, Ann. Fac. Sci. Toulouse Math.
(6) 21 (2012), no. 5, 1069–1118. MR 3088267 3
9. R. Grigorchuk, Milnor’s problem on the growth of groups, Sov. Math., Dokl 28 (1983),
23–26. 2
10. R. I. Grigorchuk and A. Żuk, On a torsion-free weakly branch group defined by a
three state automaton, Internat. J. Algebra Comput. 12 (2002), no. 1-2, 223–246,
International Conference on Geometric and Combinatorial Methods in Group Theory
and Semigroup Theory (Lincoln, NE, 2000). MR 1902367 11, 14
11. R. Jones, Fixed-point-free elements of iterated monodromy groups, Trans. Amer. Math.
Soc. 367 (2015), no. 3, 2023–2049. MR 3286507 22, 25
12. K. Juschenko, Non-elementary amenable subgroups of automata groups, Journal of
Topology and Analysis 10 (2018), no. 01, 35–45. 2
13. K. Juschenko, N. Matte Bon, N. Monod, and M. de la Salle, Extensive amenability
and an application to interval exchanges., Ergodic Theory and Dynamical Systems
(2016), 1–25. 2
14. K. Juschenko and N. Monod, Cantor systems, piecewise translations and simple
amenable groups, Annals of Mathematics 178 (2013), 775 – 787. 2
15. K. Juschenko, V. Nekrashevych, and M. de la Salle, Extensions of amenable groups
by recurrent groupoids, Inventiones mathematicae 206.3 (2016), 837–867. 2
16. H. Matui, Some remarks on topological full groups of cantor minimal systems,, Internat. J. Math. 17 (2006), 231–251. 2
17. V. Nekrashevych, Simple groups of dynamical origin, preprint arXiv:1511.08241. 2
18.
, Self-similar groups, Mathematical Surveys and Monographs, vol. 117, American Mathematical Society, Providence, RI, 2005. MR 2162164 (2006e:20047) 3, 6, 9,
10, 20, 23, 43
19.
, Iterated monodromy groups, Groups St Andrews 2009 in Bath. Volume 1,
London Math. Soc. Lecture Note Ser., vol. 387, Cambridge Univ. Press, Cambridge,
2011, pp. 41–93. MR 2858850 3
20.
, Palindromic subshifts and simple periodic groups of intermediate growth,
preprint arXiv:1601.01033 (2016). 2
21. D. V. Osin, Elementary classes of groups, Mat. Zametki 72 (2002), no. 1, 84–93.
MR 1942584 (2003h:20062) 7, 8
22. P. V. Silva and B. Steinberg, On a class of automata groups generalizing lamplighter
groups, Internat. J. Algebra Comput. 15 (2005), no. 5-6, 1213–1234. MR MR2197829
20
23. J. von Neumann, Zur allgemeinen theorie des masses, Fund. Math. 13 (1929), 73–116.
1, 2
| 4math.GR
|
1
Bounds on Fractional Repetition Codes using
Hypergraphs
arXiv:1711.07631v1 [cs.IT] 21 Nov 2017
Krishna Gopal Benerjee, and Manish K Gupta, Senior Member, IEEE
Abstract—In the Distributed Storage Systems (DSSs), encoded
fraction of information is stored in the distributed fashion on
different chunk servers. Recently a new paradigm of Fractional
Repetition (FR) codes have been introduced, in which, encoded
data information is stored on distributed servers, where encoding
is done using a Maximum Distance Separable (MDS) code and a
repetition code. In this work, we have shown that an FR code
is equivalent to a hypergraph. Using the correspondence, the
properties and the bounds of a hypergraph are directly mapped
to the associated FR code. Some of the bounds are not satisfied
by any FR codes in the literature with equality. In general, the
necessary and sufficient conditions for the existence of an FR code
is obtained by using the correspondence. It is also shown that
any FR code associated with a linear hypergraph is universally
good.
Index Terms—Distributed Storage Systems, Fractional Repetition Code, Coding for Distributed Storage.
I. I NTRODUCTION
The distributed storage is a well studied area, which deals
with storing the data on distributed nodes in such a manner
so that it allows data accessibility at anytime and anywhere.
Many companies such as Microsoft and Google etc. provide
such storage services by using distributed data centers. In the
storage systems like Google file system [1], multiple copies of
data fragments are stored. Thus, the system becomes reliable
and the file can be retrieved from the system. At the same level
of redundancy, coding techniques can improve the reliability
for the storage system [2].
In [3], Dimakis et al. proposed a coding scheme called
regenerating codes which reduces the repair bandwidth, where
repair bandwidth is total number of communicated packets
to repair a failed node. In the distributed storage system
(DSS), encoded data packets are distributed among n nodes
such that any data collector can get the complete file by
collecting packets from any k (≤ n) nodes. Also, a failed
node can be repaired by replacing it with a new node having
at-least same amount of the data information. The newcomer
node is constructed by downloading packets from any d
(≤ n) active nodes in the DSS. The Minimum Bandwidth
Regenerating (MBR) codes are optimal with respect to the
repair bandwidth but not with respect to the computational
complexity. Motivated by this, in [4], Rashmi et al. proposed
a simple construction of Minimum Bandwidth Regenerating
codes, where a survivor node is only required to read and
transfer the exact amount of data to the replacement node
Krishna Gopal Benerjee and Manish K Gupta are with Laboratory of
Natural Information Processing, Dhirubhai Ambani Institute of Information
and Communication Technology Gandhinagar, Gujarat, 382007, India, e-mail:
(krishna [email protected] and [email protected].).
without extra computation. The construction is extended to
new storage code called Fractional Repetition (FR) code [5],
[6]. A typical FR code is a two layer code with an outer MDS
code and an inner repetition code, where a linear [n, k, d]
code is called a Maximum Distance Separable (MDS) code
if k = n − d + 1. Initially, the FR code is defined on
homogeneous DSS (DSS with symmetric parameters). In such
systems, each node has same amount of encoded packets and
the same number of copies of each packets [5]. In many
cases, heterogeneous systems are preferred, in which the node
storage capacity and the packet replication factor need not
be uniform. In the literature, FR codes are constructed with
asymmetric replication factor [7], [8] and asymmetric node
storage capacity [9]–[12]. In [13], an FR codes with nonuniform node storage capacity are constructed using uniform
hypergraphs. A bound on the maximum file size is calculated
for a Locally Repairable Fractional Repetitions (Locally Repairable FR) code in [14], where a Locally Repairable FR code
is an FR code in which the repair degree of a node is less
than the node storage capacity. In [15], the minimum distance
on an FR code is defined as the minimum number of nodes
such that if the nodes fail simultaneously then the system
can not recover the complete file. FR codes with asymmetric
parameters, are also constructed using sequences [16], graphs
[17], [18] and combinatorial designs [19], [20].
For the FR code, the asymmetric node storage capacity
helps to reduce the total storage cost and the asymmetry on
replication factor helps for availability of favorable packets,
where favorable packets are the packets which are downloaded
with more frequency. The asymmetric repair degree and repair
bandwidth help to reduce the repair cost of a node in the FR
code.
In this work, an FR code with asymmetric parameters (node
storage capacity, packet replication factor, repair degree and
repair bandwidth) are considered. In general, it is shown that
any FR code is equivalent to a hypergraph. The equivalence
between a hypergraph and an FR code leads to the several
interesting properties of the FR code. In general, we provide
the existence condition for FR codes using the correspondence.
Bounds on the node storage capacity and the packet replication
factor, are obtained for various FR codes which are equivalent
to some known classes of hypergraphs. We have obtain a
bound on size of a sub-hypergraph of a linear hypergraph.
A new bound on the replication factor, the number of nodes
and the number of packets are obtained such that all the FR
codes satisfying the bound are the universally good. Using the
correspondence, we have identified some bounds which are
not satisfied by any FR codes with equality in the literature.
2
It is observed that an FR code constructed using a linear
hypergraph is universally good code. We have proved that
the availability of favorable packets can be increased by
permuting packets in FR code with asymmetric parameters,
where the availability of all packets in FR code with symmetric
parameters are constant. It is also shown that the asymmetric
parameters of an FR code helps to reduce the total cost
associated with node storage capacity.
The paper is organized as follows. In Section II, we collect
some preliminaries on FR codes and hypergraphs with their
parameters and properties. In Section III, the relation of a
hypergraph and an FR code is studied in detail. Using the
relation, we obtain various bounds on the parameters of FR
codes in Section IV. At the end of the Section, the comparison
graph is plotted between the reconstruction degree and file size
for the FR codes. Section V concludes the paper with some
general remarks.
II. P RELIMINARIES
In this section, background on FR codes and hypergraphs
are given.
A. Background on Fractional Repetition Codes
Let a file be divided into B distinct information packets,
where information packet symbols are associated with a finite
field Fq . By using (θ, B) MDS code on the information
packets, the B information packets are encoded into θ distinct
packets P1 , P2 , . . ., Pθ . Because of the property of MDS
code, the complete file information can be extract from any B
packets. Each packet Pj (1 ≤ j ≤ θ) is replicated ρj times in
the system. All the packets are distributed on n distinct nodes
U1 , U2 , . . ., Un such that a node Ui (i = 1, 2, . . . , n) contains
αi packets. For the FR code, the maximum node storage
capacity and the maximum replication factor are given by α =
max{αi : i = 1, 2, . . . , n} and ρ = max{ρj : j = 1, 2, . . . , θ}
respectively. The FR code is denoted by C : (n, θ, α, ρ).
Example 1. Let a file be splitted into 5 (= B) information
packets and encoded into 6 (= θ) distinct packets P1 , P2 , P3 ,
P4 , P5 and P6 using a (6, 5) MDS code. The 13 replicas of
the 6 (= θ) distinct packets are stored in the 5 distinct nodes
U1 , U2 , U3 , U4 and U5 such that U1 = {P1 , P2 , P3 , P4 }, U2
= {P1 , P5 , P6 }, U3 = {P2 , P5 }, U4 = {P3 , P6 } and U5 =
{P4 , P6 }. The node packet distribution of the FR code C :
(n = 5, θ = 6, α = 4, ρ = 3) is illustrated in Table I. Hence,
α1 = |U1 | = 4, α2 = |U2 | = 3, αi = |Ui | = 2 (i = 3, 4, 5) and
replication vector ρ
~ := (ρ1 ρ2 ρ3 ρ4 ρ5 ρ6 ) = (2 2 2 2 2 3).
In the FR code, ρ = max{ρj : j = 1, 2, . . . , 6} = 3 and
α = max{αi : i = 1, 2, . . . , 5} = 4. Hence, the FR code is
denoted by C : (n = 5, θ = 6, α = 4, ρ = 3). Note that in this
example file size B and number of nodes n are same and this
is not always true.
For an FR code, if a data collector connects any k nodes and
downloads B distinct packets then the file can be retrieved by
using the MDS property. The parameter k is called the reconstruction degree of the FR code. Note that the reconstruction
degree of the FR code C : (5, 6, 4, 3) (Example 1) is k = 3.
TABLE I
D ISTRIBUTION OF REPLICATED PACKETS ON NODES FOR THE FR CODE
C : (5, 6, 4, 3).
U1
U2
U3
U4
U5
P1 , P2 , P3 , P4
P1 , P5 , P6
P2 , P5
P3 , P6
P4 , P6
In an FR code, a failed node Ui can be repair by replacing
a new node Ui0 , where both the nodes Ui and Ui0 carry the
same information. For the new node, the information packets
are downloaded from some active nodes called helper nodes.
The repair degree of a failed node Ui is the cardinality of
the set of the helper nodes. For a node Ui in an FR code
C : (n, θ, α, ρ), more then one such helper node sets exist
with different repair degree. For the node Ui , the maximum
repair degree is di and d = max{di : i = 1, 2, . . . , n}. In the
FR code C : (5, 6, 4, 3) (Example 1), if node U2 fails then
the new node U20 can be created by downloading packets from
nodes of set {U1 , U3 , U4 } or set {U1 , U3 , U5 }. Hence, d2 = 3
and d = max{di : i = 1, 2, 3, 4, 5} = 4. Now, one can define
an FR code formally as follows.
Definition 2. (Fractional Repetition Code): On a Distributed
Storage System with n nodes denoted by Ui (i = 1, 2, . . . , n)
and θ packets denoted by Pj (j = 1, 2, . . . , θ), one can define
an FR code C (n, θ, α, ρ) as a collection C of n subsets Ui
(i = 1, 2, . . . , n) of a set {Pj : j = 1, 2, . . . , θ}, such that
an arbitrary packet Pj is distributed on ρj (∈ N) distinct
subsets in the collection C , where |Ui | = αi denotes the
number of packets stores on the node Ui , ρ = max{ρj :
j = 1, 2, . . . , θ} is the maximum replication among all packets
and the maximum number of packets on any node is given by
α = max{αi : i = 1, 2, . . . , n}.
In an FR code C : (n, θ, α, ρ), if DC (k) (called Code
Dimension) is the maximum number of distinct packets that
guarantee to deliver to any user connected with any k nodes
of the FR code then DC (k) := min {|∪i∈I Ui | : |I| = k, I ⊂
{1, 2, . . . , n}}. Note that B ≤ DC (k). For the FR code
C : (5, 6, 4, 3) as given in Example 1, one can find that
DC (3) = 5.
An FR code C (n, θ, α, ρ) with an asymmetric parameter
is called universally good if the codeP
dimension DC (k) is
k
guaranteed to be more than or equal to i=1 di − k2 for any
k < n, where d1 ≤ d2 ≤ . . . ≤ dn . An FR code C (n, θ, α, ρ)
with d1 ≤ d2 ≤ . . . ≤ dn and |Ui ∩ Uj | ≤ 1 (i, j = 1, 2, . . . , n
Pk
and i 6= n) satisfies the inequality DC (k) ≥ i=1 di − k2
[9].
B. Background on Hypergraphs
For a finite set V = {v1 , v2 , . . . , vn }, the pair H = (V ; E)
is called a hypergraph with hypervertex set V and hyperedge
set E, where E = {E : E ⊆ V } is a family of some subset
of V [21], [22]. For a hypergraph H = (V ; E), |E| is called
the size of the hyperedge E ∈ E and |E(v)| is the degree
of the hypervertex v ∈ V , where E(v) = {E : v ∈ E}.
3
An example of such hypergraph is shown in Figure 1. In this
hypergraph H = (V ; E), hypervertices are shown by simply
bold dots and the hyperedges are represented by the covered
area which contains some hypervertices. In the particular
example, there are 7 hypervertices and 4 hyperedges such that
E(v1 ) = {E1 }, E(v2 ) = φ, E(v3 ) = {E3 }, E(v4 ) = {E1 , E2 },
E(v5 ) = {E1 , E2 , E3 }, E(v6 ) = {E3 } and E(v7 ) = {E4 }.
In a hypergraph H = (V ; E), a hypervertex v ∈ V is called
isolated hypervertex if E(v) = φ. A hypergraph HS = (V ; E)
does not have any isolated hypervertex if V =
E. In a
E∈E
hypergraph H = (V ; E), a loop is a hyperedge E ∈ E with
|E| = 1. If two distinct hyperedges share same hypervertices
then those hyperedges are called parallel hyperedges for the
hypergraph. Similarly, if two distinct hypervertices are shared
by same hyperedges then those hypervertices are called parallel hypervertices.
v1
v4
E1
v2
v7 E4
v5
E2
v3 E
3
v6
Fig. 1. A hypergraph H = (V ; E) is shown, where V = {vi : i ∈ [7]}
and E = {E1 = {v1 , v4 , v5 }, E2 = {v4 , v5 }, E3 = {v3 , v5 , v6 }, E4 =
{v7 }}.
For a hypergraph H = (V ; E), a subset of V is called a
hypervertex cover if each hyperedge is incident to at least one
hypervertex of the subset. For an example, the set {v4 , v6 , v7 }
is a hypervertex cover of the hypergraph given in Figure 1.
Note that the hypervertex cover of any hypergraph exists but
it is not unique for some hypergraph.
A hypergraph H 0 = (V 0 ; E 0 ) is called a sub-hypergraph
of a hypergraph H = (V ; E) if V 0 ⊆ V and E 0 ⊆
{E 0 6= φ : E 0 ⊆ E ∩ V 0 , E ∈ E}. For an example, a
hypergraph H 0 = (V 0 ; E 0 ) with V 0 = {v1 , v3 , v4 , v5 , v6 } and
E 0 = {E10 = {v1 , v4 , v5 }, E20 = {v4 }, E30 = {v3 , v5 }}, is a
sub-hypergraph of the hypergraph H = (V ; E) (as shown in
Figure 1). For a hypergraph H = (V ; E), hypergraph H 0 =
(V 0 ; E 0 ) is called sub-hypergraph induced by the set V 0 ⊂ V
if E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E}. A hypergraph is
called connected hypergraph if there exists a sub-hypergraph
with the same hypervertex set such that the sub-hypergraph
is isomorphic to a connected graph. The hypergraph H =
(V ; E) ( Figure 1) is not a connected hypergraph since there
is an isolated hypervertex.
Consider a hypergraph H = (V ; E) without isolated hyper∗
}, a hypergraph
vertices. For a finite set V ∗ = {v1∗ , v2∗ , . . . , v|E|
∗
∗
∗
H = (V ; E ) is called the dual of the hypergraph H
= (V ; E) if their exist a bijection g : E → V ∗ such that
Ej = {g(Ei ) = vi∗ : vj ∈ Ei }, where j = 1, 2, . . . , |V |.
For an example, a hypergraph H ∗ = (V ∗ ; E ∗ ) with V ∗ =
{v1∗ , v2∗ , v3∗ , v4∗ } and E ∗ = {E1∗ = {v1∗ }, E2∗ = {v3∗ }, E3∗ =
{v1∗ , v2∗ }, E4∗ = {v1∗ , v2∗ , v3∗ }, E5∗ = {v4∗ }}, is the dual of a
hypergraph H = (V ; E) with V = {v1 , v2 , v3 , v4 , v5 } and
E = {E1 = {v1 , v3 , v4 }, E2 = {v3 , v4 }, E3 = {v2 , v4 }, E4 =
{v5 }}, where g(Ej ) = vj∗ and i = 1, 2, . . . , 5.
In a hypergraph, if two hyperedges shares one node maximum then the hypergraph is called linear hypergraph. For such
hypergraph, one can find bound on the size of the hypergraph
as given in the following Lemma.
Lemma 3. For a linear hypergraph H = (V ; E),
X
|V |
|E| ≥
|E(v)| −
.
2
(1)
v∈V
Proof:
|V |
In a linear hypergraph H = (V ; E), at most
P 2 hyperedges are repeated in the hyperedge count v∈V |E(v)|.
So,
of hyperedges of H is bounded by
P the total number
|V |
v∈V |E(v)| − 2 .
A sub-hypergraph of a linear hypergraph is also a linear
hypergraph. For a positive integer k (not more than the size
of the hypergraph), one can find a bound on the size of subhypergraph induced by any k-element subset. Formally, the
bound is discussed in the following Lemma with a proof in
the Appendix.
Lemma 4. For V = {vi : i = 1, 2, . . . , n}, consider a linear
hypergraph H = (V ; E) with |E(vi )| ≤ |E(vj )|, for i < j and
i, j = 1, 2, . . . , n. For a given positive integer k < n, let H 0 =
(V 0 ⊂ V ; E 0 ) be a induced sub-hypergraph of the hypergraph
H = (V ; E) with E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E} and
|V 0 | = k. Then
k
X
k
0
0
0
0
0
min{|E | : H = (V ⊂ V ; E ), |V | = k} ≥
|E(vi )|−
.
2
i=1
(2)
III. H YPERGRAPHS AND F RACTIONAL R EPETITION C ODES
In this Section, A bijection (called Hyper-FR mapping)
between a hypergraph and an FR code is established. Using
the Hyper-FR mapping, the relation between the parameters
of FR codes and hypergraphs are studied at the end of the
Section.
In an FR code, the distribution of nodes and packets are
similar to the incidence of hypervertices and hyperedges in a
hypergraph.
Example 5. As shown in Figure 2, consider a hypergraph
H = (V ; E) with V = {vi : i = 1, 2, 3, 4} and E = {Ej :
j = 1, 2, 3, 4, 5, 6}, where E1 = {v1 , v2 }, E2 = {v1 , v3 }, E3 =
{v1 , v4 }, E4 = {v2 , v3 }, E5 = {v2 , v4 } and E6 = {v3 , v4 }. For
the hypergraph, E(v1 ) = {E1 , E2 , E3 }, E(v2 ) = {E1 , E4 , E5 },
E(v3 ) = {E2 , E4 , E6 } and E(v4 ) = {E3 , E5 , E6 }. As given
in Figure 2, consider an FR code C : (4, 6, 3, 2) with 4 nodes
and 6 such that U1 = {P1 , P2 , P3 }, U2 = {P1 , P4 , P5 }, U3
= {P2 , P4 , P6 } and U4 = {P3 , P5 , P6 }. Note that there exist
the bijection ϕ : E → {Pj : j = 1, 2, . . . , 6} such that
ϕ(Ej ) = Pj for each j = 1, 2, . . . , |E|. Hence, ϕ(E(vi )) =
{Pj = ϕ(Ej ) : Ej ∈ E, vi ∈ Ej }.
4
v1
v2
E1
U1 P1 , P2 , P3
E3
E2
E5
v3 E4
v4
E6
Hypergraph H (V, E)
⇐⇒
U2 P1 , P4 , P5
In this paper, a hypergraph H = (V 6= φ; E) with |E(v)| >
0 ( ∀ v ∈ V ) and |E| > 0 ( ∀ E ∈ E) is called conditional
hypergraph H = (V ; E).
U3 P2 , P4 , P6
IV. F RACTIONAL R EPETITION C ODES USING
H YPERGRAPHS
U4 P3 , P5 , P6
FR code C : (n, θ, α, ρ)
Fig. 2. Relation between hypergraph H (V, E) and FR code C : (n =
4, θ = 6, α = 3, ρ = 2) is illustrated, where V={v1 , v2 , v3 , v4 } and E =
{{v1 , v3 }, {v1 , v4 }, {v2 , v3 }, {v2 , v4 }, {v3 , v4 }}.
Formally, the relation between FR code and hypergraph is
defined as follows.
Definition 6. (Hyper-FR Mapping): For θ ∈ N and |E| = θ,
an FR code C : (n, θ, α, ρ) is equivalent to a hypergraph H
= (V ; E) if a bijection ϕ : E → {Pj : j = 1, 2, . . . , θ} exists
such that ∀ vi ∈ V, E(vi ) = {E : vi ∈ E, E ∈ E} ⇔ Ui =
ϕ(E(vi )) = {Pj = ϕ(E) : vi ∈ E, E ∈ E}. The bijection is
called Hyper-FR mapping.
For θ ∈ N and |E| = θ, let C : (n, θ, α, ρ) be an FR code
which is equivalent to a hypergraph H = (V ; E). Hence, a
bijection ϕ : E → {Pj : j = 1, 2, . . . , θ} exists such that
∀ vi ∈ V, E(vi ) = {E : vi ∈ E, E ∈ E} ⇔ Ui = ϕ(E(vi )) =
{Pj = ϕ(E) : vi ∈ E, E ∈ E}. Because of the bijection, one
can immediate see that the number of nodes and the number
of hypervertices are same i.e. n = |V |, the number of distinct
packets and the number of hyperedges are same i.e θ = |E|,
the node storage capacity of a node is the same as the hypervertex degree of the respective hypervertex i.e. αi = |E(vi )|
(i = 1, 2, . . . , n) and the replication factor of a packet is equal
to the cardinality of the respective hyperedge i.e. ρj = |Ej |
(j = 1, 2, . . . , θ). Hence, the maximum node storage capacity
α = max{|E(v)| : v ∈ V } and the maximum replication
factor ρ = max{|E| : E ∈ E}. A reconstruction set of the
equivalent FR code is associated with a hypervertex cover of
a sub-hypergraph H 0 = (V 0 , E 0 ) induced by V 0 = ∪E∈E(v) E,
and |E 0 | ≥ B. Consider a hypervertex cover V of a subhypergraph H 0 = (V 0 ; E 0 ) of the hypergraph H = (V ; E),
where V 0 = ∪E∈E(v) E and E 0 = E(v). In the equivalent FR
code C , for a node failure Ui , a surviving set is associated
with the set V \{vi }, where i = 1, 2, . . . , |V |. In the FR code,
the repair bandwidth for a node is equal to the hypervertex
degree of respective hypervertex and tolerance factor is equal
to the hypergraph size. For the given positive integer k < n,
Let H 0 = (V 0 ; E 0 ) be a sub-hypergraph induced by V 0 ⊂ V .
The code dimension DC (k) of the equivalent FR code is
DC (k) = min{|E 0 | : V 0 ⊂ V, |V 0 | = k}.
The necessary and sufficient condition for a hypergraph to
represent an FR code is discussed in the following straightforward Lemma.
Lemma 7. For a hypergraph H = (V 6= φ; E), an FR code
C : (n, θ, α, ρ) exists if and only if |E(v)| > 0 ( ∀ v ∈ V ) and
|E| > 0 ( ∀ E ∈ E).
In this Section, bounds on specific hypergraphs are mapped
to the equivalent FR code using a Hyper-FR mapping. For an
FR code, existence condition is calculated in the Section.
A. Bounds on Fractional Repetition Codes using Hypergraphs
The necessary and sufficient condition for the existence of
an FR code is given in the following Theorem.
Theorem 8. (Existence Condition) Consider two vectors
(ρ1 ρ2 . . . ρθ ) and (α1 α2 . . . αn ) on integers such that α =
α1 ≥ α2 ≥ . . . ≥ αn for j = 1, 2, . . . , θ and i = 1, 2, . . . , n.
An FR code C : (n, θ, α, ρ) exists with |Ui | = αi for
i = 1, 2, . . . , n and replication factor of packet Pj is ρj for
j = 1, 2, . . . , θ if
θ
n
P
P
1)
ρj =
αi and
2)
j=1
θ
P
i=1
min{ρj , m} ≥
j=1
m
P
αi ( for m < n, m ∈ Z).
i=1
Proof: The proof is obvious.
Note that if the parameters of an FR code do not satisfy one
of the constraint in the Theorem 8 or the Theorem 22, then
the FR code does not exist.
Lemma 9. For each j = 1, 2, . . . , θ, an FR code C :
(n, θ, α, ρ) with ρj = ρ (j = 1, 2, . . . , θ) connected conditional hypergraph, satisfies the following conditions.
n
P
1)
αi is multiple of ρ,
2)
i=1
n
P
αi ≥
i=1
3) α ≤
1
ρ
ρ(n−1)
ρ−1 ,
n
P
αi .
i=1
Proof: The proof follows from [21, Chapter 1, Proposition
2].
For an FR code, let the node set be a disjoint union of two
subsets such that any node from one subset does not share
packets with any node from another subset. A bound on the
FR code is calculated in the following Theorem.
Lemma 10. Let C : (n, θ = 2m, α, ρ) be an FR code with
message packets P1 , P2 ,. . ., Pm , P10 , P20 ,. . ., Pm such that
m
P
|Fj |+|Fj0 |−1
Fi ∩ Fj0 =φ if and only if i = j. Then
≤ 1,
|F |
where Fj = {Ui : Pj ∈ Ui } and
Fj0
j=1
= {Ui :
j
Pj0
∈ Ui }.
Proof: The proof follows from the Theorem 6 in [21,
Chapter 1].
For V = {vi : i = 1, 2, . . . , n}, consider a hypergraph H =
(V ; E) with |E(vi )| ≤ |E(vj )|, for i < j and i, j = 1, 2, . . . , n.
For a given positive integer k < n, let H 0 = (V 0 ⊂ V ; E 0 )
be a induced sub-hypergraph of the hypergraph H = (V ; E)
5
with E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E} and |V 0 | = k. For
the equivalent FR code, the code dimension
DC (k) = min{|E 0 | : H 0 = (V 0 ⊂ V ; E 0 ), |V 0 | = k}.
(3)
An FR code C (n, θ, α, ρ) is universally good
Pk if the code
k
dimension DC (k) is more than or equal to
i=1 di − 2
for any k < n, where d1 ≤ d2 ≤ . . . ≤ dn . The following
Theorem gives the necessary and sufficient condition for a
universally good FR code on hypergraph.
Remark 15. Note that a sub-hypergraph of a linear hypergraph is again a linear hypergraph and each linear hypergraph satisfies the Lemme 3. Hence, all the FR codes which
are equivalent to linear hypergraph satisfy the Theorem 14 for
each k ≤ n − 1. So, each FR code which is equivalent to a
linear conditional hypergraph is universally good.
Remark 16. An FR code illustrated in [23], is equivalent to a
linear conditional hypergraph. The bound on code dimension
(Theorem 14) is also discussed in [23, Inequality 2].
Theorem 11. For V = {vi : i = 1, 2, . . . , n}, consider a
hypergraph H = (V ; E) with |E(vi )| ≤ |E(vj )|, for i < j and C. Fractional Repetition Codes using Simple Hypergraph
i, j = 1, 2, . . . , n. For a given positive integer k < n, let H 0 =
A hypergraph H = (V ; E) is called a simple hypergraph
(V 0 ⊂ V ; E 0 ) be a induced sub-hypergraph of the hypergraph only if Ei ⊆ Ej then i = j, for any Ei , Ej ∈ E. If a simple
H = (V ; E) with E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E} hypergraph is a conditional hypergraph then the hypergraph
and |V 0 | = k. For each k = 1, 2, . . . n − 1, the FR code is can be called as a conditional simple hypergraph.
universally good if and only if
If an FR code is equivalent to a conditional simple hypergraph then all the nodes which share a packet will not contain
k
X
k an another common packet in the FR code. Any FR code
|E(vi )|−
min{|E 0 | : H 0 = (V 0 ⊂ V ; E 0 ), |V 0 | = k} ≥
.
2 equivalent to a conditional simple hypergraph will satisfy the
i=1
(4) following two Lemmas.
Proof: The proof follows the Equation 3 and [9, Theorem
4].
Lemma 17. An FR code C : (n, θ, α, ρ) with {U : Pi ∈ U } *
{U : Pj ∈ U } for each i 6= j and i, j = 1, 2, . . . , n, satisfies
θ
P
n −1
n
≤ 1 and θ ≤ bn/2c
.
ρj
j=1
B. Fractional Repetition Codes using Linear Hypergraphs
A hypergraph is called linear hypergraph if any two hyperedges share at most one hypervertex. Note that in a
hypergraph, any two hyperedges share at most one hypervertex
if and only if any two hypervertices are shared by at most one
hyperedge. If a linear hypergraph is a conditional hypergraph
then the hypergraph is called conditional linear hypergraph.
Any two nodes in an FR code equivalent to a conditional
linear hypergraph do not share more than one packets. An
FR code on conditional linear hypergraph will satisfy the
following Lemmas.
Lemma 12. An FR code C : (n, θ, α, ρ) with |Ui ∩Uj | ≤ 1 (for
θ
P
ρj
n
each i 6= j and i, j = 1, 2, . . . , n), satisfies
2 ≤ 2 .
j=1
Proof: The Lemma followers from [21, Chapter 1, Theorem 3].
Lemma 13. An FR code C : (n, θ, α, ρ) with |Ui ∩ Uj | ≤ 1
n
P
αi
θ
(for each i 6= j and i, j = 1, 2, . . . , n), satisfies
2 ≤ 2 .
i=1
Proof: The Theorem follows from the duality (with
respect to hypergraph) on Lemma 12.
The bound on the code dimension of FR code associated
with linear hypergraph is discussed in the following Theorems.
Theorem 14. An FR code C : (n,
θ, α, ρ) with |Ui ∩ Uj | ≤ 1
Pk
k
satisfies DC (k) ≥ i=1 αi − 2 , where αi ≤ αj (1 ≤ i <
j ≤ n).
Proof: The proof follows from the Lemma 3 and Lemma
4.
Proof: The Lemma follows from [21, Chapter 1, Theorem
2].
Lemma 18. An FR code C : (n, θ, α, ρ) with Ui * Uj for
n
P
θ −1
≤ 1 and
each i 6= j and i, j = 1, 2, . . . , n, satisfies
αj
i=1
θ
n ≤ bθ/2c
.
Proof: The proof follows the duality (with respect to
hypergraph) on Lemma 17.
Remark 19. In the FR code as considered in [5], [15], [17],
[24], [25], if parallel nodes do not exist then the FR code will
satisfy the Lemma 17 and Lemma 18.
Remark 20. Each FR code studied in the literature is associated with a specific hypergraph. The various FR codes
and equivalent hypergraphs are listed in the Table II (see
the Appendix). FR code as the Hyper-FR image of the listed
hypergraph (Table II), satisfies the constraints given in the
definition of an FR code in respective article.
In [5], [26], FR codes with symmetric parameters satisfies
the bounds in Lemma 12, 13, 17 and 18 with equality. In
[7], [9], [23], FR codes with asymmetric parameters satisfies
the bounds in Lemma 12 and 13 with equality. It would be
an interesting task to find more FR codes with asymmetric
parameters which satisfies Lemma 9, 10, 17 and 18 with
equality.
V. C ONCLUSION
In this work, we have sketched the surface of the very
interesting topic by establishing a relation between FR code
and hypergraph. It is shown that each FR code studied in
6
the literature is associated with some conditional hypergraph,
where the minimum rank and the minimum degree of the
hypergraph are non-zero positive integer. We have compared
our method with other known constructions of FR codes. The
properties of the hypergraphs are mapped to FR codes by using
Hyper-FR mapping. Some new bounds on FR codes have been
derived. It would be an interesting work in the future to find the
FR codes which satisfy those bounds with equality. Analysis
of FR codes on generalized hypergraph could be an another
interesting problem.
R EFERENCES
[1] S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,”
in Proceedings of the nineteenth ACM symposium on Operating systems
principles, ser. SOSP ’03. New York, NY, USA: ACM, 2003, pp.
29–43. [Online]. Available: http://doi.acm.org/10.1145/945445.945450
[2] H. Weatherspoon and J. D. Kubiatowicz, “Erasure coding vs. replication: A quantitative comparison,” in Proceedings of the International
Workshop on Peer-to-Peer Systems, 2002, pp. 328–337.
[3] A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran,
“Network coding for distributed storage systems,” Information Theory,
IEEE Transactions on, vol. 56, no. 9, pp. 4539–4551, Sept 2010.
[4] K. Rashmi, N. Shah, P. Kumar, and K. Ramchandran, “Explicit construction of optimal exact regenerating codes for distributed storage,”
in Communication, Control, and Computing, 2009. Allerton 2009. 47th
Annual Allerton Conference on, 30 2009-oct. 2 2009, pp. 1243 –1249.
[5] S. El Rouayheb and K. Ramchandran, “Fractional repetition codes for
repair in distributed storage systems,” in Communication, Control, and
Computing (Allerton), 2010 48th Annual Allerton Conference on, Oct.
2010, pp. 1510 –1517.
[6] S. Pawar, N. Noorshams, S. El Rouayheb, and K. Ramchandran,
“DRESS codes for the storage cloud: Simple randomized constructions,”
in Information Theory Proceedings (ISIT), 2011 IEEE International
Symposium on, 31 2011-aug. 5 2011, pp. 2338 –2342.
[7] B. Zhu, H. Li, K. W. Shum, and S.-Y. R. Li, “HFR code: a flexible
replication scheme for cloud storage systems,” IET Communications,
October 2015. [Online]. Available: http://digital-library.theiet.org/
content/journals/10.1049/iet-com.2014.1225
[8] B. Zhu, H. Li, H. Hou, and K. W. Shum, “Replication-based distributed
storage systems with variable repetition degrees,” in 2014 Twentieth
National Conference on Communications (NCC), Feb 2014, pp. 1–5.
[9] B. Zhu, K. Shum, H. Li, and H. Hou, “General fractional repetition
codes for distributed storage systems,” Communications Letters, IEEE,
vol. 18, no. 4, pp. 660–663, April 2014.
[10] M. K. Gupta, A. Agrawal, and D. Yadav, “On weak dress codes for
cloud storage,” CoRR, vol. abs/1302.3681, 2013. [Online]. Available:
http://arxiv.org/abs/1302.3681
[11] H. Park and Y.-S. Kim, “Construction of fractional repetition codes with
variable parameters for distributed storage systems,” Entropy, vol. 18,
no. 12, 2016. [Online]. Available: http://www.mdpi.com/1099-4300/18/
12/441
[12] S. A. Prajapati and M. K. Gupta, “On some universally good fractional
repetition codes,” CoRR, vol. abs/1609.03106, 2016. [Online]. Available:
http://arxiv.org/abs/1609.03106
[13] Q. Yu, C. W. Sung, and T. Chan, “Irregular fractional repetition
code optimization for heterogeneous cloud storage,” Selected Areas in
Communications, IEEE Journal on, vol. 32, no. 5, pp. 1048–1060, May
2014.
[14] M. Y. Nam, J. H. Kim, and H. Y. Song, “Locally repairable fractional
repetition codes,” in 2015 Seventh International Workshop on Signal
Design and its Applications in Communications (IWSDA), Sept 2015,
pp. 128–132.
[15] B. Zhu, “Rethinking fractional repetition codes: New construction and
code distance,” IEEE Communications Letters, vol. 20, no. 2, pp. 220–
223, Feb 2016.
[16] K. G. Benerjee and M. K. Gupta, “On dress codes with flowers,” in 2015
Seventh International Workshop on Signal Design and its Applications
in Communications (IWSDA), Sept 2015, pp. 108–112.
[17] S. Anil, M. K. Gupta, and T. A. Gulliver, “Enumerating some fractional
repetition codes,” CoRR, vol. abs/1303.6801, 2013.
[18] J. Koo and J. Gill, “Scalable constructions of fractional repetition
codes in distributed storage systems,” in Communication, Control, and
Computing (Allerton), 2011 49th Annual Allerton Conference on, Sept
2011, pp. 1366–1373.
[19] N. Silberstein and T. Etzion, “Optimal fractional repetition codes based
on graphs and designs,” Information Theory, IEEE Transactions on,
vol. PP, no. 99, pp. 1–1, 2015.
[20] B. Zhu and H. Li, “Exploring node repair locality in fractional repetition
codes,” IEEE Communications Letters, vol. 20, no. 12, pp. 2350–2353,
Dec 2016.
[21] C. Berge, Hypergraphs, ser. North-Holland Mathematical Library.
North-Holland, 1989, vol. 45, combinatorics of Finite Sets.
[22] A. Bretto, Hypergraph Theory. Springer International Publishing, 2013.
[23] B. Zhu, K. W. Shum, and H. Li, “Heterogeneity-aware codes with
uncoded repair for distributed storage systems,” IEEE Communications
Letters, vol. 19, no. 6, pp. 901–904, June 2015.
[24] N. Silberstein and T. Etzion, “Optimal fractional repetition codes for
distributed storage systems,” in 2014 IEEE 28th Convention of Electrical
Electronics Engineers in Israel (IEEEI), Dec 2014, pp. 1–4.
[25] B. Zhu and H. Li, “Adaptive fractional repetition codes for dynamic
storage systems,” IEEE Communications Letters, vol. 19, no. 12, pp.
2078–2081, Dec 2015.
[26] O. Olmez and A. Ramamoorthy, “Fractional repetition codes with
flexible repair from combinatorial designs,” IEEE Transactions on
Information Theory, vol. 62, no. 4, pp. 1565–1591, April 2016.
[27] T. Ernvall, “The existence of fractional repetition codes,” CoRR, vol.
abs/1201.3547, 2012.
[28] N. Silberstein and T. Etzion, “Optimal fractional repetition codes and
fractional repetition batch codes,” in 2015 IEEE International Symposium on Information Theory (ISIT), June 2015, pp. 2046–2050.
[29] O. Olmez and A. Ramamoorthy, “Repairable replication-based storage
systems using resolvable designs,” in Communication, Control, and
Computing (Allerton), 2012 50th Annual Allerton Conference on, Oct
2012, pp. 1174–1181.
[30] ——, “Constructions of fractional repetition codes from combinatorial
designs,” in Signals, Systems and Computers, 2013 Asilomar Conference
on, Nov 2013, pp. 647–651.
7
VI. A PPENDIX
C. Bounds on Fractional Repetition Codes using Hypergraphs
The Appendix includes the bounds on FR codes correspondence to various classes of hypergraphs such as uniform
hypergrths, regular hypergraphs and intersecting hypergraphs.
The cost comparison analysis is done for various FR codes at
the end of the Appendix.
The alternate condition for the existence of an FR code is
given in the following Theorem.
A. Proof of Lemma 4
Proof: For V = {vi : i = 1, 2, . . . , n}, let H = (V ; E)
be a linear conditional hypergraph with |E(vi )| ≤ |E(vj )|, for
1 ≤ i < j ≤ n. For a given positive integer k < n, let V 0 be an
arbitrary k-element subset of the set V . Consider a hypergraph
H 0 = (V 0 ; E 0 ), where E 0 = {E 0 6= φ : E 0 = E ∩ V 0 , E ∈ E}.
By definition of degree of a hypervertex,
X
k
X
|E(v)| ≥
v∈V 0
⇒
X
k
k
|V 0 |
|E(vi )| −
|E(v)| −
≥
2
2
0
i=1
X
v∈V
|E(vi )|
i=1
A sub-hypergraph of a linear hypergraph is also linear. So,
using Lemma 3, one can conclude that
0 X
k
X
k
|V |
0
|E(vi )| −
.
|E | ≥
|E(v)| −
≥
2
2
0
i=1
v∈V
Theorem 22. (Alternate Existence Condition) Consider two
vectors (ρ1 ρ2 . . . ρθ ) and (α1 α2 . . . αn ) on integers such
that ρ = ρ1 ≥ ρ2 ≥ . . . ≥ ρθ for j = 1, 2, . . . , θ and
i = 1, 2, . . . , n. An FR code C : (n, θ, α, ρ) exists such that
|Ui | = αi for i = 1, 2, . . . , n and replication factor of packet
Pj is ρj for j = 1, 2, . . . , θ if
n
θ
P
P
1)
αi =
ρj and
2)
i=1
n
P
i=1
j=1
min{αi , m} ≥
m
P
ρj ( for m < θ, m ∈ Z).
j=1
Proof: The proof follows from the duality (with respect
to hypergraph) on the Theorem 8.
Note that if parameters of an FR code do not satisfy one of
the constraint in the Theorem 8 or Theorem 22, then the FR
code does not exist.
In an FR code, two packets with same replication factor
are called parallel packets if the two packets are shared by
same nodes. In an FR code, two nodes with same node
storage capacity are called parallel nodes if the two nodes
contain same packets. For an FR code without parallel packets
and parallel nodes, the bound on node storage capacity and
replication factor are given in the following two Lemmas.
The chosen k-element set V 0 is an arbitrary subset of set V , Lemma 23. An FR code C : (n, θ, α, ρ) without parallel
packets, satisfies α ≤ 2n−1 .
so
k
X
Proof: The proof follows from the Theorem 4 in [21,
k
0
0
0
0
0
|E(vi )|−
. Chapter 1].
min{|E | : H = (V ⊂ V ; E ), |V | = k} ≥
2
i=1
Hence, the lemma is proved.
Lemma 24. An FR code C : (n, θ, α, ρ) without parallel
nodes, satisfies ρ ≤ 2θ−1 .
B. Algebraic Entropy on Fractional Repetition Code
Proof: The proof follows from the duality (with respect
to the hypergraph) on Lemma 23.
An algebraic entropy of a hypergraph is discussed in [22].
Using a Hyper-FR mapping on a hypergraph, one can find the
algebraic entropy for an FR code in the following Theorem.
Theorem 21. (Algebraic Entropy) Consider an FR code
C : (n, θ, α, ρ) with the node adjacency matrix A(C ) =
[ai,j ]n×n . The algebraic entropy associated with the FR code
C : (n, θ, α, ρ), is given by
I(C ) = −
n
X
λi log2 λi ,
i=1
where λi (for i = 1, 2, . . . , n) is a discrete probability distribution. In particular, λi (i = 1, 2, . . . , n) is the P
eigenvalue of
n
matrix L(C ) = D − A(C ) are real such that i=1 λi = 1
and 0 ≤ λi ≤ 1 (∀i = 1, 2, . . . , n), where
n
n
n
X
X
X
D = diag
a1j ,
a2j , . . . ,
anj .
j=1
j=1
j=1
Proof: The proof follows from the algebraic entropy of
the hypergraph [22, Capter 1].
Theorem 25. For an FR code C : (n, θ, α, ρ) with |{U :
Pm ∈ U } ∩ {U : Pj ∈ U }| ≤ 1,
k
X
k
DC (k) ≥
αi −
,
2
i=1
(5)
where αi ≤ αj and 1 ≤ m < j ≤ θ.
Proof: The proof follows from the Theorem 14 and |Ui ∩
Uj | ≤ 1 ⇔ |{U : Pm ∈ U } ∩ {U : Pl ∈ U }| ≤ 1 for
1 ≤ m < l ≤ θ and 1 ≤ i < j ≤ n.
D. Fractional Repetition Codes using the Uniform Hypergraphs
For a positive integer r, an r-uniform hypergraph is a
hypergraph H = (V ; E) with |E| = r, for each E ∈ E. If
a conditional hypergraph is an r-uniform hypergraph then the
hypergraph is called an r-uniform conditional hypergraph.
An FR code C : (n, θ, α, ρ) associated with an r-uniform
conditional hypergraph H = (V ; E) will have the same
8
replication factor for each packet i.e. ρ = ρj for each
j = 1, 2, . . . , θ.
For a positive integer r, an r-uniform hypergraph H =
r
(V ; E) is called an r-complete hypergraph denoted by K|V
|
if E = {E : E ⊆ V, |E| = r}. The following Lemma gives a
bound on total number of packets for an FR code.
Lemma 26. For an FR code C : (n, θ, α, ρ) with ρ = ρj (j =
1, 2, . . . , θ), the total number of distinct packets is θ ≤ nρ .
r
Proof: In an r-complete hypergraph K|V
parallel
| with no
hyperedges and isolated hypervertices, |E| = |Vr | . An runiform hypergraph H = (V ; E) is a sub-hypergraph
of the
|V |
r
r-complete hypergraph K|V
.
Hence,
|E|
≤
.
The
number
|
r
of distinct edges in FR code C : (n, θ, α, ρ) equivalent to a
ρ-uniform hypergraph H = (V ; E), is θ ≤ nρ .
Note that the condition given in Lemma 26, is derived in
[27] for FR codes with symmetric parameters. If an r-uniform
hypergraph is a connected hypergraph then the hypergraph is
called a connected r-uniform hypergraph.
An FR code equivalent to a uniform hypergraph will satisfy
the following bound.
Lemma 27. An FR code C : (n, θ, α, ρ) with |Ui ∩Uj | ≤ 1 (for
each i, j = 1, 2, . . . , n) and ρm = ρ (for each m = 1, 2, . . . , θ)
satisfies θ ≤ n(n−1)
ρ(ρ−1) .
Proof: The proof follows from [21, Chapter 1, Theorem
3].
Remark 28. The FR code associated with a ρ-uniform linear
conditional hypergraph is GFR code [9]. For a ρ-uniform
linear conditional hypergraph, the Theorem 14 follows the
bound on code dimension for GFR code [9, Theorem 4].
Remark 29. In [13, Fact 1], it is shown that an IFR code is
equivalent to a ρ-uniform hypergraph.
E. Fractional Repetition Codes using Regular Hypergraphs
An s-regular hypergraph is a hypergraph H = (V ; E) such
that |E(vi )| = s, for each vi ∈ V . An conditional hypergraph
H = (V ; E) is called an s-regular conditional hypergraph if
|E(vi )| = s, for each vi ∈ V .
An FR code C : (n, θ, α, ρ) associated with an s-regular
conditional hypergraph H = (V ; E) will have the same node
storage capacity for each node i.e. α = αi for each i =
1, 2, . . . , n. The following three Lemmas give bound on the
FR codes.
Lemma 30. An FR code C : (n, θ, α, ρ) associated with
connected α-regular conditional hypergraph, satisfies the following conditions.
θ
P
1)
ρj is multiple of α,
2)
j=1
θ
P
ρj ≥
j=1
3) ρ ≤
1
α
α(θ−1)
α−1 ,
θ
P
ρj .
j=1
Proof: The proof follows from the duality (with respect
to hypergraphs) on Lemma 9.
Lemma 31. An FR code C : (n, θ, α, ρ) with |Ui ∩ Uj | ≤ 1
(for each i, j = 1, 2, . . . , n) and αm = α (for each m =
θ(θ−1)
.
1, 2, . . . , n) satisfies n ≤ α(α−1)
A hypervertex of an s-regular hypergraph
H = (V ; E),
shares s distinct hyperedges so |V | ≤ |E|
s . The following
Lemma ensures the existence of an FR code with the same
number of nodes and packets and same packet replication
factor and node storage capacity.
Lemma 32. For a positive integer r, there exists an FR code
C : (n, n, r, r) such that 2 ≤ r ≤ n − 1 and αi = ρj = r, for
each i = 1, 2, . . . , n.
Proof: The proof follows from the fact that there exists
an r-uniform r-regular hypergraph with n hypervertices for
2 ≤ r ≤ n − 1.
The node packet distribution of the FR code C : (5, 5, r, r)
with 5 nodes and αi = ρj = r (for each i = 1, 2, 3, 4, 5) are
following.
• For r = 2, there exists an FR code C : (5, 5, 2, 2) with
U1 = {P1 , P2 }, U2 = {P2 , P3 }, U3 = {P3 , P4 }, U4 =
{P4 , P5 } and U5 = {P5 , P1 }.
• For r = 3, there exists an FR code C : (5, 5, 3, 3)
with U1 = {P1 , P2 , P3 }, U2 = {P2 , P3 , P4 }, U3 =
{P3 , P4 , P5 }, U4 = {P4 , P5 , P1 } and U5 = {P5 , P1 , P2 }.
• For r = 4, there exists an FR code C : (5, 5, 4, 4)
with U1 = {P1 , P2 , P3 , P4 }, U2 = {P2 , P3 , P4 , P5 },
U3 = {P3 , P4 , P5 , P1 }, U4 = {P4 , P5 , P1 , P2 } and
U5 = {P5 , P1 , P2 , P3 }.
Remark 33. Each FR code C : (n, θ, α, ρ) considered in [5]
is associated with a ρ-uniform α-regular hypergraph H =
(V ; E).
Recall that the storage capacity of nodes in an FR code
is related to the replication factor of packets in the dual FR
code and vise verse. Following two Lemmas are based on the
properties of duality.
Lemma 34. If C : (n, θ, α, ρ) is an FR code with αi = α
(for each i = 1, 2, . . . , n) then the dual FR code C ∗ :
(n∗ , θ∗ , α∗ , ρ∗ ) is an FR code with ρ∗j ∗ = α, for each
j ∗ = 1, 2, . . . , θ∗ .
Proof: The Lemma follows from the fact that the dual of
an r-uniform hypergraph is an r-regular hypergraph.
Lemma 35. If C : (n, θ, α, ρ) is an FR code with ρj = ρ
(for each j = 1, 2, . . . , θ) then the dual FR code C ∗ :
(n∗ , θ∗ , α∗ , ρ∗ ) is an FR code with αi∗∗ = ρ, for each
i∗ = 1, 2, . . . , n∗ .
Proof: The Lemma follows from the fact that the dual of
an s-regular hypergraph is an s-uniform hypergraph.
Remark 36. If C : (n, θ, α, ρ) is an FR code with ρj
and αi = α (for each j = 1, 2, . . . , θ); i = 1, 2, . . . , n)
the dual FR code C ∗ : (n∗ , θ∗ , α∗ , ρ∗ ) is an FR code
αi∗∗ = α∗ and ρ∗j ∗ = ρ∗ , for each i∗ = 1, 2, . . . , n∗
j ∗ = 1, 2, . . . , θ∗ .
= ρ
then
with
and
Remark 37. In [18], the Transpose code of an FR code is
9
Fig. 3. The graph shows the comparative analysis of an FR code with
the symmetric parameters and FR codes with the asymmetric parameters.
In the graph, the points on the vertical axis represents the maximum file
size (code dimension) which is delivered to any data collector. The points
on the horizontal axis represent the reconstruction degree (number of nodes
connected to any data collector to retrieve the file).
the FR code corresponding to dual hypergraph. All the FR
codes in [18], are corresponding to a ρ-uniform α-regular
hypergraph. So, all the Transpose codes are corresponding to
an α-uniform ρ-regular hypergraph.
F. Analysis
In this subsection, the comparison among FR codes on
homogeneous DSSs and heterogeneous DSSs is done by numerical analysis. Consider an FR code with n = 5 and θ = 10.
For an FR code C : (n = 5, θ = 10, α, ρ), let a data collector
connects k (≤ n = 5) nodes and receives DC (k) (≤ θ = 10)
distinct packets. Two plots between the maximum file size
(or code dimension) DC (k) and the reconstruction degree
k are given in Figure 3. The ∗ are the points, for the FR
code Chomo : (n = 5, θ = 10, α = 4, ρ = 2) with
symmetric parameters [5]. The + are the points, for the codes
Chete : (n = 5, θ = 10, α ≤ 6, ρ ≤ 4), where αi ≤ α ≤ 6
(i = 1, 2, 3, 4, 5) and ρj ≤ ρ ≤ 4 (j = 1, 2, . . . , 10). The
+ points are obtained for the FR codes Chete equivalent to
a random hypergraph with 5 nodes and 10 distinct packets.
In the Figure 3, the code dimension of Chomo and Chete are
same for k = 0, 4, 5. For k = 1, 2, 3, the code dimension
DChete (k) = 1 + DChomo (k). The graph shows that the code
dimension of the FR code with symmetric parameters are not
more than the code dimension of the FR code with asymmetric
parameters.
In an FR code, some encoded packets may be favorable for a
data collector because of their functionality and characteristics.
For example, if symmetric (θ, B) MDS code is used in the FR
code then the first B packets will be favourable to any user
because those packets needs no computation since they are
the exact copy of the information packets. One can increase
the availability of those packets in the FR code by increasing
the replication factor of only those packets. Note that the
replication factor of each packet in an FR code with the
symmetric parameters are same, so the availability of every
packets in the FR code remains the same.
For n nodes and θ packets, consider an FR code Chete with
asymmetric parameters. In the FR code Chete , a packet Pj
is available in ρj distinct nodes so, the availability fraction
of the packet Pj is ρj /n. Choosing higher values of the
replication factor ρj , one can increase the availability fraction
of the packet Pj in the system. Note that the availability
fraction of each packet is fixed with ρ/n for an FR code
Chomo : (n, θ, ., ρ) with symmetric parameters.
In an FR code, some nodes may be favorable for a data
collector because of their popularity or storage cost. For
example, a data collector would like to connect to a node
which contains more number of favorable packets and having
less storage cost. By permuting the packets, one can find an
FR code with the same parameters such that the typical node
contains more favorable packets.
For an FR code with asymmetric parameters, the system
allows to store more packets in a node. Hence, one can find
an FR code with the low storage cost sum by replacing packets
between two nodes, where the storage costs of the two packets
are distinct.
Now, consider an FR code with n nodes and θ packets. Let
the ci ∈ R be the cost to store one packet in the node Ui . For
some i, j ∈ {1, 2, . . . , n} and i 6= j, if 2ci ≤ cj then the cost
to store two packets in a node Ui is less then or equal to the
cost to store one packet in node Uj . Hence, for a given FR
code, the following two propositions give the condition of the
existence of FR codes with less storage cost sum.
Proposition 38. For the given n, θ ∈ N, let Chomo :
(n, θ, α, ρ) be an FR code with the symmetric parameters.
Let the ci ∈ R (c1 ≤ c2 ≤ . . . ≤ cn ) be the cost to store one
packet in the node Ui . For some i, j ∈ N, if 2ci ≤ cj then
an FR code Chete : (n, θ, α0 , ρ0 ) with asymmetric parameters
exists such that the total cost sum associated with Chete is less
then the total cost sum associated to Chomo , where the total
sum of node storage capacity of Chomo and Chete are same.
Proposition 39. For given n, θ ∈ N, let C : (n, θ, α, ρ) be an
FR code with asymmetric parameters. Let the ci ∈ R (c1 ≤
c2 ≤ . . . ≤ cn ) be the cost to store one packet in the node
Ui . For some i, j ∈ N, if ci + ci αi ≤ cj αj then an FR code
C 0 : (n, θ, α0 , ρ0 ) exists with asymmetric parameters such that
the total cost sum associated with C 0 is more then the total
cost sum associated to C , where the total sum of node storage
capacity of C and C 0 are the same.
10
TABLE II
FR CODES AND RESPECTIVE HYPERGRAPHS
FR code
C : (n, θ, α, ρ)
FR code [5], [24]
HFR code [7]
IFR code [13]
VFR code [8]
GFR code [9]
WFR code [10]
FR code [11]
Adaptive FR code [25]
FFR code [23]
FR code [12]
FR code [16]
FR code [15], [17]
FR code [19], [26], [28],
[29], [30]
Locally repairable
FR code [14], [20]
Corresponding conditional hypergraph
H = (V ; E)
ρ-uniform and α-regular hypergraph
Linear and α-regular hypergraph
ρ-uniform hypergraph
α-regular hypergraph with
|E| ∈ {ρ1 , ρ2 }, for each E ∈ E
ρ-uniform and linear hypergraph
ρ-uniform hypergraph
ρ-uniform, α-regular and linear hypergraph
ρ-uniform α-regular hypergraph s.t. there
exist a ρ0 -uniform α0 -regular sub-hypergraph,
where ρ0 < ρ and α0 < α, for ρ0 , α0 ∈ N
Linear hypergraph
ρ-uniform hypergraph
Hypergraph
ρ-uniform and α-regular hypergraph
Intersecting, ρ-uniform and
α-regular hypergraph
ρ-uniform, α-regular and
and non-linear hypergraph
| 7cs.IT
|
Clustering via Crowdsourcing
arXiv:1604.01839v1 [cs.DS] 7 Apr 2016
Arya Mazumdar∗
Barna Saha†
College of Information & Computer Science
University of Massachusetts Amherst
Amherst, MA, 01002
Abstract
In recent years, crowdsourcing, aka human aided computation has emerged as an effective
platform for solving problems that are considered complex for machines alone. Using human
is time-consuming and costly due to monetary compensations. Therefore, a crowd based
algorithm must judiciously use any information computed through an automated process,
and ask minimum number of questions to the crowd adaptively.
One such problem which has received significant attention is entity resolution. Formally,
we are given a graph G = (V, E) with unknown edge set E where G is a union of k (again
unknown, but typically large O(nα ), for α > 0) disjoint cliques Gi (Vi , Ei ), i = 1, . . . , k. The
goal is to retrieve the sets Vi s by making minimum number of pair-wise queries V ×V → {±1}
to an oracle (the crowd). When the answer to each query is correct, e.g. via resampling,
then this reduces to finding connected components in a graph. On the other hand, when
crowd answers may be incorrect, it corresponds to clustering over minimum number of
noisy inputs. Even, with perfect answers, a simple lower and upper bound of Θ(nk) on
query complexity can be shown. A major contribution of this paper is to reduce the query
complexity to linear or even sublinear in n when mild side information is provided by a
machine, and even in presence of crowd errors which are not correctable via resampling. We
develop new information theoretic lower bounds on the query complexity of clustering with
side information and errors, and our upper bounds closely match with them. Our algorithms
are naturally parallelizable, and also give near-optimal bounds on the number of adaptive
rounds required to match the query complexity.
∗
University of Massachusetts Amherst, [email protected]. This work is supported in part by an NSF
CAREER award CCF 1453121 and NSF award CCF 1526763.
†
University of Massachusetts Amherst, [email protected] work is partially supported by a NSF CCF
1464310 grant, a Yahoo ACE Award and a Google Faculty Research Award.
0
1
Introduction
Consider we have an undirected graph G(V ≡ [n], E), [n] ≡ {1, . . . , n}, such that G is a union
of k disjoint cliques Gi (Vi , Ei ), i = 1, . . . , k, but the subsets Vi ⊂ [n], k and E are unknown to
us. We want to make minimum number of adaptive pair-wise queries from V × V to an oracle,
and recover the clusters. Suppose, in addition, we are also given a noisy weighted similarity
matrix W = {wi,j } of G, where wi,j is drawn from a probability distribution f+ if i and j belong
to the same cluster, and else from f− . However, the algorithm designer does not know either
f+ or f− . How does having this side information affect the number of queries to recover the
clusters, which in this scenario are the hidden connected components of G? To add to it, let
us also consider the case when some of the answers to the queries are erroneous. We want to
recover the clusters with minimum number of noisy inputs possibly with the help of some side
information. In the applications that motivate this problem, the oracle is the crowd.
In the last few years, crowdsourcing has emerged as an effective solution for large-scale
“micro-tasks”. Usually, the micro-tasks that are accomplished using crowdsourcing tend to
be those that computers cannot solve very effectively, but are fairly trivial for humans with
no specialized training. Consider for example six places, all named after John F. Kennedy 1 :
(ra ) John F. Kennedy International Airport, (rb ) JFK Airport, (rc ) Kennedy Airport, NY (rd ) John
F. Kennedy Memorial Airport, (re ) Kennedy Memorial Airport, WI, (rf ) John F. Kennedy Memorial
Plaza. Humans can determine using domain knowledge that the above six places correspond to
three different entities: ra , rb , and rc refer to one entity, rd and re refer to a second entity, and rf
refers to a third entity. However, for a computer, it is hard to distinguish them. This problem
known as entity resolution is a basic task in classification, data mining and database management
[26, 23, 29]. It has many alias in literature, and also known as coreference/identity/name/record
resolution, entity disambiguation/linking, duplicate detection, deduplication, record matching
etc. There are several books that just focus on this topic [17, 37]. For a comprehensive study
and applications, see [29].
Starting with the work of Marcus et al. [43], there has been a flurry of works that have aimed
at using human power for entity resolution [31, 51, 22, 52, 27, 50, 21, 30, 39]. Experimental
results using crowdsourcing platforms such as Amazon Mechanical Turk have exceeded the
machine only performance [51, 52]. In all of these works, some computer generated pair-wise
similarity matrix is used to order the questions to crowd. Using human in large scale experiments
is costly due to monetary compensation paid to them, in addition to being time consuming.
Therefore, naturally these works either implicitly or explicitly aim to minimize the number
of queries to crowd. Assuming the crowd returns answers correctly, entity resolution using
crowdsourcing corresponds exactly to the task of finding connected components of G with
minimum number of adaptive queries to V × V . Typically k is large [51, 52, 27, 50], and we
can, not necessarily, take k ≥ nα for some constant α ∈ [0, 1].
It is straightforward to obtain an upper bound of nk on the number of queries: simply ask
one question per cluster for each vertex, and is achievable even when k is unknown. Except for
this observation [51, 22], no other theoretical guarantees on the query complexity were known
so far. Unfortunately, Ω(nk) is also a lower bound [22]. Bounding query complexity of basic
problems like selection and sorting have received significant attention in the theoretical computer
science community [25, 10, 4, 9]. Finding connected components is the most fundamental graph
problem, and given the matching upper and lower bounds, there seems to be a roadblock in
improving its query complexity beyond nk.
In contrast, the heuristics developed in practice often perform much better, and all of them
use some computer generated similarity matrix to guide them in selecting the next question to
ask. We call this crowdsourcing using side information. So, we are given a similarity matrix
W = {wi,j }i,j∈V ×V , which is a noisy version of the original adjacency matrix of G as discussed
1
http://en.wikipedia.org/wiki/Memorials_to_John_F._Kennedy
1
in the beginning. Many problems such as sorting, selection, rank aggregation etc. have been
studied using noisy input where noise is drawn from a distribution [11, 12, 41]. Many probabilistic generative models, such as stochastic block model, are known for clustering [1, 35, 16, 45].
However, all of these works assume the underlying distributions are known and use that information to design algorithms. Moreover, none of them consider query complexity while dealing
with noisy input.
We show that with side information, even with unknown f+ and f− , a drastic reduction
in query complexity is possible. We propose a randomized algorithm that reduces the number
2
of queries from O(nk) to Õ( ∆(fk+ ,f− ) ), where ∆(f+ , f− ) ≡ D(f+ kf− ) + D(f− kf+ ) and D(pkq)
is the Kullback-Leibler divergence between the probability distributions p,
and2 q, and
recovers
the clusters accurately with high probability. Interestingly, we show Ω ∆(fk+ ,f− ) is also an
information-theoretic lower bound, thus matching the query complexity upper bound within
a logarithmic factor. This lower bound could be of independent interest, and may lead to
other lower bounds in related communication complexity models. To obtain the clusters accurately
with probability
1, we propose a Las Vegas algorithm with expected query complexity
k2
Õ n + ∆(f+ ,f− ) which again matches the corresponding lower bound.
So far, we have considered the case when crowd answers are accurate. It is possible that
crowd answers contain errors, and remain erroneous even after repeating a question multiple
times. That is, resampling, repeatedly asking the same question and taking the majority vote,
does not help much. Such observation has been reported in [50, 34] where resampling only
reduced errors by ∼ 20%. Crowd workers often use the same source (e.g., Google) to answer
questions. Therefore, if the source is not authentic, many workers may give the same wrong
answer to a single question. Suppose that error probability is p < 12 . Under such crowd error
model, our problem becomes that of clustering with noisy input, where this noisy input itself
is obtained via adaptively querying the crowd.
We give the first information theoretic lower bounds in this model to obtain the maximum likelihood estimator, and again provide nearly matching upper bounds with and without
side information. Side information helps us to drastically reduce the query complexity, from
k2
nk
) to Õ( D(pk1−p)∆(f
) where D(pk1 − p) = (1 − 2p) log 1−p
Õ( D(pk(1−p))
p . An intriguing fact
+ ,f− )
log n
about this algorithm is that it has running time O(k D(pk1−p) ), and assuming the conjectured
hardness of finding planted clique from an Erdős-Rényi random graph [36], this running time
cannot be improved2 . However, if we are willing to pay a bit more on the query complexity,
then the running time can be made into polynomial. This also provides a better bound on an
oft-studied clustering problem, correlation clustering over noisy input [44, 8]. While prior works
have considered sorting without resampling [12], these are the first results to consider crowd
errors for a natural clustering problem.
The algorithms proposed in this work are all intuitive, easily implementable, and can be
parallelized. They do not assume any knowledge on the value of k, or the underlying distributions f+ and f− . On the otherhand, our information theoretic lower bounds work even with
the complete knowledge of k, f+ , f− . While queries to crowd can be made adaptively, it is also
important to minimize the number of adaptive rounds required maintaining the query upper
bound. Low round complexity helps to obtain results faster. We show that all our algorithms
extend nicely to obtain close to optimal round complexity as well. Recently such results have
been obtained for sorting (without any side information) [10]. Our work extends nicely to two
more fundamental problems: finding connected components, and noisy clustering.
2
Note that a query complexity bound does not necessarily removes the possibility of a super-polynomial
running time.
2
1.1
Related Work
In a recent work [10], Braverman, Mao and Weinberg studied the round complexity of selection
and obtaining the top-k and bottom-k elements when crowd answers are all correct, or are
erroneous with probability 12 − λ2 , or erased with probability 1 − λ, for some λ > 0. They
do not consider any side information. There is an extensive literature of algorithms in the
TCS community where the goal is to do either selection or sorting with O(n) comparisons in
the fewest interactive rounds, aka parallel algorithms for sorting [49, 47, 5, 6, 4, 9]. However,
those works do not consider any erroneous comparisons, and of course do not incorporate side
information. Feige et al., study the depth of noisy decision tree for simple boolean functions,
and selection, sorting, ranking etc. [25], but not with any side information. Parallel algorithms
for finding connected components and clustering have similarly received a huge deal of attention
[28, 33, 18, 46]. Neither those works, nor their modern map-reduce counterparts [40, 24, 32, 2]
study query complexity, or noisy input. There is an active body of work dealing with sorting and
rank aggregation with noisy input under various models of noise generation [11, 12, 41]. However
these works aim to recover the maximum likelihood ordering without any querying. Similarly,
clustering algorithms like correlation clustering has been studied under various random and
semirandom noise models without any active querying [8, 44, 42]. Stochastic block model is
another such noisy model which has recently received a great deal of attention [1, 35, 16, 45],
but again prior to this, no work has considered the querying capability when dealing with noisy
input. In all these works, the noise model is known to the algorithm designer, since otherwise
the problems become NP-Hard [11, 8, 3].
In more applied domains, many frameworks have been developed to leverage humans for performing entity resolution [52, 31]. Wang et al. [52] describe a hybrid human-machine framework
CrowdER, that automatically detects pairs or clusters that have a high likelihood of matching
based on a similarity function, which are then verified by humans. Use of similarity function
is common across all these works to obtain querying strategies [31, 51], but hardly any provide
bounds on the query complexity. The only exceptions are [51, 22] where a simple nk bound on
the query complexity has been derived when crowd returns correct answers, and no side information is available. This is also a lower bound even for randomized algorithms [22]. Firmani
et al. [27] analyzed the algorithms of [52] and [51] under a very stringent noise model.
To deal with the possibility that the crowdsourced oracle may give wrong answers, there are
simple majority voting mechanisms or more complicated heuristic techniques [50, 21, 30, 39]
to handle such errors. No theoretical guarantees exist in any of these works. Davidson et al.,
consider a variable error model where clustering is based on a numerical value–in that case
clusters are intervals with few jumps (errors), and the queries are unary (ask for value) [22].
This error model is not relevant for pair-wise comparison queries.
1.2
Results and Techniques
Problem (Crowd-Cluster). Consider an undirected graph G(V ≡ [n], E), such that G is a union
of k disjoint cliques (clusters) Gi (Vi , Ei ), i = 1, . . . , k, where k, the subsets Vi ⊆ [n] and E
are unknown. There is an oracle O : V × V → {±1}, which takes as input a pair of vertices
u, v ∈ V × V , and returns either +1 or −1. Let O(Q), Q ⊆ V × V correspond to oracle answers
to all pairwise queries in Q. The queries in Q can be done adaptively.
The adjacency matrix of G is a block-diagonal matrix. Let us denote this matrix by A = (ai,j ).
Consider W , an n × n matrix, which is the noisy version of the matrix A. Assume that the
(u, v)th entry of the matrix W , wu,v , is a nonnegative random variable in [0, 1] drawn from a
probability density or mass function f+ for ai,j = 1, and is drawn from a probability density or
mass function f− if ai,j = 0. f+ and f− are unknown.
• Crowd-Cluster with Perfect Oracle Here O(u, v) = +1 iff u and v belong to the same
cluster and O(u, v) = −1 iff u and v belong to different clusters.
3
1. Without Side Information. Given V , find Q ⊆ V × V such that |Q| is minimum,
and from O(Q) it is possible to recover Vi , i = 1, 2, ..., k.
2. With Side Information. Given V and W , find Q ⊆ V × V such that |Q| is
minimum, and from O(Q) it is possible to recover Vi , i = 1, 2, ..., k.
• Crowd-Cluster with Faulty Oracle There is an error parameter p = 21 −λ for some λ > 0.
We denote this oracle by Op . Here if u, v belong to the same cluster then Op (u, v) = +1
with probability 1 − p and Op (u, v) = −1 with probability p. On the otherhand, if u, v do
not belong to the same cluster then Op (u, v) = −1 with probability 1 − p and Op (u, v) = +1
with probability p (in information theory literature, such oracle is called binary symmetric
channel).
1. Without Side Information. Given V , find Q ⊆ V × V such that |Q| is minimum,
and from Op (Q) it is possible to recover Vi , i = 1, 2, ..., k with high probability.
2. With Side Information. Given V and W , find Q ⊆ V × V such that |Q| is minimum, and from Op (Q) it is possible to recover Vi , i = 1, 2, ..., k with high probability.
• Crowd-Cluster with Round Complexity Consider all the above problems where O (similarly Op ) can answer to n log n queries simultaneously, and the goal is to minimize the
number of adaptive rounds of queries required to recover the clusters.
1.2.1
Lower Bounds
When no side information is available, it is somewhat straight-forward to have a lower bound
on the query complexity if the oracle is perfect. Indeed, in that case the query complexity of
Crowd-Cluster is Ω(nk) where n is the total number of elements and k is the number of clusters.
To see this, note that, any algorithm can be provided with a clustering designed adversarially
in the following way. First, k elements residing in k different clusters are revealed to the
algorithm. For a vertex among the remaining n − k vertices, if the algorithm makes any less
than k − 2 queries, the adversary still can place the vertex in one of the remaining 2 clusters–
resulting in a query complexity of (n − k)(k − 1). This argument can be extended towards
randomized algorithms as well, by using Yao’s min-max principal, and has been done in [22].
However [22] left open the case of proving lower bound for randomized algorithms when the
clusters are nearly balanced (ratio between the minimum and maximum cluster size is bounded).
One of the lower bound results proved in this paper resolves it.
Our main technical results for perfect oracle are for Crowd-Cluster with side information.
Our lower bound results are information theoretic, and can be summarized in the following
theorem.
Theorem 1. Any (possibly randomized) algorithm
with the knowledge of f+ , f− , and the number
k2
of clusters k, that does not perform at least Ω ∆(f+ ,f− ) queries, ∆(f+ , f− ) > 0, will be unable
to return the correct clustering with probability at least
1
10 .
(Proof in Sec. 4.1).
Corollary 1. Any (possibly randomized but Las Vegas) algorithmwith the knowledge of f+ , f− ,
k2
queries,
and the number of clusters k, that does not perform at least Ω n + min{1,∆(f
+ ,f− )}
∆(f+ , f− ) > 0, will be unable to return the correct clustering. (Proof in Sec. 4.1).
The main high-level technique is the following. Suppose, a vertex is to be assigned to a
cluster. We have some side-information and answers to queries involving this vertex at hand.
Let these constitute a random variable X that we have observed. Assuming that there are k
possible clusters to assign this vertex to, we have a k-hypothesis testing problem. By observing
X, we have to decide which of the k different distributions (corresponding to the vertex being
4
in k different clusters) it is coming from. If the distributions are very close (in the sense of total
variation distance or divergence), then we are bound to make an error in deciding.
We can compare this problem of assigning a vertex to one of the k-clusters to finding a
biased coin among k coins. In the later problem, we are asked to find out the minimum number
of coin tosses needed for correct identification. This type of idea has previously been applied
to design adversarial strategies that lead to lower bounds on average regret for the multi-arm
bandit problem (see, [7, 13]).
The problem that we have in hand, for lower bound on query-complexity, is substantially
different. It becomes a nontrivial task to identify the correct input and design the set-up so
that we can handle the problem in the framework of finding a biased coin. The key insight here
is that, given a vertex, the combined side-information pertaining to this vertex and a cluster
plays the role of tossing a particular coin (multiple times) in the coin-finding problem. However
the liberty of an algorithm designer to query freely creates the main challenge.
For faulty oracle, note that we are not allowed to ask the same question multiple times to
get the correct answer with high probability. This changes the situation quite a bit, though
in some sense this is closer to coin-tossing experiment than the previous one as we handle
binary random variables here (the answer to the queries). We first note that, for faulty-oracle,
even for probabilistic recovery a minimum size bound on cluster size is required. For example,
k−2
consider the following two different clusterings. C1 : V = ⊔i=1
Vi ⊔ {v1 , v2 } ⊔ {v3 } and C2 :
k−2
V = ⊔i=1 Vi ⊔ {v1 } ⊔ {v2 , v3 }. Now if one of these two clusterings are given two us uniformly
at random, no matter how many queries we do, we will fail to recover the correct cluster with
probability at least p. Our lower bound result works even when all the clusters are close to their
average size (which is nk ), and resolves a question from [22] for p = 0 case.
This removes the constraint on the algorithm designer on how many times a cluster can be
queried with a vertex and the algorithms can have greater flexibility. While we have to show
that enough number of queries must be made with a large number of vertices V ′ ⊂ V , either
of the conditions on minimum or maximum sizes of a cluster ensures that V ′ contains enough
vertices that do not satisfy this query requirement.
Theorem 2. Assume either of the following cases:
• the maximum size of a cluster is ≤
4n
k .
• the minimum size of a cluster is ≥
n
20k .
For a clustering
that satisfies
either of the above two conditions, any (randomized) algorithm
nk
must make Ω D(pk1−p) queries to recover the correct clusters with probability 0.9 when p > 0.
For p = 0 any (randomized) algorithm must make Ω(nk) queries to recover the correct clusters
with probability 0.9. (Proof in Sec. 6.1.1).
We believe that our lower bound techniques are of independent interest, and can spur new
lower bounds for communication complexity problems.
1.2.2
Upper Bounds
Our upper bound results are inspired by the lower bounds. For Crowd-Cluster with perfect oracle,
a straight forward algorithm achieves a nk query complexity. One of our main contributions
is a drasticR reduction in query
complexity of Crowd-Cluster when side information is provided.
R
Let µ+ ≡ xf+ (x)dx, µ− ≡ xf− (x)dx. Our first theorem that assumes µ+ > µ− is as follows.
Theorem 3 (Perfect Oracle+Side Information). With known µ+ , µ− , there exist a Monte Carlo
2 log n
algorithm for Crowd-Cluster with query complexity O( (µk+ −µ
2 ), and a Las Vegas algorithm with
−)
2
log n
expected query complexity O(n + (µk+ −µ
2 ) even when µ+ , µ− are unknown. (Proof in Sec. 4.2).
−)
5
Many natural distributions such as N (µ+ , 1) and N (µ− , 1) have ∆(N (µ+ , 1)kN (µ− , 1)) =
(µ+ − µ− )2 . But, it is also natural to have distributions where µ+ = µ− but ∆(f+ , f− ) > 0. As
a simple example, consider two discrete distributions with mass 1/4, 1/2, 1/4 and 1/3, 1/3, 1/3
respectively at points 0, 1/2, 1. Their means are the same, but divergence is constant.The
following theorem matches the lower bound upto a log n factor with no assumption on µ+ , µ− .
Theorem 4 (Perfect Oracle+Side Information). Let f+ and f− be pmfs 3 and mini f+ (i),
mini f− (i) ≥ ǫ for a constant ǫ. There exist a Monte Carlo algorithm for Crowd-Cluster with
k 2 log n
) with known f+ and f− , and a Las Vegas algorithm with expected
query complexity O( ∆(f
+ ,f− )
2
k log n
) even when k, f+ and f− are unknown. (Proof in Sec. 4.2).
query complexity O(n log n+ ∆(f
+ ,f− )
To improve from Theorem 3 to Theorem 4, we would need a more precise approach. The
minor restriction that we have on f+ and f− , namely, mini f+ (i), mini f− (i) ≥ ǫ allows
∆(f+ , f− ) ≤ 2ǫ . Note that, by our lower bound result, Lemma 1, it is not possible to achieve
query complexity below k2 .
While our lower bound results assume knowledge of k, f+ and f− , our Las Vegas algorithms
do not even need to know them, and none of the algorithms know k. For Theorem 4, indeed,
either of mini f− (i) or mini f+ (i) having at least ǫ will serve our purpose.
The main idea is as follows. It is much easier to determine whether a vertex belongs to a
cluster, if that cluster has enough number of members. On the other hand, if a vertex v has the
highest membership in some cluster C with a suitable definition of membership, then v should be
queried with C first. For any vertex v and a cluster C, define the empirical “inter” distribution
1
· |{u : wu,v = ai }|. Also compute
pv,C in the following way. For, i = 1, . . . , q,: pv,C (i) = |C|
1
the ‘intra’ distribution pC for i = 1, . . . , q, pC (i) = |C|(|C|−1) · |{(u, v) : u 6= v, wu,v = ai }|. Then
Membership(v, C) = −kpv,C − pC kT V , where kpv,C − pC kT V denotes the total variation distance
between distributions defined in Section 3. If Membership(v, C) is highest for C, then using
Sanov’s Theorem (Theorem 9) it is highly likely that v is in C, if |C| is large enough. However
we do not know f+ or f− . Therefore, the highest membership could be misleading since we
do not know the desired size threshold that C must cross to be reliable. But yet, it is possible
to query a few clusters and determine correctly the one which contains v. The main reason
behind using total variation distance as opposed to divergence, is that divergance is not a metric,
and hence do not satisfy the triangle inequality which becomes crucial in our analysis. This
is the precise reason why we need the minimum value to be at least ǫ in Theorem 4. Under
these restrictions, a close relationship between divergence and total variation distance can be
established using Pinsker’s and Reverse Pinsker’s inequalities (see, Section 3).
For faulty oracle, let us first take the case of no side information (later, we can combine it
with the previous algorithm to obtain similar results with side information). Suppose all V × V
queries have been made. If the maximum likelihood (ML) estimate on G with these n2 query
answers is same as the true clustering of G, then Algorithm 2 finds the true clustering with
high probability. We sample a small graph G′ from G, by asking all possible queries in G′ , and
check for the heaviest weight subgraph (assuming ±1 weight on edges) in G′ . If that subgraph
crosses a desired size, it is removed from G′ . If this cluster is detected correctly, then it has
enough members; we can ask separate queries to them to determine if a vertex belongs to that
cluster. The main effort goes in showing that the computed cluster from G′ is indeed correct,
and that G′ has small size.
Theorem 5 (Faulty Oracle with No Side Information). There exists an algorithm with
query
complexity O( λ12 nk log n) for Crowd-Cluster that returns Ĝ, ML estimate of G with all n2 queries,
with high probability when query answers are incorrect with probability p = 12 − λ. Noting that,
4λ2
, this matches the information theoretic lower bound on the query complexity
D(pk1− p) ≤ 1/2−λ
3
We can handle probability density functions as well for Theorem 4 and Theorem 6, if the quantization error is
small. Our other theorems are valid for f+ and f− being both probability mass functions and density functions.
6
within a log n factor. Moreover, the algorithm returns all the true clusters of G of size at least
36
log n with high probability. (Proof in Sec. 6.1.2).
λ2
Theorem 6 (Faulty Oracle with Side Information). Let f+ , f− be pmfs and
mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. With side information and faulty oracle with
error probability 12 − λ, there exist an algorithm for Crowd-Cluster with query complex2
n
ity O( λ2 k∆(flog
) when f+ , f− known, and an algorithm with expected query complexity
+ ,f− )
2
n
) when f+ , f− unknown, that recover Ĝ, ML estimate of G with all
O(n + λ2 k∆(flog
+ ,f− )
with high probability. (Proof in Sec. 6.1.3).
n
2
queries,
log n
A subtle part of these results is that, the running time is O(k λ2 ), which is optimal assuming
the hardness of planted cliques. However, by increasing the query complexity, the running time
can be reduced to polynomial.
Corollary 2 (Faulty Oracle with/without Side Information). For faulty oracle with error probability 12 − λ, there exists a polynomial time algorithm with query complexity O( λ12 nk2 ) for CrowdCluster that recovers all clusters of size at least O(max { λ12 log n, k}). (Proof in Sec. 6.1.2).
As it turns out the ML estimate of G with all n2 queries is equivalent to computing correlation clustering on G [11, 8, 3, 14, 15]. As a side result, we get a new algorithm for correlation
√
clustering over noisy input, where any cluster of size min (k, n) will be recovered exactly with
√
n
log n
high probability as long as k = Ω( log
λ2 ). When k ∈ [Ω( λ2 ), o( n)], our algorithm strictly
improves over [11, 8].
We hope our work will inspire new algorithmic works in the area of crowdsourcing where
both query complexity and side information are important.
1.2.3
Round Complexity
Finally, we extend all our algorithms to obtain near optimal round complexity.
Theorem 7 (Perfect Oracle with Side Information). There exists an algorithm for CrowdCluster with perfect oracle and unknown side information f+ and f− such that it√achieves a
√
round complexity within Õ(1) factor of the optimum when k = Ω( n) or k = O( ∆(f+nkf− ) ), and
otherwise within Õ( ∆(f+1kf− ) ). (Proof in Sec. 7.1).
Theorem 8 (Faulty Oracle with no Side Information). There exists an algorithm for CrowdCluster with faulty oracle with error probability 21 −λ and no side information such that it achieves
√
a round complexity
within Õ( log n) factor of the optimum that recovers Ĝ, ML estimate of G
with all n2 queries with high probability. (Proof in Sec. 7.2).
This also leads to a new parallel algorithm for correlation clustering over noisy input where
computation in every round is bounded by n log n.
2
Organization of the remaining paper
The rest of the paper is organized as follows. In Section 3, we provide the information theoretic
tools (definitions and basic results) necessary for our upper and lower bounds.
In Section 4 we provide our main upper bound results for the perfect oracle case when f+
and f− are unknown. In Section 5 we give some more insight into the working of Algorithm
1 and for the case when f+ and f− are known, provide near optimal Monte Carlo/Las Vegas
algorithms for Crowd-Cluster with side information and perfect oracle. In Section 6, we consider
the case when crowd may return erroneous answers. In this scenario we give tight lower and
upper bounds on query complexity in both the cases when we have or lack side information.
In Section 7, we show that the algorithms developed for optimizing query complexity naturally
extend to the parallel version of minimizing the round complexity.
7
3
Information Theory Toolbox
The lower bounds for randomized algorithms presented in this paper are all information theoretic.
We also use information theoretic tools of large-deviations in upper bounds. To put these
bounds into perspective, we will need definition of many information theoretic quantities and
some results. Most of this material can also be found in a standard information theory textbook,
such as Cover and Thomas [19].
Definition (Divergence). The Kullback-Leibler divergence, or simply divergence, between two
probability measures P and Q on a set X , is defined to be
D(P kQ) =
Z
X
dP ln
dP
.
dQ
When P and Q are distributions of a continuous random variable, represented by probability
R∞
(x)
fp (x) ln ffpq (x)
densities fp (x) and fq (x) respectively, we have, D(fp kfq ) = −∞
dx. Similarly when
P and Q are discrete random variable taking values in the set X , and represented by the
probability mass functions p(x) and q(x), where x ∈ X respectively, we have D(p(x)kq(x)) =
P
p(x)
x∈X p(x) ln q(x) .
For two Bernoulli distributions with parameters p and q, where 0 ≤ p, q ≤ 1, by abusing the
notation the divergence is written as,
D(pkq) = p ln
1−p
p
+ (1 − p) ln
.
q
1−q
p
1−p
In particular, D(pk1 − p) = p ln 1−p
+ (1 − p) ln 1−p
p = (1 − 2p) ln p . Although D(P kQ) ≥ 0,
with equality when P = Q, note that in general D(P kQ) 6= D(QkP ). Define the symmetric
divergence between two distribution P and Q as,
∆(P, Q) = D(P kQ) + D(QkP ).
The following property of the divergence is going to be useful to us. Consider a set of
random variables X1 , . . . , Xm , and consider the two joint distribution of the random variables,
P m and Qm . When the random variables are independent, let Pi and Qi be the corresponding marginal distribution of the random variable Xi , i = 1, . . . , m. In other words, we have,
Qm
Q
m
P m (x1 , x2 , . . . , xm ) = m
i=1 Qi (xi ). Then we must have,
i=1 Pi (xi ) and Q (x1 , x2 , . . . , xm ) =
m
m
D(P kQ ) =
m
X
i=1
D(Pi kQi ).
(1)
A more general version, when the random variables are not independent, is given by the
chain-rule, described below for discrete random variables.
Lemma 1. Consider a set of discrete random variables X1 , . . . , Xm , and consider the two joint
distribution of the random variables, P and Q. The chain-rule for divergence states that,
D(P (x1 , . . . , xm )kQ(x1 , . . . , xm )) =
m
X
i=1
D(P (xi | x1 , . . . , xi−1 )kQ(xi | x1 , . . . , xi−1 )),
where,
D(P (x|y)kQ(x|y)) =
X
P (Y = y)D(P (x|Y = y)kQ(x|Y = y)).
y
8
Definition (Total Variation Distance). For two probability distributions P and Q defined on a
sample space X and same sigma-algebra F, the total variation distance between them is defined
to be,
kP − QkT V = sup{P (A) − Q(A) : A ∈ F}.
In words, the distance between two distributions is their largest difference over any measurable
set. For finite X total variation distance is half of the ℓ1 distance between pmfs.
The total variation distance and the divergence are related by the Pinsker’s inequality.
Lemma 2 (Pinsker’s inequality). For any two probability measures P and Q,
1
kP − Qk2T V ≤ D(P kQ).
2
It is easy to see that, there cannot be a universal ‘reverse’ Pinsker’s inequality, i.e., an
upper bound on the divergence by the total variation distance (for example, the total variation
distance is always less than 1, while the divergence can be infinity). However, under various
assumptions, such upper bounds have been proposed [48, 20]. For example we provide one such
inequality below.
Lemma 3 (Reverse Pinsker’s inequality[48]). For any two probability measures on finite alphabet X , given by probability mass functions p and q, we must have,
kp − qk2T V ≥
minx∈X q(x)
D(pkq)
2
(2)
This inequality can be derived from Eq.(28) of [48].
A particular basic large-deviation inequality that we use for the upper bounds is Sanov’s
theorem.
Theorem 9 (Sanov’s theorem). Let X1 , . . . , Xn are iid random variables with a finite sample
space X and distribution P . Let P n denote their joint distribution. Let E be a set of probability
P
distributions on X . The empirical distribution P̃n gives probability P̃n (A) = n1 ni=1 1Xi ∈A to
any event A. Then,
P n ({x1 , . . . , xn } : P̃n ∈ E) ≤ (n + 1)|X | exp(−n min
D(P ∗ kP )).
∗
P ∈E
A continuous version of Sanov’s theorem is also possible but we omit here for clarity.
Hoeffding’s inequality for large deviation of sums of bounded independent random variables
is well known [38, Thm. 2].
Lemma 4 (Hoeffding). If X1 , . . . , Xn are independent random variables and ai ≤ Xi ≤ bi for
all i ∈ [n]. Then
Pr(|
n
1X
2n2 t2
).
(Xi − EXi )| ≥ t) ≤ 2 exp(− Pn
2
n i=1
i=1 (bi − ai )
This inequality can be used when the random variables are independently sampled with
replacement from a finite sample space. However due to a result in the same paper [38, Thm.
4], this inequality also holds when the random variables are sampled without replacement from
a finite population.
Lemma 5 (Hoeffding). If X1 , . . . , Xn are random variables sampled without replacement from
a finite set X ⊂ R, and a ≤ x ≤ b for all x ∈ X . Then
Pr(|
n
2nt2
1X
(Xi − EXi )| ≥ t) ≤ 2 exp(−
).
n i=1
(b − a)2
9
Crowd-Cluster with Perfect Oracle
4
In this section, we consider the clustering problem using crowdsourcing when crowd always
returns the correct answers, and there is side information.
4.1
Lower Bound
Recall that there are k clusters in the n-vertex graph. That is G(V, E) is such that, V = ⊔ki=1 Vi
and E = {(i, j) : i, j ∈ Vℓ for some ℓ}. In other words, G is a union of at most k disjoint cliques.
Every entry of the side-information matrix W is generated independently as described in the
introduction. We now prove Theorem 1.
Proof of Theorem 1. We are going to construct an input that any randomized algorithm will
be unable to correctly
j identify
k with positive probability.
1
Suppose, a = ∆(f+ ,f− ) . Consider the situation when we are already given a complete
cluster Vk with n − (k − 1)a elements, remaining (k − 1) clusters each has 1 element, and the
rest (a − 1)(k − 1) elements are evenly distributed (but yet to be assigned) to the k − 1 clusters.
This means each of the smaller clusters has size a each. Note that, we assumed the knowledge
of the number of clusters k.
The side information matrix W = (wi,j ) is provided. Each wi,j are independent random
variables.
Now assume the scenario when we use an algorithm ALG to assigns a vertex to one of the
k − 1 clusters, Vu , u = 1, . . . , k − 1. Note that, for any vertex, l, the side informations wi,j where
i 6= l and j 6= l, do not help in assigning l to a cluster (since in that case wi,j is independent of l).
Therefore, given a vertex l, ALG takes as input the random variables wi,l s where i ∈ ⊔t Vt , and
makes some queries involving l and outputs a cluster index, which is an assignment for l. Based
on the observations wi,l s, the task of algorithm ALG is thus a multi-hypothesis testing among
k − 1 hypotheses. Let Hu , u = 1, . . . k − 1 denote the k − 1 different hypotheses Hu : l ∈ Vu .
And let Pu , u = 1, . . . k − 1 denote the joint probability distributions of the random variables
wi,j s when l ∈ Vu . In short, for any event A, Pu (A) = Pr(A|Hu ). Going forward, the subscript
of probabilities or expectations will denote the appropriate conditional distribution.
For this hypothesis testing problem, let E{Number of queries made by ALG} = T. Then,
there exist t ∈ {1, . . . , k − 1} such that, Et {Number of queries made by ALG} ≤ T. Note that,
k−1
X
v=1
Pt { a query made by ALG involving cluster Vv } ≤ Et {Number of queries made by ALG} ≤ T.
Consider the set
J ′ ≡ {v ∈ {1, . . . , k − 1} : Pt { a query made by ALG involving cluster Vv } <
1
}.
10
1
≤ T, which implies, |J ′ | ≥ k − 1 − 10T.
We must have, (k − 1 − |J ′ |) · 10
Note that, to output a cluster without using the side information, ALG has to either make
a query to the actual cluster the element is from, or query at least k − 2 times. In any other
case, ALG must use the side information (in addition to using queries) to output a cluster. Let
E u denote the event that ALG output cluster Vu by using the side information.
Pk−1
10
Let J ′′ ≡ {u ∈ {1, . . . , k − 1} : Pt (E u ) ≤ k−1
}. Since, u=1
Pt (E u ) ≤ 1, we must have,
(k − 1 − |J ′′ |) ·
We have,
9(k − 1)
10
≤ 1, or |J ′′ | ≥
.
k−1
10
|J ′ ∩ J ′′ | ≥ k − 1 − 10T +
9(k − 1)
9(k − 1)
− (k − 1) =
− 10T.
10
10
10
Now consider two cases.
Case 1: T ≥ 9(k−1)
100 . In this case, average number of queries made by ALG to assign one vertex
to a cluster is at least 9(k−1)
10 . Since there are (k − 1)(a − 1) vertices that needs to be assigned
to clusters, the expected total number of queries performed by ALG is
9(k−1)2 (a−1)
.
10
. In this case, J ′ ∩ J ′′ is nonempty. Assume that we need to assign the
Case 2: T < 9(k−1)
100
vertex j ∈ Vℓ for some ℓ ∈ J ′ ∩ J ′′ to a cluster (Hℓ is the true hypothesis). We now consider the
following two events.
E1 =
n
a query made by ALG involving cluster Vℓ
n
o
o
E2 = k − 2 or more queries were made by ALG .
Note that, if the algorithm ALG can correctly assign j to a cluster without using the side
information then either of E1 or E2 must have to happen. Recall, E ℓ denote the event that ALG
S S
output cluster Vℓ using the side information. Now consider the event E ≡ E ℓ E1 E2 . The
probability of correct assignment is at most Pℓ (E). We have,
Pℓ (E) ≤ Pt (E) + |Pℓ (E) − Pt (E)| ≤ Pt (E) + kPℓ − Pt kT V ≤ Pt (E) +
r
1
D(Pℓ kPt ),
2
where we first used the definition of the total variation distance and in the last step we have
used Pinsker’s inequality (Lemma 2). Now we bound the divergence D(Pℓ kPt ). Recall that Pℓ
and Pt are the joint distributions of the independent random variables wi,j , i ∈ ∪u Vu . Now,
using lemma 1, and noting that the divergence between identical random variables are 0, we
obtain
D(Pℓ kP1 ) ≤ aD(f− kf+ ) + aD(f+ kf− ) = a∆ ≤ 1.
This is true because the only times when wi,jqdiffers under Pt and under Pℓ is when i ∈ Vt or
i ∈ Vℓ . As a result we have, Pℓ (E) ≤ Pt (E) + 12 .
Now, using Markov inequality Pt (E2 ) ≤
T
k−2
≤
Pt (E) ≤ Pt (E ℓ ) + Pt (E1 ) + Pt (E2 ) ≤
9(k−1)
100(k−2)
≤
9
100
+
9
100(k−2) .
Therefore,
10
1
9
9
+
+
+
.
k − 1 10 100 100(k − 2)
19
+
For large enough k, we overall have Pℓ (E) ≤ 100
1
j to the correct cluster with probability at least 10 .
q
1
2
<
9
10 .
This means ALG fails to assign
Considering the above two cases, we can say that any algorithm either makes on average
1
queries, or makes an error with probability at least 10
.
9(k−1)2 (a−1)
10
Note that, in this proof we have not in particular tried to optimize the constants. Corollary
1 follows by noting that to recover the clusters exactly, the query complexity
has to be at least
k
k
(n − k) + 2 . If the number of queries issued is at most (n − k) + 2 − 1, then either there
exists a vertex v in a non-singleton cluster which has not been queried to any other member of
that same cluster, or there exist two clusters such that no inter-cluster edge across them have
been queried.
4.2
Upper Bound
We do not know k, f+ , f− , µ+ , or µ− , and our goal, in this section, is to design an algorithm
with optimum query complexity for exact reconstruction of the clusters with probability 1. We
are provided with the side information matrix W = (wi,j ) as an input. Let θgap = µ+ − µ− .
11
The algorithm uses a subroutine called Membership that takes as input a vertex v and a
subset of vertices C ⊆ V.
PAt this point, let the membership of a vertex v in cluster C is defined
wv,u
as follows: avg(v, C) = u∈C
, and we use Membership(v, C) = avg(v, C).
|C|
The pseudocode of the algorithm is given in Algorithm 1. The algorithm works as follows.
Let C1 , C2 , ..., Cl be the current clusters in nonincreasing order of size. We find the minimum
index j ∈ [1, l] such that there exists a vertex v not yet clustered, with the highest average
membership to Cj , that is Membership(v, Cj )≥Membership(v, Cj ′ ), ∀j ′ 6= j, and j is the smallest
index for which such a v exists. We first check if v ∈ Cj by querying v with any current member
of Cj . If not, then we group the clusters C1 , C2 , .., Cj−1 in at most ⌈log n⌉ groups such that
1 | |C1 |
, 2i ). For each group, we pick the cluster which
clusters in group i has size in the range [ 2|Ci−1
has the highest average membership with respect to v, and check by querying whether v belongs
to that cluster. Even after this, if the membership of v is not resolved, then we query v with
one member of each of the clusters that we have not checked with previously. If v is still not
clustered, then we create a new singleton cluster with v as its sole member.
We now give a proof of the Las Vegas part of Theorem 3 here using Algorithm 1, and defer
the more formal discussions on the Monte Carlo part to the next section.
Proof of Theorem 3, Las Vegas Algorithm. First, The algorithm never includes a vertex in a
cluster without querying it with at least one member of that cluster. Therefore, the clusters
constructed by our algorithm are always proper subsets of the original clusters. Moreover, the
algorithm never creates a new cluster with a vertex v before first querying it with all the existing
clusters. Hence, it is not possible that two clusters produced by our algorithm can be merged.
Let C1 , C2 , ..., Cl be the current non-empty clusters that are formed by Algorithm 1, for some
l ≤ k. Note that Algorithm 1 does not know k. Let without loss of generality |C1 | ≥ |C2 | ≥ ... ≥
n
.
|Cl |. Let there exists an index i ≤ l such that |C1 | ≥ |C2 | ≥ · · · ≥ |Ci | ≥ M , where M = 6θlog
2
gap
Of course, the algorithm does not know either i or M . If even |C1 | < M , then i = 0. Suppose j ′
is the minimum index such that there exists a vertex v with highest average membership in Cj ′ .
There are few cases to consider based on j ′ ≤ i, or j ′ > i and the cluster that truly contains v.
Case 1. v truly belongs to Cj ′ . In that case, we just make one query between v and an
existing member of Cj ′ and the first query is successful.
Case 2. j ′ ≤ i and v belongs to Cj , j 6= j ′ for some j ∈ {1, . . . , i}. Let avg(v, Cj )
and avg(v, Cj ′ ) be the average membership of v to Cj , and Cj ′ respectively. Then we have
avg(v, Cj ′ ) ≥ avg(v, Cj ), that is Membership(v, Cj′ )≥Membership(v, Cj ). This is only possible if
θ
θ
gap
′
either avg(v, Cj ′ ) ≥ µr + gap
2 or avg(v, Cj ) ≤ µg − 2 . Since both Cj and Cj have at least
M current members, then using the Chernoff-Hoeffding’s bound (Lemma 4) followed by union
bound this happens with probability at most n23 . Therefore, the expected number of queries
involving v before its membership gets determined is ≤ 1 + n23 k < 2.
Case 4. v belongs to Cj , j 6= j ′ for some j > i. In this case the algorithm may make k
queries involving v before its membership gets determined.
Case 5. j ′ > i, and v belongs to Cj for some j ≤ i. In this case, there exists no v with its
highest membership in C1 , C2 , ..., Ci .
Suppose C1 , C2 , ..., Cj′ are contained in groups H1 , H2 , ..., Hs where s ≤ ⌈log n⌉. Let Cj ∈
1|
Ht , t ∈ [1, s]. Therefore, |Cj | ∈ [ 2|Ct−1
, |C21t | ]. If |Cj | ≥ 2M , then all the clusters in group Ht
have size at least M . Now with probability at least 1 − n22 , avg(v, Cj ) ≥ avg(v, Cj ′′ ), that is
Membership(v, Cj )≥Membership(v, Cj ′′ ) for every cluster Cj ′′ ∈ Ht . In that case, the membership
of v is determined within at most ⌈log n⌉ queries. Otherwise, with probability at most n22 , there
may be k queries to determine the membership of v.
Therefore, once a cluster has grown to size 2M , the number of queries to resolve the membership of any vertex in those clusters is at most ⌈log n⌉ with probability at least 1− n2 . Hence, for at
most 2kM elements, the number of queries made to resolve their membership can be k. Thus the
12
2
log n
expected number of queries made by Algorithm 1 is O(n log n + M k2 ) = O(n log n + (µk+ −µ
2 ).
−)
Moreover, if we knew µ+ and µ− , we can calculate M , and thus whenever a clusters grows to
size M , remaining of its members can be included in that cluster without making any error with
high probability. This leads to Theorem 3.
We can strengthen this algorithm by changing the subroutine Membership in the following
way. Assume that f+ , f− are discrete distributions over q points a1 , a2 , . . . , aq ; that is wi,j takes
value in the set {a1 , a2 , . . . , aq } ⊂ [0, 1].
The subroutine Membership takes v ∈ V and C ⊆ V \ {v} as inputs. Compute the ‘inter’
1
· |{u : wu,v = ai }|.
distribution pv,C for i = 1, . . . , q, pv,C (i) = |C|
1
Also compute the ‘intra’ distribution pC for i = 1, . . . , q, pC (i) = |C|(|C|−1)
· |{(u, v) : u 6=
v, wu,v = ai }|. Then define Membership(v, C) = −kpv,C −pC kT V . Note that, since the membership
is always negative, a higher membership implies that the ‘inter’ and ‘intra’ distributions are
closer in terms of total variation distance. With this modification in the subroutine we can
prove what is claimed in Theorem 4.
The analysis for this case proceeds exactly as above. However, to compare memberships we
use Lemma 6 below. Indeed, Lemma 6 can be used in the cases 2 and 5 in lieu of ChernoffHoeffding bounds to obtain the exact same result.
Lemma 6. Suppose, C, C ′ ⊆ V , C ∩ C ′ = ∅ and |C| ≥ M, |C ′ | ≥ M =
mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. Then,
Pr Membership(v, C ′ ) ≥ Membership(v, C) | v ∈ C ≤
16 log n
ǫ∆(f+ ,f− ) ,
with where
4
.
n3
Proof. Let β = kf+ −f2− kT V . If Membership(v, C ′ ) ≥ Membership(v, C) then we must have, kpv,C ′ −
pC ′ kT V ≤ kpv,C − pC kT V . This means, either kpv,C ′ − pC ′ kT V ≤ β2 or kpv,C − pC kT V ≥ β2 . Now,
using triangle inequality,
Pr kpv,C ′ − pC ′ kT V ≤
≤ Pr kpv,C ′ − f+ kT V
β
β
≤ Pr kpv,C ′ − f+ kT V − kpC ′ − f+ kT V ≤
2
2
β
β
≤ β or kpC ′ − f+ kT V ≥
≤ Pr kpv,C ′ − f+ kT V ≤ β + Pr kpC ′ − f+ kT V ≥
.
2
2
Similarly,
Pr kpv,C − pC kT V ≥
≤ Pr kpv,C − f+ kT V
β
β
≤ Pr kpv,C − f+ kT V + kpC − f+ kT V ≥
2
2
β
β
β
β
≥ or kpC − f+ kT V ≥
≤ Pr kpv,C − f+ kT V ≥
+ Pr kpC − f+ kT V ≥
.
4
4
4
4
Now, using Sanov’s theorem (Theorem 9), we have,
Pr kpv,C ′ − f+ kT V ≤ β ≤ (M + 1)q exp(−M
min
p:kp−f+ kT V ≤β
D(pkf− )).
At the optimizing p of the exponent,
D(pkf− ) ≥ 2kp − f− k2T V
from Pinsker’s Inequality (Lemma 2)
2
≥ 2(kf+ − f− kT V − kp − f+ kT V )
from using triangle inequality
2
≥ 2(2β − β)
kf+ − f− k2T V
2
ǫ
≥ max{D(f+ kf− ), D(f− kf+ )}
2
from noting the value of β
=
from reverse Pinsker’s inequality (Lemma 3)
13
ǫ∆(f+ , f− )
4
Again, using Sanov’s theorem (Theorem 9), we have,
≥
Pr kpC ′ − f+ kT V ≥
β
≤ (M + 1)q exp(−M
min
D(pkf+ )).
2
p:kp−f+ kT V ≥ β2
At the optimizing p of the exponent,
D(pkf+ ) ≥ 2kp − f+ k2T V
≥
from Pinsker’s Inequality (Lemma 2)
β2
from noting the value of β
2
kf+ − f− k2T V
=
8
ǫ
≥ max{D(f+ kf− ), D(f− kf+ )} from reverse Pinsker’s inequality (Lemma 3)
8
ǫ∆(f+ , f− )
≥
16
Now substituting this in the exponent, using the value of M and doing the same exercise
for the other two probabilities we get the claim of the lemma.
5
Crowd-Cluster with Perfect Oracle: Known f+, f−
In this section, we take a closer look at the results presented in Section 4. Recall that, we
have an undirected graph G(V ≡ [n], E), such that G is a union of k disjoint cliques Gi (Vi , Ei ),
i = 1, . . . , k, but the subsets Vi ∈ [n] and E are unknown to us. The goal is to determine these
clusters accurately (with probability 1) by making minimum number of pair-wise queries. As a
side information, we are given W which represents the similarity values that are computed by
some automated algorithm, and therefore reflects only a noisy version of the true similarities
({0, 1}). Based on the sophistication of the automated algorithm, and the amount of information
available to it, the densities f+ and f− will vary. We have provided a lower bound for this in
Section 4.
In Algorithm 1, we do not know k, f+ , f− , µ+ , or µ− , and our goal was to achieve optimum
query complexity for exact reconstruction of the clusters with probability 1. In this section we
are going to provide a simpler algorithm that has the knowledge of µ+ , µ− or even f+ , f− , and
show that we can achieve optimal query complexity.
Let µ+ − µ− ≥ θgap , and we select a parameter M satisfying
M=
6 log n
.
2
θgap
The simpler algorithm, referred to as Algorithm (1-a), contains two phases, that are repeated
as long as there are vertices that have not yet been clustered.
Querying Phase. The algorithm maintains a list of active clusters which contain at least
one vertex but whose current size is strictly less than M . For every v which has not yet been
assigned to any cluster, the algorithm checks by querying to the oracle whether v belongs to
any of the cluster in the list. If not, it opens a new cluster with v as its sole member, and add
that cluster to the list.
Estimation Phase. If the size of any cluster, say C in the list becomes M , then the cluster
is removed from the list, and the algorithm enters an estimation phase with C. For every vertex
v which has not yet been clustered, it computes the average membership score of v in C as
θgap
1 P
avg(v, C) = |C|
u wu,v . If avg(v, C) ≥ µ+ − 2 , then include v in C. After this phase, mark C
as final and inactive.
14
Algorithm 1 Crowd-Cluster with Side Information. Input: {V, W } (Note: O is the perfect
oracle.
⊲ Initialization.
1: Pick an arbitrary vertex v and create a new cluster {v}. Set V = V \ v
2: while V 6= ∅ do
⊲ Let the number of current clusters be l ≥ 1
3:
Order the existing clusters in nonincreasing size.
⊲ Let |C1 | ≥ |C2 | ≥ . . . ≥ |Cl | be the ordering (w.l.o.g).
4:
for j = 1 to l do
5:
If ∃v ∈ V such that j = maxi∈[1,l] Membership(v, Ci ), then select v and Break;
6:
end for
7:
O(v, u) where u ∈ Cj
8:
if O(v, u) == “ + 1” then
9:
Include v in Cj . V = V \ v
10:
else
⊲ logarithmic search for membership in the large groups. Note s ≤ ⌈log n⌉
11:
Group C1 , C2 , ..., Cj−1 into s consecutive classes H1 , H2 , ..., Hs such that the clusters
1 | |C1 |
, 2i )
in group Hi have their current sizes in the range [ 2|Ci−1
12:
for i = 1 to s do
13:
j = maxa:Ca ∈Hi Membership(v, Ca )
14:
O(v, u) where u ∈ Cj .
15:
if O(v, u) == “ + 1” then
16:
Include v in Cj . V = V \ v. Break.
17:
end if
18:
end for
⊲ exhaustive search for membership in the remaining groups
19:
if v ∈ V then
20:
for i = 1 to l + 1 do
21:
if i = l + 1 then
⊲ v does not belong to any of the existing clusters
22:
Create a new cluster {v}. Set V = V \ v
23:
else
24:
if ∄u ∈ Ci such that (u, v) has already been queried then
25:
O(v, u)
26:
if O(v, u) == “ + 1” then
27:
Include v in Cj . V = V \ v. Break.
28:
end if
29:
end if
30:
end if
31:
end for
32:
end if
33:
end if
34: end while
15
Lemma 7. The total number of queries made by Algorithm (1-a) is at most k2 M .
Proof. Suppose, there are k′ clusters of size at least M . The number of queries made in the
querying phase to populate these clusters is at most M k′ · k. For the remaining (k − k′ ) clusters,
their size is at most (M − 1), and again the number of queries made to populate them is at
most (M − 1)(k − k′ ) · k. Hence, the total number of queries made during the querying phases is
k2 M . Furthermore, no queries are made during the estimation phases, and we get the desired
bound.
Lemma 8. Algorithm (1-a) retrieves the original clusters with probability at least 1 − n2 .
Proof. Any vertex that is included to an active cluster, must have got a positive answer from
a query during the querying phase. Now consider the estimation phase. If u, v ∈ V belong to
the same cluster C, then wu,v ∼ f+ , else wu,v ∼ f− . Therefore, E[wu,v | u, v ∈ C] = µ+ and
E[wu,v | u ∈ C, v ∈
/ C] = µ− . Then, by the Chernoff-Hoeffding bound (Lemma 4),
Pr avg(v, C) < µ+ −
And similarly,
2
M θgap
1
θgap
|v ∈ C ≤ e− 2 ≤ 3 .
2
n
M θ2
1
θgap
− 2gap
| v 6∈ C ≤ e
≤ 3.
Pr avg(v, C) > µ− +
2
n
Therefore by union bound, for every vertex that is included in C during the estimation phase
truly belongs to it, and any vertex that is not included in C truly does not belong to it with
probability ≥ 1− n22 . Or, the probability that the cluster C is not correctly constructed is at most
2
n2 . Since, there could be at most n clusters, the probability that there exists one incorrectly
constructed cluster is at most n2 . Note that, any cluster that never enters the estimation
phase is always constructed correctly, and any cluster that enters the estimation phase is fully
constructed before moving to a new unclustered vertex. Therefore, if a new cluster is formed
in the querying phase with v, then v cannot be included to any existing clusters assuming the
clusters grown in the estimation phases are correct. Hence, Algorithm (1-a) correctly retrieves
the clusters with probability at least 1 − n2 .
So far, Algorithm (1-a) has been a Monte Carlo algorithm. In order to turn it into a Las
Vegas algorithm, we make the following modifications.
θ
• In the estimation phase with cluster C, if avg (v, C) ≥ µ+ − gap
2 , then we query v with
some member of C. If that returns +1 (i.e., the edge is present), then we include v, else,
we query v with one member of every remaining clusters (active and inactive). If none of
these queries returns +1, then a singleton cluster with v is created, and included in the
active list. We then proceed to the next vertex in the estimation phase.
Clearly, this modified Algorithm (1-a) retrieves all clusters correctly and it is a Las Vegas
algorithm. We now analyze the expected number of queries made by the algorithm in the
estimation phase.
Lemma 9. The modified Las Vegas Algorithm (1-a) makes at most n + 2 queries on expectation
during the estimation phase.
Proof. In the estimation phase, only 1 query is made with v while determining its membership
if indeed v belongs to cluster C when avg (v, C) ≥ µ+ − θgap
2 . Now this happens with probability
at least 1 − n22 . With the remaining probability, at most (k − 1) ≤ n extra queries may be
made with v. At the end of this, either v is included in a cluster, or a new singleton cluster is
formed with v. Therefore, the expected number of queries made with v, at the end of which
the membership of v is determined is at most 1 + 2(k−1)
n2 . Hence the expected number of total
queries made by Algorithm (1-a) in the estimation phase is at most n + 2.
16
Theorem 10. With known µ+ and µ− , there exist a Monte Carlo algorithm for Crowd2 log n
Cluster with query complexity O( (µk+ −µ
2 ) and a Las Vegas algorithm with expected query com−)
plexity O(n +
k 2 log n
(µ+ −µ− )2 ).
Comparing with the Lower Bound.
Example 1. The KL-divergence between two univariate normal distributions with means
µ1 and µ2 , and standard deviations
σ1 and σ2 respectively can be calculated as
σ12 +(µ1 −µ2 )2
σ1
D(N (µ1 , σ1 )kN (µ2 , σ2 )) = log σ2 +
− 12 . Therefore ∆(f+ , f− ) = (µ+ − µ− )2 .
2σ2
2
Algorithm (1-a) is optimal under these natural distributions within a log n factor.
Example 2.
f− (x) =
(
(1 + ǫ)
(1 − ǫ)
if 0 ≤ x < 12
if 1 ≥ x ≥ 12 ;
f+ (x) =
(
(1 − ǫ)
(1 + ǫ)
if 0 ≤ x < 12
if 1 ≥ x ≥ 12 .
That is, they are derived by perturbing the uniform distribution slightly so that f+ puts
slightly higher mass when x ≥ 12 , and f− puts slightly higher mass when x < 21 .
R 1/2
1
(1 − ǫ) dx = 1. Similarly, 01 f+ (x) dx = 1, that
Note that 01 f− (x) dx = 0 (1 + ǫ) dx + 1/2
is they represent valid probability density functions.
We have
Z 1
2−ǫ
1 ǫ
(1 + ǫ) 3(1 − ǫ)
+
=
= −
xf− (x) dx =
µ− =
8
8
4
2 4
0
and
Z 1
2+ǫ
1 ǫ
(1 − ǫ) 3(1 + ǫ)
+
=
= + .
µ+ =
xf+ (x) dx =
8
8
4
2 4
0
R
R
R
Thereby, µ+ − µ− = 2ǫ . Moreover
D(f+ kf− ) =
Z
0
1/2
(1 − ǫ) log
1−ǫ
dx +
1+ǫ
Z
1
(1 + ǫ) log
1/2
1+ǫ
1+ǫ
dx = ǫ log
= O(ǫ2 )
1−ǫ
1−ǫ
Therefore, again Algorithm (1-a) is optimal under these distributions within a log n factor.
Improving Algorithm (1-a) to match the lower bound. We will now show a way to
achieve the lower bound in the Crowd-Cluster up to a logarithmic term (while matching the
denominator) by modifying Algorithm (1-a). We first do this by assuming f+ , f− to be discrete
distributions over q points a1 , a2 , . . . , aq . So, wi,j takes value in the set {a1 , a2 , . . . , aq }.
Theorem 11. With known f+ and f− such that mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ,
k 2 log n
) and a
there exist a Monte Carlo algorithm for Crowd-Cluster with query complexity O( ∆(f
+ ,f− )
Las Vegas algorithm with expected query complexity O(n +
k 2 log n
∆(f+ ,f− ) ).
Indeed, either of mini f− (i) or mini f+ (i) strictly greater than 0 will serve our purpose. We
have argued before that it is not so restrictive condition.
Proof of Theorem 11. For any vertex v and a cluster C, define the empirical distribution pv,C in
the following way. For, i = 1, . . . , q,
pv,C (i) =
1
· |{u : wu,v = ai }|.
|C|
17
Now modify Algorithm (1-a) as follows. The querying phase of the algorithm remains exactly
same. In the estimation phase for a cluster C and an unassigned vertex v, include v in C if
D(pv,C kf+ ) < D(pv,C kf− ).
Everything else remains same.
Now, a vertex v ∈ C will be erroneously not assigned to it with probability
Pr D(pv,C kf+ ) ≥ D(pv,C kf− ) | v ∈ C = f+ {pv,C : D(pv,C kf+ ) ≥ D(pv,C kf− )}
= (M + 1)q exp(−M
min
p:D(pkf+ )≥D(pkf− )
D(pkf+ )),
where in the last step we have used Sanov’s theorem (see, Theorem 9). Due to lemma 10, we
can replace the constraint of the optimization in the exponent above by an equality.
Hence,
Pr D(pv,C kf+ ) ≥ D(pv,C kf− ) | v ∈ C ≤ (M + 1)q+1 exp(−M
whenever
min
D(pkf+ )) ≤
p:D(pkf+ )=D(pkf− )
1
,
n3
8 log n
.
min
D(pkf+ )
M=
p:D(pkf+ )=D(pkf− )
This value of M is also sufficient to have,
Pr D(pv,C kf+ ) < D(pv,C kf− ) | v ∈
/C ≤
1
.
n3
While the rest of the analysis stays same as before, the overall query complexity of this modified
algorithm is
k2 log n
O
.
min
D(pkf+ )
p:D(pkf+ )=D(pkf− )
If the divergence were a distance then in the denominator above we would have got D(f+ kf− )/2
and that would be same as the lower bound we have obtained. However, since that is not the
case, we rely on the following chain of inequalities instead at the optimizing point of p.
D(pkf+ ) + D(pkf− )
≥ kp − f+ k2T V + kp − f− k2T V
2
+ kp − f− kT V )2
kf+ − f− k2T V
≥
,
2
2
D(pkf+ ) = D(pkf− ) =
≥
(kp − f+ kT V
where we have used the Pinsker’s inequality (Lemma 2), the convexity of the function x2 and
the triangle inequality for the total variation distance respectively. Now as the last step we use
the reverse Pinsker’s inequality (Lemma 3) to obtain,
kf+ − f− k2T V ≥
ǫ
ǫ∆(f+ , f− )
max{D(f+ kf− ), D(f− kf+ )} ≥
.
2
2
This completes the proof.
Lemma 10.
min
p:D(pkf+ )≥D(pkf− )
D(pkf+ ) =
18
min
D(pkf+ ).
p:D(pkf+ )=D(pkf− )
Proof. Since the condition D(pkf+ ) ≥ D(pkf− ) can be written as
to solve the constrained optimization
P
f− (i)
i p(i) ln f+ (i)
min D(pkf+ )
p
such that
X
i
p(i) ln
f− (i)
≥ 0.
f+ (i)
≥ 0 we need
(3)
(4)
We claim that the inequality of (4) can be replaced by an equality without any change
in the optimizing value. Suppose this is not true and the optimizing value p̃ is such that
P
f− (i)
i p̃(i) ln f+ (i) = ǫ > 0.
Let, λ = ǫ+D(fǫ− kf+ ) ∈ (0, 1). Note that for the value p∗ = λf+ + (1 − λ)p̃ we have,
s
X
p∗ (i) ln
i
f− (i)
= −λD(f+ kf− ) + (1 − λ)ǫ = 0.
f+ (i)
However, since D(pkf+ ) is a strictly convex function of p, we must have,
D(p∗ kf+ ) < λD(f+ kf+ ) + (1 − λ)D(p̃kf+ ) = (1 − λ)D(p̃kf+ ),
which is a contradiction of p̃ being the optimizing value.
6
Crowd-Cluster with Faulty Oracle
We now consider the case when crowd may return erroneous answers. We do not allow resampling of the same query. By resampling one can always get correct answer for each query with
high probability followed by which we can simply apply the algorithms for the perfect oracle.
Hence, the oracle can be queried with a particular tuple only once in our setting.
6.1
6.1.1
No Side Information
Lower bound for the faulty-oracle model
Suppose, G(V, E) is a union of k disjoint cliques as before. We have, V = ⊔ki=1 Vi . We consider
the following faulty-oracle model. We can query the oracle whether there exists an edge between
vertex i and j. The oracle will give the correct answer with probability 1 − p and will give the
incorrect answer with probability p. We would like to estimate the minimum number of queries
one must make to the oracle so that we can recover the clusters with high probability. In this
section we forbid the use of any side information that may be obtained from an automated
system. The main goal of this section is to prove Theorem 2.
As argued in the introduction, there is a need for a minimum cluster size. If there is no
minimum size requirement on a cluster then the input graph can always consist of multiple
clusters of very small size. Then consider the following two different clusterings. C1 : V =
k−2
k−2
⊔i=1
Vi ⊔ {v1 , v2 } ⊔ {v3 } and C2 : V = ⊔i=1
Vi ⊔ {v1 } ⊔ {v2 , v3 }. Now if one of these two
clusterings are given to us uniformly at random, no matter how many queries we do, we will fail
to recover the correct cluster with probability at least p (recall that, resampling is not allowed).
The argument above does not hold for the case when p = 0. In that case any (randomized)
algorithm has to use (on expectation) O(nk) queries for correct clustering (see the p = 0 case
of Theorem 2 below). While for deterministic algorithm the proof of the above fact is straightforward, for randomized algorithms it was established in [22]. In [22], a clustering was called
balanced if the minimum and maximum sizes of the clusters are only a constant factor way. In
19
particular, [22] observes that, for unbalanced input the lower bound for p = 0 case is easier.
For randomized algorithms and balanced inputs, they left the lower bound as an open problem.
Theorem 2 resolves this as a special case.
Indeed, in Theorem 2, we provide lower bounds for 0 ≤ p < 1/2, assuming inputs such that
either 1) the maximum size of the cluster is within a constant times away from the average size,
or 2) the minimum size of the cluster is a constant fraction of the average size. Note that the
average size of a cluster is nk .
The technique to prove Theorem 2 is similar to the one we have used in Theorem 1. However
we only handle binary random variables here (the answer to the queries). The significant
difference is that, while designing the input we consider a balanced clustering with small sized
clusters we can always fool any algorithm as exemplified above). This removes the constraint
on the algorithm designer on how many times a cluster can be queried with a vertex. While
Lemma 11 shows that enough number of queries must be made with a large number of vertices
V ′ ⊂ V , either of the conditions on minimum or maximum sizes of a cluster ensures that V ′
contains enough vertices that do not satisfy this query requirement.
As mentioned, Lemma 11 is crucial to prove Theorem 2.
Lemma 11. Suppose, there are k clusters. There exist at least 4k
5 clusters such that a vertex v
from any one of these clusters will be assigned to a wrong cluster by any randomized algorithm
k
with positive probability unless the number of queries involving v is more than 10D(pk1−p)
when
p > 0 and
k
10
when p = 0.
Proof. Let us assume that the k clusters are already formed, and we can moreover assume that
all vertices except for the said vertex has already been assigned to a cluster. Note that, queries
that do not involve the said vertex plays no role in this stage.
Now the problem reduces to a hypothesis testing problem where the ith hypothesis Hi for
i = 1, . . . , k, denote that the true cluster is Vi . We can also add a null-hypothesis H0 that
stands for the vertex belonging to none of the clusters. Let Pi denote the joint probability
distribution of our observations (the answers to the queries involving vertex v) when Hi is true,
i = 0, 1, . . . , k. That is for any event A we have,
Pi (A) = Pr(A|Hi ).
Suppose Q denotes the total number of queries made by a (possibly randomized) algorithm
at this stage. Let the random variable Qi denote the number of queries involving cluster
Vi , i = 1, . . . , k.
P
We must have, ki=1 E0 Qi ≤ Q. Let,
J1 ≡ {i ∈ {1, . . . , k} : E0 Qi ≤
10Q
}.
k
9k
Since, (k − |J1 |) 10Q
k ≤ Q, we have |J1 | ≥ 10 .
Let Ei ≡ { the algorithm outputs cluster Vi }. Let
J2 = {i ∈ {1, . . . , n} : P0 (Ei ) ≤
10
}.
k
9k
Moreover, since ki=1 P0 (Ei ) ≤ 1 we must have, (k − |J2 |) 10
k ≤ 1, or |J2 | ≥ 10 . Therefore,
J = J1 ∩ J2 has size,
4k
9k
−k =
.
|J| ≥ 2 ·
10
5
Now let us assume that, we are given a vertex v ∈ Vj for some j ∈ J to cluster. The
probability of correct clustering is Pj (Ej ). We must have,
P
Pj (Ej ) = P0 (Ej ) + Pj (Ej ) − P0 (Ej ) ≤
20
10
+ |P0 (Ej ) − Pj (Ej )|
k
10
10
≤
+ kP0 − Pj kT V ≤
+
k
k
r
1
D(P0 kPj ).
2
where we again used the definition of the total variation distance and in the last step we have
used the Pinsker’s inequality (lemma 2). The task is now to bound the divergence D(P0 kPj ).
Recall that P0 and Pj are the joint distributions of the independent random variables (answers to
queries) that are identical to one of two Bernoulli random variables:Y , which is Bernoulli(p), or
Z, which is Bernoulli(1 − p). Let X1 , . . . , XQ denote the outputs of the queries, all independent
random variables. We must have, from the chain rule (lemma 1),
D(P0 kPj ) =
=
Q
X
i=1
Q
X
D(P0 (xi |x1 , . . . , xi−1 )kPj (xi |x1 , . . . , xi−1 ))
X
i=1 (x1 ,...,xi−1 )∈{0,1}i−1
P0 (x1 , . . . , xi−1 )D(P0 (xi |x1 , . . . , xi−1 )kPj (xi |x1 , . . . , xi−1 )).
Note that, for the random variable Xi , the term D(P0 (xi |x1 , . . . , xi−1 )kPj (xi |x1 , . . . , xi−1 )) will
contribute to D(pk1 − p) only when the query involves the cluster Vj . Otherwise the term will
contribute to 0. Hence,
D(P0 kPj ) =
Q
X
X
i=1 (x1 ,...,xi−1 )∈{0,1}i−1 :ith query involves Vj
= D(pk1 − p)
Q
X
= D(pk1 − p)
Q
X
P0 (x1 , . . . , xi−1 )D(pk1 − p)
X
P0 (x1 , . . . , xi−1 )
i=1 (x1 ,...,xi−1 )∈{0,1}i−1 :ith query involves Vj
i=1
P0 (ith query involves Vj ) = D(pk1 − p)E0 Qj ≤
10Q
D(pk1 − p).
k
Now plugging this in,
10
+
D(P0 kPj ) ≤
k
if Q ≤
10Q
k
k
10D(pk1−p) .
s
10
1 10Q
D(pk1 − p) ≤
+
2 k
k
r
1
,
2
On the other hand, when p = 0, Pj (Ej ) < 1 when E0 Qj < 1. Therefore
≥ 1 whenever p = 0.
Now we are ready to prove Theorem 2.
Proof of Theorem 2. We will show that claim by considering any input, with a restriction on
either the maximum or the minimum cluster size. We consider the following two cases for the
proof.
Case 1: the maximum size of a cluster is ≤
4n
k .
Suppose, total number of queries is = T . That means number of vertices involved in the
queries is ≤ 2T . Note that, there are k clusters and n elements.
Let U be the set of vertices that are involved in less than 16T
n queries. Clearly,
(n − |U |)
16T
≤ 2T,
n
or |U | ≥
7n
.
8
Now we know from Lemma 11 that there exists 4k
5 clusters such that a vertex v from any one
of these clusters will be assigned to a wrong cluster by any randomized algorithm with positive
21
probability unless the expected number of queries involving this vertex is more than
k
10D(pk1−p) ,
k
for p > 0, and 10
when p = 0.
We claim that U must have an intersection with at least one of these 4k
5 clusters. If not,
7n
4k
k
then more than 8 vertices must belong to less than k − 5 = 5 clusters. Or the maximum size
4n
of a cluster will be 7n·5
8k > k , which is prohibited according to our assumption.
Consider the case, p > 0. Now each vertex in the intersection of U and the 4k
5 clusters
k
are going to be assigned to an incorrect cluster with positive probability if, 16T
≤
n
10D(pk1−p) .
Therefore we must have
nk
.
T ≥
160D(pk1 − p)
Similarly, when p = 0 we must have, T ≥
nk
160 .
n
.
Case 2: the minimum size of a cluster is ≥ 20k
′
Let U be the set of clusters that are involved in at most 16T
k queries. That means, (k −
16T
7k
′
′
|U |) k ≤ 2T. This implies, |U | ≥ 8 .
∗
Now we know from lemma 11 that there exists 4k
5 clusters (say U ) such that a vertex v
from any one of these clusters will be assigned to a wrong cluster by any randomized algorithm
with positive probability unless the expected number of queries involving this vertex is more
k
k
, p > 0 and 10
for p = 0.
than 10D(pk1−p)
4k
27k
Quite clearly |U ∗ ∩ U | ≥ 7k
8 + 5 − k = 40 .
∗
Consider a cluster Vi such that i ∈ U ∩ U , which is always possible because the intersection
is nonempty. Vi is involved in at most 16T
k queries. Let the minimum size of any cluster be t.
Now, at least half of the vertices of Vi must each be involved in at most 32T
kt queries. Now each
k
of these vertices must be involved in at least 10D(pk1−p)
queries (see Lemma 11) to avoid being
assigned to a wrong cluster with positive probability (for the case of p = 0 this number would
k
).
be 10
This means,
nk
k
32T
≥
,
or T = Ω
,
kt
10D(pk1 − p)
D(pk1 − p)
for p > 0, since t ≥
6.1.2
n
20k .
Similarly when p = 0 we need T = Ω(nk).
Upper Bound
Now we provide an algorithm to retrieve the clustering with the help of the faulty oracle when
no side information is present. The algorithm is summarized in Algorithm 2. The algorithm
works as follows. It maintains an active list of clusters A, and a sample graph G′ = (V ′ , E ′ )
which is an induced subgraph of G. Initially, both of them are empty. The algorithm always
maintains the invariant that any cluster in A has at least c log n members where c = λ62 , and
p = 21 − λ. Note that the algorithm knows λ. Furthermore, all V ′ (G′ ) × V ′ (G′ ) queries have
been made. Now, when a vertex v is considered by the algorithm (step 3), first we check if v
can be included in any of the clusters in A. This is done by picking c log n distinct members
from each cluster, and querying v with them. If majority of these questions return +1, then
v is included in that cluster, and we proceed to the next vertex. Otherwise, if v cannot be
included in any of the clusters in A, then we add it to V ′ (G′ ), and ask all possible queries to
the rest of the vertices in G′ with v. Once G′ has been modified, we extract the heaviest weight
subgraph from G′ where weight on an edge (u, v) ∈ E(G′ ) is defined as ωu,v = +1 if the query
answer for that edge is +1 and −1 otherwise. If that subgraph contains c log n members then
we include it as a cluster in A. At that time, we also check whether any other vertex u in G′
can join this newly formed cluster by counting if the majority of the (already) queried edges to
22
this new cluster gave answer +1. At the end, all the clusters in A, and the maximum likelihood
clustering from G′ is returned.
Before showing the correctness of Algorithm 2, we elaborate on finding the maximum likelihood estimate for the clusters in G.
Finding the Maximum Likelihood Clustering of G with faulty oracle We have an
undirected graph G(V ≡ [n], E), such that G is a union of k disjoint cliques Gi (Vi , Ei ), i =
1, . . . , k. The subsets Vi ∈ [n] are unknown to us. The adjacency matrix of G is a block-diagonal
matrix. Let us denote this matrix by A = (ai,j ).
Now suppose, each edge of G is erased independently with probability p, and at the same
time each non-edge is replaced with an edge with probability p. Let the resultant adjacency
matrix of the modified graph be Z = (zi,j ). The aim is to recover A from Z.
The maximum likelihood recovery is given by the following:
max
Sℓ ,ℓ=1,···:V =⊔ℓ Sℓ
=
max
Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ
Y
Y
Y
Y
Y
P+ (zi,j )
r,t,r6=t i∈Sr ,j∈St
ℓ i,j∈Sℓ ,i6=j
ℓ i,j∈Sℓ ,i6=j
Y
P− (zi,j )
P+ (zi,j ) Y
P− (zi,j ).
P− (zi,j ) i,j∈V,i6=j
where, P+ (1) = 1 − p, P+ (0) = p, P− (1) = p, P− (0) = 1 − p. Hence, the ML recovery asks for,
max
Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ
X
X
ln
ℓ i,j∈Sℓ ,i6=j
P+ (zi,j )
.
P− (zi,j )
Note that,
ln
Hence the ML estimation is,
P+ (0)
P+ (1)
p
= − ln
= ln
.
P− (0)
P− (1)
1−p
max
Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ
X
X
ωi,j ,
(5)
ℓ i,j∈Sℓ ,i6=j
where ωi,j = 2zi,j − 1, i 6= j, i.e., ωi,j = 1, when zi,j = 1 and ωi,j = −1 when zi,j = 0, i 6= j.
Further ωi,i = zi,i = 0, i = 1, . . . , n.
Note that (5) is equivalent to finding correlation clustering in G with the objective of maximizing the consistency with the edge labels, that is we want to maximize the total number of
positive intra-cluster edges and total number of negative inter-cluster edges [8, 44, 42]. This
can be seen as follows.
max
Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ
X
X
ωi,j
ℓ i,j∈Sℓ ,i6=j
≡
Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ
=
max
max
Sℓ ,ℓ=1,···:V =⊔ℓ=1 Sℓ
X
X
ℓ i,j∈Sℓ ,i6=j
X
X
(i, j) : ωi,j = +1 − (i, j) : ωi,j = −1 +
(i, j) : ωi,j = +1 +
ℓ i,j∈Sℓ ,i6=j
X
r,t:r6=t
X
i,j∈V,i6=j
(i, j) : ωi,j = −1
(i, j) : i ∈ Sr , j ∈ St , ωi,j = −1 .
Therefore (5) is same as correlation clustering, however viewing it as obtaining clusters with
maximum intra-cluster weight helps us to obtain the desired running time of our algorithm.
Also, note that, we have a random instance of correlation clustering here, and not a worst case
instance.
We are now ready to prove the correctness of Algorithm 2.
23
Algorithm 2 Crowd-Cluster with Error & No Side Information. Input: {V }
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
V ′ = ∅, E ′ = ∅, G′ = (V ′ , E ′ )
A=∅
while ∃v ∈ V yet to be clustered do
for each cluster C ∈ A do
⊲ Set c = λ62 where λ ≡ 12 − p.
Select u1 , u2 , .., ul , where l = c log n, distinct members from C and obtain Op (ui , v),
i = 1, 2, .., l. If the majority of these queries return +, then include v in C. Break.
end for
if v is not included in any cluster in A then
Add v to V ′ . For every u ∈ V ′ \ v, obtain Op (v, u). Add an edge (v, u) to E ′ (G′ )
with weight ωu,v = +1 if Op (u, v) == +1, else with ωu,v = −1
Find the heaviest weight subgraph S in G′ . If |S| ≥ c log n, then add S to the list of
clusters in A, and remove the incident vertices and edges on S from V ′ , E ′ .
P
while ∃z ∈ V ′ with u∈S ωz,u > 0 do
Include z in S and remove z and all edges incident on it from V ′ , E ′ .
end while
end if
end while
return all the clusters formed in A and the ML estimates from G′
Correctness of Algorithm
2 To establish the correctness of Algorithm 2, we show the
following. Suppose all n2 queries
on V × V have been made. If the Maximum Likelihood (ML)
estimate of G with these n2 answers is same as the true clustering of G, then Algorithm 2 finds
the true clustering with high probability. There are few steps to prove the correctness.
The first step is to show that any set S that is retrieved in step 9 of Algorithm 2 from G′ ,
and added to A is a subcluster of G (Lemma 12). This establishes that all clusters in A at any
time are subclusters of some original cluster in G. Next, we show that vertices that are added
to a cluster in A, are added correctly, and no two clusters in A can be merged (Lemma 13).
Therefore, clusters obtained from A, are the true clusters. Finally, the remaining of the clusters
can be retrieved from G′ by computing a ML estimate on G′ in step 15, leading to theorem 12.
Lemma 12. Let c′ = 6c = λ362 , where λ = 12 − p. Algorithm 2 in step 9 returns a subcluster
of G of size at least c log n with high probability if G′ contains a subcluster of G of size at least
c′ log n. Moreover, Algorithm 2 in step 9 does not return any set of vertices of size at least
c log n if G′ does not contain a subcluster of G of size at least c log n.
Proof. Let V ′ = Vi′ , i ∈ [1, k], Vi′ ∩ Vj′ = ∅ for i 6= j, and Vi′ ⊆ Vi (G). Suppose without loss
of generality |V1′ | ≥ |V2′ | ≥ .... ≥ |Vk′ |.
The lemma is proved via a series of claims.
S
Claim 1. Let |V1′ | ≥ c′ log n. Then in step 9, a set S ⊆ Vi for some i ∈ [1, k] will be returned
with size at least c log n with high probability.
For an i : |Vi′ | ≥ c′ log n, we have
E
X
s,t∈Vi′ ,s<t
ωs,t
!
!
|Vi′ |
|Vi′ |
=
((1 − p) − p) = (1 − 2p)
.
2
2
Since ωs,t are independent binary random variables, using the Hoeffding’s inequality (Lemma
24
4),
Pr
X
s,t∈Vi′ ,s<t
ωs,t ≤ E
−
X
ωs,t − u ≤ e
s,t∈Vi′ ,s<t
(
2
u2
|V ′ |
i
2
).
Hence,
Pr
X
s,t∈Vi′ ,s<t
ωs,t > (1 − δ)E
Therefore with high probability
c′2
3 (1
2
P
X
s,t∈Vi′ ,s<t
s,t∈Vi′ ,s<t ωs,t
ωs,t ≥ 1 − e−
> (1 − δ)(1 − 2p)
1
3 ).
− 2p) log n, for an appropriately chosen δ (say δ =
δ 2 (1−2p)2
2
|Vi′ |
2
(define c′′ = c′
q
2(1−2p)
)
3
with high probability - since otherwise
X
c′
ωi,j <
i,j∈S,i<j
q
2(1−2p)
3
!
log n
2
<
.
≥ (1 − δ)(1 − 2p)
c′
So, Algorithm 2 in step (9) must return a set S such that |S| ≥
′
(|V2i |)
q
2(1−2p)
3
c′ log n
2
>
log n = c′′ log n
c′2
(1 − 2p) log2 n.
3
Now let S * Vi for any i. Then S must have intersection with at least 2 clusters. Let
Vi ∩ S = Ci and let j ∗ = arg mini:Ci 6=∅ |Ci |. We claim that,
X
X
ωi,j <
i,j∈S,i<j
ωi,j ,
(6)
i,j∈S\Cj ∗ ,i<j
with high probability. Condition (6) is equivalent to,
X
X
ωi,j +
i,j∈Cj ∗ ,i<j
ωi,j < 0.
i∈Cj ∗ ,j∈S\Cj ∗
However this is true because,
1. E
P
i,j∈Cj ∗ ,i<j ωi,j = (1−2p)
|Cj ∗ |
2
and E
P
i∈Cj ∗ ,j∈S\Cj ∗ ωi,j = −(1−2p)|Cj ∗ |·|S\Cj ∗ |.
√
2. As long as |Cj ∗ | ≥ 2 log n we have, from Hoeffding’s inequality (Lemma 4),
Pr
X
ωi,j
i,j∈Cj ∗ ,i<j
|C ∗ |
λ2 (1−2p)2 ( j )
|Cj ∗ |
2
−
2
= on (1).
≥ (1 + λ)(1 − 2p)
≤e
2
!
While at the same time,
Pr
X
i∈Cj ∗ ,j∈S\Cj ∗
ωi,j ≥ −(1 − λ)(1 − 2p)|Cj ∗ | · |S \ Cj ∗ | ≤ e−
λ2 (1−2p)2 |Cj ∗ |·|S\Cj ∗ |
In this case of course with high probability
X
i,j∈Cj ∗ ,i<j
ωi,j +
X
i∈Cj ∗ ,j∈S\Cj ∗
25
ωi,j < 0.
2
= on (1).
√
3. When |Cj ∗ | < 2 log n, we have,
X
i,j∈Cj ∗ ,i<j
ωi,j ≤
!
|Cj ∗ |
≤ 2 log2 n.
2
While at the same time,
Pr
X
i∈Cj ∗ ,j∈S\Cj ∗
ωi,j ≤ (1 − λ)(1 − 2p)|Cj ∗ | · |S \ Cj ∗ | ≤ e−
λ2 (1−2p)2 |Cj ∗ |·|S\Cj ∗ |
2
= on (1).
Hence, even in this case, with high probability,
X
i,j∈Cj ∗ ,i<j
ωi,j +
X
ωi,j < 0.
i∈Cj ∗ ,j∈S\Cj ∗
Hence (6) is true with high probability. But then the algorithm 2 in step 9 would not return S,
but will return S \ Cj ∗ . Hence, we have run into a contradiction. This means S ⊆ Vi for some
Vi .
q
log n, while |V1′ | ≥ c′ log n. In fact, with high probability, |S| ≥
We know |S| ≥ c′ 2(1−2p)
3
(1−δ) ′
2 c log n.
Since all the vertices in S belong to the same cluster in G, this holds again by the
application of Hoeffding’s inequality. Otherwise, the probability that the weight of S is at least
as high as the weight of V1′ is at most n12 .
Claim 2. If |V1′ | < c log n. then in step 9 of Algorithm 2, no subset of size > c log n will be
returned.
If Algorithm 2 in step 9 returns a set S with |S| > c log n then S must have intersection
with at least 2 clusters in G. Now following the same argument as in Claim 1 to establish Eq.
(6), we arrive to a contradiction, and S cannot be returned.
This establishes the lemma.
Lemma 13. The collection A contains all the true clusters of G of size ≥ c′ log n at the end of
Algorithm 2 with high probability.
Proof. From Lemma 12, any cluster that is computed in step 9 and added to A is a subset
of some original cluster in G, and has size at least c log n with high probability. Moreover,
whenever G′ contains a subcluster of G of size at least c′ log n, it is retrieved by our Algorithm
and added to A.
A vertex v is added to a cluster in A either is step 5 or step 11. Suppose, v has been
added to some cluster C ∈ A. Then in both the cases, |C| ≥ c log n at the time v is added, and
there exist l = c log n distinct members of C, say, u1 , u2 , .., ul such that majority of the queries
of v with these vertices returned +1. By the standard Chernoff-Hoeffding bound (Lemma
2
2λ2
λ2
4), Pr(v ∈
/ C) ≤ exp(−c log n (1−2p)
12p ) = exp(−c log n 3(1+2λ) ) ≤ exp(−c log n 3 ), where the
last inequality followed since λ < 21 . On the other hand, if there exists a cluster C ∈ A
such that v ∈ C, and v has already been considered by the algorithm, then either in step
5 or step 11, v will be added to C. This again follows by the Chernoff-Hoeffding bound, as
2
λ2
λ2
Pr(v not included in C | v ∈ C) ≤ exp(−c log n (1−2p)
8(1−p) ) = exp(−c log n 1+2λ ) ≤ exp(−c log n 2 ).
Therefore, if we set c = λ62 , then for all v, if v is included in a cluster in A, the assignment is
correct with probability at least 1 − n2 . Also, the assignment happens as soon as such a cluster
is formed in A.
Furthermore, two clusters in A cannot be merged. Suppose, if possible there are two clusters
C1 and C2 both of which are proper subset of some original cluster in G. Let without loss of
generality C2 is added later in A. Consider the first vertex v ∈ C2 that is considered by our
26
Algorithm 2 in step 3. If C1 is already there in A at that time, then with high probability v will
be added to C1 in step 5. Therefore, C1 must have been added to A after v has been considered
by our algorithm and added to G′ . Now, at the time C1 is added to A in step 9, v ∈ V ′ , and
again v will be added to C1 with high probability in step 11–thereby giving a contradiction.
This completes the proof of the lemma.
All this leads us to the following theorem.
Theorem 12. If the ML estimate on G with all possible n2 queries return the true clustering,
then Algorithm 2 returns the true clusters with high probability. Moreover, Algorithm 2 returns
all the true clusters of G of size at least c′ log n with high probability.
Proof. From Lemma 12 and Lemma 13, A contains all the true clusters of G of size at least
c′ log n with high probability. Any vertex that is not included in the clusters in A at the end of
Algorithm 2 are in G′ , and G′ contains all possible pairwise queries among them. Clearly, then
the ML estimate of G′ will be the true ML estimate of G restricted to these clusters.
Query Complexity of Algorithm 2
1
2
′
k
Lemma 14. Let p =
− λ. The query complexity of Algorithm 2 is
36nk log n
.
λ2
Proof. Let there be
clusters in A when v is considered in step 3 of Algorithm 2. Then v
is queried with at most ck′ log n current members, c log n each from these k′ clusters. If the
membership of v does not get determined then v is queried with all the vertices in G′ . We
have seen in the correctness proof (Lemma 12) that if G′ contains at least c′ log n vertices from
any original cluster, then ML estimate on G′ retrieves those vertices as a cluster in step 9 with
high probability. Hence, when v is queried with all vertices in G′ , |V ′ | ≤ (k − k′ )c′ log n. Thus
the total number of queries made to determine the membership of v is at most c′ k log n, where
c′ = 6c = λ362 when the error probability p = 12 −λ. This gives the query complexity of Algorithm
2 considering all the vertices.
This matches the lower bound computed in Section 6.1.1 within a log n factor, since D(pk1−
1/2+λ
2λ
4λ2
2
p) = (1 − 2p) ln 1−p
p = 2λ ln 1/2−λ = 2λ ln(1 + 1/2−λ ) ≤ 1/2−λ = O(λ ).
Now combining all these we get the statement of Theorem 5.
Theorem (5). Faulty Oracle with No Side Information. There exists an algorithm with
query
complexity O( λ12 nk log n) for Crowd-Cluster that returns Ĝ, ML estimate of G with all n2 queries,
with high probability when query answers are incorrect with probability p = 12 − λ. Noting that,
4λ2
D(pk1− p) ≤ 1/2−λ
, this matches the information theoretic lower bound on the query complexity
within a log n factor. Moreover, the algorithm returns all the true clusters of G of size at least
36
λ2 log n with high probability.
Running Time of Algorithm 2 and Further Discussions In step 9 of Algorithm 2, we
need to find a large cluster of size at least O( λ12 log n) of the original input G from G′ . By
Lemma 12, if we can extract the heaviest weight subgraph in G′ where edges are labelled ±1,
and that subgraph meets the required size bound, then with high probability, it is a subset of
1
an original cluster. This subset can of course be computed in O(n λ2 log n ) time. Since size of
1
G′ is bounded by O( λk2 log n), the running time is O([ λk2 log n] λ2 log n ). While, query complexity
is independent of running time, it is unlikely that this running time can be improved to a
polynomial. This follows from the planted clique conjecture.
Conjecture 1 (Planted Clique Hardness). Given an Erdős-Rényi random graph G(n, p), with
p = 12 , the planted clique conjecture states that if we plant in G(n, p) a clique of size t where
√
t = [O(log n), o( n)], then there exists no polynomial time algorithm to recover the largest clique
in this planted model.
27
Given such a graph with a planted clique of size t = Θ(log n), we can construct a new graph
H by randomly deleting each edge with probability 13 . Then in H, there is one cluster of size
t where edge error probability is 31 and the remaining clusters are singleton with inter-cluster
edge error probability being (1 − 12 − 61 ) = 31 . So, if we can detect the heaviest weight subgraph
in polynomial time in Algorithm 2, there will be a polynomial time algorithm for the planted
clique problem.
Polynomial time algorithm We can reduce the running time from quasi-polynomial to
polynomial, by paying higher in the query-complexity. Suppose, we accept a subgraph extracted
from G′ as valid and add it to A iff its size is Ω(k). Then note that since G′ can contain at
most k2 vertices, such a subgraph can be obtained in polynomial time following the algorithm
√
of correlation clustering with noisy input [44], where all the clusters of size at least O( n) are
recovered on a n-vertex graph. Since our ML estimate is correlation clustering, we can employ
[44]. For k ≥ λ12 log n, the entire analysis remains valid, and we get a query complexity of
1
1
Õ(nk2 ) as opposed to O( nk
λ2 ). If k < λ2 log n, then clusters that have size less than λ2 log n are
anyway not recoverable. Note that, any cluster that has size less than k are not recovered in
√
√
this process, and this bound only makes sense when k < n. When k ≥ n, we can however
√
recover all clusters of size at least O( n).
Corollary (2). There exists a polynomial time algorithm with query complexity O( λ12 nk2 ) for
Crowd-Cluster when query answers are incorrect with probability 12 −λ, which recovers all clusters
of size at least O(max { λ12 log n, k}) in G.
This also leads to an improved algorithm for correlation clustering over noisy graph. Pre√
viously, the works of [44, 8] can only recover cluster of size at least O( n). However, now if
√
n
k ∈ [Ω( log
λ2 ), o( n)], using this algorithm, we can recover all clusters of size at least k.
6.1.3
With Side Information
The algorithm for Crowd-Cluster with side information when crowd may return erroneous answers
is a direct combination of Algorithm 1 and Algorithm 2. We assume side information is less
accurate than querying because otherwise, querying is not useful. Or in other words ∆(fg , fr ) <
∆(p, 1 − p).
We therefore use only the queried answers to extract the heaviest subgraph from G′ , and
add that to the list A. For the clusters in list A, we follow the strategy of Algorithm 1 to
recover the underlying clusters. The pseudocode is given in Algorithm 3. The correctness of
the algorithm follows directly from the analysis of Algorithm 1 and Algorithm 2.
We now analyze the query complexity. Consider a vertex v which needs to be included in a
cluster. Let there be (r − 1) other vertices from the same cluster as v that have been considered
by the algorithm prior to v.
1. Case 1. r ∈ [1, c log n], the number of queries is at most kc log n. In that case v is added
to G′ according to Algorithm 2.
2. Case 2. r ∈ (c log n, 2M ], the number of queries can be k ∗ c log n. In that case, the cluster
n
). In
that v belongs to is in A, but has not grown to size 2M . Recall M = O( ∆(flog
+ ,f− )
that case, according to Algorithm 1, v may need to be queried with each cluster in A, and
according to Algorithm 2, there can be at most c log n queries for each cluster in A.
3. Case 3. r ∈ (2R, |C|], the number of queries is at most c log n ∗ log n. In that case,
according to Algorithm 1, v may need to be queried with at most ⌈log n⌉ clusters in A,
and according to Algorithm 2, there can be at most c log n queries for each chosen cluster
in A.
28
Hence, the total number of queries per cluster is at most O(kc2 (log n)2 + (2M −
c log n)kc log n + (|C| − 2M )c(log n)2 ). So, over all the clusters, the query complexity is
O(nc(log n)2 + k2 M c log n). Note that, if have instead insisted on a Monte Carlo algorithm
with known f+ and f− , then the query complexity would have been O(k2 M c log n). Recall that
∆(pk(1 − p)) = O(λ2 ).
Theorem (6). Let f+ and f− be pmfs and mini f+ (i), mini f− (i) ≥ ǫ for a constant ǫ. With
side information and faulty oracle with error probability 21 − λ, there exist an algorithm for
2
n
) with known f+ and f− , and an algorithm
Crowd-Cluster with query complexity O( λ2 k∆(flog
+ ,f− )
2
n
with expected query complexity O(n+ λ2 k∆(flog
) even when f+ and f− are unknown that recover
+ ,f− )
Ĝ, ML estimate of G with all
7
n
2
queries with high probability.
Round Complexity
So far we have discussed developing algorithms for Crowd-Cluster where queries are asked adaptively one by one. To use the crowd workers in the most efficient way, it is also important to
incorporate as much parallelism as possible without affecting the query complexity by much. To
formalize this, we allow at most Θ(n log n) queries simultaneously in a round, and then the goal
is to minimize the number or rounds to recover the clusters. We show that the algorithms developed for optimizing query complexity naturally extends to the parallel version of minimizing
the round complexity.
7.1
Crowd-Cluster with Perfect Oracle
When crowd gives correct answers and there is no side information, then it is easy to get a
round complexity of k which is optimal within a log n factor as Ω(nk) is a lower bound on the
query complexity in this case. One can just pick a vertex v, and then for every other vertex
issue a query involving v. This grows the cluster containing v completely. Thus in every round,
one new cluster gets formed fully, resulting in a round complexity of k.
We now explain the main steps of our algorithm when side information W is available.
1. Sample
√
n log n vertices, and ask all possible
√
n log n
2
queries involving them.
2. Suppose C1 , C2 , ..., Cl are the clusters formed so far. Arrange these clusters in nondecreasing size of their current membership. For every vertex v not yet clustered, choose
the cluster Cj with j = maxi∈[1,l] Membership(v, Ci ), and select at most ⌈log n⌉ clusters
using steps (11) and (13) of Algorithm 1. Issue all of these at most n log n queries simultaneously, and based on the results, grow clusters C1 , C2 , ..., Cl .
√
3. Among the vertices that have not been put
into any cluster, pick n log n vertices uni√
formly at random, and ask all possible n 2log n queries involving them. Create clusters
C1′ , C2′ , ..., Cl′′ based on the query results.
′
ll
4. Merge the clusters C1′ , C2′ , ..., Cl′′ with C1 , C2 , ..., Cl by issuing a total of ll′ queries in ⌈ n log
n⌉
rounds. Goto step 2.
Analysis First, the algorithm computes the clusters correctly. Every vertex that is included
in a cluster, is done so based on a query result. Moreover, no clusters in step 2 can be merged.
So all the clusters returned are correct.
We now analyzed the number of rounds required to compute the clusters.
29
Algorithm 3 Crowd-Cluster with Error & Side Information. Input: {V, W }
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
V ′ = ∅, E ′ = ∅, G′ = (V ′ , E ′ ), A = ∅
while V 6= ∅ do
If A is empty, then pick an arbitrary vertex v and Go to Step 23
⊲ Let the number of current clusters in A be l ≥ 1
Order the existing clusters in A in nonincreasing size of current membership.
⊲ Let |C1 | ≥ |C2 | ≥ . . . ≥ |Cl | be the ordering (w.l.o.g).
for j = 1 to l do
If ∃v ∈ V such that j = maxi∈[1,l] Membership(v, Ci ), then select v and Break;
end for
Select u1 , u2 , .., ul ∈ Cj , where l = c log n, distinct members from Cj and obtain Op (ui , v),
i = 1, 2, .., l. checked(v, j) = true
if the majority of these queries return +1 then
Include v in Cj . V = V \ v
else
⊲ logarithmic search for membership in the large groups. Note s ≤ ⌈log k⌉
Group C1 , C2 , ..., Cj−1 into s consecutive classes H1 , H2 , ..., Hs such that the clusters
1 | |C1 |
, 2i )
in group Hi have their current sizes in the range [ 2|Ci−1
for i = 1 to s do
j = maxa:Ca ∈Hi Membership(v, Ca )
Select u1 , u2 , .., ul ∈ Cj , where l = c log n, distinct members from Cj and obtain
Op (ui , v), i = 1, 2, .., l. checked(v, j) = true.
if the majority of these queries return +1 then
Include v in Cj . V = V \ v. Break.
end if
end for
⊲ exhaustive search for membership in the remaining groups in A
if v ∈ V then
for i = 1 to l + 1 do
if i = l + 1 then
⊲ v does not belong to any of the existing clusters
Add v to V ′ . Set V = V \ v
For every u ∈ V ′ \ v, obtain Op (v, u). Add an edge (v, u) to E ′ (G′ ) with
weight ω(u, v) = +1 if Op (v, u) == +1, else with ω(u, v) = −1
Find the heaviest weight subgraph S in G′ . If |S| ≥ c log n, then add S to
the list of clusters in A, and remove the incident vertices and edges on S from V ′ , E ′ .
P
while ∃z ∈ V ′ with u∈S ω(z, u) > 0 do
Include z in S and remove z and all edges incident on it from V ′ , E ′ .
end while
Break;
else
if checked(v, i) 6= true then
Select u1 , u2 , .., ul ∈ Cj , where l = c log n, distinct members from Cj
and Op (ui , v), i = 1, 2, .., l. checked(v, i) = true.
if the majority of these queries return +1 then
Include v in Cj . V = V \ v. Break.
end if
end if
end if
end for
end if
end if
end while
return all the clusters formed in A and the ML estimates from G′
30
In one iteration of the algorithm (steps 1 to 4), steps 1 to
3 each require one round, and
√
min (k 2 ,k n log n)
rounds and issue at most
issue at most n log n queries. Step 4 requires at most
n log n
√
√
2
′
min (k , k n log n) queries. This is because l ≤ n log n.
n
)), for i ∈ [1, l], then, at the end of that step,
In step 2, if |Ci | ≥ 2M (recall M = O( ∆(flog
+ kf− )
Ci will be fully grown with high probability from the analysis of Algorithm 1. This happens
since with high probability any vertex that belongs to Ci has been queried with some u already
in Ci . However, since we do not know M , we cannot identify whether Ci has grown fully.
Consider the case when steps 1 and 3 have picked 6kM random vertices. Consider all those
n
. Note that by Markov Inequality, at least n2 vertices are
clusters that have size at least 2k
n
.
contained in clusters of size at least 2k
If we choose these 6kM vertices with replacement, then on expectation, the number of
n
members chosen from each cluster of size 2k
is 3M , and with high probability above 2M .
This same concentration bound holds even though here sampling is done without replacement
(Lemma 5).
Therefore, after 6kM vertices have been chosen, and step 2 has been performed, at least n2
vertices get clustered and removed.
⌉. If k2 ≥ n, then
The number of iterations required to get 6kM random vertices is ⌈ √6kM
n log n
the number of rounds required in each iteration is 2 + ⌈ √n klog n ⌉. So the total number of rounds
2
M
required to get 6kM vertices is O( nklog
n ). And, finally to get all the vertices clustered, the
2
number of rounds required will be O( k nM ), whereas the optimum round complexity could be
2M
O( nklog
n ).
If k2 < n, then the number of rounds in each√iteration is at most 3. Hence the total number
. If kM ≤ n log n, then the number of rounds required
of iterations is at most 3 + √6kM
n log n
√
√
is O(1). Else, we have kM > n log n and k < n. While our algorithm requires O( √nkM
)
log n
2
rounds, we know the optimum round complexity is at least O( nklogMn ). Overall, the gap may be
√
n
at most O( n klog n ) = O(M ) = O( ∆(flog
).
+ kf− )
This leads to Theorem 7.
Theorem (7). Perfect Oracle with Side Information. There exists an algorithm for CrowdCluster with perfect oracle and unknown side information f+ and f− such that it√achieves a
√
round complexity within Õ(1) factor of the optimum when k = Ω( n) or k = O( ∆(f+nkf− ) ), and
otherwise within Õ(∆(f+ kf− )).
7.2
Crowd-Cluster with Faulty Oracle
We now move to the case of Crowd-Cluster with faulty oracle. We obtain an algorithm with close
to optimal round complexity when no side information is provided. By combining this algorithm
with the one in the previous section, one can easily obtain an algorithm for Crowd-Cluster with
faulty oracle and side information. This is left as an exercise to the reader.
We now give the algorithm for the case when crowd may return erroneous answer with
probability p = 12 − λ (known), and there is no side information.
√
1. Sample n log n vertices uniformly at random, and ask all possible
volving them to form a subgraph G′′ = (V ′′ , E ′′ )
√
n log n
2
queries in-
2. Extract the highest weighted subgraph S from G′′ after setting a weight of +1 for every
positive answer and −1 for every negative answer like in Algorithm 2. If |S| ≥ c log n
where c is set as in Algorithm 2, then for every vertex not yet clustered issue c log n
queries to distinct vertices in S simultaneously in at most c rounds. Grow S by including
any vertex where the majority of those queries returned is +1. Repeat step 2 as long as
31
the extracted subgraph has size at least c log n, else move to step 3 while not all vertices
have been clustered or included in G′′ .
3. Among the vertices that have not
been clustered yet, Pick r vertices Sr uniformly at
r
random, and ask all possible 2 + r|V ′′ | queries among Sr and across Sr and V ′′ . r is
chosen such that the total number of queries is at most n log n. Goto step 2.
Analysis By the analysis (Lemma 12) of Algorithm 2 the extracted subgraph S will have size
≥ c log n iff G′′ contains a subcluster of original G of size O(c log n). Moreover, by Lemma 13,
once S is detected S will be fully grown at the end of that step, that is within the next c rounds.
Now by the same analysis as in the previous section 7.1, once we choose 4kc log n vertices,
2 2
thus query 16k2 c2 log n edges in ⌈ 16kn c ⌉ rounds, then with high probability, each cluster with
n
size will have c log n representatives in G′′ and will be fully grown. We are then left
at least 2k
with at most n2 vertices and can apply the argument recursively. Thus the round complexity is
2 2
O(⌈ 16kn c ⌉ log n + kc) where the second term comes from using at most c rounds for growing
cluster S in step 2.
n
, then we pick n2 edges in at most logn n rounds, and the optimum algorithm
If kc ≥ 4√log
n
√
kc
√ n
log n factor of
has round complexity at least Θ( log
n ) = Θ( 4 log n log n ). So, we are within a
the optimum.
√
√
n
If kc ≤ 4√log
, but kc ≥ log n, then the round complexity of our algorithm is O(kc log n+
n
√
√
log n) = O(kc
√ log n), again within a log n log n factor of the optimum.
√
If kc ≤ log n, then in the first round, all the clusters that have size at least c n will have
enough representatives, and will be fully grown at the end of step 2. After that each cluster
√
√
will have at most c n vertices. Hence, a total of at most kc n ≤ log n vertices will remain to
be clustered. Thus the total number of rounds required will be O(kc), within log n factor of the
optimum.
1
), we get Theorem 8.
Recalling that c = O( λ12 ) = O( ∆(pk(1−p))
Theorem (8). Faulty Oracle with no Side Information. There exists an algorithm for CrowdCluster with faulty oracle with error probability 21 −λ and no side information such that it achieves
√
a round complexity
within Õ( log n) factor of the optimum that recovers Ĝ, ML estimate of G
with all n2 queries with high probability.
This also gives a new parallel algorithm for correlation clustering over noisy input where in
each round n log n work is allowed.
References
[1] Emmanuel Abbe, Afonso S. Bandeira, and Georgina Hall. Exact recovery in the stochastic
block model. IEEE Trans. Information Theory, 62(1):471–487, 2016.
[2] Kook-Jin Ahn, Graham Cormode, Sudipto Guha, Andrew McGregor, and Anthony Ian
Wirth. Correlation clustering in data streams. In Proceedings of the 32nd International
Conference on Machine Learning, volume 37, 2015.
[3] Nir Ailon, Moses Charikar, and Alantha Newman. Aggregating inconsistent information:
ranking and clustering. Journal of the ACM (JACM), 55(5):23, 2008.
[4] Miklos Ajtai, János Komlos, William L Steiger, and Endre Szemerédi. Deterministic selection in o (loglog n) parallel time. In Proceedings of the eighteenth annual ACM symposium
on Theory of computing, pages 188–195. ACM, 1986.
32
[5] N. Alon and Y. Azar. The average complexity of deterministic and randomized parallel comparison sorting algorithms. In Proceedings of the 28th Annual Symposium on Foundations
of Computer Science, FOCS ’87, pages 489–498, 1987.
[6] Noga Alon and Yossi Azar. Sorting, approximate sorting, and searching in rounds. SIAM
Journal on Discrete Mathematics, 1(3):269–280, 1988.
[7] Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert E Schapire. The nonstochastic
multiarmed bandit problem. SIAM Journal on Computing, 32(1):48–77, 2002.
[8] Nikhil Bansal, Avrim Blum, and Shuchi Chawla. Correlation clustering. Machine Learning,
56(1-3):89–113, 2004.
[9] Béla Bollobás and Graham Brightwell. Parallel selection with high probability. SIAM
Journal on Discrete Mathematics, 3(1):21–31, 1990.
[10] Mark Braverman, Jieming Mao, and Matthew S. Weinberg. Parallel algorithms for select and partition with noisy comparisons. In 48th Annual Symposium on the Theory of
Computing, STOC. ACM, 2016.
[11] Mark Braverman and Elchanan Mossel. Noisy sorting without resampling. In Proceedings
of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, pages 268–276.
Society for Industrial and Applied Mathematics, 2008.
[12] Mark Braverman and Elchanan Mossel.
abs/0910.1191, 2009.
Sorting from noisy information.
CoRR,
[13] Nicolo Cesa-Bianchi and Gábor Lugosi. Prediction, learning, and games. Cambridge university press, 2006.
[14] Shuchi Chawla, Konstantin Makarychev, Tselil Schramm, and Grigory Yaroslavtsev. Near
optimal lp rounding algorithm for correlationclustering on complete and complete k-partite
graphs. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of
Computing, pages 219–228. ACM, 2015.
[15] Flavio Chierichetti, Nilesh Dalvi, and Ravi Kumar. Correlation clustering in mapreduce.
In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery
and data mining, pages 641–650. ACM, 2014.
[16] Peter Chin, Anup Rao, and Van Vu. Stochastic block model and community detection
in the sparse graphs: A spectral algorithm with optimal rate of recovery. arXiv preprint
arXiv:1501.05021, 2015.
[17] Peter Christen. Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection. Springer Science & Business Media, 2012.
[18] Richard Cole, Philip N. Klein, and Robert E. Tarjan. Finding minimum spanning forests
in logarithmic time and linear work using random sampling. In Proceedings of the Eighth
Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA ’96, pages 243–
250, 1996.
[19] Thomas M Cover and Joy A Thomas. Elements of information theory, 2nd Ed. John Wiley
& Sons, 2012.
[20] Imre Csiszár and Zsolt Talata. Context tree estimation for not necessarily finite memory
processes, via bic and mdl. Information Theory, IEEE Transactions on, 52(3):1007–1016,
2006.
33
[21] Nilesh Dalvi, Anirban Dasgupta, Ravi Kumar, and Vibhor Rastogi. Aggregating crowdsourced binary ratings. In WWW, pages 285–294, 2013.
[22] Susan B. Davidson, Sanjeev Khanna, Tova Milo, and Sudeepa Roy. Top-k and clustering
with noisy comparisons. ACM Trans. Database Syst., 39(4):35:1–35:39, 2014.
[23] Ahmed K Elmagarmid, Panagiotis G Ipeirotis, and Vassilios S Verykios. Duplicate record
detection: A survey. IEEE Trans. Knowl. Data Eng., 19(1):1–16, 2007.
[24] Alina Ene, Sungjin Im, and Benjamin Moseley. Fast clustering using mapreduce. In
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery
and data mining, pages 681–689. ACM, 2011.
[25] Uriel Feige, Prabhakar Raghavan, David Peleg, and Eli Upfal. Computing with noisy
information. SIAM Journal on Computing, 23(5):1001–1018, 1994.
[26] Ivan P Fellegi and Alan B Sunter. A theory for record linkage. Journal of the American
Statistical Association, 64(328):1183–1210, 1969.
[27] Donatella Firmani, Barna Saha, and Divesh Srivastava. Online entity resolution using an
oracle. PVLDB, 9(5):384–395, 2016.
[28] Hillel Gazit. An optimal randomized parallel algorithm for finding connected components
in a graph. SIAM Journal on Computing, 20(6):1046–1067, 1991.
[29] Lise Getoor and Ashwin Machanavajjhala. Entity resolution: theory, practice & open
challenges. PVLDB, 5(12):2018–2019, 2012.
[30] Arpita Ghosh, Satyen Kale, and Preston McAfee. Who moderates the moderators?: crowdsourcing abuse detection in user-generated content. In EC, pages 167–176, 2011.
[31] Chaitanya Gokhale, Sanjib Das, AnHai Doan, Jeffrey F Naughton, Narasimhan Rampalli,
Jude Shavlik, and Xiaojin Zhu. Corleone: Hands-off crowdsourcing for entity matching. In
SIGMOD Conference, pages 601–612, 2014.
[32] Michael T Goodrich, Nodari Sitchinava, and Qin Zhang. Sorting, searching, and simulation
in the mapreduce framework. In Algorithms and Computation, pages 374–383. Springer,
2011.
[33] John Greiner. A comparison of parallel algorithms for connected components. In Proceedings of the sixth annual ACM symposium on Parallel algorithms and architectures, pages
16–25. ACM, 1994.
[34] Anja Gruenheid, Besmira Nushi, Tim Kraska, Wolfgang Gatterbauer, and Donald Kossmann. Fault-tolerant entity resolution with the crowd. CoRR, abs/1512.00537, 2015.
[35] Bruce Hajek, Yihong Wu, and Jiaming Xu. Achieving exact cluster recovery threshold via
semidefinite programming: Extensions. arXiv preprint arXiv:1502.07738, 2015.
[36] Elad Hazan and Robert Krauthgamer. How hard is it to approximate the best nash
equilibrium? SIAM J. Comput., 40(1):79–91, January 2011.
[37] Thomas N. Herzog, Fritz J. Scheuren, and William E. Winkler. Data Quality and Record
Linkage Techniques. Springer Publishing Company, Incorporated, 1st edition, 2007.
[38] Wassily Hoeffding. Probability inequalities for sums of bounded random variables. Journal
of the American statistical association, 58(301):13–30, 1963.
34
[39] David R Karger, Sewoong Oh, and Devavrat Shah. Iterative learning for reliable crowdsourcing systems. In NIPS, pages 1953–1961, 2011.
[40] Howard Karloff, Siddharth Suri, and Sergei Vassilvitskii. A model of computation for
mapreduce. In Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete
Algorithms, pages 938–948. Society for Industrial and Applied Mathematics, 2010.
[41] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Sorting noisy
data with partial information. In Proceedings of the 4th conference on Innovations in
Theoretical Computer Science, pages 515–528. ACM, 2013.
[42] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Correlation
clustering with noisy partial information. In Proceedings of The 28th Conference on Learning Theory, pages 1321–1342, 2015.
[43] Adam Marcus, Eugene Wu, David Karger, Samuel Madden, and Robert Miller. Humanpowered sorts and joins. Proceedings of the VLDB Endowment, 5(1):13–24, 2011.
[44] Claire Mathieu and Warren Schudy. Correlation clustering with noisy input. In Proceedings
of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010,
Austin, Texas, USA, January 17-19, 2010, pages 712–728, 2010.
[45] Elchanan Mossel, Joe Neeman, and Allan Sly. Consistency thresholds for binary symmetric
block models. Arxiv preprint, 2014.
[46] Xinghao Pan, Dimitris Papailiopoulos, Samet Oymak, Benjamin Recht, Kannan Ramchandran, and Michael I Jordan. Parallel correlation clustering on big graphs. In Advances in
Neural Information Processing Systems, pages 82–90, 2015.
[47] Rudiger Reischuk. A fast probabilistic parallel sorting algorithm. In Proceedings of the
22Nd Annual Symposium on Foundations of Computer Science, FOCS ’81, pages 212–219,
1981.
[48] Igal Sason. On reverse pinsker inequalities. arXiv preprint arXiv:1503.07118, 2015.
[49] Leslie G Valiant. Parallelism in comparison problems. SIAM Journal on Computing,
4(3):348–355, 1975.
[50] Vasilis Verroios and Hector Garcia-Molina. Entity resolution with crowd errors. In 31st
IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea,
April 13-17, 2015, pages 219–230, 2015.
[51] Norases Vesdapunt, Kedar Bellare, and Nilesh Dalvi. Crowdsourcing algorithms for entity
resolution. PVLDB, 7(12):1071–1082, 2014.
[52] Jiannan Wang, Tim Kraska, Michael J Franklin, and Jianhua Feng. Crowder: Crowdsourcing entity resolution. PVLDB, 5(11):1483–1494, 2012.
35
| 8cs.DS
|
arXiv:1511.01553v2 [math.AG] 29 Dec 2017
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL
SINGULARITIES VIA CORE OF IDEALS
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
Abstract. The notion of pg -ideals for normal surface singularities has been
proved to be very useful. On the other hand, the core of ideals has been proved
to be very important concept and also very mysterious one. However, the computation of the core of an ideal seems to be given only for very special cases. In this
paper, we will give an explicit description of the core of pg -ideals of normal surface
singularities. As a consequence, we give a characterization of rational singularities
using the inclusion of the core of integrally closed ideals.
1. Introduction
Let (A, m) be a two-dimensional excellent normal local domain containing an
algebraically closed field. We always assume that (A, m) is not regular. When
(A, m) is a rational singularity, Lipman [14] proved that any integrally closed mprimary ideal I is stable, namely, I 2 = QI for some (every) minimal reduction Q,
and that if I and I ′ are integrally closed m-primary ideals, then the product II ′ is
also integrally closed. (Later, Cutkosky [4] showed that this property characterizes
the rational singularities for two-dimensional excellent normal local domains.) These
facts play very important role to study ideal theory on a two-dimensional rational
singularity.
In [15], the authors introduced the notion of pg -ideals for two-dimensional excellent
normal local domain containing an algebraically closed field and proved that the pg ideals inherit nice properties of integrally closed ideals of rational singularities (in
a rational singularity, every integrally closed ideal is a pg -ideal by our definition).
Namely, any pg -ideal I is stable and if I and I ′ are pg -ideals, then II ′ is integrally
closed and also a pg -ideal.
Let f : X → Spec A be a resolution of singularity. Then pg (A) := ℓA (H 1 (X, OX ))
is independent of the choice of a resolution and an important invariant of A (here
we denote by ℓA (M) the length of an A module M). The invariant pg (A) is called
the geometric genus of A. A rational singularity is characterized by pg (A) = 0.
Let I ⊂ A be an integrally closed m-primary ideal. Then there exists a resolution of singularities f : X → Spec A and an anti-nef cycle Z on X so that
IOX = OX (−Z) and I = IZ := H 0 (X, OX (−Z)). In general, we can show that
2000 Mathematics Subject Classification. Primary 14B05; Secondary 13B22, 14J17, 13A15,
13H15.
Key words and phrases. core of ideals, good ideal, pg -cycle, pg -ideal, surface singularity, rational
singularity.
This work was partially supported by JSPS KAKENHI Grant Numbers 26400064, 26400053,
25400050.
1
2
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
ℓA (H 1 (X, OX (−Z))) ≤ pg (A) for any cycle Z such that OX (−Z) has no fixed components. If equality holds, then Z is called a pg -cycle and I = IZ is called a pg -ideal.
The core of an ideal I is the intersection of all reductions of I. The notion of
core of ideals was introduced by Rees and Sally [18], and many properties of the
core have been shown by Corso–Polini–Ulrich [2], [3], Huneke–Swanson [8], Huneke–
Trung [9], Hyry–Smith [10], Polini–Ulrich [17]. The core of ideals is related to
coefficient, adjoint and multiplier ideals. However, it seems to the authors that the
computation of the core is given only for very special cases.
In this paper, we will show that if I = IZ is a pg -ideal and Q is a minimal reduction
of I, there exists a cycle Y ≥ 0 on X such that Q : I = IZ−Y and core(I) = I2Z−Y .
In particular, this implies that if A is rational, X0 is the minimal resolution, and
K = KX/X0 (the relative canonical divisor), then core(I) = I2Z−K (see Theorem 4.6
for general case). Moreover, we obtain that if I and I ′ are pg -ideals and I ′ ⊂ I,
then core(I ′ ) ⊂ core(I) (see Theorem 4.11). If A is not a rational singularity, then
there exist a pg -ideal I ′ and an integrally closed non-pg -ideal I such that I ′ ⊂ I and
core(I ′ ) 6⊂ core(I) (see Proposition 3.4). Therefore, we obtain a characterization of
rational singularities in terms of core of ideals, which is our main theorem.
Theorem 1.1 (See Theorem 3.2). The following conditions are equivalent if char(k) 6=
2
(1) For any integrally closed m-primary ideals I ′ ⊂ I, we have core(I ′ ) ⊂ core(I).
(2) A is a rational singularity.
An m-primary ideal I is said to be good if I 2 = QI and I = Q : I for some
minimal reduction Q of I (see [6], [15]). As an application of the theorem, we show
the following existence theorem for good ideals, which generalizes [15, Theorem 4.1]
for non-Gorenstein local domains.
Theorem 1.2 (See Theorem 4.6). Any two-dimensional excellent normal local domain A over an algebraically closed field admits a good pg -ideal.
Let us explain the organization of this paper.
In Section 2, we recall the definition and several basic properties of pg -ideals. In
Section 3, we prove Theorem 1.1 using the property that taking the core preserves
the inclusion of pg -ideals (Theorem 4.11), and will show that if I0 is not a pg -ideal,
then for some n ≥ 1 we can construct a pg -ideal I ′ ⊂ I = I0n with core(I ′ ) 6⊂ core(I).
In Section 4, we show that Q : I and core(I) are also pg -ideals for a pg -ideal I and
its minimal reduction Q (Theorem 4.4), and give an algorithm for obtaining these
ideals (Theorem 4.6). We also prove some characterization of good ideals and the
existence of good ideals in A. In Section 5, we give a maximal pg -ideal contained in
a given integrally closed m-primary ideal.
2. Preliminary on pg -ideals
Throughout this paper, let (A, m) be a two-dimensional excellent normal local
domain containing an algebraically closed field and f : X → Spec A a resolution of
singularities
with exceptional divisor E := f −1 (m) unless otherwise specified. Let
Sr
E = i=1 Ei be the decomposition into irreducible components of E. A Z-linear
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
Pr
combination Z =
i=1 ni Ei is called a cycle. We say a cycle Z =
effective if ni ≥ 0 for every i. We denote Z ≥ Z ′ if Z − Z ′ is effective.
Pr
i=1
3
ni Ei is
First, we recall the definition of pg -ideals. If I is an integrally closed m-primary
ideal of A, then there exists a resolution X → Spec A and an effective cycle Z on X
such that IOX = OX (−Z). In this case, we denote the ideal I by IZ ,1 and we say
that I is represented on X by Z. Note that IZ = H 0 (X, OX (−Z)). Furthermore, if
ZC < 0 for every (−1)-curve C on X, then we say that I is minimally represented.
We obtain a unique minimal representation of I by contracting (−1)-curves C with
ZC = 0 successively (cf. [15, §3]).
We say that OX (−Z) has no fixed component if H 0 (X, OX (−Z)) 6= H 0 (X, OX (−Z−
Ei )) for every Ei ⊂ E, i.e., the base locus of the linear system H 0 (X, OX (−Z)) does
not contain any component of E. It is clear that OX (−Z) has no fixed component
when I is represented by Z.
We denote by h1 (OX (−Z)) the length ℓA (H 1 (X, OX (−Z))). We put pg (A) =
h1 (OX ) and call it the geometric genus of A.
The number h1 (OX (−Z)) is independent of the choice of representations of I = IZ
(cf. [15]) and is an important invariant of the ideal for our theory. We have the
following result for this invariant.
Proposition 2.1 ([15, 2.5, 3.1]). Let Z ′ and Z be cycles on X and assume that
OX (−Z) has no fixed components. Then we have h1 (OX (−Z ′ −Z)) ≤ h1 (OX (−Z ′ )).
In particular, we have h1 (OX (−Z)) ≤ pg (A); if the equality holds, then OX (−Z) is
generated.
Definition 2.2. (1) Let I = IZ = H 0 (X, OX (−Z)) be an integrally closed ideal
represented by Z > 0 on X. We call I a pg -ideal if h1 (OX (−Z)) = pg (A).
(2) A cycle Z > 0 is called a pg -cycle if OX (−Z) is generated and h1 (OX (−Z)) =
pg (A).
Remark 2.3. If pg (A) = 0, then A is called a rational singularity. On a rational
singularity, every integrally closed m-primary ideal is a pg -ideal by definition (cf.
[14]) and conversely, this property characterizes a rational singularity because we
always have integrally closed ideal I = IZ such that h1 (OX (−Z)) = 0 (cf. [5]).
In [15], we have seen many good properties of pg -ideals. We will review some of
these properties.
Let Z and Z ′ be nonzero effective cycles on the resolution X → Spec A such that
OX (−Z) and OX (−Z ′ ) are generated. Take general elements a ∈ IZ , b ∈ IZ ′ and
put
ε(Z, Z ′) := ℓA (IZ+Z ′ /aIZ ′ + bIZ )
= pg (A) − h1 (OX (−Z)) − h1 (OX (−Z ′ )) + h1 (OX (−Z − Z ′ )).
Then 0 ≤ ε(Z, Z ′) ≤ pg (A); see [15, 2.6].
The following proposition gives an important property of pg -ideals.
Proposition 2.4 (see [15, 3.5, 3.6]). Let Z and Z ′ be the cycles as above.
1When
we write IZ , we assume that OX (−Z) is generated by global sections.
4
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
(1) If Z is a pg -cycle, then ε(Z, Z ′) = 0 for any Z ′ , and
IZ+Z ′ = aIZ ′ + bIZ
for general elements a ∈ IZ and b ∈ IZ ′ . In particular, the product IZ IZ ′ is
integrally closed and h1 (OX (−Z − Z ′ )) = h1 (OX (−Z ′ )).
(2) Z and Z ′ are pg -cycles if and only if so is Z + Z ′ .
Proof. The “if part” of (2) follows from Proposition 2.1. The other claims follow
from [15, 3.5].
Recall that an ideal J ⊂ I is called a reduction of I if I is integral over J or,
equivalently, I r+1 = I r J for some r (e.g., [20]). An ideal Q ⊂ I is called a minimal
reduction of I if Q is minimal among the reductions of I. Any minimal reduction of
an m-primary ideal is a parameter ideal.
Corollary 2.5 (see [15, 3.6]). Let I and I ′ be any integrally closed m-primary ideals.
(1) I and I ′ are pg -ideals if and only if so is II ′ .
(2) Assume that I is a pg -ideal. Then I n is a pg -ideal for every n > 0. If Q is a
minimal reduction of I, then I 2 = QI and I ⊂ Q : I.
Assume that pg (A) > 0. Then we give a characterization of pg -ideals by cohomological cycle. Let KX denote the canonical divisor on X. Let ZKX denote the
canonical cycle, i.e., the Q-divisor supported in E such that KX + ZKX ≡ 0. By [19,
§4.8], there exists the smallest cycle CX > 0 on X such that h1 (OCX ) = pg (A), and
CX = ZKX if A is Gorenstein and the resolution f : X → Spec A is minimal. The
cycle CX is called the cohomological cycle on X.
Proposition 2.6. Assume that pg (A) > 0 and let C ≥ 0 be the minimal cycle such
that H 0 (X \ E, OX (KX )) = H 0 (X, OX (KX + C)). Then C is the cohomological
cycle. Therefore if g : X ′ → X is the blowing-up at a point in Supp CX and E0 the
exceptional set for g, then CX ′ = g ∗ CX − E0 . For any cycle D > 0 without common
components with CX , we have h1 (OD ) = 0.
Proof. By the Grauert-Riemenschneider vanishing theorem2 and the duality theorem, we have
ℓA (H 0 (X \ E, OX (KX ))/H 0(X, OX (KX ))) = ℓA (HE1 (X, OX (KX ))) = pg (A),
ℓA (H 0(X, OX (KX + C))/H 0(X, OX (KX ))) = h0 (OC (KX + C))) = h1 (OC ).
Thus h1 (OC ) = pg (A).3 Let C ′ > 0 be a cycle such that C ′ < C. By the assumption,
we have
h1 (OC ′ ) = ℓA (H 0 (OX (KX + C ′ ))/H 0 (OX (KX ))) < ℓA (HE1 (OX (KX ))) = pg (A).
Let D > 0 be a cycle without common components with C. As in the proof of [19,
§4.8] (putting A = 0), we obtain the surjection H 1 (OC+D ) → H 1 (OC ) ⊕ H 1 (OD ).
Since h1 (OC+D ) = h1 (OC ) = pg (A), it follows that H 1 (OD ) = 0.
We have the following characterization of pg -ideals in terms of cohomological cycle.
2Note
that the Grauert-Riemenschneider vanishing theorem holds in any characteristic in dimension 2 ([5]).
3This result was already obtained by Tomari [21].
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
5
Proposition 2.7 ([15, 3.10]). Assume that pg (A) > 0. Let Z > 0 be a cycle
such that OX (−Z) has no fixed component. Then Z is a pg -cycle if and only if
OCX (−Z) ∼
= OCX .
Now we will define the core of an ideal I of A.
Definition 2.8. Let I be an m-primary ideal of A.
(1) The core of I is defined by
\
Q.
core(I) =
Q is a reduction of I
(2) I is said to be stable if I 2 = QI for any minimal reduction Q of I. By this
definition, if I is stable, then I ⊂ Q : I and I 2 ⊂ core(I).
(3) I is said to be good if I is stable and Q : I = I for any minimal reduction Q
of I ([6], [15]). If I is integrally closed and stable, then I 2 = core(I) if and
only if I is a good ideal (see Lemma 4.1).
Remark 2.9 ([6]). If A is Gorenstein, then I is good if and only if I is stable and
e(I) = 2ℓA (A/I), where e(I) denotes the multiplicity of I (if I = IZ , then e(IZ ) =
−Z 2 ). We have shown the existence of good pg -ideals when A is Gorenstein in [15].
We also have a characterization of pg -ideal in terms of the Rees algebras.
Proposition 2.10 ([16]). Let I be an integrally closed m-primary ideal I. Then the
following conditions are equivalent.
(1) I is a pg -ideal. L
(2) The Rees algebra n≥0 I n tn ⊂ A[t] is a Cohen-Macaulay normal domain.
(3) I 2 = QI and I n = I n for every n > 0, where J denotes the integral closure
of an ideal J.
In Section 4, we will give the description of core(I) for a pg -ideal I.
3. A question on core of integrally closed ideals
The core of an ideal I is the intersection of all the reductions of I, or, equivalent to
say, the intersection of all the minimal reductions of I. We are interested whether
taking the core preserves the inclusion of ideals. But it is obvious that if ideals
I ′ ⊂ I have the same integral closure, then core(I ′ ) ⊃ core(I), since a reduction of
I ′ is also a reduction of I. So, we ask the following question.
Question 3.1. Let (A, m) be a two-dimensional excellent normal local domain
and let I ′ ⊂ I be integrally closed m-primary ideals. Then is it always true that
core(I ′ ) ⊂ core(I)?
Question 3.1 was asked in [8] and then in [10, Question 5.5.2]. When A is twodimensional Gorenstein rational singularity this question was answered affirmatively
(see [10, 5.5.1]). On the other hand, Kyungyong Lee [13] gave a counterexample to
this question in a regular local ring of dimension 4.
The answer to this question and the main theorem of this paper is the following.
6
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
Theorem 3.2. Let (A, m) be a two-dimensional excellent normal local domain.
Then the following conditions are equivalent if char(k) 6= 2.
(1) For any integrally closed m-primary ideals I ′ ⊂ I, we have core(I ′ ) ⊂ core(I).
(2) A is a rational singularity.
Proof. If A is a rational singularity then every integrally closed ideal is a pg -ideal.
We will show in Theorem 4.11 that the answer to Question 3.1 is positive if both I
and I ′ are pg -ideals. Hence the implication (2) =⇒ (1) is true.
The implication (1) =⇒ (2) follows from Proposition 3.4.
Remark 3.3. The implication (2) ⇒ (1) holds if char(k) = 2, since Theorem 4.11
does not depend on char(k).
By applying some results in Section 4 and Section 5, we shall prove the following.
Proposition 3.4. Assume that pg (A) > 0 and char(k) 6= 2. Let I = IZ be an
integrally closed ideal such that I 2 6= QI for some minimal reduction Q of I and
that I 2 is integrally closed. Then there exists a pg -ideal I ′ ⊂ I such that core(I ′ ) 6⊂
core(I).
In particular, if I = IZ is an integrally closed ideal which is not a pg -ideal, then
for some n > 0, there exists a pg -ideal I ′ ⊂ I n such that core(I ′ ) 6⊂ core(I n ).
Proof. Suppose that a minimal reduction Q of I is generated by a system of parameters a, b ∈ I. Let us prove that I 2 6⊂ Q. If I 2 ⊂ Q holds, then I 2 = I 2 = I 2 ∩ Q =
QI = QI by Huneke–Itoh theorem (see [7], [11]). This contradicts the assumption.
Hence I 2 6⊂ Q.
Now, since I 2 6⊂ Q and since char(k) 6= 2, for a general element f of I, f 2 6∈ Q
and in particular, f 2 6∈ core(I). On the other hand, by Theorem 5.1, there exists a
pg -ideal I ′ ⊂ I such that f ∈ I ′ . Then f 2 ∈ I ′2 ⊂ core(I ′ ), since I ′ is stable. This
shows that core(I ′ ) 6⊂ core(I).
k
For a given I = IZ , which is not a pg -ideal, choose n so that I nk = I n and
h1 (OX (−nZ)) = h1 (OX (−nkZ)) for every positive integer k. Such n exists since the
normalized Rees algebra of I is Noetherian and h1 (OX (−nZ)) is a decreasing function of n (cf. Proposition 2.1). Clearly I n = InZ is not a pg -ideal by Proposition 2.4
(2). Let Qn be a minimal reduction of I n . Since h1 (OX (−nZ)) = h1 (OX (−2nZ)),
from the exact sequence
0 → OX → OX (−nZ)⊕2 → OX (−2nZ) → 0,
2
we obtain ℓA (I n /Qn I n ) = pg (A) − h1 (OX (−nZ)) > 0. Therefore we can apply the
first claim to the ideal I n .
Example 3.5. Let A = k[[x, y, z]]/(x2 + y 4 + z 4 ), where k is an algebraically closed
field.4 Then core(m) = m2 since m is a good ideal (cf. Remark 2.9, Lemma 4.1).
Note that core(m) is not integrally closed since x is integral over m2 . It is easy to
show that for every integrally closed ideal I ′ ⊂ m, core(I ′ ) ⊂ core(m) = m2 .
Let f0 : X0 → Spec A be the minimal resolution. Then f0−1 (m) = E0 is an
elliptic curve {x2 + y 4 + z 4 = 0} in the weighted projective space P(2, 1, 1). We
4If
char(k) = 2, then we change x2 + y 4 + z 4 to x2 + g(y, z), where g(y, z) is a form of degree 4
with no multiple roots.
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
7
have pg (A) = 1, m = IE0 , h1 (OX0 (−nE0 )) = 0 for n > 0 by the vanishing theorem
(cf. [5]). Now, let I := I2E0 = m2 , which is generated by m2 and x. Then I n is
integrally closed (cf. [19, 4.24]) and not a pg -ideal for every n > 0. It is easy to see
that ℓA (I 2 /QI) = pg (A) = 1 for any minimal reduction Q of I.
Take a general element g of I and let P1 , . . . , P4 ∈ E0 be the intersection points of
E0 and divX (g) − 2E0 . Let f1 : X → X0 be the blowing-up of these 4 points and let
Ei = f1−1 (Pi ), i = 1, . . . , 4. We again denote by E0 the strict transform of E0 on X.
P
Then Z = 2E0 + 3 4i=1 Ei is a pg -cycle on X and KX Z = 0. By Kato’s RiemannRoch formula ([12], cf. [15, 2.8]), we have ℓA (A/IZ ) = 6 and ℓA (A/m3 ) = 7. Thus
IZ = (g) + m3 ⊂ I. Since 2ℓA (A/IZ ) = −Z 2 , IZ is also a good ideal (cf. Remark 2.9)
and core(IZ ) = IZ2 . On the other hand, as we have seen in the proof of Proposition
3.4, g 2 6∈ core(I). Thus we conclude that core(IZ ) 6⊂ core(I).
4. Computation of core(I) and Q : I of a pg -ideal I
Let I = IZ be an integrally closed ideal of A represented on some resolution X,
and let Q be any minimal reduction of I. We begin by recalling a description of
core when I is stable.
Lemma 4.1. Assume that I 2 = QI. Then
(4.1)
core(I) = Q2 : I = (Q : I)I = (Q : I)Q.
Moreover, if core(I) is integrally closed, then so is Q : I.
Proof. The formula (4.1) is obtained in [15, 5.6]. Assume that core(I) is integrally
closed and Q is generated by a, b ∈ I. Let x ∈ A be integral over Q : I. Then ax is
integral over Q(Q : I). Since (Q : I)Q = (Q : I)I = core(I), we have ax ∈ Q(Q : I).
Thus ax = au + bv for some u, v ∈ Q : I. Since a(x − u) = bv, we have that
x − u ∈ (b) ⊂ Q, and thus x ∈ Q : I. Hence Q : I is integrally closed.
Lemma 4.2. Let D > 0 be a cycle on X. Then we have the following.
(1) H 0 (OD (D)) = 0.
(2) h1 (OD (D)) = (−D 2 + KX D)/2.
(3) pg (A) + h1 (OD (D)) = h1 (OX (D)). Therefore h1 (OX (D)) ≥ pg (A) and the
equality holds if and only if h1 (OD (D)) = 0.
(4) If h1 (OD (D)) = 0, then each connected component of the support of D contracts to a nonsingular point. More precisely, if E1 ≤ D is a (−1)-curve,
g : X → X ′ the contraction of E1 , and if F := g∗ D 6= 0, then h1 (OF (F )) = 0
and D = g ∗ F + nE1 with n = 0 or 1.
Proof. Although the claim (1) is stated in [22], we will give a short proof for the
convenience of the readers. By adjunction, KD = (KX + D)|D and by duality
on D, h0 (OD (D)) = h1 (OD (KX )). Since H 1 (X, OX (KX )) → H 1 (D, OD (KX )) is
surjective and H 1 (X, OX (KX )) = 0 by Grauert-Riemenschneider vanishing theorem,
we have the desired result. The statement (2) follows from (1) and the RiemannRoch formula: h1 (OD (D)) = −χ(OD (D)) = (−D 2 + KX D)/2.
The assertion (3) follows from (1) and the exact sequence
0 → OX → OX (D) → OD (D) → 0.
8
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
(4) If D contains no (−1)-curve, then KX D ≥ 0, and thus 2h1 (OD (D)) = −D 2 +
KX D ≥ −D 2 > 0. Assume that 2h1 (OD (D)) = −D 2 + KX D = 0 and E1 be a
(−1)-curve in D. Let g : X → X ′ be the contraction of E1 and F = g∗ D. Then
there exists an integer n such that D = g ∗ F + nE1 . We have
−D 2 + KX D = −F 2 + KX ′ F + n2 − n.
Since n2 − n ≥ 0 for any n ∈ Z and −F 2 + KX ′ F ≥ 0 by (2), we obtain that
−F 2 + KX ′ F = n2 − n = 0. Therefore we can inductively contract all components
of D to nonsingular points.
The following lemma is essential for our main theorem of this section.
Lemma 4.3. Let I = IZ be a pg -ideal represented on some resolution X, and Q
a minimal reduction of I. Assume that OX (−Z + Y ) is generated for some cycle
0 < Y < Z on X. Then the following conditions are equivalent.
(1) IZ IZ−Y = QIZ−Y .
(2) h1 (OX (Y )) = pg (A) and IZ−Y is a pg -ideal.
Note that the first condition implies IZ−Y ⊂ Q : IZ .
Proof. Assume Q = (a, b) and consider the exact sequence
0 → OX → OX (−Z)⊕2 → OX (−2Z) → 0,
where the map OX (−Z)⊕2 → OX (−2Z) is defined by (x, y) 7→ ax + by. Tensoring
OX (Y ) to this exact sequence, we obtain
0 → OX (Y ) → OX (−Z + Y )⊕2 → OX (−2Z + Y ) → 0.
Note that IZ IZ−Y = I2Z−Y and h1 (OX (−Z + Y )) = h1 (OX (−2Z + Y )) by Proposition 2.4. Now, taking the long exact sequence of this sequence, we see that
IZ IZ−Y = QIZ−Y if and only if H 1 (OX (Y )) → H 1 (OX (−Z + Y )⊕2 ) is injective,
and this is also equivalent to that
2h1 (OX (−Z + Y )) = h1 (OX (Y )) + h1 (OX (−2Z + Y )).
Thus (1) is equivalent to that h1 (OX (−Z + Y )) = h1 (OX (Y )). On the other hand,
we have h1 (OX (−Z +Y )) ≤ pg (A) ≤ h1 (OX (Y )) by Proposition 2.1 and Lemma 4.2.
Therefore, the condition (1) is equivalent to the equalities
h1 (OX (−Z + Y )) = pg (A) = h1 (OX (Y )),
namely, the condition (2).
Now we can state the main theorem of this section.
Theorem 4.4. Let I = IZ be a pg -ideal, where Z is a pg -cycle on a resolution X
of Spec A. Then core(I) and Q : I are also represented on X. Furthermore, we can
write Q : I = IZ−Y and core(I) = I2Z−Y , where Y is the maximal positive cycle on
X satisfying the following two conditions:
(1) h1 (OX (Y )) = pg (A) and
(2) IZ−Y is a pg -ideal.
In particular, if I is a pg -ideal, so are Q : I and core(I).
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
9
Proof. By Proposition 2.10, the Rees algebra R(I) is normal and Cohen-Macaulay.
Hence core(I) is integrally closed by [10, Proposition 5.5.3]. It follows from Lemma
4.1 that Q : I is also integrally closed. By Corollary 2.5, we have I ⊂ Q : I. Suppose
that I and Q : I are represented by cycles Z ′ and Z ′ − Y on some resolution X ′ ,
respectively, where Y is an effective cycle on X ′ . Note that Y satisfies the condition
(1) of Lemma 4.3 by (4.1). We may assume that Z ′ C < 0 or (Z ′ − Y )C < 0 for any
(−1)-curve C on X ′ . If C is a (−1)-curve and Z ′ C = 0, then Y C > 0. However,
this is impossible because Y blows down to a nonsingular point and Y C ≤ 0 if
C ≤ Y by Lemma 4.2. Thus I is minimally represented on X ′ . Hence there exists a
birational morphism α : X → X ′ and Q : I is also represented on the resolution X
by α∗ (Z ′ − Y ) = Z − α∗ Y . Thus we can write Q : I = IZ−Y0 , where Y0 = α∗ Y ≥ 0.
By (4.1) and Lemma 4.3, we see that core(I) = I2Z−Y0 and that Y0 satisfies our
conditions (1) and (2). On the other hand, if a cycle Y ≥ 0 on X also satisfies our
conditions, then Lemma 4.3 implies that IZ−Y ⊂ Q : I = IZ−Y0 . Hence we must
have Y ≤ Y0 .
Note that even if I is minimally represented on X, Q : I is not necessarily minimally represented on X. In Theorem 4.6, we shall give an algorithm to calculate
Q : I and a minimal good ideal containing I starting from a pg -ideal I = IZ .
In the situation of Theorem 4.4, I is a good ideal if and only if Y = 0. Hence we
obtain the following.
Corollary 4.5. Assume that I is a pg -ideal. Then the following are equivalent.
(1) I is a good ideal.
(2) core(I) = I 2 .
(3) core(I 2 ) = core(I)2 .
Theorem 4.6. Let I = IZ be a pg -ideal represented on X and let Q be a minimal
reduction of I.
(1) Let X = X1 → X2 → · · · → Xn+1 be the sequence of contractions, where
each fi : Xi → Xi+1 is a contraction of a (−1)-curve Ei on Xi , which does
not intersect the cohomological cycle CXi . This process stops when every
(−1)-curve on Xn+1 intersects CXn+1 . Let K be the relative canonical divisor
KX/Xn+1 of the composite f : X → Xn+1 .
Then Q : I = H 0 (X, OX (−Z + K)). Note that Z − K is anti-nef if and
only if any (−1)-curve C on X satisfies ZC < 0; in this case, K coincides
with Y in Theorem 4.4. Also, f∗ Z is a pg -cycle and If∗ Z is the minimal good
ideal containing IZ . In particular, every two-dimensional excellent normal
local domain has good ideals.
(2) Let C be a (−1)-curve on X which does not intersect CX such that ZC =
−m < 0 and g : X → X ′ the contraction of C. Then g∗ Z is also a pg -cycle.
Let I ′ = Ig∗ Z and Q′ a minimal reduction of I ′ . In this case, if Q′ : I ′ = IZ ′
for some cycle Z ′ on X ′ , then Q : I = Ig∗ Z ′ +(m−1)C .
Proof. Let Fi be the total transform of Ei on X. Then Fi Fj = 0 for i 6= j. Let
n
n
X
X
bi .
ai , and b =
bi = −ZFi , ai = min{1, bi }, a =
i=1
i=1
10
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
P
We will prove that a cycle Y := ni=1 ai Fi satisfies Q : I = IZ−Y . Since a2i = ai , we
have
n
n
X
X
2
2
−Y + KX Y =
ai (−Fi + KX Fi ) =
ai (−Ei2 + KXi Ei ) = 0.
i=1
i=1
From Lemma 4.2, we have h1 (OY (Y )) = 0 and that Y is the maximal cycle on
X satisfying h1 (OX (Y )) = pg (A). By Theorem 4.4, it is sufficient to show that
Z − Y is a pg -cycle.
We have f∗ Z and f ∗ f∗ Z are pg -cycles by Proposition 2.7 and
P
Z = f ∗ f∗ Z + ni=1 bi Fi . Take any decreasing sequence of cycles {Z0 , . . . , Zb } such
that
Z0 = Z,
Za = Z − Y,
Zb = f ∗ f∗ Z,
Ci := Zi − Zi+1 ∈ {F1 , . . . , Fn }.
1
Then every Zi is anti-nef. Let hi = h (OX (−Zi )). Consider the exact sequence
0 → OX (−Zi ) → OX (−Zi+1 ) → OCi (−Zi+1 ) → 0.
Note that any nef invertible sheaf L on Ci is generated and satisfies H 1 (L) = 0 (cf.
[14]). Since H 1 (OCi (−Zi+1 )) = 0, we have hi ≥ hi+1 ; however the equality holds for
every 0 ≤ i < b because hb = h0 = pg (A). Thus H 0 (OX (−Zi+1 )) → H 0 (OCi (−Zi+1 ))
is surjective and hi = pg (A) for each 0 ≤ i < b. Thus H 0 (OX (−Zi+1 )) has no base
points on Supp Ci . Therefore if OX (−Zi ) is generated, so is OX (−Zi+1 ). Since
OX (−Z0 ) is generated, OX (−Zi ) is also generated and Zi is a pg -cycle for every
0 ≤ i ≤ b. Hence Q : I = IZ−Y . Now it is clear that for any minimal reduction
Q∗ of If∗ Z , we have Q∗ : If∗ Z = If∗ Z , namely, If∗ Z is a good ideal. The argument
above also shows this is the minimal good ideal containing IZ . If ZC < 0 for every
(−1)-curve C on X not intersecting CX , then ai = 1 for every 1 ≤ i ≤ n, and thus
Y = K.
Let C = E1 , g = f1 , and X ′ = X2 . We will show that if ZC = 0, we have
0
H (X, OX (−Z + K)) = H 0 (X ′ , OX ′ (−g∗ Z + K ′ )), where K ′ = KX ′ /Xn+1 . This
claim implies the formula Q : I = H 0 (OX (−Z + K)); in fact, it can be reduced to
the case n = 1. We have that g ∗ OX ′ (−g∗ Z + K ′ ) = OX (−Z + K − C) and the exact
sequence
0 → OX (−Z + K − C) → OX (−Z + K) → OC (−Z + K) → 0.
Since ZC = 0, we have OC (−Z) ∼
= H 0 (OP1 (−1)) = 0.
= OC and H 0 (OC (−Z + K)) ∼
Hence we obtain the claim. Assume that m := −ZC > 0. By Proposition 2.7, g∗ Z
is a pg -cycle on X ′ . Let I ′ = Ig∗ Z and Q′ a minimal reduction of I ′ . Let Y ′ be
the effective cycle on X ′ such that Q′ : I ′ = Ig∗ Z−Y ′ . Then Y = g ∗ Y ′ + C. Thus
Z − Y = g ∗g∗ Z + mC − (g ∗Y ′ + C) = g ∗ (g∗ Z − Y ′ ) + (m − 1)C.
Remark 4.7. (1) If I = IZ is a pg -ideal, then the minimal good ideal containing I (the
“good closure” of I) is obtained by “taking Q : I” several times (cf. Theorem 4.11).
Namely, if I1 = Q : I and Q1 is a minimal reduction of I1 , then I2 = Q1 : I1 is again
a pg -ideal. We obtain Qm : Im = Im for some m > 0. The smallest positive integer
m with this property is given by m = max{b1 , . . . , bn }, where bi ’s are the integers
in the proof of Theorem 4.6.
(2) If A is a rational singularity, then Xn+1 in Theorem 4.6 is always the minimal
resolution since we may regard CX = 0 (cf. [15, 5.1]). If A is a rational Gorenstein
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
11
singularity (i.e., rational double point), then K = KX and Q : I coincides with the
multiplier ideal J (I). In this case, we have core(I) = J (I 2 ) = IJ (I) by Lemma 4.1.
Example 4.8. Let X0 be the minimal resolution and f : X → X0 the natural
morphism. Assume that the exceptional divisor F of X0 is a nonsingular
P rational
curve and F = f (E1 ). For any ideal I = IZ represented by Z =
ni Ei on
X, the good closure of I is If∗ Z = In1 F = mn1 (cf. [1]). Since good ideals in a
rational singularity are integrally closed by [15, 2.4], the set of good ideals in A is
{mn | n ∈ Z>0 }.
Let us consider an explicit example of the procedure in Remark 4.7 (1). Suppose
that A = k[[x, y, z]]/(x2 − yz) and X is obtained by the blowing up at the nodal
points of divX0 (x). We write E = E0 + E1 + E2 , where E02 = −4 and E12 =
E22 = −1. Then K := KX/X0 = E1 + E2 and E is the maximal ideal cycle. Let
W = E0 + 2(E1 + E2 ). Then IW = (x) + m2 since ℓA (A/IW ) = 3 by Kato’s
Riemann-Roch formula. Fix an integer n and let Z = nE0 + 2n(E1 + E2 ). For
0 ≤ k ≤ n, let Zk = nE0 + (2n − k)(E1 + E2 ). Since Zk = (n − k)W + kE,
Ik := IZk = ((x) + m2 )n−k mk . From Theorem 4.6, for any minimal reduction Qk of
Ik , we obtain that Qk : Ik = Ik+1 for 0 ≤ k < n and Qn : In = In .
The next theorem follows from Theorem 4.6.
Theorem 4.9. There always exist good pg -ideals in any two-dimensional excellent
normal local domain containing an algebraically closed field.
Let I = IZ be a pg -ideal minimally represented on X. Then IZ is good if and only
if every (−1)-curve on X intersects the cohomology cycle CX .
Corollary 4.10. Assume that I is a pg -ideal. Then I is a good ideal if and only if
core(II ′ ) = core(I) core(I ′ ) for any pg -ideal I ′ .
Proof. Assume that I and I ′ are represented on X by pg -cycles Z and Z ′ , respectively, and that I is a good ideal. By Theorem 4.9, we may assume that Z ′ C < 0
for every (−1)-curve C on X which does not intersect CX ; then Z + Z ′ has also
this property. Let Q′ (resp. Q′′ ) be a minimal reduction of I ′ (resp. II ′ ). By
Theorem 4.6 (1), we obtain that Q′′ : II ′ = IZ+Z ′ −K and Q′ : I ′ = IZ ′ −K . Since
core(I) = I 2 = I2Z by Corollary 4.5, it follows from Theorem 4.4 that
core(II ′ ) = I2(Z+Z ′ )−K = I2Z+(2Z ′ −K) = core(I) core(I ′ ).
The converse follows from Corollary 4.5.
From (1) of Theorem 4.6 and Lemma 4.1, we have the following result concerning
Question 3.1 of §2.
Theorem 4.11. Let I1 ⊂ I2 be pg -ideals, and let Qi be a minimal reduction of Ii
(i = 1, 2). Then Q1 : I1 ⊂ Q2 : I2 and also core(I1 ) ⊂ core(I2 ).
Question 4.12. Let (A, m) be a two-dimensional excellent normal local domain and
let I1 ⊂ I2 be integrally closed m-primary ideals and let Qi be a minimal reduction of
Ii for i = 1, 2. Assume that I2 is a pg -ideal (we do not assume that I1 is a pg -ideal).
Is it true that core(I1 ) ⊂ core(I2 ) and that Q1 : I1 ⊂ Q2 : I2 ?
12
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
5. Existence of pg -ideal containing a given element of I.
We show that for any g ∈ m there exists a pg -ideal containing g. In fact, we prove
the following.
Theorem 5.1. Let I be an integrally closed m-primary ideal and g an arbitrary
element of I. Then there exists h ∈ I such that the integral closure of the ideal
(g, h) is a pg -ideal.
Proof. Suppose that I is represented by a cycle Z > 0 on a resolution X. We write
divX (g) = ZX + HX , where ZX is a cycle and HX is the strict transform of the
divisor H := divSpec A (g). Let CX be the cohomological cycle on X. Then, by
Proposition 2.7, ZX is a pg -cycle if and only if
(5.1)
Supp CX ∩ Supp HX = ∅.
By Proposition 2.6, taking blowing-ups at the intersection of the cohomological
cycle and the strict transform of H successively, we may assume that the condition
(5.1) is satisfied. Since ZX ≥ Z, we have IZX ⊂ I. Since OX (−ZX ) is generated,
there exists h ∈ IZX such that g and h generate OX (−ZX ). Then we obtain that
IZX = (g, h).
The idea for obtaining the pg -ideal in the proof above is used in the last paragraph
of Example 3.5, where the element “h ∈ I” in Theorem 5.1 can be g +h′ with general
element h′ ∈ m3 .
Definition 5.2. Let h ∈ m. There exists a unique resolution f : X → Spec A
such that CX and the strict transform H ⊂ X of divSpec A (h) have no intersection,
and that f is minimal among the resolutions with these properties. Note that
such a resolution is obtained by taking blowing-ups successively from the minimal
resolution. Then Z := divX (h) − H is a pg -cycle by Proposition 2.7 and every (−1)curve C on X satisfies ZC < 0 and CX C < 0.We call IZ the pg -ideal associated with
h.
From now on, we assume that the following condition holds for any integrally
closed m-primary ideal I ⊂ A:
(C1) If h ∈ I is a general element and I is represented by Z on X, and if divX (h) =
Z + H, then the divisor H is a disjoint union of nonsingular curves and each
component of H intersects the exceptional set transversally.
This condition holds in case the singularity is defined over a field of characteristic zero, since Bertini’s theorem can be applied to the image of H 0 (OX (−Z)) →
H 0 (OEi (−Z)).
Theorem 5.3. Let J = IM be an integrally closed m-primary ideal represented
by a cycle M on a resolution Y → Spec A, which is obtained by taking the minimal resolution of the blowing-up of J. Assume that h ∈ J satisfies the condition
divY (h) = M + H, where H is the strict transform of divSpec(A) (h) on Y .
If I is the pg -ideal associated to h, then we have
e(I) − e(J) ≥ CY H = −CY M
and ℓA (J/I) ≤ −CY M,
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
13
where the latter inequality is strict if J is not a pg -ideal.
If, moreover, h ∈ J is a general element, then we have the equalities
e(I) − e(J) = CY H = −CY M,
ℓA (J/I) = CY H − pg (A) − h1 (OY (−M))
and in this case I is a maximal pg -ideal contained in J.
In particular, every pg -ideal is associated with its general element.
Proof. First note that by definition, J is a pg -ideal if pg (A) − h1 (OY (−M)) = 0, and
this condition is equivalent to that CY M = 0 by Proposition 2.7.
We prove e(I) − e(J) ≥ CY H = −CY M by induction on CY H = −CY M. Our
assertion is obvious if CY H = 0.
In order to construct a resolution X → Y such that I = IZ is represented by a
cycle Z on X, we proceed by successive blowing-ups at points
X = Yr → Yr−1 → . . . → Y1 → Y0 = Y
and take anti-nef cycles Z0 = M, Z1 , . . . , Zr = Z so that
divYi (h) = Zi + Hi ,
where Hi is the strict transform of H on Yi . Note that CX H = 0.
We assume CY H > 0 and take a point P ∈ CY ∩ H. We also assume that
H has multiplicity a at P . Let π : Y1 → Y be the blowing-up at P and put
E0 = π −1 (P ). Then Z1 = π ∗ (M) + aE0 , since divY1 (h) = π ∗ (divY (h)) = π ∗ (M) +
aE0 + H1 = Z1 + H1 . We have seen in Proposition 2.6 that CY1 = π ∗ (CY ) − E0 .
Since CY1 H1 = CY H − a < CY H, we may assume −Z 2 − (−Z1 )2 ≥ CY1 H1 by our
induction hypothesis. Also, we have (−Z12 ) − (−M 2 ) = a2 . Hence we have
(−Z12 ) − (−M 2 ) ≥ CY H − CY1 H1
with equality if and only if a = 1.
If h ∈ J is a general element, by the condition (C1), we have a = 1 at every point
P ∈ CY ∩ H and hence equality e(I) − e(J) = CY H. Furthermore, from the exact
sequence
0 → OY1 (−Z1 ) → OY1 (−π ∗ (M)) → OE0 → 0,
we have I1 := H 0 (Y1 , OY1 (−Z1 )) ⊂ IM with ℓA (IM /I1 ) ≤ 1 and h1 (Y1 , OY1 (−Z1 )) =
h1 (Y, OY (−M)) or h1 (Y1 , OY1 (−Z1 )) = h1 (Y, OY (−M)) + 1, the latter holds if and
only if I1 = IM . Hence we have the equality
ℓA (J/I) = CY H − pg (A) − h1 (OY (−M)) .
Now, assume e(I) − e(J) = CY H and I ′ is a pg -ideal such that I ⊂ I ′ ⊂ J. We
may assume that I = IZ and I ′ = IZ ′ with Z ≥ Z ′ are represented on a resolution
X and we have a morphism φ : X → Y . Since I ′ ⊂ J, we have Z ′ ≥ φ∗ (M). Since
M = φ∗ (Z) ≥ φ∗ (Z ′ ) ≥ φ∗ (φ∗ (M)) = M, we must have φ∗ (Z ′ ) = M.
Take a general element h′ ∈ I ′ so that divX (h′ ) = Z ′ + H̃ ′, where H̃ ′ is the strict
transform of divSpec(A) (h′ ) on X. Then we have divY (h′ ) = φ∗ (divX (h′ )) = M + H ′ ,
where H ′ = φ∗ (H̃ ′ ), and we have CY H ′ = −CY M. Since I ′ is a pg -ideal, we must
have CX H̃ ′ = 0. By the argument as above, we have e(I ′ ) − e(J) ≥ CY H ′ =
−CY M = e(I) − e(J). Since I ⊂ I ′ , we have I ′ = I and we have shown that I is a
maximal pg -ideal contained in J.
14
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
Corollary 5.4. Let I be a maximal pg -ideal of A. Then I is a good ideal with
e(I) = e(m) − CX MX and µA (I) := ℓA (I/Im) = e(m) + 1, where f : X → Spec A is
any resolution such that m and I are represented on X and mOX = OX (−MX ).
Furthermore if A is Gorenstein, then
ℓA (A/I) = e(I)/2 = e(m) + pa (MX ) − 1.
Proof. We use the notation above and assume that J = IM = m. By Remark 4.7
(1), I is a good ideal. Let φ : X → Y be the natural morphism.
Since φ∗ M = MX and φ∗ CY = CX + D for some cycle D ≥ 0 with φ∗ (D) = 0 by
Proposition 2.6, we have CY M = (CX + D)(φ∗ M) = CX (φ∗ M) = CX MX . Hence
the first equality follows from Theorem 5.3. Since Z = φ∗ M + D ′ with a cycle
D ′ ≥ 0 satisfying φ∗ (D) = 0 and ZMX = (φ∗ M)2 = M 2 , it follows from [15, 6.2]
that µA (I) = −M 2 + 1 = e(m) + 1.
Suppose that A is Gorenstein. Then we may assume that KX and KY are cycles.
It follows from Remark 2.9 and [15, 4.2] that ℓA (A/I) = −Z 2 /2 and KX Z = 0. By
Proposition 2.6, there exists an effective cycle C ′ such that KY = −CY + C ′ and
Supp CY ∩ Supp C ′ = ∅, and KX + CX = φ∗ (KY + CY ). Then we obtain that
(KY + CY )M = φ∗ (KY + CY )Z = (KX + CX )Z = 0.
Thus CY M = −KY M. Using the formulas above and pa (M) = (M 2 + KY M)/2 + 1,
we obtain
e(I) = −M 2 + KY M = 2(−M 2 ) + M 2 + KY M = 2(e(m) + pa (M) − 1).
Clearly, pa (M) = pa (MX ), since φ∗ M = MX . Hence we obtain the last assertion.
Example 5.5. Let C be aL
nonsingular curve with genus g and D a divisor on
L C with
deg D = e > 0. Let R = n≥0 Rn , where Rn = H 0 (OC (nD)), and m = n≥1 Rn .
Let a = a(R), where
a(R) = max n ∈ Z H 1 (OC (nD)) 6= 0 (cf. [23, (2.2)]).
Assume that a ≥ 0, aD ∼ KC , and that R is generated by R1 as R0 -algebra. Then R
is Gorenstein by [23, (2.9)]. Let Y → Spec R be the blowing up of m and E ⊂ Y the
exceptional set; we have E ∼
= C. Then Y is the minimal resolution with E 2 = −e
and m is represented by M := E.
Since R is Gorenstein, there exists an integer k such that KY = −kE. From
(KY + E)E = deg KC = ae, we have KY = −CY = −(a + 1)E. We have
−M 2 = e,
CY M = (a + 1)e.
Let I be a pg -ideal associated with a general element h ∈ m. Since pa (M) = g and
h1 (OC ((a + 1)D)) = 0, from Theorem 5.3, we obtain that
µR (I) = e + 1,
ℓR (R/I) = e + g − 1 = h0 (OC ((a + 1)D)).
We will show that I = ma+2 + (h). Let X → Spec R (A is replaced by R), Z, and
H be as in Definition 5.2, and let φ : X → Y be the natural morphism. To obtain
X from Y , we need a + 1 blowing ups at the intersection of the exceptional set and
each irreducible component of the strict transform of divSpec R (h) (cf. the proof of
Theorem 5.1). Since the coefficient of the irreducible component of the exceptional
set of X intersecting H in the cycle Z is a + 2, we have (a + 2)φ∗ M ≥ Z. Therefore,
A CHARACTERIZATION OF TWO-DIMENSIONAL RATIONAL SINGULARITIES
15
Pa+1
ma+2 + (h) ⊂ I. L
Note that Rn ∼
= mn /mn+1 and ℓR (R/ma+2 ) = n=0 dim Rn . Since
h ∈ m \ m2 and n≥0 mn /mn+1 is a domain, the homomorphism
×h
R/ma+1 −−−−→ (h) + ma+2 /ma+2
is bijective. Therefore
ℓR (R/(h) + ma+2 ) = ℓR (ma+1 /ma+2 ) = ℓR (Ra+1 ) = h0 (OC ((a + 1)D)) = ℓR (R/I).
Hence I = (h) + ma+2 .
Acknowledgement. The authors thank the referee for careful reading of the paper
and helpful comments.
References
[1] Michael Artin, On isolated rational singularities of surfaces, Amer. J. Math. 88 (1966), 129–
136.
[2] Alberto Corso, Claudia Polini, and Bernd Ulrich, The structure of the core of ideals, Math.
Ann. 321 (2001), no. 1, 89–105.
[3]
, Core and residual intersections of ideals, Trans. Amer. Math. Soc. 354 (2002), no. 7,
2579–2594 (electronic).
[4] Steven Dale Cutkosky, A new characterization of rational surface singularities, Invent. Math.
102 (1990), no. 1, 157–177.
[5] Jean Giraud, Improvement of Grauert-Riemenschneider’s theorem for a normal surface, Ann.
Inst. Fourier (Grenoble) 32 (1982), no. 4, 13–23 (1983).
[6] Shiro Goto, Sin-Ichiro Iai, and Kei-Ichi Watanabe, Good ideals in Gorenstein local rings,
Trans. Amer. Math. Soc. 353 (2001), no. 6, 2309–2346 (electronic).
[7] Craig Huneke, Hilbert functions and symbolic powers , Michigan Math. J. 34 (1987), 293–318.
[8] Craig Huneke and Irena Swanson, Cores of ideals in 2-dimensional regular local rings, Michigan Math. J. 42 (1995), no. 1, 193–208.
[9] Craig Huneke and Ngô Viêt Trung, On the core of ideals, Compos. Math. 141 (2005), no. 1,
1–18.
[10] Eero Hyry and Karen E. Smith, On a non-vanishing conjecture of Kawamata and the core of
an ideal, Amer. J. Math. 125 (2003), no. 6, 1349–1410.
[11] Shiroh Itoh, Integral closure of ideals generated by regular sequence, J. Algebra 117 (1988),
390–401.
[12] Masahide Kato, Riemann-Roch theorem for strongly pseudoconvex manifolds of dimension 2,
Math. Ann. 222 (1976), no. 3, 243–250.
[13] Kyungyong Lee, A short note on containment of cores, Comm. Algebra 36 (2008), no. 10,
3890–3892.
[14] Joseph Lipman, Rational singularities, with applications to algebraic surfaces and unique factorization, Inst. Hautes Études Sci. Publ. Math. (1969), no. 36, 195–279.
[15] Tomohiro Okuma, Kei-ichi. Watanabe, and Ken-ichi. Yoshida, Good ideals and pg -ideals in
two-dimensional normal singularities, Manuscripta Math. 150 (2016), no. 3-4, 499–520.
[16]
, Rees algebras and pg -ideals in a two-dimensional normal local domain, Proc. Amer.
Math. Soc. 145 (2017), no. 1, 39–47, arXiv:1511.00827.
[17] Claudia Polini and Bernd Ulrich, A formula for the core of an ideal, Math. Ann. 331 (2005),
no. 3, 487–503.
[18] David Rees and Judith D. Sally, General elements and joint reductions, Michigan Math. J.
35 (1988), no. 2, 241–254.
[19] Miles Reid, Chapters on algebraic surfaces, Complex algebraic geometry, IAS/Park City Math.
Ser., vol. 3, Amer. Math. Soc., Providence, RI, 1997, pp. 3–159.
16
TOMOHIRO OKUMA, KEI-ICHI WATANABE, AND KEN-ICHI YOSHIDA
[20] Irena Swanson and Craig Huneke, Integral Closure of Ideals, Rings, and Modules, London
Mathematical Society, Lecture Note Series 336, Cambridge University Press, Cambridge/New
York/Melbourne/Madrid/ Cape Town/Singapore/Sãn Paulo, 2006.
[21] Masataka Tomari, A survey on normal surface singularities (in Japanese), Algebraic Geometry and Topology of Degenerations, Singularities and Coverings (Tagajo, March 1996).
[22] Jonathan M. Wahl, Vanishing theorems for resolutions of surface singularities, Invent. Math.
31 (1975), no. 1, 17–41.
[23] Kei-ichi Watanabe, Some remarks concerning Demazure’s construction of normal graded rings,
Nagoya Math. J. 83 (1981), 203–211.
(Tomohiro Okuma) Department of Mathematical Sciences, Faculty of Science, Yamagata University, Yamagata, 990-8560, Japan.
E-mail address: [email protected]
(Kei-ichi Watanabe) Department of Mathematics, College of Humanities and Sciences, Nihon University, Setagaya-ku, Tokyo, 156-8550, Japan
E-mail address: [email protected]
(Ken-ichi Yoshida) Department of Mathematics, College of Humanities and Sciences, Nihon University, Setagaya-ku, Tokyo, 156-8550, Japan
E-mail address: [email protected]
| 0math.AC
|
Modelling Biochemical Operations on RNA
Secondary Structures⋆
arXiv:cs/0306016v1 [cs.CE] 3 Jun 2003
Mercè Llabrés and Francesc Rosselló
Dept. of Mathematics and Computer Science,
Research Institute of Health Science (IUNICS),
University of the Balearic Islands,
07122 Palma de Mallorca (Spain)
{merce.llabres,cesc.rossello}@uib.es
Abstract. In this paper we model several simple biochemical operations
on RNA molecules that modify their secondary structure by means of a
suitable variation of Große-Rhode’s Algebra Transformation Systems.
1
Introduction
Biochemical processes are responsible for most of the information processing that
takes place inside the cell. In the recent years, several representations and simulations of specific biochemical processes have been proposed using well known
rewriting formalisms borrowed from Theoretical Computer Science. Let us mention, for instance, Fontana’s lambda calculus chemistry [3,4], recently revised by
Müller [9] (for a recent survey on artificial chemistry, see [14]), the stochastic
Petri net approach [5], the π-calculus representation of biochemical processes
carried out by networks of proteins [10], and the graph replacement approach to
DNA operations [8]. In the latter, an ad hoc graph replacement formalism is developed to formalize DNA biochemical operations like annealing or denaturing,
by considering DNA double strands to be special graphs.
There is another popular line of research in theoretical biochemistry that
aims to represent the three-dimensional structure of biopolymers, and specially
of DNA and RNA, by means of different kinds of formal grammars; see, for
instance, [7,13] for two surveys on this topic. The ultimate goal of such a representation is to understand how the three-dimensional structure of a biopolymer
is determined from its sequence of monomers (for instance, how the sequence
of ribonucleotides of an RNA molecule determines its secondary structure; see
below for the relevant details of RNA’s biochemistry), and how this structure
evolves when the biopolymer is modified through biochemical processes.
Sooner or later, this two lines of research should intersect, and the main
goal of this paper is to move these two lines of research a step closer. We formalize some simple biochemical processes on RNA molecules, like for instance
⋆
This work has been partially supported by the Spanish DGES, grant BFM2000-1113C02-01.
ribonucleotide removals or mutations, and their effect on their three-dimensional
structures by means of a variant of Große Rhode’s Algebra Transformation Systems (ATS) [6] on partial algebras [1] representing RNA biomolecules.
Before entering into more details, it is time to introduce a little biochemistry.
As probably everybody knows, RNA molecules, together with DNA molecules
and proteins, form the molecular basis of life. An RNA molecule can be viewed
as a chain of ribonucleotides, and each ribonucleotide is characterized by the
base attached to it, which can be either adenine (A), cytosine (C), guanine
(G) or uracil (U ). An RNA molecule is uniquely determined by the sequence of
bases along its chain, and it has a definite orientation. Such an oriented chain of
ribonucleotides is called the primary structure of the RNA molecule.
In the cell and in vitro, each RNA molecule folds into a specific threedimensional structure that determines its biochemical activity. To determine this
structure from the primary structure of the molecule is one of the main open
problems in computational biology, and partial solutions have been proposed
using Stochastic Context Free Grammars and Dynamic Programming, among
other tools; see, for instance, [2, Chaps. 9, 10].
This three-dimensional structure is held together by weak interactions called
hydrogen bonds between pairs of non-consecutive bases.1 Almost all these bonds
form between complementary bases, i.e., between A and U and between C and
G, but other pairings do also occur sporadically. For simplicity, in this paper we
shall only consider pairings between complementary bases.
In most representations of RNA molecules, the detailed description of their
three-dimensional structure is overlooked and the attention is focused on its secondary structure: the set of its base pairs, or contacts. Secondary structures are
actually a simplified representation of RNA molecules’ three-dimensional structure, but that is enough in some applications, as different levels of “graining”
are suitable for different problems. Two restrictions are usually added to the
definition of secondary structure:
– If two bases bi and bj are paired, then neither bi or bj can bond with any
other base; this restriction is called the unique bonds condition.
– If contacts exist between bases bi and bj and between bases bk and bl , and if
bk lies between bi and bj , then bl also lies between bi and bj ; this restriction
is called the no-pseudoknots condition.
The unique bonds condition simply captures the fact that the “bond” between
two consecutive bases is of different nature, as a part of the molecule’s backbone. The no-pseudoknots condition is usually added in order to enable the use
of dynamic programming methods to predict RNA secondary structures and,
although real three-dimensional RNA structures have (pseudo)knots, we impose
it here to show the scope of our approach: if pseudoknots are allowed, one simply
has to allow them in the algebraic representation of RNA secondary structures
1
Actually, for a hydrogen bond to be stable, the bases involved in it must be several
nucleotides apart, but for simplicity we shall only consider the restriction that they
must be non-consecutive.
and to remove the corresponding production rules from the rewriting system.
Thus,
This allows traditionally to represent an RNA molecule as a labelled graph,
with nodes representing the ribonucleotides, and their labels denoting the bases
attached to them, and arcs of two different kinds: ones representing the order
of the bases in the primary structure (the backbone) and the rest representing
the bonds that form the secondary structure (the contacts) [11,12]. Our representation is slightly different: the backbone is represented by a partial algebra
corresponding, essentially, to a labelled finite chain, and then the contacts are
specified as arcs of a graph on the nodes of the backbone.
There are some biochemical operations that can be carried out on an RNA
molecule. For instance, a ribonucleotide can be added or removed somewhere in
the primary structure, a contact can form between two complementary bases, or
it can be removed, and a base can mutate into another base. These operations
may have collateral effects: for instance, if a base mutates into another one and it
was involved in a contact, then this contact will disappear, as the corresponding
bases will no longer be complementary, and if a nucleotide is removed and as
a consequence two nucleotides forming a contact become consecutive, then this
contact will also break.
It is precisely when we tried to specify these side effects that we were not
able to use simple graph transformation systems in an easy way, and we decided
to use the ATS approach. ATS is a very powerful algebra rewriting formalism,
introduced by M. Große-Rhode in 1999 in order to specify the behavior of complex states software systems. It is operationally described, but not categorically
formalized, and it takes care of side effects of the application of rules, similar
to those found in our work. Unfortunately, even the ATS formalism as defined
in [6], which was designed with software engineering specification applications
in mind, was not suitable, as it stands, for our purposes. Thus we have slightly
modified a simplified version of it, and we have dubbed the resulting formalism Withdrawal-based Algebra Transformation Systems (WATS). The reason is
that, in our approach, the inconsistencies are eliminated by retreating, i.e., by
removing, in a controlled way, the elements and operations that produce them,
while in the original ATS approach the inconsistencies were eliminated by adding
operations and identifying points.
The rest of this paper is organized as follows. In Section 2 we represent RNA
molecules as suitable partial algebras, in Section 3 we briefly introduce the WATS
formalism, and then in Section 4 we show how to represent the aforementioned
biochemical operations on RNA molecules by means of WATS production rules.
A final section on Conclusions closes the paper.
2
RNA Molecules as Partial Algebras
Roughly speaking, we represent the primary structure of an RNA molecule as a
chain n of length n ∈ N with a label in {A, C, G, U } attached to each element of
the chain, representing the base attached to the corresponding ribonucleotide,
and its secondary structure by means of ordered pairs in n × n.
Let Σps be the following many-sorted signature:
Sorts : N at, Bases
Opns : suc : N at → N at
F irst, Last :→ N at
A, C, G, U :→ Bases
minor : N at, N at → N at
label : N at → Bases
κ : Bases → Bases
An RNA primary structure is a finite partial Σps -algebra
P = (PN at , PBases ;
F irstP , LastP , AP , C P , GP , U P , sucP , minorP , labelP , κP )
such that:
i) (PN at ; F irstP , LastP , sucP ) is a chain with successor operation sucP , first
element F irstP and last element LastP .
ii) The operation minorP models the strict minority relation on this chain:
minorP (x, y) = x if and only if there exists some n ≥ 1 such that y =
(sucP )n (x).
iii) The values of the nullary operations AP , C P , GP , U P are pairwise different,
PBases = {AP , C P , GP , U P }, and on this set the operation κP is given by
the involution
κP (AP ) = U P , κP (U P ) = AP , κP (C P ) = GP , κP (GP ) = C P .
iv) The operation labelP is total.
Notice that all these conditions except the last one cannot be specified through
quasi-equations, since they are not satisfied by a trivial (with only one element
of each sort) total Σps -algebra.
Let Σss be now the signature containing Σps and, in addition, the following
sorts and operation symbols:
Sorts : Contacts
Opns : p1 : Contacts → N at
p2 : Contacts → N at
An RNA secondary structure is a partial Σss -algebra
B = (BN at , BBases , BContacts ;
B
F irstB , LastB , AB , C B , GB , U B , sucB , minorB , labelB, κB , pB
1 , p2 )
whose Σps -reduct is an RNA primary structure and it satisfies moreover the
following quasi-equations:
B
(1) pB
1 and p2 are total
B
(2) pB
1 (x) = p1 (y) ⇒ x = y
B
(3) pB
2 (x) = p2 (y) ⇒ x = y
B
(4) pB
1 (x) = p2 (y) ⇒ x = y
B
B B
(5) minor(succB (pB
1 (x)), p2 (x)) = succ (p1 (x))
B
B
B
B
B
(6) minor(pB
1 (x), p1 (y)) = p1 (x) ∧ minor(p1 (y), p2 (x)) = p1 (y)
B
B
B
=⇒ minor(p2 (y), p2 (x)) = p2 (y)
B B
(7) κB (labelB(pB
1 (x))) = label (p2 (x))
In such an RNA secondary structure, each element c of sort Contacts repreB
sents, of course, a contact between nucleotides pB
1 (c) and p2 (c). Equations (2),
(3) and (4) represent the unique bonds condition, equation (5) represents the fact
that there cannot exist a contact between a nucleotide and itself or its successor
in the primary structure, equation (6) represents the no-pseudoknots condition,
and equation (7) represents the fact that a contact can only pair complementary
bases. Notice that, if we simply omit equation (6) then, pseudoknots are allowed
in the representation of RNA molecules.
Let Γss = (Σss , CE) be the specification whose set of consistence equations
CE are the quasi-equations (1) to (7) above. Let AlgΓss the category whose objects are all partial Γss -algebras, i.e., those partial Σss -algebras satisfying equation (1) to (7), and the morphisms between them are the plain homomorphisms,
and let AlgRN A be the full subcategory of AlgΓss supported on the RNA secondary structures.
3
Withdrawal-based Σss-Algebra Transformation
Systems
Our Withdrawal-based Algebra Transformation Systems (WATS) are a modification of a simplified version of the Algebra Transformation Systems (ATS)
introduced in [6]. This modification only affects the last step in the definition of
the application of a rewriting rule through a matching, and therefore all definitions previous to that one are the same as in the original ATS formalism. Since
we are only interested in rewriting RNA secondary structures, we shall only give
the main definitions for the signature Σss introduced in the previous section.
So, to simplify the notations, let us denote by S, Ω and η the set of sorts, the
set of operation symbols and the arity function of the signature Σss . For every
ϕ ∈ Ω, set η(ϕ) = (ω(ϕ), σ(ϕ)) ∈ S ∗ × S.
A Σss -presentation is a pair P = (PS , PE ) where PS = (Ps )s∈S is an Sset, whose elements will be called generators, and PE is a set of equations with
variables in PS
t = t′ ,
t, t′ ∈ TΣss (PS )s , s ∈ S.
A special type of equations are the function entries, of the form
ϕ(a) = b,
ω(ϕ)
ϕ ∈ Ω, a ∈ PS
, b ∈ Pσ(ϕ) .
A presentation is functional when all its equations are function entries, and a
functional presentation is consistently functional when for every ϕ ∈ Ω and
ω(ϕ)
a ∈ PS , there is at most one function entry of the form ϕ(a) = b in PE .
Let p : PS → PS′ be a mapping of S-sets. If e is an equation t = t′ with
′
t, t ∈ TΣss (PS )s , then we shall denote by e[p] the equation t(p) = t′ (p) where
t(p), t′ (p) ∈ TΣss (PS′ )s are the terms obtained from t and t′ , respectively, by
replacing all variables in them by their corresponding images under p. In particular, if e is the function entry ϕ(a) = b, then e[p] stands for the function entry
ϕ(p(a)) = pσ(ϕ) (b). Given a mapping of S-sets p : Ps → Ps′ and any set E of
equations with variables in PS , let
E[p] = {e[p] | e ∈ E}.
A morphism of Σss -presentations p : (PS , PE ) → (PS′ , PE′ ) is then a mapping of
S-sets p : PS → PS′ such that PE [p] ⊆ PE′ .
A Σss -rewriting rule is a pair of Σss -presentations, written r = (Pl ←→ Pr ),
where Pl = (Xl , El ) and Pr = (Xr , Er ) are functional presentations. Informally,
the left-hand side presentation in such a rule specifies the elements and operations that must be removed from the algebra which the rule is applied to,
while its right-hand side presentation specifies the elements and operations to
be added. The generators that occur in a rule play the role of variables (and
therefore we shall usually call them variables): those appearing in the left-hand
side presentation must be matched into the algebra to rewrite, and those appearing in the right-hand side presentation must be matched into the resulting
algebra, in such a way that if a variable occurs in both parts of a rule, its image
must be preserved. In the sequel, we shall assume that all variables that occur
in rewriting rules are taken from a universal S-set X that is globally fixed and
disjoint from all sets of operation symbols in the signatures we use. We shall also
assume that X is large enough to contain equipotent copies of the carrier sets
of all algebras we are interested in.
For every Σss -rewriting rule r = (Pl ←→ Pr ), with Pl = (Xl , El ) and Pr =
(Xr , Er ), let:
Xr0 = Xr − Xl ,
Xl0 = Xl − Xr ,
0
El = El − Er ,
Er0 = Er − El .
For every Γss -algebra A = (A, (ϕA )ϕ∈Ωss )), let AS = A and
Ae = {ϕ(a) = b | ϕ ∈ Ωss , a ∈ dom ϕA , ϕA (a) = b}.
A match m for a Σss -rewriting rule r = (Pl ←→ Pr ) in A is simply a presentation morphism m : Pl → (AS , AE ). The extension
m∗ : Xl ∪ Xr → AS ⊔ Xr0
of m is defined by2
∗
m (x) =
m(x) ∈ AS if x ∈ Xl
x ∈ Xr0
if x ∈ Xr0 = Xr − Xl
The application of r to A through m rewrites then A into the partial Γss algebra B defined, step by step, as follows:
1) Set BS = (AS − m(Xl0 )) ⊔ Xr0 . This step removes from A the elements that
are images of elements in Xl that do no longer belong to Xr , and adds to it
the elements in Xr that did not belong to Xl .
2) Set BE = (AE − El0 [m]) ∪ Er0 [m∗ ]. This step removes from A the operations
that are images of function entries in El that do no longer belong to Er , and
adds to it the equations in Er that did not belong to El , with variables in
BS .
3) Since the presentation (BS , BE ) is functional, it defines a partial Σss -algebra
with carrier set B = BS by simply translating the function entries in BE into
operations; if this presentation is not consistently functional, then we must
identify elements in B in order to remove inconsistencies. This step can be
formally described by means of a functor left adjoint to a functor that sends
every Σss -algebra to its presentation (AS , AE ).
4) If the Σss -algebra defined in this way satisfies equations (1) to (7), we are
done. Otherwise, there are two possibilities:
– Every contact x ∈ BContacts that violates equations (1), (5) or (7) is
removed.
– After performing all removals in the previous step, if there are still pairs
of contacts x, y ∈ BContacts that violate equations (2), (3), (4) or (6),
then, if one of them comes from Xr0 and the other comes from AS , the
one from Xr0 is removed and the other one preserved, and otherwise both
are removed.
It is in step (4) where the main difference between Große-Rhode’s original
ATS formalism and our WATS formalism lies. In ATS, the Σss -algebra obtained
in (3) would be forced to satisfy equations (1) to (7) by taking its universal
solution in AlgΓss , and thus adding operations and identifying elements. In our
formalism, violations of equations (1) to (7) are obviated by simply removing in
a controlled way the contacts that yield them.
4
Biochemical operations modelled by means of WATS
The biochemical operations considered in this paper are the addition, deletion
and mutation of a ribonucleotide and the addition and deletion of a contact.
Each of these biochemical operations can be modelled as a rewriting step of a
2
As always, we identify any set with its image into its disjoint union with any other
set.
WATS by the applications of a Σss -rewriting rule to a RNA secondary structure.
The rewriting rules that model these biochemical operations are the following
ones.
Adding a nucleotide: We have to consider three different cases, corresponding
to adding the new nucleotide at the beginning of the chain, at the end, or
in the middle of it. In this case, each rule must be understood as having a
parameter x which corresponds to the base attached to the new nucleotide.
So, there are four different values of this parameter, the nullary operation
symbols A, U , C and G.
– Rule Padd−base−f irst (x) has:
• as Pl the set of variables Xl = {k1 } of sort N at and the set of
equations El = {F irst = k1 };
• as Pr the set of variables Xr = {t, k1 , k0 }, of sorts t ∈ Bases and
k1 , k0 ∈ N at, and the set of equations Er = {F irst = k0 , suc(k0 ) =
k1 , label(k0 ) = t, x = t}.
– Rule Padd−base−last (x) has
• as Pl the set of variables Xl = {kn } of sort N at and the set of
equations El = {Last = kn };
• as Pr the set of variables Xr = {t, kn+1 , kn }, of sorts t ∈ Bases and
kn+1 , kn ∈ N at, and the set of equations Er = {Last = kn+1 , suc(kn )
= kn+1 , label(kn+1) = t, x = t}.
– Rule Padd−base−middle (x) has:
• as Pl the set of variables Xl = {ki , kj } of sort N at and the set of
equations El = {suc(ki ) = kj };
• as Pr the set of variables Xr = {t, ki , kj , k}, of sorts t ∈ Bases and
ki , kj , k ∈ N at, and the set of equations Er = {suc(ki ) = k, suc(k) =
kj , label(k) = t, x = t}.
Remove a nucleotide: We have to consider again three different cases, corresponding to removing the nucleotide at the beginning of the chain, at the
end, or in the middle of it.
– Rule Pdel−base−f irst has:
• as Pl the set of variables Xl = {k1 , k0 }, both of sort N at, and the
set of equations El = {F irst = k0 , suc(k0 ) = k1 };
• as Pr the set of variables Xr = {k1 } of sort N at and the set of
equations Er = {F irst = k1 }.
– Rule Pdel−base−last has:
• as Pl the set of variables Xl = {kn−1 , kn }, both of sort N at, and the
set of equations El = {Last = kn , suc(kn−1 ) = kn };
• as Pr the set of variables Xr = {kn−1 } of sort N at and the set of
equations Er = {Last = kn−1 }.
– Rule Pdel−base−middle has:
• as Pl the set of variables Xl = {ki , kj , kl }, all of them of sort N at,
and the set of equations El = {suc(ki ) = kl , suc(kl ) = kj };
• as Pr the set of variables Xr = {ki , kj } of sort N at and the set of
equations Er = {suc(ki ) = kj }.
Mutating a base: The mutation of a base is specified by just redefining the
operation label. Thus we consider the following rule:
– Rule Pmutation has:
• as Pl the set of variables Xl = {x, y, k}, of sorts x, y ∈ Bases and
k ∈ N at, and the set of equations El = {label(k) = x};
• as Pr the set of variables Xr = {x, y, k}, of sorts x, y ∈ Bases and
k ∈ N at and the set of equations Er = {label(k) = y}.
Adding a contact: To add a contact we simply add a new element of sort
Contact and the projections from it to the nucleotides it bonds.
– Rule Padd−contact has:
• as Pl the set of variables Xl = {x, y, ki , ki+1 , kj }, of sorts x, y ∈
Bases and ki , ki+1 , kj ∈ N at, and the set of equations El = {suc(ki )
= ki+1 , minor(ki+1 , kj ) = ki+1 , κ(x) = y, κ(y) = x, label(ki ) = x,
label(kj ) = y};
• as Pr the set of variables Xr = {x, y, ki , ki+1 , kj , c}, of sorts x, y ∈
Bases, ki , ki+1 , kj ∈ N at and c ∈ Contacts, and the set of equations
Er = {suc(ki ) = ki+1 , minor(ki+1 , kj ) = ki+1 , κ(x) = y, κ(y) =
x, p1 (c) = ki , p2 (c) = kj , label(ki ) = x, label(kj ) = y}.
Remove a contact: To remove a contact we simply delete it.
– Rule Pdel−contact has:
• as Pl the set of variables Xl = {ki , kj , c}, of sorts ki , kj ∈ N at and
c ∈ Contacts, and the set of equations El = {p1 (c) = ki , p2 (c) = kj };
• as Pr the set of variables Xr = {ki , kj }, both of sort N at, and the
set of equations Er = ∅.
It is not difficult to check that an RNA secondary structure is always rewritten by the application of any one of these rules through any matching into an
RNA secondary structure, and that in each case their effect is the desired one.
This must be done rule by rule and case by case.
5
Conclusion
We have modelled several simple biochemical operations on RNA molecules that
modify their secondary structure by means of rewriting rules in a modified version of the Algebra Transformation Systems of Große-Rhode, which we have
dubbed Withdrawal-based Algebra Transformation Systems. This modification
has been made ad hoc for algebras representing RNA secondary structures, but
we feel that the philosophy of removing inconsistencies by retreating should have
applications in other contexts, and could probably be formalized for algebras over
arbitrary specifications.
In this paper we have made some simplifications on the RNA secondary
structure that could perfectly be avoided. For instance, if we want to allow
contacts between pairs of basis other than the usual complementary pairs, like
for instance between G and U (they are called wobble pairs, not so uncommon),
then we only have to replace the involution κ by a symmetric relation on the
carrier of sort Bases. And if we want to impose that two bases paired by a
contact must be at least at a fixed distance, we only have to modify in a suitable
way equation (5).
There are also other collateral effects that could, and probably should, be
specified. For instance, isolated contacts tend to break, and pseudoknots should
be allowed under certain circumstances.
References
1. Burmeister, P., A Model Theoretic Oriented Approach to Partial Algebras. Mathematical Research 32, Akademie-Verlag (1986).
2. Durbin, R., Eddy, S., Krogh, A., Mitchison, G., Biological Sequence Analysis. Cambrideg Univ. Press (1998).
3. Fontana, W., “Algorithmic chemistry.” In Artificial Life II (Addison-Wesley, 1992),
159–210. Also Technical Report LA-UR 90-1959, Los Alamos National Lab. (1990).
4. Fontana, W., Buss, L. W. “The barrier of objects: from dynamical systems to
bounded organization.” In Boundaries and Barriers (Addison-Wesley, 1996), 56–
116.
5. Goss, P., Peccoud, J. “Quantitative modeling of stochastic systems in molecular
biology by using stochastic Petri nets.” Proc. Nat. Acad. Sicences USA 95 (1998),
6750–6755.
6. Große-Rhode, M. “Specification of State Based Systems by Algebra Rewrite Systems and Refinements.” Technical Report 99-04, TU Berlin (March 1999).
7. Mayoh, B. “DNA Pattern multigrammars.” Technical Report (1994).
8. McCaskill, J., Niemann, U. “Graph replacement chemistry for DNA processing.” In
Proc. DNA6: 6th International Meeting on DNA based computers, DIMACS Series
in Discrete Mathematics and Theoretical Computer Science (AMS, to appear),
89–99.
9. Müller, S. Functional Organization in Molecular Systems and the λ-calculus. PhD
Thesis, Univ. Wien (1999).
10. Regev, A., Silverman, W., Shapiro, E. “Representation and simulation of biochemical processes using the π-calculus process algebra.” In Proc. Pacific Symposyum
on Biocomputing 2001 (2001), 459–470.
11. C. Reidys, P. F. Stadler, Bio-molecular shapes and algebraic structures. Computers
& Chemistry 20 (1996), 85–94.
12. P. Schuster, P. F. Stadler, Discrete models of biopolymers. Univ. Wien TBI
Preprint No. pks-99-012 (1999).
13. Searls, D. B. “Formal Language and Biological Macromolecules”. In Mathematical Support for Molecular Biology, DIMACS Series in Discrete Mathematics and
Theoretical Computer Science 47 (AMS, 1999), 117–140.
14. Speroni di Fenizio, P. “Artificial Chemistries.” Bulletin EATCS 76 (February
2002), 128–141.
| 5cs.CE
|
Generalizing the Convolution Operator
to extend CNNs to Irregular Domains
Jean-Charles Vialatte1,2 , Vincent Gripon2 , Grégoire Mercier2
arXiv:1606.01166v4 [cs.LG] 25 Oct 2017
1
Cityzen Data
Guipavas, Brittany, France
2
Telecom Bretagne
Brest, Brittany, France
1
2
[email protected]
{jc.vialatte, vincent.gripon, gregoire.mercier}@telecom-bretagne.eu
Abstract
Convolutional Neural Networks (CNNs) have become the state-of-the-art in supervised learning vision tasks. Their convolutional filters are of paramount importance
for they allow to learn patterns while disregarding their locations in input images.
When facing highly irregular domains, generalized convolutional operators based
on an underlying graph structure have been proposed. However, these operators do
not exactly match standard ones on grid graphs, and introduce unwanted additional
invariance (e.g. with regards to rotations). We propose a novel approach to generalize CNNs to irregular domains using weight sharing and graph-based operators.
Using experiments, we show that these models resemble CNNs on regular domains
and offer better performance than multilayer perceptrons on distorded ones.
1
Introduction
CNNs[1] are state-of-the-art for performing supervised learning on data defined on lattices [2].
Contrary to classical multilayer perceptrons (MLPs) [3], CNNs take advantage of the underlying
structure of the inputs. When facing data defined on irregular domains, CNNs cannot always be
directly applied even if the data may present an exploitable underlying structure.
An example of such data are spatio-temporal time series generated by a set of Internet of Things
devices. They typically consist of datapoints irregularly spaced out on a Euclidean space. As a result,
a graph G can be defined where the vertices are the devices and the edges connect neighbouring ones.
Other examples include signals on graphs including brain imaging, transport networks, bag of words
graphs. . . In all these examples, a signal can generally be seen as a vector in Rd where d is the order
of the graph. As such, each vertex is associated with a coordinate, and the edges weights represent
some association between the corresponding vertices.
Disregarding the graph G, MLPs can be applied on these datasets. We are interested in defining
convolutional operators that are able to exploit G as well as a possible embedding Euclidean space.
Our motivation is to imitate the gain of performance allowed by CNNs over MLPs on irregular
domains.
In graph signal processing, extended convolutional operators using spectral graph theory [4] have
been proposed [5]. These operators have been applied to deep learning [6] and obtain performance
similar to CNNs on regular domains, despite the fact they differ from classical convolutions. However,
for slightly distorted domains, the obtained operators become non-localized, thus failing taking
account of the underlying structure.
1
We propose another approach that generalizes convolutional operators by taking into account G.
Namely, we make sure that the proposed solution has properties inherent to convolutions: linearity,
locality and kernel weight sharing. We then apply it directly to the graph structure. We use it as a
substitution of a convolutional layer in a CNN and stress our resulting technique on comparative
benchmarks, showing a significant improvement compared with a MLP. The obtained operator
happens to exactly be the classical convolutional one when applied on regular domains.
The outline of the paper is as follows. In Section 2, we discuss related work. In Section 3 we introduce
our proposed operator. In Section 4 we explain how to apply it to CNN-like structures. Section 5
contains the experiments. Section 6 is a conclusion.
2
Related Works
For graph-structured data, Bruna et al. [6] have proposed an extension of the CNN using graph signal
processing theory [5]. Their convolution is defined in the spectral domain related to the Laplacian
matrix of the graph. As such, in the case where the graph is a lattice, the construction is analogous to
the regular convolution defined in the Fourier domain. The operation is defined as spectral multipliers
obtained by smooth interpolation of a weight kernel, and they explain how it ensures the localization
property. In that paper, they also define a construction that creates a multi-resolution structure of
a graph, for allowing it to support a deep learning architecture. Henaff et al. [7] have extended
Bruna’s spectral network to large scale classification tasks and have proposed both supervised and
unsupervided methods to find an underlying graph structure when it isn’t already given.
However, when the graph is irregular, they partly lose the localization property of their convolution is
partially lost. As the spectral domain is undirected with respect to the graph domain, some sort of
rotation invariances are also introduced. Hence, the results in the graph domain aren’t ressembling to
those of a convolution. In our case, we want to define a convolution supported locally. Moreover, we
want that every input can be defined on a different underlying graph structure, so that the learnt filters
can be applied on data embedded in the same space regardless of what structure have supported the
convolution during the training.
These properties are also retained by the convolution defined in the ShapeNet paper[8], which defines
a convolution for data living on non-euclidean manifolds. I.e their construction does maintain the
locality and allow for reusing the learnt filters on other manifolds. However, it requires at least
a manifold embedding of the data and a geodesic polar coordinates system. Although being less
specific, our proposed method will be a strict generalization of CNN in the sense that CNNs are a
special case of it.
In the case where the data is sparse, Graham [9] has proposed a framework to implement a spatially
sparse CNN efficiently. If the underlying graph structure is embedded into an Euclidean space, the
convolution we propose in this paper can be seen as spatially sparse too, in the sense that the data has
only non-zero coordinates on the vertices of the graph it is defined on. In our case we want to define
a convolution for which the inputs can have values on any point of the embedding space, whereas in
the regular case inputs can only have values on vertices of an underlying grid.
3
3.1
Proposed convolution operator
Definitions
Let S be a set of points, such that each one defines a set of neighbourhoods.
An entry e of a dataset D is a column vector that can be of any size, for which each dimension
represents a value taken by e at a certain point u ∈ S. u is said to be activated by e. A point u can be
associated to at most one dimension of e. If it is the ith dimension of e, then we denote the value
taken by e at u by either eu or ei . D is said to be embedded in S.
We say that two entries e and e0 are homogeneous if they have the same size and if their dimensions
are always associated to the same points.
2
3.2
Formal description of the generalized convolution
Let’s denote by C a generalized convolution operator.We want it to observe the following conditions:
• Linearity
• Locality
• Kernel weight sharing
As C must be linear, then for any entry e, there is a matrix W e such that C(e) = W e e. Unless the
entries are all homogeneous, W e depends on e. For example, in the case of regular convolutions on
images, W is a Toeplitz matrix and doesn’t depend on e.
In order to meet the locality condition, we first want that the coordinates of C(e) have a local meaning.
To this end, we impose that C(e) lives in the same space as e, and that C(e) and e are homogeneous.
Secondly, for each u, we want C(e)u to be only function of values taken by e at points contained in a
certain neighbourhood of u. It results that rows of W e are generally sparse.
Let’s attribute to C a kernel of n weights in the form of a row vector w = (w1 , w2 , .., wn ), and let’s
define the set of allocation matrices A as the set of binary matrices that have at most one non-zero
coordinate per column. As C must share its weights across the activated points, then for each row
Wie of W e , there is an allocation matrix Aei ∈ A such that Wie = wAei . To maintain locality, the jth
column of Aei must have a non-zero coordinate if and only if the ith and jth activated points are in a
same neighbourhood.
Let’s Ae denotes the block column vector that has the matrices Aei for attributes, and let’s ⊗ denotes
the tensor product. Hence, C is defined by a weight kernel w and an allocation map e 7→ Ae that
maintains locality, such that
C(e) = (w ⊗ Ae ) . e
3.3
(1)
The underlying graph that supports the generalized convolution
As vertices, the set of activated points of an entry e defines a complete oriented graph that we call Ge .
If all the entries are homogeneous, then Ge is said to be static. In this case, we note G. Otherwise,
there can be one different graph per entry so the kernel of weights can be re-used for new entries
defined on different graphs.
Suppose we are given u 7→ Vu which maps each u ∈ S to a neighbourhood Vu . We then define GeV
as the subgraph of Ge such that it contains the edge (u0 , u) if and only if u0 ∈ Vu . Let aV : e 7→ Ae
be an allocation map such that the jth column of Aei have a non-zero coordinate if and only if (ei , ej )
is an edge of GeV .
Then the generalized convolution of e by the couple (w, aV ) is supported by the underlying graph
GeV in the sense that WVe = w ⊗ aV (e) is its adjacency matrix. Note that the underlying graph of a
regular convolution is a lattice.
Also note that the family (Vu )u∈S can be seen as local receptive fields for the generalized convolution,
and that the map aV can be seen as if it were distributing the kernel weights into each Vu .
Remarks
The generalized convolution has been defined here as an operation between a kernel weight and a
vector. If G = (E, V ) denotes a graph, then such operator ∗ with respect to a third rank tensor A
could also have been defined as a bilinear operator between two graph signals f, g ∈ RE :
f ∗ g = (f > ⊗ A) . g
>
∀v ∈ V, (f ∗ g)(v) = f Av g, with Av ∈ A
(2)
(3)
Note that the underlying graph depends on the entry. So the learnt filter w is reusable regardless of
the entry’s underlying graph structure. This is not the case for convolutions defined on fixed graphs
like in [6, 7].
3
3.4
Example of a generalized convolution shaped by a rectangular window
Let E be a two-dimensional Euclidean space and let’s suppose here that S = E.
Let’s denote by CR , a generalized convolution shaped by a rectangular window R. We suppose that
its weight kernel w is of size Nw = (2p + 1)(2q + 1) and that R is of width (2p + 1)µ and height
(2q + 1)µ, where µ is a given unit scale.
Let Gep,q be the subgraph of Ge such that it contains the edge (u0 , u) if and only if |u0x −ux | ≤ (p+ 12 )µ
and |u0y − uy | ≤ (q + 12 )µ. In other terms, Gep,q connects a vertex u to every vertex contained in R
when centered on u.
Then, we define CR as being supported by Gep,q . As such, its adjacency matrix acts as the convolution
operator. At this point, we still need to affect the kernel weights to its non-zero coordinates, via
the edges of Gep,q . This amounts for defining explicitely the map e 7→ Ae for CR . To this end, let’s
consider the grid of same size as that rectangle, which breaks it down into (2p + 1)(2q + 1) squares
of side length µ, and let’s associate a different weight to each square. Then, for each edge (u0 , u), we
affect to it the weight associated with the square within which u0 falls when the grid is centered on u.
This procedure allows for the weights to be shared across the edges. It is illustrated on figure 1.
Note that if the entries are homogeneous and the activated points are vertices of a regular grid, then
the matrix W , independant of e, is a Toepliz matrix which acts as a regular convolution operator on
the entries e. In this case, CR is just a regular convolution. For example, this is the case in section 3.5.
µ
µ
(2p + 1)µ
S=E
S=E
Figure 1: Example of a moving grid. The grid
defines the allocation of the kernel weights.
3.5
Figure 2: On regular domains, the moving grid
allocates the weights similarly to the moving window of a standard convolution.
Link with the standard convolution on image datasets
Let D be an image dataset. Entries of D are homogeneous and their dimensions represent the value
at each pixel. In this case, we can set S = E, of dimension 2, such that each pixel is located at entire
coordinates. More precisely, if the images are of width n and height m, then the pixels are located at
coordinates (i, j) ∈ {0, 1, 2, ..., n}x{0, 1, 2, ..., m}. Hence, the pixels lie on a regular grid and thus
are spaced out by a constant distance µ = 1.
Let’s consider the static underlying graph Gp,q and the generalized convolution by a rectangular
window CR , as defined in the former section. Then, applying the same weight allocation strategy will
lead to affect every weight of the kernel into the moving window R. Except on the border, one and
only one pixel will fall into each square of the moving grid at each position, as depicted in figure 2.
Indeed, R behaves exactly like a moving window of the standard convolution, except that it considers
that the images are padded with zeroes on the borders.
4
4
4.1
Application to CNNs
Neural network interpretation
Let Ld and Ld+1 be two layers of neurons, such that forward-propagation is defined from Ld to
Ld+1 . Let’s define such layers as a set of neurons being located in S. These layers must contain as
many neurons as points that can be activated. In other terms, S ∼
= Ld ∼
= Ld+1 . As such, we will
abusively use the term of neuron instead of point.
Ld
Ld+1
Figure 3: Generalized convolution between two layers of neurons.
The generalized convolution between these two layers can be interpreted as follow. An entry e
activates the same N neurons in each layer. Then, a convolution shape takes N positions onto Ld ,
each position being associated to one of the activated neurons of Ld+1 . At each position, connections
are drawn from the activated neurons located inside the convolution shape in destination to the
associated neuron. And a subset of weights from w are affected to these connections, according to a
weight sharing strategy defined by an allocation map. Figure 3 illustrates a convolution shaped by a
rectangular window.
The forward and backward propagation between Ld and Ld+1 are applied using the described neurons
and connections. After a generalized convolution operation, an activation function is applied on the
output neurons. Then a pooling operation is done spatially: the input layer is divided into patches of
same size, and all activated neurons included in this patch are pooled together. Unlike a standard
pooling operation, the number of activated neurons in a patch may vary.
Generalized convolution layers can be vectorized. They can have multiple input channels and multiple
feature maps. They shall naturally be placed into the same kind of deep neural network structure than
in a CNN. Thus, they are for the irregular input spaces what the standard convolution layers are for
regular input spaces.
4.2
Implementation
There are two main strategies to implement the propagations. The first one is to start from (1), derive
it and vectorize it. It implies handling semi-sparse representations to minimize memory consumption
and to use adequate semi-sparse tensor products.
Instead, we decide to use the neural network interpretation and the underlying graph structure whose
edges amount for neurons connections. By this mean, the sparse part of the computations is included
via the use of this graph. Also, computations on each edge can be parallelized.
5
4.3
Forward and back propagation formulae
Let’s first recall the propagation formulae from a neural network point of view.
Let’s denote by eu the value of a neuron of Ld located at u ∈ S, by fv for a neuron of Ld+1 , and by
gv if this neuron is activated by the activation function σ.
We denote by prev(v) the set neurons from the previous layer connected to v, and by next(u) those of
the next layer connected to u. wuv is the weight affected to the connection between neurons u and v.
b is the bias term associated to Ld+1 .
After the forward propagation, values of neurons of Ld+1 are determined by those of Ld :
X
fv =
eu wuv
(4)
u∈prev(v)
gv = σ(fv + b)
(5)
Thanks to the chain rule, we can express derivatives of a layer with those of the next layer:
δv =
∂E
∂E ∂gv
=
=
∂fv
∂gv ∂fv
X ∂E
∂E
=
∂eu
∂fv
v∈next(u)
∂E 0
σ (fv + b)
∂gv
X
∂fv
=
δv wuv
∂eu
(6)
(7)
v∈next(u)
We call edges(w) the set of edges to which the weight w is affected. If ω ∈ edges(w), fω+ denotes
the value of the destination neuron, and eω− denotes the value of the origin neuron.
The back propagation allows to express the derivative of any weight w:
∂E
=
∂w
X
ω∈edges(w)
∂E ∂fω+
=
∂fω+ ∂w
X
δ ω + eω −
(8)
ω∈edges(w)
X ∂E ∂gv
X
∂E
=
=
δv
∂b
∂gv ∂b
v
v
(9)
The sets prev(v), next(u) and edges(w) are determined by the graph structure, which in turn is
determined beforehand by a procedure like the one described in section 3.4. The particularization of
the propagation formulae with these sets is the main difference with the standard formlulae.
4.4
Vectorization
Computations are done per batch of entries B. Hence, the graph structure used for the computations
must contain the weighted edges of all entries e ∈ B. If necessary, entries of B are made homogeneous: if a neuron u is not activated by an entry e but is activated by another entry of B, then eu is
defined and is set to zero.
The third-rank tensor counterparts of e, f , and g are thus denoted by E, F and G. Their third dimension
indexes the channels (input channels or feature maps). Their submatrix along the neuron located at
x ∈ S are denoted Ex , Fx and Gx , rows are indexing entries and columns are indexing channels. The
counterparts of w and b are W and β. The first being a third-rank tensor and the second being a vector
with one value per feature map. βe denotes the 3D tensor obtained by broadcasting β along the two
other dimensions of F. Ww denotes the submatrix of W along the kernel weight w. Its rows index the
feature maps and its columns index the input channels.
With these notations, the convolution formulae (1) rewrites:
C(E) = (W ⊗ AE ) E
(10)
⊗ and being tensor products. ⊗ is contracted along the dimensions that index the kernel weights,
and is contracted along the dimensions that index the points present in the entries.
6
The vectorized counterparts of the formulae from section 4.3 can be obtained in the same way:
X
(11)
Fv =
Eu W>
wuv
u∈prev(v)
e
G = σ(F + β)
0
∂E
∂E
e
∆=
=
◦ σ (F + β)
∂F
∂G
X
∂E
∆v Wuv
=
∂E u
v∈next(u)
X
∂E
=
∆>
ω + Eω −
∂W w
ω∈edges(w)
!
X X
∂E
=
∆v
∂β
v
j
(12)
(13)
(14)
(15)
(16)
j-th column
Where ◦ and > respectively denotes Hadamard product and transpose.
5
Experiments
In order to measure the gain of performance allowed by the generalized CNN over MLP on irregular
domains, we made a series of benchmarks on distorded versions of the MNIST dataset [10], consisting
of images of 28x28 pixels. To distort the input domain, we plunged the images into a 2-d euclidean
space by giving entire coordinates to pixels. Then, we applied a gaussian displacement on each
pixel, thus making the data irregular and unsuitable for regular convolutions. For multiple values of
standard deviation of the displacement, we trained a generalized CNN and compared it with a MLP
that has the same number of parameters. We choosed a simple yet standard architecture in order to
better see the impact of generalized layers.
The architecture used is the following: a generalized convolution layer with relu [11] and max pooling,
made of 20 feature maps, followed by a dense layer and a softmax output layer. The generalized
convolution is shaped by a rectangular window of width and height 5µ where the unit scale µ is
chosen to be equal to original distance between two pixels. The max-pooling is done with square
patches of side length 2µ. The dense layer is composed of 500 hidden units and is terminated by
relu activation as well. In order to have the same number of parameters, the compared MLP have 2
dense layers of 500 hidden units each and is followed by the same output layer. For training, we used
stochastic gradient descent [12] with Nesterov momentum [13] and a bit of L2 regularization [14].
2.2
2
MLP
G-CNN
Error
1.8
1.6
1.4
1.2
CNN
1
+
0
1
2
3
4
5
6
10−1
100
101
102
Standard deviation used for the domain distortion
Figure 4: Results for Generalized CNN and MLP
The plot drawn on figure 4 illustrates the gain of performance of a generalized convolutional layer
over a dense layer with equal number of parameters. After 15 epochs for both, it shows that the
7
generalized CNN on a distorded domain performs better than the MLP. Indeed, in the case of no
domain distortion, the score is the same than a CNN with zero-padding. The error rate goes up a bit
with distortion. But even at 200µ, the generalized CNN still performs better than the MLP.
6
Conclusion and future work
In this paper, we have defined a generalized convolution operator. This operator makes possible to
transport the CNN paradigm to irregular domains. It retains the proprieties of a regular convolutional
operator. Namely, it is linear, supported locally and uses the same kernel of weights for each local
operation. The generalized convolution operator can then naturally be used instead of convolutional
layers in a deep learning framework. Typically, the created model is well suited for input data that
has an underlying graph structure.
The definition of this operator is flexible enough for it allows to adapt its weight-allocation map to
any input domain, so that depending on the case, the distribution of the kernel weight can be done in
a way that is natural for this domain. However, in some cases, there is no natural way but multiple
acceptable methods to define the weight allocation. In further works, we plan to study these methods.
We also plan to apply the generalized operator on unsupervised learning tasks.
Acknowledgements
I would like to thank my academic mentors, Vincent Gripon and Grégoire Mercier who helped me
in this work, as well as my industrial mentor, Mathias Herberts who gave me insights in view of
applying the designed model to industrial datasets.
This work was partly funded by Cityzen Data, the company behind the Warp10 platform, and by
the ANRT (Agence Nationale de la Recherche et de la Technologie) through a CIFRE (Convention
Industrielle de Formation par la REcherche), and also by the European Research Council under the
European Union’s Seventh Framework Program (FP7/2007-2013) / ERC grant agreement number
290901.
References
[1] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document
recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2324, 1998.
[2] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional
neural networks,” in Advances in neural information processing systems, pp. 1097–1105, 2012.
[3] K. Hornik, M. Stinchcombe, and H. White, “Multilayer feedforward networks are universal
approximators,” Neural networks, vol. 2, no. 5, pp. 359–366, 1989.
[4] F. R. K. Chung, Spectral Graph Theory (CBMS Regional Conference Series in Mathematics,
No. 92). American Mathematical Society, 1996.
[5] D. I. Shuman, S. K. Narang, P. Frossard, A. Ortega, and P. Vandergheynst, “The emerging field
of signal processing on graphs: Extending high-dimensional data analysis to networks and other
irregular domains,” IEEE Signal Processing Magazine, vol. 30, no. EPFL-ARTICLE-189192,
pp. 83–98, 2013.
[6] J. Bruna, W. Zaremba, A. Szlam, and Y. LeCun, “Spectral networks and locally connected
networks on graphs,” arXiv preprint arXiv:1312.6203, 2013.
[7] M. Henaff, J. Bruna, and Y. LeCun, “Deep convolutional networks on graph-structured data,”
arXiv preprint arXiv:1506.05163, 2015.
[8] J. Masci, D. Boscaini, M. Bronstein, and P. Vandergheynst, “Shapenet: Convolutional neural
networks on non-euclidean manifolds,” tech. rep., 2015.
[9] B. Graham, “Spatially-sparse convolutional neural networks,” arXiv preprint arXiv:1409.6070,
2014.
[10] Y. LeCun, C. Cortes, and C. J. Burges, “The mnist database of handwritten digits,” 1998.
[11] X. Glorot, A. Bordes, and Y. Bengio, “Deep sparse rectifier neural networks,” in International
Conference on Artificial Intelligence and Statistics, pp. 315–323, 2011.
8
[12] L. Bottou, “Large-scale machine learning with stochastic gradient descent,” in Proceedings of
COMPSTAT’2010, pp. 177–186, Springer, 2010.
[13] I. Sutskever, J. Martens, G. Dahl, and G. Hinton, “On the importance of initialization and
momentum in deep learning,” in Proceedings of the 30th international conference on machine
learning (ICML-13), pp. 1139–1147, 2013.
[14] A. Y. Ng, “Feature selection, l 1 vs. l 2 regularization, and rotational invariance,” in Proceedings
of the twenty-first international conference on Machine learning, p. 78, ACM, 2004.
9
| 9cs.NE
|
arXiv:1110.0895v4 [cs.CE] 2 Jul 2012
Robust inversion, dimensionality reduction,
and randomized sampling
Aleksandr Aravkin
Michael P. Friedlander
Felix J. Herrmann
Tristan van Leeuwen
March 1, 2012
Abstract We consider a class of inverse problems in which the forward model
is the solution operator to linear ODEs or PDEs. This class admits several dimensionality-reduction techniques based on data averaging or sampling, which are
especially useful for large-scale problems. We survey these approaches and their
connection to stochastic optimization. The data-averaging approach is only viable,
however, for a least-squares misfit, which is sensitive to outliers in the data and
artifacts unexplained by the forward model. This motivates us to propose a robust
formulation based on the Student’s t-distribution of the error. We demonstrate
how the corresponding penalty function, together with the sampling approach, can
obtain good results for a large-scale seismic inverse problem with 50% corrupted
data.
Keywords inverse problems · seismic inversion · stochastic optimization · robust
estimation
1 Introduction
Consider the generic parameter-estimation scheme in which we conduct m experiments, recording the corresponding experimental input vectors {q1 , q2 , . . . , qm }
and observation vectors {d1 , d2 , . . . , dm }. We model the data for given parameters
x ∈ Rn by
di = Fi (x)qi + i for i = 1, . . . , m,
(1.1)
This work was in part financially supported by the Natural Sciences and Engineering Research
Council of Canada Discovery Grant (22R81254) and the Collaborative Research and Development Grant DNOISE II (375142-08). This research was carried out as part of the SINBAD II
project with support from the following organizations: BG Group, BPG, BP, Chevron, Conoco
Phillips, Petrobras, PGS, Total SA, and WesternGeco.
A. Aravkin, F. J. Herrmann, and T. van Leeuwen
Dept. of Earth and Ocean Sciences, University of British Columbia, Vancouver, BC, Canada
E-mail: {saravkin,fherrmann,tleeuwen}@eos.ubc.ca
M. P. Friedlander
Dept. of Computer Science, University of British Columbia, Vancouver, BC, Canada
E-mail: [email protected]
2
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
where observation di is obtained by the linear action of the forward model Fi (x)
on known source parameters qi , and independent errors i capture the discrepancy
between di and prediction Fi (x)qi . The class of models captured by this representation includes solution operators to any linear (partial) differential equation
with boundary conditions, where the qi are the right-hand sides of the equations.
A special case arises when Fi ≡ F , i.e., the forward model is the same for each
experiment.
Inverse problems based on these forward models arise in a variety of applications,
including medical imaging and seismic exploration, in which the parameters x
usually represent particular physical properties of a material. We are particularly
motivated by the full-waveform inversion (FWI) application in seismology, which is
used to image the earth’s subsurface [38]. In full-waveform inversion, the forward
model F is the solution operator of the wave equation composed with a restriction
of the full solution to the observation points (receivers); x represents sound-velocity
parameters for a (spatial) 2- or 3-dimensional mesh; the vectors qi encode the
location and signature of the ith source experiment; and the vectors di contain
the corresponding measurements at each receiver. A typical survey in exploration
seismology may contain thousands of experiments (shots), and global seismology
relies on natural experiments provided by measuring thousands of earthquakes
detected at seismic stations around the world. Standard data-fitting algorithms may
require months of CPU time on large computing clusters to process this volume of
data and yield coherent geological information.
Inverse problems based on the forward models that satisfy (1.1) are typically
solved by minimizing some measure of misfit, and have the general form
m
minimize
x
φ(x) :=
1 X
φi (x),
m
(1.2)
i=1
where each φi (x) is some measure of the residual
ri (x) := di − Fi (x)qi
(1.3)
between the observation and prediction of the ith experiment. The classical approach
is based on the least-squares penalty
φi (x) = kri (x)k2 .
(1.4)
This choice can be interpreted as finding the maximum likelihood (ML) estimate of
x, given the assumptions that the errors i are independent and follow a Gaussian
distribution.
Formulation (1.2) is general enough to capture a variety of models, including
many familiar examples. If the di and qi are scalars, and the forward model is
linear, then standard least-squares
2
φi (x) = 12 (aT
i x − di )
easily fits into our general formulation. More generally, ML estimation is based on
the form
φi (x) = − log pi ri (x) ,
where pi is a particular probability density function of i .
Robust inversion, dimensionality reduction, and randomized sampling
3
1.1 Dimensionality reduction
Full-waveform inversion is a prime example of an application in which the cost
of evaluating each element in the sum of φ is very costly: every residual vector
ri (x)—required to evaluate one element in the sum of (1.2)—entails solving a
partial differential equation on a 2D or 3D mesh with thousands of grid points in
each dimension. The scale of such problems is a motivation for using dimensionality
reduction techniques that address small portions of the data at a time.
The least-squares objective (1.4) allows for a powerful form of data aggregation
that is based on randomly fusing groups of experiments into “meta” experiments,
with the effect of reducing the overall problem size. The aggregation scheme is based
on Haber et al.’s [17] observation that for this choice of penalty, the objective is
connected to the trace of a residual matrix. That is, we can represent the objective
of (1.2) by
m
1 X
1
kri (x)k2 ≡
φ(x) =
trace R(x)T R(x) ,
(1.5)
m
m
i=1
where
R(x) := [r1 (x), r2 (x), . . . , rm (x)]
collects the residual vectors (1.3). Now consider a small sample of s weighted
averages of the data, i.e.,
dej =
m
X
wij di
and
qej =
i=1
m
X
wij qi ,
j = 1, . . . , s,
i=1
where s m and wij are random variables, and collect the corresponding s
residuals rej (x) = dej − Fj (x)e
qj into the matrix RW (x) := [e
r1 (x), re2 (x), . . . , res (x)].
Because the residuals are linear in the data, we can write compactly
RW (x) := R(x)W
where
W := (wij ).
Thus, we may consider the sample function
φW (x) =
s
1
1X
ke
rj (x)k2 ≡ trace RW (x)TRW (x)
s
s
(1.6)
j=1
based on the s averaged residuals. Proposition 1.1 then follows directly from
Hutchinson’s [22, §2] work on stochastic trace estimation.
Proposition 1.1. If E[W W T ] = I, then
E φW (x) = φ(x) and E[∇φW (x)] = ∇φ(x).
Hutchinson proves that if the weights wij are drawn independently from a
Rademacher distribution, which takes the values ±1 with equal probability, then
the stochastic-trace estimate has minimum variance. Avron and Toledo [4] compare
the quality of stochastic estimators obtained from other distributions. Golub and
von Matt [15] report the surprising result that the estimate obtained with even a
single sample (s = 1) is often of high quality. Experiments that use the approach
in FWI give evidence that good estimates of the true parameters can be obtained
at a fraction of the computational cost required by the full approach [19, 24, 41].
4
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
1.2 Approach
Although the least-squares approach enjoys widespread use, and naturally accommodates the dimensionality-reduction technique just described, it is known to be
unsuitable for non-Gaussian errors, especially for cases with very noisy or corrupted
data often encountered in practice. The least-squares formulation also breaks down
in the face of systematic features of the data that are unexplained by the model Fi .
Our aim is to characterize the benefits of robust inversion and to describe
randomized sampling schemes and optimization algorithms suitable for large-scale
applications in which even a single evaluation of the forward model and its action
on qi is computationally expensive. (In practice, the product Fi (x)qi is evaluated
as a single unit.) We interpret these sampling schemes, which include the wellknown incremental-gradient algorithm [28], as dimensionality-reduction techniques,
because they allow algorithms to make progress using only a portion of the data.
This paper is organized into the following components:
Robust statistics (§2). We survey robust approaches from a statistical perspective,
and present a robust approach based on the heavy-tailed Student’s t-distribution.
We show that all log-concave error models share statistical properties that differentiate them from heavy-tailed densities (such as the Student’s t) and limit their
ability to work in regimes with large outliers or significant systematic corruption
of the data. We demonstrate that densities outside the log-concave family allow
extremely robust formulations that yield reasonable inversion results even in the
face of major data contamination.
Sample average approximations (§3). We propose a dimensionality-reduction
technique based on sampling the available data, and characterize the statistical
properties that make it suitable as the basis for an optimization algorithm to solve
the general inversion problem (1.2). These techniques can be used for the general
robust formulation described in §2, and for formulations in which forward models
Fi vary with i.
Stochastic optimization (§4) We review stochastic-gradient, randomized incremental-gradient, and sample-average methods. We show how the assumptions
required by each method fit with the class of inverse problems of interest, and can
be satisfied by the sampling schemes discussed in §3.
Seismic inversion (§5) We test the proposed sample-average approach on the
robust formulation of the FWI problem. We compare the inversion results obtained
with the new heavy-tailed approach to those obtained using robust log-concave
models and conventional methods, and demonstrate that a useful synthetic velocity
model can be recovered by the heavy-tailed robust method in an extreme case with
50% missing data. We also compare the performance of stochastic algorithms and
deterministic approaches, and show that the robust result can be obtained using
only 30% of the effort required by a deterministic approach.
2 Robust Statistics
A popular approach in robust regression is to replace the least-squares penalty (1.4)
on the residual with a penalty that increases more slowly than the 2-norm. (Virieux
and Operto [42] discuss the difficulties with least-squares regression, which are
especially egregious in seismic inversion.)
Robust inversion, dimensionality reduction, and randomized sampling
5
One way to derive a robust approach of this form is to assume that the noise
i comes from a particular non-Gaussian probability density, pi , and then find
the maximum likelihood (ML) estimate of the parameters x that maximizes the
likelihood that the residual vectors ri (x) are realizations of the random variable i ,
given the observations di . Because the negative logarithm is monotone decreasing,
it is natural to minimize the negative log of the likelihood function rather than
maximizing the likelihood itself. In fact, when the distribution of the errors i is
modeled using a log-concave density
p(r) ∝ exp − ρ(r) ,
with a convex loss function ρ, the ML estimation problem is equivalent to the
formulation (1.2), with
φi (x) = ρ(ri (x))
for
i = 1, . . . , m.
(2.1)
One could also simply start with a penalty ρ on ri (x), without explicitly
modelling the noise density; estimates obtained this way are generally known
as M-estimates [20]. A popular choice that follows this approach is the Huber
penalty [20, 21, 27].
Robust formulations are typically based on convex penalties ρ—or equivalently,
on log-concave densities for i —that look quadratic near 0 and increase linearly far
from zero. Robust penalties, including the 1-norm and Huber, for electromagnetic
inverse problems are discussed by Farquaharson and Oldenburg in [13]. Guitton
and Symes [16] consider the Huber penalty in the seismic context, and they cite
many previous examples of the use of 1-norm penalty in geophysics. Huber and
1-norm penalties are further compared on large-scale seismic problems by Brossier
et al. [7], and a Huber-like (but strictly convex) hyperbolic penalty is described by
Bube and Nemeth [9], with the aim of avoiding possible non-uniqueness associated
with the Huber penalty.
Clearly, practitioners have a preference for convex formulations. However, it is
important to note that
– for nonlinear forward models Fi , the optimization problem (1.2) is typically
nonconvex even for convex penalties ρ (it is difficult to satisfy the compositional
requirements for convexity in that case);
– even for linear forward models Fi , it may be beneficial to choose a nonconvex
penalty in order to guard against outliers in the data.
We will justify the second point from a statistical perspective. Before we proceed
with the argument, we introduce the Student’s t-density, which we use in designing
our robust method for FWI.
2.1 Heavy-tailed distribution: Student’s t
Robust formulations using the Student’s t-distribution have been shown to outperform log-concave formulations in various applications [1]. In this section, we
introduce the Student’s t-density, explain its properties, and establish a result
that underscores how different heavy-tailed distributions are from those in the
log-concave family.
6
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
The scalar Student’s t-density function with mean µ and positive degrees-offreedom parameter ν is given by
p( r | µ, ν ) ∝ 1 + (r − µ)2 /ν
−(1+ν)/2
.
(2.2)
The density is depicted in Figure 1(a). The parameter ν can be understood by
recalling the origins of the Student’s t-distribution. Given n i.i.d. Gaussian variables
xi with mean µ, the normalized sample mean
x̄ − µ
√
S/ n
(2.3)
follows thePStudent’s t-distribution with ν = n − 1, where the sample variance
1
S 2 = n−1
(xi − x̄)2 is distributed as a χ2 random variable with n − 1 degrees
of freedom. As ν → ∞, the characterization (2.3) immediately implies that the
Student’s t-density converges pointwise to the density of N (0, 1). Thus, ν can be
interpreted as a tuning parameter: for low values one expects a high degree of
non-normality, but as ν increases, the distribution behaves more like a Gaussian
distribution. This interpretation is highlighted in [25].
For a zero-mean Student’s t-distribution (µ = 0), the log-likelihood of the
density (2.2) gives rise to the nonconvex penalty function
ρ(r) = log(1 + r2 /ν),
(2.4)
which is depicted in Figure 1(b). The nonconvexity of this penalty is equivalent to
the sub-exponential decrease of the tail of the Student’s t-distribution, which goes
to 0 at the rate 1/rν+1 as r → ∞.
The significance of these so-called heavy tails in outlier removal becomes clear
when we consider the following question: Given that a scalar residual deviates from
the mean by more than t, what is the probability that it actually deviates by more
than 2t?
The 1-norm is the slowest-growing convex penalty, and is induced by the Laplace
distribution, which is proportional to exp(−k · k1 ). A basic property of the scalar
Laplace distribution is that it is memory free. That is, given a Laplace distribution
with mean 1/α, then the probability relationship
Pr(|r| > t2 | |r| > t1 ) = Pr(|r| > t2 − t1 ) = exp(−α[t2 − t1 ])
(2.5)
holds for all t2 > t1 . Hence, the probability that a scalar residual is at least 2t away
from the mean, given that it is at least t away from the mean, decays exponentially
fast with t. For large t, it is unintuitive to make such a strong claim for a residual
already known to correspond to an outlier.
Contrast this behavior with that of the Student’s t-distribution. When ν = 1,
the Student’s t-distribution is simply the Cauchy distribution, with a density
proportional to 1/(1 + r2 ). Then we have that
π
2 − arctan(2t)
t→∞ π − arctan(t)
2
lim Pr(|r| > 2t | |r| > t) = lim
t→∞
=
1
.
2
Remarkably, the conditional probability is independent of t for large residuals. This
cannot be achieved with any probability density arising from a convex penalty,
Robust inversion, dimensionality reduction, and randomized sampling
7
because (2.5) provides a lower bound for this family of densities, as is shown in
the following theorem.
Theorem 2.1. Consider any scalar density p arising from a symmetric proper
closed convex penalty ρ via p(t) = exp(−ρ(t)), and take any point t0 with positive
right derivative α0 = ∂+ ρ(t0 ) > 0. Then for all t2 > t1 ≥ t0 , the conditional tail
distribution induced by p(r) satisfies
Pr(|r| > t2 | |r| > t1 ) ≤ exp(−α0 [t2 − t1 ]) .
Proof. Define `(t) = ρ(t1 )+α1 (t−t1 ) to be the (global) linear under-estimate
R ∞ for ρ at
t1 , where α1 = ∂+ ρ(t1 ) is the right derivative of ρ at t1 . Define F (t) = t p(r) dr.
We first note that F (t) is log-concave (apply [33, Theorem 3], taking the set
A = {z | z ≥ 0}). Then log(F (t)) is concave, and so its derivative
log(F (t))0 =
p(t)
−F (t)
is non-increasing. Therefore, the ratio p(t)/F (t) is nondecreasing, and in particular
p(t1 )
p(t2 )
≤
,
F (t1 )
F (t2 )
or equivalently,
F (t2 )
p(t2 )
≤
.
F (t1 )
p(t1 )
By assumption on the functions ` and ρ,
ρ(t2 ) − `(t2 ) ≥ ρ(t1 ) − `(t1 ) = 0,
which implies that
Pr(|r| > t2 | |r| > t1 ) =
exp(−ρ(t2 ))
F (t2 )
≤
F (t1 )
exp(−ρ(t1 ))
= exp(−[ρ(t2 ) − `(t1 )])
≤ exp(−[`(t2 ) − `(t1 )])
= exp(−α1 [t2 − t1 ]) .
To complete the proof, note that the right derivative ∂+ ρ(t) is nondecreasing [34,
Theorem 24.1]. Then we have α0 ≤ α1 for t0 ≤ t1 .
For differentiable log-concave densities, the influence function is defined to be
ρ0 (t), and for a general distribution it is the derivative of the negative log of the
density. These functions provide further insight into the difference between the
behaviors of log-concave densities and heavy-tailed densities such as the Student’s.
In particular, they measure the effect of the size of a residual on the negative log
likelihood. The Student’s t-density has a so-called redescending influence function:
as residuals grow larger, they are effectively ignored by the model. Figure 1 shows
the relationships among densities, penalties, and influence functions of two logconcave distributions (Gaussian and Laplacian) and those of the Student’s t, which
is not log-concave. If we examine the derivative
ρ0 (r) =
2r
ν + r2
8
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
0
0
0
(a)
(b)
0
(c)
Fig. 1: The Gaussian (·−), Laplace (−−), and Student’s t- (—) distributions: (a)
densities, (b) penalties, and (c) influence functions.
of the Student’s t-penalty (2.4), it is clear that large residuals have a small influence
when r2 ν. For small r, on the other hand, the derivative resembles that of the
least-squares penalty. See Hampel et al. [18] for a discussion of influence-function
approaches to robust statistics, and redescending influence functions in particular,
and Shevlyakov et al. [35] for further connections.
There is an implicit tradeoff between convex and non-convex penalties (and
their log-concave and non-log-concave counterparts). Convex models are easier to
characterize and solve, but may be wrong in a situation in which large outliers are
expected. Nonconvex penalties are particularly useful with large outliers.
2.2 The Student’s t in practice
Figure 2 compares the reconstruction obtained using the Student’s t-penalty, with
those obtained using least-squares and Huber penalties, on an FWI experiment
(described more fully in §5). These panels show histograms of the residuals (1.3) that
are obtained at different solutions, including the true solution, and the solutions
recovered by solving (1.2) where the subfunctions φi in (2.1) are defined by the
least-squares, Huber, and Student’s t- penalties.
The experiment simulates 50% missing data using a random mask that zeros
out half of the data obtained via a forward model at the true value of x. A residual
histogram at the true x therefore contains a large spike at 0, corresponding to
the residuals for correct data, and a multimodal distribution of residuals for the
erased data. The least-squares recovery yields a residual histogram that resembles
a Gaussian distribution. The corresponding inversion result is useless, which is not
surprising, because the residuals at the true solution are very far from Guassian.
The reconstruction using the Huber penalty is a significant improvement over the
conventional least-squares approach, and the residual has a shape that resembles
the Laplace distribution, which is closer to the shape of the true residual. The
Student’s t approach yields the best reconstruction, and, remarkably, produces
a residual distribution that matches the multi-modal shape of the true residual
histogram. This is surprising because the Student’s t-distribution is unimodal, but
the residual shape obtained using the inversion formulation is not. It appears that
the statistical prior implied by the Student’s t-distribution is weak enough to allow
the model to converge to a solution that is almost fully consistent with the good
data, and completely ignors the bad data.
Robust inversion, dimensionality reduction, and randomized sampling
9
0
0.1
Frequency
5
10
15
20
0
−3
0
3
0
5
10
15
20
25
30
15
20
25
30
15
20
25
30
15
20
25
30
(a) True model residual and solution
0
0.1
Frequency
5
10
15
20
0
−3
0
3
0
5
10
(b) Least-squares residual and solution
0
0.1
Frequency
5
10
15
20
0
−3
0
3
0
5
10
(c) Huber residual and solution
0
0.1
Frequency
5
10
15
20
0
−3
0
3
0
5
10
(d) Student’s t residual and solution
Fig. 2: Residual histograms (normalized) and solutions for an FWI problem. The
histogram at (a) the true solution shows that the errors follow a tri-modal distribution (superimposed on the other histogram panels for reference). The residuals
for (b) least-squares and (c) Huber reconstructions follow the model error densities
(i.e., Gaussian and Laplace). The residuals for (d) the Student t reconstruction,
however, closely match the distribution of the actual errors.
10
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
Despite several successful applications in statistics and control theory [12, 25],
Student’s t-formulations do not enjoy widespread use, especially in the context
of nonlinear regression and large-scale inverse problems. Recently, however, they
were shown to work very well for robust recovery in nonlinear inverse problems
such as Kalman smoothing and bundle adjustment [1], and to outperform the
Huber penalty when inverting large synthetic models [2, 3]. Moreover, because the
corresponding penalty function is smooth, it is usually possible to adapt existing
algorithms and workflows to work with a robust formulation.
In order for algorithms to be useful with industrial-scale problems, it is essential
that they be designed for conventional and robust formulations that use a relatively
small portion of the data in any computational kernel. We lay the groundwork for
these algorithms in the next section.
3 Sample average approximations
The data-averaging approach used to derive the approximation (1.6) may not
be appropriate when the misfit functions φi are something other than the 2norm. In particular, a result such as Proposition 1.1, which reassures us that the
approximations are unbiased estimates of the true functions, relies on the special
structure of the 2-norm, and is not available to us in the more general case. In
this section, we describe sampling strategies—analogous to the stochastic-trace
estimation procedure of §1.1—that allow for more general misfit measures φi . In
particular, we are interested in a sampling approach that allows for differential
treatment across experiments i, and for robust functions.
We adopt the useful perspective that each of the constituent functions φi and
the gradients ∇φi are members of a fixed population of size m. The aggregate
objective function and its gradient,
m
φ(x) =
1 X
φi (x)
m
m
and
i=1
∇φ(x) =
1 X
∇φi (x),
m
i=1
can then simply be considered to be population averages of the individual objectives
and gradients, as reflected in the scaling factors 1/m. A common method for estimating the mean of a population is to sample only a small subset S ⊆ { 1, . . . , m }
to derive the sample averages
φS (x) =
1X
φi (x)
s
and
i∈S
∇φS (x) =
1X
∇φi (x),
s
(3.1)
i∈S
where s = |S| is the sample size. We build the subset S as a uniform random
sampling of the full population, and in that case the sample averages are unbiased:
E[φS (x)] = φ(x)
and
E[∇φS (x)] = ∇φ(x).
(3.2)
The cost of evaluating these sample-average approximations is about s/m times
that for the true function and gradient. (Non-uniform schemes, such as importance
and stratified sampling, are also possible, but require prior knowledge about the
relative importance of the φi .) We use these quantities to drive the optimization
procedure.
Robust inversion, dimensionality reduction, and randomized sampling
11
This approach constitutes a kind of dimensionality-reduction scheme, and it
is widely used by census takers to avoid the expense of measuring the entire
population. In our case, measuring each element of the population means an
evaluation of a function φi and its gradient ∇φi . The goal of probability sampling
is to design randomized sampling schemes that estimate statistics—such as these
sample averages—with quantifiable error; see, for example, Lohr’s introductory
text [26].
The stochastic-optimization methods that we describe in §4 allow for approximate gradients, and thus can take advantage of these sampling schemes. The
error analysis of the sample-average method described in §4.3 relies on the second
moment of the error
e = ∇φS − ∇φ
(3.3)
in the gradient. Because the sample averages are unbiased, the expected value of
the squared error of the approximation reduces to the variance of the norm of the
sample average:
E kek2 = V k∇φS k .
(3.4)
This error is key to the optimization process, because the accuracy of the gradient
estimate ultimately determines the quality of the search directions available to the
underlying optimization algorithm.
3.1 Sampling with and without replacement
Intuitively, the size s of the random sample influences the norm of the error e
in the gradient estimate. The difference between uniform sampling schemes with
or without replacement greatly affects how the variance of the sample average
decreases as the sample size increases. In both cases, the variance of the estimator
is proportional to the sample variance
m
σg2 :=
1 X
k∇φi − ∇φk2
m−1
(3.5)
i=1
of the population of gradients { ∇φ1 , . . . , ∇φm } evaluated at x. This quantity is
inherent to the problem and independent of the chosen sampling scheme.
When sampling from a finite population without replacement (i.e., every element
in S occurs only once), then the error en of the sample average gradient satisfies
1
s 2
E[ken k2 ] =
1−
σg ;
(3.6)
s
m
for example, see Cochran [11] or Lohr [26, §2.7]. Note that the expected error
decreases with s, and—importantly—is exactly 0 when s = m. On the other hand,
in a sample average gradient built by uniform sampling with replacement, every
sample draw of the population is independent of the others, so that the error er of
this sample average gradient satisfies
E[ker k2 ] =
1 2
σg .
s
(3.7)
This error goes to 0 as 1/s, and is never 0 when sampling over a finite population.
12
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
Comparing the expected error between sampling with and without replacement
for finite populations, we note that
s
E[ken k2 ] = 1 −
E[ker k2 ],
m
and so sampling without replacement yields a uniformly lower expected error than
independent finite sampling.
3.2 Data averaging
The data-averaging approach discussed in §1.1 for the objective (1.5) does not
immediately fit into the sample-average framework just presented, even though the
function φW defined in (1.6) is a sample average. Nevertheless, for all sampling
schemes described by Proposition 1.1, the sample average
φW (x) =
s
1Xe
φi (x),
s
with
φei (x) := kR(x)wi k2 ,
j=1
is in some sense a sample average of an infinite population. If the random vectors
are uncorrelated—as required by Proposition 1.1—than, as with (3.7), the error
ew = ∇φW − φ
of the sample average gradient is proportional to the sample variance of the
population of gradients of φW . That is,
E[kew k2 ] =
1 2
σ
eg ,
s
where σ
eg2 is the sample variance of the population of gradients { ∇φe1 , . . . , ∇φem }.
The particular value of σ
eg2 will depend on the distribution from which the
weights wi are drawn; for some distributions of wi this quantity may even be
infinite, as is shown by the following results.
The sample variance (3.5) is always finite, and the analogous sample variance
σ
eg2 of the implicit functions ∇φei is finite under general conditions on w.
Proposition 3.1. The sample variance σ
eg2 of the population { ∇φe1 , . . . , ∇φem }
of gradients is finite when the distribution for wi has finite fourth moments.
Robust inversion, dimensionality reduction, and randomized sampling
13
Proof. The claim follows from a few simple bounds (all sums run from 1 to m):
i
h
σ
eg2 ≤ E k∇φei k2
!
!
"
X
X
wi ∇ri (x)
wi ri (x)
= 4E
i
i
X
X
!2 #
"
≤ 4E
wi ∇ri (x)
2
i
kwi ∇ri (x)k2
X
i
wi ri (x)
!2 #
"
X
≤ 4E
2#
i
kwi ri (x)k
i
!2 #
"
X
= 4E
|wi | k∇ri (x)k2
i
X
|wi | kri (x)k
i
X
wi2 wj2 .
≤ 4 max m2 k∇ri (x)k22 · max kri (x)k2 E
i
The quantity E
P
ij
i
ij
wi2 wj2 < ∞ when the fourth moments are finite.
As long as σ
eg2 is nonzero, the expected error of uniform sampling without
replacement is asymptotically better than the expected error that results from data
averaging. That is,
E[ken k2 ] < E[kew k2 ]
for all s large enough.
At least as measured by the second moment of the error in the gradient, the simple
random sampling without replacement has the benefit of yielding a good estimate
when compared to these other sampling schemes.
4 Stochastic optimization
Stochastic optimization, which naturally allows for inexact gradient calculations,
meshes well with the various sampling and averaging strategies described in §3.
We review several approaches that fall under the stochastic optimization umbrella,
and describe their relative benefits.
Although the full-waveform inversion application that we consider is nonconvex,
the following discussion make the assumption that the optimization problem
is convex; this expedient concedes the analytical tools that allow us to connect
sampling with rates of convergence. It is otherwise difficult to connect a convergence
rate to the sample size; see [14, §2.3]. The usefulness of the approach is justified by
numerical experiments, both in the present paper and in [14, §5], where results for
both convex and nonconvex models are presented.
14
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
4.1 Stochastic gradient methods
Stochastic gradient methods for minimizing a differentiable function φ, not necessarily of the form defined in (1.2), can be generically expressed by the iteration
xk+1 = xk − αk dk
with
dk := sk + ek ,
(4.1)
where αk is a positive stepsize, sk is a descent direction for φ, and ek is a random
noise term. Bertsekas and Tsitsiklis [6, Prop. 3] give general conditions under which
lim ∇φ(xk ) = 0,
k→∞
and every limit point of {xk } is a stationary point of φ. Note that unless the
minimizer is unique, this does not imply that the sequence of iterates {xk } converges.
Chief among the required conditions are that ∇φ is globally Lipschitz, i.e., for
some positive L,
k∇φ(x) − ∇φ(y)k ≤ Lkx − yk
for all x and y;
that for all k,
2
sT
k ∇φ(xk ) ≤ −µ1 k∇φ(xk )k ,
(4.2a)
ksk k ≤ µ2 (1 + k∇φ(xk )k),
E[ek ] = 0 and E kek k2 < µ3 ,
(4.2b)
(4.2c)
for some positive constants µ1 , µ2 , and µ3 ; and that the steplengths satisfy the
infinite travel and summable conditions
∞
X
k=0
αk = ∞
and
∞
X
αk2 < ∞.
(4.3)
k=0
Many authors have worked on similar stochastic-gradient methods, but the Bertsekas and Tsitsiklis [6] is particularly general; see their paper for further references.
Note that the randomized sample average schemes (with or without replacement)
from §3 can be immediately used to design a stochastic gradient that satisfies (4.2b).
It suffices to choose the sample average of the gradient (3.1) as the search direction:
dk = ∇φS (xk ).
Because the sample average ∇φS is unbiased—cf. (3.2)—this direction is on average
simply the steepest descent, and can be interpreted as having been generated from
the choices
sk = ∇φ(xk ) and ek = ∇φS (xk ) − ∇φ(xk ).
Moreover, the sample average has finite variance—cf. (3.6)–(3.7)—and so the
direction sk and the error ek clearly satisfy conditions (4.2).
The same argument holds for the data-averaging scheme outlined in §1.1, as
long as the distribution of the mixing vector admits an unbiased sample average
with a finite variance. Propositions 1.1 and 3.1 establish conditions under which
these requirements hold.
Robust inversion, dimensionality reduction, and randomized sampling
15
Suppose that φ is strongly convex with parameter µ, which implies that
µ
kxk − x∗ k2 ≤ φ(xk ) − φ(x∗ ),
2
where x∗ is the unique minimizer of φ. Under this additional assumption, further
statements can be made about the rate of convergence. In particular, the iteration
(4.1), with sk = ∇φ(xk ), converges sublinearly, i.e.,
E[kxk − x∗ k] = O(1/k).
(4.4)
where the steplengths αk = O(1/k) are decreasing [30, §2.1]. This is in fact the
optimal rate among all first-order stochastic methods [29, §14.1].
A strength of the stochastic algorithm (4.1) is that it applies so generally. All
of the sampling approaches that we have discussed so far, and no doubt others,
easily fit into this framework. The convergence guarantees are relatively weak for
our purposes, however, because they do not provide guidance on how a sampling
strategy might influence the speed of convergence. This analysis is crucial within
the context of the sampling schemes that we consider, because we want to gain an
understanding of how the sample size influences the speed of the algorithm.
4.2 Incremental-gradient methods
Incremental-gradient methods, in their randomized form, can be considered a
special case of stochastic gradient methods that are especially suited to optimizing
sums of functions such as (1.2). They can be described by the iteration scheme
xk+1 = xk − αk ∇φik (xk ),
(4.5)
for some positive steplengths αk , where the index ik selects among the m constituent
functions of φ. In the deterministic version of the algorithm, the ordering of the
subfunctions φi is predetermined, and the counter ik = (k mod m) + 1 makes a
full sweep through all the functions every m iterations. In the randomized version,
ik is at each iteration randomly selected with equal probability from the indices
1, . . . , m. (The Kaczmarz method for linear system [23] is closely related, and a
randomized version of it is analyzed by Strohmer and Vershynin [37].)
In the context of the sampling discussion in §3, the incremental-gradient algorithm can be viewed as an extreme sampling strategy that at each iteration uses
only a single function φi (i.e., a sample of size s = 1) in order to form a sample
average φS of the gradient. For the data-averaging case of §1.1, this corresponds to
generating the approximation φW from a single weighted average of the data (i.e.,
using a single random vector wi to form R(x)wi ).
Bertsekas and Tsitsiklis [5, Prop. 3.8] describe conditions for convergence of
the incremental-gradient algorithm for functions with globally Lipschitz continuous
gradients, when the steplengths αk → 0 as specified by (4.3). Note that it is
necessary for the steplengths αk → 0 in order for the iterates xk produced by (4.5)
to ensure stationarity of the limit points. Unless we assume that ∇φ(x̄) = 0 implies
that ∇φi (x̄) = 0 for all i, a stationary point of φ is not a fixed point of the iteration
process; Solodov [36] and Tseng [39] study this case. Solodov [36] further describes
16
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
how bounding the steplengths away from zero yields limit points x̄ that satisfy the
approximate stationarity condition
k∇φ(x̄)k = O inf αk .
k
With the additional assumption of strong convexity of φ, it follows from Nedić
and Bertsekas [28] that the randomized incremental-gradient algorithm with a
decreasing stepsize αk = O(1/k) converges sublinearly accordingly to (4.4). They
also show that keeping the stepsize constant as αk ≡ m/L implies that
E[kxk − x∗ k2 ] ≤ O([1 − µ/L]k ) + O(m/L).
This expression is interesting because the first term on the right-hand side decreases
at a linear rate, and depends on the condition number µ/L of φ; this term is present
for any deterministic first-order method with constant stepsize. Thus, we can see
that with the strong-convexity assumption and a constant stepsize, the incrementalgradient algorithm has the same convergence characteristics as steepest descent,
but with an additional constant error term.
4.3 Sampling methods
The incremental-gradient method described in §4.2 has the benefit that each
iteration costs essentially the same as evaluating only a single gradient element
∇φi . The downside is that they achieve only a sublinear convergence to the exact
solution, or a linear convergence to an approximate solution. The sampling approach
described in Friedlander and Schmidt [14] allows us to interpolate between the
one-at-a-time incremental-gradient method at one extreme, and a full gradient
method at the other.
The sampling method is based on the iteration update
xk+1 = xk − αgk ,
α = 1/L,
(4.6)
where L is the Lipschitz constant for the gradient, and the search direction
gk = ∇φ(xk ) + ek
(4.7)
is an approximation of the gradient; the term ek absorbes the discrepancy between
the approximation and the true gradient. We define the direction gk in terms of
the sample average gradient (3.1), and then ek corresponds to the error defined
in (3.3).
When the function φ is strongly convex and has a globally Lipschitz continuous
gradient, than the following theorem links the convergence of the iterates to the
error in the gradient.
Theorem 4.1. Suppose that E[kek k2 ] ≤ Bk , where limk→∞ Bk+1 /Bk ≤ 1. Then
each iteration of algorithm (4.6) satisfies for each k = 0, 1, 2, . . . ,
E[kxk − x∗ k2 ] ≤ O([1 − µ/L]k ) + O(Ck ),
where Ck = max{Bk , (1 − µ/L + )k } for any positive .
(4.8)
Robust inversion, dimensionality reduction, and randomized sampling
106
Cumulative samples
Sample size (s/m)
1.0
0.5
0.0
17
0
20
40
60
Iteration (k)
80
100
103
100
replacement
no replacement
deterministic
0
(a)
20
40
60
Iteration (k)
80
100
(b)
Fig. 3: Comparing the difference between the theoretical errors bounds in the sample
averages for three sampling strategies (randomized with replacement, randomized
without replacement, and deterministic). (a) Sample sizes, as fractions of the total
population m = 1000, required to reduce the error linearly with error constant 0.9.
(b) The corresponding cumulative number of samples used. See bounds (4.10).
It is also possible to replace gk in (4.6) with a search direction pk that is the
solution of the system
Hk p = gk ,
(4.9)
for any sequence of Hessian approximations Hk that are uniformly positive definite
and bounded in norm, as can be enforced in practice. Theorem 4.1 continues to
hold in this case, but with different constants µ and L that reflect the conditioning
of the “preconditioned” function; see [14, §1.2].
It is useful to compare (4.4) and (4.8), which are remarkably similar. The
distance to the solution, for both the incremental-gradient method (4.5) and the
gradient-with-errors method (4.6), is bounded by the same linearly convergent term.
The second terms in their bounds, however, are crucially different: the accuracy of
the incremental-gradient method is bounded by a multiple of the fixed steplength;
the accuracy of the gradient-with-errors method is bounded by the norm of the
error in the gradient.
Theorem 4.1 is significant because it furnishes a guide for refining the sample
Sk that defines the average approximation
gk =
1 X
φi (xk )
sk
i∈Sk
of the gradient of φ, where sk is the size of the sample Sk ; cf. (3.1). In particular, (3.6)
and (3.7) give the second moment of the errors of these sample averages, which
correspond precisely to the gradient error defined by (4.7). If we wish to design a
sampling strategy that gives a linear decrease with a certain rate, then a policy for
the sample size sk needs to ensure that it grows fast enough to induce E[kek k2 ] to
decrease with at least that rate. Also, from (4.8), it is clear that there is no benefit
in increasing the sample size at a rate faster than the underlying “pure” first-order
method without gradient error. If, for example, the function is poorly conditioned—
i.e., µ/L is small—than the sample-size increase should be commensurately slow.
18
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
It is instructive to compare how the sample average error decreases in the
randomized (with and without replacement) and deterministic cases. We can more
easily compare the randomized and deterministic variants by following Bertsekas
and Tsitsiklis [5, §4.2], and assuming that
k∇φi (x)k2 ≤ β1 + β2 k∇φ(x)k2
for all x and i = 1, . . . , m,
for some constants β1 ≥ 0 and β2 ≥ 1. Together with the Lipschitz continuity of φ,
we can provide the following bounds:
1
sk
m
2
1−
βk (4.10a)
randomized, without replacement E[kek k ] ≤
sk
m m−1
1
m
randomized, with replacement
E[kek k2 ] ≤
βk
(4.10b)
sk m − 1
2
m − sk
deterministic
kek k2 ≤ 4
βk ,
(4.10c)
m
where βk = β1 + 2β2 L[φ(xk ) − φ(x∗ )]. These bounds follow readily from the
derivation in [14, §§3.1–3.2]. Figure 3 illustrates the difference between these
bounds on an example problem with m = 1000. The panel on the left shows how
the sample size needs to be increased in order for the right-hand-side bounds
in (4.10) to decrease linearly
Pat a rate of 0.9. The panel on the right shows the
cumulative sample size, i.e., ki=0 si . Uniform sampling without replacement yields
a uniformly and significantly better bound than the other sampling strategies. Both
types of sampling are admissible, but sampling without replacement requires a
much slower rate of growth of s to guarantee a linear rate.
The strong convexity assumption needed to derive the error bounds used in
this section is especially strong because the inverse problem we use to motivate
the sampling approach is not a convex problem. In fact, it is virtually impossible
to guarantee convexity of a composite function such as (2.1) unless the penalty
function ρ(·) is convex and each ri (·) is affine. This is not the case for many
interesting inverse problems, such as full waveform inversion, and for nonconvex
loss functions corresponding to distributions with heavy tails, such as Student’s t.
Even relaxing the assumption on φ from strong convexity to just convexity
makes it difficult to design a sampling strategy with a certain convergence rate.
The full-gradient method for convex (but not strongly) functions has a sublinear
convergence rate of O(1/k). Thus, all that is possible for a sampling-type approach
that introduces errors into the gradient
is to simply maintain that sublinear rate.
P
For example, if kek k2 ≤ Bk , and ∞
B
k=1 k < ∞, then the iteration (4.6) maintains
the sublinear rate of the gradient method [14, Theorem 2.6]. The theory for the
strongly convex case is also supported by empirical evidence, where sampling
strategies tend to outperform basic incremental-gradient methods.
5 Numerical experiments in seismic inversion
A good candidate for the sampling approach we have discussed is the full waveform
inversion problem from exploration geophysics, which we address using a robust
formulation. The goal is to obtain an estimate of subsurface properties of the
Robust inversion, dimensionality reduction, and randomized sampling
19
earth using seismic data. To collect the data, explosive charges are detonated just
below the surface, and the energy that reflects back is recorded at the surface by a
large array of geophones. The resulting data consist of a time-series collection for
thousands of source positions.
The estimate of the medium parameters is based on fitting the recorded and
predicted data. Typically, the predicted data are generated by solving a PDE whose
coefficients are the features of interest. The resulting PDE-constrained optimization
problem can be formulated in either the time [38] or the frequency [32] domain.
It is common practice to use a simple scalar wave equation to predict the data,
effectively assuming that the earth behaves like a fluid—in this case, sound speed
is the parameter we seek.
Raw data are processed to remove any unwanted artifacts; this requires significant time and effort. One source of unwanted artifacts in the data is equipment
malfunction. If some of the receivers are not working properly, the resulting data
can be either zero or contaminated with an unusual amount of noise. And even if
we were to have a perfect estimate of the sound speed, we still would not expect to
be able to fit our model perfectly to the data. The presence of these outliers in the
data motivates us (and many other authors, e.g., [7, 8, 16]) to use robust methods
for this application. We compare the results of robust Student’s t-based inversion
to those obtained using least-squares and Huber robust penalties, and we compare
the performance of deterministic, incremental-gradient, and sampling methods in
this setting.
5.1 Modelling and gradient computation for full waveform inversion
The forward model for frequency-domain acoustic FWI, for a single source function
q, assumes that wave propagation in the earth is described by the scalar Helmholtz
equation
Aω (x)u = [ω 2 x + ∇2 ]u = q,
where ω is the angular frequency, x is the squared-slowness (seconds/meter)2 , and
u represents the wavefield. The discretization of the Helmholtz operator includes
absorbing boundary conditions, so that Aω (x) and u are complex-valued. The data
are measurements of the wavefield obtained at the receiver locations d = P u. The
forward modelling operator F (x) is then given by
F (x) = P A−1 (x),
where A is a sparse block-diagonal matrix, with blocks Aω indexed by the frequencies
ω. Multiple sources qi are typically modeled as discretized delta functions with a
frequency-dependent weight. The resulting data are then modeled by the equation
di = F (x)qi , and the corresponding residual equals ri (x) = di − F (x)qi (cf. (1.3)).
For a given loss function ρ, the misfit function and its gradient are defined as
φ(x) =
m
X
i=1
ρ(ri (x))
and
∇φ(x) =
m
X
∇F (x, qi )∗ ∇ρ(ri (x)),
i=1
where ∇F (x, qi ) is the Jacobian of F (x)qi . The action of the adjoint of the Jacobian
on a vector y can be efficiently computed via the adjoint-state method [38] as
follows:
∇F (x, qi )∗ y = G(x, ui )∗ vi ,
20
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
where G(x, ui ) is the (sparse) Jacobian of A(x)ui with respect to x, and ui and vi
are solutions of the linear systems
A(x)ui = qi
and
A(x)∗ vi = P y.
The Huber penalty function for a vector r is
(
X
ri2 /2µ
ρ(r) =
ζi , where ζi =
|ri | − µ/2
i
if |ri | ≤ µ
otherwise.
The Student’s t penalty function (2.4) for a vector r is defined by
X
ρ(r) =
log(1 + ri2 /ν).
i
5.2 Experimental setup and results
For the seismic velocity model x∗ ∈ R60501 on a 201-by-301 grid depicted in
Figure 2(a), observed data d (a complex-valued vector of length 272,706) are
generated using 6 frequencies, 151 point sources, and 301 receivers located at the
surface. To simulate a scenario in which half of the receivers at unknown locations
have failed, we multiply the data with a mask that zeroes out 50% of the data at
random locations. We emphasize that the model was blind to this corruption, and
so we could have equivalently added a large perturbation to the data, as was done
for example in [3]. The resulting data thus differ from the prediction F (x∗ ) given
by the true solution x∗ . A spike in the histogram of the residuals ri (x∗ ) evaluated
at the true solution x∗ , shown in Figure 2(a), shows these outliers. The noise does
not fit well with any simple prior distribution that one might like to use. We solve
the resulting optimization problem with the least-squares, Huber, and Student tpenalties using a limited-memory BFGS method. Figure 4 tracks across iterations
the relative model error kxk − x∗ k/kx∗ k for all three approaches. Histograms of the
residuals after 50 iterations are plotted in Figures 2(c)–(e). The residuals for the
least-squares and Huber approaches resemble Gaussian and Laplace distributions
respectively. This fits well with the prior assumption on the noise, but does not
fit the true residual at all. The residual for the Student’s t approach does not
resemble the prior distribution at all. The slowly increasing penalty function allows
for enough freedom to let the residual evolve into the true distribution.
Next, we compare the performance of the incremental-gradient (§4.2) and
sampling (§4.3) algorithms against the full-gradient method. For the incrementalgradient algorithm (4.5), at each iteration we randomly choose i uniformly over the
set { 1, 2, . . . , m }, and use either a fixed stepsize αk ≡ α or a decreasing stepsize
αk = α/bk/mc. The sampling method is implemented via the iteration
xk+1 = xk − αk pk ,
where pk satisfies (4.9), and Hk is a limited-memory BFGS Hessian approximation.
The quasi-Newton Hessian Hk is updated using the pairs (∆xk , ∆gk ), where
∆xk := xk+1 − xk
and
∆gk := gk+1 − gk ;
Robust inversion, dimensionality reduction, and randomized sampling
Least−squares
Huber
Student’s t
1.1
rel. model error
21
1
0.9
0.8
0.7
0.6
0
10
20
30
iteration
40
50
Fig. 4: Relative error between the true and reconstructed models for least-squares,
Huber, and Student t penalties. In the least-squares case, the model error is not
reduced at all. Slightly better results are obtained with the Huber penalty, although
the model error starts to increase after about 20 iterations. The Students t penalty
gives the best result.
6
x 10
full
incremental, const. step
incremental, decr. step
sampling
misfit
3.4
3.2
3
2.8
2.6
0
0.5
0.4
rel. sample size
3.6
0.3
0.2
0.1
5
10
15
20
passes through the data
25
30
0
0
5
(a)
10
15
20
passes through the data
25
30
(b)
Fig. 5: (a) Convergence of different optimization strategies on the Students t penalty:
Limited-memory BFGS using the full gradient (“full”), incremental gradient with
constant and decreasing step sizes, and the sampling approach. Different lines of
the same color indicate independent runs with different random number streams.
(b) The evolution of the amount of data used by the sampling method.
the limited-memory Hessian is based on a history of length 4. Nocedal and Wright
[31, §7.2] describe the recursive procedure for updating Hk . The batch size is
increased at each iteration by only a single element, i.e.,
sk+1 = min{ m, sk + 1 }.
The members of the batch are redrawn at every iteration, andPwe use an Armijo
backtracking linesearch based on the sampled function (1/sk ) i∈Sk φi (x).
The convergence plots for several runs of the sampling method and the stochastic
gradient method with α = 10−6 are shown in Figure 5(a). Figure 5(b) plots the
evolution of the amounts of data sampled.
22
A. Aravkin, M. P. Friedlander, F. J. Herrmann, and T. van Leeuwen
6 Discussion and conclusions
The numerical experiments we have conducted using the Student’s t-penalty are
encouraging, and indicate that this approach can overcome some of the limitations of
convex robust penalties such as the Huber norm. Unlike the least-squares and Huber
penalties, the Student t-penalty does not force the residual into a shape prescribed
by the corresponding distribution. The sampling method successfully combines the
steady convergence rate of the full-gradient method with the inexpensive iterations
provided by the incremental-gradient method.
The convergence analysis of the sampling method, based on Theorem 4.1, relies
on bounding the second moment of the error in the gradient, and hence the variance
of the sample average (see (3.4)). The bound on the second-moment arises because
of our reliance on the concept of an expected distance to optimality E[kxk − x∗ k2 ].
However, other probabilistic measures of distance to optimality may be more
appropriate; this would influence our criteria for bounding the error in the gradient.
For example, Avron and Toledo [4] measure the quality of a sample average using
an “epsilon-delta” argument that provides a bound on the sample size needed to
achieve a particular accuracy with probability 1 − δ.
Other refinements are possible. For example, van den Doel and Ascher [40]
advocate an adaptive approach for increasing the sample size, and Byrd et al. [10]
use a sample average-approximation of the Hessian.
References
1. A. Aravkin, Robust Methods with Applications to Kalman Smoothing and Bundle Adjustment, PhD thesis, University of Washington, Seattle, WA, June 2010.
2. A. Aravkin, T. van Leeuwen, and M. P. Friedlander, Robust inversion via semistochastic dimensionality reduction, in Submitted to ICASSP 2012, arXiv:1110.0895, 2011.
3. A. Aravkin, T. van Leeuwen, and F. Herrmann, Robust full waveform inversion with
students t-distribution, in Proceedings of the SEG, San Antonio, Texas, 2011, Society for
Exploration Geophysics.
4. H. Avron and S. Toledo, Randomized algorithms for estimating the trace of an implicit
symmetric positive semi-definite matrix, J. ACM, 58 (2011), pp. 8:1–8:34.
5. D. Bertsekas and J. Tsitsiklis, Neuro-dynamic programming, Athena Scientific, 1996.
6. D. P. Bertsekas and J. N. Tsitsiklis, Gradient convergence in gradient methods with
errors, SIAM J. Optim., 10 (2000), pp. 627–642.
7. R. Brossier, S. Operto, and J. Virieux, Which data residual norm for robust elastic
frequency-domain full waveform inversion?, Geophysics, 75 (2010), pp. R37–R46.
8. K. P. Bube and R. T. Langan, Hybrid `1 /`2 minimization with applications to tomography,
Geophysics, 62 (1997), pp. 1183–1195.
9. K. P. Bube and T. Nemeth, Fast line searches for the robust solution of linear systems
in the hybrid `1 /`2 and huber norms, Geophysics, 72 (2007), pp. A13–A17.
10. R. H. Byrd, G. M. Chin, W. Neveitt, and J. Nocedal, On the use of stochastic hessian
information in optimization methods for machine learning, SIAM Journal on Optimization,
21 (2011), pp. 977–995.
11. W. G. Cochran, Sampling Techniques, Jon Wiley, third ed., 1977.
12. L. Fahrmeir and R. Kunstler, Penalized likelihood smoothing in robust state space
models, Metrika, 49 (1998), pp. 173–191.
13. C. G. Farquharson and D. W. Oldenburg, Non-linear inversion using general measures
of data misfit and model structure, Geophysical Journal International, 134 (1998), pp. 213–
227.
14. M. P. Friedlander and M. Schmidt, Hybrid deterministic-stochastic methods for data
fitting, tech. rep., Univ. of British Columbia, April 2011. revised September 2011.
Robust inversion, dimensionality reduction, and randomized sampling
23
15. G. H. Golub and U. von Matt, Quadratically constrained least squares and quadratic
problems, Numer. Math., 59 (1991), pp. 561–580.
16. A. Guitton and W. W. Symes, Robust inversion of seismic data using the huber norm,
Geophysics, 68 (2003), pp. 1310–1319.
17. E. Haber, M. Chung, and F. J. Herrmann, An effective method for parameter estimation
with pde constraints with multiple right hand sides, Tech. Rep. TR-2010-4, UBC-Earth
and Ocean Sciences Department, 2010.
18. F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw, and W. A. Stahel, Robust Statistics:
The Approach Based on Influence Functions, Wiley Series in Probability and Statistics,
1986.
19. F. Herrmann, M. P. Friedlander, and O. Yılmaz, Fighting the curse of dimensionality:
compressive sensing in exploration seismology, tech. rep., University of British Columbia,
2011.
20. P. J. Huber, Robust Statistics, John Wiley & Sons, Inc., New York, 1981.
21. P. J. Huber and E. M. Ronchetti, Robust Statistics, John Wiley and Sons, 2nd ed.,
2009.
22. M. Hutchinson, A stochastic estimator of the trace of the influence matrix for laplacian
smoothing splines, Communications in Statistics - Simulation and Computation, 19 (1990),
pp. 433–450.
23. S. Kaczmarz, Angenäherte auflösung von systemen linearer gleichungen, Bull. Int. Acad.
Polon. Sci. A, 355 (1937), p. 357.
24. J. R. Krebs, J. E. Anderson, D. Hinkley, R. Neelamani, S. Lee, A. Baumstein, and
M.-D. Lacasse, Fast full-wavefield seismic inversion using encoded sources, Geophysics,
74 (2009), pp. WCC177–WCC188.
25. K. L. Lange, R. J. A. Little, and J. M. G. Taylor, Robust statistical modeling using
the t distribution, Journal of the American Statistical Association, 84 (1989), pp. 881–896.
26. S. L. Lohr, Sampling: design and analysis, Duxbury Press, Pacific Grove, 1999.
27. R. A. Maronna, D. Martin, and Yohai, Robust Statistics, Wiley Series in Probability
and Statistics, John Wiley and Sons, 2006.
28. A. Nedic and D. Bertsekas, Convergence rate of incremental subgradient algorithms,
Stochastic Optimization: Algorithms and Applications, (2000), pp. 263–304.
29. A. Nemirovski, Efficient methods in convex programming, Lecture notes, (1994).
30. A. Nemirovski, A. Juditsky, G. Lan, and A. Shapiro, Robust stochastic approximation
approach to stochastic programming, SIAM J. Optim., 19 (2009), pp. 1574–1609.
31. J. Nocedal and S. J. Wright, Numerical Optimization, Springer Series in Operations
Research, Springer, 1999.
32. R. Pratt and M. Worthington, Inverse theory applied to multi-source cross-hole tomography. part i: Acoustic wave-equation method., Geophysical Prospecting, 38 (1990),
pp. 287–310.
33. A. Prékopa, Logarithmic concave measures with application to stochastic programming,
Acta Sci. Math. (Szeged), 32 (1971), pp. 301–316.
34. R. T. Rockafellar, Convex Analysis, Priceton Landmarks in Mathematics, Princeton
University Press, 1970.
35. G. Shevlyakov, S. Morgenthaler, and A. Shurygin, Redescending m-estimators,
Journal of Statistical Planning and Inference, 138 (2008), pp. 2906–2917.
36. M. Solodov, Incremental gradient algorithms with stepsizes bounded away from zero,
Computational Optimization and Applications, 11 (1998), pp. 23–35.
37. T. Strohmer and R. Vershynin, A randomized Kaczmarz algorithm with exponential
convergence, Journal of Fourier Analysis and Applications, 15 (2009), pp. 262–278.
38. A. Tarantola, Inversion of seismic reflection data in the acoustic approximation, Geophysics, 49 (1984), pp. 1259–1266.
39. P. Tseng, An incremental gradient(-projection) method with momentum term and adaptive
stepsize rule, SIAM Journal on Optimization, 8 (1998), pp. 506–531.
40. K. van den Doel and U. M. Ascher, Adaptive and stochastic algorithms for electrical
impedance tomography and dc resistivity problems with piecewise constant solutions and
many measurements, SIAM J. Scientific Computing, 34 (2012).
41. T. van Leeuwen, A. Aravkin, and F. Herrmann, Seismic waveform inversion by
stochastic optimization, International Journal of Geophysics, 2011 (2011), p. ID 689041.
42. J. Virieux and S. Operto, An overview of full-waveform inversion in exploration geophysics, Geophysics, 74 (2009), pp. 127–152.
| 5cs.CE
|
arXiv:cs/0503028v2 [cs.LO] 24 Mar 2005
Under consideration for publication in Theory and Practice of Logic Programming
1
Stabilization of Cooperative Information Agents
in Unpredictable Environment: A Logic
Programming Approach
PHAN MINH DUNG, DO DUC HANH, PHAN MINH THANG
Computer Science and Information Management Department
Asian Institute of Technology
Email: {dung,hanh,thangphm}@cs.ait.ac.th
submitted 1 January 2003; revised 1 January 2003; accepted 1 January 2003
Abstract
An information agent is viewed as a deductive database consisting of 3 parts:
• an observation database containing the facts the agent has observed or sensed from
its surrounding environment.
• an input database containing the information the agent has obtained from other agents
• an intensional database which is a set of rules for computing derived information from
the information stored in the observation and input databases.
Stabilization of a system of information agents represents a capability of the agents to
eventually get correct information about their surrounding despite unpredictable environment changes and the incapability of many agents to sense such changes causing them
to have temporary incorrect information. We argue that the stabilization of a system of
cooperative information agents could be understood as the convergence of the behavior
of the whole system toward the behavior of a “superagent”, who has the sensing and
computing capabilities of all agents combined. We show that unfortunately, stabilization
is not guaranteed in general, even if the agents are fully cooperative and do not hide any
information from each other. We give sufficient conditions for stabilization. We discuss the
consequences of our results.
KEYWORDS: Stabilization, Cooperative Information Agents, Logic Programming
1 Introduction
To operate effectively in a dynamic and unpredictable environment, agents need
correct information about the environment. Often only part of this environment
could be sensed by the agent herself. As the agent may need information about
other part of the environment that she could not sense, she needs to cooperate
with other agents to get such information. There are many such systems of cooperative information agents operating in the Internet today. A prominent example of
such system is the system of routers that cooperate to deliver messages from one
place to another in the Internet. One of the key characteristics of these systems is
their resilience in the face of unpredictable changes in their environment and the
2
P. M. Dung, D. D. Hanh, and P. M. Thang
incapability of many agents to sense such changes causing them to have temporary
incorrect information. This is possible because agents in such systems cooperate by
exchanging tentative partial results to eventually converge on correct and consistent
global view of the environment. Together they constitute a stabilizing system that
allows the individual agents to eventually get a correct view of their surrounding.
Agent communications could be classified into push-based communications and
pull-based communications. In the push-based communication, agents periodically
send information to specific recipients. Push-based communications are used widely
in routing system, network protocols, emails, videoconferencing calls, etc. A key
goal of these systems is to guarantee that the agents have a correct view of their
surrounding. On the other hand, in the pull-based communication, agents have
to send a request for information to other agents and wait for a reply. Until
now pull-based communications are the dominant mode of communication in research in multiagent systems, e.g. (Shoham 1993), (Satoh and Yamamoto 2002),
(Ciampolini et al. 2003), (Kowalski and Sadri 1999), (Wooldridge 1997), (Wooldridge and Jennings 1995).
In this paper, we consider multiagent systems where agent communications are
based on push–technologies. A prominent example of a push-based multiagent system is the internet routing system.
This paper studies the problem of stabilization of systems of cooperative information agents where an information agent is viewed as a deductive database which
consists of 3 parts:
• an observation database containing the facts the agent has observed or sensed
from its surrounding environment.
• an input database containing the information the agent was told by other
agents
• an intensional database which is a set of rules for computing derived information from the information stored in the observation and input databases.
It turns out that in general, it is not possible to ensure that the agents will
eventually have the correct information about the environment even if they honestly
exchange information and do not hide any information that is needed by others and
every change in the environment is immediately sensed by some of the agents. We
also introduce sufficient conditions for stabilization.
The stabilization of distributed protocols has been studied extensively in the literature ((Dijkstra 1974),(Flatebo et al. 1994),(Schneider 1993)) where agents are
defined operationally as automata. Dijkstra (1974) defined a system as stabilizing
if it is guaranteed to reach a legitimate state after a finite number of steps regardless of the initial state. The definition of what constitutes a legitimate state is left
to individual algorithms. Thanks to the introduction of an explicit notion of environment, we could characterize a legitimate state as a state in which the agents
have correct information about their environment. In this sense, we could say that
our agents are a new form of situated agents ((Rosenschein and Kaelbling 1995),
(Brooks 1991), (Brooks 1986)) that may sometimes act on wrong information but
nonetheless will be eventually situated after getting correct information about their
Stabilization of Cooperative Information Agents
3
surrounding. Further in our approach, agents are defined as logic programs, and
hence it is possible for us to get general results about what kind of algorithms
could be implemented in stabilizing multiagent systems in many applications. To
the best of our knowledge, we believe that our work is the first work on stabilization
of multiagent systems.
The rest of this paper is organized as follows. Basic notations and definitions used
in this paper are briefly introduced in section 2. We give an illustrating example
and formalize the problem in section 3. Related works and conclusions are given in
section 4. Proofs of theorems are given in Appendices.
2 Preliminaries: Logic Programs and Stable Models
In this section we briefly introduce the basic notations and definitions that are
needed in this paper.
We assume the existence of a Herbrand base HB.
A logic program is a set of ground clauses of the form:
H ← L1 , . . . , Lm
where H is an atom from HB, and L1 , . . . , Lm are literals (i.e., atoms or negations
of an atoms) over HB, m ≥ 0. H is called the head, and L1 , . . . , Lm the body of
the clause.
Given a set of clauses S, the set of the heads of clauses in S is denoted by head(S).
Note that clauses with variables are considered as a shorthand for the set of all
their ground instantiations. Often the variables appearing in a non-ground clause
have types that are clear from the context. In such cases these variables are instantiated by ground terms of corresponding types.
For each atom a, the definition of a is the set of all clauses whose head is a.
A logic program is bounded if the definition of every atom is finite.
Let P be an arbitrary logic program. For any set S ⊆ HB, let P S be a program
obtained from P by deleting
1. each rule that has a negative literal ¬B in its body with B ∈ S, and
2. all negative literals in the bodies of the remaining rules
S is a stable model ((Gelfond and Lifschitz 1988)) of P if S is the least model of
P S.
The atom dependency graph of a logic program P is a graph, whose nodes are
atoms in HB and there is an edge from a to b in the graph iff there is a clause in
P whose head is a and whose body contains b or ¬b. Note that in the literature
(Apt et al. 1988), the direction of the link is from the atom in the body to the head
of a clause. We reverse the direction of the link for the ease of definition of acyclicity
using the atom dependency graph.
An atom b is said to be relevant to an atom a if there is a path from a to b in
the atom dependency graph.
A logic program P is acyclic iff there is no infinite path in its atom dependency
graph. It is well known that
4
P. M. Dung, D. D. Hanh, and P. M. Thang
Lemma 2.1 ((Gelfond and Lifschitz 1988))
Each acyclic logic program has exactly one stable model.
3 Examples and Problem Formalization
Routing is one of the most important problems for internetworking. Inspired by
RIP (Huitema 2000), one of the most well-known internet routing protocols, we
will develop in this section, as an example, a multiagent system for solving the
network routing problem to motivate our work.
Example 3.1
Consider a network in Fig. 1. For simplicity we assume that all links have the same
cost, say 1.
A❜1
A❜2
❜
❜
A4
A5
A❜3
Fig. 1. A network example
The problem for each agent is to find the shortest paths from her node to other
nodes. The environment information an agent can sense is the availability of links
connecting to her node. The agents use an algorithm known as “distance vector
algorithm” ((Bellman 1957), (Ford and Fulkerson 1962)) to find the shortest paths
from their nodes to other nodes. If the destination is directly reachable by a link, the
cost is 1. If the destination is not directly reachable, an agent needs information
from its neighbors about their shortest paths to the destination. The agent will
select the route to the destination through a neighbor who offers a shortest path to
the destination among the agent’s neighbors. Thus at any point of time, each agent
needs three kinds of information:
• The information about the environment, that the agent can acquire with her
sensing capability. In our example, agent A1 could sense whether the links
connecting her and her neighbors A2 , A4 are available.
• The algorithm the agent needs to solve her problem. In our example the
algorithm for agent A1 is represented by the following clauses: 1
1
Contrary to the convention in Prolog, in this paper we use lower–case letters for variables and
upper–case letters for constants.
Stabilization of Cooperative Information Agents
5
sp(A1 , A1 , 0)
←
sp(A1 , y, d)
← spt(A1 , y, x, d)
spt(A1 , y, x, d + 1) ← link(A1 , x), sp(x, y, d),
not spl(A1 , y, d + 1)
spl(A1 , A1 , d + 1) ←
spl(A1 , y, d + 1)
← link(A1 , x), sp(x, y, d′ ), d′ < d
where
link(Ai , Aj ) is true iff there a link from Ai to Aj in the network and the link is
intact. Links are undirected, i.e. we identify link(Ai , Aj ) and link(Aj , Ai ).
sp(A1 , y, d) is true iff a shortest path from A1 to y has length d
spt(A1 , y, x, d) is true iff the length of shortest paths from A1 to y is d and
there is a shortest path from A1 to y that goes through x as the next node
after A1
spl(A1 , y, d) is true iff there is a path from A1 to y whose length is less than
d.
• The information the agent needs from other agents. For agent A1 to calculate
the shortest paths from her node to say A3 , she needs the information about
the length of the shortest paths from her neighbors A2 , and A4 to A3 , that
means she needs to know the values d, d′ such that sp(A2 , A3 , d), sp(A4 , A3 , d′ )
hold.
3.1 Problem Formalization
The agents are situated in the environment. They may have different accessibility
to the environment depending on their sensing capabilities. The environment is
represented by a set of (ground) environment atoms, whose truth values could
change in an unpredictable way.
Definition 3.1
An agent is represented by a quad-tuple
A = (IDB, HBE, HIN, δ)
where
• IDB, the intensional database, is an acyclic logic program.
• HBE is the set of all (ground) environment atoms whose truth values the
agent could sense, i.e. a ∈ HBE iff A could discover instantly any change in
the truth value of a and update her extensional database accordingly.
• HIN is the set of all atoms called input atoms, whose truth values the agent
must obtain from other agents.
No atom in HIN ∪ HBE appears in the head of the clauses in IDB and
HIN ∩ HBE = ∅.
• δ is the initial state of the agent.
6
P. M. Dung, D. D. Hanh, and P. M. Thang
Definition 3.2
An agent state is a pair σ = (EDB, IN ) where
• EDB ⊆ HBE represents what the agent has sensed from the environment.
That means for each a ∈ HBE, a ∈ EDB iff a is true.
• IN ⊆ HIN , the input database of A, represents the set of information A has
obtained from other agents, i.e. a ∈ IN iff A was told that a is true.
Given a state σ = (EDB, IN ), the stable model of A = (IDB, HBE, HIN, δ) at
σ is defined as the stable model of IDB ∪ EDB ∪ IN . Note that δ and σ could be
different states.
Example 3.2 (Continuation of the network routing example)
Imagine that initially the agents have not sent each other any information and all
links are intact. In this situation, agent A1 is represented as follows:
• IDB1 contains the clauses shown in Example 3.1.
• HBE1 = {link(A1 , A2 ), link(A1 , A4 )}
• HIN1 consists of ground atoms of the form
sp(A2 , Y, D), sp(A4 , Y, D)
where Y ∈ {A2 , . . . , A5 } and D is a positive integer.
• The initial state δ1 = (EDB1,0 , IN1,0 ) where
EDB1,0 = {link(A1 , A2 ), link(A1 , A4 )}
IN1,0 = ∅
Definition 3.3
A cooperative multiagent system is a collection of n agents (A1 , . . . , An ), with Ai =
(IDBi ,HBEi , HINi , δi ) such that the following conditions are satisfied
• for each atom a, if a ∈ head(IDBi ) ∩ head(IDBj ) then a has the same
definition in IDBi and IDBj .
n
S
(head(IDBj ) ∪ HBEj )
• for each agent Ai , HINi ⊆
j=1
• No environment atom appears in the head of clauses in the intentional database
of any agent, i.e. for all i,j: HBEi ∩ head(IDBj ) = ∅.
For each agent Ai let HBi = head(IDBi ) ∪ HBEi ∪ HINi .
3.2 Agent Communication and Sensing
Let Ai = (IDBi , HBEi , HINi , δi ) for 1 ≤ i ≤ n. We say that Ai depends on Aj
if Ai needs input from Aj , i.e. HINi ∩ (head(IDBj ) ∪ HBEj ) 6= ∅. The dependency of Ai on Aj is defined to be the set D(i, j) = HINi ∩(head(IDBj )∪HBEj ).
As we have mentioned before, the mode of communication for our agents corresponds to the “push–technology”. Formally, it means that if Ai depends on Aj
Stabilization of Cooperative Information Agents
7
then Aj will periodically send Ai a set S = D(i, j) ∩ Mj where Mj is the stable model of Aj . When Ai obtains S, she knows that each atom a ∈ D(i, j) \ S
is false with respect to Mj . Therefore she will update her input database INi to
U pai,j (INi , S) as follows
U pai,j (INi , S) = (INi \ D(i, j)) ∪ S
Thus her state has changed from σi = (EDBi , INi ) to σi′ = (EDBi , U pai,j (INi , S))
accordingly.
An environment change is represented by a pair C = (T, F ) where T (resp. F )
contains the atoms whose truth values have changed from false (resp. true) to
true (resp. false). Therefore, given an environment change (T, F ), what Ai could
sense of this change, is captured by the pair (Ti , Fi ) where Ti = T ∩ HBEi and
Fi = F ∩ HBEi . Hence when a change C = (T, F ) occurs in the environment, agent
Ai will update her sensing database EDBi to U pei (EDBi , C) as follows:
U pei (EDBi , C) = (EDBi \ Fi ) ∪ Ti
The state of agent Ai has changed from σi = (EDBi , INi ) to σi′ = (U pei (EDBi , C),
INi ) accordingly.
3.3 Semantics of Multiagent Systems
Let
A = (A1 , . . . , An )
with
Ai = (IDBi , HBEi , HINi , δi )
be a multiagent system. (δ1 , . . . , δn ) is called the initial state of A.
A state of A is defined as
△ = (σ1 , . . . , σn )
such that σi is a state of agent Ai .
There are two types of transitions in a multiagent system. A environment transition happens when there is a change in the environment which is sensed by a set of
agents and causes these agents to update their extensional databases accordingly.
A communication transition happens when an agent sends information to another
agent and causes the later to update her input database accordingly.
For an environment change C = (T, F ), let SC be the set of agents which could
sense parts of C, i.e.
SC = {Ai | HBEi ∩ (T ∪ F ) 6= ∅}
8
P. M. Dung, D. D. Hanh, and P. M. Thang
Definition 3.4
Let △ = (σ1 , . . . , σn ), △′ = (σ1′ , . . . , σn′ ) be states of A with σi = (EDBi , INi ),
σi′ = (EDBi′ , INi′ ).
1. A environment transition
C
△−
→ △′
caused by an environment change C = (T, F ) is defined as follows
(a) for every agent Ak such that Ak 6∈ SC : σk = σk′ , and
(b) for each agent Ai ∈ SC :
• EDBi′ = U pei (EDBi , C),
• INi′ = INi .
2. A communication transition
j
i
△ −−→ △′
caused by agent Aj sending information to agent Ai , where Ai depends on
Aj , is defined as follows:
(a) For all k such that k 6= i: σk = σk′
(b) EDBi′ = EDBi and INi′ = U pai,j (INi , S) where S = D(i, j)∩Mj
and Mj is the stable model of Aj at σj .
j
C
i
We often simply write △ → △′ if there is a transition △ −
→ △′ or △ −−→ △′ .
Definition 3.5
A run of a multiagent system A is an infinite sequence
△0 → △1 → . . . → △m → . . .
such that
• △0 is the initial state of A and for all agents Ai , Aj such that Ai depends on
Aj the following condition is satisfied:
j
i
For each h, there is a k ≥ h such that △k −−→ △k+1
The above condition is introduced to capture the idea that agents periodically
send the needed information to other agents.
• There is a point h such that at every k ≥ h in the run, there is no more
environment change.
For a run R = △0 → △1 → . . . → △k → . . . where △k = (σ1,k , . . . , σn,k ) we
often refer to the stable model of Ai at state σi,k as the stable model of Ai at point
k and denote it by Mi,k .
Stabilization of Cooperative Information Agents
9
Example 3.3
Consider the following multiagent system
A = (A1 , A2 )
where
IDB1
HBE1
HIN1
EDB1,0
IN1,0
= {a ← b, c
f ← a}
= {c}
= {b}
= {c}
= ∅
IDB2
HBE2
HIN2
EDB2,0
IN2,0
= {b ← a, d
b ← e}
= {d, e}
= {a}
= {d, e}
= ∅
Consider the following run R, where the only environment change occurs at point
2 such that the truth value of e becomes false:
2
1
1
(∅,{e})
2
1
2
2
1
△0 −−−→ △1 −−−→ △2 −−−−→ △3 −−−→ △4 −−−→ △5 . . .
The states and stable models of A1 and A2 at points 0, 1, 2, 3, and 4 are as follows
k
0
1
2
3
4
EDB
{c}
{c}
{c}
{c}
{c}
IN
∅
{b}
{b}
{b}
{b}
A1
Stable Model
{c}
{a, b, c, f }
{a, b, c, f }
{a, b, c, f }
{a, b, c, f }
EDB
{d, e}
{d, e}
{d, e}
{d}
{d}
IN
∅
∅
{a}
{a}
{a}
A2
Stable Model
{b, d, e}
{b, d, e}
{a, b, d, e}
{a, b, d}
{a, b, d}
Example 3.4 (Continuation of example 3.2)
Consider the following run R of the multiagent system given in Example 3.2.
2
(∅,{link(A1 ,A2 )})
1
△0 −−−→ △1 −−−−−−−−−−−→ △2 → . . .
Initially, all links are intact and all inputs of agents are empty, i.e. INi,0 = ∅ for
i = 1, . . . , 5. At point 0 in the run, agent A2 sends to agent A1 information about
shortest paths from her to other agents. At point 1 in the run, the link between A1
and A2 is down.
The information (output) an agent needs to send to other agents consists of
shortest paths from her to other agents. Thus from the stable model of an agent
we are interested only in this output.
Let SPi,k be the set {sp(Ai , Y, D)|sp(Ai , Y, D) ∈ Mi,k } where Mi,k is the stable
model of Ai at point k. SPi,k denotes the output of Ai at point k. It is easy to see
j
i
that if there is a transition △k −−→ △k+1 , then Aj sends to Ai :
S = D(i, j) ∩ Mj,k = SPj,k
10
P. M. Dung, D. D. Hanh, and P. M. Thang
At point 0, A1 and A2 have the following states and outputs:
EDB1,0
IN1,0
SP1,0
EDB2,0
IN2,0
SP2,0
=
=
=
=
=
=
{link(A1 , A2 ), link(A1 , A4 )}
∅
{sp(A1 , A1 , 0)}
{link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )}
∅
{sp(A2 , A2 , 0)}
2
1
A2 sends S to A1 in the transition △0 −−−→ △1 where
S = SP2,0 = {sp(A2 , A2 , 0)}
Thus
IN1,1 = U pa1,2 (IN1,0 , S) = U pa1,2 (∅, S) = S = {sp(A2 , A2 , 0)}
The environment change C = (∅, {link(A1 , A2 )}) at point 1 is sensed by A1 and
A2 . The states of A1 and A2 are changed as follows:
IN1,2
EDB1,2
IN2,2
EDB2,2
=
=
=
=
=
=
IN1,1
U pe1 (EDB1,1 , C) = (EDB1,1 \ {link(A1 , A2 )}) ∪ ∅
{link(A1 , A4 )}
IN2,1
U pe2 (EDB2,1 , C) = (EDB2,1 \ {link(A1 , A2 )}) ∪ ∅
{link(A2 , A3 ), link(A2 , A5 )}
The following tables show the states and outputs of A1 and A2 at points 0, 1,
and 2 respectively.
k
0
1
2
EDB
{link(A1 , A2 ), link(A1 , A4 )}
{link(A1 , A2 ), link(A1 , A4 )}
{link(A1 , A4 )}
k
0
1
2
A1
IN
∅
{sp(A2 , A2 , 0)}
{sp(A2 , A2 , 0)}
A2
EDB
{link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )}
{link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )}
{link(A2 , A3 ), link(A2 , A5 )}
SP
{sp(A1 , A1 , 0)}
{sp(A1 , A1 , 0), sp(A1 , A2 , 1)}
{sp(A1 , A1 , 0)}
IN
∅
∅
∅
SP
{sp(A2 , A2 , 0)}
{sp(A2 , A2 , 0)}
{sp(A2 , A2 , 0)}
3.4 Stabilization
Consider a superagent whose sensing capability and problem solving capability are
the combination of the sensing capabilities and problem solving capabilities of all
agents, i.e. this agent can sense any change in the environment and her intensional
database is the union of the intensional databases of all other agents. Formally, the
Stabilization of Cooperative Information Agents
11
superagent of a multiagent system
A = (A1 , . . . , An )
where
Ai = (IDBi , HBEi , HINi , δi ), δi = (EDBi , INi )
is represented by
PA = (IDBA , δ)
where
• IDBA = IDB1 ∪ · · · ∪ IDBn
• δ, the initial state of PA , is equal to EDB1 ∪ · · · ∪ EDBn
The superagent actually represents the multiagent system in the ideal case where
each agent has obtained the correct information for its input atoms.
Example 3.5 (Continuation of Example 3.3)
Consider the multiagent system in Example 3.3. At point 0, the superagent PA is
represented as follows:
• IDBA consists of the following clauses:
a ← b, c
f ←a
b ← a, d
b←e
• δ = {c, d, e}.
Example 3.6 (Continuation of Example 3.4)
Consider the multiagent system in Example 3.4. Initially, when all links between
nodes are intact, the superagent PA is represented as follows:
• IDBA consists of the following clauses:
sp(x, x, 0)
←
sp(x, y, d)
← spt(x, y, z, d)
spt(x, y, z, d + 1) ← link(x, z), sp(z, y, d),
not spl(x, y, d + 1)
spl(x, x, d + 1)
←
spl(x, y, d + 1)
← link(x, z), sp(z, y, d′), d′ < d
• The initial state
δ={
link(A1 , A2 ), link(A1 , A4 ), link(A2 , A3 ),
link(A2 , A5 ), link(A3 , A5 ), link(A4 , A5 )}
Note that the possible values of variables x, y, z are A1 , A2 , A3 , A4 , A5 .
Definition 3.6
Let A be a multiagent system.
The I/O graph of A denoted by GA is a graph obtained from the atom dependency graph of its superagent’s intensional database IDBA by removing all nodes
that are not relevant for any input atom in HIN1 ∪ · · · ∪ HINn .
12
P. M. Dung, D. D. Hanh, and P. M. Thang
A is IO-acyclic if there is no infinite path in its I/O graph GA .
A is bounded if IDBA is bounded.
A is IO-finite if its I/O graph is finite.
Example 3.7
The atom dependency graph of IDBA and the I/O-graph GA of the multiagent
system in Examples 3.3 and 3.5 is given in Fig. 2.
Atom dependency graph
f
I/O graph
a
c
b
d
e
Fig. 2. The atom dependency graph and I/O graph
It is obvious that the multiagent system in Examples 3.3 and 3.5 is bounded
but not IO-acyclic and the multiagent system in Examples 3.1, 3.2, 3.4 and 3.6 is
IO-acyclic and bounded.
Proposition 3.1
If a multiagent system A is IO-acyclic then IDBA is acyclic.
Proof
Suppose IDBA is not acyclic. There is an infinite path η in its atom dependency
graph starting from some atom a. There is some agent Ai such that a ∈ HBi .
Since IDBi is acyclic, every path in its atom dependency graph is finite. η must
go through some atom b ∈ INi to outside of Ai ’s atom dependency graph. Clearly
starting from b, all atoms in η are relevant to b. The infinite path of η starting from
b is a path in the I/O graph GA . Hence GA is not acyclic. Contradiction!
Stabilization of Cooperative Information Agents
13
Definition 3.7
Let R = △0 → . . . △k → . . . be a run and Mi,k be the stable model of Ai at point
k.
1. R is convergent for an atom a if either of the following conditions is satisfied.
• There is a point h such that at every point k ≥ h, for every agent Ai
with a ∈ HBi = head(IDBi ) ∪ HBEi ∪ HINi ,
a ∈ Mi,k
In this case we write Conv(R, a) = true
• There is a point h such that at every point k ≥ h, for every agent Ai
with a ∈ HBi ,
a 6∈ Mi,k
In this case we write Conv(R, a) = f alse
2. R is convergent if it is convergent for each atom.
3. R is strongly convergent if it is convergent and there is a point h such that
at every point k ≥ h, for every agent Ai , Mi,k = Mi,h .
It is easy to see that strong convergence implies convergence. Define
Conv(R) = {a | Conv(R, a) = true}
as the convergence model of R.
Let R = △0 → △1 → . . . → △k → . . . be a run where △k = (σ1,k , . . . , σn,k )
with σi,k = (EDBi,k , INi,k ). As there is a point h such that the environment
does not change after h, it is clear that ∀k ≥ h : EDBi,k = EDBi,h . The set
n
S
EDBi,h is called the stabilized environment of R.
EDB =
i=1
Definition 3.8
• A multiagent system is said to be weakly stabilizing if every run R is
convergent, and its convergence model Conv(R) is a stable model of PA in the
stabilized environment of R, i.e. Conv(R) is a stable model of IDBA ∪ EDB
where EDB is the stabilized environment of R.
• A multiagent system is said to be stabilizing if it is weakly stabilizing and
all of its runs are strongly convergent.
Theorem 3.1
IO-acyclic and bounded multiagent systems are weakly stabilizing.
Proof
See Appendix A.
Unfortunately, the above theorem does not hold for more general class of multiagent systems as the following example shows.
14
P. M. Dung, D. D. Hanh, and P. M. Thang
Example 3.8 (Continuation of example 3.3 and 3.5)
Consider the multiagent system A and run R in Example 3.3. It is obvious that A
is bounded but not IO-acyclic.
For every point k ≥ 4, M1,k = {a, b, c, f }, M2,k = {a, b, d}. Conv(R) = {a, b, c, d, f }.
The stabilized environment of R is EBD = {c, d}. The stable model of PA in the
stabilized environment of R is {c, d}, which is not the same as Conv(R). Hence the
system is not weakly stabilizing.
Boundedness is very important for the weak stabilization of multiagent systems.
Consider a multiagent system in the following example which is IO-acyclic, but not
bounded.
Example 3.9
Consider the following multiagent system
A = (A1 , A2 )
where
IDB1 = {q ← ¬r(x)
s(x) ← r(x)}
HBE1 = {}
HIN1 = {r(0), r(1), . . . }
EDB1,0 = ∅ IN1,0 = ∅
IDB2 = {r(x + 1) ← s(x)
r(0) ←}
HBE2 = {}
HIN2 = {s(0), s(1), . . . }
EDB2,0 = ∅ IN2,0 = ∅
Since HBE = HBE1 ∪ HBE2 = ∅, for every run R the stabilized environment
of R is empty. The stable model of PA in the stabilized environment of R is the set
{r(0), r(1), . . . }∪{s(0), s(1), . . . }. It is easy to see that for each run, the agents need
to exchange infinitely many messages to establish all the values of r(x). Hence for
every run R, for every point h ≥ 0 in the run: q ∈ M1,h , but q is not in the stable
model of PA in the stabilized environment of R. Thus the system is not weakly
stabilizing.
Are the boundedness and IO-acyclicity sufficient to guarantee the stabilization
of a multiagent system? The following example shows that they are not.
Example 3.10 (Continuation of Example 3.4 and 3.6)
Consider the multiagent system in Example 3.2. Consider the following run R with
no environment change after point 6.
4
2
1
(1)
(∅,{link(A1 ,A2 )})
4
1
(2)
(∅,{link(A4 ,A5 )})
1
4
(3)
5
2
5
△0 −−−→ △1 −−−→ △2 −−−→
△3 −−−−−−−−−−−→ △4 −−−→
△5 −−−−−−−−−−−→ △6 −−−→
4
1
△7 −−−→ △8 → . . .
(4)
Initially all links in the network are intact. The states and outputs of agents are
as follows:
• EDB1,0 = {link(A1 , A2 ), link(A1 , A4 )},
Stabilization of Cooperative Information Agents
15
EDB2,0 = {link(A2 , A1 ), link(A2 , A3 ), link(A2 , A5 )}
EDB3,0 = {link(A3 , A2 ), link(A3 , A5 )}.
EDB4,0 = {link(A4 , A1 ), link(A4 , A5 )}.
EDB5,0 = {link(A5 , A2 ), link(A5 , A3 ), link(A5 , A4 )}.
• INi,0 = ∅ for i = 1, . . . , 5.
• SPi,0 = {sp(Ai , Ai , 0)} for i = 1, . . . , 5.
Recall that SPi,k denotes the output of Ai at point k and is defined as follows:
SPi,k = {sp(Ai , Y, D)|sp(Ai , Y, D) ∈ Mi,k }
The following transitions occur in R:
• At point 0, A5 sends SP5,0 = {sp(A5 , A5 , 0)} to A2 . This causes the following
changes in the input and output of A2 :
IN2,1 = {sp(A5 , A5 , 0)}
SP2,1 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)}
• At point 1, A5 sends SP5,1 = {sp(A5 , A5 , 0)} to A4 . This causes the following
changes in the input and output of A4 :
IN4,2 = {sp(A5 , A5 , 0)}
SP4,2 = {sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
• At point 2, A2 sends SP2,2 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} to A1 . This causes
the following changes in the input and output of A1 :
IN1,3 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)}
SP1,3 = {sp(A1 , A1 , 0), sp(A1 , A2 , 1), sp(A1 , A5 , 2)}
• At point 3, the link between A1 and A2 is down as shown in Fig. 3. This
A❜1
A❜2
❜
❜
A4
A5
A❜3
Fig. 3. The network after the link between A1 and A2 is down
causes the following changes in the states and outputs of A1 and A2 :
EDB1,4 = {link(A1, A4 )}
EDB2,4 = {link(A2 , A3 ), link(A2 , A5 )}
IN1,4 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)} IN2,4 = {sp(A5 , A5 , 0)}
SP1,4 = {sp(A1 , A1 , 0)}
SP2,4 = {sp(A2 , A2 , 0), sp(A2 , A5 , 1)}
16
P. M. Dung, D. D. Hanh, and P. M. Thang
• At point 4, A4 sends SP4,4 = {sp(A4 , A4 , 0), sp(A4 , A5 , 1)} to A1 . This causes
the following changes in the input and output of A1 :
IN1,5 =
SP1,5 =
{sp(A2 , A2 , 0), sp(A2 , A5 , 1), sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A1 , A1 , 0), sp(A1 , A4 , 1), sp(A1 , A5 , 2)}
• At point 5, the link between A4 and A5 is down as shown in Fig. 4. This
A❜1
A❜2
❜
❜
A4
A5
A❜3
Fig. 4. The network after the link between A4 and A5 is down
causes the following changes in the states and outputs of A4 and A5 :
EDB4,6 = {link(A4 , A1 )}
IN4,6 = {sp(A5 , A5 , 0)}
SP4,6 = {sp(A4 , A4 , 0)}
EDB5,6 = {link(A5 , A2 ), link(A5 , A3 )}
IN5,6 = ∅
SP5,6 = {sp(A5 , A5 , 0)}
• At point 6, A1 sends SP1,6 = {sp(A1 , A1 , 0), sp(A1 , A5 , 2)} to A4 . This causes
the following changes in the input and output of A4 :
IN4,7 = {sp(A5 , A5 , 0), sp(A1 , A1 , 0), sp(A1 , A5 , 2)}
SP4,7 = {sp(A4 , A4 , 0), sp(A4 , A1 , 1), sp(A4 , A5 , 3)}
Note that at point 6, sp(A1 , A5 , 2) ∈ M1,6 , i.e. the length of the shortest path
from A1 to A5 equals to 2, is wrong. But A1 sends this information to A4 .
Now the length of the shortest paths to A5 of agents A1 , and A4 equal to 2,
and 3 respectively (i.e. sp(A1 , A5 , 2) ∈ M1,7 and sp(A4 , A5 , 3) ∈ M4,7 , are all
wrong. Later on A1 and A4 exchange wrong information, increase the shortest
paths to A5 after each round by 2 and go into an infinite loop.
The states and outputs of A1 and A4 at points 0 → 8 are shown in Fig. 5 and
Fig. 6 respectively.
This example shows that
Theorem 3.2
IO-acyclicity and boundedness are not sufficient to guarantee the stabilization of a
multiagent system.
As we have pointed out before, the routing example in this paper models the popular routing RIP protocol that has been widely deployed in the internet. Example
Stabilization of Cooperative Information Agents
k
0
3
EDB
{link(A1 , A2 ),
link(A1 , A4 )}
{link(A1 , A2 ),
link(A1 , A4 )}
{link(A1 , A2 ),
link(A1 , A4 )}
{link(A1 , A4 )}
4
5
{link(A1 , A4 )}
{link(A1 , A4 )}
6
{link(A1 , A4 )}
7
{link(A1 , A4 )}
8
{link(A1 , A4 )}
1
2
IN
∅
SP
{sp(A1 , A1 , 0)}
∅
{sp(A1 , A1 , 0)}
∅
{sp(A1 , A1 , 0)}
{sp(A2 , A2 , 0), sp(A2 , A5 , 1)}
{sp(A1 , A1 , 0), sp(A1 , A2 , 1),
sp(A1 , A5 , 2)}
{sp(A1 , A1 , 0)}
{sp(A1 , A1 , 0), sp(A1 , A4 , 1),
sp(A1 , A5 , 2)}
{sp(A1 , A1 , 0), sp(A1 , A4 , 1),
sp(A1 , A5 , 2)}
{sp(A1 , A1 , 0), sp(A1 , A4 , 1),
sp(A1 , A5 , 2)}
{sp(A1 , A1 , 0), sp(A1 , A4 , 1),
sp(A1 , A5 , 4)}
{sp(A2 , A2 , 0), sp(A2 , A5 , 1)}
{sp(A2 , A2 , 0), sp(A2 , A5 , 1),
sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A2 , A2 , 0), sp(A2 , A5 , 1),
sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A2 , A2 , 0), sp(A2 , A5 , 1),
sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A2 , A2 , 0), sp(A2 , A5 , 1),
sp(A4 , A4 , 0), sp(A4 , A5 , 3)}
17
Fig. 5. State and output of A1
k
0
6
7
EDB
{link(A4 , A1 ),
link(A4 , A5 )}
{link(A4 , A1 ),
link(A4 , A5 )}
{link(A4 , A1 ),
link(A4 , A5 )}
{link(A4 , A1 ),
link(A4 , A5 )}
{link(A4 , A1 ),
link(A4 , A5 )}
{link(A4 , A1 ),
link(A4 , A5 )}
{link(A4 , A1 )}
{link(A4 , A1 )}
8
{link(A4 , A1 )}
1
2
3
4
5
IN
∅
SP
{sp(A4 , A4 , 0)}
∅
{sp(A4 , A4 , 0)}
{sp(A5 , A5 , 0)}
{sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A5 , A5 , 0)}
{sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A5 , A5 , 0)}
{sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A5 , A5 , 0)}
{sp(A4 , A4 , 0), sp(A4 , A5 , 1)}
{sp(A5 , A5 , 0)}
{sp(A5 , A5 , 0), sp(A1 , A1 , 0),
sp(A1 , A5 , 2)}
{sp(A5 , A5 , 0), sp(A1 , A1 , 0),
sp(A1 , A5 , 2)}
{sp(A4 , A4 , 0)}
{sp(A4 , A4 , 0), sp(A4 , A1 , 1),
sp(A4 , A5 , 3}
{sp(A4 , A4 , 0), sp(A4 , A1 , 1),
sp(A4 , A5 , 3}
Fig. 6. State and output of A4
3.10 shows that RIP is not stabilizing. In configuration 4, the routers at the nodes
A1 , A4 go into a loop and continuously change the length of the shortest paths from
them to A5 from 2 to infinite. This is because the router at node A1 believes that
the shortest path from it to A5 goes through A4 while the router at A4 believes
that the shortest path from it to A5 goes through A1 . None of them realizes that
there is no more connection between them and A5 . 2 . The above theorem general2
This is one of the key reasons why RIP, a very simple internet routing protocol, is gradually
replaced by OSPF, a much more complex routing protocol (Huitema 2000)
18
P. M. Dung, D. D. Hanh, and P. M. Thang
izes this insight to multiagent systems. The conclusion is that in general it is not
possible for an agent to get correct information about its environment if this agent
can not sense all the changes in the environment by itself and has to rely on the
communications with other agents. This is true even if all the agents involved are
honest and do not hide their information.
Obviously, if a multiagent system is IO-acyclic and IO-finite, every agent would
obtain complete and correct information after finitely many exchanges of information with other agents. The system is stabilizing. Hence
Theorem 3.3
IO-acyclic and IO-finite multiagent systems are stabilizing.
Proof
See Appendix B.
4 Related Works and Conclusions
There are many research works on multiagent systems where agents are formalized
in terms of logic programming such as (Ciampolini et al. 2003), (Kowalski and Sadri 1999),
(Satoh and Yamamoto 2002). An agent in our framework could be viewed as an abductive logic program as in (Ciampolini et al. 2003), (Satoh and Yamamoto 2002)
where atoms in the input database could be considered as abducibles. Satoh and
Yamatomo formalized speculative computation with multiagent belief revision. The
semantics of multiagent systems, which is defined based on belief sets and the
union of logic programs of agents, is similar to our idea of “superagent”. An agent
in (Ciampolini et al. 2003) is composed of two modules: the Abductive Reasoning Module (ARM), and the Agent Behaviour Module (ABM). Agents are grouped
within bunches according to the requirements of interaction between agents. The coordination (collaboration) of agents is implicitly achieved through the semantics of
the consistency operators. In both works ((Ciampolini et al. 2003) and (Satoh and Yamamoto 2002))
the communication for agents is based on pull-technologies. The authors did not
address the stabilization issue of multiagent systems. Sadri, Toni and Torroni in
(Sadri et al. 2001) used a logic-based framework for negotiation to tackle the resource reallocation problem via pull-based communication technology and the solution is considered as “stabilization” property.
In this paper, we consider a specific class of cooperative information agents without considering effects of their actions on the environment e.g. in (Ciampolini et al. 2003),
(Kowalski and Sadri 1999), (Satoh and Yamamoto 2002). We are currently working
to extend the framework towards this generalized issue.
In this paper, a logic programming based framework for cooperative multiagent
systems is introduced, and the stabilization of multiagent systems is then formally
defined. We introduced sufficient conditions in general for multiagent systems under
which the stabilization is guaranteed. We showed that IO-acyclic and bounded
multiagent systems are weakly stabilizing. But IO-acyclicity and boundedness are
not sufficient to guarantee the stabilization of a multiagent system. We showed that
Stabilization of Cooperative Information Agents
19
IO-acyclic and IO-finite multiagent systems are stabilizing. Unfortunately these
conditions are strong. So it is not an easy task to ensure that agents eventually get
right information in the face of unpredictable changes of the environment.
Our research is inspired by the network routing applications. As the RIP ((Hedrick 1988),
(Huitema 2000)) is very simple and had been widely accepted and implemented.
But the RIP has many limitations such as the bouncing effect, counting to infinity,
looping, etc. Many versions and techniques of the RIP have been introduced to reduce undesired features of the RIP, but the problem could not be solved thoroughly.
With logic programming approach, we showed in this paper, the main reason is that
in the RIP, the computation of the overall problem solving algorithm is distributed
over the network, while the logic program which represents the routing algorithm
is not IO-finite, the stabilization of the system is thus not guaranteed. It is also a
reason why most experts prefer the OSPF ((Moy 1998), (Huitema 2000)), which is
much more complicated and sophisticated protocol, to the RIP for network routing.
We have assumed that information sent by an agent is obtained immediately by
the recipients. But communications in real networks always have delay and errors
in transmissions. We believe that the results presented in this paper could also be
extended for the case of communication with delay and errors.
In this paper communications for agents are based on push-technologies. It is interesting to see how the results could be extended to multiagent systems whose communication is based on pull-technologies ((Satoh and Yamamoto 2002), (Ciampolini et al. 2003)).
Appendix A Proof of theorem 3.1
First it is clear that the following lemma holds.
Lemma Appendix A.1
Let M be a stable model of a logic program P . For each atom a: a ∈ M iff there is
a clause a ← Bd in P such that M |= Bd.
Given an IO-acyclic and bounded multiagent system A = (A1 , . . . , An ). By
proposition 3.1, IDBA is acyclic.
Let
R = △0 → · · · → △h → . . .
be a run of A such that after point h there is no more change in the environment.
The stabilized environment of R is EDB = EDB1,h ∪ · · · ∪ EDBn,h . Let [[PA ]] be
the stable model of PA in the stabilized environment of R, i.e. the stable model of
IDBA ∪ EDB.
The height of an atom a in the atom dependency graph of PA denoted by π(a) is
the length of a longest path from a to other atoms in the atom dependency graph of
PA . Since IDBA is acyclic, there is no infinite path in the atom dependency graph
of PA . From the boundedness of IDBA , π(a) is finite.
Theorem 3.1 follows directly from the following lemma.
20
P. M. Dung, D. D. Hanh, and P. M. Thang
Lemma Appendix A.2
For every atom a, R is convergent for a and conv(R, a) = true iff a ∈ [[PA ]].
It is easy to see that lemma Appendix A.2 follows immediately from the following
lemma.
Lemma Appendix A.3
For every atom a, there is a point k ≥ h, such that at every point p ≥ k in R, for
every Ai such that a ∈ HBi , a ∈ Mi,p iff a ∈ [[PA ]].
Proof
We prove by induction on π(a). For each i, let HBIi = head(IDBi ).
• Base case: π(a) = 0 (a is a leaf in the dependency graph of PA ).
Let Ai be an agent with a ∈ HBi . There are three cases:
1. a ∈ HBIi . There must be a clause of the form a ← in IDBi . a ← is also in
IDBA . At every point m ≥ 0, a ∈ Mi,m and a ∈ [[PA ]].
2. a ∈ HBEi . There is no change in the environment after h, at every point
k ≥ h, a ∈ Mi,k iff a ∈ EDBi,k iff a ∈ [[PA ]].
3. a ∈ HINi . There must be an agent Aj such that D(i, j) 6= ∅ and a ∈ HBEj ∪
HBIj . By definition 3.5 of the run, there must be a point p ≥ h such that
there is a transition
j
i
△p −−→ △p+1
Moreover, every transition that can delete (or insert) a from (or into) INi
j
i
after point h must also have the form △q −−→ △q+1 for some Aj such that
D(i, j) 6= ∅ and a ∈ HBEj ∪ HBIj . By the definition of transition of the
j
i
form △ −−→ △′ in definition 3.5 and the operator U pa in section 3.2, for a
j i
transition △p −−→ △p+1 , Ai will update INi as follows
INi,p+1 = (INi,p \ D(i, j)) ∪ S
where S = D(i, j) ∩ Mj,p . Since a ∈ D(i, j), a ∈ Mi,p+1 iff a ∈ INi,p+1 iff
a ∈ Mj,p . As shown in 1 and 2, at every point k ≥ h, for every Aj such that
a ∈ HBIj ∪HBEj , a ∈ Mj,k iff a ∈ [[PA ]]. So at every point k ≥ p, a ∈ Mi,k+1
iff a ∈ [[PA ]].
We have proved that for each Ai such that a ∈ HBi there a point pi such that at
every point k ≥ pi , a ∈ Mi,k iff a ∈ [[PA ]]. Take p = max(p1 , . . . , pn ). At every point
k ≥ p, for every agent Ai such that a ∈ HBi , a ∈ Mi,k iff a ∈ [[PA ]].
• Inductive case: Suppose the lemma holds for every atom a with π(a) ≤ m, m ≥ 0.
We show that the lemma also holds for a with π(a) = m + 1.
Let Ai be an agent with a ∈ HBi . Clearly a 6∈ HBE ⊇ HBEi . There are two cases:
1. a ∈ HBIi . The atom dependency graph of PA is acyclic, every child b of a
has π(b) ≤ m. By the inductive assumption, for each b there is a point pb
such that at every point k ≥ pb , b ∈ Mi,pb iff b ∈ [[PA ]]. The set of children of
a in the atom dependency graph of PA is the same as the set of atoms in the
Stabilization of Cooperative Information Agents
21
body of all clauses of the definition of a. As IDBA is bounded, a has a finite
number of children in the atom dependency graph of PA and the definition of
a is finite. Let pa is the maximum number in the set of all such above pb where
b is a child of a. At every point k ≥ pa , for every child b of a, by the inductive
assumption, b ∈ Mi,k iff b ∈ [[PA ]]. We prove that a ∈ Mi,k iff a ∈ [[PA ]].
By lemma Appendix A.1, a ∈ Mi,k iff there is a rule a ← Bd in Pi,k =
IDBi ∪ EDBi,k ∪ INi,k such that Mi,k |= Bd. By inductive assumption for
every b ∈ atom(Bd), b ∈ Mi,k iff b ∈ [[PA ]]. Moreover a ← Bd is also a rule in
PA . Thus a ∈ Mi,k iff there is a rule a ← Bd in PA such that [[PA ]] |= Bd iff
a ∈ [[PA ]] (by lemma Appendix A.1).
2. a ∈ HINi . As shown in 1, for every Aj such that a ∈ HBIj there is a point
pj , such that at every point k ≥ pj , a ∈ Mj,k iff a ∈ [[PA ]]. Let p be the
maximum of all such pj . Clearly, at every point k ≥ p, for every Aj such that
a ∈ HBIj , a ∈ Mj,k iff a ∈ [[PA ]].
Follow similarly as case 3 in base case of the proof, there is a point p′ ≥ p + 1
such that at every point k ≥ p′ , a ∈ Mi,k iff a ∈ Mj,k . It also means that at
every point k ≥ p′ , a ∈ Mi,k iff a ∈ [[PA ]].
We have proved that for each Ai such that a ∈ HBi there a point pi such that at
every point k ≥ pi , a ∈ Mi,k iff a ∈ [[PA ]]. Take p = max(p1 , . . . , pn ). At every point
k ≥ p, for every agent Ai such that a ∈ HBi , a ∈ Mi,k iff a ∈ [[PA ]].
Appendix B Proof of theorem 3.3
Let A be an IO-acyclic and IO-finite multiagent system. Obviously A is also bounded.
Let R be a run of A. By theorem 3.1, R is convergent. By lemma Appendix A.3,
for every atom a in GA there is a point ka such that at every point p ≥ ka , for
every agent Ai such that a ∈ HBi , a ∈ Mi,p iff a ∈ [[PA ]]. As GA is finite, take
the largest number k of all such ka ’s for every atoms a in GA . Obviously, at every
point p ≥ k, for every agent Ai , Mi,k = Mi,p . Thus R is strongly convergent. The
system is stabilizing and theorem 3.3 follows immediately.
References
Apt K., Blair H., and Walker A.1988. Towards a theory of declarative knowledge,
In J. Minker editor, Foundations of Deductive Databases and Logic Programming, pp.
89–148, Morgan Kaufman, San Mateo, CA., 1988.
Bellman R. E., 1957, Dynamic Programming, Princeton University Press, Princeton,
N.J., 1957.
Brooks R. A., 2002, Robot: the future of flesh and machines, Penguin. 2002
Brooks. R.A., 1991, Intelligence without Representation, Artificial Intelligence, Vol.47,
1991, pp.139-159
Brooks, R. A, 1986, A robust layered control system for a mobile robot, IEEE Journal
of Robotics and Automation. RA-2, April, 1986, pp. 14-23.
22
P. M. Dung, D. D. Hanh, and P. M. Thang
Ciampolini A., Lamma E., Mello P., Toni F., and Torroni P., 2003, Co-operation
and competition in ALIAS: a logic framework for agents that negotiate, Annals of
Mathematics and Artificial Intelligence, Special Issue on Computational Logic in MultiAgent Systems, Volume 37, nos. 1-2, pp. 28-37, January 2003.
Dijkstra E., 1974, Self-stabilizing systems in spite of distributed control, Communications of the ACM, 17(11), 1974.
Durfee E.H., Lesser V. R., and Corkill D.D., 1995, Trends in Cooperative Distributed
Problem Solving, IEEE Transactions on Knowledge and Data Engineering. July, 1995.
Flatebo M., Datta A. K., and Ghosh S., 1994, Self-stabilization in distributed systems,
Chapter 2, Readings in Distributed Computer Systems, pp. 100–114, IEEE Computer
Society Press, 1994.
Ford L. R. J. and Fulkerson D. R., 1962, Flows in Networks, Princeton University
Press, Princeton, N.J., 1962
Gelfond M., and Lifschitz V., 1988, The stable model semantics for logic programming., In R. Kowalski and K. Bowen, editors, Logic Programming: Proc. of the Fifth
International Conference and Symposium, pp. 1070–1080, 1988.
Hedrick C., 1988, Routing Information Protocol, RFC–1058, Rutgers University, 1988.
Huitema C., 2000, Routing in the Internet, 2nd Edition, Prentice Hall, 2000.
Kowalski R. A. and Sadri F., 1999, From Logic Programming to Multiagent Systems,
Annals of matematics and Artificial Intelligence, Baltzer Science Publishers, Editors:
Dix J. and Lobo J., volume 25, pp. 391–420, 1999.
Moy J., 1998, OSPF Version 2, RFC-2328, 1998.
Rosenschein S. J. and Kaelbling L. P., 1995, A Situated View of Representation and
Control, Artificial Intelligence, No. 73, pp. 149–173, 1995.
Sadri F., Toni F. and Torroni P., 2001, Dialogues for Negotiation: Agent Varieties
and Dialogue Sequences, Proc. ATAL’01, International workshop on Agents, theories,
Architectures and Languages, J.J. Maher ed., and ”Intelligent Agents VIII”, LNAI 2333,
pp. 405-421, Springer Verlag, 2001.
Satoh K. and Yamamoto K., 2002, Speculative Computation with Multi-Agent Belief
Revision, Proceedings of the First International Joint Conference on Autonomous Agent
and Multiagent Systems, Bologna, Italy (2002).
Schneider M., 1993, Self-stabilization, ACM Computing Surveys, 25(1), pp. 45–67, 1993.
Shoham Y., 1993, Agent-oriented programming, Artificial Intelligence, No. 60, pp. 51–92,
1993.
Steels L. and Brooks R. , 1995, The Artificial Life Route to Artificial Intelligence:
building Embodied, Situated Agents, Lawrance Erlbaum Associates Publishers, 1995.
Wooldridge M., 1997, Agent-Based Software Engineering, IEEE Proc. Software Engineering 144 (1), pp. 26-37.
Wooldridge M. and Jennings N. R., 1995, Intelligent agents: Theory and practice,
The Knowledge Engineering Review, 10 (2), pp. 115-152.
| 2cs.AI
|
arXiv:1210.5968v9 [cs.DS] 22 Dec 2015
A pair of universal sequence-set betting
strategies
Tomislav Petrović
February 25, 2018
Abstract
We introduce the sequence-set betting game, a generalization
of An. A. Muchnik’s non-monotonic betting game [2]. Instead of
successively partitioning the infinite binary strings by their value
of a bit at a chosen position, as in the non-monotonic game, the
player is allowed to partition the strings into any two clopen sets
with equal measure. We show that, while there is no single computable sequence-set betting strategy that predicts all non-MartinLöf random strings, we can construct two strategies such that every
non-Martin-Löf random string is predicted by at least one of them.
1
Introduction
There is a long history of studying the nature of randomness, even the
formal study goes back to at least von Mises [4]. One way of defining randomness is via a kind of a betting game, a martingale, first used by J. Ville
[5]. Winning in a game against infinite string can be viewed as predictability of a string. The predictability of a string is formally defined in terms of
betting games and computable strategies. A string is said to be predictable
iff there is a computable strategy that, starting with unit capital, by successive betting, wins an unbounded amount of capital when betting against the
string. In [2], An. A. Muchnik et al., introduce the non-monotonic-betting
game. In this game, the player bets on the bits of the string, each bet
consisting of the index (position) of the bit, wagered amount of capital and
the value of the bit she is betting on. If the value of the bit at the chosen
position was guessed correctly the wagered amount is doubled, otherwise it
is lost. The strings for which there is no computable non-monotonic betting strategy that can predict them are called Kolmogorov-Loveland random, since they both independently proposed non-monotonic inspection of
bits in a string [6, 7]. P. Martin-Löf gives his definition of randomness in
terms of computably enumerable statistical tests in [8]. His seminal paper marks a point of departure from the unpredictability paradigm towards
the incompressibility paradigm in defining the random strings. To define
incompressibility, we use the prefix-free variant of Kolmogorov complexity,
K, see [1]. An incompressible infinite string is such that for some constant
c and all of its prefixes p, K(p) ≥ ℓ(p) − c, with ℓ(p) denoting the length
of the prefix. It can be shown that Martin-Löf random strings are precisely
the incompressible ones. Whether Kolmogorov-Loveland random sequences
are a proper subset of Martin-Löf random strings is unknown, and is considered a major open problem in the field of algorithmic information theory
[1, 9, 10, 11, 12, 13]. A characterization of Martin-Löf randomness can be
given in terms of a certain betting game, we’ll call it prefix-betting. In this
game in each iteration the player bets on a segment s of a string extending
the known prefix of a string, p, and if the string she’s playing against starts
with the prefix ps, she wins some money, if not, the wagered amount is
lost. Since prefix-betting is a fair game, if the segment she bets on has
length l, if she is right she wins 2l times the wagered amount. It is known
that a single computable prefix-betting strategy can be constructed that
predicts all compressible strings [3]. Note however, that in the case of a
correct guess, we learn something about the string we are playing against,
namely the next segment of its prefix. But in case we were wrong, we learn
very little, only that it doesn’t begin with the prefix we had bet on. This
asymmetry is twofold. Firstly, if the guess was correct, the measure of the
set that we know contains the sequence reduces by a factor of 2−l , and if
the guess was incorrect it is reduced by a factor of only (1 − 2−l ). Secondly,
if we make an infinite number of correct guesses, we learn all of the bits of
the string. On the other hand, if we make an infinite sequence of wrong
guesses, we still might not learn a single bit of the string. To address the
first kind of asymmetry we introduce a generalization of the non-monotonic
betting game called the sequence-set betting game. This is a game where
the player, initially starting with the set of all strings and unit capital, partitions the set of strings into two clopen sets of equal measure, and bets on
2
one of them. To see that there is no single computable sequence-set-betting
strategy that predicts all compressible strings, at each bet choose the set on
which the strategy looses and obtain a computable sequence of nested sets,
each having a measure of 12 the previous set. The strings in the intersection
of these sets are compressible since we obtained them by a computable procedure, have measure 0, and, by construction, the strategy doesn’t predict
them. On the other hand, we show that it is possible to construct two such
strategies such that every compressible string is predicted by at least one
of them.
2
Definitions and main theorem
Our base space is always the space Ω of infinite binary sequences, with the
Lebesgue measure λ defined on it. For a set U ⊆ Ω with λ(U) > 0 we will
define the conditional measure λU on U as usual by
λU (A) =
λ(A ∩ U)
.
λ(U)
Definition 2.1 (Mass placement). A mass placement is a triple P =
(U, A, µ) where A is a finite partition of the clopen ground set U ⊆ Ω
into clopen sets, with a mass function µ : A → R+ defined on them. We
will call A the partition of P . The above mass placement is called atomic
if its partition consists of a single element.
The mass function is extended to all unions of elements of A: µ(A1 ∪
· · · ∪ Ai ) = µ(A1 ) + · · · + µ(Ai ). The minimum capital of P is
capi(P ) = min
A∈A
µ(A)
.
λ(A)
The grain bound of P is maxA∈A λ(A).
We will say that a mass placement Q = (U, B, ν) is a refinement of a
mass placement P = (U, A, µ), writing Q P , if each B ∈ B is subset of
some A ∈ A, further µ(A) = ν(A) for all A ∈ A.
y
Definition 2.2 (Grid). Consider a pair of mass placements P = (P 0 , P 1 ),
P j = (U, Aj , µj ), j = 0, 1 with the same ground set U = UP . We will call
such an object a grid. In general, for any grid P we will denote its ground
3
set by UP , its partitions by AjP , and its mass functions by µjP for j = 0, 1.
So
P = (P 0 , P 1), P j = (UP , AjP , µjP ), j = 0, 1.
Let capi(P) = min(capi(P 0 ), capi(P 1 )). The grain bound of P is the maximum of the grain bounds of P 0 and P 1. A grid is atomic if both of its
elements are. We will say that grid P is a refinement of grid Q and write
P Q if P j Qj for j = 0, 1.
A set S is compatible with the grid P if it is the union of sets of the
y
form E 0 ∩ E 1 with E j ∈ AjP .
Definition 2.3 (Sum). Let P, Q be grids with disjoint ground sets. Consider the mass placement R with
UR = UP ∪ UQ ,
AjR = AjP ∪ AjQ ,
with µjR (E) = µjP (E) for E ∈ AjP and µjQ (E) for E ∈ AjQ , j = 0, 1. We will
denote R = P + Q. Of course, capi(R) = min(capi(P), capi(Q)). A sum
of three or more elements is defined similarly. A grid P is called diagonal
y
if A0P = A1P , or equivalently, if it is a sum of atomic grids.
Definition 2.4 (Orthogonality). Somewhat dual to diagonality is the concept of orthogonality. The grid P is called orthogonal if for all A ∈ A0P and
B ∈ A1P we have
λU (A ∩ B) = λU (A)λU (B).
(This means that the two algebras, defined by A0 and A1 are conditionally
independent on UP .) Let P be a grid. Let j ∈ {0, 1}. We can replace
an arbitrary element A ∈ AjP with 2 disjoint subsets A = A1 ∪ A2 with
1−j
λ(Ai ∩ B) = λ(A ∩ B)/2 for all B ∈ AP
, and choose µjP (Ai ) = µjP (A)/2.
The new grid will be said to be obtained by an even split from P. Of course
it has the same ground set and min and max capital and as the original
one. Also, splitting conserves orthogonality.
y
Definition 2.5 (Mass placement test). We call a mass placement
(Ω, {Ω}, µ(Ω) = 1) a unit mass placement and an infinite sequence of mass
4
placement refinements T = T0 T1 ... a mass placement test iff T0 is a
unit mass placement.
S
Denote with AT = i ATi . The mass function µT : AT → R+ is defined
by the mass placements Ti , for A ∈ ATi , µT (A) = µS
The mass
Ti (A). P
function is extended to all unions of disjoint B ⊆ AT : µT ( B) =
µT (B).
B∈B
S
For brevity, we drop and write just µT (B).
The capital of A ∈ AT is
c(A) =
µT (A)
λ(A)
For α ∈ Ω, denote with Tα , a set of elements of AT that contain α. We say
that α fails the test T iff
sup c(A) = ∞
A∈Tα
We call a mass placement test a granular test iff the grain bound of Ti
goes to zero in the limit.
y
Definition 2.6 (Sequence-set betting strategy). A mass placement test S
is a sequence-set betting strategy if for all A ∈ ASi , λ(A) = 2−i .
y
Clearly, a sequence set betting strategy is a granular test.
Definition 2.7 (Martin-Löf test). A nested sequence of open sets N =
N1 ⊇ N2 ⊇ . . . with λ(Ni ) ≤ 2−i and Ni computably enumerable uniformly
in i is called
T a Martin-Löf test. An infinite binary sequence α fails the test
N iff α ∈ i∈N Ni . A Martin-Löf test M is called universal if every α that
fails some Martin-Löf test N also fails M.
y
It is well-known that there is an universal Martin-Löf test [8, 1].
Theorem 1. For a Martin-Löf test M, there are two computable sequenceset betting strategies S 0 , S 1 such that for every infinite binary sequence α
that fails M, α fails at least one of S 0 , S 1 .
5
3
Proof
Lemma 3.1. Consider a diagonal grid P with cP= capi(P), and a sequence
2
of disjoint clopen sets E1 , E2 , . . ., Ei ⊆ UP ,
i λ(Ei ) ≤ p λ(UP ) for a
certain p < 1. Let K > 1 be a constant with Kp < 1. We can compute a
sequence of disjoint diagonal grids Q1 , Q2 , . . . with UQi = Ei , and for each
n > 0 a mass placement Rn disjoint from
Q1 , Q2 , . . . , Qn , an even splitting Pn of P and even splittings Qi,n of
Qi such that the following holds:
Q1,n + · · · + Qn,n + Rn Pn ,
Qn+1 + Rn+1 Rn ,
and for each i, for each atomic part T of Qi we have
max(capi(T 0 ), capi(T 1 )) = cK,
min(capi(T 0 ), capi(T 1 )) = capi(T) ≥ c′ ,
(1)
(2)
where c′ = c(1 − pK). Also the grain bound of Pn is ≤ 2−n .
The 2−n grain bound is arbitrary, it only matters that it converges to 0
constructively.
Proof. We construct the grids Qi and Rn explicitly and recursively. Suppose that Qi , Ri and Pi have been defined already for all i < n. Let
R = Rn−1 , S = Rn (this is still to be defined). Denote
Vn = E1 ∪ · · · ∪ En .
Of course, US = UP \ Vn . It is possible to replace Pn−1 with a Pn obtained
by repeated even splittings in such a way that it becomes compatible with
the clopen set En (and also satisfies the grain bound). We obtain each Qi,n
from Qi and R̃ from R similarly. Note that since Pn−1 was orthogonal, so
is Pn . With these splittings we can achieve the following: for each j = 0, 1,
for each B ∈ AjPn , and i < n we have
B ∩ Ei ∈ AjQi,n , B \ Vn−1 ∈ AjR̃ .
Now, as En is compatible with Pn , it can be written as a disjoint union
En = F1 ∪ · · · ∪ Fm , where each Fk has the form B 0 ∩ B 1 , with B j ∈ AjPn .
6
The (diagonal) grid Qn will be a sum of atomic grids T1 + · · · + Tm , with
UTk = Fk . Of course, US = UR \ En , and
AjS = {A \ Vn : A ∈ AjPn } = {B \ En : B ∈ AjR̃ }.
The interesting part is the definition of the new mass functions µjTk and
µjS . Note that there is a common refinement P̂n of Pn and Q1,n , . . . , Qn,n ,
Rn . (We use P̂n only for the calculations in this proof, not the actual
construction.) Wherever µjTk and µjS are defined, they are identical to µjP̂ .
n
Therefore from now on, we omit the subscript of µj when it signifies µjP̂
n
(which is essentially in all cases). For j = 0, 1, for each B ∈ AjR̃ , we need
to redistribute the mass µj (B) into B ∩ Vn and B \ Vn . The mass assigned
to B ∩ Vn will be distributed among all the Fk with Fk ⊆ B, and the mass
remaining is given to B \ Vn . Let
M = {A ∈ A0Pn : λ(A ∩ Vn ) > pλ(A)}.
First we determine the values of µ0 (·). Suppose A ∈
/ M. Recalling A∩UR =
(A \ Vn ) ∪ (A ∩ En ), a disjoint union, for Fk ⊆ A we set
(
cKλ(Fk ) if A ∈
/ M,
µ0 (Fk ) =
′
c λ(Fk )
otherwise,
(3)
µ0 (A \ Vn ) = µ0 (A ∩ UR ) − µ0 (A ∩ En ).
In other words, for each Fk ⊆ A, if A ∈
/ M then we satisfy the require0
ment (1) by by capi(Tk ) = cK, otherwise we satisfy (2).
Now we determine the values of µ1 (·). Let B ∈ A1Pn . Let Fk = A ∩ B
with A ∈ A0Pn . We set
(
cKλ(Fk ) if A ∈ M,
µ1 (Fk ) =
c′ λ(Fk )
otherwise,
(4)
µ1 (B \ Vn ) = µ1 (B ∩ UR ) − µ1 (B ∩ En ).
These definitions satisfy conditions (2), (1) by design; what remains to
prove is that they provide µj (A \ Vn ) ≥ 0 for A ∈ AjPn . We will actually
prove the stronger inequality µj (A \ Vn ) ≥ c′ λ(A \ Vn ).
7
Consider the case j = 0, and first the case A ∈
/ M. We will prove,
inductively, the stronger statement
λ(A ∩ Vn )
0
µ (A \ Vn ) ≥ c 1 − K
λ(A) = cλ(A) − cKλ(A ∩ Vn ).
(5)
λ(A)
If A ∈
/ M = Mn then for all i < n, for A′ ⊇ A with A′ ∈ A0Pi we had
A′ ∈
/ Mi . Therefore by inductive assumption, for i = n − 1,
µ0 (A′ \ Vn−1 ) ≥ cλ(A′ ) − cKλ(A′ ∩ Vn−1 ).
This linear inequality is conserved by the splittings, therefore also
µ0 (A \ Vn−1 ) ≥ cλ(A) − cKλ(A ∩ Vn−1 ).
(6)
Now by definition (3)
µ0 (A \ Vn ) = µ0 (A \ Vn−1 ) − µ0 (A ∩ En ) = µ0 (A \ Vn−1 ) − cKλ(A ∩ En ),
which together with (6) proves (5).
Now consider the case A ∈ M. Let l be the last i < n where for A′ ⊇ A
with A′ ∈ A0Pi we had A′ ∈
/ Mi . If there is no such i then set l = 0, this
case is trivial. Then by the above proof, for such A′ we have
µ0 (A′ \ Vl−1 ) ≥ cλ(A′ ) − cKλ(A′ ∩ Vl−1 ) ≥ c′ λ(A′ ∩ Vl−1 ).
From now on the process for all i > l will either split evenly or assign
µ0 (A ∩ Ei ) = c′ λ(A ∩ Ei ) and µ0 (A \ Vi ) = µ0 (A \ Vi−1 ) − c′ λ(A ∩ Ei ). Both
kinds of step conserve the lower bound c′ > 0 on capital.
Now consider theS case j = 1; we want to prove µ1 (B \ Vn ) ≥ 0 for
B ∈ A1Pn . Let M = M. We claim
λ(B ∩ M) ≤ pλ(B).
(7)
For this, we will use the orthogonality of Pn and the assumption λ(Vn ) ≤
p2 λ(UP ) of the lemma. For every A ∈ M we have by definition of M,
λ(A ∩ Vn ) > pλ(A). Let u = λ(UPn ). Then
p2 u ≥ λ(Vn ) ≥ λ(M ∩ Vn ) > pλ(M),
8
implying λ(M) < pu. By orthogonality,
λ(B ∩ M)/u = (λ(B)/u)(λ(M)/u) ≤ pλ(B)/u,
implying (7). By definition (4), and using (7),
µ1 (B ∩ M ∩ Vn ) ≤ cKλ(B ∩ M ∩ Vn ) ≤ cKpλ(B),
hence
µ1 (B \ (M ∩ Vn )) ≥ µ1 (B) − cKλ(B ∩ M)
≥ cλ(B)(1 − Kp) = c′ λ(B) ≥ c′ λ(B \ (M ∩ Vn )).
By definition (4), µ1 (B ∩ Vn \ M) = c′ λ(B ∩ Vn \ M), hence
µ1 (B \ Vn ) ≥ c′ λ(B \ (M ∩ Vn )) − c′ λ(B ∩ Vn \ M) = c′ λ(B \ Vn ),
finishing the proof.
Lemma 3.2. For any Martin-Löf test N we can computably construct two
granular tests P 0 , P 1 such that every infinite binary sequence α that fails
N, α fails P 0 or α fails P 1.
Proof. We construct the granular tests explicitly and recursively.
For some i, suppose that Q is a diagonal grid with UQ = H for some
H ∈ Ni . Recall that a diagonal grid is a sum of atomic grids and let
T1 , . . . , Tn be atomic grids such that T1 + · · ·+ Tn = Q. Let Tk = (Tk0 , Tk1 )
Denote
m(Q) = min max(capi(Tk0 ), capi(Tk1 ))
k
and let c = capi(Q), K = 2m(Q)/c and r such that 2−r ≤ 1/(cK)2 .
Let E1 , E2 , . . . be an enumeration of elements of Nr ∩ H. By Lemma 3.1,
there is a sequence of disjoint diagonal grids QT,Q = Q1 , Q2 , . . . and a
sequence of mass placements RT,Q = R1 , R2 , . . ., such that Ri is disjoint
from Q1 , . . . , Qi , Q Q1 + · · · + Qi + Ri , UQj = Ej , and
m(Qj ) = Kc = 2m(Q).
9
Denote by P0 a grid consisting of a pair of unit mass placements. Let
Q = P0 , denote with Qi1 ,...,in ,k the k-th element of QT,Qi1 ,...,in and with
Ri1 ,...,in ,k the k-th element of RT,Qi1 ,...,in . Denote by
X
Pk =
Qi1 ,...,in + Ri1 ,...,in
i1 +···+in =k
a sum of disjoint grids. We have that Pk Pk+1 since Ri1 ,...,in Qi1 ,...,in +1 +
Ri1 ,...,in +1 and Qi1 ,...,in Qi1 ,...,in ,1 + Ri1 ,...,in ,1 . We have obtained a sequence
of grid refinements
P0 P1 . . .. Note that since T is a test, N0 = {Ω}
S
and UP0 = N0 . Then for every sequence of clopen sets E = E0 ⊇ E1 ⊇
. . ., Ei ∈ Ni , there is an infinite subsequence E ′ = E0′ ⊇ E1′ ⊇ . . ., chosen
in the following way: let E0′ = E0 and if for some i1 , . . . , in , Ei′ = UQi1 ,...,in ,
′
then there is some k such that UQi1 ,...,in ,k ∈ E. Let Ei+1
= UQi1 ,...,in ,k .
′
a
diagonal
grid
Then for every Ei there is a refinement Pi′ that contains
T
′
i
Q with UQ = Ei and m(Q) = 2 . Then for α ∈ i∈N Ei for at least one
j ∈ {0, 1} we’ll have
sup µj (A)/λ(A) = ∞. Let P 0 = P00 P10 . . .
1
and P =
P01
P11
A∈AjP ,α∈A
. . . . We have that P 0 , P 1 satisfy the lemma.
Lemma 3.3. For any granular test P we can computably construct a
sequence-set betting strategy S such that for every infinite binary sequence
α that fails P , α fails S.
Proof. In this proof ⊂ means strict inclusion. Let h > 1, A ∈ AS for some
sequence-set betting strategy S and B a finite, disjoint
S subset of AP . We’ll
say A corresponds to B, and write A ∼ B iff A ⊆ B and two conditions
are satisfied:
µP (B) < hµS (A)
(8)
∀B ∈ B
max c(B ′ ) < 2h max
c(A′ ).
′
B⊂B ′ ∈AP
A⊆A ∈AS
(9)
We’ll explicitly and recursively construct S with the property
∀A ∈ AS ∃B ⊆ AP A ∼ B
(10)
We claim that any sequence-set betting strategy with the property (10)
satisfies the theorem. We prove the claim by contradiction. Suppose there
is some infinite binary sequence α that fails P and passes S. For any α the
following statement is either true or false:
∀B ∈ Pα ∀∞ A ∈ Sα ∀B ⊆ AP A ∼ B ⇒ B 6∈ B
10
(11)
Suppose (11) is false. Then there is some B ∈ Pα such that for infinitely
many A ∈ Sα there is some B ⊆ AP that contains B and A ∼ B. We cannot
have that µP (B) = 0 as this is contrary to the assumption that α fails P .
If µP (B) > 0 then since lim λ(A) = 0, by (8) we have that sup c(A) = ∞
A∈Sα
A∈Sα
contrary to the assumption that α passes S.
Suppose (11) is true. Note that for any two elements of AP they are
either disjoint or one contains the other. Then for every B ∈ Pα and
A ∈ Sα let A ∼ BA for some BA ⊆ AP . For almost all A, then B 6∈ BA .
But α ∈ B ′ for some B ′ ∈ BA , and then either B ⊂ B ′ or B ′ ⊂ B. Since
there are finitely many B ′ ⊃ B in AP , and they can be only in BA for
finitely many A’s, for all but finitely many A we have B ′ ⊂ B. From (9)
there is some A′ ⊇ A with c(B) < 2hc(A′ ) and by the assumption that
α fails P we have that sup c(A) = ∞, contrary to the assumption that α
A∈Sα
passes S. This proves the claim.
Now to the construction of S. Since both P and S are tests, we have
that S0 corresponds to {P0 }. Let A be the part of AS already constructed,
and assume it satisfies (10). Then for all A ∈ A there is some B ⊆ AP with
A ∼ B. Denote CB = {B ∈ B : c(B) < 2h max
c(A′ )}. Then CB 6= ∅,
′
A⊆A ∈AS
since
1
λ(B \ CB ) ≤ λ(A)
2
(12)
is implied by (8).
Let k be such that B ∈ CB , B ∈ APk−1 and B 6∈ APk . Replacing
BS
with
S
′
′
it’s partitions in APk we obtain B . We have A ∼ B since B = B′ ,
satisfying (8), and (9) is satisfied for elements B ′ 6= B of B′ due to (9)
for B, and for B itself is due to B ∈ CB . Applying iteratively, since P is
granular, for any ǫ we can obtain B′ such that for any B ∈ CB′ , λ(B) < ǫ.
Note that there is at least one M ∈ CB′ with c(M) ≤ c(B′ ) and A ∩ M 6= ∅
since for all B ∈ B′ \ CB′ , c(B) ≥ c(B′ ). Note that (12) holds also for B′ .
We now partition B′ into three sets B0′ , {M}, B1′ , having B′ \ CB′ ⊆ B0′ , and
distributing
the elements of CB′ \ {M} among B0′ , B1′ so that for j ∈ {0, 1},
S ′
λ( Bj ∩ A) ≤ 21 λ(A). Furthermore, we can partition M into M0 , M1 so
that the sets A0 , A1
Aj = A ∩ (
[
Bj′ ∪ Mj ) for j = 0, 1
11
have λ(Aj ) = 21 λ(A). Let Bj = Bj′ ∪ {M} and
µS (Aj ) =
µP (Bj )
µS (A)
µP (B0 ) + µP (B1 )
We have µP (B0 ) + µP (B1 ) = µP (B′ ) + µP (M) < (1 + ǫ)µP (B′ ). Let h′ =
µP (B′ )/µS (A). Then µP (Bj ) < h′ (1 + ǫ)µS (Aj ), from (8) h′ < h, and by
choosing small enough ǫ, (8) is satisfied for Aj , Bj . We have that (9) is
satisfied for Aj , Bj since it is satisfied for A, B′ . We have shown from the
inductive assumption that A ∼ B for some B ⊆ AP , we obtain two subsets
of AP , B0 , B1 , a partition of A into two sets of equal measure, A0 , A1 , and
their mass assignments such that A0 ∼ B0 and A1 ∼ B1 , proving that S has
property (10).
Proof of Theorem 1. By Lemmas 3.2 and 3.3 for any Martin-Löf test, and in
particular the universal one, M, we can computably construct two sequenceset betting strategies S 0 , S 1 such that every infinite binary sequence that
fails M also fails at least one of S 0 , S 1 .
Acknowledgements
I thank Wolfgang Merkle for our discussions and support, Jason Rute for
his suggestions on improving the readability, Mark Lemay for proof reading
and corrections, and Peter Gács for his most generous help in improving
and streamlining the proof and helping form the final version of the paper.
Bibliography
[1] Ming Li, Paul M. B. Vitányi: An Introduction to Kolmogorov Complexity and Its Applications, Third Edition. Texts in Computer Science,
Springer 2008, ISBN 978-0-387-33998-6, pp. i-xxiii, 1-790 1, 2
[2] Andrei A. Muchnik, Alexei L. Semenov, Vladimir A. Uspensky: Mathematical Metaphysics of Randomness. Theor. Comput. Sci. 207(2): 263317 (1998) (document), 1
12
[3] C.P. Schnorr. Zufälligkeit und Wahrscheinlichkeit; Eine algorithmische
Begründung der Wahrscheinlichkeitstheorie, volume 218 of Lect. Notes
Math. Springer-Verlag, Berlin, 1971. 1
[4] R. von Mises. Grundlagen der Wahrscheinlichkeitsrechnung. Mathematische Zeitschrift, 5:52–99, 1919. [xviii, 229] 1
[5] J. Ville. Etude Critique de la Notion de Collectif. Gauthier-Villars,
Paris, 1939. 1
[6] A.N. Kolmogorov. On tables of random numbers. Sankhya , The Indian
Journal of Statistics, Ser. A, 25:369–376, 1963. 1
[7] D.W. Loveland. A new interpretation of von Mises’ concept of a random
sequence. Z. Math. Logik und Grundlagen Math., 12:279–294, 1966. 1
[8] P. Martin-Löf. The definition of random sequences. Inform. Contr.,
9:602–619, 1966. 1, 2
[9] Wolfgang Merkle, Joseph S. Miller, André Nies, Jan Reimann, Frank
Stephan: Kolmogorov-Loveland randomness and stochasticity. Ann. Pure
Appl. Logic 138(1-3): 183-210 (2006) 1
[10] Rodney G. Downey, Denis R. Hirschfeldt: Algorithmic Randomness
and Complexity. Theory and Applications of Computability, Springer
2010, ISBN 978-0-387-95567-4, pp. 1-766 1
[11] Joseph S. Miller, André Nies: Randomness and Computability: Open
Questions. Bulletin of Symbolic Logic 12(3): 390-410 (2006) 1
[12] K. Ambos-Spies and A. Kučera. Randomness in computability theory.
In P. Cholak, S. Lempp, M. Lerman, and R.A. Shore, editors, Computability Theory and Its Applications: Current Trends and Open Problems, vol- ume 257 of Contemporary Mathematics, pages 1–14. American
Math. Society, 2000. 1
[13] Rodney G. Downey, Denis R. Hirschfeldt, André Nies, Sebastiaan Terwijn: Calibrating Randomness. Bulletin of Symbolic Logic 12(3): 411-491
(2006) 1
13
| 8cs.DS
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.